Global Two-Factor Authentication Market 2017-2021

SKU ID :TNV-10294361 | Published Date: 19-Jan-2017 | No. of pages: 72
Table of Contents PART 01: Executive summary PART 02: Scope of the report PART 03: Research Methodology PART 04: Introduction • Key market highlights • 2FA • Comparison between 2FA and MFA • Advantages of 2FA • Regulations related to MFA • Types of authentication keys PART 05: Economic overview PART 06: Market landscape • Market overview • Market assumptions • Market size and forecast PART 07: Market segmentation by end-user • Global 2FA market by end-user • PART 08: Geographical segmentation • Global 2FA market by geography • Global 2FA market by geography (revenue) PART 09: Buying criteria PART 10: Market drivers • Increase in volume of online transactions • High level of security provided by hardware OTP tokens • Adherence to compliance mandates • Impact of drivers PART 11: Market Challenges • Inconvenience of carrying hardware tokens and vulnerability to threats • Lack of telecom infrastructure in developing countries • Rise in number of technical defects PART 12: Impact of drivers and challenges PART 13: Market trends • Introduction of OOB authentication • Emergence of cloud-based 2FA • Growing adoption of unified platforms for authentication purposes PART 14: Five forces analysis • Five forces analysis PART 15: Vendor landscape • Competitive scenario • Top-vendor offerings • Vendor matrix • Vendor rating • Vendor highlights • M&A • Description of major vendors • Other prominent vendors PART 16: Appendix • List of abbreviations PART 17: Explore Technavio List of Exhibits Exhibit 01:FA versus MFA Exhibit 02: Regulations and their depictions Exhibit 03: Market assumptions Exhibit 04: Global 2FA market 2016-2021 ($ billions) Exhibit 05: Global 2FA market by end-user 2016-2021 Exhibit 06: Global 2FA market by end-user 2016-2021 ($ billions) Exhibit 07: Global 2FA market by geography 2016-2021 Exhibit 08: Global 2FA market by geography 2016-2021 ($ billions) Exhibit 09: Buying criteria for 2FA Exhibit 10: Impact of drivers Exhibit 11: Impact of drivers and challenges Exhibit 12: Five forces analysis Exhibit 13: Product offerings Exhibit 14: Vendor matrix Exhibit 15: Vendor rating Exhibit 16: Vendor highlights Exhibit 17: M&A of vendors Exhibit 18: Other prominent vendors
Entrust, Gemalto, RSA Security, SecurEnvoy, VASCO Data Security International, Authenex, Authentify, Authy, Deepnet Security, DynaPass, Fortinet, HID Global, ID Control, Meontrust, Mi-Token, PointSharp, Protectimus Solutions, SecureAuth, SecurEnvoy, SecurStar, Yubico.
  • PRICE
  • $2500
    $4000

Our Clients