表紙
市場調査レポート

モバイルユーザー認証の世界市場予測・分析 2020年

Mobile User Authentication Market by User Type (Small and Medium Enterprises (SME's) and Enterprises), Vertical, and Region (North America, Europe, Asia-Pacific, Middle East and Africa, and Latin America) - Global Forecast and Analysis to 2020

発行 MarketsandMarkets 商品コード 342075
出版日 ページ情報 英文 114 Pages
即納可能
価格
本日の銀行送金レート: 1USD=102.06円で換算しております。
Back to Top
モバイルユーザー認証の世界市場予測・分析 2020年 Mobile User Authentication Market by User Type (Small and Medium Enterprises (SME's) and Enterprises), Vertical, and Region (North America, Europe, Asia-Pacific, Middle East and Africa, and Latin America) - Global Forecast and Analysis to 2020
出版日: 2015年10月13日 ページ情報: 英文 114 Pages
概要

エンドユーザーはセキュリティ側面について強く意識するようになっており、またソフトウェアプロバイダーの多くはサービス内容合意書 (SLA) にセキュリティを含めています。しかし、強力な認証のニーズを後押ししているのは、企業に対するサイバー攻撃の頻度の増加以上に、インサイダーによるデータ盗難と内部告発です。

当レポートでは、世界のモバイルユーザー認証市場を取り上げ、市場の概要、市場発展促進・阻害要因を概括し、ユーザータイプ別・垂直産業別・地域別に市場の現状と見通しについて調査分析するとともに、競合環境、主要企業のプロファイルをまとめています。

第1章 イントロダクション

第2章 調査手法

第3章 エグゼクティブサマリー

第4章 重要考察

  • モバイルユーザー認証市場における魅力的な市場機会
  • モバイルユーザー認証市場
  • モバイルユーザー認証市場の可能性
  • モバイルユーザー認証の地域市場
  • モバイルユーザー認証市場:垂直成長マトリクス
  • ライフサイクル分析:地域別

第5章 市場概要

  • イントロダクション
    • ユーザータイプ
    • 垂直産業
    • 地域
  • 市場ダイナミクス
    • 促進因子
    • 阻害因子
    • 機会
    • 課題

第6章 産業動向

  • イントロダクション
  • バリューチェーン分析
  • ポーターのファイブフォース分析

第7章 モバイルユーザー認証市場の分析

  • イントロダクション

第8章 モバイルユーザー認証市場の分析:ユーザータイプ別

  • イントロダクション
  • SME (中小企業)
  • 大企業

第9章 モバイルユーザー認証市場の分析:垂直産業別

  • イントロダクション
  • 大学・教育
  • 銀行、金融サービスおよび保険 (BFSI)
  • 消費財・小売り
  • エネルギー・発電
  • 政府・防衛
  • ライフサイエンス・医療
  • IT・通信
  • 製造
  • その他

第10章 地域分析

  • イントロダクション
  • 北米
  • 欧州
  • アジア太平洋
  • 中東・アフリカ
  • ラテンアメリカ

第11章 競合情勢

  • 概要
  • 競合状況・動向

第12章 企業プロファイル (概要、財務、製品 & サービスおよび発展動向)

  • イントロダクション
  • CA TECHNOLOGIES INC.
  • EMC CORPORATION
  • GEMALTO NV
  • SYMANTEC CORPORATION
  • VASCO DATA SECURITY INTERNATIONAL INC.
  • AUTHENTIFY INC.
  • ENTRUST DATACARD CORPORATION
  • SECUREAUTH CORPORATION
  • SECURENVOY PLC
  • TELESIGN

第13章 主要イノベーターのプロファイル

  • DEEPNET SECURITY
    • 事業概要
    • 提供ソリューション
  • SMS PASSCODE A/S

第14章 付録

図表リスト

目次
Product Code: TC 3813

Today, most of enterprises are vying to effectively address the security and the authentication concerns attributed to verify the end-users and legitimize his/her actions. The end-users are becoming highly aware of the security aspect and most of the software providers are incorporating security into their service level agreements. But major boost to the need of strong authentication is attributed to increase in insider data thefts and whistle-blowing as well increased frequency of cyber-attacks on enterprises. It has been observed that most of the attacks on large enterprises have been state-sponsored and are committed to derail the business processes of the enterprises to ultimately cause monetary damage.

Most of enterprises consist of voluminous amount of sensitive organizational data which is being generated on a daily basis. This data may vary from spreadsheets to huge databases and can be highly unstructured. There need to be pre-defined security and access policies to this data to ensure that who access what type of data. At the same time, there an urgent need in managing, protecting and revoking credentials of a private individual. Also, the growth of mobile user authentication is due to the increased need in verifying and validating the end-user based on its behavioral characteristics. The behavioral characteristics such as time of login, pattern of login, geographical co-ordinates and timestamps are being used more frequently to deliver robust authentication solutions. The mobile user authentication market can be defined as the market for the authenticating an end-user using factored authentication in which one of the authentication factor is mobile which is in the possession of the end-user. Mobile user authentication not only provides secured access to the sensitive content but it is also instrumental in framing and enforcing different security and access control policies in any organization. Mobile user authentication is crucial in providing a unified view about enterprise wide-security and introduces greater visibility and transparency in business processes of an organization.

The mobile user authentication market has been segmented on the basis of user types into Small and Medium Enterprises (SMEs) and enterprises; on the basis of verticals types into academia & education, Banking, Financial Services, and Insurance (BFSI), consumer goods & retail, energy & power, government & defense, life sciences & healthcare, manufacturing, IT & telecom, and others; and on the basis of regions into North America, Asia-Pacific (APAC), Europe, the Middle East and Africa (MEA), and Latin America. The report also provides insights into the opportunity analysis of specific verticals and business case analysis and roadmaps for the mobile user authentication market.

There are various assumptions that have been taken into consideration for the market sizing and forecasting exercise. Few global assumptions include political, economic, social, technological, and economic factors. For instance, exchange rates, one of the economic factors, are expected to have a moderate rating of impact on this market. Therefore, dollar fluctuations are expected to not seriously affect the forecasts in the emerging regions.

The report will help the market leaders/new entrants in this market in the following ways:

  • 1. This report segments the market into user types, verticals, and regions covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market. The market numbers are further split across the different verticals and regions.
  • 2. This report will help them better understand the competitors and gain more insights to better position their business. There is a separate section on competitive landscape, including competitor ecosystem, mergers and acquisition, and partnerships and agreements. Besides, there are company profiles of top 10 players in this market along with two key innovators.
  • 3. The report helps them understand the pulse of the market. The report provides information on key market drivers, restraints, challenges, and opportunities.

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. OBJECTIVES OF THE STUDY
  • 1.2. MARKET DEFINITION
  • 1.3. MARKET SCOPE
    • 1.3.1. MARKETS COVERED
    • 1.3.2. YEARS CONSIDERED FOR THE STUDY
  • 1.4. LIMITATIONS
  • 1.5. CURRENCY
  • 1.6. STAKEHOLDERS

2. RESEARCH METHODOLOGY

  • 2.1. RESEARCH DATA
    • 2.1.1. SECONDARY DATA
      • 2.1.1.1. Key data from secondary sources
    • 2.1.2. PRIMARY DATA
      • 2.1.2.1. Key data from primary sources
      • 2.1.2.2. Key industry insights
      • 2.1.2.3. Breakdown of primary interviews: by company type, designation, and region
  • 2.2. MARKET SIZE ESTIMATION
    • 2.2.1. BOTTOM-UP APPROACH
    • 2.2.2. TOP-DOWN APPROACH
  • 2.3. MARKET BREAKDOWN AND DATA TRIANGULATION
  • 2.4. RESEARCH ASSUMPTIONS

3. EXECUTIVE SUMMARY

4. PREMIUM INSIGHTS

  • 4.1. ATTRACTIVE MARKET OPPORTUNITIES IN THE MOBILE USER AUTHENTICATION MARKET
  • 4.2. MOBILE USER AUTHENTICATION MARKET
  • 4.3. MOBILE USER AUTHENTICATION MARKET POTENTIAL
  • 4.4. MOBILE USER AUTHENTICATION REGIONAL MARKET
  • 4.5. MOBILE USER AUTHENTICATION MARKET: VERTICAL GROWTH MATRIX
  • 4.6. LIFECYCLE ANALYSIS, BY REGION, 2015

5. MARKET OVERVIEW

  • 5.1. INTRODUCTION
    • 5.1.1. BY USER TYPE
    • 5.1.2. BY VERTICAL
    • 5.1.3. BY REGION
  • 5.2. MARKET DYNAMICS
    • 5.2.1. DRIVERS
      • 5.2.1.1. Growth of online data sharing and BYOD
      • 5.2.1.2. Growth in high profile cyber attacks
      • 5.2.1.3. Increase in regulatory compliances
      • 5.2.1.4. Increased traction for vulnerability assessment and management
    • 5.2.2. RESTRAINTS
      • 5.2.2.1. Existing base of authentication solutions
      • 5.2.2.2. Shadow IT risk
    • 5.2.3. OPPORTUNITIES
      • 5.2.3.1. Growing impetus to Internet of Things (IoT)
      • 5.2.3.2. Demand for Authentication-as-a-Service (AaaS)
    • 5.2.4. CHALLENGES
      • 5.2.4.1. Educating consumers about security and authentication
      • 5.2.4.2. Security issues associated with cloud and mobile technologies

6. INDUSTRY TRENDS

  • 6.1. INTRODUCTION
  • 6.2. MOBILE USER AUTHENTICATION MARKET: VALUE CHAIN ANALYSIS
  • 6.3. PORTER'S FIVE FORCES ANALYSIS
    • 6.3.1. THREAT OF NEW ENTRANTS
    • 6.3.2. THREAT OF SUBSTITUTES
    • 6.3.3. BARGAINING POWER OF SUPPLIERS
    • 6.3.4. BARGAINING POWER OF BUYERS
    • 6.3.5. INTENSITY OF COMPETITIVE RIVALRY

7. MOBILE USER AUTHENTICATION MARKET ANALYSIS

  • 7.1. INTRODUCTION

8. MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY USER TYPE

  • 8.1. INTRODUCTION
  • 8.2. SMES
  • 8.3. ENTERPRISES

9. MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY VERTICAL

  • 9.1. INTRODUCTION
  • 9.2. ACADEMIA AND EDUCATION
  • 9.3. BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI)
  • 9.4. CONSUMER GOODS AND RETAIL
  • 9.5. ENERGY AND POWER
  • 9.6. GOVERNMENT AND DEFENSE
  • 9.7. LIFE SCIENCES AND HEALTHCARE
  • 9.8. IT AND TELECOM
  • 9.9. MANUFACTURING
  • 9.10. OTHERS

10. GEOGRAPHIC ANALYSIS

  • 10.1. INTRODUCTION
  • 10.2. NORTH AMERICA
  • 10.3. EUROPE
  • 10.4. ASIA-PACIFIC
  • 10.5. MIDDLE EAST AND AFRICA
  • 10.6. LATIN AMERICA

11. COMPETITIVE LANDSCAPE

  • 11.1. OVERVIEW
  • 11.2. COMPETITIVE SITUATION AND TRENDS
    • 11.2.1. NEW PRODUCT DEVELOPMENTS
    • 11.2.2. PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS
    • 11.2.3. MERGERS AND ACQUISITIONS
    • 11.2.4. NEW CONTRACTS
    • 11.2.5. DELIVERY MODELS

12. COMPANY PROFILES (Overview, Financials, Products & Services, Strategy, and Developments)*

  • 12.1. INTRODUCTION
  • 12.2. CA TECHNOLOGIES INC.
  • 12.3. EMC CORPORATION
  • 12.4. GEMALTO NV
  • 12.5. SYMANTEC CORPORATION
  • 12.6. VASCO DATA SECURITY INTERNATIONAL INC.
  • 12.7. AUTHENTIFY INC.
  • 12.8. ENTRUST DATACARD CORPORATION
  • 12.9. SECUREAUTH CORPORATION
  • 12.10. SECURENVOY PLC
  • 12.11. TELESIGN

*Details on overview, financials, product & services, strategy, and developments might not be captured in case of unlisted companies.

13. KEY INNOVATOR PROFILES

  • 13.1. DEEPNET SECURITY
    • 13.1.1. BUSINESS OVERVIEW
    • 13.1.2. SOLUTIONS OFFERED
  • 13.2. SMS PASSCODE A/S
    • 13.2.1. BUSINESS OVERVIEW
    • 13.2.2. SOLUTIONS OFFERED

14. APPENDIX

  • 14.1. INDUSTRY EXCERPTS
    • 14.1.1. NEW PRODUCT DEVELOPMENTS, 2013-2015
    • 14.1.2. PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS
    • 14.1.3. NEW CONTRACTS
  • 14.2. DISCUSSION GUIDE
  • 14.3. INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
  • 14.4. AVAILABLE CUSTOMIZATIONS
  • 14.5. RELATED REPORTS

LIST OF TABLES

  • TABLE 1: MOBILE USER AUTHENTICATION MARKET SIZE AND GROWTH RATE, 2013-2020 (USD MILLION, Y-O-Y %)
  • TABLE 2: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF DRIVERS
  • TABLE 3: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF RESTRAINTS
  • TABLE 4: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF OPPORTUNITIES
  • TABLE 5: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF CHALLENGES
  • TABLE 6: MOBILE USER AUTHENTICATION MARKET SIZE, 2013-2020 (USD MILLION)
  • TABLE 7: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 8: SMES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 9: ENTERPRISES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 10: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 11: ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 12: ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 13: BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 14: BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 15: CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 16: CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 17: ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 18: ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 19: GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 20: GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 21: LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 22: LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 23: IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 24: IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 25: MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 26: MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 27: OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 28: OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 29: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 30: NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 31: NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 32: EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 33: EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 34: ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 35: ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 36: MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 37: MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 38: LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 39: LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 40: NEW PRODUCT DEVELOPMENTS, 2013-2015
  • TABLE 41: PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013-2015
  • TABLE 42: MERGERS AND ACQUISITIONS, 2013-2015
  • TABLE 43: NEW CONTRACTS, 2013-2015
  • TABLE 44: PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013-2015
  • TABLE 45: NEW CONTRACTS, 2013-2015

LIST OF FIGURES

  • FIGURE 1: RESEARCH DESIGN
  • FIGURE 2: MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
  • FIGURE 3: MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
  • FIGURE 4: DATA TRIANGULATION
  • FIGURE 5: MOBILE USER AUTHENTICATION MARKET SIZE, USER TYPE SNAPSHOT (2015-2020): SME MARKET IS EXPECTED TO QUADRUPLE BY 2020
  • FIGURE 6: MOBILE USER AUTHENTICATION MARKET SHARE: NORTH AMERICA IS EXPECTED TO HOLD THE LARGEST MARKET SHARE IN 2015
  • FIGURE 7: GROWTH IN ONLINE DATA SHARING AND INCREASED ADOPTION OF BYOD IS DRIVING THE MOBILE USER AUTHENTICATION MARKET
  • FIGURE 8: NORTH AMERICA IS EXPECTED TO EXHIBIT THE HIGHEST MARKET SHARE IN THE MOBILE USER AUTHENTICATION MARKET (2015)
  • FIGURE 9: ASIA-PACIFIC AND MIDDLE EAST & AFRICA ARE EXPECTED TO HAVE THE HIGHEST MARKET GROWTH POTENTIAL DURING THE FORECAST PERIOD
  • FIGURE 10: ASIA-PACIFIC IS EXPECTED TO GROW WITH HIGHER CAGR THAN MIDDLE EAST & AFRICA AND LATIN AMERICA
  • FIGURE 11: MOBILE USER AUTHENTICATION VERTICAL GROWTH MATRIX
  • FIGURE 12: REGIONAL LIFECYCLE: ASIA-PACIFIC IS IN THE GROWTH PHASE IN 2015
  • FIGURE 13: MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY USER TYPE
  • FIGURE 14: MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY VERTICAL
  • FIGURE 15: MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY REGION
  • FIGURE 16: MOBILE USER AUTHENTICATION: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES
  • FIGURE 17: VALUE CHAIN ANALYSIS
  • FIGURE 18: PORTER'S FIVE FORCES ANALYSIS: MOBILE USER AUTHENTICATION MARKET
  • FIGURE 19: SMES WILL EXHIBIT HIGHER GROWTH RATE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD
  • FIGURE 20: GOVERNMENT AND DEFENSE VERTICAL IS EXPECTED TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET BY 2020
  • FIGURE 21: NORTH AMERICA WILL CONTINUE TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD 2015-2020
  • FIGURE 22: GEOGRAPHIC SNAPSHOT: ASIA-PACIFIC IS EMERGING AS A NEW HOTSPOT IN THE MOBILE USER AUTHENTICATION MARKET
  • FIGURE 23: ASIA-PACIFIC IS THE FASTEST GROWING MARKET IN THE MOBILE USER AUTHENTICATION MARKET
  • FIGURE 24: NORTH AMERICA MARKET SNAPSHOT: INCREASED TRACTION AMONG VERTICALS WILL DRIVE THE MARKET
  • FIGURE 25: ASIA-PACIFIC MARKET SNAPSHOT: INCREASED TRACTION AMONG GROWING ECONOMIES WILL DRIVE THE MARKET
  • FIGURE 26: COMPANIES ADOPTED, ACQUISITIONS, NEW PRODUCT DEVELOPMENTS, AND PARTNERSHIP AGREEMENTS AND COLLABORATIONS AS THE KEY GROWTH STRATEGIES FOR THE -PERIOD 2013-2015
  • FIGURE 27: MARKET EVALUATION FRAMEWORK
  • FIGURE 28: BATTLE FOR MARKET SHARE: NEW PRODUCT LAUNCHES WAS THE KEY STRATEGY ADOPTED BY PLAYERS DURING THE LAST 3 YEARS
  • FIGURE 29: GEOGRAPHIC REVENUE MIX OF TOP FIVE PLAYERS
  • FIGURE 30: CA TECHNOLOGIES INC.: COMPANY SNAPSHOT
  • FIGURE 31: CA TECHNOLOGIES INC.: SWOT ANALYSIS
  • FIGURE 32: EMC CORPORATION: COMPANY SNAPSHOT
  • FIGURE 33: EMC CORPORATION: SWOT ANALYSIS
  • FIGURE 34: GEMALTO NV: COMPANY SNAPSHOT
  • FIGURE 35: GEMALTO NV: SWOT ANALYSIS
  • FIGURE 36: SYMANTEC CORPORATION: COMPANY SNAPSHOT
  • FIGURE 37: SYMANTEC CORPORATION: SWOT ANALYSIS
  • FIGURE 38: VASCO DATA SECURITY INTERNATIONAL INC.: COMPANY SNAPSHOT
  • FIGURE 39: VASCO DATA SECURITY INTERNATIONAL, INC: SWOT ANALYSIS
Back to Top