資料搜尋諮詢服務
找不到您所需要的資料嗎?
我們能協助您找到最符合您研究需求的資訊
請撥打 +886-2-2799-3110
或透過電子郵件與我們聯絡 mi@hintoninfo.com
IHS_EWBIEEE xploreSTRATEGY ANALYTICSIHS_EWB_GF

頁面路徑選單

Privileged Identity Management Market by Solution (Identity Management, Access Management, Session Monitoring and Management), Service, Installation Type (Appliance-Based & Agent-Based), Deployment Mode, Vertical, and Region - Global Forecast to 2021

  • LinkedIn
  • facebook
  • Twitter
出 版 商:MarketsandMarkets
出版日期:2017/03/15
頁  數:133頁
文件格式:PDF
價  格:
USD 5,650 (Single-User License)
USD 6,650 (Multi-User License)
USD 8,150 (Global-User License)
線上訂購或諮詢
Protection from increasing instances of security breach due to insider attacks is driving the privileged identity management market
The privileged identity management market size is expected to grow from USD 922.0 million in 2016 to USD 3,792.5 million by 2021, at a Compound Annual Growth Rate (CAGR) of 32.7%. Identity management and access management are among the applications contributing to the growth of the privileged identity management market.
Identity management solution is expected to have the largest market size in the privileged identity management market
The identity management solution is estimated to contribute the largest market share during the forecast period. Due to increasing adoption of Bring Your Own Device (BYOD) technology in enterprises and the efforts of managing the credentials or identities associated with each super-user account, privileged identity is becoming a major point of concern for organizations.
Cloud deployment is expected to grow at the highest rate from 2016 to 2021. Among the verticals, the Banking, Financial Services, and Insurance (BFSI) vertical is expected to contribute the largest market share during the forecast period.
North America is expected to have the largest market size in the privileged identity management market
North America has the largest market size in the privileged identity management market, due to the presence of a large number of security vendors, whereas Asia-Pacific (APAC) is expected to be the fastest-growing region. Factors, such as increasing Internet usage, compliance regulation, and implementation of BYOD technology are major forces for the adoption of privileged identity management applications. Furthermore, the market in developing regions, such as Middle East & Africa (MEA) and Latin America is expected to grow due to the increasing usage of mobility, cloud computing, hosting services, and government regulatory compliances.
In the process of determining and verifying the market size for several segments & subsegments gathered through secondary research, extensive primary interviews were conducted with key people. The break-up of profile of primary participants is as follows:
‧ By Company: Tier 1 – 55 %, Tier 2 – 20%, and Tier 3 – 25%
‧ By Designation: C level – 60%, Director level – 25%, and Others – 15%
‧ By Region: North America – 10%, Europe – 20%, APAC – 40%, and RoW – 30%
The various key privileged identity management vendors profiled in the report are ARCON (India), Balabit (Hungary), BeyondTrust (U.S.), Bomgar Corporation (U.S.), CA, Inc. (U.S.), Centrify (U.S.), Core Security (U.S.), Cyberark (U.S.), Hitachi-ID (Canada), IBM Corporation (U.S.), Iraje (U.S.), Lieberman Software (U.S.), MANAGEENGINE (U.S.), MICROFOCUS (U.K.), NRI SecureTechnologies (U.S.), ObserveIT (U.S.), Onion ID (U.S.), Oracle Corporation (U.S.), Osirium (U.K.), Quest Software (U.S.), Silverlake Mastersam (Singapore), Simeio Solutions (U.S.), Thycotic (U.S.), Wallix (France), and Wheel Systems (U.S.).

The report will help the market leaders/new entrants in this market in the following ways:
1. This report segments the privileged identity management market comprehensively and provides the closest approximations of the revenue numbers for the overall market and the subsegments across different regions.
2. The report helps stakeholders understand the pulse of the market and provides them information on key market drivers, restraints, challenges, and opportunities.
3. This report helps stakeholders to understand the competitors better and gain more insights to improve their positions in the business. The competitive landscape section includes competitor ecosystem, new product developments, partnerships, and mergers & acquisitions.
TABLE OF CONTENTS

1 INTRODUCTION 15
1.1 OBJECTIVES OF THE STUDY 15
1.2 MARKET DEFINITION 15
1.3 MARKET SCOPE 15
1.3.1 MARKETS COVERED 16
1.3.2 YEARS CONSIDERED FOR THE STUDY 16
1.4 CURRENCY 17
1.5 LIMITATIONS 17
1.6 STAKEHOLDERS 17
2 RESEARCH METHODOLOGY 18
2.1 RESEARCH DATA 18
2.1.1 SECONDARY DATA 19
2.1.1.1 Key data from secondary sources 19
2.1.2 PRIMARY DATA 19
2.1.2.1 Key data from primary sources 20
2.1.2.2 Key industry insights 21
2.1.2.3 Breakdown of primary interviews 21
2.2 MARKET SIZE ESTIMATION 22
2.2.1 BOTTOM-UP APPROACH 22
2.2.2 TOP-DOWN APPROACH 23
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION 24
2.4 RESEARCH ASSUMPTIONS 25
3 EXECUTIVE SUMMARY 26
4 PREMIUM INSIGHTS 30
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE PRIVILEGED IDENTITY MANAGEMENT MARKET 30
4.2 PRIVILEGED IDENTITY MANAGEMENT MARKET: COMPONENTS 30
4.3 PRIVILEGED IDENTITY MANAGEMENT MARKET, BY REGION AND VERTICAL 31
4.4 PRIVILEGED IDENTITY MANAGEMENT MARKET POTENTIAL 31
4.5 LIFECYCLE ANALYSIS, BY REGION, 2016 32
?
5 MARKET OVERVIEW 33
5.1 INTRODUCTION 34
5.2 MARKET SEGMENTATION 34
5.2.1 BY SOLUTION 34
5.2.2 BY SERVICE 35
5.2.3 BY INSTALLATION TYPE 35
5.2.4 BY DEPLOYMENT MODE 35
5.2.5 BY ORGANIZATION SIZE 36
5.2.6 BY VERTICAL 36
5.2.7 BY REGION 36
5.3 MARKET DYNAMICS 37
5.3.1 DRIVERS 37
5.3.1.1 Increasing threat of data breach due to insider attacks 37
5.3.1.2 Need to optimize organization efficiency 38
5.3.1.3 Government regulatory compliances and adoption of best practices for identity management 38
5.3.2 RESTRAINTS 38
5.3.2.1 High cost of innovation and implementation 38
5.3.3 OPPORTUNITIES 39
5.3.3.1 Increased digitization and adoption of Identity as a Service (IDaaS) 39
5.3.3.2 Emergence of intelligence-based privileged identity management solutions 39
5.3.4 CHALLENGES 39
5.3.4.1 Lack of awareness about emerging security threats 39
6 INDUSTRY TRENDS 40
6.1 INTRODUCTION 40
6.2 VALUE CHAIN ANALYSIS 40
6.3 KEY TRENDS IN PRIVILEGED IDENTITY MANAGEMENT 41
6.3.1 EMERGENCE OF CLOUD-BASED PRIVILEGED IDENTITY MANAGEMENT 41
6.3.2 RISE IN CLOUD COMPUTING 41
6.3.3 THE DEVELOPMENT OF ADAPTABLE AND INTELLIGENCE-BASED PRIVILEGED IDENTITY MANAGEMENT SOLUTIONS 42
6.4 REGULATORY IMPLICATIONS 42
6.4.1 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI–DSS) 42
6.4.2 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) 43
6.4.3 FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 43
6.4.4 GRAMM-LEACH-BLILEY ACT (GLB ACT) 43
6.4.5 SARBANES-OXLEY ACT (SOX) 43
6.4.6 THE INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO) STANDARD 27001 44
?
7 PRIVILEGED IDENTITY MANAGEMENT MARKET ANALYSIS, BY COMPONENT 45
7.1 INTRODUCTION 46
7.2 SOLUTIONS 48
7.2.1 IDENTITY MANAGEMENT 49
7.2.2 ACCESS MANAGEMENT 50
7.2.3 SESSION MONITORING AND MANAGEMENT 50
7.3 SERVICES 51
7.3.1 PROFESSIONAL SERVICES 52
7.3.1.1 IMPLEMENTATION AND INTEGRATION 53
7.3.1.2 CONSULTING 54
7.3.1.3 EDUCATION AND TRAINING 55
7.3.1.4 SUPPORT AND MAINTENANCE 55
7.3.2 MANAGED SERVICES 56
8 PRIVILEGED IDENTITY MANAGEMENT MARKET ANALYSIS,
BY INSTALLATION TYPE 57
8.1 INTRODUCTION 58
8.2 APPLIANCE-BASED 59
8.3 AGENT-BASED 59
9 PRIVILEGED IDENTITY MANAGEMENT MARKET, BY DEPLOYMENT MODE 61
9.1 INTRODUCTION 62
9.2 CLOUD 63
9.3 ON-PREMISES 64
10 PRIVILEGED IDENTITY MANAGEMENT MARKET ANALYSIS,
BY ORGANIZATION SIZE 65
10.1 INTRODUCTION 66
10.2 LARGE ENTERPRISES 67
10.3 SMALL AND MEDIUM ENTERPRISES 68
11 PRIVILEGED IDENTITY MANAGEMENT MARKET ANALYSIS,
BY INDUSTRY VERTICAL 69
11.1 INTRODUCTION 70
11.2 BANKING, FINANCIAL SERVICES, AND INSURANCE 71
11.3 GOVERNMENT AND DEFENSE 72
11.4 HEALTHCARE AND PHARMACEUTICALS 73
11.5 MANUFACTURING 74
11.6 ENERGY AND UTILITIES 74
11.7 IT AND TELECOM 75
11.8 RETAIL 76
11.9 OTHERS 77
12 GEOGRAPHIC ANALYSIS 78
12.1 INTRODUCTION 79
12.2 NORTH AMERICA 81
12.3 EUROPE 85
12.4 ASIA-PACIFIC 89
12.5 MIDDLE EAST AND AFRICA 93
12.6 LATIN AMERICA 96
13 VENDOR DIVE ANALYSIS 100
13.1 INTRODUCTION 100
13.2 VENDOR INCLUSION CRITERIA 100
13.2.1 VANGUARD 100
13.2.2 INNOVATOR 100
13.2.3 DYNAMIC 100
13.2.4 EMERGING 100
13.3 OVERVIEW 101
13.4 PRODUCT OFFERINGS (FOR ALL 25 PLAYERS) 102
13.5 BUSINESS STRATEGY (FOR ALL 25 PLAYERS) 103
14 COMPANY SYNOPSIS 105
(Business Overview, Recent Developments, MnM View, Key Observations)*
14.1 CENTRIFY CORPORATION 105
14.2 LIEBERMAN SOFTWARE CORPORATION 106
14.3 BALABIT CORP. 107
14.4 BEYONDTRUST, INC. 109
14.5 BOMGAR CORPORATION 110
14.6 THYCOTIC 111
14.7 CA, INC. 112
14.8 QUEST SOFTWARE INC. 113
14.9 CYBERARK SOFTWARE LTD. 114
14.10 OBSERVEIT 115
14.11 ZOHO CORP (MANAGEENGINE) 116
14.12 SIMEIO SOLUTIONS 116
14.13 MICRO FOCUS NETIQ 117
14.14 HITACHI ID SYSTEMS, INC. 118
14.15 WALLIX 118
14.16 CORE SECURITY 119
14.17 IBM CORPORATION 119
14.18 ORACLE CORPORATION 120
14.19 SILVERLAKE MASTERSAM LIMITED 120
14.20 ONION ID, INC. 120
14.21 ARCON 121
14.22 IRAJE 121
14.23 OSIRIUM LTD 121
14.24 WHEEL SYSTEMS 122
14.25 NRI SECURETECHNOLOGIES 122
*Details on Business Overview, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View might not be captured in case of unlisted companies.
15 APPENDIX 123
15.1 INDUSTRY EXCERPTS 123
15.2 DISCUSSION GUIDE 124
15.3 KNOWLEDGE STORE: MARKETSANDMARKETS’ SUBSCRIPTION PORTAL 127
15.4 INTRODUCTION RT: REAL-TIME MARKET INTELLIGENCE 129
15.5 AVAILABLE CUSTOMIZATIONS 130
15.6 RELATED REPORTS 130
15.7 AUTHOR DETAILS 131
回上頁