CHAPTER 1 INTRODUCTION
1.1 Report description
1.2 Key benefits
1.3 Key market segments
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
2.1 CXO perspective
2.2 Market beyond: What to expect by 2025
2.2.1 Moderate case scenario
2.2.2 Optimistic case scenario
2.2.3 Diminishing case scenario
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.2 Key findings
3.2.1 Top impacting factors
3.2.2 Top investment pockets
3.2.3 Top winning strategies
3.3 Porter's five forces analysis
3.3.1 Plenty of suppliers lowers the bargaining power of suppliers
3.3.2 Demand of customized solutions keeps buyers bargaining power at moderate level
3.3.3 Lack of capital and IT resources for in-house security management lowers the threat of substitute
3.3.4 Technological and policy requirement lowers the threat of new entrants
3.3.5 Presence of strong players intensifies the rivalry
3.4 Value chain analysis
3.5 Market share analysis
3.6 Market dynamics
3.6.1 Drivers
3.6.1.1 Increasing cyber crime activities
3.6.1.2 Cost effectiviness
3.6.1.3 Stringent government regulations
3.6.1.4 Growing trend of mobile devices at workplaces
3.6.1.5 Rise in electronic data
3.6.2 Restraints
3.6.2.1 Hesitation to share sensitive data
3.6.2.2 Demand of customized services
3.6.3 Opportunities
3.6.3.1 Growing awareness about data security
3.6.3.2 Growing importance of e-business
CHAPTER 4 GLOBAL MSS MARKET BY DEPLOYMENT MODE
4.1 Introduction
4.1.1 Market size and forecast
4.2 Hosted or cloud based managed security services
4.2.1 Key market trends
4.2.2 Competitive scenario
4.2.3 Key growth factors and opportunities
4.2.4 Market size and forecast
4.3 On-premise or Customer Premise Equipment (CPE) managed security services
4.3.1 Key market trends
4.3.2 Competitive scenario
4.3.3 Key growth factors and opportunities
4.3.4 Market size and forecast
CHAPTER 5 GLOBAL MSS MARKET BY ORGANIZATION SIZE
5.1 Introduction
5.1.1 Market size and forecast
5.2 Small and medium sized business
5.2.1 Key market trends
5.2.2 Competitive scenario
5.2.3 Key growth factors and opportunities
5.2.4 Market size and forecast
5.3 Large businesses
5.3.1 Key market trends
5.3.2 Competitive scenario
5.3.3 Key growth factors and opportunities
5.3.4 Market size and forecast
CHAPTER 6 GLOBAL MSS MARKET BY APPLICATION
6.1 Introduction
6.1.1 Market size and forecast
6.2 Managed Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS)
6.2.1 Market size and forecast
6.3 Distributed Denial of Services (DDoS)
6.3.1 Market size and forecast
6.4 Unified Threat Management (UTM)
6.4.1 Market size and forecast
6.5 Secured Information and Event Management (SIEM)
6.5.1 Market size and forecast
6.6 Endpoint security
6.6.1 Market size and forecast
6.7 Firewall management
6.7.1 Market size and forecast
6.8 Others
6.8.1 Market size and forecast
CHAPTER 7 GLOBAL MSS MARKET BY VERTICALS
7.1 Introduction
7.1.1 Market size and forecast
7.2 Banking, Financial Services and Insurance (BFSI)
7.2.1 Market size and forecast
7.3 Healthcare
7.3.1 Market size and forecast
7.4 Manufacturing
7.4.1 Market size and forecast
7.5 Retail
7.5.1 Market size and forecast
7.6 Telecom and information technology
7.6.1 Market size and forecast
7.7 Others
7.7.1 Market size and forecast
CHAPTER 8 GLOBAL MSS MARKET BY GEOGRAPHY
8.1 North America
8.1.1 Key market trends
8.1.2 Competitive scenario
8.1.3 Key growth factors and opportunities
8.1.4 Market size and forecast
8.2 Europe
8.2.1 Key market trends
8.2.2 Competitive scenario
8.2.3 Key growth factors and opportunities
8.2.4 Market size and forecast
8.3 Asia Pacific
8.3.1 Key Market trends
8.3.2 Competitive scenario
8.3.3 Key growth factors and opportunities
8.3.4 Market size and forecast
8.4 Latin America, Middle East and Africa (LAMEA)
8.4.1 Key market trends
8.4.2 Competitive scenario
8.4.3 Key growth factors and opportunities
8.4.4 Market size and forecast
CHAPTER 9 COMPANY PROFILES
9.1 International Business Machines Corporation (IBM)
9.1.1 Company overview
9.1.2 Company Snapshot
9.1.1 Business Performance
9.1.2 Strategic Moves and Developments
9.1.3 SWOT Analysis and Strategic Conclusion of IBM Corp.
9.2 Hewlett Packard
9.2.1 Company Overview
9.2.2 Company Snapshot
9.2.3 Business performance
9.2.4 Strategic Moves and Developments
9.2.5 SWOT Analysis and Strategic Conclusion of Hewlett Packard
9.3 AT&T Inc.
9.3.1 Company overview
9.3.2 Company snapshot
9.3.3 Business performance
9.3.4 Strategic moves and developments
9.3.5 SWOT analysis and strategic conclusion of AT&T Inc.
9.4 Computer Science Corporation (CSC)
9.4.1 Company overview
9.4.2 Company snapshot
9.4.3 Business performance
9.4.4 Strategic moves and developments
9.4.5 SWOT analysis and strategic conclusion of CSC
9.5 Symantec Corporation
9.5.1 Company overview
9.5.2 Company snapshot
9.5.3 Business performance
9.5.4 Strategic moves and developments
9.5.5 SWOT analysis and strategic conclusion of Symantec Corp.
9.6 Dell SecureWorks Inc.
9.6.1 Company overview
9.6.2 Company snapshot
9.6.3 Business performance
9.6.4 Strategic moves and developments
9.6.5 SWOT analysis and strategic conclusion of Dell SecureWorks
9.7 Cisco Systems Inc.
9.7.1 Company overview
9.7.2 Company snapshot
9.7.3 Business performance
9.7.4 Strategic moves and developments
9.7.5 SWOT analysis and strategic conclusion of Cisco Systems Inc.
9.8 Fortinet Inc.
9.8.1 Company overview
9.8.2 Company snapshot
9.8.3 Business performance
9.8.4 Strategic moves and developments
9.8.5 SWOT analysis and strategic conclusion of Fortinet Inc.
9.9 Check Point Software Technologies Ltd.
9.9.1 Company overview
9.9.2 Company snapshot
9.9.3 Business performance
9.9.4 Strategic moves and developments
9.9.5 SWOT analysis and strategic conclusion of Check Point Software Technologies Ltd.
9.10 BT Group
9.10.1 Company overview
9.10.2 Company snapshot
9.10.3 Business performance
9.10.4 Strategic moves and developments
9.10.5 SWOT analysis and strategic conclusion of BT Group