Request for Covid-19 Impact Assessment of this Report
Sales, means the sales volume of Two-Factor Authentication
Revenue, means the sales value of Two-Factor Authentication
This report studies Two-Factor Authentication in China market, focuses on the top players in China market, with capacity, production, price, revenue and market share for each manufacturer, covering
Entrust
Gemalto
RSA Security
SecurEnvoy
VASCO Data Security International
Authenex
Authentify
Authy
Deepnet Security
DynaPass
Fortinet
HID Global
ID Control
Meontrust
Mi-Token
PointSharp
Protectimus Solutions
SecureAuth
SecurEnvoy
SecurStar
Yubico
Market Segment by Regions (provinces), covering
South China
East China
Southwest China
Northeast China
North China
Central China
Northwest China
Split by product Type, with production, revenue, price, market share and growth rate of each type, can be divided into
Type I
Type II
Split by Application, this report focuses on consumption, market share and growth rate of Two-Factor Authentication in each application, can be divided into
BFSI
PCI
Government
Healthcare
China Two-Factor Authentication Market Research Report 2017
1 Two-Factor Authentication Market Overview
1.1 Product Overview and Scope of Two-Factor Authentication
1.2 Two-Factor Authentication Segment by Type
1.2.1 China Production Market Share of Two-Factor Authentication Type in 2015
1.2.2 Type I
1.2.3 Type II
1.3 Applications of Two-Factor Authentication
1.3.1 Two-Factor Authentication Consumption Market Share by Application in 2015
1.3.2 BFSI
1.3.3 PCI
1.3.4 Government
1.3.5 Healthcare
1.4 China Market Size (Value) of Two-Factor Authentication (2012-2022)
1.5 China Two-Factor Authentication Status and Outlook
1.6 Government Policies
2 China Two-Factor Authentication Market Competition by Manufacturers
2.1 China Two-Factor Authentication Capacity, Production and Share by Manufacturers (2015 and 2016)
2.2 China Two-Factor Authentication Revenue and Share by Manufacturers (2015 and 2016)
2.3 China Two-Factor Authentication Average Price by Manufacturers (2015 and 2016)
2.4 Manufacturers Two-Factor Authentication Manufacturing Base Distribution, Sales Area, Product Type
2.5 Two-Factor Authentication Market Competitive Situation and Trends
2.5.1 Two-Factor Authentication Market Concentration Rate
2.5.2 Two-Factor Authentication Market Share of Top 3 and Top 5 Manufacturers
3 China Two-Factor Authentication Manufacturers Profiles/Analysis
3.1 Entrust
3.1.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.1.2 Two-Factor Authentication Product Type, Application and Specification
3.1.2.1 Product A
3.1.2.2 Product B
3.1.3 Entrust Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.1.4 Main Business/Business Overview
3.2 Gemalto
3.2.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.2.2 Two-Factor Authentication Product Type, Application and Specification
3.2.2.1 Product A
3.2.2.2 Product B
3.2.3 Gemalto Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.2.4 Main Business/Business Overview
3.3 RSA Security
3.3.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.3.2 Two-Factor Authentication Product Type, Application and Specification
3.3.2.1 Product A
3.3.2.2 Product B
3.3.3 RSA Security Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.3.4 Main Business/Business Overview
3.4 SecurEnvoy
3.4.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.4.2 Two-Factor Authentication Product Type, Application and Specification
3.4.2.1 Product A
3.4.2.2 Product B
3.4.3 SecurEnvoy Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.4.4 Main Business/Business Overview
3.5 VASCO Data Security International
3.5.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.5.2 Two-Factor Authentication Product Type, Application and Specification
3.5.2.1 Product A
3.5.2.2 Product B
3.5.3 VASCO Data Security International Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.5.4 Main Business/Business Overview
3.6 Authenex
3.6.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.6.2 Two-Factor Authentication Product Type, Application and Specification
3.6.2.1 Product A
3.6.2.2 Product B
3.6.3 Authenex Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.6.4 Main Business/Business Overview
3.7 Authentify
3.7.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.7.2 Two-Factor Authentication Product Type, Application and Specification
3.7.2.1 Product A
3.7.2.2 Product B
3.7.3 Authentify Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.7.4 Main Business/Business Overview
3.8 Authy
3.8.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.8.2 Two-Factor Authentication Product Type, Application and Specification
3.8.2.1 Product A
3.8.2.2 Product B
3.8.3 Authy Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.8.4 Main Business/Business Overview
3.9 Deepnet Security
3.9.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.9.2 Two-Factor Authentication Product Type, Application and Specification
3.9.2.1 Product A
3.9.2.2 Product B
3.9.3 Deepnet Security Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.9.4 Main Business/Business Overview
3.10 DynaPass
3.10.1 Company Basic Information, Manufacturing Base, Sales Area and Its Competitors
3.10.2 Two-Factor Authentication Product Type, Application and Specification
3.10.2.1 Product A
3.10.2.2 Product B
3.10.3 DynaPass Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2015 and 2016)
3.10.4 Main Business/Business Overview
3.11 Fortinet
3.12 HID Global
3.13 ID Control
3.14 Meontrust
3.15 Mi-Token
3.16 PointSharp
3.17 Protectimus Solutions
3.18 SecureAuth
3.19 SecurEnvoy
3.20 SecurStar
3.21 Yubico
4 China Two-Factor Authentication Capacity, Production, Revenue, Consumption, Export and Import (2012-2017)
4.1 China Two-Factor Authentication Capacity, Production and Growth (2012-2017)
4.2 China Two-Factor Authentication Revenue and Growth (2012-2017)
4.3 China Two-Factor Authentication Production, Consumption, Export and Import (2012-2017)
5 China Two-Factor Authentication Production, Revenue (Value), Price Trend by Type
5.1 China Two-Factor Authentication Production and Market Share by Type (2012-2017)
5.2 China Two-Factor Authentication Revenue and Market Share by Type (2012-2017)
5.3 China Two-Factor Authentication Price by Type (2012-2017)
5.4 China Two-Factor Authentication Production Growth by Type (2012-2017)
6 China Two-Factor Authentication Market Analysis by Application
6.1 China Two-Factor Authentication Consumption and Market Share by Application (2012-2017)
6.2 China Two-Factor Authentication Consumption Growth Rate by Application (2012-2017)
6.3 Market Drivers and Opportunities
6.3.1 Potential Application
6.3.2 Emerging Markets/Countries
7 ChinaTwo-Factor Authentication Market Analysis by Regions (Provinces)
7.1 China Two-Factor Authentication Production, Production Value and Price by Regions (Provinces)(2012-2017)
7.1.1 China Two-Factor Authentication Production and Market Share by Regions (Provinces)(2012-2017)
7.1.2 China Two-Factor Authentication Production Value and Market Share by Regions (Provinces)(2012-2017)
7.1.3 China Two-Factor Authentication Sales Price by Regions (Provinces)(2012-2017)
7.2 China Two-Factor Authentication Consumption by Regions (Provinces)(2012-2017)
7.3 China Two-Factor Authentication Production, Consumption, Export and Import (2012-2017)
8 Two-Factor Authentication Manufacturing Cost Analysis
8.1 Two-Factor Authentication Key Raw Materials Analysis
8.1.1 Key Raw Materials
8.1.2 Price Trend of Key Raw Materials
8.1.3 Key Suppliers of Raw Materials
8.1.4 Market Concentration Rate of Raw Materials
8.2 Proportion of Manufacturing Cost Structure
8.2.1 Raw Materials
8.2.2 Labor Cost
8.2.3 Manufacturing Expenses
8.3 Manufacturing Process Analysis of Two-Factor Authentication
9 Industrial Chain, Sourcing Strategy and Downstream Buyers
9.1 Two-Factor Authentication Industrial Chain Analysis
9.2 Upstream Raw Materials Sourcing
9.3 Raw Materials Sources of Two-Factor Authentication Major Manufacturers in 2015
9.4 Downstream Buyers
10 Marketing Strategy Analysis, Distributors/Traders
10.1 Marketing Channel
10.1.1 Direct Marketing
10.1.2 Indirect Marketing
10.1.3 Marketing Channel Development Trend
10.2 Market Positioning
10.2.1 Pricing Strategy
10.2.2 Brand Strategy
10.2.3 Target Client
10.3 Distributors/Traders List
11 Market Effect Factors Analysis
11.1 Technology Progress/Risk
11.1.1 Substitutes Threat
11.1.2 Technology Progress in Related Industry
11.2 Consumer Needs/Customer Preference Change
11.3 Economic/Political Environmental Change
12 China Two-Factor Authentication Market Forecast (2017-2022)
12.1 China Two-Factor Authentication Capacity, Production, Revenue Forecast (2017-2022)
12.2 China Two-Factor Authentication Production, Import, Export and Consumption Forecast (2017-2022)
12.3 China Two-Factor Authentication Production Forecast by Type (2017-2022)
12.4 China Two-Factor Authentication Consumption Forecast by Application (2017-2022)
12.5 China Two-Factor Authentication Production, Consumption, Import and Export Forecast by Regions (Provinces)(2017-2022)
12.5.1 China Two-Factor Authentication Production Forecast by Regions (Provinces)(2017-2022)
12.5.2 China Two-Factor Authentication Consumption Forecast by Regions (Provinces)(2017-2022)
12.5.3 China Two-Factor Authentication Production, Consumption, Import and Export Forecast by Regions (Provinces)(2017-2022)
12.6 Two-Factor Authentication Price Forecast (2017-2022)
13 Research Findings and Conclusion
14 Appendix
Methodology
Analyst Introduction
Data Source
Figure Picture of Two-Factor Authentication
Figure China Production Market Share of Two-Factor Authentication by Type in 2015
Figure Product Picture of Type I
Table Major Manufacturers of Type I
Figure Product Picture of Type II
Table Major Manufacturers of Type II
Table Two-Factor Authentication Consumption Market Share by Application in 2015
Figure BFSI Examples
Figure PCI Examples
Figure Government Examples
Figure Healthcare Examples
Figure China Two-Factor Authentication Revenue (Million USD) and Growth Rate (2012-2022)
Table China Two-Factor Authentication Capacity of Key Manufacturers (2015 and 2016)
Table China Two-Factor Authentication Capacity Market Share of Key Manufacturers (2015 and 2016)
Figure China Two-Factor Authentication Capacity of Key Manufacturers in 2015
Figure China Two-Factor Authentication Capacity of Key Manufacturers in 2016
Table China Two-Factor Authentication Production of Key Manufacturers (2015 and 2016)
Table China Two-Factor Authentication Production Share by Manufacturers (2015 and 2016)
Figure 2015 Two-Factor Authentication Production Share by Manufacturers
Figure 2016 Two-Factor Authentication Production Share by Manufacturers
Table China Two-Factor Authentication Revenue (Million USD) by Manufacturers (2015 and 2016)
Table China Two-Factor Authentication Revenue Share by Manufacturers (2015 and 2016)
Table 2015 China Two-Factor Authentication Revenue Share by Manufacturers
Table 2016 China Two-Factor Authentication Revenue Share by Manufacturers
Table China Market Two-Factor Authentication Average Price of Key Manufacturers (2015 and 2016)
Figure China Market Two-Factor Authentication Average Price of Key Manufacturers in 2015
Table Manufacturers Two-Factor Authentication Manufacturing Base Distribution and Sales Area
Table Manufacturers Two-Factor Authentication Product Type
Figure Two-Factor Authentication Market Share of Top 3 Manufacturers
Figure Two-Factor Authentication Market Share of Top 5 Manufacturers
Table Entrust Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Entrust Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure Entrust Two-Factor Authentication Market Share (2012-2017)
Table Gemalto Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Gemalto Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure Gemalto Two-Factor Authentication Market Share (2012-2017)
Table RSA Security Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table RSA Security Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure RSA Security Two-Factor Authentication Market Share (2012-2017)
Table SecurEnvoy Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table SecurEnvoy Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure SecurEnvoy Two-Factor Authentication Market Share (2012-2017)
Table VASCO Data Security International Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table VASCO Data Security International Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure VASCO Data Security International Two-Factor Authentication Market Share (2012-2017)
Table Authenex Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Authenex Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure Authenex Two-Factor Authentication Market Share (2012-2017)
Table Authentify Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Authentify Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure Authentify Two-Factor Authentication Market Share (2012-2017)
Table Authy Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Authy Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure Authy Two-Factor Authentication Market Share (2012-2017)
Table Deepnet Security Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Deepnet Security Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure Deepnet Security Two-Factor Authentication Market Share (2012-2017)
Table DynaPass Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table DynaPass Two-Factor Authentication Capacity, Production, Revenue, Price and Gross Margin (2012-2017)
Figure DynaPass Two-Factor Authentication Market Share (2012-2017)
Table Fortinet Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table HID Global Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table ID Control Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Meontrust Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Mi-Token Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table PointSharp Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Protectimus Solutions Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table SecureAuth Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table SecurEnvoy Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table SecurStar Basic Information, Manufacturing Base, Sales Area and Its Competitors
Table Yubico Basic Information, Manufacturing Base, Sales Area and Its Competitors
Figure China Two-Factor Authentication Capacity, Production and Growth (2012-2017)
Figure China Two-Factor Authentication Revenue (Million USD) and Growth (2012-2017)
Table China Two-Factor Authentication Production, Consumption, Export and Import (2012-2017)
Table China Two-Factor Authentication Production by Type (2012-2017)
Table China Two-Factor Authentication Production Share by Type (2012-2017)
Figure Production Market Share of Two-Factor Authentication by Type (2012-2017)
Figure 2015 Production Market Share of Two-Factor Authentication by Type
Table China Two-Factor Authentication Revenue by Type (2012-2017)
Table China Two-Factor Authentication Revenue Share by Type (2012-2017)
Figure Production Revenue Share of Two-Factor Authentication by Type (2012-2017)
Figure 2015 Revenue Market Share of Two-Factor Authentication by Type
Table China Two-Factor Authentication Price by Type (2012-2017)
Figure China Two-Factor Authentication Production Growth by Type (2012-2017)
Table China Two-Factor Authentication Consumption by Application (2012-2017)
Table China Two-Factor Authentication Consumption Market Share by Application (2012-2017)
Figure China Two-Factor Authentication Consumption Market Share by Application in 2015
Table China Two-Factor Authentication Consumption Growth Rate by Application (2012-2017)
Figure China Two-Factor Authentication Consumption Growth Rate by Application (2012-2017)
Table China Two-Factor Authentication Production by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Production Market Share by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Production Value by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Production Value Market Share by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Sales Price by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Consumption by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Consumption Market Share by Regions (Provinces)(2012-2017)
Table China Two-Factor Authentication Production, Consumption, Export and Import (2012-2017)
Table Production Base and Market Concentration Rate of Raw Material
Figure Price Trend of Key Raw Materials
Table Key Suppliers of Raw Materials
Figure Manufacturing Cost Structure of Two-Factor Authentication
Figure Manufacturing Process Analysis of Two-Factor Authentication
Figure Two-Factor Authentication Industrial Chain Analysis
Table Raw Materials Sources of Two-Factor Authentication Major Manufacturers in 2015
Table Major Buyers of Two-Factor Authentication
Table Distributors/Traders List
Figure China Two-Factor Authentication Capacity, Production and Growth Rate Forecast (2017-2022)
Figure China Two-Factor Authentication Revenue and Growth Rate Forecast (2017-2022)
Table China Two-Factor Authentication Production, Import, Export and Consumption Forecast (2017-2022)
Table China Two-Factor Authentication Production Forecast by Type (2017-2022)
Table China Two-Factor Authentication Consumption Forecast by Application (2017-2022)
Table China Two-Factor Authentication Production Forecast by Regions (Provinces)(2017-2022)
Table China Two-Factor Authentication Consumption Forecast by Regions (Provinces)(2017-2022)
Table China Two-Factor Authentication Production, Consumption, Import and Export Forecast by Regions (Provinces)(2017-2022)
Insulated-Gate Bipolar Transistor (IGBT) is a three-terminal electronic switching device, which is a combination of Metal–Oxide–Semiconductor Field-Effect Transistor (MOSFET) and Bipolar Junction Transistor (BJT) in monolithic form. It allows the f...
Global power transformer market is expected to grow at a CAGR of 7.07% from 2016 to 2022 to reach $37,353 million by 2022 from $23,019 million in 2015. Power transformers are static transmission machine, which wrap a coil around an electromagnet to transfer el...
3D printing is a machine-based process in which three-dimensional solid objects are made via a computer containing blueprints or digital files of the object. This is a revolutionary method that utilizes inkjet technology to save time and money by eliminating t...