clawd/drafts/vault1984-market-research.md

17 KiB
Raw Permalink Blame History

vault1984 — Market Research

March 2026


Market Context

The global password management market is ~$3.5B in 2026, growing at ~22% CAGR toward $10-27B by 2030-2035 (multiple analyst estimates converge on this range). Growth drivers: AI agent adoption, rising breach frequency, regulatory pressure (NIS2, SOC2, ISO27001), and workforce credential sprawl.

The AI agent angle is newly validated. AgentMail raised $6M in early 2026 for "email inboxes for AI agents" — agent-native infrastructure is becoming a funded category. No incumbent password manager was built for agents. They're bolting on MCP. vault1984 was designed from day one around the agent access model.


Consumer — Individuals

The situation

The consumer password manager market is mature but largely untapped by paid products — most people use the free tier of Bitwarden, their browser's built-in manager, or Apple Keychain. The 2022 breach was a wake-up call. Millions of consumers received emails telling them their vault data had been stolen. Most changed their master password and moved on. A smaller number looked for something structurally better.

vault1984's architecture speaks directly to what they feared: that their passwords were stolen and could be cracked. The answer — "your passwords were encrypted with a key derived from your hardware, not a master password we could guess" — is the clearest possible differentiation from every product they've used before.

Market potential

Large but fragmented. The challenge is Apple Keychain and Google Password Manager — both free, deeply integrated, and "good enough" for most consumers. vault1984 competes for the security-conscious subset who have specifically been affected by a breach or who understand why hardware-derived encryption is different.

The AI agent angle is less relevant for consumers today, but grows as agents become mainstream household tools.

Competitors

Player Pricing Notes
Apple Keychain Free Deeply integrated, no agent support
Google Password Manager Free Same
1Password $3/month ($36/yr) Strong brand, server can read
Bitwarden $10/yr premium Open source, server can read (hosted)
Dashlane $4/month Server can read
NordPass $2.49/month Server can read

vault1984 advantage: The breach story. WebAuthn-only (no master password to forget or leak). $12/year makes it price-competitive with premium tiers.

vault1984 gap: Mobile — consumers need native iOS/Android apps. UX polish. Browser extension that just works. The consumer market is unforgiving on friction.

Required features to compete

  • Native iOS / Android app (critical)
  • Polished onboarding for non-technical users
  • Family plan (multiple users, shared vault)
  • Password health / breach monitoring
  • Recovery flow for lost hardware key

TAM

The consumer segment is compressed by free competition. Apple Keychain, Google Password Manager, and browser built-ins are free, deeply integrated, and good enough for most people. The theoretical 300M potential users is not a useful number — most will never pay.

Realistic addressable market: people who actively seek something beyond the built-in (cross-platform, breach-conscious, not locked to one ecosystem).

  • ~20M people currently paying for a consumer password manager (1Password, Bitwarden Premium, Dashlane)
  • vault1984 price: $12/yr
  • Realistic consumer TAM: ~$240600M
  • Near-term trigger: ~5-10M people primed to switch following the 2022 breach — they received the notification, they're looking for something structurally different

Pricing

$12/yr (current) is well-positioned. Family plan at $24/yr (5 users) would follow market norms.


Techies — Developers, AI Builders, Security Researchers

The situation

This is vault1984's beachhead. Developers using Claude Code, Codex, Cursor, and Windsurf have the agent credential problem right now. They self-host because they understand the architecture and trust themselves more than any hosted service. They're the ones who read the Orwell quote and immediately understand what it means.

This segment doesn't convert primarily through paid subscriptions — many will self-host for free. Their value is disproportionate: they share on HN and X, bring their teams with them, and validate the product with the technical credibility that makes the rest of the market take notice.

Market potential

Smaller by direct revenue, larger by influence. A single viral HN thread from this segment is worth more than 10,000 consumer signups in terms of top-of-funnel impact across every other segment.

The ones who choose hosted rather than self-hosted are a clean revenue signal: they've evaluated the product, decided it's worth paying for, and are volume-small but highly retentive.

Competitors

None with vault1984's architecture. The closest:

  • Bitwarden self-hosted (server-side encryption, not operator-blind)
  • HashiCorp Vault (secrets management for infra, not human credentials)
  • pass (CLI password manager — no agent integration, no WebAuthn)

vault1984 advantage: This is the natural home audience. The encryption argument is immediately understood. The MCP integration is valued. The one-binary deployment is respected.

vault1984 gap: Self-hosting is free — conversion to paid hosted requires making the hosted experience demonstrably better (uptime, cross-device sync, automatic backups) than the friction of running their own server.

TAM

  • ~50M developers globally; ~15M actively paying for a password manager
  • vault1984 pricing: $12/yr (hosted)
  • Many self-host free — realistically ~30% of techie users would choose hosted
  • TAM (hosted revenue): ~$54M — small by market standards
  • Strategic value: outsized. This segment is the distribution engine for every other segment.

Pricing

$12/yr stays right. Consider a "power user" tier at $24/yr with higher storage, API access, and additional MCP features. Do not introduce friction for self-hosters.


SMB — Small & Medium Business (1250 employees)

The situation

SMBs are the fastest-growing segment for credential management. They lack dedicated security teams, use AI agents actively (Claude Code, Cursor, Codex are mainstream tools in this segment), and make purchase decisions fast. The pain: their current password manager gives agents all-or-nothing access, and nobody has verified whether the operator can read their vault.

Market potential

Largest volume segment. Price-sensitive but willing to pay for something that solves a real problem simply. AI-native companies in this cohort are the early adopters — they feel the agent credential problem acutely.

Competitors

Player Pricing AI/Agent story Encryption
1Password Teams $4/user/month MCP plugin (bolted on) Server can read
Bitwarden Teams $4/user/month MCP plugin (bolted on) Server can read (hosted)
Dashlane Business $5/user/month None Server can read
NordPass Business $4/user/month None Zero-knowledge claim

vault1984 advantage: Designed for agent access. Superior encryption architecture. No master password friction. One binary, self-host option.

vault1984 gap: No team features yet. No multi-user vault management, no user provisioning, no shared vault concept. Must be built before this segment is addressable.

Required features to compete

  • Organization accounts (owner + members)
  • Shared credential vaults (team-level, not just individual)
  • Admin console — invite, remove, view audit log
  • Per-user MCP token management
  • Basic policy (enforce 2FA, session timeout)
  • Email-based onboarding

Pricing opportunity

Market rate is $46/user/month. vault1984's strategy is not to match the market — it's to make competition economically irrational.

Target: $23/user/month. Same product, fraction of the price. At this level no VC funds a competitor — the market is already priced out. Revenue model is volume, not margin.


MME — Mid-Market Enterprise (2502,000 employees)

The situation

Has a security team. Has procurement. Has compliance requirements. Will ask for SSO, directory sync, and audit exports before signing. AI governance is becoming a real concern here — security teams are starting to question what their AI agents can access and whether the credential store can be compelled.

Market potential

Slower sales cycle than SMB but much higher contract value. vault1984's "operator cannot read your passwords" architecture is a compliance advantage — it reduces the blast radius of a vendor incident and simplifies the data-in-custody conversation with auditors.

Competitors

Player Pricing Notable
1Password Business $7/user/month SSO, Okta integration
Bitwarden Enterprise $6/user/month SSO, SCIM, on-prem option
Keeper Business $6/user/month Compliance reporting, SIEM
Dashlane Business $8/user/month Dark web monitoring

vault1984 advantage: The encryption architecture is a compliance argument. A vendor that provably cannot read your credentials is easier to pass through legal review than one that promises not to. "Operator-blind" = smaller vendor risk exposure.

vault1984 gap: SSO is table stakes at this size. No SCIM, no Okta/Azure AD integration, no compliance exports. These are hard blockers.

Required features to compete

  • SAML 2.0 / OIDC SSO (Okta, Azure AD, Google Workspace)
  • SCIM provisioning — automated user lifecycle management
  • Compliance exports (audit log export, CSV/SIEM format)
  • Policy enforcement at org level
  • Dedicated admin console with role-based access
  • SLA commitment (99.9%+)
  • Custom onboarding support

Pricing opportunity

Market rate is $610/user/month. vault1984 target: $23/user/month. Same knockout logic — at this price procurement is a no-brainer, not a negotiation. CFOs don't hold meetings about a $3/seat product.


Enterprise (2,000+ employees)

The situation

Has a full security team, a PAM (Privileged Access Management) strategy, and will spend 6 months in procurement. Needs SOC 2 Type II certification, custom SLAs, dedicated support, possibly on-prem deployment. AI governance is an active concern — CISO teams are mandating controls on what AI agents can access.

Market potential

Smallest number of deals, largest contract value. A single enterprise contract can be $500k$2M/year. But the sales cycle is long and the certification requirements are significant. This segment is addressable in 23 years, not now.

Competitors

Player Position Pricing
CyberArk PAM market leader $100k+ contracts
Delinea (Thycotic) PAM mid-tier $50k$200k
HashiCorp Vault Secrets management (infra) $1929/user/month (HCP)
1Password Enterprise Password manager Custom ($815/user/month typical)
Bitwarden Enterprise Password manager Custom

vault1984 advantage: The architecture argument is most compelling here — enterprises care deeply about vendor risk. A credential store the vendor cannot read is structurally better for compliance than one protected by policy. The AI agent credential management gap is also sharpest here: enterprises running large agent infrastructure need granular control.

vault1984 gap: Enormous. No SOC 2, no PAM integration, no SIEM connectors (Splunk, Elastic, Sentinel), no dedicated support, no on-prem option, no custom SLA. This is a 23 year roadmap.

Required features to compete

  • SOC 2 Type II certification
  • PAM integration (CyberArk, Delinea)
  • SIEM integration (Splunk, Elastic, Microsoft Sentinel)
  • HSM support for key management
  • On-premises / private cloud deployment option
  • Custom SLA (99.99%+, dedicated support)
  • Custom contractual terms (DPA, BAA if applicable)
  • Dedicated customer success manager

Pricing opportunity

Target: $23/user/month — same as SMB/MME. The differentiation is not price, it's features (SOC2, SLAs, support). Revenue at this price point is pure volume: 100,000 enterprise seats = $2.43.6M ARR. 1M seats = $2436M ARR.


MSP — Managed Service Providers

⚠️ License blocker

The Elastic License 2.0 prohibits MSPs from deploying vault1984 for their clients. The ELv2 explicitly bars "providing the software to third parties as a hosted or managed service." An MSP running vault1984 instances for client organizations is exactly this scenario.

This segment requires a separate commercial license from vault1984. This is actually an opportunity — sell commercial MSP licenses at a per-client or per-seat rate. The ELv2 model (free for self-use, paid commercial license for resellers) is a proven business model used by Elastic, HashiCorp, and others.

The situation

MSPs manage IT for 10500 SMB clients each. They need a password manager they can deploy, manage, and bill per client. The segment is poorly served: 1Password MSP is widely considered overpriced ($5/user/month wholesale, complaints on r/msp), Bitwarden MSP exists but lacks multi-tenant management tooling, and most MSP-specific tools (N-able Passportal, CyberFOX) lack the AI agent story entirely.

Market potential

High. An MSP with 100 clients averaging 20 users each represents 2,000 seats. vault1984's architecture is actually perfect for MSPs — they literally cannot read their clients' passwords, which eliminates a significant liability and trust issue. "Your MSP cannot see your passwords" is a strong sales argument for the MSP to their clients.

Competitors

Player Pricing Notable
1Password MSP ~$5/user/month wholesale Widely seen as overpriced
Bitwarden MSP ~$3/user/month Limited multi-tenant tooling
N-able Passportal ~$3/user/month RMM integration, weak encryption
CyberFOX Custom PAM focus, PSA integration
IT Glue (Kaseya) ~$29/tech/month Documentation focus, not password-first

vault1984 advantage: Operator-blind architecture is a legal and trust advantage for MSPs. "We cannot read your clients' passwords" removes the MSP as a liability surface. Strong AI agent story is a differentiator as MSPs start managing agentic workflows for their clients. One binary + SQLite makes per-client deployment trivially simple.

vault1984 gap: No white-label, no PSA/RMM integration (ConnectWise, NinjaRMM, Kaseya, HaloPSA), no multi-tenant management console, and most importantly — needs a commercial MSP license structure.

Required features to compete

  • Commercial MSP license (separate from ELv2)
  • Multi-tenant management console (deploy/manage all client vaults from one pane)
  • White-label (logo, domain, email branding)
  • PSA integration (ConnectWise Manage, Autotask, HaloPSA)
  • RMM integration (NinjaRMM, N-able, Datto)
  • Bulk billing / consolidated invoicing
  • Client-level audit log access
  • MSP technician access (read-only to shared team credentials, no access to Identity layer)

Pricing opportunity

$23/user/month wholesale (MSP pays), resells at $58/user/month to clients. Alternatively, flat fee per client vault instance.

Target: $11.50/user/month wholesale. MSPs resell at $35. They make margin. Their clients pay less than 1Password direct. Nobody competes.


Summary

Segment Addressable now? TAM Primary gap Revenue potential
Consumer Now $240600M Mobile apps, UX polish Medium volume, $12/yr
Techies Now $54M direct Make hosted better than self-host Low volume, high strategic value
SMB 612 months $18B Team features, multi-user High volume, $5/user/month
MME 1218 months $19B SSO, SCIM, compliance Medium volume, $8/user/month
Enterprise 23 years $1520B SOC2, PAM, SIEM, SLA Low volume, high value
MSP 612 months (commercial license) $1.4B wholesale MSP license, white-label, PSA High multiplier, $23/user/month wholesale
  1. Now: Lock in techies and consumers — the beachhead is already warm. Techies validate the product and drive top-of-funnel. Consumers convert on the breach story. They'll tolerate missing team features if the core product is right. Start building the waitlist.
  2. H2 2026: Ship team features. Launch SMB pricing. Begin MSP commercial license discussions.
  3. 2027: MME features (SSO, SCIM). Begin compliance certification track.
  4. 2028+: Enterprise.

The structural advantage across all segments

vault1984's architecture — operator-blind Credential and Identity encryption — is not just a marketing claim. It reduces vendor risk across every segment:

  • SMB: "even if we get hacked, your passwords are safe"
  • MME: smaller vendor risk surface for compliance reviews
  • Enterprise: structural argument for CISO sign-off
  • MSP: MSP cannot be compelled to hand over client passwords

No incumbent can make this claim. It's the moat that scales.


Draft — George for Johan. Do not publish.