株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

ID・アクセス管理 (IAM:Identity and Access Management) の世界市場の分析・予測:〜2022年

Global Identity and Access Management (IAM) Market Analysis, Forecast to 2022

発行 Frost & Sullivan 商品コード 783279
出版日 ページ情報 英文 91 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=113.28円で換算しております。
Back to Top
ID・アクセス管理 (IAM:Identity and Access Management) の世界市場の分析・予測:〜2022年 Global Identity and Access Management (IAM) Market Analysis, Forecast to 2022
出版日: 2019年01月23日 ページ情報: 英文 91 Pages
概要

高度化し、より攻撃的となったハッカーによるネットワーク、システム、ユーザーへの脅威が拡大する中、IAMサプライヤーは革新的でより統合化されたソリューションでこの問題に取り組んでいます。過去数年のこれらの脅威の公的な性質が、企業によるIAMの導入を推進しています。

当レポートでは、世界のID・アクセス管理 (IAM:Identity and Access Management) の市場を調査し、市場および技術・ソリューションの概要、市場成長への各種影響因子の分析、地域・企業規模別の収益規模の推移と予測、競合環境と市場シェア、主要ベンダーのプロファイル、成長機会・成功戦略の分析などをまとめています。

第1章 エグゼクティブサマリー

第2章 市場概要

第3章 外的課題:推進因子と障壁

第4章 市場予測・市場動向:総市場

  • 予測前提因子
  • 市場動向・収益予測
  • 世界の収益予測に関するディスカッション

第5章 市場予測・市場動向:地域・産業別

  • 収益予測:地域別
  • 地域別収益予測に関するディスカッション
  • 収益予測:産業別
  • 産業別収益予測に関するディスカッション

第6章 市場シェア・競合分析

  • 市場シェア・競合分析
  • 競合因子・分析
  • 競合環境

第7章 市場分析・予測:企業規模別

  • 収益予測
  • エンタープライズ・大規模企業:主要調査結果
  • エンタープライズ・大規模企業に関するディスカッション
  • 大規模企業:主要調査結果
  • 大規模企業に関するディスカッション
  • 中規模企業:主要調査結果
  • 中規模企業に関するディスカッション
  • 小規模/ROBO事業者:主要調査結果
  • 小規模/ROBO事業者に関するディスカッション

第8章 総論

  • 総論:予測
  • 総論:提言
  • 免責事項

第9章 ベンダープロファイル

  • Auth0
  • Beta Systems
  • Gemalto
  • Hitachi ID
  • IBM Security
  • Idaptive
  • Identity Automation
  • Microsoft
  • Okta
  • One Identity

第10章 付録

目次
Product Code: K305-74

Enabling Productivity, Securing Infrastructure and Protecting Users

The Frost & Sullivan report analyzes the global market for Identity and Access Management (IAM). The IAM market has evolved from a focus on access control and identity management to include governance and analytics. Another key component of IAM is Multifactor Authentication (MFA). IAM has grown more essential as mobility has broken down the physical perimeter that once protected corporate information and productivity systems. Enterprises must secure remote access to their systems while not adversely affecting the productivity of employees and partners working through these systems with cumbersome access and security processes. Industrial IoT is also becoming a more interconnected environment that requires stronger and more flexible IAM oversight.

As the threats to networks, systems, and users themselves grow by leaps and bounds through the actions of more sophisticated and aggressive hackers, IAM suppliers are responding to the challenge with innovative and more integrated solutions. The public nature of the threat over the last several years is driving enterprises to the IAM market. This analysis measures the size of the IAM market in revenue as well as the market share of market leaders. It also delineates the revenue generated by different regions and by individual industry verticals. Data on the revenue generated by various business tiers from small businesses to large enterprises is also provided. The adoption of cloud services has somewhat surprisingly had the biggest impact so far on large businesses rather than the small and medium-sized businesses it was expected to attract to the IAM market. Using cloud-based solutions, large businesses are able to more easily embrace a hybrid model that better supports both on-premises and cloud environments. The growth of small and medium-sized businesses will accelerate over the next three years.

Market drivers and market restraints are identified and explained, and their impact on the growth of the market is examined. IAM is at the heart of a security solution and core robust security is a primary driver. However, the IAM market is driven by two strong and independent elements. Following security, productivity of enterprise employees is the other key driver. Enterprises do not want to inhibit access to core business systems to be the price they pay for implementing more robust security. IAM that can improve both security and productivity has strong winds behind it in terms of growing demand. Governance is also a key driver of IAM as new regulations across the globe, especially in the EU, are making it painful for companies that fall short on compliance. For these reasons, Frost & Sullivan forecasts strong double-digit growth over the course of this study. However, given the weariness that massive digital transformation has left enterprises with, IAM suppliers must be cognizant of adding to the overload and make adoption as seamless and painless as possible.

Table of Contents

1. EXECUTIVE SUMMARY

  • Executive Summary
  • Executive Summary-Market Engineering Measurements
  • Executive Summary-CEO's Perspective
  • Executive Summary-Key Questions This Study Will Answer
  • Introduction to the Research

2. MARKET OVERVIEW

  • Definitions
  • Definitions (continued)
  • Definitions (continued)
  • Definitions (continued)
  • Market Overview
  • Market Overview-Scope
  • Market Overview-Distribution Channels
  • Market Overview-Distribution Channel Discussion

3. EXTERNAL CHALLENGES-DRIVERS AND RESTRAINTS: TOTAL MARKET

  • Drivers and Restraints
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Restraints Explained
  • Restraints Explained (continued)

4. FORECASTS AND TRENDS-TOTAL MARKET

  • Forecast Assumptions
  • Market Trends and Revenue Forecast
  • Global Revenue Forecast Discussion

5. FORECASTS AND TRENDS-REGIONAL AND VERTICAL MARKETS

  • Identity & Access Management Revenue Forecast by Region
  • Regional Revenue Forecast Discussion
  • Identity & Access Management Revenue Forecast by Vertical Market
  • Vertical Market Revenue Forecast Discussion

6. MARKET SHARE AND COMPETITIVE ANALYSIS- TOTAL MARKET

  • Market Share and Competitive Analysis
  • Competitive Factors and Assessment
  • Competitive Environment

7. MARKET SEGMENTATION BY SIZE OF BUSINESS

  • Identity and Access Revenue Forecast Business Tiers
  • Enterprise and Large Enterprise Segment Key Findings
  • Enterprise and Large Enterprise Discussion
  • Large Business Segment Key Findings
  • Large Business Discussion
  • Midsized Business Segment Key Findings
  • Midsized Business Discussion
  • Small/ROBO Segment Key Findings
  • Small/ROBO Business Discussion

8. THE LAST WORD

  • The Last Word-Predictions
  • The Last Word-Recommendations
  • Legal Disclaimer

9. VENDOR PROFILES

  • Vendor Profile-Auth0
  • Vendor Profile-Auth0 (continued)
  • Vendor Profile-Auth0 (continued)
  • Vendor Profile-Beta Systems
  • Vendor Profile-Beta Systems (continued)
  • Vendor Profile-Beta Systems (continued)
  • Vendor Profile-Gemalto
  • Vendor Profile-Gemalto (continued)
  • Vendor Profile-Gemalto (continued)
  • Vendor Profile-Hitachi ID
  • Vendor Profile-Hitachi ID (continued)
  • Vendor Profile-Hitachi ID (continued)
  • Vendor Profile-IBM Security
  • Vendor Profile-IBM Security (continued)
  • Vendor Profile-IBM Security (continued)
  • Vendor Profile-Idaptive
  • Vendor Profile-Idaptive (continued)
  • Vendor Profile-Idaptive (continued)
  • Vendor Profile-Identity Automation
  • Vendor Profile-Identity Automation (continued)
  • Vendor Profile-Identity Automation (continued)
  • Vendor Profile-Microsoft
  • Vendor Profile-Microsoft (continued)
  • Vendor Profile-Microsoft (continued)
  • Vendor Profile-Okta
  • Vendor Profile-Okta (continued)
  • Vendor Profile-Okta (continued)
  • Vendor Profile-One Identity
  • Vendor Profile-One Identity (continued)
  • Vendor Profile-One Identity (continued)

10. APPENDIX

  • Market Engineering Methodology
  • Partial List of Companies Interviewed
  • List of Companies Included in “Others”
  • List of Exhibits
Back to Top