Cover Image
Market Research Report

Global Mobile Identity Management Market 2016-2020

Published by TechNavio (Infiniti Research Ltd.) Product code 372049
Published Content info 59 Pages
Delivery time: 1-2 business days
Price
Back to Top
Global Mobile Identity Management Market 2016-2020
Published: September 16, 2016 Content info: 59 Pages
Description

About Mobile Identity Management

Mobile identity management is an approach that can address both usability and trust concerns in mobile business. It has been a fundamental service for the next-generation mobile telecommunications infrastructure. Mobile identity management is used to identify, acquire, access, and pay for services that follow the user from device to device, location to location, and context to content.

Technavio's analysts forecast the global mobile identity management market to grow at a CAGR of 9.45% during the period 2016-2020.

Covered in this report

The report covers the present scenario and the growth prospects of the global mobile identity management market for 2016-2020. To calculate the market size, the report considers paid mobile identity applications for mobile application management (MAM) and mobile device management (MDM).

The market is divided into the following segments based on geography:

  • Americas
  • APAC
  • Europe
  • MEA

Technavio's report, Global Mobile Identity Management Market 2016-2020, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Key vendors

  • CA Technologies
  • Centrify
  • Gemalto
  • Oracle

Other Prominent Vendors

  • Bitdefender
  • BullGuard
  • Cisco
  • Fortinet
  • F-Secure
  • Juniper Networks
  • NetIQ
  • Quick Heal Technologies
  • SOPHOS
  • Trend Micro
  • Telstra
  • TeleSign

Market driver

  • Growing popularity of mobile applications
  • For a full, detailed list, view our report

Market challenge

  • Misuse of advanced technologies by hackers
  • For a full, detailed list, view our report

Market trend

  • Rising adoption of multi-factor authentication
  • For a full, detailed list, view our report

Key questions answered in this report

  • What will the market size be in 2020 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

You can request one free hour of our analyst's time when you purchase this market report. Details are provided within the report.

Table of Contents
Product Code: IRTNTR10358

Table of Contents

PART 01: Executive summary

  • Key findings

PART 02: Scope of the report

  • Top-vendor offerings

PART 03: Market research methodology

  • Research methodology
  • Economic indicators

PART 04: Introduction

  • Key market highlights

PART 05: Market overview

  • Technologies for mobile security
  • Threats to mobile identity management
  • Evolution of mobile identity management
  • Mobile environments

PART 06: Recent developments

  • Electronic identification, signature, and trust services

PART 07: Cyberattacks: mobile security

PART 08: Market size and forecast

  • Global mobile identity management market

PART 09: Geographical segmentation

  • Geographical segmentation
  • Mobile identity management market in Americas
  • Mobile identity management market in Europe
  • Mobile identity management market in APAC
  • Mobile identity management in MEA

PART 10: Market drivers

  • Increased access to high-speed internet with 3G and 4G networks
  • Growing popularity of mobile applications
  • Rise in number of online transactions
  • Privacy concerns of mobile users

PART 11: Impact of drivers

PART 12: Market challenges

  • Inferior telecom infrastructure in developing countries
  • Misuse of advanced technologies by hackers
  • Difficulty in formulating common regulatory framework

PART 13: Impact of drivers and challenges

PART 14: Market trends

  • Emergence of NFC-based payments
  • Rising adoption of multi-factor authentication

PART 15: Impact of trends

  • Impact of trends

PART 16: Market attractiveness

  • Market attractiveness by geography

PART 17: Buying criteria

  • Buying criteria

PART 18: Five forces analysis

PART 19: Vendor landscape

  • Competitive landscape
  • Other prominent vendors

PART 20: Key vendor profiles

  • CA Technologies
  • Centrify
  • Gemalto
  • Oracle
  • Assumptions

PART 21: Appendix

  • List of abbreviations

PART 22: Explore Technavio

List of Exhibits

  • Exhibit 01: Overview of region-wise revenue 2015 and 2020
  • Exhibit 02: Countries considered in global mobile identity management market
  • Exhibit 03: Product offerings
  • Exhibit 04: Functions of SIM card
  • Exhibit 05: Evolution of mobile identity management
  • Exhibit 06: Global mobile identity management market 2015-2020 ($ millions)
  • Exhibit 07: Global mobile identity management market by geography 2015 (% share)
  • Exhibit 08: Global mobile identity management market by geography 2020 (% share)
  • Exhibit 09: Mobile identity management market in Americas 2015-2020 ($ millions)
  • Exhibit 10: Number of smartphone users in Brazil 2013-2016 (millions)
  • Exhibit 11: Mobile internet users with smartphones by age group in Brazil 2015
  • Exhibit 12: Number of smartphone users in Mexico 2013-2016 (millions)
  • Exhibit 13: Number of smartphone users in Colombia 2013-2016 (millions)
  • Exhibit 14: Mobile identity management market in Europe 2015-2020 ($ millions)
  • Exhibit 15: Smartphone units sold in APAC 2015 and 2016 (million units)
  • Exhibit 16: Mobile identity management market in APAC 2015-2020 ($ millions)
  • Exhibit 17: Mobile identity management market in MEA 2015-2020 ($ millions)
  • Exhibit 18: Global 3G and 4G connections 2014-2016 (millions)
  • Exhibit 19: Top mobile apps used in US 2015 (million visitors)
  • Exhibit 20: Region-wise mobile application developers in 2015 (% share)
  • Exhibit 21: Popular reasons for data breaches globally 2013-2015
  • Exhibit 22: Impact of drivers
  • Exhibit 23: Impact of drivers and challenges
  • Exhibit 24: Market attractiveness by geography 2016
  • Exhibit 25: Market attractiveness by geography 2020
  • Exhibit 26: Buying criteria of mobile security solutions
  • Exhibit 27: Five forces analysis
  • Exhibit 28: Competitive landscape
  • Exhibit 29: Vendor matrix: Mobile security solutions
  • Exhibit 30: Vendor matrix: Geographical presence
Back to Top