株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

世界のハードウェア暗号化市場 - 市場機会・予測:2014-2020年

World Hardware Encryption Market - Opportunities and Forecasts, 2014 -2020

発行 Allied Market Research 商品コード 344782
出版日 ページ情報 英文 125 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=114.71円で換算しております。
Back to Top
世界のハードウェア暗号化市場 - 市場機会・予測:2014-2020年 World Hardware Encryption Market - Opportunities and Forecasts, 2014 -2020
出版日: 2015年10月01日 ページ情報: 英文 125 Pages
概要

ハードウェア暗号化は、デジタルデータを保護するためのハードウェアベースの技術です。暗号化には、ハードウェアベースの暗号化とソフトウェアベースの暗号化という、2つの形式が存在します。暗号化キーを生成するハードウェア暗号化では、乱数発生器を備えたプロセッサーが使われます。ハードウェアベースソリューションの主な利点は、メモリ内の暗号化キーを狙った攻撃による性能低下など、ソフトウェアベースソリューションにおける典型的な欠点を排除することにあります。ハードウェア暗号化においては、セキュリティーパラメーターおよび保護キーが、暗号化能力を強化します。ハードウェア暗号化は、データを効率的に保護する上で多様なアプリケーションを保持できる、コスト効率の良い手法です。

当レポートでは、世界のハードウェア暗号化市場を取り上げ、市場の概要、市場発展促進・阻害要因、市場機会、バリューチェーン分析を概括し、利用対象別・用途別・エンドユーザー別・地域別に市場の現状と見通しについて調査分析するとともに、主なベンダーのプロファイルをまとめています。

第1章 イントロダクション

  • 当レポートについて
  • 調査実施理由
  • 主な成果
  • 主な対象読者
  • 調査手法

第2章 エグゼクティブサマリー

  • CXOの視点

第3章 市場概要

  • 市場の定義と範囲
  • 主な調査結果
    • 最大影響要因
    • 最重要投資先分野
    • 最重要戦略
  • ポーターのファイブフォース分析
  • バリューチェーン分析
  • 市場シェア分析
  • 市場動態
    • 市場成長促進要因
      • データ侵害案件の件数増加と複雑化
      • コンプライアンス規制の拡大
      • 価格の低下
    • 市場成長阻害要因
      • 認識の欠如
      • 暗号化デバイスの利用を規制する国の存在
    • 市場機会
      • 暗号化チップにおける技術的発展

第4章 世界のハードウェア暗号化市場、利用対象別

  • イントロダクション
    • 市場規模・予測
  • ストレージデバイス (ハードディスクドライブおよびUSBフラッシュドライブ)
    • 主な市場動向
    • 競合シナリオ
    • 主な成長要因と市場機会
    • 市場規模・予測
  • ネットワーク
    • 主な市場動向
    • 競合シナリオ
    • 主な成長要因と市場機会
    • 市場規模・予測

第5章 世界のハードウェア暗号化市場、用途別

  • イントロダクション
    • 市場規模・予測
    • 医療部門
      • 市場規模・予測
    • 軍事・航空宇宙部門
      • 市場規模・予測
    • 自動車・輸送部門
      • 市場規模・予測
    • BFSI (銀行・金融サービス・保険)
      • 市場規模・予測
    • IT・通信
      • 市場規模・予測
    • その他 (小売、教育、個人ユーザー)
      • 市場規模・予測

第6章 世界のハードウェア暗号化市場、エンドユーザー別

  • イントロダクション
    • 市場規模・予測
    • 工業/商用
      • 市場規模・予測
    • 住宅
      • 市場規模・予測
    • 政府機関
      • 市場規模・予測

第7章 世界のハードウェア暗号化市場、地域別

  • イントロダクション
  • 北米
    • 主な市場動向
    • 競合シナリオ
    • 主な成長要因と市場機会
    • 市場規模・予測
  • 欧州
    • 主な市場動向
    • 競合シナリオ
    • 主な成長要因と市場機会
    • 市場規模・予測
  • アジア太平洋
    • 主な市場動向
    • 競合シナリオ
    • 主な成長要因と市場機会
    • 市場規模・予測
  • LAMEA (ラテンアメリカ・中東・アフリカ)
    • 主な市場動向
    • 競合シナリオ
    • 主な成長要因と市場機会
    • 市場規模・予測

第8章 企業プロファイル (企業概要、企業概観、業績、戦略的動向、SWOT分析)

  • Kingston Technology Corporation Inc.
  • Certes Networks Inc.
  • Seagate Technology LLC
  • 東芝
  • NetApp, Inc.
  • Micron Technology, Inc.
  • Samsung Electronics Co. Ltd.
  • Imation Corp.
  • SanDisk Corporation
  • Maxim Integrated Products, Inc.
  • International Business Machines Corporation (IBM)

図表リスト

目次

Title: World Hardware Encryption Market by Usage (Storage device and Network), Application (Healthcare Sector, Military & Aerospace Sector, Automotive & Transportation Sector, IT & Telecom and Others) and End User (Industrial and commercial, Residential, Government Agencies)- Global Opportunity Analysis and Industry Forecast, 2014 -2020.

Hardware Encryption is a hardware based technique that is used for securing digital data. There are two forms of encryption; hardware based encryption and software based encryption. Hardware encryption uses a processor that contains random number of generators to generate encryption key. The key advantage of hardware-based solutions is that they eliminate the typical drawbacks of software-based solutions such as performance degradation for attacks aimed at the encryption key stored in memory. In hardware encryption, the security parameters and safeguard keys enhance the performance of encryption. These security parameters protect the encryption from cold boots and brute force attacks. Hardware encryption is a cost effective method that holds diverse applications in securing data efficiently.

With the advancements in technology, leading market players are developing various hardware encrypted solutions to cater to the increasing demands in the storage industry. Product launch is identified as a prominent strategy in this market. For instance, in 2015, Toshiba Corporation introduced the Toshiba Encrypted USB Flash Drive that utilizes a hardware based encryption process in order to deliver a secure and affordable solution. This product is targeted at corporate enterprises and government agencies. Increasing regulatory compliances and the declining prices of hardware encryption devices majorly drive the growth of this market. Low awareness and limited adoption are key factors that hamper the market growth. However, integration with SOC (System On-Chip) would create numerous opportunities for the growth of the hardware encryption market.

The market is segmented on the basis of usage, application, end user and geography. The usage segment includes storage device (hard disk drives, USB flash drives) and network. The segment of hard disk drives accounted for the maximum revenue share, in 2014, and would go on to consolidate its position during the forecast period (2015-2020). The application segment is categorized into the healthcare, military & aerospace, automotive & transportation, BFSI, IT & telecom and others (retail, education and individual users). The end user segment is classified into industrial/commercial, residential, government agencies. Based on geography, the world hardware encryption market is segmented across North America, Europe, Asia-Pacific and LAMEA.

The leading players profiled in this report are Kingston Technology Corporation Inc., Seagate Technology LLC, NetApp, Inc., Certes Networks Inc., Micron Technology, Inc., SanDisk Corporation, Toshiba Corporation, Samsung Electronics Co. Ltd, Imation Corp., Maxim Integrated Products Inc. and International Business Machines Corporation (IBM)

POTENTIAL BENEFITS FOR STAKEHOLDERS:

  • The report provides an in-depth analysis of the hardware encryption market and offers current and future trends to identify lucrative investment pockets in the market
  • The report identifies the key drivers, opportunities and restraints that shape the market and provides an impact analysis for the forecast period
  • Porter's five forces analysis highlights the potency of buyers and suppliers participating in this market. This would further offer a competitive advantage to stakeholders in making profitable business decisions; thus, helping them to strengthen their supplier and buyer networks
  • Current and future trends are outlined to determine the overall attractiveness and highlight the profitable trends in order to gain a stronger foothold in the market
  • Market estimation of geographic segments is derived from the current market scenario and expected market trends

HARDWARE ENCRYPTION MARKET SEGMENTATION

The market is segmented on the basis of usage, application, end user and geography.

World Hardware Encryption Market-By Usage

  • Storage device
  • Hard disk drive
  • USB flash drives
  • Network

World Hardware Encryption Market-By Application

  • Healthcare Sector
  • Military & Aerospace Sector
  • Automotive & Transportation Sector
  • BFSI
  • IT & Telecom
  • Others (Retail , Education and Individual users)
  • World Hardware Encryption Market-By End User
  • Industrial/Commercial
  • Residential
  • Government Agencies

World Hardware Encryption Market-By Geography

  • North America
  • Europe
  • Asia-Pacific
  • LAMEA

KEY PLAYERS

  • Kingston Technology Corporation Inc.
  • Seagate Technology LLC
  • NetApp, Inc.
  • Certes Networks Inc.
  • Micron Technology, Inc.
  • SanDisk Corporation
  • Toshiba Corporation
  • Samsung Electronics Co. Ltd
  • Imation Corp.
  • Maxim Integrated Products Inc.
  • International Business Machines Corporation (IBM)

Table of Contents

CHAPTER 1: INTRODUCTION

  • 1.1. Report description
  • 1.2. Reasons for doing the study
  • 1.3. Key benefits
  • 1.4. Key market segmentation
  • 1.5. Key audience
  • 1.6. Research methodology
    • 1.6.1. Secondary research
    • 1.6.2. Primary research
    • 1.6.3. Analyst tools and models

CHAPTER 2: EXECUTIVE SUMMARY

  • 2.1. CXO perspective

CHAPTER 3: MARKET OVERVIEW

  • 3.1. Market definition and scope
  • 3.2. Key findings
    • 3.2.1. Top factors impacting the hardware encryption market
    • 3.2.2. Top winning strategies of hardware encryption market
    • 3.2.3. Top investment pockets of hardware encryption market
  • 3.3. Porters five forces
    • 3.3.1. Bargaining power of the suppliers
    • 3.3.2. Bargaining power of buyer
    • 3.3.3. Threat of substitution
    • 3.3.4. Threat of new entrant
    • 3.3.5. Competitive rivalry in the market
  • 3.4. Value chain analysis
  • 3.6. Market share analysis, 2014
  • 3.7. Market dynamics
    • 3.7.1. Drivers
      • 3.7.1.1. Growing number and complexity of data breaches
      • 3.7.1.2. Increased compliance regulations
      • 3.7.1.3. Reduced prices
    • 3.7.2. Restraints
      • 3.7.2.1. Lack of awareness
      • 3.7.2.2. Limiting the use of encrypted devices in some countries
    • 3.7.3. Opportunities
      • 3.7.3.1. Technological advancement on encryption chip

CHAPTER 4: WORLD HARDWARE ENCRYPTION MARKET BY USAGE

  • 4.1. Introduction
    • 4.1.1. Market size and forecast
  • 4.2. Storage device (hard disk drives and USB flash drives)
    • 4.2.1. Key market trends
    • 4.2.2. Competitive scenario
    • 4.2.3. Key growth factors and opportunities
    • 4.2.4. Market size and forecast
  • 4.3. Network
    • 4.3.1. Key market trends
    • 4.3.2. Competitive scenario
    • 4.3.3. Key growth factors and opportunities
    • 4.3.4. Market size and forecast

CHAPTER 5: WORLD HARDWARE ENCRYPTION MARKET BY APPLICATION

  • 5.1. Introduction
    • 5.1.1. Market size and forecast
    • 5.1.2. Healthcare sector
      • 5.1.2.1. Market size and forecast
    • 5.1.3. Military & aerospace sector
      • 5.1.3.1. Market size and forecast
    • 5.1.4. Automotive & transportation sector
      • 5.1.4.1. Market size and forecast
    • 5.1.5. BFSI
      • 5.1.5.1. Market size and forecast
    • 5.1.6. IT & Telecom
      • 5.1.6.1. Market size and forecast
    • 5.1.7. Others (retail, education and individual users)
      • 5.1.7.1. Market size and forecast

CHAPTER 6: WORLD HARDWARE ENCRYPTION MARKET BY END USER

  • 6.1. Introduction
    • 6.1.1. Market size and forecast
    • 6.1.2. Industrial/commercial
      • 6.1.2.1. Market size and forecast
    • 6.1.3. Residential
      • 6.1.3.1. Market size and forecast
    • 6.1.4. Government agencies
      • 6.1.4.1. Market size and forecast

CHAPTER 7: WORLD HARDWARE ENCRYPTION MARKET BY GEOGRAPHY

  • 7.1. Introduction
  • 7.2. North America
    • 7.2.1. Key market trends
    • 7.2.2. Competitive scenario
    • 7.2.3. Key growth factors and opportunities
    • 7.2.4. Market size and forecast
  • 7.3. Europe
    • 7.3.1. Key market trends
    • 7.3.2. Competitive scenario
    • 7.3.3. Key growth factors and opportunities
    • 7.3.4. Market size and forecast
  • 7.4. Asia-Pacific
    • 7.4.1. Key market trends
    • 7.4.2. Competitive scenario
    • 7.4.3. Key growth factors and opportunities
    • 7.4.4. Market size and forecast
  • 7.5. LAMEA
    • 7.5.1. Key market trends
    • 7.5.2. Competitive scenario
    • 7.5.3. Key growth factors and opportunities
    • 7.5.4. Market size and forecast

CHAPTER 8: COMPANY PROFILES

  • 8.1. Kingston Technology Corporation Inc.
    • 8.1.1. Company overview
    • 8.1.2. Company snapshot
    • 8.1.3. Strategic moves and developments
    • 8.1.4. SWOT analysis & strategic conclusions
  • 8.2. Certes Networks Inc.
    • 8.2.1. Company overview
    • 8.2.2. Company snapshot
    • 8.2.3. Strategic moves and developments
    • 8.2.4. SWOT analysis & strategic conclusions
  • 8.3. Seagate Technology LLC
    • 8.3.1. Company overview
    • 8.3.2. Company snapshot
    • 8.3.3. Business performance
    • 8.3.4. Strategic moves and developments
    • 8.3.5. SWOT analysis & strategic conclusions
  • 8.4. Toshiba Corporation
    • 8.3.1. Company overview
    • 8.3.2. Company snapshot
    • 8.3.3. Business performance
    • 8.3.4. Strategic moves and developments
    • 8.4.5. SWOT analysis & strategic conclusions
  • 8.5. NetApp, Inc.
    • 8.5.1. Company overview
    • 8.5.2. Company snapshot
    • 8.5.3. Business performance
    • 8.5.4. Strategic moves and developments
    • 8.5.5. SWOT analysis and strategic conclusion
  • 8.6. Micron Technology, Inc.
    • 8.6.1. Company overview
    • 8.6.2. Company snapshot
    • 8.6.3. Business performance
    • 8.6.4. Strategic moves and developments
    • 8.6.5. SWOT analysis and strategic conclusion
  • 8.7. Samsung Electronics Co. Ltd.
    • 8.7.1. Company overview
    • 8.7.2. Company snapshot
    • 8.7.3. Business performance
    • 8.7.4. Strategic moves and developments
    • 8.7.5. SWOT analysis and strategic conclusion
  • 8.8. Imation Corp.
    • 8.8.1. Company overview
    • 8.8.2. Company snapshot
    • 8.8.3. Business performance
    • 8.8.4. Strategic moves and developments
    • 8.8.5. SWOT analysis and strategic conclusion
  • 8.9. SanDisk Corporation
    • 8.9.1. Company overview
    • 8.9.2. Company snapshot
    • 8.9.3. Business performance
    • 8.9.4. Strategic moves and developments
    • 8.9.5. SWOT analysis and strategic conclusion
  • 8.10. Maxim Integrated Products, Inc.
    • 8.10.1. Company overview
    • 8.10.2. Company snapshot
    • 8.10.3. Business performance
    • 8.10.4. Strategic moves and developments
    • 8.10.5. SWOT analysis of maxim integrated products, Inc.
  • 8.11. International Business Machines Corporation (IBM)
    • 8.11.1. Company overview
    • 8.11.2. Company snapshot
    • 8.11.3. Business performance
    • 8.11.4. Strategic moves and developments
    • 8.11.5. SWOT Analysis of IBM Corp.

List of Tables

  • TABLE 1: WORLD HARDWARE ENCRYPTION MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 2: WORLD HARDWARE ENCRPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 3: HARD DISK DRIVES SHIPMENT, 2011-2014 ($MILLION)
  • TABLE 4: USB FLASH DRIVES SHIPMENT, 2010-2013 ($MILLION)
  • TABLE 5: WORLD HARDWARE STORAGE DEVICE (HARD DISK DRIVES & USB FLASH DRIVES) ENCRYPTION MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 6: WORLD HARDWARE NETWORK ENCRYPTION MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 7: WORLD HARDWARE ENCRPTION MARKET BY APPLICATION, 2014-2020 ($MILLION)
  • TABLE 8: HEALTHCARE SPENDING BY REGION ($MILLION)
  • TABLE 9: WORLD HARDWARE ENCRYPTION HEALTHCARE MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 10: MILITARY EXPENDITURE BY COUNTRY ($MILLION)
  • TABLE 11: WORLD HARDWARE ENCRYPTION MILITARY & AEROSPACE SECTOR MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 12: WORLD HARDWARE ENCRYPTION AUTOMOTIVE & TRANSPORTATION SECTOR MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 13: WORLD HARDWARE ENCRYPTION IT & TELECOM MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 14: WORLD HARDWARE ENCRYPTION BFSI MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 15: WORLD HARDWARE ENCRYPTION OTHERS (RETAIL, EDUCATION AND INDIVIDUAL USERS) MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 16: WORLD HARDWARE ENCRYPTION END USER MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 17: WORLD HARDWARE ENCYRPTION INDUSTRIAL/COMMERCIAL MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 18: WORLD HARDWARE ENCRYPTION RESIDENTIAL MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 19: WORLD HARDWARE ENCRYPTION GOVERNMENT AGENCIES MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 20: NORTH AMERICA HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 21: EUROPE HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 22: ASIA-PACIFIC HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 23: LAMEA HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 24: SNAPSHOT OF KINGSTON TECHNOLOGY CORPORATION
  • TABLE 25: SNAPSHOT OF CERTES NETWORKS INC.
  • TABLE 26: SNAPSHOT OF SEAGATE TECHNOLOGY LLC
  • TABLE 27: SNAPSHOT OF TOSHIBA CORPORATION
  • TABLE 28: SNAPSHOT OF NETAPP, INC.
  • TABLE 29: SNAPSHOT OF MICRON TECHNOLOGY, INC.
  • TABLE 30: SNAPSHOT OF SAMSUNG ELECTRONICS CO. LTD.
  • TABLE 31: SNAPSHOT OF IMATION CORP.
  • TABLE 32: SNAPSHOT OF SANDISK CORPORATION
  • TABLE 33: SNAPSHOT OF MAXIM INTEGRATED PRODUCTS, INC.
  • TABLE 34: SNAPSHOT OF IBM CORPORATION

List of Figures

  • FIG. 1: TOP IMPACTING FACTORS
  • FIG. 2: TOP WINNING STRATEGIES IN THE HARDWARE ENCRYPTION MARKET (2013-2015)
  • FIG. 3: TOP WINNING STRATEGIES (PERCENTAGE COMPARISON) (2013-2015)
  • FIG. 4: TOP INVESTMENT POCKETS
  • FIG. 5: PORTERS FIVE FORCES OF HARDWARE ENCRYPTION MARKET
  • FIG. 6: VALUE CHAIN ANALYSIS OF HARDWARE ENCRYPTION MARKET
  • FIG. 7: MARKET SHARE ANALYSIS OF HARDWARE ENCRYPTION MARKET, 2014
  • FIG. 8: GROWTH STAGE OF HARD DISK DIRIVES, USB FLASH DRIVES AND ENCRYPTED NETWORK
  • FIG. 9: HEALTHCARE R&D EXPENDITURE BY REGION (PERCENTAGE COMPARISION)
  • FIG. 10: WORLD VEHICLE PRODUCTION BY REGION (PERCENTAGE COMPARISION)
  • FIG. 11: REVENUE BY GEOGRAPHY (PERCENTAGE COMPARISION), 2014
  • FIG. 12: SWOT ANALYSIS OF KINGSTON TECHNOLOGY CORPORATION INC.
  • FIG. 13: SWOT ANALYSIS OF CERTES NETWORK INC.
  • FIG. 14: REVENUE OF SEAGATE TECHNOLOGY LLC, 2013 2015 ($MILLION)
  • FIG. 15: REVENUE OF SEAGATE TECHNOLOGY LLC BY GEOGRAPHY, 2015 (%)
  • FIG. 16: SWOT ANALYSIS OF SEAGATE TECHNOLOGY LLC
  • FIG. 17: NET SALES OF TOSHIBA CORPORATION, 2012 2014 ($MILLION)
  • FIG. 18: NET SALES OF TOSHIBA CORPORATION, BY OPERATING SEGMENTS, 2014 (%)
  • FIG. 19: NET SALES OF TOSHIBA CORPORATION, BY GEOGRAPHY, 2014 (%)
  • FIG. 20: SWOT ANALYSIS OF TOSHIBA CORPORATION
  • FIG. 21: REVENUE OF NETAPP, INC., 2013-2015 ($MILLION)
  • FIG. 22: REVENUE OF NETAPP, INC., BY GEOGRAPGY, 2015 (%)
  • FIG. 23: SWOT ANALYSIS OF NETAPP, INC.
  • FIG. 24: NET SALES OF MICRON TECHNOLOGY, INC., 2012-2014 ($MILLION)
  • FIG. 25: NET SALES OF MICRON TECHNOLOGY, INC. BY BUSINESS SEGMENT, 2014 (%)
  • FIG. 26: NET SALES E OF MICRON TECHNOLOGY, INC. BY GEOGRAPHY, 2014 (%)
  • FIG. 27: SWOT ANALYSIS OF MICRON TECHNOLOGY, INC.
  • FIG. 28: REVENUE OF SAMSUNG ELECTRONICS CO. LTD., 2012-2014 ($MILLION)
  • FIG. 29: SWOT ANALYSIS OF SAMSUNG ELECTRONICS CO. LTD.
  • FIG. 30: REVENUE OF IMATION CORP., 2012-2014 ($MILLION)
  • FIG. 31: REVENUE OF IMATION CORP. BY BUSINESS SEGMENT, 2014 (%)
  • FIG. 32: SWOT ANALYSIS OF IMATION CORP.
  • FIG. 33: REVENUE OF SANDISK CORPORATION, 2012-2014 ($MILLION)
  • FIG. 34: REVENUE OF SANDISK CORPORATION BY GEOGRAPHY, 2014 (%)
  • FIG. 35: SWOT ANALYSIS OF. SANDISK CORPORATION
  • FIG. 36: REVENUE OF MAXIM INTEGRATED PRODUCTS, INC, 2013-2015 ($MILLION)
  • FIG. 37: REVENUE OF MAXIM INTEGRATED PRODUCTS BY GEOGRAPHY, 2015 (%)
  • FIG. 38: SWOT ANALYSIS OF MAXIM INTEGRATED PRODUCTS, INC.
  • FIG. 39: REVENUE OF IBM CORPORATION, 2012-2014 ($MILLION)
  • FIG. 40: REVENUE OF IBM CORPORATION, BY BUSINESS SEGMENT, 2014 (%)
  • FIG. 41: REVENUE OF IBM CORPORATION, BY GEOGRAPHY, 2014 (%)
  • FIG. 42: SWOT ANALYSIS OF IBM CORPORATION
Back to Top