株式会社グローバルインフォメーション
TEL: 044-952-0102
市場調査レポート

サイバーセキュリティの世界市場

Cyber Security

発行 Global Industry Analysts, Inc. 商品コード 236855
出版日 ページ情報 英文 457 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=115.18円で換算しております。

ご注意:Single user licenseはDRM(デジタル著作権管理システム)付PDFとなります。
PDFの閲覧には Adobe Digital Editions (無償)のインストールが必要となります。
認証されたPC上のみでの閲覧と、1回のプリントアウトが可能となっております。

Back to Top
サイバーセキュリティの世界市場 Cyber Security
出版日: 2014年06月01日 ページ情報: 英文 457 Pages
概要

本レポートは、世界のサイバーセキュリティ市場について調査し、製品セグメント(アプリケーションセキュリティ、コンテンツセキュリティ、エンドポイントセキュリティ、ネットワークセキュリティ、サービスおよびその他)別の分析、エンドユーザー部門(銀行・金融部門、公共部門・航空宇宙、医療部門、製造部門、IT&通信部門およびその他)別の分析、主要地域・国別の包括的な分析、および主要企業244社のプロファイルなどをまとめ、お届けいたします。

第1章 イントロダクション・調査手法・製品定義

第2章 エグゼクティブサマリー

  • 産業概要
    • インターネット・現代のデジタルインフラ
    • 主要統計の調査結果
    • 展望、ほか
  • 注目の動向・成長促進因子・課題
    • 主な動向・成長促進因子
    • 主な課題
  • 主要製品・セグメントのレビュー
    • ネットワークセキュリティソリューション市場:最大の市場セグメント
    • 内部ネットワークインフラのセキュリティ:あらゆるビジネスにとっての必要性
    • コンテンツセキュリティ:有望な市場セグメント
    • セキュアコンテンツ管理は突出して成長
    • エンドポイントセキュリティ市場は安定した需要を維持
    • アプリケーションセキュリティ市場
    • ID&アクセス管理ソリューション
    • リスク&コンプライアンス管理
    • データ暗号化ソリューションは引き続き力強い成長を経験
    • メッセージングセキュリティ(Eメールスキャニング)の需要は引き続き成長する見込み
    • データ紛失防止の重要性の拡大
    • 統合脅威管理(UTM)
    • インターネットフィルタリングソリューション:ゲートウェイでの保護
    • SSL暗号化アプリケーションの開発の増加、ほか
  • 競合情勢
    • サイバーセキュリティ市場における統合の波
    • 主な市場シェアの調査結果
  • 製品概要
  • 製品・サービス開始
  • 近年の産業活動
  • 主要企業へのフォーカス
  • 世界市場の展望

第3章 市場

  • 米国
    • 市場分析
  • カナダ
    • 市場分析
  • 日本
    • 市場分析
  • 欧州
    • 市場分析
    • フランス
    • ドイツ
    • イタリア
    • 英国
    • スペイン
    • ロシア
    • その他の欧州
  • アジア太平洋地域
    • 市場分析
    • 中国
    • インド
    • その他のアジア太平洋地域
  • ラテンアメリカ
    • ブラジル
    • その他のラテンアメリカ
  • 世界のその他
    • 市場分析

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次
Product Code: MCP-6144

This report analyzes the worldwide markets for Cyber Security in US$ Million by the following Product Segments: Application Security, Content Security, Endpoint Security, Network Security, Services, and Others. The market is also analyzed by the following End-Use sectors: Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector, and Others. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. Also, a seven-year historic analysis is provided for these markets. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 244 companies including many key and niche players such as -

AVG Technologies
Booz Allen Hamilton
CA Technologies, Inc.
Cisco Systems, Inc.
Deloitte LLP

Table of Contents

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

  • Study Reliability and Reporting Limitations
  • Disclaimers
  • Data Interpretation & Reporting Level
    • Quantitative Techniques & Analytics
  • Product Definitions and Scope of Study
    • 1. Application Security
    • 2. Content Security
    • 3. Endpoint Security
    • 4. Network Security
    • 5. Services
    • 6. Others

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW

  • Internet & the Modern Digital Infrastructure
  • Key Statistical Findings
    • Table 1: Number of Internet Users (in Million) and Penetration Percentage for Years 2001, 2011 & 2013 (includes corresponding Graph/Chart)
    • Table 2: Global Internet Market (2013): Percentage Share Breakdown of Number of Internet Users by Country (includes corresponding Graph/Chart)
  • Internet Opens Up a Range of Online Security Issues, Brings Importance of 'Cyber Security' to the Forefront
  • Avoiding Unnecessary Costs - Key Rationale for Adoption of Cyber Security Solutions
  • Periods of Economic Slowdown Increases Cyber Crime Attacks - Magnifies the Business Case for Cyber Security
  • Outlook
  • Developing Regions to Lend Traction to Cyber Security Market
    • Table 3: Global Internet Market (2013): Percentage Share Breakdown of Number of Internet Users by Region (includes corresponding Graph/Chart)

2. NOTEWORTHY TRENDS, GROWTH DRIVERS, ISSUES & CHALLENGES

  • Major Trends & Growth Drivers
  • Rise in Magnitude of Cyber Crime to Drive Increased Adoption of Cyber Security Solutions & Services
    • Table 4: Breakdown of Number of Cyber Attacks Reported in October 2013 by Source Nation (includes corresponding Graph/Chart)
    • Table 5: Percentage Share Breakdown of Number of Cyber Attacks by Nature of Attack as of 2013 (includes corresponding Graph/Chart)
    • Types of External IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence
    • Types of Internal IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence
  • Increasing Prevalence of Malware to Drive Robust Demand for Cyber Security Solutions & Services
    • Trojan: Fastest Growing Data-Stealing Malware
    • Table 6: World Malware on the Web (2013): Percentage Share Breakdown of Leading Countries Hosting Malware on the Web (includes corresponding Graph/Chart)
    • Table 7: World Spam on the Web (2013): Percentage Share Breakdown of Leading Spam Relaying Countries (includes corresponding Graph/Chart)
  • Hactivism on the Prowl - Creates Need for Efficient Cyber Security Solutions
  • APTs Emerge as a New Sophisticated Threat
  • Instances of Cyberterrorism to Strengthen Demand for Cyber Security Solutions & Services
  • Security Threats from Virtualization & Cloud Infrastructure Deployments to Drive Demand for Cyber Security Solutions in Government & Private Organizations
    • Table 8: Global IT Market (2013): Percentage Share Breakdown of Spending by Segment (includes corresponding Graph/Chart)
    • Table 9: Global Cloud Computing Services Market (2013 & 2015P): Breakdown of Annual Revenue Figures in US$ Million by Region (includes corresponding Graph/Chart)
    • Table 10: Global Virtualization Software Market (2013): Percentage Share Breakdown of Revenue by Geographic Region (includes corresponding Graph/Chart)
  • Increasing Use of Internet Enabled Mobile Handsets Lends Traction to Cyber Security Market
    • Table 11: Global Smartphones market: Annual Sales Figures (in Million Units) for Years 2013, 2016 & 2018 (includes corresponding Graph/Chart)
    • Table 12: Global Smartphones Market (2013): Penetration for Select Countries (as a Percentage of Mobile Phone Users) (includes corresponding Graph/Chart)
    • Table 13: Global Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Workers by Nature of Work (includes corresponding Graph/Chart)
    • Table 14: Global Mobile Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Mobile Workers by Nature of Work (includes corresponding Graph/Chart)
    • Table 15: Global Mobile Workforce (2013): Percentage Share Breakdown of Number of Mobile Workers by Region (includes corresponding Graph/Chart)
    • BYOD Driven-Mobile Malware Enhances Need for Mobile Cyber Security in Private & Government Organizations
    • Mobile Banking Keeps Cyber Security Busy
      • Mobile Banking Services: At a Glance
  • Phenomenal Rise of Social Networking Sites Drives Usage Case for Cyber Security Solutions
    • Table 16: Major Social Networking Sites Worldwide (2011): Breakdown of Number of Registered Users in Millions (includes corresponding Graph/Chart)
  • IPv6 Boosts Adoption of Cyber Security Solutions and Services
  • Regulatory Compliance Requirements Continues to Drive Demand for Cyber Security
  • Government Sector - A Major Revenue Contributor
    • Priority for Cyber Threat Listed by Country
    • Growing Use of Cyber Security Solutions in Public Utilities for Securing Smart Grid Infrastructure
    • Cyber Security Seeks New Opportunities in Defense Applications
      • Opportunity Indicators
    • Table 17: Military Spending in Select Countries (2011 & 2012): Breakdown of Amount Spent (in US$ Billion) and Rate of Growth (%) (includes corresponding Graph/Chart)
  • Private Organizations Lend Traction to Growth in Cyber Security Market
    • High Usage of Digital Platforms Makes Private Establishments Highly Vulnerable to Cyber Security Threats
    • Cyber Security Turns into a Top Investment Priority for Businesses
      • Top Priority Malicious Elements Threatening Cyber Security in Enterprises: On a Scale 1 - 10 (10 - High Priority; 1 - Low Priority)
      • Factors Affecting Implementation of Cyber Security Solutions by Enterprises Worldwide - Ranked in Order of Influence
      • Key Focus Areas for Enterprises in Implementation of Cyber Security in their Premises: Ranked in Order of Relative Importance
    • Cyber Security - A Critical Necessity in Banking and Finance Sector
      • Major External & Internal Breaches in Financial Services Sector
      • Top Security Initiatives by Industry Segment
      • Regulatory Compliance: A High Priority for Financial Institutions
      • Advanced Solutions Gain Traction in Financial Services Sector
      • Key Barriers in Cyber Security for Financial Services Sector
    • Telecommunication and IT
      • DOS Attacks Threaten Mobile Network Security - Drive Demand for Cyber Security Solutions in Telecom Industry
      • Overbilling Attack: A Business Case for Cyber Security Solutions in Telecom Industry
      • VPN to Make Telecommunication Networks More Safer
      • Opportunities for Wireless Network Security in Telecom Industry
    • Table 18: Worldwide Mobile Data Traffic by Device Type (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly Data Traffic Volume for Laptops, Non-Smartphones, Smartphones, Tablets, and Others (includes corresponding Graph/Chart)
    • Table 19: Worldwide Mobile Data Traffic by Application (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly Data Traffic Volume for Data, File Sharing , M2M, and Video (includes corresponding Graph/Chart)
    • Table 20: Worldwide Mobile Networks (2013 & 2018): Percentage Share Breakdown of Number of Connections by Type of Network Technology (includes corresponding Graph/Chart)
    • Production Systems Also Seek Cyber Security
    • Small and Mid-Sized Businesses - A Lucrative Market Segment
  • Growing Demand in Healthcare Sector
  • Gamers too Not Spared
  • Key Issues
  • Inadequate Budget - The Key Constraint
  • Lack of Comprehensive Security Solutions
  • Lack of Alignment between Business Objectives and Security
  • External Threats More Recognized than Internal Threats
  • Most Organizations Continue to Remain Reactive Rather than Proactive
  • Availability of 'Freemium' and Free Products Niggles the Market
  • Growing Sophistication & Complexity of Security Threats - A Challenge to Reckon With for Cyber Security Solution Providers
    • Stealthier Infiltration Methods Pose Challenges for Cyber Security
  • Advanced Security Solutions - The Need of the Hour
  • Security Analytics to See Light in the Enterprise Sector
  • Big Data Analytics Set to Storm the Cyber Security Market
  • Convergence Gains Strength
  • Vendors Come Up with Integrated Solutions to Stay Ahead

3. A REVIEW OF KEY PRODUCT & SEGMENTS

  • Network Security Solutions Market - The Largest Market Segment
  • Security of Internal Network Infrastructure - A Key Necessity for Any Business
    • Table 21: Global Network Security Market (2013 & 2015): Percentage Share Breakdown of Revenues by Product Segment (includes corresponding Graph/Chart)
  • Content Security - A Prominent Market Segment
  • Secure Content Management Grows in Prominence
  • Endpoint Security Maintains Steady Demand
    • General Trends Underpinning the Endpoint Security Solutions Market
    • Tremendous Adoption of Mobile End-Points in Enterprises Make Enterprise Endpoint Security A Lucrative Market
  • Application Security Market
  • Dearth of Trained Staff and In-House Infrastructure to Boost Market Prospects for Security Services
  • A Look into Key Opportunities for Select Categories of Cyber Security Solutions
  • Identity & Access Management Solutions
    • Table 22: Global Identity and Access Management Market (2013): Percentage Share Breakdown of Revenues by Operating Environment (includes corresponding Graph/Chart)
    • IAM: A Key Security Initiative for Enterprises
    • An Integral Part of Corporate Strategy
  • Risk & Compliance Management
  • Data Encryption Solutions Continue to Find Robust Demand
    • E-mail Encryption Gathers Steam
  • Demand for Messaging Security (E-mail Scanning) Will Continue to Rise
  • Growing Significance of Data Loss Protection
  • Unified Threat Management (UTM)
  • XTMs Emerge as More Potential Tool
  • VPN Market on an Upswing
  • Advanced Firewall Solutions to Boost Market Prospects
  • Antivirus Software Continues to Call Shots
  • Compliance Requirements Boost Security & Vulnerability Management Market
    • Diverse Delivery Systems for SVM Products
    • Disaster Recovery Solutions Poised to Gain
  • Internet Filtering Solutions: Protection at the Gateway
  • Rise in Deployments of SSL-Encrypted Application

4. COMPETITIVE LANDSCAPE

  • Consolidation Wave in Cyber Security Market
  • Key Market Share Findings
    • Table 23: Leading Players in the Global Network Security Market (2013): Percentage Share Breakdown of Revenues by Leading Players (includes corresponding Graph/Chart)
    • Table 24: Leading Players in the Global Firewall Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)
    • Table 25: Leading Players in the Global Corporate Endpoint Security Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)
    • Table 26: Leading Players in the Global Anti-Virus Software Market (2013): Percentage Share Breakdown of Revenues for by Leading Players (includes corresponding Graph/Chart)
    • Table 27: Leading Players in the Global Intrusion Detection and Prevention (IDP) Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)
    • Table 28: Leading Players in the Global UTM Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)

5. PRODUCT OVERVIEW

  • Cyber Crime: An Introduction
  • Cyber Crimes Against Individuals
  • Cyber Crimes against Property
  • Cyber Crimes against Government
  • Types of Cyber Crimes
  • Harassment through e-mails
  • Cyber-stalking
  • Cyber Defamation
  • Indecent Exposure or Pornography
  • Phishing
  • E-mail Spoofing
  • Intellectual Property Crime
  • Computer Vandalism
  • Online Cheating and Fraud
  • Electronic Money Laundering and Tax Evasion
  • Cyber Trafficking
  • Cyber Terrorism
  • Social Networking Site Scams
  • Bot Networks
  • Methods of Committing Cyber Crime
  • Theft of Electronically Stored Information
  • Illegal Access of Computer System
  • Email Bombing
  • Salami Attack
  • Data Diddling
  • Denial of Service Attack
  • Logic Bombs
  • Worm and Virus Attacks
  • Trojan Attack
  • Web Jacking
  • Internet Time Theft
  • Damages Caused by Security Breaches
    • Proprietary Information Destruction
    • Disruption in Systems Performance
    • Data/Application Damage or Corruption
  • Types of Cyber Security Strategies
  • Network Security Solutions & Services
  • Endpoint Security Solutions & Services
  • Application Security Solutions & Services
  • Content Security Solutions & Services
  • Other Security Solutions & Services
  • Different Categories of Cyber Security Solutions
  • Identity & Access Management Solutions
  • Risk & Compliance Management Solutions
  • Encryption Solutions
  • Data Loss Protection (DLP) Solutions
    • Types of DLP Systems
      • Network DLP
      • Endpoint DLP
  • Unified Threat Management (UTM)
  • Firewall
    • Major Firewall Types
      • Packet Filter Firewall
      • Stateful Packet Inspection Firewall
      • Application Layer Gateways or Proxies
    • Available Forms of Firewalls
      • Software Firewalls
      • Hardware Firewalls
      • Firewall/VPN Appliances
  • Anti-Virus/Anti-Malware Solutions
  • Intrusion Detection System/ Intrusion Prevention System (IDS/IPS)
    • Intrusion Detection/Prevention Appliances
      • Intrusion Detection System (IDS)
    • Types of IDS
      • Intrusion Prevention System (IPS)
  • Security & Vulnerability Management
  • Disaster Recovery
  • Distributed Denial of Service (DDoS) Mitigation
  • Web/ Filtering
  • Different Categories of Cyber Security Services
  • Consulting Services
  • Implementation Services
  • Risk and Threat Assessment Services
  • Managed Services
  • Education and Training Services

6. PRODUCT & SERVICE LAUNCHES

  • Parsons Launches Cran(tm)
  • Skybox Security Rolls Out Skybox Risk Control 7.0
  • CSG International Launches CSG Invotas
  • ESET Launches Improved ESET CyberSecurity and ESET CyberSecurity Pro
  • DRDO Launches DHRUVA-3 High Performance Computing System
  • Shape Security Rolls Out ShapeShifter Appliance
  • Validian Unveils Update on Roll Out of Validian- Enabled Enterprise Applications
  • Buchanan Ingersoll & Rooney Launches Cybersecurity and Data Protection Service
  • Salamanca Group Launches New Cybersecurity Division
  • Willis Group Holdings Unveils Cyber ATLAS
  • ESET Unveils Updated ESET CyberSecurity and ESET CyberSecurity Pro
  • AnubisNetworks Unveils StreamForce
  • Globecomm Systems Launches Cytelics Cybersecurity Solutions Service
  • BAE Systems Detica Launches CyberReveal

7. RECENT INDUSTRY ACTIVITY

  • Lockheed Martin Takes Over Industrial Defender
  • Akamai Technologies Takes Over Prolexic Technologies
  • Blackstone to Takeover Majority Stake in Accuvant
  • Palo Alto Networks Takes Over Morta Security
  • L-3 Communications Takes Over Data Tactics
  • Google Takes Over Impermium
  • FIS Teams Up with Microsoft to Fight Cybercrime
  • Kaspersky Lab Unveils Interactive Cyberthreat Map
  • Palo Alto Networks to Acquire Cyvera
  • Cisco Acquires Sourcefire
  • IBM Takes Over Trusteer
  • PowerSecure International Takes Over Assets of Encari
  • Experian to Takeover 41st Parameter
  • Invizeon Takes Over Slipstream Resources
  • Deloitte Acquires Assets of Vigilant
  • Premier Alliance Group Takes Over root9B
  • NEC to Acquire Stake in Infosec
  • NEC Takes Over Cyber Defense Institute
  • Cassidian CyberSecurity to Acquire Stake in Arkoon Network Security
  • BAE Teams Up with Vodafone
  • Magal Security Systems Acquires WebSilicon
  • Infinite Group Inks Agreement with Webroot
  • KEYW Takes Over Rsignia
  • Google Takes Over VirusTotal
  • General Dynamics to Acquire Fidelis Security Systems
  • Ultra Electronics Holdings to Acquire Barron McCann Payments and Barron McCann Technology
  • PA Consulting Acquires 7Safe
  • Northrop Grumman to Acquire M5 Network Security

8. FOCUS ON SELECT PLAYERS

  • AVG Technologies (Czech Republic)
  • Booz Allen Hamilton (US)
  • CA Technologies, Inc. (US)
  • Check Point Software Technologies Ltd. (Israel)
  • Cisco Systems, Inc. (US)
  • CSC (US)
  • Deloitte LLP (US)
  • F-Secure Corporation (Finland)
  • IBM Corporation (US)
  • Juniper Networks, Inc. (US)
  • Kaspersky Lab (Russia)
  • Lockheed Martin Corporation (US)
  • McAfee, Inc. (US)
  • Microsoft Corporation (US)
  • Northrop Grumman Corp. (US)
  • Panda Security (Spain)
  • SafeNet, Inc (US)
  • Sophos PLC (UK)
  • Symantec Corporation (US)
  • Trend Micro Incorporated (US)
  • Utimaco Safeware AG (Germany)
  • WebSense, Inc. (US)

9. GLOBAL MARKET PERSPECTIVE

    • Table 29: World Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 30: World Historic Review for Cyber Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 31: World 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 32: World Recent Past, Current & Future Analysis for Application Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 33: World Historic Review for Application Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 34: World 15-Year Perspective for Application Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 35: World Recent Past, Current & Future Analysis for Content Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 36: World Historic Review for Content Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 37: World 15-Year Perspective for Content Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 38: World Recent Past, Current & Future Analysis for Endpoint Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 39: World Historic Review for Endpoint Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 40: World 15-Year Perspective for Endpoint Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 41: World Recent Past, Current & Future Analysis for Network Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 42: World Historic Review for Network Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 43: World 15-Year Perspective for Network Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 44: World Recent Past, Current & Future Analysis for Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 45: World Historic Review for Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 46: World 15-Year Perspective for Services by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 47: World Recent Past, Current & Future Analysis for Others by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 48: World Historic Review for Others by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 49: World 15-Year Perspective for Others by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 50: World Recent Past, Current & Future Analysis for Cyber Security by Sector - Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 51: World Historic Review for Cyber Security by Sector - Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 52: World 15-Year Perspective for Cyber Security by Sector - Percentage Breakdown of Revenues for Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

III. MARKET

1. THE UNITED STATES

  • A. Market Analysis
    • Current & Future Analysis
    • Rising Cyber Security Issues in the US
    • Table 53: US Cyber Security Market (2013): Percentage Share Breakdown of Number of Incidents in Critical Infrastructure Sectors (includes corresponding Graph/Chart)
    • Table 54: US Cyber Security Market (2013): Percentage Share Breakdown of Number of Breaches by User Group (includes corresponding Graph/Chart)
    • Identity Theft: A Growing Menace in the US
    • Opportunities for Cyber Security Solutions & Services in Private Sector - A Review
    • Table 55: US Information Security Services Market in Private Sector (2011): Percentage Share Breakdown of Revenues by Key End-Use Industries (includes corresponding Graph/Chart)
      • Banking/Financial Institutions: A Key End Use Industry
    • Government Entities Continue to Invest Heavily in Cyber Security
    • Table 56: US Government Cyber Security Market (2013): Percentage Share Breakdown of Spending by Entity (includes corresponding Graph/Chart)
      • The US Military Seeks Next-Generation Cyber Security Solutions for Telecom Networks
    • Regulatory Environment
      • Laws Governing the Data Security
    • Demand for Cyber Security Experts Soars
    • Product Launches
    • Strategic Corporate Developments
    • Key Players
  • B. Market Analytics
    • Table 57: US Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 58: US Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 59: US 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

2. CANADA

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
  • B. Market Analytics
    • Table 60: Canadian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 61: Canadian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 62: Canadian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

3. JAPAN

  • A. Market Analysis
    • Current & Future Analysis
    • Cyber Security Market - A Primer
      • Highlights
      • Growing Demand for Cloud Infrastructure to Boost Market for Security Solutions
    • Regulatory Environment
    • Competitive Scenario
    • Strategic Corporate Developments
  • B. Market Analytics
    • Table 63: Japanese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 64: Japanese Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 65: Japanese 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4. EUROPE

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Cyber Security - High on Enterprise Priority
    • Regulatory Environment
  • B. Market Analytics
    • Table 66: European Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 67: European Historic Review for Cyber Security by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 68: European Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 69: European Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 70: European 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 71: European 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4a. FRANCE

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Strategic Corporate Development
  • B. Market Analytics
    • Table 72: French Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 73: French Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 74: French 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4b. GERMANY

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Utimaco Safeware AG - A Key German Player
  • B. Market Analytics
    • Table 75: German Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 76: German Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 77: German 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4c. ITALY

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
  • B. Market Analytics
    • Table 78: Italian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 79: Italian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 80: Italian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4d. THE UNITED KINGDOM

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • M&A Activity Heats Up
      • Select M&A Deals in the UK in 2012 & 2013
    • Product Launch
    • Strategic Corporate Development
    • Sophos PLC - A Key UK Player
  • B. Market Analytics
    • Table 81: UK Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 82: UK Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 83: UK 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4e. SPAIN

  • A. Market Analysis
    • Current & Future Analysis
    • Panda Security - A Key Spanish Player
  • B. Market Analytics
    • Table 84: Spanish Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 85: Spanish Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 86: Spanish 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4f. RUSSIA

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Strategic Corporate Development
    • Kaspersky Lab - A Key Russian Player
  • B. Market Analytics
    • Table 87: Russian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 88: Russian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 89: Russian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4g. REST OF EUROPE

  • A. Market Analysis
    • Current & Future Analysis
    • Product Launches
    • Key Players
  • B. Market Analytics
    • Table 90: Rest of Europe Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 91: Rest of Europe Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 92: Rest of Europe 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5. ASIA-PACIFIC

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Web Security Gains Prominence
    • Large Enterprises Dominate Web Security Market with High Investments
    • Competitive Scenario
    • Table 93: Asia-Pacific Web Security Market (2012): Percentage Share Breakdown of Revenues by Leading Players (includes corresponding Graph/Chart)
  • B. Market Analytics
    • Table 94: Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 95: Asia-Pacific Historic Review for Cyber Security by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 96: Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 97: Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 98: Asia-Pacific 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 99: Asia-Pacific 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5a. CHINA

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Regulatory Overview
  • B. Market Analytics
    • Table 100: Chinese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 101: Chinese Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 102: Chinese 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5b. INDIA

  • A. Market Analysis
    • Current & Future Analysis
    • Market Overview
    • Impact of Cyber Crimes on Indian Companies
    • The Indian Security Market
    • Indian Anti-Virus Market
    • Product Launch
    • Quick Heal Technologies (P) Ltd - A Key Indian Player
  • B. Market Analytics
    • Table 103: Indian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 104: Indian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 105: Indian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5c. REST OF ASIA-PACIFIC

  • A. Market Analysis
    • Current & Future Analysis
    • Strategic Corporate Development
  • B. Market Analytics
    • Table 106: Rest of Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 107: Rest of Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 108: Rest of Asia-Pacific 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6. LATIN AMERICA

  • A. Market Analysis
    • Current & Future Analysis
    • Network Security Market Shows Steady Growth
    • Banking & Finance: The Major End-Use Segment for Network Security
    • Table 109: Latin American Network Security Market (2013): Percentage Breakdown of Value Sales by End-Use Segment (includes corresponding Graph/Chart)
    • Competitive Landscape
    • Table 110: Leading Players in the Latin American Network Security Market (2013): Percentage Breakdown of Value Sales for Check Point, Cisco, IBM ISS, Juniper, McAfee, and Others (includes corresponding Graph/Chart)
    • Table 111: Leading Players in the Latin American IDS/IPS Market (2013): Percentage Breakdown of Value Sales for Check Point, Cisco, IBM ISS, McAfee, and Others (includes corresponding Graph/Chart)
  • B. Market Analytics
    • Table 112: Latin American Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 113: Latin American Historic Review for Cyber Security by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 114: Latin American Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 115: Latin American Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 116: Latin American 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
    • Table 117: Latin American 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6a. BRAZIL

  • Market Analysis
    • Table 118: Brazilian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 119: Brazilian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 120: Brazilian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6b. REST OF LATIN AMERICA

  • Market Analysis
    • Table 121: Rest of Latin America Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 122: Rest of Latin America Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 123: Rest of Latin America 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

7. REST OF WORLD

  • A. Market Analysis
    • Current & Future Analysis
    • Security Software Market in Gulf States on the Rise
    • Strategic Corporate Development
    • Check Point Software Technologies Ltd. - A Key Israeli Player
  • B. Market Analytics
    • Table 124: Rest of World Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 125: Rest of World Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
    • Table 126: Rest of World 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Back to Top