identity access management (iam) - apac market report sample

17
IAM Market - Outlook (2014-18) for APAC [email protected] +1-408-469-4380 +91-80-6134-1500 www.researchfox.com 1

Upload: researchfox

Post on 23-Jul-2015

46 views

Category:

Technology


2 download

TRANSCRIPT

IAM Market - Outlook (2014-18) for APAC

[email protected]+1-408-469-4380

+91-80-6134-1500www.researchfox.com

 1

ResearchFox Consulting is an Indian market research and consulting firm based in Bangalore. We strive to provide our clients with research data and reports which they can trust and analyze. Insights gleaned from our detailed and comprehensive research reports helps our clients stay ahead of trends. ResearchFox serves clients with services from data collection to analysis and reports. ResearchFox has extensive sector expertise and its consultants are abreast of global trends and issues across industries. Our areas of expertise include Manufacturing, IT, FMCG, Healthcare, Automotive, Government Sector and NGO, BFSI and Retail.

Disclaimer :This report is furnished to the recipient for information purposes only. Each recipient should conduct their own investigation and analysis of any such information contained in this report. No recipient is entitled to rely on the work of ResearchFox Consulting Pvt.Ltd. contained in this report for any purpose. ResearchFox Consulting Pvt. Ltd. makes no representations or warranties regarding the accuracy or completeness of such information and expressly disclaims any and all liabilities based on such information or on omissions therefrom. The recipient must not reproduce, disclose or distribute the information contained herein without the express prior written consent of ResearchFox Consulting Pvt.Ltd.

Copyright © 2015. ResearchFox Consulting Private Limited

 2

Tableof Contents

1. Introduction1.1. Report Description1.2. Objective1.3. Scope of the Research1.4. Regions Covered1.5. Key Takeaways1.6. Key Stakeholders1.7. Key Terminologies1.8. List of Abbreviations

2. Executive Summary2.1. Executive Overview

3. Research and Forecasting3.1. Research Methodology3.2. Forecasting Methodology

4. Industry Landscape4.1. Market Size and Growth4.2. Competitive Landscape4.3. Market Share4.4. Company Classification4.5. Region Outlook4.6. Market Metrics4.7. Porter's Five Forces Model4.8. Key Drivers Analysis4.9. Key Constraints Analysis4.10. Key Opportunities Identified4.11. Key Challenges Identified

5. Market Segmentation5.1. Region    5.1.1. APAC

    5.1.1.1.   Market Size and Forecasting    5.1.1.2.  Key Drivers Analysis    5.1.1.3.  Key Constraints Analysis    5.1.1.4.  Key Opportunities Identified    5.1.1.5.  Key Challenges Identified

 3

dfgfd dfgfdh dfgfh dfhgf

Introduction 01 4

1.  Introduction

1.1.  Report Description

IAM has been widely accepted nowadays across verticals as most of the technologies (Hardware and software) are running different operating systems and applications. Moreover, these applications are hosted by a 3rd party remote vendor and are accessed remotely. Also with the rise in cyber attacks and security breach most of the administrations and IT departments are working in a synchronized way across different organizations. Hence IAM providers need to provide solutions with the right mix of compatibility, accessibility and limited cost.

1.2.  Objective

1. To understand the IAM market across the globe by addressing the challenges faced by the industry with regards to the adoption of IAM.2. To estimate the size of present global IAM market and its forecast.

1.3.  Scope of the Research

The report is focused on understanding the priority of IAM in organizations and entire lifecycle of digital identity and access policies like authentication, authorization and audit. Furthermore, it will also highlight whether relying on basic IAM policies is beneficial for businesses or there is a need to develop a proactive strategy which will be intelligent, innovative and flexible.

This report will enable market leaders and new establishments to know overall market and the sub-segments. It will also help them better understand the competitor and gain more insights to better position their business.

The Identity and Access Management (IAM) market research report will showcase the pulse of the market. From this report, information on key market drivers, restraints, challenges, and opportunities can be obtained.

1.4.  Regions Covered

1. Americas 2. Europe 3. APAC 4. MEA

 5

1.5.  Key Takeaways

1. IAM market is driven due to the demand for operational efficiency and enhanced security2. Americas is the biggest market for IAM, Europe is emerging market.3. Cloud IAM is expected to grow high in future4. Adoption of IAM is increasing in Healthcare, Manufacturing and IT services and support Verticals.5. SSO and Password Management is expected to grow more.

1.6.  Key Stakeholders

1. IT Organizations2. Cloud security service providers3. IAM service providers4. SAAS service providers5. Mobile security service providers

 6

1.7.  Key Terminologies

1. Americas:Mainly includes USA, Canada, Mexico, Argentina, Brazil and other North, Latin and South American Countries 2. APAC: Mainly includes Russia, Australia, India, China, Japan, Singapore and other nations in the region3. Europe:Mainly includes United Kingdom, France, Germany, Spain and other European nations4. MEA:Mainly includes Israel, South Africa, UAE and other nations5. On-premise Software:Software that is installed and run on computers on the premises of the user (individual or organization) rather than from any remote locality.6. Hybrid Software:An integration of cloud and on-premise deployment models to deliver software services to users with the ability to switch from one to the other as needed.7. SSO:Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications8. IDaaS:Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.

 7

1.8.  List of Abbreviations

1. IAM: Identity and Access Management2. SaaS: Software -as -a-Service3. FMCG: Fast-Moving Consumer Goods 4. MEA: Middle East & Africa5. CAGR: Compound Annual Growth Rate6. SSO: Single Sign On7. URL: Uniform Resource Locator8. R&D: Research & Development9. BYOD: Bring Your Own Device10. IDaaS: Identity-as-a-Service11. SME: Small and Medium-sized Enterprises12. IAMaaS: Identity and Access Management-as-a-Service13. E-SSO: Enterprises Single Sign On14. OTP: One-time Password15. NA: North America16. LA: Latin America17. APAC: Asia Pacific18. BFSI: Banking, Financial services and Institutions19. EU: European Union20. ICT: Information and Communications Technology21. IT: Information Technology22. CFO: Chief Financial Officer

 8

dfgfd dfgfdh dfgfh dfhgf

Executive Summary 02 9

2.  Executive Summary

2.1.  Executive Overview

IAM is the field of determining policies for who has access rights to information assets in an organization. The issuing of these rights will provide restricted access to select individuals. It is at the core of information protection, and of compliance programs with all ordinances that control access to information.

IAM processes are used to initiate, capture, record and manage the user identities along with associated access permissions to the organization's proprietary information. These users may extend beyond corporate employees. For instance, users could include vendors, customers, floor automated machines, generic administrator accounts and electronic physical access badges. The means used by a governing body to facilitate the administration of user accounts and to implement proper controls around data security forms the foundation of IAM. Although many executives view IAM as information technology (IT) function, this process affects every business unit throughout the establishment. For example, executives need to feel comfortable that a procedure exists for handling access to company resources and that the perils inherent in the process have been accosted for. Business units need to know what IAM is and how to manage it effectively. IT departments need to understand how IAM can support business processes and provide sound results that adapt to corporate objectives without endangering the company to undue risks.

IAM projects in organizations are mainly the integration projects. Major tasks involve configuring the system to reflect the business, and also integrating the components of the system with the infrastructure of the organization. The major element in selecting an IAM suite is its fit with the existing technology in the organization.

Identity administration tasks are complex, particularly when the authorization requires the participation of multiple asset owners. IAM tools generally offer a workflow-based configurable process model. It is advantageous if this workflow engine is open and allows the integration of IAM processes with wider management processes, so that provisioning can be seamlessly and automatically incorporated into other management activities.

Every large and medium enterprise needs an IAM system to increase its operational efficiency to improve its security and compliance needs. IAM projects showcase business process automation. A need to be approached from a business perspective post IAM deployments is a necessity. Most of the major vendors provide a comprehensive coverage of the solution space. However, some are easier to employ and to integrate with existing infrastructure. An IAM project is all about integration with the IT infrastructure and with business processes.

Adaptability of IAM in Americas is high because of the presence of large enterprises, the growing occurrence of cyber-attacks, and the increasing number of hosted servers.

By components, Single Sign On and password management are most used components in the organizations to manage passwords and authentications of the user.

Cloud based IAM is fast gaining recognition as more and more companies are adopting this because Cloud IAM is the solution that provides IAM as a pay-as-you-go model which requires minimal initial investments

 10

and is maintained by third party service providers. Global IAM market is estimated to be USD 5130 million market in 2013 and is expected to reach USD 12211.3 million in 2018 at a CAGR of 18.9% till 2018.

 11

dfgfd dfgfdh dfgfh dfhgf

Research and Forecasting 03 12

3.1.  Research Methodology

Base Year: 2013Forecasting Period: 2014 - 2018

3.1.1.  Sampling

The leading suppliers of each end-user product categories that were chosen to provide a larger representative sample.

Purposive unit sampling was adopted for every service segment such as verticals, regions, end-users and others. This was resorted to, in order to elicit the appropriate inputs with regard to the qualitative growth aspects of the market.

3.1.2.  Secondary Research

The research methodology that was carried out was desk research through various journals, association reports, and in house database to build a knowledge base on various market service segments, product categories and industry trends.

Various fact based data was analyzed. Some of the sources included:

a. ResearchFox Knowledge Base:

Previous data on the market has been put through a rigorous and comprehensive analysis to analyze the current state.

b. Desk Research:

Industry reports, annual reports, press releases, webinars, journals and publication, independent rating agencies and government statistics.

3.1.3.  Primary Research

Primary interviews were conducted among various stakeholders:

Product and service companiesMembers of associations and alliancesSubject Matter Experts and EvangelistsConsultants and Strategists

 13

3.1.4.  Industry Information

It was essential to understand the current industry landscape, market dynamics, security ecosystem and competitor metrics. To estimate the global market, Chief Experience Officers (CXOs), Marketing Heads, Sales Managers and product stakeholders were interviewed.

3.1.5.  Technical Information

In addition to the interviews with leading participants for industry-related information, ResearchFox conducted interviews with Research and Development (R&D) and Design and Development teams to understand the current usage of the products by service type and also to find out the emerging trends. Finally, interviews with suppliers were conducted to cross check the validity of information and also to understand the emerging trends in the end-user segment. The detailed methodology for primary research is outlined below.

3.1.6.  Primary Interview Questionnaire Design

ResearchFox developed a detailed questionnaire, which was used by the analysts as a guide for their discussions. This process ensured the collection of all necessary data. The questionnaire was designed to elicit unbiased industry level data (market size, production, sales, and others), that had check points (questions such as company level information and their position in the industry acted as check points) to ensure accuracy of the data. The questionnaire included the following sections:

1. Industry level information2. Characteristics and Dynamics3. Company-specific information4. Market segmentation data

3.1.7.  Interview Questionnaire Test and Validation

Following the design of the questionnaire, ResearchFox carried out some initial interviews to verify that the appropriate market and technology data was generated. After the final design of the questionnaire, ResearchFox began full scale primary research. Specific companies targeted for primary research interviews were selected based upon market participation. Higher was the entity's profile, more attractive was the entity.

 14

3.1.8.  Interview Process

As participants respond in the course of an interview, ResearchFox analysts are trained to move from lower priority and/ or sensitive topics to increasingly key and/or sensitive topics in response to the interviewee's behavior. This responsive and reflective interview process, combined with the analysts' ability to discuss the industry and technical issues in an open and sharing environment, allows ResearchFox to probe for key data, operations, and competitive information. Multiple contacts within a single organization and with an individual are often planned and/or staged in order to optimize and complete the information gathering process.

3.1.9.  Research Validation

At a point, when 20 percent of the research interviews and/or data collection had been completed, ResearchFox consultants evaluated the preliminary findings to assure that up-to-date results are in line with project objectives. The analyst team analyzed the information from the interviews and information was validated through a combination of the following validation techniques:

Cross checking with other primary data and previously developed in-house researchReview of secondary information, such as trade journals, annual reports and industry directories

 15

3.2.  Forecasting Methodology

3.2.1.  Step-by-Step Methodology for Market Estimation and Forecasting

Market Estimation and Forecast Methodology, 2014

Step Method

1Understand the market mechanism for the market through structured, systematic and theoretically established norms of analyzing, designing, introducing and quality assurance of the market estimation

2 Measuring the various market drivers, constraints, opportunities and challenges at regular intervals of time

3 Integrate expert-opinion of discussions in consultation with the ResearchFox Analyst team

4 Market estimation and forecast calculation

5 Delphi method and Causal Analysis used as and when required

6Rigorous quality check with heads of Research Team, Subject Matter Experts and Consultants before final publication

Source: ResearchFox

Significance and Importance of the Market Forecast, 2014

Sr. No. Significance and Importance

1 Helps revisit on the company's R&D investments

2 Keeps the Sales and Marketing team posted on the market prospects

3 Strategize investment and expansion plans

4 Improve business planning

5 Helps create business aims and set sales figures within the company

6 Aware of the current market competition

7 Support plans for Merger and Acquisition (M&A)

Source: ResearchFox

 16

About ResearchFoxWHAT WE STAND FOR

We strive towards helping our customers take informed decisions by providing different perspectives for business. We don't believe in flashing LOGOs but are proud to mention that we have been helping all sizes of businesses since our inception. We are glad to have contributed in our own little way towards making a business successful. Whether you are a start-up or a large enterprise, we assure equal treatment to all, after all "Customer is King"!

THE TEAM

We are a bunch of 25 people with handful of grey hair between us. Our humble experience of around 75 man years in market research and business consulting has led us to believe that this industry is ripe for disruption. With the advent of enterprise consumerization and rapid digitization across industries, days are numbered for traditional business models of market research and consulting services. We make all efforts to bring different (fresh) perspectives to Market, Competition, and Growth of your business.

Contact Us:

Suggest a Report Topic: Report topics are approved based on number of users with the same suggestion and users are notified when the topic is approved.If you prefer to customize a report, or would like to get your report done exclusively in less than a months time!

Bangalore# 4 & 5, 1st & 2nd Floor,1st Cross,Krishna Reddy Colony,Domlur Layout,Bangalore 560 071,India

Phone: +91-80-61-341500Email: [email protected]

Hyderabad# 104 & 105, 1st Floor,Bhuvana Towers,CMR Building,Sarojini Devi Road,Secunderabad 500 003,India

Phone: +91-40-49-084455Email: [email protected]

Pune6th Floor Pentagon P-2,Magarpatta City,Hadapsar,Pune 411 028,India

Phone: +91-20-6500-6541Email: [email protected]

PhilippinesL29 Joy Nostalg Centre,17 ADB Avenue,Ortigas Center,Pasig City, Manila,Philippines - 1600

Email: [email protected]

The information contained here in is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation.

 42