TABLE OF CONTENTS
1 EXECUTIVE SUMMARY
1.1 OVERVIEW 13
1.1.1 MARKET SYNOPSIS 13
2 MARKET INTRODUCTION
2.1 SCOPE OF THE STUDY 14
2.2 RESEARCH OBJECTIVE 14
2.3 LIST OF ASSUMPTIONS 15
3 RESEARCH METHODOLOGY
3.1 OVERVIEW 17
3.2 DATA MINING 17
3.3 SECONDARY RESEARCH 18
3.4 PRIMARY RESEARCH 19
3.4.1 PRIMARY INTERVIEWS AND INFORMATION GATHERING PROCESS 19
3.4.2 BREAKDOWN OF PRIMARY RESPONDENTS 20
3.5 FORECASTING TECHNIQUES 20
3.6 RESEARCH METHODOLOGY FOR MARKET SIZE ESTIMATION 21
3.6.1 BOTTOM-UP APPROACH 22
3.6.2 TOP-DOWN APPROACH 23
3.7 DATA TRIANGULATION 24
3.8 VALIDATION 24
4 MARKET DYNAMICS
4.1 OVERVIEW 25
4.2 DRIVERS 26
4.2.1 INCREASE IN CYBERATTACKS AND DATA BREACHING 26
4.2.2 REGULATORY AND GOVERNMENT NORMS 26
4.2.3 INCREASING USE OF INTERNET OF THINGS (IOT) DEVICES IN THE HEALTHCARE INDUSTRY 26
4.2.4 DRIVERS IMPACT ANALYSIS 27
4.3 RESTRAINTS 27
4.3.1 LIMITED AWARENESS OF CYBER SECURITY IN THE HEALTHCARE INDUSTRY 27
4.3.2 LACK OF ADOPTION OF UPDATED SOFTWARE 27
4.3.3 RESTRAINTS IMPACT ANALYSIS 28
4.4 OPPORTUNITY 28
4.4.1 IMPROVED DATA PRIVACY AND SECURITY EMPLOYEE TRAINING PROGRAMS 28
5 MARKET FACTOR ANALYSIS
5.1 PORTER'S FIVE FORCES MODEL 29
5.1.1 BARGAINING POWER OF SUPPLIERS 30
5.1.2 BARGAINING POWER OF BUYERS 30
5.1.3 THREAT OF NEW ENTRANTS 30
5.1.4 THREAT OF SUBSTITUTES 30
5.1.5 INTENSITY OF RIVALRY 30
5.2 VALUE CHAIN ANALYSIS 31
5.2.1 INPUTS 32
5.2.2 SOFTWARE DEVELOPMENT PROCESSES 32
5.2.3 OUTPUT 32
5.2.4 MARKETING AND DISTRIBUTION 32
5.2.5 POST-SALES SERVICES 32
5.3 INVESTMENT OPPORTUNITY ANALYSIS 33
5.4 PRICING ANALYSIS 33
6 GLOBAL HEALTHCARE CYBER SECURITY MARKET, BY THREAT TYPE
6.1 OVERVIEW 34
6.2 MALWARE 35
6.3 DISTRIBUTED DENIAL-OF-SERVICE (DDOS) 35
6.4 ADVANCED PERSISTENT THREAT (APT) 36
6.5 OTHERS 36
7 GLOBAL HEALTHCARE CYBER SECURITY MARKET, BY SOLUTION TYPE
7.1 OVERVIEW 37
7.2 ANTIVIRUS AND ANTIMALWARE 39
7.3 RISK AND COMPLIANCE MANAGEMENT 39
7.4 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) 40
7.5 DDOS MITIGATION 40
7.6 IDENTITY AND ACCESS MANAGEMENT 41
7.7 OTHERS 41
8 GLOBAL HEALTHCARE CYBER SECURITY MARKET, BY END USER
8.1 OVERVIEW 42
8.2 HOSPITALS AND CLINICS 43
8.3 PHARMACEUTICALS AND BIOTECHNOLOGY INDUSTRIES 44
8.4 HEALTH INSURANCE COMPANIES 44
8.5 MEDICAL DEVICES COMPANIES 45
8.6 OTHERS 45
9 GLOBAL HEALTHCARE CYBER SECURITY MARKET, BY REGION
9.1 OVERVIEW 46
9.2 AMERICAS 48
9.2.1 NORTH AMERICA 50
9.2.2 LATIN AMERICA 55
9.3 EUROPE 57
9.3.1 WESTERN EUROPE 59
9.3.2 EASTERN EUROPE 70
9.4 ASIA-PACIFIC 72
9.4.1 JAPAN 74
9.4.2 CHINA 76
9.4.3 INDIA 77
9.4.4 AUSTRALIA 79
9.4.5 SOUTH KOREA 80
9.4.6 REST OF ASIA-PACIFIC 82
9.5 MIDDLE EAST & AFRICA 84
9.5.1 MIDDLE EAST 86
9.5.2 AFRICA 87
10 COMPETITIVE LANDSCAPE
10.1 OVERVIEW 89
10.2 COMPANY RANKING ANALYSIS 89
10.3 COMPETITIVE BENCHMARKING 90
10.4 LEADING PLAYERS IN TERMS OF NUMBER OF DEVELOPMENTS 91
10.5 KEY DEVELOPMENT ANALYSIS 91
10.5.1 ACQUISITION 92
10.5.2 EXPANSION 93
10.5.3 PARTNERSHIP/COLLABORATION 93
10.5.4 PRODUCT LAUNCH 94
11 COMPANY PROFILE
11.1 IBM 95
11.1.1 COMPANY OVERVIEW 95
11.1.2 FINANCIAL OVERVIEW 95
11.1.3 PRODUCTS/SERVICES OFFERED 96
11.1.4 KEY DEVELOPMENTS 96
11.1.5 SWOT ANALYSIS 97
11.1.6 KEY STRATEGIES 97
11.2 CISCO SYSTEMS, INC. 98
11.2.1 COMPANY OVERVIEW 98
11.2.2 FINANCIAL OVERVIEW 98
11.2.3 PRODUCTS/SERVICES OFFERED 99
11.2.4 KEY DEVELOPMENTS 99
11.2.5 SWOT ANALYSIS 100
11.2.6 KEY STRATEGIES 100
11.3 MCAFEE, LLC 101
11.3.1 COMPANY OVERVIEW 101
11.3.2 FINANCIAL OVERVIEW 101
11.3.3 PRODUCTS/SERVICES OFFERED 101
11.3.4 KEY DEVELOPMENTS 101
11.3.5 SWOT ANALYSIS 102
11.3.6 KEY STRATEGIES 102
11.4 SYMANTEC CORPORATION 103
11.4.1 COMPANY OVERVIEW 103
11.4.2 FINANCIAL OVERVIEW 103
11.4.3 PRODUCTS/SERVICES OFFERED 104
11.4.4 KEY DEVELOPMENTS 104
11.4.5 SWOT ANALYSIS 105
11.4.6 KEY STRATEGIES 105
11.5 FIREEYE, INC. 106
11.5.1 COMPANY OVERVIEW 106
11.5.2 FINANCIAL OVERVIEW 106
11.5.3 PRODUCTS/SERVICES OFFERED 107
11.5.4 KEY DEVELOPMENTS 107
11.5.5 SWOT ANALYSIS 108
11.5.6 KEY STRATEGIES 108
11.6 PALO ALTO NETWORKS, INC. 109
11.6.1 COMPANY OVERVIEW 109
11.6.2 FINANCIAL OVERVIEW 109
11.6.3 PRODUCTS/SERVICES OFFERED 110
11.6.4 KEY DEVELOPMENTS 110
11.6.5 SWOT ANALYSIS 111
11.6.6 KEY STRATEGIES 111
11.7 SENSATO CYBERSECURITY SOLUTIONS 112
11.7.1 COMPANY OVERVIEW 112
11.7.2 FINANCIAL OVERVIEW 112
11.7.3 PRODUCTS/SERVICES OFFERED 112
11.7.4 KEY DEVELOPMENTS 112
11.7.5 SWOT ANALYSIS 113
11.7.6 KEY STRATEGIES 113
11.8 TREND MICRO INCORPORATED 114
11.8.1 COMPANY OVERVIEW 114
11.8.2 FINANCIAL OVERVIEW 114
11.8.3 PRODUCTS/SERVICES OFFERED 115
11.8.4 KEY DEVELOPMENTS 115
11.8.5 SWOT ANALYSIS 116
11.8.6 KEY STRATEGIES 116
11.9 DXC TECHNOLOGY COMPANY 117
11.9.1 COMPANY OVERVIEW 117
11.9.2 FINANCIAL OVERVIEW 117
11.9.3 PRODUCTS/SERVICES OFFERED 118
11.9.4 KEY DEVELOPMENTS 118
11.9.5 SWOT ANALYSIS 119
11.9.6 KEY STRATEGIES 119
11.10 BOOZ ALLEN HAMILTON INC. 120
11.10.1 COMPANY OVERVIEW 120
11.10.2 FINANCIAL OVERVIEW 120
11.10.3 PRODUCTS/SERVICES OFFERED 121
11.10.4 KEY DEVELOPMENTS 121
11.10.5 SWOT ANALYSIS 122
11.10.6 KEY STRATEGIES 122
12 APPENDIX
12.1 REFERENCES 123
12.2 RELATED REPORTS 123