5347 篇
13897 篇
477387 篇
16218 篇
11751 篇
3898 篇
6510 篇
1243 篇
75477 篇
37463 篇
12122 篇
1645 篇
2846 篇
3402 篇
641 篇
1237 篇
1968 篇
4899 篇
3853 篇
5414 篇
全球身份和访问管理报告(2016-2020年)
Global Identity and Access Management Market 2016-2020
IAM is a security solution that confirms the accessibility of authorized resources in an IT system. In the mid-1990s, organizations struggled to meet the compliance demands because it was expensive. However, organizations have understood the compliance requirements and are focusing on comply with the set regulations. The key driver for the growth of IAM is the initiatives such as enforcement of logical access controls and entitlement management. Organizations are realizing the benefits of IAM and are compelled to transform IAM from a compliance-based program into a real business enabler, which is a capability maturity model that reduces risks and supports relevant IT trends.
PART 01: Executive summary
Highlights
PART 02: Scope of the report
PART 03: Market research methodology
Research methodology
Economic indicators
PART 04: Introduction
Key market highlights
PART 05: Market description
Advantages of IAM solutions
Components of IAM
On-premises and cloud-based IAM deployment
models
PART 06: Market landscape
Market overview
PART 07: Market segmentation by deployment model
Global IAM market by deployment model
PART 08: Market segmentation by end-user
Market overview
Market size and forecast
PART 09: Geographical segmentation
Global IAM market by geography
Global IAM market by geography ($ billions)
PART 10: Market drivers
Increased demand of IAM from BFSI sector
Need to improve operational efficiency
Growing need to enhance mobile security
Adoption of cloud-based applications
PART 11: Impact of drivers
PART 12: Market challenges
High cost of implementation
Threat from open-source IAM solutions
Complexity of network infrastructure
PART 13: Impact of drivers and challenges
PART 14: Market trends
Increased in demand of SaaS IAM from SMEs
Emergence of IDaaS
Integration of IAM with other security components
PART 15: Buying criteria
Buying criteria for IAM
PART 16: Five force model
Five forces analysis
PART 17: Vendor landscape
Vendor competitive scenario
PART 18: Key vendor profiles
Top-vendor offerings
Vendor profiles
Vendor highlights
PART 19: Appendix
List of abbreviations
PART 20: Explore Technavio