CHAPTER 1 INTRODUCTION
1.1 Report description
1.2 Key benefits
1.3 Key market segments
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
2.1 CXO perspective
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.2 Key findings
3.2.1 Top impacting factors
3.2.1.1 Increasing malware and phishing threats among enterprises
3.2.1.2 Rising bring-your-own-device implementation
3.2.1.3 Stringent industry standards and regulations
3.2.1.4 Strong inclination towards cloud-based solutions
3.2.2 Top winning strategies
3.2.3 Top investment pockets
3.3 Value chain analysis
3.4 Porters five forces analysis
3.4.1 Moderate bargaining power of suppliers
3.4.2 High threat of new entrants
3.4.3 Moderate threat of substitutes
3.4.4 High competitive rivalry
3.4.5 Moderate bargaining power of buyers
3.5 Market share analysis, 2015
3.6 Drivers
3.6.1 Rise in malware and phishing threats among enterprises
3.6.2 Increasing adoption of IoT and BYOD trend
3.6.3 Growing demand for cloud-based cyber security solutions
3.7 Restraints
3.7.1 Constant need to conform to industry standards and regulations
3.7.2 Complexities of device security
3.8 Opportunities
3.8.1 Increase in adoption of mobile device applications and platforms
3.8.2 Need for strong authentication methods
3.8.3 Transformation in traditional anti-virus software industry
3.9 Challenges
3.9.1 Budget constraints among organizations
3.9.2 Lack of security awareness among enterprises
CHAPTER 4 GLOBAL CYBER SECURITY MARKET, BY SOLUTION
4.1 Market size and forecast
4.2 Risk and compliance
4.2.1 Key market trends
4.2.2 Key growth factors and opportunities
4.2.3 Market size and forecast
4.3 Unified threat management
4.3.1 Key market trends
4.3.2 Key growth factors and opportunities
4.3.3 Market size and forecast
4.4 Security incident management
4.4.1 Key market trends
4.4.2 Key growth factors and opportunities
4.4.3 Market size and forecast
4.5 Identity and access management
4.5.1 Key market trends
4.5.2 Key growth factors and opportunities
4.5.3 Market size and forecast
4.6 Encryption
4.6.1 Key market trends
4.6.2 Key growth factors and opportunities
4.6.3 Market size and forecast
4.7 Intrusion prevention systems
4.7.1 Key market trends
4.7.2 Key growth factors and opportunities
4.7.3 Market size and forecast
4.8 Others
4.8.1 Key market trends
4.8.2 Key growth factors and opportunities
4.8.3 Market size and forecast
CHAPTER 5 GLOBAL CYBER SECURITY MARKET, BY SERVICES
5.1 Market size and forecast
5.2 Professional services
5.2.1 Key market trends
5.2.2 Key growth factors and opportunities
5.2.3 Market size and forecast
5.3 Managed services
5.3.1 Key market trends
5.3.2 Key growth factors and opportunities
5.3.3 Market size and forecast
CHAPTER 6 GLOBAL CYBER SECURITY MARKET, BY DEPLOYMENT TYPE
6.1 Market size and forecast
6.2 Cloud
6.2.1 Key market trends
6.2.2 Key growth factors & opportunities
6.2.3 Market size and forecast
6.3 On-premises
6.3.1 Key market trends
6.3.2 Key growth factors & opportunities
6.3.3 Market size and forecast
CHAPTER 7 GLOBAL CYBER SECURITY MARKET, BY USER TYPE
7.1 Market size and forecast
7.2 Large enterprises
7.2.1 Key market trends
7.2.2 Key growth factors and opportunities
7.2.3 Market size and forecast
7.3 Small and medium enterprises (SMEs)
7.3.1 Key market trends
7.3.2 Key growth factors and opportunities
7.3.3 Market size and forecast
CHAPTER 8 GLOBAL CYBER SECURITY MARKET, BY INDUSTRY VERTICAL
8.1 Market size and forecast
8.2 Aerospace and defense
8.2.1 Key market trends
8.2.2 Key growth factors and opportunities
8.2.3 Market size and forecast
8.3 Banking, financial services, and insurance (BFSI)
8.3.1 Key market trends
8.3.2 Key growth factors and opportunities
8.3.3 Market size and forecast
8.4 Public sector
8.4.1 Key market trends
8.4.2 Key growth factors and opportunities
8.4.3 Market size and forecast
8.5 Retail
8.5.1 Key market trends
8.5.2 Key growth factors and opportunities
8.5.3 Market size and forecast
8.6 Healthcare
8.6.1 Key market trends
8.6.2 Key growth factors and opportunities
8.6.3 Market size and forecast
8.7 IT and telecom
8.7.1 Key market trends
8.7.2 Key growth factors and opportunities
8.7.3 Market size and forecast
8.8 Energy and utilities
8.8.1 Key market trends
8.8.2 Key growth factors and opportunities
8.8.3 Market size and forecast
8.9 Manufacturing
8.9.1 Key market trends
8.9.2 Key growth factors and opportunities
8.9.3 Market size and forecast
8.10 Others
8.10.1 Key market trends
8.10.2 Key growth factors and opportunities
8.10.3 Market size and forecast
CHAPTER 9 GLOBAL CYBER SECURITY MARKET, BY GEOGRAPHY
9.1 Market size and forecast
9.2 North America
9.2.1 Key market trends
9.2.2 Key growth factors and opportunities
9.2.3 Market size and forecast
9.2.4 U.S.
9.2.4.1 Market size & forecast
9.2.5 Canada
9.2.5.1 Market size & forecast
9.2.6 Mexico
9.2.6.1 Market size & forecast
9.3 Europe
9.3.1 Key market trends
9.3.2 Key growth factors and opportunities
9.3.3 Market size and forecast
9.3.4 U.K.
9.3.4.1 Market size & forecast
9.3.5 Germany
9.3.5.1 Market size & forecast
9.3.6 France
9.3.6.1 Market size & forecast
9.3.7 Russia
9.3.7.1 Market size & forecast
9.3.8 Rest of Europe
9.3.8.1 Market size & forecast
9.4 Asia-Pacific
9.4.1 Key market trends
9.4.2 Key growth factors and opportunities
9.4.3 Market size and forecast
9.4.4 Australia
9.4.4.1 Market size & forecast
9.4.5 Japan
9.4.5.1 Market size & forecast
9.4.6 China
9.4.6.1 Market size & forecast
9.4.7 India
9.4.7.1 Market size & forecast
9.4.8 Rest of Asia-Pacific
9.4.8.1 Market size & forecast
9.5 LAMEA
9.5.1 Key market trends
9.5.2 Key growth factors and opportunities
9.5.3 Market size and forecast
9.5.4 Latin America
9.5.4.1 Market size & forecast
9.5.5 Middle East
9.5.5.1 Market size & forecast
9.5.6 Africa
9.5.6.1 Market size & forecast
CHAPTER 10 COMPANY PROFILES
10.1 Cisco Systems
10.1.1 Company overview
10.1.2 Company snapshot
10.1.3 Business performance
10.1.4 Strategic moves & developments
10.2 Dell EMC (RSA)
10.2.1 Company overview
10.2.2 Company snapshot
10.2.3 Financial performance
10.2.4 Strategic moves & developments
10.3 FireEye, Incorporated
10.3.1 Company overview
10.3.2 Company snapshot
10.3.3 Financial performance
10.3.4 Strategic moves & developments
10.4 Hewlett Packard Enterprise (HPE)
10.4.1 Company overview
10.4.2 Company snapshot
10.4.3 Financial performance
10.4.4 Strategic moves & developments
10.5 International Business Machine (IBM) Corporation
10.5.1 Company overview
10.5.2 Company snapshot
10.5.3 Financial performance
10.5.4 Strategic moves & developments
10.6 Intel Corporation
10.6.1 Company overview
10.6.2 Company snapshot
10.6.3 Financial performance
10.6.4 Strategic moves & developments
10.7 Sophos
10.7.1 Company overview
10.7.2 Company snapshot
10.7.3 Financial performance
10.7.4 Strategic moves & developments
10.8 Symantec Corporation
10.8.1 Company overview
10.8.2 Company snapshot
10.8.3 Financial performance
10.8.4 Strategic moves & developments
10.9 Trend Micro Incorporated
10.9.1 Company overview
10.9.2 Company snapshot
10.9.3 Financial performance
10.9.4 Strategic moves & developments
10.10 Verizon Communications
10.10.1 Company overview
10.10.2 Company snapshot
10.10.3 Financial performance
10.10.4 Strategic moves & developments