psalexa
logo

Cyber Security Market

Cyber Security Market by Component (Solution, Service), by Security Type (Application, Network, End-Point, Cloud, Wireless), by Deployment Type (On-Premises, Cloud), by Organization Size (Large Enterprises, Small and Medium Enterprises), by Vertical (Aerospace & Defense, Government & Public Utility, BFSI, Healthcare, Retail, IT & Telecom, Manufacturing), by Geography (US, Canada, UK, Russia, Ireland, China, India, Australia, South Korea, South Africa, Nigeria, Kenya, Morocco, Brazil and Mexico) - Global Market Size, Share, Development, Growth and Demand Forecast, 2013-2023

Published: May 2017
Report Code: IM10316
Available Format: excel
Category : IT Security

Chapter 1. Research Background

1.1. Research Objectives

1.2. Market Definition

1.3. Research Scope

1.3.1. Market Segmentation by Component

1.3.2. Market Segmentation by Security Type

1.3.3. Market Segmentation by Deployment Type

1.3.4. Market Segmentation by Organization Size

1.3.5. Market Segmentation by Vertical

1.3.6. Market Segmentation by Geography

1.3.7. Analysis Period

1.3.8. Market Data Reporting Unit

1.3.8.1. Value

1.4. Key Stakeholders

Chapter 2. Research Methodology

2.1. Secondary Research

2.2. Primary Research

2.2.1. Breakdown of Primary Research Respondents

2.2.1.1. By region

2.2.1.2. By industry participant

2.2.1.3. By company type

2.3. Market Size Estimation

2.4. Data Triangulation

2.5. Assumptions for the Study

Chapter 3. Executive Summary

Chapter 4. Introduction

4.1. Definition of Market Segments

4.1.1. By Component

4.1.1.1. Solution

4.1.1.1.1. Risk & compliance management

4.1.1.1.2. Identity & access management

4.1.1.1.3. Firewall

4.1.1.1.4. Security & vulnerability management

4.1.1.1.5. Encryption

4.1.1.1.6. Intrusion detection system/ intrusion prevention system

4.1.1.1.7. Unified threat management

4.1.1.1.8. Disaster recovery

4.1.1.1.9. Web filtering

4.1.1.1.10. Distributed denial of service mitigation

4.1.1.1.11. Antivirus / Antimalware

4.1.1.1.12. Data loss prevention

4.1.1.2. Service

4.1.1.2.1. Managed

4.1.1.2.2. Professional

4.1.2. By Security Type

4.1.2.1. Application

4.1.2.2. Network

4.1.2.3. End-Point

4.1.2.4. Cloud

4.1.2.5. Wireless

4.1.2.6. Others

4.1.3. By Deployment Type

4.1.3.1. Cloud

4.1.3.2. On-premises

4.1.4. By Organization Size

4.1.4.1. Large Enterprises

4.1.4.2. Small and Medium Enterprises

4.1.5. By Vertical

4.1.5.1. Aerospace and Defence

4.1.5.2. Government and Public Utilities

4.1.5.3. Banking, Financial Services and Insurance (BFSI)

4.1.5.4. Healthcare

4.1.5.5. Retail

4.1.5.6. IT and Telecom

4.1.5.7. Manufacturing

4.1.5.8. Others

4.2. Value Chain Analysis

4.3. Market Dynamics

4.3.1. Trends

4.3.2. Drivers

4.3.2.1. Drivers

4.3.2.2. Impact analysis of drivers on market forecast

4.3.3. Restraints

4.3.3.1. Restraints

4.3.3.2. Impact analysis of restraints on market forecast

4.3.4. Opportunities

4.4. Porter’s Five Forces Analysis

Chapter 5. Global Market Size and Forecast

5.1. By Component

5.1.1. Solution

5.1.1.1. Risk & Compliance Management

5.1.1.2. Identity & Access Management

5.1.1.3. Firewall

5.1.1.4. Security & Vulnerability Management

5.1.1.5. Encryption

5.1.1.6. Intrusion Detection System/ Intrusion Prevention System

5.1.1.7. Unified Threat Management

5.1.1.8. Disaster Recovery

5.1.1.9. Web Filtering

5.1.1.10. Distributed Denial of Service Mitigation

5.1.1.11. Antivirus / Antimalware

5.1.1.12. Data Loss Prevention

5.1.2. Service

5.1.2.1. Managed

5.1.2.2. Professional

5.2. By Security Type

5.2.1. Application

5.2.2. Network

5.2.3. End-Point

5.2.4. Cloud

5.2.5. Wireless

5.2.6. Others

5.3. By Deployment Type

5.3.1. On-premises

5.3.2. Cloud

5.4. By Organization Size

5.4.1. Large enterprises

5.4.2. Small & Medium enterprises

5.5. By Vertical

5.5.1. Aerospace and Defence

5.5.2. Government and Public Utilities

5.5.3. Banking, Financial Services and Insurance

5.5.4. Healthcare

5.5.5. Retail

5.5.6. IT and Telecom

5.5.7. Manufacturing

5.5.8. Others

5.6. By Region

5.6.1. North America

5.6.2. Europe

5.6.3. Asia-Pacific

5.6.4. Middle-East & Africa

5.6.5. Latin America

Chapter 6. North America Market Size and Forecast

6.1. By Component

6.2. By Security Type

6.3. By Deployment Type

6.4. By Organization Size

6.5. By Vertical

6.6. By Country – U.S., Canada

Chapter 7. Europe Market Size and Forecast

7.1. By Component

7.2. By Security Type

7.3. By Deployment Type

7.4. By Organization Size

7.5. By Vertical

7.6. By Country – The U.K., Russia, Ireland, Others

Chapter 8. Asia-Pacific Market Size and Forecast

8.1. By Component

8.2. By Security Type

8.3. By Deployment Type

8.4. By Organization Size

8.5. By Vertical

8.6. By Country – China, Australia, India, South Korea Others

Chapter 9. Middle-East & Africa Market Size and Forecast

9.1. By Component

9.2. By Security Type

9.3. By Deployment Type

9.4. By Organization Size

9.5. By Vertical

9.6. By Country – South Africa, Nigeria, Kenya, Morocco, Others

Chapter 10. Latin America Market Size and Forecast

10.1. By Component

10.2. By Security Type

10.3. By Deployment Type

10.4. By Organization Size

10.5. By Vertical

10.6. By Country – Brazil, Mexico, Others

Chapter 11. Competitive Landscape

11.1. Competitive Analysis of Key Players

11.2. Global Strategic Developments of Key Players

Chapter 12. Company Profiles

12.1. Lancope Inc.

12.1.1. Business Overview

12.1.2. Product and Service Offerings

12.1.3. Key Financial Summary

12.1.4. Strategic Growth Plans

12.2. FireEye Inc.

12.2.1. Business Overview

12.2.2. Product and Service Offerings

12.2.3. Key Financial Summary

12.2.4. Strategic Growth Plans

12.3. AlienVault Inc.

12.3.1. Business Overview

12.3.2. Product and Service Offerings

12.3.3. Key Financial Summary

12.3.4. Strategic Growth Plans

12.4. Easy Solutions Inc.

12.4.1. Business Overview

12.4.2. Product and Service Offerings

12.4.3. Key Financial Summary

12.4.4. Strategic Growth Plans

12.5. IBM Corporation

12.5.1. Business Overview

12.5.2. Product and Service Offerings

12.5.3. Key Financial Summary

12.5.4. Strategic Growth Plans

12.6. Intel Corporation

12.6.1. Business Overview

12.6.2. Product and Service Offerings

12.6.3. Key Financial Summary

12.6.4. Strategic Growth Plans

12.7. Veracode Inc.

12.7.1. Business Overview

12.7.2. Product and Service Offerings

12.7.3. Key Financial Summary

12.7.4. Strategic Growth Plans

12.8. RSA

12.8.1. Business Overview

12.8.2. Product and Service Offerings

12.8.3. Key Financial Summary

12.8.4. Strategic Growth Plans

12.9. Trend Micro Incorporated

12.9.1. Business Overview

12.9.2. Product and Service Offerings

12.9.3. Key Financial Summary

12.9.4. Strategic Growth Plans

12.10. Lockheed Martin Corporation

12.10.1. Business Overview

12.10.2. Product and Service Offerings

12.10.3. Key Financial Summary

12.10.4. Strategic Growth Plans

*Note: Key financial summary and strategic growth plans will be provided on best effort basis and is subject to availability of information during primary and secondary research.

Chapter 13. Appendix

13.1. Abbreviations

Place An Order

Single User License
question-mark

The report will be delivered in PDF format without printing rights. It is recommended for a single user.

USD 3700
Group License
question-mark

The report will be delivered in PDF format along with the printing rights. It is recommended for up to five users.

USD 4400
Enterprise License
question-mark

The report will be delivered in PDF format along with printing rights and detailed Excel sheet. It is recommended for organizations where multiple people would like to access the report from multiple locations.

USD 8400

Pre-Purchase Enquiry