5347 篇
13897 篇
477387 篇
16218 篇
11751 篇
3898 篇
6510 篇
1243 篇
75477 篇
37463 篇
12122 篇
1645 篇
2846 篇
3402 篇
641 篇
1237 篇
1968 篇
4899 篇
3853 篇
5414 篇
全球移动身份管理市场报告(2016-2020年)
Global Mobile Identity Management Market 2016-2020
Mobile identity management plays a vital role in identity and access management technology. Mobile identity management is used to identify, access and pay for online services like banking. However, with the increasing variety of digital content that can be accessed through mobile devices, the regulatory bodies are facing challenges in developing privacy safeguards that will encourage the development
of new applications.The National Strategy for Trusted Identities in Cyberspace in the US and the Identity Assurance Programme in the UK are a few initiatives rolled out by the respective countries to define digital identity. This will play a key role in enhancing trust among the users to exchange information related to digital identity management.
PART 01: Executive summary 5
Key findings 5
PART 02: Scope of the report 7
Top-vendor offerings 8
PART 03: Market research methodology 10
Research methodology 10
Economic indicators 10
PART 04: Introduction 11
Key market highlights 11
PART 05: Market overview 13
Technologies for mobile security 13
Threats to mobile identity management 14
Evolution of mobile identity management 15
Mobile environments 15
PART 06: Recent developments 17
Electronic identification, signature, and trust services 17
PART 07: Cyberattacks: mobile security 18
PART 08: Market size and forecast 19
Global mobile identity management market 19
PART 09: Geographical segmentation 21
Geographical segmentation 21
Mobile identity management market in Americas 22
Mobile identity management market in Europe 26
Mobile identity management market in APAC 27
Mobile identity management in MEA 28
PART 10: Market drivers 30
Increased access to high-speed internet with 3G and 4G
networks 30
Growing popularity of mobile applications 31
Rise in number of online transactions 33
Privacy concerns of mobile users 33
PART 11: Impact of drivers 35
PART 12: Market challenges 36
Inferior telecom infrastructure in developing countries 36
Misuse of advanced technologies by hackers 36
Difficulty in formulating common regulatory framework 37
PART 13: Impact of drivers and challenges 38
PART 14: Market trends 39
Emergence of NFC-based payments 39
Rising adoption of multi-factor authentication 39
PART 15: Impact of trends 41
Impact of trends 41
PART 16: Market attractiveness 42
Market attractiveness by geography 42
PART 17: Buying criteria 44
Buying criteria 44
PART 18: Five forces analysis 46
PART 19: Vendor landscape 47
Competitive landscape 47
Other prominent vendors 49
PART 20: Key vendor profiles 51
CA Technologies 51
Centrify 51
Gemalto 52
Oracle 53
Assumptions 54
PART 21: Appendix 57
List of abbreviations 57
PART 22: Explore Technavio 58