CHAPTER 1 INTRODUCTION
1.1 Report description
1.2 Key benefits
1.3 Key market segmentation
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY:
2.1 Market beyond: what to expect by 2025
2.1.1 Base case scenario
2.1.2 Rapid growth scenario
2.1.3 Critical growth scenario
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.1.1 Encryption overview
3.2 Encryption software
3.2.1 Drivers
3.2.1.1 Increased compliance regulations
3.2.1.2 Growing number and complexity of number of data breaches:
3.2.1.3 Snowden Revelations
3.2.1.4 Increased adoption of cloud and virtualization
3.2.1.5 Increased Mobility
3.2.2 Challenges
3.2.2.1 Management of Encryption Keys: Increased Costs and Complexity
3.2.2.2 Lack of awareness and education
3.2.2.3 Regulatory restrictions on crypto-software:
3.2.3 Trends
3.2.3.1 Increasing deployment of enterprise wide encryption strategy
3.2.3.2 Increasing demand for Cloud data encryption
3.3 Key findings
3.3.1 Top factors impacting the market
3.3.2 Top winning strategies
3.3.3 Top investment pockets
3.4 Porters five force analysis
3.4.1 Bargaining power of supplier
3.4.2 Bargaining power of buyer
3.4.3 Threat of substitute
3.4.4 Threat of new entrants
3.4.5 Competition within the industry
3.5 Market share analysis, 2013
CHAPTER 4 GLOBAL ENCRYPTION SOFTWARE MARKET BY USAGE:
4.1 Introduction
4.2 Data at rest encryption software market
4.2.1 Market size and forecasts by segments
4.2.2 Full disk/whole disk encryption (FDE)
4.2.2.1 Drivers
4.2.2.2 Challenges
4.2.3 File/folder level encryption (FLE) software
4.2.3.1 Drivers
4.2.3.2 Challenges
4.2.4 Market trends
4.2.5 Market size and forecasts by geography
4.2.5.1 North America
4.2.5.1.1 DRIVERS
4.2.5.1.2 CHALLENGES
4.2.5.1.3 TRENDS
4.2.5.1.4 UNITED STATES
4.2.5.1.5 CANADA
4.2.5.1.6 OTHERS
4.2.5.2 Europe
4.2.5.2.1 DRIVERS
4.2.5.2.2 CHALLENGES
4.2.5.2.3 TRENDS
4.2.5.2.4 UNITED KINGDOM
4.2.5.2.5 FRANCE
4.2.5.2.6 GERMANY
4.2.5.2.7 OTHERS
4.2.5.3 APAC
4.2.5.3.1 DRIVERS
4.2.5.3.2 CHALLENGES:
4.2.5.3.3 CHINA
4.2.5.3.4 JAPAN
4.2.5.3.5 INDIA
4.2.5.3.6 AUSTRALIA
4.2.5.3.7 OTHERS
4.2.5.4 LAMEA:
4.2.5.4.1 DRIVERS
4.2.5.4.2 CHALLENGES
4.2.5.4.3 MEXICO
4.2.5.4.4 UAE
4.2.5.4.5 SOUTH AFRICA
4.2.5.4.6 OTHERS
4.2.6 Market size and forecasts by Industry verticals
4.2.6.1 Financial services
4.2.6.1.1 DRIVERS
4.2.6.2 Healthcare
4.2.6.2.1 DRIVERS
4.2.6.3 Public sector (Government & other security agencies)
4.2.6.3.1 DRIVERS:
4.2.6.4 Others
4.2.6.4.1 DRIVERS:
4.3 Data in transit encryption software market (Email Encryption)
4.3.1 Drivers
4.3.2 Challenges
4.3.1 Market size and forecasts by Geography
4.3.2 North America
4.3.2.1 United States
4.3.2.2 Canada
4.3.2.3 Others
4.3.3 Europe
4.3.3.1 United Kingdom
4.3.3.2 France
4.3.3.3 Germany
4.3.3.4 Others
4.3.4 APAC
4.3.4.1 China
4.3.4.2 Japan
4.3.4.3 India
4.3.4.4 Australia
4.3.4.5 Others
4.3.5 LAMEA
4.3.5.1 Mexico
4.3.5.2 UAE
4.3.5.3 South Africa
4.3.5.4 Others
4.3.6 Market size and forecasts by Industry Verticals
4.3.7 Long-term opportunistic Markets for Data in Transit Encryption Software
4.3.7.1 Drivers
4.3.7.2 Challenges
CHAPTER 5 COMPANY PROFILES AND ANALYSIS
5.1 Symantec
5.1.1 Company overview
5.1.2 Company snapshot
5.1.3 Business performance
5.1.4 Strategic moves and developments
5.1.4.1 Organic growth strategies: organizational restructuring & product launches
5.1.4.2 Inorganic growth strategies: Partnerships and Acquisitions
5.1.5 SWOT analysis & strategic conclusions of Symantec
5.2 Sophos
5.2.1 Company overview
5.2.2 Company snapshot
5.2.3 Business performance
5.2.4 Strategic moves and developments
5.2.4.1 Organic growth strategies: Product Launches
5.2.4.2 Inorganic growth Strategies: Partnerships and acqusitions
5.2.5 SWOT analysis & strategic conclusions of Sophos
5.3 McAfee
5.3.1 Company overview
5.3.2 Company snapshot
5.3.3 Business performance
5.3.4 Strategic moves and developments
5.3.4.1 Organic growth strategies: Product Launches
5.3.4.2 Inorganic growth strategies: Partnerships and Acquisitions
5.3.5 SWOT analysis & strategic conclusions
5.4 Check Point Software Technologies
5.4.1 Company overview
5.4.2 Company snapshot
5.4.3 Business performance
5.4.4 Strategic moves and developments
5.4.4.1 Organic growth strategies: Product Launches
5.4.4.2 Inorganic growth strategies: Partnerships and acquisitions
5.4.5 SWOT analysis & strategic conclusions of Checkpoint
5.5 Proofpoint
5.5.1 Company overview
5.5.2 Company snapshot
5.5.3 Business performance
5.5.4 Strategic moves and developments
5.5.4.1 Organic growth strategies: product launches
5.5.4.2 Inorganic strategies: partnerships and acquisitions
5.5.5 SWOT analysis & strategic conclusions of Proofpoint
5.6 Trend Micro
5.6.1 Company overview
5.6.2 Company snapshot
5.6.3 Business performance
5.6.4 Strategic moves and developments
5.6.4.1 Organic growth strategies: organizational restructuring and product launches
5.6.4.2 Inorganic growth strategies: acquisitions and partnerships
5.6.5 SWOT analysis & strategic conclusions of Trend Micro