“Today, most of enterprises are vying to effectively address the security and the authentication concerns attributed to verify the end-users and legitimize his/her actions. The end-users are becoming highly aware of the security aspect and most of the software providers are incorporating security into their service level agreements. But major boost to the need of strong authentication is attributed to increase in insider data thefts and whistle-blowing as well increased frequency of cyber-attacks on enterprises. It has been observed that most of the attacks on large enterprises have been state-sponsored and are committed to derail the business processes of the enterprises to ultimately cause monetary damage.
Most of enterprises consist of voluminous amount of sensitive organizational data which is being generated on a daily basis. This data may vary from spreadsheets to huge databases and can be highly unstructured. There need to be pre-defined security and access policies to this data to ensure that who access what type of data. At the same time, there an urgent need in managing, protecting and revoking credentials of a private individual. Also, the growth of mobile user authentication is due to the increased need in verifying and validating the end-user based on its behavioral characteristics. The behavioral characteristics such as time of login, pattern of login, geographical co-ordinates and timestamps are being used more frequently to deliver robust authentication solutions. The mobile user authentication market can be defined as the market for the authenticating an end-user using factored authentication in which one of the authentication factor is mobile which is in the possession of the end-user. Mobile user authentication not only provides secured access to the sensitive content but it is also instrumental in framing and enforcing different security and access control policies in any organization. Mobile user authentication is crucial in providing a unified view about enterprise wide-security and introduces greater visibility and transparency in business processes of an organization.
The mobile user authentication market has been segmented on the basis of user types into Small and Medium Enterprises (SMEs) and enterprises; on the basis of verticals types into academia & education, Banking, Financial Services, and Insurance (BFSI), consumer goods & retail, energy & power, government & defense, life sciences & healthcare, manufacturing, IT & telecom, and others; and on the basis of regions into North America, Asia-Pacific (APAC), Europe, the Middle East and Africa (MEA), and Latin America. The report also provides insights into the opportunity analysis of specific verticals and business case analysis and roadmaps for the mobile user authentication market.
There are various assumptions that have been taken into consideration for the market sizing and forecasting exercise. Few global assumptions include political, economic, social, technological, and economic factors. For instance, exchange rates, one of the economic factors, are expected to have a moderate rating of impact on this market. Therefore, dollar fluctuations are expected to not seriously affect the forecasts in the emerging regions.
The report will help the market leaders/new entrants in this market in the following ways:
1. This report segments the market into user types, verticals, and regions covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market. The market numbers are further split across the different verticals and regions.
2. This report will help them better understand the competitors and gain more insights to better position their business. There is a separate section on competitive landscape, including competitor ecosystem, mergers and acquisition, and partnerships and agreements. Besides, there are company profiles of top 10 players in this market along with two key innovators.
3. The report helps them understand the pulse of the market. The report provides information on key market drivers, restraints, challenges, and opportunities.
”
“TABLE OF CONTENTS
1 INTRODUCTION 13
1.1 OBJECTIVES OF THE STUDY 13
1.2 MARKET DEFINITION 13
1.3 MARKET SCOPE 14
1.3.1 MARKETS COVERED 14
1.3.2 YEARS CONSIDERED FOR THE STUDY 14
1.4 LIMITATIONS 15
1.5 CURRENCY 15
1.6 STAKEHOLDERS 15
2 RESEARCH METHODOLOGY 16
2.1 RESEARCH DATA 16
2.1.1 SECONDARY DATA 16
2.1.1.1 Key data from secondary sources 17
2.1.2 PRIMARY DATA 17
2.1.2.1 Key data from primary sources 18
2.1.2.2 Key industry insights 18
2.1.2.3 Breakdown of primary interviews: by company type, designation, and region 19
2.2 MARKET SIZE ESTIMATION 19
2.2.1 BOTTOM-UP APPROACH 20
2.2.2 TOP-DOWN APPROACH 20
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION 21
2.4 RESEARCH ASSUMPTIONS 22
3 EXECUTIVE SUMMARY 23
4 PREMIUM INSIGHTS 26
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE MOBILE USER AUTHENTICATION MARKET 26
4.2 MOBILE USER AUTHENTICATION MARKET 26
4.3 MOBILE USER AUTHENTICATION MARKET POTENTIAL 27
4.4 MOBILE USER AUTHENTICATION REGIONAL MARKET 27
4.5 MOBILE USER AUTHENTICATION MARKET: VERTICAL GROWTH MATRIX 28
4.6 LIFECYCLE ANALYSIS, BY REGION, 2015 29
5 MARKET OVERVIEW 30
5.1 INTRODUCTION 31
5.1.1 BY USER TYPE 31
5.1.2 BY VERTICAL 31
5.1.3 BY REGION 32
5.2 MARKET DYNAMICS 32
5.2.1 DRIVERS 32
5.2.1.1 Growth of online data sharing and BYOD 32
5.2.1.2 Growth in high profile cyber attacks 33
5.2.1.3 Increase in regulatory compliances 33
5.2.1.4 Increased traction for vulnerability assessment and management 33
5.2.2 RESTRAINTS 34
5.2.2.1 Existing base of authentication solutions 34
5.2.2.2 Shadow IT risk 34
5.2.3 OPPORTUNITIES 35
5.2.3.1 Growing impetus to Internet of Things (IoT) 35
5.2.3.2 Demand for Authentication-as-a-Service (AaaS) 35
5.2.4 CHALLENGES 36
5.2.4.1 Educating consumers about security and authentication 36
5.2.4.2 Security issues associated with cloud and mobile technologies 36
6 INDUSTRY TRENDS 37
6.1 INTRODUCTION 37
6.2 MOBILE USER AUTHENTICATION MARKET: VALUE CHAIN ANALYSIS 37
6.3 PORTER’S FIVE FORCES ANALYSIS 38
6.3.1 THREAT OF NEW ENTRANTS 38
6.3.2 THREAT OF SUBSTITUTES 39
6.3.3 BARGAINING POWER OF SUPPLIERS 39
6.3.4 BARGAINING POWER OF BUYERS 39
6.3.5 INTENSITY OF COMPETITIVE RIVALRY 40
7 MOBILE USER AUTHENTICATION MARKET ANALYSIS 41
7.1 INTRODUCTION 42
8 MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY USER TYPE 44
8.1 INTRODUCTION 45
8.2 SMES 45
8.3 ENTERPRISES 46
9 MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY VERTICAL 48
9.1 INTRODUCTION 49
9.2 ACADEMIA AND EDUCATION 50
9.3 BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI) 51
9.4 CONSUMER GOODS AND RETAIL 52
9.5 ENERGY AND POWER 53
9.6 GOVERNMENT AND DEFENSE 54
9.7 LIFE SCIENCES AND HEALTHCARE 55
9.8 IT AND TELECOM 56
9.9 MANUFACTURING 57
9.10 OTHERS 58
10 GEOGRAPHIC ANALYSIS 60
10.1 INTRODUCTION 61
10.2 NORTH AMERICA 62
10.3 EUROPE 64
10.4 ASIA-PACIFIC 66
10.5 MIDDLE EAST AND AFRICA 67
10.6 LATIN AMERICA 68
11 COMPETITIVE LANDSCAPE 70
11.1 OVERVIEW 70
11.2 COMPETITIVE SITUATION AND TRENDS 71
11.2.1 NEW PRODUCT DEVELOPMENTS 72
11.2.2 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS 72
11.2.3 MERGERS AND ACQUISITIONS 73
11.2.4 NEW CONTRACTS 74
11.2.5 DELIVERY MODELS 75
12 COMPANY PROFILES 76
12.1 INTRODUCTION 76
(Overview, Financials, Products & Services, Strategy, and Developments)*
12.2 CA TECHNOLOGIES INC. 77
12.3 EMC CORPORATION 80
12.4 GEMALTO NV 83
12.5 SYMANTEC CORPORATION 86
12.6 VASCO DATA SECURITY INTERNATIONAL INC. 89
12.7 AUTHENTIFY INC. 92
12.8 ENTRUST DATACARD CORPORATION 94
12.9 SECUREAUTH CORPORATION 96
12.10 SECURENVOY PLC 98
12.11 TELESIGN 100
*Details on overview, financials, product & services, strategy, and developments might not be captured in case of unlisted companies.
13 KEY INNOVATOR PROFILES 102
13.1 DEEPNET SECURITY 102
13.1.1 BUSINESS OVERVIEW 102
13.1.2 SOLUTIONS OFFERED 102
13.2 SMS PASSCODE A/S 103
13.2.1 BUSINESS OVERVIEW 103
13.2.2 SOLUTIONS OFFERED 103
14 APPENDIX 104
14.1 INDUSTRY EXCERPTS 104
14.1.1 NEW PRODUCT DEVELOPMENTS, 2013–2015 104
14.1.2 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS 106
14.1.3 NEW CONTRACTS 107
14.2 DISCUSSION GUIDE 108
14.3 INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE 110
14.4 AVAILABLE CUSTOMIZATIONS 111
14.5 RELATED REPORTS 112
“
“LIST OF TABLES
TABLE 1 MOBILE USER AUTHENTICATION MARKET SIZE AND GROWTH RATE,
2013–2020 (USD MILLION, Y-O-Y %) 24
TABLE 2 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF DRIVERS 34
TABLE 3 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF RESTRAINTS 35
TABLE 4 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF OPPORTUNITIES 35
TABLE 5 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF CHALLENGES 36
TABLE 6 MOBILE USER AUTHENTICATION MARKET SIZE, 2013–2020 (USD MILLION) 43
TABLE 7 MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE,
2013–2020 (USD MILLION) 45
TABLE 8 SMES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION,
2013–2020 (USD MILLION) 46
TABLE 9 ENTERPRISES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION,
2013–2020 (USD MILLION) 47
TABLE 10 MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL,
2013–2020 (USD MILLION) 49
TABLE 11 ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE,
BY REGION, 2013–2020 (USD MILLION) 50
TABLE 12 ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE,
BY USER TYPE, 2013–2020 (USD MILLION) 50
TABLE 13 BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION,
2013–2020 (USD MILLION) 51
TABLE 14 BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE,
2013–2020 (USD MILLION) 51
TABLE 15 CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION) 52
TABLE 16 CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 52
TABLE 17 ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION) 53
TABLE 18 ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 53
TABLE 19 GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE,
BY REGION, 2013–2020 (USD MILLION) 54
TABLE 20 GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE,
BY USER TYPE, 2013–2020 (USD MILLION) 54
TABLE 21 LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION) 55
TABLE 22 LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 55
TABLE 23 IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION) 56
TABLE 24 IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 56
TABLE 25 MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION) 57
TABLE 26 MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 57
TABLE 27 OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION,
2013–2020 (USD MILLION) 58
TABLE 28 OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE,
2013–2020 (USD MILLION) 59
TABLE 29 MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION,
2013–2020 (USD MILLION) 62
TABLE 30 NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION) 64
TABLE 31 NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 64
TABLE 32 EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL,
2013–2020 (USD MILLION) 65
TABLE 33 EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE,
2013–2020 (USD MILLION) 65
TABLE 34 ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL,
2013–2020 (USD MILLION) 67
TABLE 35 ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 67
TABLE 36 MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE,
BY VERTICAL, 2013–2020 (USD MILLION) 68
TABLE 37 MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE,
BY USER TYPE, 2013–2020 (USD MILLION) 68
TABLE 38 LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION) 69
TABLE 39 LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION) 69
TABLE 40 NEW PRODUCT DEVELOPMENTS, 2013–2015 72
TABLE 41 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013–2015 73
TABLE 42 MERGERS AND ACQUISITIONS, 2013–2015 73
TABLE 43 NEW CONTRACTS, 2013–2015 74
TABLE 44 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013–2015 106
TABLE 45 NEW CONTRACTS, 2013–2015 107
“
“LIST OF FIGURES
FIGURE 1 RESEARCH DESIGN 16
FIGURE 2 MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH 20
FIGURE 3 MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH 20
FIGURE 4 DATA TRIANGULATION 21
FIGURE 5 MOBILE USER AUTHENTICATION MARKET SIZE, USER TYPE SNAPSHOT
(2015–2020): SME MARKET IS EXPECTED TO QUADRUPLE BY 2020 24
FIGURE 6 MOBILE USER AUTHENTICATION MARKET SHARE: NORTH AMERICA IS EXPECTED TO HOLD THE LARGEST MARKET SHARE IN 2015 24
FIGURE 7 GROWTH IN ONLINE DATA SHARING AND INCREASED ADOPTION OF BYOD IS DRIVING THE MOBILE USER AUTHENTICATION MARKET 26
FIGURE 8 NORTH AMERICA IS EXPECTED TO EXHIBIT THE HIGHEST MARKET SHARE IN THE MOBILE USER AUTHENTICATION MARKET (2015) 26
FIGURE 9 ASIA-PACIFIC AND MIDDLE EAST & AFRICA ARE EXPECTED TO HAVE THE HIGHEST MARKET GROWTH POTENTIAL DURING THE FORECAST PERIOD 27
FIGURE 10 ASIA-PACIFIC IS EXPECTED TO GROW WITH HIGHER CAGR THAN MIDDLE EAST & AFRICA AND LATIN AMERICA 27
FIGURE 11 MOBILE USER AUTHENTICATION VERTICAL GROWTH MATRIX 28
FIGURE 12 REGIONAL LIFECYCLE: ASIA-PACIFIC IS IN THE GROWTH PHASE IN 2015 29
FIGURE 13 MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY USER TYPE 31
FIGURE 14 MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY VERTICAL 31
FIGURE 15 MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY REGION 32
FIGURE 16 MOBILE USER AUTHENTICATION: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES 32
FIGURE 17 VALUE CHAIN ANALYSIS 37
FIGURE 18 PORTER’S FIVE FORCES ANALYSIS: MOBILE USER AUTHENTICATION MARKET 38
FIGURE 19 SMES WILL EXHIBIT HIGHER GROWTH RATE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD 45
FIGURE 20 GOVERNMENT AND DEFENSE VERTICAL IS EXPECTED TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET BY 2020 49
FIGURE 21 NORTH AMERICA WILL CONTINUE TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD
2015–2020 61
FIGURE 22 GEOGRAPHIC SNAPSHOT: ASIA-PACIFIC IS EMERGING AS A NEW HOTSPOT IN THE MOBILE USER AUTHENTICATION MARKET 61
FIGURE 23 ASIA-PACIFIC IS THE FASTEST GROWING MARKET IN THE MOBILE USER AUTHENTICATION MARKET 62
FIGURE 24 NORTH AMERICA MARKET SNAPSHOT: INCREASED TRACTION AMONG VERTICALS WILL DRIVE THE MARKET 63
FIGURE 25 ASIA-PACIFIC MARKET SNAPSHOT: INCREASED TRACTION AMONG GROWING ECONOMIES WILL DRIVE THE MARKET 66
FIGURE 26 COMPANIES ADOPTED, ACQUISITIONS, NEW PRODUCT DEVELOPMENTS, AND PARTNERSHIP AGREEMENTS AND COLLABORATIONS AS THE KEY GROWTH STRATEGIES FOR THE -PERIOD 2013-2015 70
FIGURE 27 MARKET EVALUATION FRAMEWORK 71
FIGURE 28 BATTLE FOR MARKET SHARE: NEW PRODUCT LAUNCHES WAS THE KEY STRATEGY ADOPTED BY PLAYERS DURING THE LAST 3 YEARS 71
FIGURE 29 GEOGRAPHIC REVENUE MIX OF TOP FIVE PLAYERS 76
FIGURE 30 CA TECHNOLOGIES INC.: COMPANY SNAPSHOT 77
FIGURE 31 CA TECHNOLOGIES INC.: SWOT ANALYSIS 79
FIGURE 32 EMC CORPORATION: COMPANY SNAPSHOT 80
FIGURE 33 EMC CORPORATION: SWOT ANALYSIS 82
FIGURE 34 GEMALTO NV: COMPANY SNAPSHOT 83
FIGURE 35 GEMALTO NV: SWOT ANALYSIS 85
FIGURE 36 SYMANTEC CORPORATION: COMPANY SNAPSHOT 86
FIGURE 37 SYMANTEC CORPORATION: SWOT ANALYSIS 88
FIGURE 38 VASCO DATA SECURITY INTERNATIONAL INC.: COMPANY SNAPSHOT 89
FIGURE 39 VASCO DATA SECURITY INTERNATIONAL, INC: SWOT ANALYSIS 91
“