PART 01: Executive summary
• Key findings
PART 02: Scope of the report
• Market overview
• Top-vendor offerings
PART 03: Market research methodology
• Research methodology
• Economic indicators
PART 04: Introduction
• Key market highlights
PART 05: Market landscape
• Market overview
• Two-factor authentication
• Comparison of two-factor authentication and multi-factor authentication
• Regulations related to multi-factor authentication
• Advantages and disadvantages of hardware OTP token
•
PART 06: Authentication techniques
• Comparison of authentication techniques
PART 07: Market size and forecast
• Global hardware OTP token authentication market
PART 08: Market segmentation by end-users
• Hardware OTP token authentication market in BFSI sector
• Hardware OTP token authentication market in PCI
• Hardware OTP token authentication market in government sector
• Hardware OTP token authentication market in healthcare sector
PART 09: Geographical segmentation
• Hardware OTP token authentication market in Americas
• Hardware OTP token authentication market in EMEA
• Hardware OTP token authentication market in APAC
PART 10: Market attractiveness
• Market attractiveness by end-user segmentation
PART 11: Market drivers
• Increase in volume of online transactions
• Higher level of security provided by hardware OTP tokens
• Preference for convenience and instant use
• Adherence to compliance mandates
PART 12: Impact of drivers
PART 13: Market challenges
• High upgrading and replacement costs
• Rise in adoption of software authentication methods
• Hardware devices are inconvenient to carry and vulnerable
PART 14: Impact of drivers and challenges
PART 15: Market trends
• Emergence of next-generation hardware OTP tokens
• Growing use of unified platforms for authentication purposes
• Increasing adoption of authentication solutions by SMEs
PART 16: Impact of trends
PART 17: Buying criteria
PART 18: Five forces analysis
PART 19: Vendor landscape
• Competitive landscape
• Other prominent vendors
PART 20: Key vendor profiles
• Gemalto
• Dell
• VASCO
• Symantec
• Assumptions
PART 21: Appendix
• List of abbreviations
PART 22: Explore Technavio
[List of Exhibits]
Exhibit 01: Overview of numbers 2015 and 2015 (% market share)
Exhibit 02: Major countries considered
Exhibit 03: Product offerings
Exhibit 04: Two-factor authentication method
Exhibit 05: Multi-factor authentication versus two-factor authentication
Exhibit 06: Comparison of authentication techniques 2015
Exhibit 07: Global hardware OTP token authentication market 2015-2020 ($ millions)
Exhibit 08: Hardware OTP token authentication market in BFSI sector 2015-2020 ($ millions)
Exhibit 09: Hardware OTP token authentication market in PCI 2015-2020 ($ millions)
Exhibit 10: Hardware OTP token authentication market in government sector 2015-2020 ($ millions)
Exhibit 11: Hardware OTP token authentication market in healthcare sector 2015-2020 ($ millions)
Exhibit 13: Hardware OTP token authentication market in Americas 2015-2020 ($ millions)
Exhibit 14: Hardware OTP token authentication market in EMEA 2015-2020 ($ millions)
Exhibit 15: Hardware OTP token authentication market in APAC 2015-2020 ($ millions)
Exhibit 16: Market attractiveness by end-users 2016
Exhibit 17: Market attractiveness by end-users 2020
Exhibit 18: Global 3G and 4G connections (millions)
Exhibit 19: Impact of drivers
Exhibit 20: Impact of drivers and challenges
Exhibit 21: Impact of trends
Exhibit 22: Buying criteria for hardware OTP token authentication solutions
Exhibit 23: Five forces analysis
Exhibit 24: Competitive rating of hardware OTP authentication vendors
Exhibit 25: Vendor matrix: Hardware OTP tokens
Exhibit 26: Vendor matrix: Geographical presence
Exhibit 27: Vendor matrix: Features
Exhibit 28: Vendor matrix: End-users
Exhibit 29: Pricing of Dell authentication solutions
Exhibit 30: Symantec: Business segmentation by revenue 2015
Exhibit 31: Symantec: Geographical segmentation by revenue 2015
【掲載企業】
Gemalto, Dell, VASCO, Symantec, Authenex, Deepnet Security, Entrust, FEITIAN Technologies, Fortinet, HID, ID Control, Nexus, PortalGuard, SecuTech, SecureMetric Technology, and Yubico.
【資料のキーワード】
ハードウェアOTPトークン認証、セキュリティ、ワンタイムパスワード認証
【調査方法】
一次資料による調査(業界専門家、ベンダー、代理店、顧客等を対象にしたデプスインタビュー調査など)及び二次資料による調査(Technavio独自のプラットフォーム、産業書籍、企業報告書、ニュース記事、アナリストレポート、貿易協会、政府機関発行データなど)
【免責事項】
※当資料上の情報/データは調査会社が信頼できると判断した情報源から入手したものに基づき作成しましたが、その正確性・完全性を保証するものではありません。当資料に記載された情報/データ/見解/仮説などは作成時点又は発行時点における調査会社の判断であり、その後の状況変化に応じて変更される場合があります。当資料上の情報/データに基づいたお客様の意思決定又は実行による結果について、調査会社/発行会社/販売会社H&Iグローバルリサーチはその責を負いかねますのでご了承ください。英文資料の紹介ページにおける日本語題名/概要/目次はH&Iグローバルリサーチが翻訳した内容であり、翻訳の正確性・完全性を保証するものではありません。