CHAPTER 1 INTRODUCTION
1.1 Report description
1.2 Key benefits
1.3 Key market segments
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
2.1 Summary
2.2 CXO perspective
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.2 The need for cloud security
3.3 Key Findings
3.3.1 Top impacting factor
3.3.2 Top winning strategies
3.3.3 Top investment pockets
3.4 Value chain analysis
3.5 Porters five forces analysis
3.5.1 Bargaining power of buyers
3.5.2 Bargaining power of suppliers
3.5.3 Threat of new entrant
3.5.4 Threat of rivalry
3.5.5 Threat of substitutes
3.6 Market share analysis, 2014
3.7 Drivers
3.7.1 Growing reliance on cloud based services
3.7.2 Upsurge in the use of handheld devices (BYOD & CYOD)
3.8 Restraints
3.8.1 Lack of awareness on cloud security
3.9 Opportunities
3.9.1 Growing market for managed security services
CHAPTER 4 WORLD CLOUD SECURITY MARKET, BY TYPE
4.1 Cloud Identity & Access Management
4.1.1 Key market trends
4.1.2 Key drivers and opportunities
4.1.3 Market size and forecast
4.2 Data Loss Prevention
4.2.1 Key market trends
4.2.2 Key drivers and opportunities
4.2.3 Market size and forecast
4.3 Email & Web Security
4.3.1 Key market trends
4.3.2 Key drivers and opportunities
4.3.3 Market size and forecast
4.4 Cloud Database Security
4.4.1 Key market trends
4.4.2 Key drivers and opportunities
4.4.3 Market size and forecast
4.5 Cloud Encryption
4.5.1 Key market trends
4.5.2 Key drivers and opportunities
4.5.3 Market size and forecast
4.6 Network Security
4.6.1 Key market trends
4.6.2 Key drivers and opportunities
4.6.3 Market size and forecast
CHAPTER 5 WORLD CLOUD SECURITY MARKET, BY END USER
5.1 Large enterprise
5.1.1 Key market trends
5.1.2 Key growth factors & opportunities
5.1.3 Market size & forecast
5.2 Small & medium enterprise
5.2.1 Key market trends
5.2.2 Key growth factors & opportunities
5.2.3 Market size & forecast
CHAPTER 6 WORLD CLOUD SECURITY MARKET, BY DEPLOYMENT
6.1 Public
6.1.1 Key market trends
6.1.2 Key growth factors and opportunities
6.1.3 Market size and forecast
6.2 Private
6.2.1 Key market trends
6.2.2 Key growth factors and opportunities
6.2.3 Market size and forecast
6.3 Hybrid
6.3.1 Key market trends
6.3.2 Key growth factors and opportunities
6.3.3 Market size and forecast
CHAPTER 7 WORLD CLOUD SECURITY MARKET, BY VERTICAL
7.1 Healthcare
7.1.1 Market size and forecast
7.2 BFSI
7.2.1 Market size and forecast
7.3 IT & Telecom
7.3.1 Market size and forecast
7.4 Government Agencies
7.4.1 Market size and forecast
7.5 Retail
7.5.1 Market size and forecast
7.6 Others
7.6.1 Market size and forecast
CHAPTER 8 WORLD CLOUD SECURITY MARKET, BY GEOGRAPHY
8.1 North America
8.1.1 Key market trends
8.1.2 Competitive scenario
8.1.3 Key drivers and opportunities
8.1.4 Market size and forecast
8.2 Europe
8.2.1 Key market trends
8.2.2 Competitive scenario
8.2.3 Key drivers and opportunities
8.2.4 Market size and forecast
8.3 Asia Pacific
8.3.1 Key market trends
8.3.2 Competitive scenario
8.3.3 Key drivers and opportunities
8.3.4 Market size and forecast
8.4 LAMEA
8.4.1 Key market trends
8.4.2 Competitive scenario
8.4.3 Key drivers and opportunities
8.4.4 Market size and forecast
CHAPTER 9 COMPANY PROFILE
9.1 CA Technologies, Inc.
9.1.1 Company overview
9.1.2 Business performance
9.1.3 Strategy move and development
9.1.4 SWOT analysis of CA, Inc.
9.2 Cisco Systems, Inc.
9.2.1 Company overview
9.2.2 Business performance
9.2.3 Strategy move and development
9.2.4 SWOT analysis of CISCO SYSTEMS, INC.
9.3 Fortinet, Inc.
9.3.1 Company overview
9.3.2 Business performance
9.3.3 Strategy move and development
9.3.4 SWOT analysis of Fortinet, Inc.
9.4 IBM Corporation
9.4.1 Company overview
9.4.2 Business performance
9.4.3 Strategy move and development
9.4.4 SWOT analysis of IBM Corporation
9.5 Intel Corporation (McAfee, Inc.)
9.5.1 Company overview
9.5.2 Business performance
9.5.3 Strategy move and development
9.5.4 SWOT analysis of Intel Corporation, Inc.
9.6 Panda Security
9.6.1 Company overview
9.6.2 Strategy move and development
9.6.3 SWOT analysis of Panda Security
9.7 Sophos, Ltd.
9.7.1 Company overview
9.7.2 Business performance
9.7.3 Strategy move and development
9.7.4 SWOT analysis of Sophos, Inc.
9.8 Symantec Corporation
9.8.1 Company overview
9.8.2 Business performance
9.8.3 Strategy move and development
9.8.4 SWOT analysis of Symantec Corporation
9.9 Trend Micro, Inc.
9.9.1 Company overview
9.9.2 Business performance
9.9.3 Strategy move and development
9.9.4 SWOT analysis of Trend Micro, Inc.
9.10 CloudPassage Inc.
9.10.1 Company overview
9.10.2 Strategy move and development
9.10.3 SWOT analysis of CloudPassage, Inc.