Enjoy complimentary customisation on priority with our Enterprise License!
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Working of Hardware Encryption
06.2 Encryption and Decryption Algorithms
06.3 Advantages and Disadvantages of Hardware Encryption
06.3.1 Advantages of Hardware Encryption
06.3.2 Disadvantages of Hardware Encryption
07. Market Scenario
07.1 Pricing
07.2 Comparison between Hardware-based Encryption and Software-based Encryption
07.3 Data Breach Statistics
08. Market Landscape
08.1 Market Overview
08.1.1 Market Structure
08.1.2 Market Size and Forecast
08.1.3 Shipment Forecast
08.1.4 ASP Forecast
08.2 Five Forces Analysis
09. Product Life Cycle Analysis
10. Market Segmentation by Product
10.1 Global Hardware Encryption Market by Product 2014
10.2 Global Hardware Encryption Market by Product 2014-2019
10.3 Global Hardware Encryption Market by Hardware Encrypted HDDs
10.3.1 Market Size and Forecast
10.4 Global Hardware Encryption Market by Hardware Encrypted USB Drives
10.4.1 Market Size and Forecast
10.5 Global Hardware Encryption Market by In-line Encryptors
10.5.1 Market Size and Forecast
11. Geographical Segmentation
11.1 Global Hardware Encryption Market by Geographical Segmentation 2014
11.2 Global Hardware Encryption Market by Geographical Segmentation 2014-2019
11.2.1 Global Hardware Encryption Market by Geographical Segmentation 2014-2019 (revenue)
11.2.2 Hardware Encryption Market in Americas
11.2.3 Hardware Encryption Market in EMEA Region
11.2.4 Hardware Encryption Market in APAC Region
12. Market Attractiveness
12.1 Market Attractiveness by Product
12.2 Market Attractiveness by Geography
13. Buying Criteria
14. Market Growth Drivers
15. Drivers and their Impact
16. Market Challenges
17. Impact of Drivers and Challenges
18. Market Trends
19. Trends and their Impact
20. Vendor Landscape
20.1 Competitive Scenario
20.2 Vendor Analysis 2014
20.2.1 Comparison of the Vendors based on the Products
20.2.2 Key Developments
20.2.3 Mergers and Acquisitions
20.3 Other Prominent Vendors
21. Key Vendor Analysis
21.1 Micron Technology
21.1.1 Key Facts
21.1.2 Business Overview
21.1.3 Business Segmentation by Revenue 2013
21.1.4 Business Segmentation by Revenue 2012 and 2013
21.1.5 Geographical Segmentation by Revenue 2013
21.1.6 Business Strategy
21.1.7 Recent Developments
21.1.8 SWOT Analysis
21.2 Samsung
21.2.1 Key Facts
21.2.2 Business Overview
21.2.3 Business Segmentation by Revenue 2013
21.2.4 Business Segmentation by Revenue 2012 and 2013
21.2.5 Geographical Segmentation by Revenue 2013
21.2.6 Business Strategy
21.2.7 Recent Developments
21.2.8 SWOT Analysis
21.3 Seagate
21.3.1 Key Facts
21.3.2 Business Overview
21.3.3 Revenue Segmentation by Channel 2014
21.3.4 Geographical Segmentation by Revenue 2014
21.3.5 Business Strategy
21.3.6 Recent Developments
21.3.7 SWOT Analysis
21.4 Toshiba
21.4.1 Key Facts
21.4.2 Business Overview
21.4.3 Business Segmentation by Revenue 2013
21.4.4 Business Segmentation by Revenue 2012 and 2013
21.4.5 Geographical Segmentation by Revenue 2013
21.4.6 Recent Developments
21.4.7 SWOT Analysis
21.5 WD
21.5.1 Key Facts
21.5.2 Business Overview
21.5.3 Channel Segmentation by Revenue 2014
21.5.4 Channel Segmentation by Revenue 2013 and 2014
21.5.5 Geographical Segmentation by Revenue 2014
21.5.6 Business Strategy
21.5.7 Recent Developments
21.5.8 SWOT Analysis
22. Key Insights
22.1 Sector-wise Adoption of Hardware Encryption
22.2 Region-wise Adoption of Hardware Encryption
22.3 Penetration of Hardware Encrypted HDDs
22.4 Penetration of Hardware Encrypted USB Drives
23. Assumptions
24. Other Reports in this Series
Research Framework
Technavio presents a detailed picture of the market by way of study, synthesis, and summation of data from multiple sources. The analysts have presented the various facets of the market with a particular focus on identifying the key industry influencers. The data thus presented is comprehensive, reliable, and the result of extensive research, both primary and secondary.
INFORMATION SOURCES
Primary sources
Secondary sources
DATA ANALYSIS
Data Synthesis
Data Validation
REPORT WRITING
Qualitative
Quantitative
Get the report (PDF) sent to your email within minutes.
Complimentary full Excel data with your report purchase.
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Quick Report Overview:
Cookie Policy
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.