株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

サイバーセキュリティ市場の予測

Cyber Security Market Report 2016-2021: Forecasts, Analysis & Profiles of Top Companies in Network, Data, Endpoint, Application and Cloud Security, and Identity & Access Management

発行 Visiongain Ltd 商品コード 294562
出版日 ページ情報 英文 402 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1GBP=147.80円で換算しております。

ご注意:
Single UserとDepartmentalライセンスは、DRM (デジタル著作権管理システム) 付PDFになります。制限内容は、上記ライセンスの[?]アイコンをクリックしてご確認ください。

Back to Top
サイバーセキュリティ市場の予測 Cyber Security Market Report 2016-2021: Forecasts, Analysis & Profiles of Top Companies in Network, Data, Endpoint, Application and Cloud Security, and Identity & Access Management
出版日: 2016年02月18日 ページ情報: 英文 402 Pages
概要

サイバーセキュリティの脅威はしばしば誇張されますが、拡張された社会のネットワークが、相互接続した経路内に潜む大きな脆弱性を生み出すことについては疑いの余地がありません。ネットワークを共有する軍事情報への脅威も重要な問題です。現在これらの脆弱性に対処する取り組みが行われています。世界のサイバーセキュリティ市場は2016年に814億米ドルに達すると予測されています。

当レポートは、世界のサイバーセキュリティ市場における現状と見通しについて調査分析し、市場全体、部門別および2次市場別の収益予測、主要国市場の分析、専門家による見解、およびSWOT分析などを提供しており、主要企業のプロファイルを交えてお届けいたします。

第1章 レポート概要

第2章 サイバーセキュリティ市場:イントロダクション

  • サイバーセキュリティ市場構造の概要
  • サイバーセキュリティ市場の定義
  • サイバーセキュリティ2次市場の定義
  • 最も一般的なサイバー攻撃の方法
  • サイバー攻撃を仕掛ける側の主な目的
  • サイバー攻撃の段階
  • サイバー攻撃の表面に現れた変遷
  • 最近の目立ったサイバー攻撃と事件

第3章 世界のサイバーセキュリティ市場

  • 世界市場予測
  • 地域市場予測
  • 地域市場シェアの内訳
  • 世界市場の成長促進因子・阻害因子

第4章 サイバーセキュリティの2次市場

第5章 主要国のサイバーセキュリティ市場

  • 主要9ヶ国のサイバーセキュリティ市場シェア予測
  • 中国
  • フランス
  • イスラエル
  • 日本
  • ロシア
  • サウジアラビア
  • 韓国
  • 米国
  • 英国

第6章 SWOT分析

第7章 専門家の見解

第8章 主要企業

第9章 結論および予測

第10章 用語

図表リスト

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次
Product Code: CYB0006

The inexorable rise of cyber attacks worldwide has led visiongain to publish this timely report. The rapid emergence of the cyber security industry has led to visiongain's assessment that the cyber security market will reach $81.4bn in 2016.

This report offers comprehensive analysis of the market dynamics and the cyber security companies. Visiongain's report will ensure that you keep informed and ahead of your competitors. Gain that competitive advantage.

The report will answer questions such as:

  • How is the Cyber Security market evolving?
  • What is driving and restraining Cyber Security market dynamics?
  • How will each Cyber Security submarket segment grow over the forecast period and how much sales will these submarkets account for in 2021?
  • How will market shares of each Cyber Security submarket develop from 2016-2021?
  • Which individual Cyber Security technologies will prevail and how will these shifts be responded to?
  • Which Cyber Security submarket will be the main driver of the overall market from 2016-2021?
  • How will political and regulatory factors influence regional Cyber Security markets and submarkets?
  • Will leading national Cyber Security markets broadly follow macroeconomic dynamics, or will individual country sectors outperform the rest of the economy?
  • Who are the leading players and what are their prospects over the forecast period?
  • How will the sector evolve as alliances form during the period between 2016 and 2021?

5 Reasons why you must order and read this report today:

1) The analysis is underpinned by our 3 exclusive interviews with leading Cyber Security experts

  • James Hanlon and Laurence Pitt, Security Strategist and Product Management, Symantec.
  • Martin Roesch, Vice President and Chief Architect, Cisco
  • Florian Schütz, Business Development, RUAG

2) The report provides detailed profiles of 15 leading companies operating within the Cyber Security market:

  • Blue Coat Systems
  • Check Point Technologies
  • Cisco
  • EMC
  • Fortinet
  • Hewlett-Packard Company
  • IBM
  • Intel Corporation
  • Kaspersky
  • Lockheed Martin Corporation
  • Northrop Grumman Corporation
  • Optiv
  • Palo Alto Networks
  • Symantec Corporation
  • Trend Micro

3) The study reveals where and how companies are investing in Cyber Security. We show you the prospects for the following 9 leading nations with forecasts and analysis:

  • China
  • France
  • Israel
  • Japan
  • Russia
  • Saudi Arabia
  • South Korea
  • US
  • UK
  • RoW

4) Our overview also forecasts these 7 cyber security submarkets from 2016-2021

  • Network security
  • Data Security
  • Endpoint security
  • Application security
  • Cloud security
  • Identity and Access Management
  • Other

5) The document also details 54 significant cyber security contracts

How will you benefit from this report?

  • This report you will keep your Cyber Security knowledge base up to speed. Don't get left behind
  • This report will allow you to reinforce strategic decision decision-making based upon definitive and reliable Cyber Security market data
  • You will learn how to exploit new Cyber Security technological trends
  • You will be able to realise your company's full potential within the Cyber Security market
  • You will better understand the competitive landscape and identify potential new business opportunities & partnerships

Competitive advantage

This independent 402 page, report guarantees you will remain better informed than your competitors. With 185 tables and 226 figures examining the Cyber Security market space, the report gives you an immediate, one-stop breakdown of your market, keeping your knowledge that one step ahead of your rivals.

Who should read this report?

IT companies, Cyber Security firms, IoT companies, telecommunication , internet and technology providers, CEOs, asset managers, grid security vendors, smart grid hardware and software vendors, heads of strategic development, marketing staff, market analysts, procurement staff, utility company managers, industry administrators, industry associations, utility company procurement departments, analysts and consultants, managers, utility security managers, governmental departments & agencies.

Don't miss out

This report is essential reading for you or anyone in the IT sector with an interest in cyber security. Purchasing this report today will help you to recognise those important market opportunities and understand the possibilities there. Order the Cyber Security Market Report 2016-2021: Forecasts, Analysis & Profiles of Top Companies in Network, Data, Endpoint, Application and Cloud Security, and Identity & Access Management now. We look forward to receiving your order.

visiongain is a trading partner with the US Federal Government.

Table of Contents

1. Report Overview

  • 1.1. Global Cyber Security Market Overview
  • 1.2. Global Cyber Security Market Segmentation
  • 1.3. Why You Should Read This Report
  • 1.4. How This Report Delivers
  • 1.5. Key Questions Answered by This Analytical Report Include:
  • 1.6. Who is This Report For?
  • 1.7. Methodology
    • 1.7.1. Primary Research
    • 1.7.2. Secondary Research
    • 1.7.3. Market Evaluation & Forecasting Methodology
  • 1.8. Frequently Asked Questions (FAQ)
  • 1.9. Associated visiongain Reports
  • 1.10. About visiongain

2. Introduction to the Cyber Security Market

  • 2.1. Global Cyber Security Market Structure Overview
  • 2.2. Cyber Security Market Definition
  • 2.3. Cyber Security Submarkets Definition
    • 2.3.1. Network Security (NetSec) Submarket Definition
    • 2.3.2. Data Security (DataSec) Submarket Definition
    • 2.3.3. Identity and Access Management (IAM) Submarket Definition
    • 2.3.4. Endpoint Security (EndSec) Submarket Definition
    • 2.3.5. Application Security (AppSec) Submarket Definition
    • 2.3.6. Cloud Security (CloudSec) Submarket Definition
  • 2.4. Most Common Methods of Cyber Attacks
  • 2.5. Main Objectives of Cyber Attackers
  • 2.6. Most Important Mechanisms of Cyber Attacks
  • 2.7. Stage of Cyber Attacks
  • 2.8. The Evolving Surface of Cyber Attack 2015-2020
  • 2.9. Recent Notable Cyber Attacks & Incidents

3. Global Cyber Security Market 2016-2021

  • 3.1. Global Cyber Security Market Forecast 2016-2021
  • 3.2. Regional Cyber Security Market Forecast 2016-2021
  • 3.3. Regional Cyber Security Market Share Breakdowns 2016-2021
  • 3.2. Global Cyber Security Drivers & Restraints 2016

4. Global Cyber Security Submarket Forecast 2016-2021

5. Leading 9 National Cyber Security Markets Forecast 2016-2021

  • 5.1. Leading 9 National Cyber Security Markets Share Forecast 2016-2021
  • 5.2. China Cyber Security Market Forecast 2016-2021
    • 5.2.1. Cyber Security in China
      • 5.2.1.1. Chinese Military Cyber Strategy
      • 5.2.1.2. Chinese National Cyber Strategy
    • 5.2.2. China Cyber Security Market Drivers & Restraints
  • 5.3. France Cyber Security Market Forecast 2016-2021
    • 5.3.1. French Cyber Security Agency: ANSSI
    • 5.3.2. Cyber Security in France
    • 5.3.3. France Cyber Security Market Drivers & Restraints
  • 5.4. Israel Cyber Security Market Forecast 2016-2021
    • 5.4.1. Israeli Defence Contracts Value 2007-2014
    • 5.4.2. Cyber Security in Israel
    • 5.4.3. Israel Cyber Security Market Drivers & Restraints
  • 5.5. Japan Cyber Security Market Forecast 2016-2021
    • 5.5.1. Japan Spending on IT Software and Services 2012-2014
    • 5.5.2. Japan Ministry of Defence Spending on Cyber Security 2012-2016
    • 5.5.3. Cyber Security in Japan
    • 5.5.4. Japan Cyber Security Market Drivers & Restraints
  • 5.6. Russia Cyber Security Market Forecast 2016-2021
    • 5.6.1. Cyber Security in Russia
    • 5.6.2. Russia Cyber Security Market Drivers & Restraints
  • 5.7. Saudi Arabia Cyber Security Market Forecast 2016-2021
    • 5.7.1. Cyber Security in Saudi Arabia
    • 5.7.2. Saudi Arabia Cyber Security Market Drivers & Restraints
  • 5.8. South Korea Cyber Security Market Forecast 2016-2021
    • 5.8.1. Cyber Security in South Korea
    • 5.8.2. South Korea Cyber Security Market Drivers & Restraints
  • 5.9. United States Cyber Security Market Forecast 2016-2021
    • 5.9.1. United States Cyber Security Market Contracts & Programmes
    • 5.9.2. United States Federal Government's Budget for Cyber Security
    • 5.9.3. United States Federal Departments Spending on Cyber Security by Departments
    • 5.9.4. United States Federal Spending on Cyber Security by States
    • 5.9.5. Cyber Security in United States
      • 5.9.5.1. Essential Components of the U.S. Cyber Security Power
      • 5.9.5.2. The United States Department of Defense
      • 5.9.5.3. The United States Department of Homeland Security
      • 5.9.5.4. The United States Department of Justice
      • 5.9.5.5. The United States Overall Budget
    • 5.9.6. United States Cyber Security Market Drivers & Restraints
  • 5.10. United Kingdom Cyber Security Market Forecast 2016-2021
    • 5.10.1. United Kingdom Government Spending on Cyber Security
    • 5.10.2. United Kingdom Cyber Security Export
    • 5.10.3. Cyber Security in the United Kingdom
    • 5.10.4. United Kingdom Cyber Security Market Drivers & Restraints

6. SWOT Analysis of the Cyber Security Market 2016-2021

7. Expert Opinion

  • 7.1. Florian Schütz, Business Development, Cyber & Intelligence, RUAG
    • 7.2.1. RUAG's view on the Cyber Security Market
    • 7.1.2. Presence of RUAG in the Cyber Security Market
  • 7.2. James Hanlon, Security Strategist, Office of the CTO and Laurence Pitt, Director, Product Management EMEA, Symantec
    • 7.2.1. Symantec's view on the Cyber Security Market
    • 7.2.2. Presence of Symantec in the Cyber Security Market
  • 7.3. Martin Roesch, Vice President and Chief Architect, Cisco's Security Business Group
    • 7.3.1. Presence of Cisco in the Cyber Security Market

8. Leading 15 Cyber Security Companies

  • 8.1. Leading 15 Cyber Security Company Sales Share Analysis 2015
  • 8.2. Blue Coat Systems, Inc
    • 8.2.1. Blue Coat Systems Total Company Sales 2007-2011
    • 8.2.2. Blue Coat Systems Sales by Segment of Business 2007-2011
    • 8.2.3. Blue Coat Systems Net Profit / Loss 2007-2011
    • 8.2.4. Blue Coat Systems Cost of Research & Development 2007-2011
    • 8.2.5. Blue Coat Systems Regional Emphasis / Focus
    • 8.2.6. Blue Coat Systems Organisational Structure / Subsidiaries / Number of Employees
    • 8.2.7. Blue Coat Systems Primary Market Competitors 2015
    • 8.2.8. Blue Coat Systems Mergers & Acquisitions (M&A) Activity
    • 8.2.9. Blue Coat Systems' Role in the Cyber Security Market
  • 8.3. Check Point Software Technologies Ltd
    • 8.3.1. Check Point Software Technologies Ltd Total Company Sales 2005-2014
    • 8.3.2. Check Point Software Technologies Ltd Net Income 2005-2014
    • 8.3.3. Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014
    • 8.3.4. Check Point Software Technologies Ltd Net Cost of Research & Development 2005-2014
    • 8.3.5. Check Point Software Technologies Ltd Regional Emphasis / Focus
    • 8.3.6. Check Point Software Technologies Ltd Organisational Structure / Subsidiaries / Number of Employees
    • 8.3.7. Check Point Software Technologies Ltd Primary Market Competitors
    • 8.3.8. Check Point Software Technologies Ltd Mergers & Acquisitions (M&A) Activity
    • 8.3.9. Check Point Software Technologies' Role in the Cyber Security Market
  • 8.4. Cisco Systems
    • 8.4.1. Cisco Total Company Sales 2008-2015
    • 8.4.2. Cisco Net Profit 2010-2015
    • 8.4.3. Cisco Cost of Research & Development 2010-2015
    • 8.4.5. Cisco Sales by Segment of Business 2010-2015
    • 8.4.6. Cisco Regional Emphasis / Focus
    • 8.4.7. Cisco Organisational Structure / Subsidiaries / Number of Employees
    • 8.4.8. Cisco Primary Market Competitors 2015
    • 8.4.9. Cisco Mergers & Acquisitions (M&A) Activity
    • 8.4.10. Cisco's Role in the Cyber Security Market
  • 8.5. EMC
    • 8.5.1. EMC Total Company Sales 2008-2014
    • 8.5.2. EMC Net Profit 2010-2014
    • 8.5.3. EMC Cost of Research & Development 2010-2014
    • 8.5.4. EMC Sales by Segment of Business 2010-2014
    • 8.5.5. EMC Regional Emphasis / Focus
    • 8.5.6. EMC Organisational Structure / Subsidiaries / Number of Employees
    • 8.5.7. EMC Primary Market Competitors
    • 8.5.8. EMC Mergers & Acquisitions (M&A) Activity
    • 8.5.9. EMC's Role in the Cyber Security Market
  • 8.6. Fortinet Inc
    • 8.6.1. Fortinet Inc Total Company Sales 2009-2014
    • 8.6.2. Fortinet Inc Net Income 2010-2014
    • 8.6.3. Fortinet Inc Net Capital Expenditure 2010-2014
    • 8.6.4. Fortinet Inc Sales by Segment of Business 2009-2014
    • 8.6.5. Fortinet Inc Regional Emphasis / Focus
    • 8.6.6. Fortinet Inc Organisational Structure / Subsidiaries / Number of Employees
    • 8.6.7. Fortinet Inc Primary Market Competitors
    • 8.6.8. Fortinet Inc Mergers & Acquisitions (M&A) Activity
    • 8.6.9. Fortinet Inc's Role in the Cyber Security Market
  • 8.7. Hewlett-Packard (HP)
    • 8.7.1. Hewlett-Packard (HP) Cyber Security Selected Recent Contracts / Projects / Programmes
    • 8.7.2. Hewlett-Packard (HP) Total Company Sales 2010-2015
    • 8.7.3. Hewlett-Packard (HP) Net Income / Loss 2010-2015
    • 8.7.4. Hewlett-Packard (HP) Sales by Segment of Business 2010-2015
    • 8.7.5. The Hewlett-Packard Company (HP) Regional Emphasis / Focus
    • 8.7.6. The Hewlett-Packard Company (HP) Organisational Structure / Subsidiaries
    • 8.7.7. Hewlett-Packard (HP) Primary Market Competitors
    • 8.7.8. Hewlett-Packard (HP) Mergers & Acquisitions (M&A) Activity
    • 8.7.9. Hewlett-Packard (HP)'s Role in the Cyber Security Market
  • 8.8. Intel Corporation
    • 8.8.1. Intel Corporation Total Company Sales 2008-2014
    • 8.8.2. Intel Corporation Net Profit 2010-2014
    • 8.8.3. Intel Corporation Cost of Research & Development 2010-2014
    • 8.8.4. Intel Corporation Sales by Segment of Business 2010-2014
    • 8.8.5. Intel Corporation Regional Emphasis / Focus
    • 8.8.6. Intel Corporation Organisational Structure / Subsidiaries / Number of Employees
    • 8.8.7. Intel Corporation Primary Market Competitors
    • 8.8.8. Intel Corporation Mergers & Acquisitions (M&A) Activity
    • 8.8.9. Intel Corporation's Role in the Cyber Security Market
  • 8.9. International Business Machines (IBM) Corporation
    • 8.9.1. IBM Cyber Security Selected Recent Contracts / Projects / Programmes
    • 8.9.2. IBM Total Company Sales 2008-2014
    • 8.9.3. IBM Net Profit 2010-2014
    • 8.9.4. IBM Cost of Research & Development 2010-2014
    • 8.9.5. IBM Sales by Segment of Business 2010-2014
    • 8.9.6. IBM Regional Emphasis / Focus
    • 8.9.7. IBM Organisational Structure / Subsidiaries / Number of Employees
    • 8.9.8. IBM Primary Market Competitors 2015
    • 8.9.9. IBM Mergers & Acquisitions (M&A) Activity
    • 8.9.10. IBM's Role in the Cyber Security Market
  • 8.10. Kaspersky Lab
    • 8.10.1. Kaspersky Lab Total Company Sales 2008-2014
    • 8.10.2. Kaspersky Lab Regional Emphasis / Focus
    • 8.10.3. Kaspersky Lab Organisational Structure / Subsidiaries
    • 8.10.4. Kaspersky Lab Primary Market Competitors
    • 8.10.5. Kaspersky Lab Mergers & Acquisitions (M&A) Activity
    • 8.10.6. Kaspersky's Role in the Cyber Security Market
  • 8.11. Lockheed Martin Corporation
    • 8.11.1. Lockheed Martin Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
    • 8.11.2. Lockheed Martin Corporation Total Company Sales 2010-2014
    • 8.11.3. Lockheed Martin Corporation Net Income 2010-2014
    • 8.11.4. Lockheed Martin Corporation Net Capital Expenditure 2010-2014
    • 8.11.5. Lockheed Martin Corporation Sales by Segment of Business 2010-2014
    • 8.11.6. Lockheed Martin Corporation Regional Emphasis / Focus
    • 8.11.7. Lockheed Martin Corporation Organisational Structure / Subsidiaries / Number of Employees
    • 8.11.8. Lockheed Martin Corporation Primary Market Competitors
    • 8.11.9. Lockheed Martin Corporation Mergers & Acquisitions (M&A) Activity
    • 8.11.10. Lockheed Martin Corporation's Role in the Cyber Security Market
  • 8.12. Northrop Grumman Corporation
    • 8.12.1. Northrop Grumman Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
    • 8.12.2. Northrop Grumman Corporation Total Company Sales 2008-2014
    • 8.12.3. Northrop Grumman Corporation Net Profit 2009-2014
    • 8.12.4. Northrop Grumman Corporation Sales by Segment of Business 2010-2014
    • 8.12.5. Northrop Grumman Corporation Regional Emphasis / Focus
    • 8.12.6. Northrop Grumman Corporation Organisational Structure / Subsidiaries / Number of Employees
    • 8.12.7. Northrop Grumman Corporation Primary Market Competitors
    • 8.12.8. Northrop Grumman Corporation Mergers & Acquisitions (M&A) Activity
    • 8.12.9. Northrop Grumman Corporation's Role in the Cyber Security Market
  • 8.13. Optiv
    • 8.13.1. Optiv Regional Emphasis / Focus
    • 8.13.2. Optiv Organisational Structure / Subsidiaries / Number of Employees
    • 8.13.3. Optiv Primary Market Competitors 2015
    • 8.13.4. Optiv Mergers & Acquisitions (M&A) Activity
    • 8.13.5. Optiv's Role in the Cyber Security Market
  • 8.14. Palo Alto Networks
    • 8.14.1. Palo Alto Networks Total Company Sales 2008-2015
    • 8.14.2. Palo Alto Networks Net Profit/Loss 2010-2015
    • 8.14.3. Palo Alto Networks Cost of Research & Development 2010-2015
    • 8.14.4. Palo Alto Networks Sales by Segment of Business 2010-2015
    • 8.14.5. Palo Alto Networks Regional Emphasis / Focus
    • 8.14.6. Palo Alto Networks Organisational Structure / Subsidiaries / Number of Employees
    • 8.14.7. Palo Alto Networks Primary Market Competitors
    • 8.14.8. Palo Alto Networks Mergers & Acquisitions (M&A) Activity
    • 8.14.9. Palo Alto Networks' Role in the Cyber Security Market
  • 8.15. Symantec Corporation
    • 8.15.1. Symantec Total Company Sales 2008-2015
    • 8.15.2. Symantec Net Profit 2010-2015
    • 8.15.3. Symantec Cost of Research & Development 2010-2015
    • 8.15.4. Symantec Sales by Segment of Business 2014-2015
    • 8.15.5. Symantec Regional Emphasis / Focus
    • 8.15.6. Symantec Organisational Structure / Subsidiaries / Number of Employees
    • 8.15.7. Symantec Primary Market Competitors
    • 8.15.8. Symantec Mergers & Acquisitions (M&A) Activity
    • 8.15.9. Symantec's Role in the Cyber Security Market
  • 8.16. Trend Micro
    • 8.16.1. Trend Micro Total Company Sales 2008-2014
    • 8.16.2. Trend Micro Net Profit 2010-2015
    • 8.16.3. Trend Micro Cost of Research & Development 2011-2014
    • 8.16.4. Trend Micro Regional Emphasis / Focus
    • 8.16.5. Trend Micro Organisational Structure / Subsidiaries
    • 8.16.6. Trend Micro Primary Market Competitors
    • 8.16.7. Trend Micro Mergers & Acquisitions (M&A) Activity
    • 8.16.8. Trend Micro's Role in the Cyber Security Market
  • 8.17. Other Companies Involved in the Cyber Security Market 2016

9. Conclusions and Predictions

  • 9.1. Conclusion
  • 9.2. Predictions

10. Glossary

List of Tables

  • Table 1.1: Example of Cyber Security Market by Regional Market Forecast 2016-2021 (US$m, AGR%, Cumulative)
  • Table 1.2: Example of Leading National Cyber Security Market Forecast by Submarket 2016-2021 (US$m, AGR%, Cumulative)
  • Table 2.1: Methods of Cyber Attacks (Type, Description)
  • Table 2.2: Objectives of Cyber Attackers (Type, Description)
  • Table 2.3: Mechanisms of Cyber Attacks (Type, Description)
  • Table 2.4: Cyber Attack Surface 2015-2020
  • Table 2.5: Notable Cyber Attacks and Incidents worldwide 1988-2015 (Date, Name of the Attack / Incident, Description)
  • Table 3.1: Global Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 3.2: Regional Cyber Security Market Forecast 2015-2021 (Sales US$m, AGR%, Cumulative)
  • Table 3.3: Regional Cyber Security Market Percentage Change in Market Share 2016-2021 (% Change)
  • Table 3.4: Global Cyber Security Market Drivers & Restraints 2016
  • Table 4.1: Global Cyber Security Submarket Forecast 2016-2021 (US$m, AGR%, Cumulative)
  • Table 4.2: Global Cyber Security Submarket Cumulative Sales Forecast 2016-2021 ($USm)
  • Table 5.1: Leading 9 National Cyber Security Markets Forecast 2016-2021 (US$m, Global AGR%, Cumulative)
  • Table 5.2: Leading 9 National Cyber Security Markets CAGR Forecast 2016-2021 (CAGR %)
  • Table 5.3: China Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.4: China Cyber Security Market Drivers & Restraints 2016
  • Table 5.5: France Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.6: France Cyber Security Agency (ANSSI) Budget 2010-2014 (US$m)
  • Table 5.7: France Cyber Security Market Drivers & Restraints 2016
  • Table 5.8: Israel Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.9: Israeli Defence Contracts Total Value 2007-2014 (US$m)
  • Table 5.10: Israel Cyber Security Market Drivers & Restraints 2016
  • Table 5.11: Japan Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.12: Japan Spending on IT Software and Services 2012-2014 (US$m)
  • Table 5.13: Japan Ministry of Defence Spending on Cyber Security 2012-2016(US$m, AGR %)
  • Table 5.14: Japan Cyber Security Market Drivers & Restraints 2016
  • Table 5.15: Russia Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.16: Russia Cyber Security Market Drivers & Restraints 2016
  • Table 5.17: Saudi Arabia Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.18: Saudi Arabia Cyber Security Market Drivers & Restraints 2016
  • Table 5.19: South Korea Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.20: South Korea Cyber Security Market Drivers & Restraints 2016
  • Table 5.21: U.S. Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.22: U.S. Cyber Security Market Major Contracts & Programmes 2015 (Date, Organisation, Contractor, Value US$m, Product, Details)
  • Table 5.23: U.S. Federal Government's Global Budget for Cyber Security 2013-2016 (US$m, AGR %)
  • Table 5.24: U.S. Federal Government's Budget for Cyber Security by Departments 2015-2016 (US$m)
  • Table 5.25: U.S. Federal Spending on Cyber Security by Departments 2010-2015 (US$m, AGR %)
  • Table 5.26: U.S. Federal Spending on Cyber Security by States 2010-2015 (US$m, AGR %)
  • Table 5.27: U.S. Government and Military Cyber Security Organisations' Role (US Code, Title, Focus, Organisation, Role)
  • Table 5.28: U.S. Cyber Security Market Drivers & Restraints 2016
  • Table 5.29: UK Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.30: UK National Cyber Security Programme Total Spending Forecast 2011-2020 (US$m)
  • Table 5.31: UK National Cyber Security Programme Spending by Segments Share 2014-2015 (US$m)
  • Table 5.32: UK Cyber Security Export in the Security Sector 2012-2015 (US$m, AGR %)
  • Table 5.33: UK Cyber Security Market Drivers & Restraints 2016
  • Table 6.1: Global Cyber Security Market SWOT Analysis 2016-2021
  • Table 8.1: Leading 15 Cyber Security Companies Sales Share 2015 ( Company, FY2014/2015 Total Company Sales US$m, FY2014/2015 Estimated Sales in the Market US$m, Share of FY2015 Total Sales from Sales in the Market US$m, Primary Market Specialisation)
  • Table 8.2: Blue Coat Systems Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, HQ, Founded, No. of Employees, IR Contact, Website)
  • Table 8.2.1: Blue Coat Systems Total Company Sales 2007-2011 (US$m, AGR %)
  • Table 8.2.2: Blue Coat Systems Sales by Segment of Business 2007-2011 (US$m, AGR %)
  • Table 8.2.3: Blue Coat Systems Net Profit / Loss 2007-2011 (US$m, AGR %)
  • Table 8.2.4: Blue Coat Systems Cost of Research & Development 2007-2011 (US$m, AGR %)
  • Table 8.2.5: Blue Coat Systems Sales by Geographical Location 2007-2011 (US$m, AGR %)
  • Table 8.2.6: Blue Coat Systems Subsidiaries 2015 (Subsidiary, Location)
  • Table 8.2.7: Blue Coat Systems Number of Employees 2007-2011 (No. of Employees, AGR %)
  • Table 8.2.8: Blue Coat Systems Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.2.9: Blue Coat Systems Merger (Date, Company Involved, Value US$m, Details)
  • Table 8.3: Check Point Software Technologies Ltd Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market (%), Net Income US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.3.1: Check Point Software Technologies Ltd Total Company Sales 2005-2014 (US$m, AGR %)
  • Table 8.3.2: Check Point Software Technologies Ltd Net Income 2005-2014 (US$m, AGR %)
  • Table 8.3.3: Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014 (US$m, AGR %)
  • Table 8.3.4: Check Point Software Technologies Ltd Net Capital Expenditure 2005-2014 (US$m, AGR %)
  • Table 8.3.5: Check Point Software Technologies Ltd Sales by Geographical Location 2009-2014 (US$m, AGR %)
  • Table 8.3.6: Check Point Software Technologies Ltd Subsidiaries (Subsidiary, Location)
  • Table 8.3.7: Check Point Software Technologies Ltd Number of Employees 2009-2014 (Number, AGR %)
  • Table 8.3.8: Check Point Software Technologies Ltd Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 4.3.9: Check Point Software Technologies Ltd Partnerships 2015 (Date, Company Involved, Details)
  • Table 8.4: Cisco Systems Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.4.1: Cisco Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.4.2: Cisco Net Profit 2010-2015 (US$m, AGR %)
  • Table 8.4.3: Cisco Cost of Research & Development 2010-2015 (US$m, AGR %)
  • Table 8.4.4: Cisco Sales by Segment of Business 2010-2015 (US$m, AGR %)
  • Table 8.4.5: Cisco Sales by Geographical Location 2010-2015 (US$m, AGR %)
  • Table 8.4.6: Cisco Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.4.7: Cisco Number of Employees 2012-2015 (No. of Employees, AGR %)
  • Table 8.4.8: Cisco Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.5: EMC Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, Net Capital Expenditure US$m, Submarket Involvement, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.5.1: EMC Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.5.2: EMC Net Profit 2010-2014 (US$m, AGR %)
  • Table 8.5.3: EMC Cost of Research & Development 2010-2014 (US$m, AGR %)
  • Table 8.5.4: EMC Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Table 8.5.5: EMC Sales by Geographical Location 2008-2014 (US$m, AGR %)
  • Table 8.5.6: EMC Primary International Subsidiaries 2016 (Region, Subsidiary, Location)
  • Table 8.5.7: EMC Number of Employees 2010-2014 (No. of Employees, AGR %)
  • Table 8.5.8: EMC Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.5.9: EMC Divestitures 2015 (Date, Details)
  • Table 8.5.10: EMC Mergers/Partnerships 2015 (Date, Details)
  • Table 8.6: Fortinet Inc Profile 2016 ( CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Income US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.6.1: Fortinet Inc Total Company Sales 2009-2014 (US$m, AGR %)
  • Table 8.6.2: Fortinet Inc Net Income 2010-2014 (US$m, AGR %)
  • Table 8.6.3: Fortinet Inc Net Capital Expenditure 2010-2014 (US$m, AGR %)
  • Table 8.6.4: Fortinet Inc Net Sales by Segment of Business 2009-2014 (US$m, AGR %)
  • Table 8.6.5: Fortinet Inc Sales by Geographical Location 2010-2014 (US$m, AGR %)
  • Table 8.6.6: Fortinet Primary International Subsidiaries 2016 (Subsidiary, Location)
  • Table 8.6.7: Fortinet Inc Number of Employees 2011-2014 (Number, AGR %)
  • Table 8.6.8: Fortinet Inc Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.6.9: Fortinet Inc Partnerships (Date, Company Involved, Details)
  • Table 8.7: Hewlett-Packard (HP) Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Net Income US$m, Share in the Cyber Security Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.7.1: Selected Recent Hewlett-Packard (HP) Cyber Security Contracts / Projects / Programmes (Date, Country, Subcontractor, Value US$m, Product, Details)
  • Table 8.7.2: Hewlett-Packard (HP) Total Company Sales 2010-2015 (US$m, AGR %)
  • Table 8.7.3: Hewlett-Packard (HP) Net Income / Loss 2010-2015 (US$m)
  • Table 8.7.4: Hewlett-Packard (HP) Sales by Segment of Business 2010-2015 (US$m, AGR %)
  • Table 8.7.5: Hewlett-Packard (HP) Acquisitions 2011-2015 (Date, Company Involved, Value US$m, Details)
  • Table 8.7.6: Hewlett-Packard (HP) Joint Venture 2015 (Date, Company Involved, Value US$m, Details)
  • Table 8.7.7: Hewlett-Packard (HP) Partnerships 2015 (Date, Company Involved, Details)
  • Table 8.7.8: Hewlett-Packard (HP) Divestitures 2015 (Date, Company Involved, Details)
  • Table 8.8: Intel Corporation Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, Ticker, Website)
  • Table 8.8.1: Intel Corporation Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.8.2: Intel Corporation Net Profit 2010-2014 (US$m, AGR %)
  • Table 8.8.3: Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR %)
  • Table 8.8.4: Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Table 8.8.5: Intel Corporation Sales by Geographical Location 2010-2014 (US$m, AGR %)
  • Table 8.8.6: Intel Corporation Primary International Subsidiaries 2015 ( Subsidiary, Location)
  • Table 8.8.7: Intel Corporation Number of Employees 2010-2014 (No. of Employees, AGR %)
  • Table 8.8.8: Intel Corporation Acquisitions 2011-2015 (Date, Company Involved, Value US$m, Details)
  • Table 8.8.9: Intel Corporation Divestiture 2015 (Date, Details)
  • Table 8.9: IBM Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.9.1: Selected Recent International Business Machines (IBM) Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Product, Details)
  • Table 8.9.2: IBM Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.9.3: IBM Net Profit 2010-2014 (US$m, AGR %)
  • Table 8.9.4: IBM Cost of Research & Development 2010-2014 (US$m, AGR %)
  • Table 8.9.5: IBM Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Table 8.9.6: IBM Sales by Geographical Location 2010-2014 (US$m, AGR %)
  • Table 8.9.7: IBM Primary International Subsidiaries 2016 (Region, Subsidiary, Location)
  • Table 8.9.8: IBM Number of Employees 2010-2014 (No. of Employees, AGR %)
  • Table 8.9.9: IBM Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.9.10: IBM Recent Divestiture 2014 (Date, Details)
  • Table 8.10: Kaspersky Lab Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, HQ, Founded, Website)
  • Table 8.10.1: Kaspersky Lab Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.10.2: Kaspersky Lab Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.10.3: Kaspersky Lab Acquisitions 2005-2012 (Date, Details)
  • Table 8.10.4: Kaspersky Lab Divestiture 2011 (Date, Details)
  • Table 8.11: Lockheed Martin Corporation Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Net Income US$m, Share in the cyber Security Market %, HQ, No. of Countries Present Worldwide, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.11.1: Selected Recent Lockheed Martin Corporation Cyber Security Contracts / Projects / Programmes (Date, Country , Value US$m, Product, Details)
  • Table 8.11.2: Lockheed Martin Corporation Total Company Sales 2010-2014 (US$m, AGR %)
  • Table 8.11.3: Lockheed Martin Corporation Net Income 2010-2014 (US$m, AGR %)
  • Table 8.11.4: Lockheed Martin Corporation Net Capital Expenditure 2010-2014 (US$m, AGR %)
  • Table 8.11.5: Lockheed Martin Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Table 8.11.6: Lockheed Martin Corporation Sales by Geographical Location 2010-2014 (US$m, AGR %)
  • Table 8.11.7: Lockheed Martin Corporation Subsidiaries (Subsidiary, Location)
  • Table 8.11.8: Lockheed Martin Corporation Number of Employees 2010-2014 (Number, AGR %)
  • Table 8.11.9: Lockheed Martin Corporation Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.11.10: Lockheed Martin Corporation Divestitures (Date, Company Involved, Value US$m, Details)
  • Table 8.12: Northrop Grumman Corporation Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Income US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.12.1: Selected Recent Northrop Grumman Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Details)
  • Table 8.12.2: Northrop Grumman Corporation Total Company Sales 2008-2014 (US$m, AGR %)
  • Table 8.12.3: Northrop Grumman Corporation Net Profit 2009-2014 (US$m, AGR %)
  • Table 8.12.4: Northrop Grumman Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Table 8.12.5: Northrop Grumman Corporation Sales by Geographical Location 2010-2014 (US$m, AGR %)
  • Table 8.12.6: Northrop Grumman Corporation Subsidiaries (Subsidiary, Location)
  • Table 8.12.7: Northrop Grumman Corporation Number of Employees 2010-2014 (Number, AGR %)
  • Table 8.12.8: Northrop Grumman Corporation Mergers and Acquisitions (Date, Company Involved, Details)
  • Table 8.12.9: Northrop Grumman Corporation Divestitures (Date, Company Involved, Details)
  • Table 8.13: Optiv Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.13.1: Northrop Grumman Corporation Divestitures (Date, Company Involved, Details)
  • Table 8.14: Palo Alto Networks Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.14.1: Palo Alto Networks Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.14.2: Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
  • Table 8.14.3: Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR %)
  • Table 8.14.4: Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR %)
  • Table 8.14.5: Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, AGR %)
  • Table 8.14.6: Palo Alto Networks Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.14.7: Palo Alto Networks Number of Employees 2012-2015 (No. of Employees, AGR %)
  • Table 8.14.8: Palo Alto Networks Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.15: Symantec Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.15.1: Symantec Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.15.2: Symantec Net Profit 2010-2015 (US$m, AGR %)
  • Table 8.15.3: Symantec Cost of Research & Development 2010-2015 (US$m, AGR %)
  • Table 8.15.4: Symantec Sales by Segment of Business 2014-2015 (US$m, AGR %)
  • Table 8.15.5: Symantec Sales by Geographical Location 2008-2015 (US$m, AGR %)
  • Table 8.15.6: Symantec Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.15.7: Symantec Number of Employees 2010-2015 (No. of Employees, AGR %)
  • Table 8.15.8: Symantec Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.15.9: Symantec Divestitures 2015 (Date, Details)
  • Table 8.15.10: Symantec Mergers 2004 (Date, Details)
  • Table 8.16: Trend Micro Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, IR Contact, Ticker, Website)
  • Table 8.16.1: Trend Micro Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.16.2: Trend Micro Net Profit 2010-2015 (US$m, AGR %)
  • Table 8.16.3: Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR %)
  • Table 8.16.4: Trend Micro Sales by Geographical Location 2008-2014 (US$m, AGR %)
  • Table 8.16.5: Trend Micro Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.16.6: Trend Micro Acquisitions (Date, Company Involved, Value US$m, Details)
  • Table 8.16.7: Trend Micro Divestitures 2015 (Date, Details)
  • Table 8.17: Other Companies Involved in the Cyber Security Market 2016 (Company, Estimated Sales in the Market $USm, Location)

List of Figures

  • Figure 1.1: Global Cyber Security Market Segmentation Overview
  • Figure 1.2: Example of Cyber Security Market by Regional Market Share Forecast 2016, 2021 (% Share)
  • Figure 1.3: Example of National vs. Global Cyber Security Market CAGR Forecast 2016-2021 (CAGR %)
  • Figure 1.4: Example of National Cyber Security Market by Submarket Forecast 2016-2021 (US$m, AGR %)
  • Figure 2.1: Global Cyber Security Market Segmentation Overview
  • Figure 2.2: Common Stages of Cyber Attacks
  • Figure 3.1: Global Cyber Security Market Forecast 2015-2021 (US$m, AGR %)
  • Figure 3.2: Cyber Security Regional Coverage (Region)
  • Figure 3.3: Regional Cyber Security Market Sales Forecast 2016-2021(US$m, AGR%,)
  • Figure 3.4: Regional Cyber Security Market AGR Forecast 2016-2021(AGR%,)
  • Figure 3.5: Regional Cyber Security Market Percentage Change in Market Share 2016-2021 (% Change)
  • Figure 3.6: Regional Cyber Security Market Cumulative Sales 2016-2021 ($US$m)
  • Figure 3.7: Regional Cyber Security Market Share Forecast 2016 (%,)
  • Figure 3.8: Regional Cyber Security Market Share Forecast 2021 (%,)
  • Figure 4.1: Global Cyber Security Submarket Forecast 2016-2021 (US$m, Global AGR %)
  • Figure 4.2: Global Cyber Security Submarket AGR Forecast 2016-2021 (AGR %)
  • Figure 4.3: Global Cyber Security Submarket Share Forecast 2016 (% Share)
  • Figure 4.4: Global Cyber Security Submarket Share Forecast 2021 (% Share)
  • Figure 4.5: Global Cyber Security Submarket Cumulative Sales Forecast 2016-2021 ($USm)
  • Figure 5.1: Leading 9 National Cyber Security Markets Sales Forecast 2016-2021 (US$m, Global AGR %)
  • Figure 5.2: Global Cyber Security Market Leading 9 National Markets AGR Forecast 2016-2021 (AGR %)
  • Figure 5.3: Leading 9 National Cyber Security Markets CAGR Forecast 2016-2021 (CAGR %)
  • Figure 5.4: Leading 9 National Cyber Security Markets Share Forecast 2016 (% Share)
  • Figure 5.5: Leading 9 National Cyber Security Markets Share Forecast 2021 (% Share)
  • Figure 5.6: Leading 9 National Cyber Security Markets Cumulative Sales Share Forecast 2016-2021 (% Share)
  • Figure 5.7: China Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.8: China vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.9: China Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.10: France Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.11: France vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.12: France Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.13: France Cyber Security Agency (ANSSI) Budget 2010-2014 (US$m, AGR %)
  • Figure 5.14: France Cyber Security Agency (ANSSI) Organisational Structure 2016
  • Figure 5.15: Israel Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.16: Israel vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.17: Israel Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.18: Israeli Defence Contracts Total Value 2007-2014 (US$m, AGR %)
  • Figure 5.19: Japan Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.20: Japan vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.21: Japan Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.22: Japan Spending on IT Software and Services 2012-2014 (US$m)
  • Figure 5.23: Japan Ministry of Defence Spending on Cyber Security 2012-2016 (US$m, AGR %)
  • Figure 5.24: Russia Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.25: Russia vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.26: Russia Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.27: Saudi Arabia Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.28: Saudi Arabia vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.29: Saudi Arabia Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.30: South Korea Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.31: South Korea vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.32: South Korea Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.33: U.S. Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.34: U.S. vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.35: U.S. Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.36: U.S. Federal Government's Global Budget for Cyber Security 2013-2016 (US$m, AGR %)
  • Figure 5.37: U.S. Federal Government's Budget for Cyber Security by Departments 2015-2016 (US$m)
  • Figure 5.38: U.S. Total Federal Spending on Cyber Security 2010-2015 (US$m, AGR %)
  • Figure 5.39: U.S. Federal Spending on Cyber Security by Departments 2010-2015 (US$m, AGR %)
  • Figure 5.40: U.S. Federal Spending on Cyber Security by Departments Share 2015 (Share %)
  • Figure 5.41: U.S. Federal Spending on Cyber Security by Departments Cumulative Share 2010 2015 (Share %)
  • Figure 5.42: U.S. Federal Spending on Cyber Security by States 2010-2015 (US$m, AGR %)
  • Figure 5.43: U.S. Federal Spending on Cyber Security by States Share 2015 (Share %)
  • Figure 5.44: U.S. Federal Spending on Cyber Security by States Cumulative Share 2010-2015 (Share %)
  • Figure 5.45: U.S. Government and Military Cyber Security Organisations
  • Figure 5.46: UK Cyber Security Market Forecast 2016-2021 (US$m, AGR %)
  • Figure 5.47: UK vs. Global Cyber Security Market Forecast 2016-2021 ($USm)
  • Figure 5.48: UK Cyber Security Market Share Forecast 2016, 2021 (% Share)
  • Figure 5.49: UK National Cyber Security Programme Total Spending Forecast 2011-2020 (US$m, AGR %)
  • Figure 5.50: UK National Cyber Security Programme Spending by Segments Share 2014-2015 (Share %)
  • Figure 5.51: UK Cyber Security Export in the Security Sector 2012-2015 (US$m, AGR %)
  • Figure 8.1: Global Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.2: Blue Coat Systems Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.2.1: Blue Coat Systems Total Company Sales 2007-2011 (US$m, AGR %)
  • Figure 8.2.2: Blue Coat Systems Sales by Segment of Business 2007-2011 (US$m, Total Company Sales AGR %)
  • Figure 8.2.3: Blue Coat Systems Sales AGR by Segment of Business 2008-2011 (%)
  • Figure 8.2.4: Blue Coat Systems Net Profit / Loss 2007-2011 (US$m)
  • Figure 8.2.5: Blue Coat Systems Cost of Research & Development 2007-2011 (US$m, AGR %)
  • Figure 8.2.6: Blue Coat Systems Primary International Operations 2016
  • Figure 8.2.7: Blue Coat Systems Sales AGR by Geographical Location 2008-2011 (%)
  • Figure 8.2.8: Blue Coat Systems Sales by Geographical Location 2007-2011 (US$m, Total Company Sales AGR %)
  • Figure 8.2.9: Blue Coat Systems Organisational Structure 2015
  • Figure 8.2.10: Blue Coat Systems Number of Employees 2007-2011 (No. of Employees, AGR %)
  • Figure 8.2.11: Blue Coat Systems Primary Market Competitors 2015
  • Figure 8.3: Check Point Software Technologies Ltd Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.3.1: Check Point Software Technologies Ltd Total Company Sales 2005-2014 (US$m, AGR %)
  • Figure 8.3.2: Check Point Software Technologies Ltd Net Income 2005-2014 (US$m, AGR %)
  • Figure 8.3.3: Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014 (US$m, AGR %)
  • Figure 8.3.4: Check Point Software Technologies Ltd Cost of Research & Development 2005-2014 (US$m, AGR %)
  • Figure 8.3.5: Check Point Software Technologies Ltd Primary International Operations 2015 (Headquarters, Primary International Operations)
  • Figure 8.3.6: Check Point Software Technologies Ltd Sales by Geographical Location 2009-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.3.7: Check Point Software Technologies Ltd Sales AGR by Geographical Location 2010-2014 (AGR %)
  • Figure 8.3.8: Check Point Software Technologies Ltd Organisational Structure 2015
  • Figure 8.3.9: Check Point Software Technologies Ltd Number of Employees 2010-2014 (Number, AGR %)
  • Figure 8.3.10: Check Point Software Technologies Ltd Primary Market Competitors
  • Figure 8.4: Cisco Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.4.1: Cisco Total Company Sales 2008-2015 (US$m, AGR %)
  • Figure 8.4.2: Cisco Net Profit 2010-2015 (US$m, AGR %)
  • Figure 8.4.3: Cisco Cost of Research & Development 2010-2015 (US$m, AGR %)
  • Figure 8.4.4: Cisco Sales by Segment of Business 2011-2015 (US$m, AGR %)
  • Figure 8.4.5: Cisco Sales by Segment of Business 2010-2015 (US$m, AGR %)
  • Figure 8.4.6: Cisco Primary International Operations 2015
  • Figure 8.4.7: Cisco Sales AGR by Geographical Location 2011-2015 (%)
  • Figure 8.4.8: Cisco Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR %)
  • Figure 8.4.9: Cisco Organisational Structure 2015
  • Figure 8.4.10: Cisco Number of Employees 2012-2015 (No. of Employees, AGR %)
  • Figure 8.4.11: Cisco Primary Market Competitors 2015
  • Figure 8.5: EMC Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.5.1: EMC Total Company Sales 2008-2014 (US$m, AGR %)
  • Figure 8.5.2: EMC Net Profit 2010-2014 (US$m, AGR %)
  • Figure 8.5.3: EMC Cost of Research & Development 2010-2014 (US$m, AGR %)
  • Figure 8.5.4: EMC Sales AGR by Segment of Business 2011-2014 (AGR %)
  • Figure 8.5.5: EMC Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Figure 8.5.6: EMC Primary International Operations 2015
  • Figure 8.5.7: EMC Sales AGR by Geographical Location 2009-2014 (AGR %)
  • Figure 8.5.8: EMC Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.5.9: EMC Organisational Structure 2015
  • Figure 8.5.10: EMC Number of Employees 2010-2014 (No of Employees, AGR %)
  • Figure 8.5.11: EMC Primary Market Competitors
  • Figure 8.6: Fortinet Inc Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.6.1: Fortinet Inc Total Company Sales 2009-2014 (US$m, AGR %)
  • Figure 8.6.2: Fortinet Inc Net Income 2010-2014 (US$m, AGR %)
  • Figure 8.6.3: Fortinet Inc Net Capital Expenditure 2010-2014 (US$m, AGR %)
  • Figure 8.6.4: Fortinet Inc Sales by Segment of Business 2009-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.6.5: Fortinet Inc Sales AGR by Segment of Business 2010-2014 (%)
  • Figure 8.6.6: Fortinet Inc Primary International Operations 2015 (Headquarters, Primary International Operations)
  • Figure 8.6.7: Fortinet Inc Sales AGR by Geographical Location 2010-2014 (%)
  • Figure 8.6.8: Fortinet Inc Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.6.9: Fortinet Inc Organisational Structure 2015
  • Figure 8.6.10: Fortinet Inc Number of Employees 2011-2014 (Number, AGR %)
  • Figure 8.6.11: Fortinet Inc Primary Market Competitors
  • Figure 8.7: Hewlett-Packard (HP) Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.7.1: Hewlett-Packard (HP) Total Company Sales 2010-2015 (US$m, AGR %)
  • Figure 8.7.2: Hewlett-Packard (HP) Net Income / Loss 2010-2015 (US$m)
  • Figure 8.7.3: Hewlett-Packard (HP) Sales AGR by Segment of Business 2011-2015 (AGR %)
  • Figure 8.7.4: Hewlett-Packard (HP) Sales by Segment of Business 2010-2015 (US$m, AGR %)
  • Figure 8.7.5: Hewlett-Packard (HP) Primary International Operations 2015 (Headquarters, Primary International Operations)
  • Figure 8.7.6: Hewlett-Packard (HP) Organisational Structure 2015
  • Figure 8.7.7: Hewlett-Packard (HP) Primary Market Competitors
  • Figure 8.8: Intel Corporation Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.8.1: Intel Corporation Total Company Sales 2008-2014 (US$m, AGR %)
  • Figure 8.8.2: Intel Corporation Net Profit 2010-2014 (US$m, AGR %)
  • Figure 8.8.3: Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR %)
  • Figure 8.8.4: Intel Corporation Sales AGR by Segment of Business 2011-2014 (AGR %)
  • Figure 8.8.5: Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
  • Figure 8.8.6: Intel Corporation Primary International Operations 2015
  • Figure 8.8.7: Intel Corporation Sales AGR by Geographical Location 2011-2014 (AGR %)
  • Figure 8.8.8: Intel Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.8.9: Intel Corporation Organisational Structure 2015
  • Figure 8.8.10: Intel Corporation Number of Employees 2010-2014 (No of Employees, AGR %)
  • Figure 8.8.11: Intel Corporation Primary Market Competitors
  • Figure 8.9: International Business Machines (IBM) Corporation Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.9.1: IBM Total Company Sales 2008-2014 (US$m, AGR %)
  • Figure 8.9.2: IBM Net Profit 2010-2014 (US$m, AGR %)
  • Figure 8.9.3: IBM Cost of Research & Development 2010-2014 (US$m, AGR %)
  • Figure 8.9.4: IBM Sales AGR by Segment of Business 2011-2014 (AGR %)
  • Figure 8.9.5: IBM Sales by Segment of Business 2010-2014 (AGR %)
  • Figure 8.9.6: IBM Primary International Operations 2015
  • Figure 8.9.7: IBM Sales AGR by Geographical Location 2011-2014 (AGR %)
  • Figure 8.9.8: IBM Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.9.9: IBM Organisational Structure 2015
  • Figure 8.9.10: IBM Number of Employees 2010-2014 (No Of Employees, AGR %)
  • Figure 8.9.11: IBM Primary Market Competitors 2015
  • Figure 8.10: Kaspersky Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.10.1: Kaspersky Lab Total Company Sales 2008-2014 (US$m, AGR %)
  • Figure 8.10.2: Kaspersky Lab Primary International Operations 2015
  • Figure 8.10.3: Kaspersky Lab Organisational Structure 2015
  • Figure 8.10.4: Kaspersky Lab Primary Market Competitors
  • Figure 8.11: Lockheed Martin Corporation Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.11.1: Lockheed Martin Corporation Total Company Sales 2010-2014 (US$m, AGR %)
  • Figure 8.11.2: Lockheed Martin Corporation Net Income 2010-2014 (US$m, AGR %)
  • Figure 8.11.3: Lockheed Martin Corporation Net Capital Expenditure 2010-2014 (US$m, AGR %)
  • Figure 8.11.4: Lockheed Martin Corporation Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.11.5: Lockheed Martin Corporation Sales AGR by Segment of Business 2011-2014 (%)
  • Figure 8.11.6: Lockheed Martin Corporation Primary International Operations 2015 (Headquarters, Primary International Operations)
  • Figure 8.11.7: Lockheed Martin Corporation Sales AGR by Geographical Location 2010-2014 (%)
  • Figure 8.11.8: Lockheed Martin Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.11.9: Lockheed Martin Corporation Organisational Structure 2015
  • Figure 8.11.10: Lockheed Martin Corporation Number of Employees 2010-2014 (Number, AGR %)
  • Figure 8.11.11: Lockheed Martin Corporation Primary Market Competitors
  • Figure 8.12: Northrop Grumman Corporation Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.12.1: Northrop Grumman Corporation Total Company Sales 2008-2014 (US$m, AGR %)
  • Figure 8.12.2: Northrop Grumman Corporation Net Profit 2009-2014 (US$m, AGR %)
  • Figure 8.12.3: Northrop Grumman Corporation Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.12.4: Northrop Grumman Corporation Sales AGR by Segment of Business 2011-2014 (%)
  • Figure 8.12.5: Northrop Grumman Corporation Primary International Operations 2015 (Headquarters, Primary International Operations)
  • Figure 8.12.6: Northrop Grumman Corporation Sales AGR by Geographical Location 2011-2014 (%)
  • Figure 8.12.7: Northrop Grumman Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.12.8: Northrop Grumman Corporation Organisational Structure 2015
  • Figure 8.12.9: Northrop Grumman Corporation Number of Employees 2010-2014 (Number, AGR %)
  • Figure 8.12.10: Northrop Grumman Corporation Primary Market Competitors
  • Figure 8.13: Optiv Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.13.1: Optiv Primary International Operations 2015
  • Figure 8.13.2: Optiv Organisational Structure 2016
  • Figure 8.13.3: Optiv Primary Market Competitors 2015
  • Figure 8.14: Palo Alto Networks Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.14.1: Palo Alto Networks Total Company Sales 2008-2015 (US$m, AGR %)
  • Figure 8.14.2: Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
  • Figure 8.14.3: Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR %)
  • Figure 8.14.4: Palo Alto Networks Sales AGR by Segment of Business 2011-2015 (AGR %)
  • Figure 8.14.5: Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR %)
  • Figure 8.14.6: Palo Alto Networks Primary International Operations 2016
  • Figure 8.14.7: Palo Alto Networks Sales AGR by Geographical Location 2011-2015 (AGR %)
  • Figure 8.14.8: Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR %)
  • Figure 8.14.9: Palo Alto Networks Organisational Structure 2015
  • Figure 8.14.10: Palo Alto Networks Number of Employees 2012-2015 (No of Employees, AGR %)
  • Figure 8.14.11: Palo Alto Networks Primary Market Competitors
  • Figure 8.15: Symantec Corporation Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.15.1: Symantec Total Company Sales 2008-2015 (US$m, AGR %)
  • Figure 8.15.2: Symantec Net Profit 2010-2015 (US$m, AGR %)
  • Figure 8.15.3: Symantec Cost of Research & Development 2010-2015 (US$m, AGR %)
  • Figure 8.15.4: Symantec Sales by Segment of Business 2014-2015 (US$m)
  • Figure 8.15.5: Symantec Primary International Operations 2015
  • Figure 8.15.6: Symantec Sales AGR by Geographical Location 2009-2015 (AGR %)
  • Figure 8.15.7: Symantec Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR %)
  • Figure 8.15.8: Symantec Organisational Structure 2015
  • Figure 8.15.9: Symantec Number of Employees 2010-2015 (No. of Employees, AGR %)
  • Figure 8.15.10: Symantec Primary Market Competitors
  • Figure 8.16: Trend Micro Cyber Security Market Share 2015 (% Market Share)
  • Figure 8.16.1: Trend Micro Total Company Sales 2010-2015 (US$m, AGR %)
  • Figure 8.16.2: Trend Micro Net Profit 2010-2015 (US$m, AGR %)
  • Figure 8.16.3: Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR %)
  • Figure 8.16.4: Trend Micro Primary International Operations 2015
  • Figure 8.16.5: Trend Micro Sales AGR by Geographical Location 2009-2014 (AGR %)
  • Figure 8.16.6: Trend Micro Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR %)
  • Figure 8.16.7: Trend Micro Organisational Structure 2015
  • Figure 8.16.8: Trend Micro Primary Market Competitors

Companies Listed

  • @Stake
  • 1 Mainstream Inc
  • 3001 International Inc
  • 4FrontSecurity
  • Acano Limited
  • Accuvant
  • ACS
  • Actona Technologies Ltd
  • Adaptivity
  • AffirmTrust
  • Airbus Defence and Space
  • Airbus Group
  • Aironet Canada Inc.
  • Aironet Canada Limited
  • Airspace Wireless Networks Private Limited
  • Akamai Technologies
  • Alcatel-Lucent
  • Alchemy API
  • Algosec
  • AlienVault
  • Alion Science and Technology
  • Allied Holdings Inc
  • Altera
  • Altiris
  • Amazon
  • Amazon Web Services (AWS)
  • Americas HQ
  • Amor Group
  • Anthem
  • Applied Research Corporation
  • AppStream
  • Arista Networks
  • Arroyo Video Solutions LLC
  • Aruba Networks
  • Ashley Madison
  • AsiaInfo Technologies
  • Aspera
  • Assemblage
  • Astrotech Corporation
  • Astrotech Space Operations
  • AT&T
  • Atos
  • Autonomy Corporation
  • Avast
  • Aveksa
  • Aveos Fleet Performance
  • AVG Technologies
  • AXENT
  • BAE Systems
  • Baidu
  • Bain Capital
  • Baraccuda Networks
  • Barbaricum LLC
  • BarcoNet Pty. Ltd.
  • Baum, Romstedt Technology Research Corp
  • Belgacom
  • Bindview Development Corporation
  • Bit9 + Carbon Black
  • BitDefender
  • Blackfin Security
  • Blackstone
  • Bloomberg
  • Blue Box Group
  • Blue Coat Netherlands B.V.
  • Blue Coat Systems
  • Blue Coat Systems Australia Pty. Ltd.
  • Blue Coat Systems Canada, Inc.
  • Blue Coat Systems Hong Kong Ltd.
  • Blue Coat Systems International, Inc.
  • Blue Coat Systems K.K.
  • Blue Coat Systems Latvia, SIA
  • Blue Coat Systems Ltd. (UK)
  • Blue Coat Systems Malaysia SDN. BHD.
  • Blue Coat Systems SARL
  • Blue Coat Systems, Belgium B.V.B.A.
  • Boeing Defense, Space & Security
  • Boleto Bancário
  • Booz Allen Hamilton
  • Booz Allen Hamilton Inc
  • Brightmail
  • Broadware Technologies LLC
  • Broadweb
  • BT Group
  • Bull
  • Business Week
  • California Microwave Inc
  • Canada Inc.
  • Capita
  • Carlyle Group
  • CDL Systems Ltd
  • CDW Government LLC
  • CenturyLink
  • Cerberian, Inc.
  • CGI Group Inc
  • Chandler / May Inc.
  • Check Point Holding (Singapore) PTE Ltd
  • Check Point Holding (Singapore) PTE Ltd - US Branch
  • Check Point Holding (Singapore) PTE Ltd. (Representative Office)
  • Check Point Holding AB
  • Check Point Software (Canada) Technologies Inc
  • Check Point Software Technologies (Japan) Ltd
  • Check Point Software Technologies (Netherlands) B.V
  • Check Point Software Technologies Inc
  • Check Point Software Technologies Ltd.
  • China Telecom
  • CirroSecure
  • Cisco Albania SHPK
  • Cisco Bahrain (SPC)
  • Cisco Cameroon Limited
  • Cisco Capital (Dubai) Limited
  • Cisco Comercio E Servicos De Hardware E Software Do Brasil LTDA
  • Cisco Development India Private Limited
  • Cisco Do Brasil Ltda
  • Cisco Fast Data, LLC
  • Cisco International Limited
  • Cisco Iris, Inc.
  • Cisco IronPort Systems LLC
  • Cisco ISH BV
  • Cisco ISH II BV
  • Cisco Linksys Kiss ApS
  • Cisco Malaysia Managed Services Sdn. Bhd
  • Cisco Managed Solutions, Inc.
  • Cisco Media Solutions, Inc.
  • Cisco MO BV
  • Cisco Photonics Italy Srl
  • Cisco QSTP-LLC
  • Cisco Ravenscourt LLC
  • Cisco RZ LLC (formerly Richard Zeta Intelligence, Inc.)
  • Cisco SBAIF III, Inc.
  • Cisco Serbia doo Beograd
  • Cisco Services Malaysia Sdn Bhd
  • Cisco Systems
  • Cisco Systems (Argentina) SA
  • Cisco Systems (Bermuda) Holdings Ltd
  • Cisco Systems (Bermuda) Ltd
  • Cisco Systems (China) Information Technology Services Limited
  • Cisco Systems (China) Networking Technology Co., Ltd.
  • Cisco Systems (China) Research and Development Co., Ltd.
  • Cisco Systems (Colombia) Ltda
  • Cisco Systems (Czech Republic) SRO
  • Cisco Systems (Ethiopia) PLC
  • Cisco Systems (HK) Limited
  • Cisco Systems (India) Ltd.
  • Cisco Systems (India) Private Limited
  • Cisco Systems (Italy) Srl
  • Cisco Systems (Jordan)
  • Cisco Systems (Korea) Limited
  • Cisco Systems (Malaysia) Sdn Bhd
  • Cisco Systems (Nigeria) Limited
  • Cisco Systems (Puerto Rico) Corp
  • Cisco Systems (Scotland) Limited
  • Cisco Systems (Senegal) SUARL
  • Cisco Systems (South Africa) (Proprietary) Limited
  • Cisco Systems (Spain) SL
  • Cisco Systems (Sweden) AB
  • Cisco Systems (Switzerland) GmbH
  • Cisco Systems (Switzerland) Investments Ltd
  • Cisco Systems (Thailand) Limited
  • Cisco Systems (Trinidad & Tobago) Limited
  • Cisco Systems (USA) Pte Ltd
  • Cisco Systems Algeria EURL
  • Cisco Systems Australia Pty Limited
  • Cisco Systems Austria GmbH
  • Cisco Systems Belgium BVBA/SPRL
  • Cisco Systems Bulgaria EOOD
  • Cisco Systems Canada Co./Les Systemes Cisco Canada Cie
  • Cisco Systems Capital (Australia) Pty Limited
  • Cisco Systems Capital (India) Private Limited
  • Cisco Systems Capital (Korea) Limited
  • Cisco Systems Capital (Thailand) Limited
  • Cisco Systems Capital Asia Pte Ltd
  • Cisco Systems Capital Canada Co./Les Systemes Cisco Capital Canada Cie
  • Cisco Systems Capital China Corporation
  • Cisco Systems Capital Corporation
  • Cisco Systems Capital France SAS
  • Cisco Systems Capital GmbH
  • Cisco Systems Capital Italy Srl
  • Cisco Systems Capital KK
  • Cisco Systems Capital Netherlands BV
  • Cisco Systems Capital Sdn Bhd
  • Cisco Systems Capital South Africa (Proprietary) Limited
  • Cisco Systems Capital Spain, SL
  • Cisco Systems Chile SA
  • Cisco Systems Co.
  • Cisco Systems Costa Rica, SA
  • Cisco Systems Croatia Ltd. For Trade
  • Cisco Systems Cyprus Ltd
  • Cisco Systems De Mexico, SA de CV
  • Cisco Systems Denmark ApS
  • Cisco Systems Dominicana SA
  • Cisco Systems Ecuador SA
  • Cisco Systems Egypt Ltd.
  • Cisco Systems El Salvador, Ltda de CV
  • Cisco Systems Estonia OU
  • Cisco Systems Finance International
  • Cisco Systems Finance International Holdings I Limited
  • Cisco Systems Finance International Holdings II Limited
  • ClearLeap
  • Clearwell Systems
  • Cleversafe
  • Cloud Sync
  • Cloudant
  • Cloudflare
  • Cloudscaling
  • CM Equity Partners
  • Cognitive Security
  • Collaborate.com
  • Comneon
  • Compagnie IBM France, S.A.S.
  • Companhia IBM Portuguesa, S.A.
  • Company-i
  • Components Intel de Costa Rica, S.A.
  • Compose
  • Composite Software
  • Comptek Research Inc
  • Computer Sciences Corporation
  • ConteXtream
  • Cosentini Associates
  • Countertack
  • Coyote Point
  • Crossbeam Systems, Inc
  • CrossIdeas
  • Crowdstrike
  • CSL International
  • Cyber Defense Information Assurance
  • CyberArk
  • Cybereason
  • Cylance
  • Cyvera Ltd
  • Cyvera, Inc.
  • Daeja Image Systems Ltd
  • Darktrace
  • Defensetech
  • Dell Federal Systems Inc
  • Dell Inc
  • Dell SecureWorks
  • Deloitte
  • Deloitte Touche Tohmatsu Ltd
  • Deposition Sciences Inc
  • Diebold
  • Digital Guardian
  • Digital Shadows
  • DMI
  • Domino's Pizza
  • DRC Systems
  • DSSD
  • Dynasec Ltd
  • Elastica
  • Embrane
  • EMC
  • EMC (Benelux) B.V.
  • EMC Information Systems International
  • EMC International Company
  • EMC International U.S. Holdings, Inc.
  • Entera Corporation
  • Enterprise Integration Group
  • Ernst&Young Global Ltd
  • ESET
  • Eucalyptus
  • Exelis, Inc.
  • Explorys
  • FaceTime Communications
  • Federal Data Corporation
  • Fiberlink Communications
  • FireEye
  • FireEye, Inc
  • FireMon
  • FishNet Security
  • Forcepoint
  • Fortinet
  • Fortinet BV
  • Fortinet Federal Inc
  • Fortinet GmbH
  • Fortinet Information Technology (Beijing) Co Ltd
  • Fortinet Information Technology (Tianjin) Co Ltd
  • Fortinet International Inc.
  • Fortinet Japan K.K.
  • Fortinet Malaysia SDN. BHD.
  • Fortinet Mexico
  • Fortinet S.A.R.L.
  • Fortinet Singapore Private Limited
  • Fortinet Technologies (Canada) Inc
  • Fortinet Technologies India Private Limited
  • Fortinet Technologies Sales (Canada) Inc
  • Fortinet UK Ltd
  • F-Secure
  • Gemalto
  • General Atlantic
  • General Dynamics
  • General Dynamics Corporation
  • General Dynamics Information Technology
  • Georgia Tech
  • Georgia Tech Applied Research Corporation
  • Gideon Technologies
  • Global HQ
  • Global Technical Systems
  • Globalfoundries Inc
  • GLONASS
  • Google
  • Gravitant
  • Grumman International Inc
  • Grumman Ohio Corporation
  • Guidance Software
  • Havok
  • Healthcare Incorporated
  • Hewlett Packard Enterprise (HPE)
  • Hewlett Packard Inc
  • Hewlett-Packard Company
  • Hiflex
  • Hitachi
  • Home Depot
  • Honeywell
  • HP Enterprise Services
  • Huawei
  • Humyo
  • Huntington Ingalls Industries Inc
  • Hyperwise Ltd
  • IBM (China) Co., Ltd.
  • IBM (China) Investment Company Limited
  • IBM Argentina Sociedad de Responsabilidad Limitada
  • IBM Australia Limited
  • IBM Bangladesh Private Limited
  • IBM Bulgaria Ltd.
  • IBM Ceska Republika spol. s.r.o.
  • IBM China/Hong Kong Limited
  • IBM Croatia Ltd./IBM Hrvatska d.o.o.
  • IBM Denmark ApS
  • IBM Deutschland GmbH
  • IBM Deutschland Kreditbank GmbH
  • IBM East Europe/Asia Ltd.
  • IBM Eesti Osauhing (IBM Estonia Ou)
  • IBM Foreign Sales Corporation
  • IBM France Financement, S.A.
  • IBM Global Financing Australia Limited
  • IBM Hellas Information Handling Systems S.A.
  • IBM India Private Limited
  • IBM International Group B.V.
  • IBM Ireland Limited
  • IBM Ireland Product Distribution Limited
  • IBM Italia S.p.A.
  • IBM Japan, Ltd.
  • IBM Korea, Inc.
  • IBM Lietuva
  • IBM Magyarorszagi Kft.
  • IBM Malaysia Sdn Bhd
  • IBM Malta Limited
  • IBM Nederland B.V.
  • IBM New Zealand Limited
  • IBM Oesterreich Internationale Bueromaschinen GmbH
  • IBM Philippines, Incorporated
  • IBM Polska Sp z oo
  • IBM Romania Srl
  • IBM Schweiz AG-IBM Suisse SA-IBM Suizzera SA-IBM Switzerland Ltd.
  • IBM Services Financial Sector Luxembourg Sarl
  • IBM Singapore Pte. Ltd.
  • IBM Slovenija d.o.o.
  • IBM Slovensko spol s.r.o.
  • IBM Svenska Aktiebolag
  • IBM Taiwan Corporation
  • IBM Thailand Company Limited
  • IBM Ukraine
  • IBM United Kingdom Asset Leasing Limited
  • IBM United Kingdom Financial Services Limited
  • IBM United Kingdom Limited
  • IBM Vietnam Company
  • IBM-International Business Machines d.o.o., Belgrade
  • Identity Theft Guard Solutions LLC
  • Idnetum
  • Imlogic Inc
  • Industrial Defender Inc
  • Insieme Networks
  • Intel America, Inc
  • Intel Asia holding Limited
  • Intel Benelux B.V.
  • Intel Capital (Cayman) Corporation
  • Intel Capital Corporation
  • Intel China Ltd.
  • Intel Corporation
  • Intel Corporation (UK) Ltd.
  • Intel Electronics Finance Limited
  • Intel Electronics Ltd.
  • Intel Europe, Inc.
  • Intel Holdings B.V.
  • Intel International
  • Intel Investment Management Limited
  • Intel Ireland Limited
  • Intel Israel (74) Limited
  • Intel Israel Holdings B.V.
  • Intel Kabushiki Kaisha
  • Intel Massachusetts, Inc
  • Intel Mobile Communications GmbH
  • Intel Overseas Funding Corporation
  • Intel Security
  • Intel Semiconductors, Ltd.
  • Intel Semiconductor (Dalian) Ltd.
  • Intel Semiconductor (US) Limited
  • International Business Machines AS
  • International Business Machines Corporation (IBM)
  • International Business Machines of Belgium spry/buba
  • International Business Machines, S.A.
  • Intucell
  • Investcorp
  • Iron Bow Technologies LLC
  • Isis Defence
  • J.P. Morgan
  • Johnson Controls
  • JouleX
  • Juniper Networks
  • Kaspersky Lab
  • Kaspersky Lab Argentina
  • Kaspersky Lab Asia-Pacific HQ
  • Kaspersky Lab Australia and New Zealand
  • Kaspersky Lab Benelux
  • Kaspersky Lab Canada
  • Kaspersky Lab China
  • Kaspersky Lab France
  • Kaspersky Lab Germany
  • Kaspersky Lab Iberia
  • Kaspersky Lab India
  • Kaspersky Lab Italy
  • Kaspersky Lab Japan
  • Kaspersky Lab Korea
  • Kaspersky Lab Malaysia
  • Kaspersky Lab Mexico
  • Kaspersky Lab Nordics
  • Kaspersky Lab Polska sp z oo
  • Kaspersky Lab Romania
  • Kaspersky Lab South Africa (Pty) Ltd.
  • Kaspersky Lab Switzerland
  • Kaspersky Lab Turkey
  • Kaspersky Lab UK
  • Knowledge Consulting Group (KCG)
  • KPMG
  • KPMG
  • Kratos Defense
  • KT mobile networks
  • Kudu Dynamics LLC
  • L-3 Communications
  • L-3 Communications Holdings
  • Lacoon Mobile Security
  • Lancope, Inc
  • LANdesk Software
  • Leidos Inc
  • Lenovo
  • lgoSec
  • Lindsay Goldberg LLC
  • Liric Associates
  • LiveOffice
  • Lockheed Martin Aerospace Systems Integration Corporation (Delaware)
  • Lockheed Martin Australia Pty Limited
  • Lockheed Martin Canada Inc
  • Lockheed Martin Corporation
  • Lockheed Martin Desktop Solutions Inc
  • Lockheed Martin Engine Investments LLC
  • Lockheed Martin Global Inc
  • Lockheed Martin Integrated Systems Inc
  • Lockheed Martin Integrated Technology LLC
  • Lockheed Martin Investments Inc
  • Lockheed Martin Logistics Management Inc
  • Lockheed Martin Operations Support Inc
  • Lockheed Martin Services Inc
  • Lockheed Martin Simulation, Training, and Support
  • Lockheed Martin Space Alliance Company
  • Lockheed Martin TAS International Services Inc
  • Lockheed Martin UK Insys Limited
  • Lockheed Martin UK Limited
  • Logic
  • Logicon Commercial Information Services Inc
  • Logicon Inc
  • Logicon International Inc
  • LogRhythm
  • M5 Network Security Pty Ltd
  • MacAulay-Brown, Inc
  • Maginatics
  • MaintenanceNet
  • Malwarebytes Anti-Malware
  • ManageEngine
  • Mandiant
  • ManTech
  • ManTech Advance Systems International, Inc.
  • ManTech International Corporation
  • McAfee, Inc
  • Memoir Systems
  • Meru Networks
  • MessageLabs
  • Metacloud
  • Meteorix LLC
  • Mi5 Networks
  • Micro Focus (Novell)
  • Microsoft Corporation
  • Microtech Systems
  • Middle-East FZ-LCC
  • Mission College Investments Ltd.
  • Mitsubishi Heavy Industries
  • Mobile Armor
  • Mocit Inc
  • Morta Security, Inc.
  • Mt Gox
  • Naikon Group
  • Neophis
  • NGC Denmark ApS
  • Niederlassung Osterreich
  • NitroDesk
  • NitroSecurity
  • Nokia
  • Nonghyup Cooperative
  • Norman Shark
  • Northrop Grumman Corporation
  • Northrop Electro-Optical Systems
  • Northrop Grumman - Canada
  • Northrop Grumman Aviation Inc
  • Northrop Grumman Electronic Systems International Company
  • Northrop Grumman Electronic Systems International Company (UK)
  • Northrop Grumman Electronics Systems Integration International Inc
  • Northrop Grumman Field Support Services Inc
  • Northrop Grumman Foreign Sales Corporation
  • Northrop Grumman Information and Technology, Inc
  • Northrop Grumman International Inc
  • Northrop Grumman International Services Company Inc
  • Northrop Grumman ISA International Inc
  • Northrop Grumman Overseas Holdings Inc
  • Northrop Grumman Overseas Service Corporation
  • Northrop Grumman Space Operations LP
  • Northrop Grumman Systems Corp
  • Northrop Grumman Systems Information Sector
  • Northrop Grumman Tactical Systems LLC
  • Northrop Grumman Technical Services Corporation
  • Northrop Grumman Technical Services Inc
  • Northrop International Aircraft Inc
  • Nova Scotia Company
  • Now Factory
  • NSS Labs Inc.
  • nSuite
  • NTT Com Security
  • NTT Communications
  • Nukona
  • Oak Ridge
  • ON Technology
  • OpenDNS
  • Optiv
  • Oracle
  • Orange
  • OTC Holdings Inc
  • Oy IBM Finland AB
  • Pacific Architects and Engineers Inc
  • Packeteer
  • Palo Alto Networks (Australia) Pty Ltd
  • Palo Alto Networks (Brasil) Ltda.
  • Palo Alto Networks (Canada) Inc.
  • Palo Alto Networks (Germany) GmbH
  • Palo Alto Networks (India) Private Limited
  • Palo Alto Networks (Malaysia), LLC
  • Palo Alto Networks (Mexico) S. de R.L. de C.V.
  • Palo Alto Networks (Netherlands) B.V.
  • Palo Alto Networks (Norway) AS
  • Palo Alto Networks (Singapore) Holding Company Pte. Ltd.
  • Palo Alto Networks (Singapore) PTE. LTD.
  • Palo Alto Networks (UK) Limited
  • Palo Alto Networks Belgium B.V.B.A.
  • Palo Alto Networks FZ LLC
  • Palo Alto Networks Godo Kaisha
  • Palo Alto Networks Holding B.V.
  • Palo Alto Networks International, Inc.
  • Palo Alto Networks Korea, Ltd.
  • Palo Alto Networks, L.L.C.
  • PAN C.V.
  • PAN LLC
  • Panda Security
  • Park Air Electronics Inc
  • ParStream
  • PasswordBank
  • Pawaa
  • PayPal
  • PC Tools
  • Perceptics Corporation
  • Perspecsys
  • PGP Corporation
  • Phytel
  • PistonCloud Computing
  • Pivot Holdings LLC
  • Platform Logic
  • Ponemon Institute
  • Portcullis Computer
  • PricewaterhouseCoopers (PWC)
  • Primera Blue Cross
  • Procerus Technologies, L.C. (Procerus)
  • Professional Project Services Inc.
  • Promisec
  • ProofPoint
  • Prykarpattyaoblenergo
  • PT IBM Indonesia
  • Qantas Defence Services (QDS)
  • QTC Holdings Inc
  • QTC Holdings Inc (QTC)
  • Radware
  • Raytheon
  • Raytheon (Forcepoint)
  • Raytheon BBN Technologies Corp
  • Recon Instruments
  • Redstone Arsenal
  • Relicore Inc.
  • Remotec Inc
  • Resilient Systems
  • Riga Corporation
  • RSA Information Security
  • RUAG
  • Sabiedriba ar irobezotu atbildibu IBM Latvija
  • Safran
  • SAIC
  • Sandia Corporation
  • Sandia Corporation (d/b/a Sandia National Laboratories, Co.)
  • Sandia National Laboratories
  • Saudi Aramco
  • Savi Technology, Inc.
  • ScaleIO
  • ScanDisk Corporation
  • Seagate
  • Secure Computing
  • Security Group
  • Sentrigo
  • Serco
  • Servicentro TMLA S.A.de C.V.
  • Shunra
  • Sierra Nevada Corp
  • Sikorsky Aircraft
  • Silicium Security
  • Silveerpop
  • Silver Tail Systems
  • Simics
  • Sim-Industries B.V. (Sim-Industries)
  • Singtel
  • Skybox Security
  • Skyview Capital
  • SMS Data Products Group Inc.
  • Snapfish
  • SofaWare Technologies Ltd
  • SoftLayer
  • SoftScan
  • Solera Networks
  • Solers Inc.
  • SolveDirect
  • SonicWall
  • SonicWall (Dell)
  • Sony Corporation
  • Sony Pictures Entertainment
  • Sophos
  • Sourcefire
  • Spamtest
  • Splunk
  • SRA International Inc
  • SRI
  • Star Analytics Inc
  • Sterling Software (US) Inc
  • Sterling Software Weather Inc
  • StrongLoop
  • SwapDrive
  • Sygate Technology
  • Symantec (UK) Limited
  • Symantec Asia Pacific Pte. Ltd.
  • Symantec Corporation
  • Symantec Holdings Limited
  • Symantec International
  • Symantec Japan LLC
  • Symantec Limited
  • Symantec Operating Corporation
  • Symantec Software India Private Ltd.
  • Syncplicity
  • Systems made Simple
  • Tail-f Systems
  • TalkTalk
  • Target
  • TASC Inc.
  • Technica
  • Technica Corporation
  • Technologies
  • Thales Group
  • The New York Times
  • The Weather Company
  • Third Brigade
  • Thoma Bravo, LLC
  • ThreatGrid
  • Tools
  • Transparent
  • Trend Micro (China) Incorporated
  • Trend Micro (EMEA) Limited
  • Trend Micro (NZ) Limited
  • Trend Micro (Singapore) Private Limited
  • Trend Micro (Thailand) Limited
  • Trend Micro (UK) Limited
  • Trend Micro Australia Pty. Ltd.
  • Trend Micro Deutschland GmbH
  • Trend Micro do Brasil Ltda.
  • Trend Micro France
  • Trend Micro Hong Kong Limited
  • Trend Micro Inc.
  • Trend Micro Incorporated
  • Trend Micro India Private Limited
  • Trend Micro Italy Srl
  • Trend Micro Korea Inc.
  • Trend Micro Latinoamerica S.A.de C.V.
  • Trend Micro Malaysia Sdn Bhd
  • TripWire
  • Tropo
  • Trusteer
  • Tufin
  • TurnTide
  • TV5 Monde
  • TWD & Associates
  • TwinStrata
  • Ubiquisys
  • Unicorn Government Inc
  • United Technologies Corporation
  • UrbanCode
  • Vencore Labs Inc
  • Veracode
  • VeriSign
  • Veritas
  • Veritas Capital
  • VERITAS Software Corporation
  • Verizon
  • Verizon Enterprise Solutions
  • Virtustream
  • VMware Bermuda Limited
  • VMware, Inc.
  • Voltage Security
  • Vontu
  • Western Digital Corporation
  • WHIPTAIL
  • WholeSecurity
  • Willis Group Holdings
  • Wind River Systems
  • Wind River Systems, Inc
  • World Wide Technology Inc
  • Wyle Laboratories, Inc.
  • X Technologies, Inc
  • Xetron Corporation
  • Xtera Communications Inc
  • Xtify Inc
  • XtreamLok
  • Yandex
  • YTN
  • Zeta Associates Inc
  • ZiiLabs

Organisations, Groups, Non-State Actors and Institutions Mentioned in This Report

  • Agence National de la Security des Systemes d'Information (ANSSI)
  • Alsancak Tim
  • Anonymous collective
  • Beer Sheva's Ben-Gurion university
  • Boko Haram
  • Brazilian Ministry of External Relations
  • Canada Department of National Defence
  • Canada Finance Department
  • Canada Treasury Board
  • China Aerospace Science & Industry Corporation (CASIC)
  • Chinese CERT
  • Chinese General Office of the State Council
  • Chinese Ministry of Commerce
  • Chinese Ministry of National Defence
  • Chinese Ministry of Public Security
  • Chinese Ministry of State Security
  • Chinese People's Liberation Army (PLA)
  • Chinese PLA Unit 61398
  • Chinese Science of Military Strategy
  • Defence Research and Development Canada
  • Estonian Parliament
  • European Commission
  • European Union (EU)
  • French Ministry of Defence
  • French Ministry of Finance
  • French Ministry of Interior
  • French Parliament
  • G20
  • G7
  • General Office of the Communist Party of China
  • Guardians of Peace
  • Hamas
  • Hezbollah
  • Inchon airport
  • India Defence Research and Development Organisation (DRDO)
  • India Ministry of External Affairs
  • India Ministry of Home Affairs
  • Indo-Tibetan Border Police (ITBP)
  • INTERPOL
  • Iranian Cyber Army
  • Islamic State in Iraq and Syria (ISIS)
  • Israel Defense Forces (IDF)
  • Israel National Cyber Bureau
  • Israeli Cyber Command
  • Israeli Cyber Event Readiness Team
  • Israeli National Cybersecurity Authority
  • Israeli Prime Minister's Office
  • Israeli Unit 8200
  • Israeli Defence Ministry
  • Izz ad-Din Al Qassam
  • Japan National Centre of Incident Readiness and Strategy for Cyber Security (NISC)
  • Japan Control Systems Security Centre (CSSC)
  • Japan Defence Ministry
  • Japan Information technology Promotion Agency (IPA)
  • Japan Ministry of Defence (MoD)
  • Japan Ministry of Economy, Trade and Industry (METI)
  • Japan Ministry of Internal Affairs and Communications
  • Japan Ministry of internal Affairs and Communications (MIC)
  • Japan National Institute of Information and Communications Technology (NICT)
  • Japan National Police Agency
  • Japan NICT's Network Security Laboratory
  • Japan Pension Services
  • Lawrence Berkeley National Laboratory
  • MAHER Centre of Iranian National Computer Emergency Response Team
  • Massachusetts Institute of Technology (MIT)
  • Mexican Centre for Investigation and National Security
  • Mexican Secretariat of National Defense
  • Mexican Secretariat of the Navy
  • Myanmar Posts and Telecommunications
  • Naikon group
  • NASA
  • Nigerian Defence Headquarters
  • North Atlantic Treaty Organisation (NATO)
  • Norwegian National Security Authority
  • Office of the Dalai Lama
  • Rex Mundi
  • Russian 5th Dimension Cyber Army
  • Russian Komitet gosudarstvennoy bezopasnosti (KGB )
  • Russian Ministry of Defence
  • Sandia National Laboratories
  • Saudi Arabian Ministry of Communications and Information Technology
  • Senegalese Agence de l'Informatique de l'Etat
  • Seoul Subway
  • South Korea Communications Commission
  • South Korea Cyber Security Centre
  • South Korea Cyber War Centre
  • South Korean Ministry of National Defence
  • South Korean National Assembly's Public Administration & Security Committee
  • South Korean National Intelligence Service
  • South Korean National Security Council
  • Stockholm International Peace Research Institute
  • Tarh Andishan
  • The Commonwealth
  • The Dukes
  • The Impact Team
  • Tsinghua University
  • U.S. DISA
  • U.S. ICS-CERT
  • U.S. Air Force
  • U.S. Air Force Cyber Command (AFCYBER)
  • U.S. ARMY
  • U.S. Army Cyber Command (ARCYBER)
  • U.S. Army Cyber Command (USCYBERCOM)
  • U.S. Central Command
  • U.S. Computer Emergency Readiness Team (US-CERT)
  • U.S. Cyber Command
  • U.S. Cyber Crimes Center (C3)
  • U.S. Cyber Mission Force
  • U.S. Defense Advanced Research Projects Agency (DARPA)
  • U.S. Defense Logistics Agency
  • U.S. Department of Agriculture
  • U.S. Department of Commerce
  • U.S. Department of Defense
  • U.S. Department of Education
  • U.S. Department of Energy
  • U.S. Department of Health and Human Services
  • U.S. Department of Homeland Security
  • U.S. Department of Housing and Urban Development
  • U.S. Department of Interior
  • U.S. Department of Justice
  • U.S. Department of Labor
  • U.S. Department of State
  • U.S. Department of the Interior
  • U.S. Department of Transportation
  • U.S. Department of Treasury
  • U.S. Department of Veterans Affairs
  • U.S. DHS Science & Technology Directorate
  • U.S. Environment and Protection agency
  • U.S. Environmental Protection Agency
  • U.S. Federal Bureau of Investigation (FBI)
  • U.S. Fleet Cyber Command (FLTCYBER)
  • U.S. General Services Administration
  • U.S. Government Accountability Office
  • U.S. Immigration and Customs Enforcement (ICE)
  • U.S. Internal Revenue Service
  • U.S. Joint Chiefs of Staff
  • U.S. Marine Corps
  • U.S. Marine Forces Cyber Command (MARFORCYBER)
  • U.S. Nation Security Agency (NSA)
  • U.S. National Aeronautics and Space Administration (NASA)
  • U.S. National Computer Forensic Institute
  • U.S. National Cyber investigative Joint Task Force (NCIJTF)
  • U.S. National Cybersecurity and Communications Integration Center (NCCIC)
  • U.S. National Institute of Standards and Technology (NIST)
  • U.S. National Intelligence
  • U.S. National Protection and Programs Directorate (NPPD)
  • U.S. National Science Foundation
  • U.S. Navy
  • U.S. Navy Space and Naval Warfare Systems Center Pacific
  • U.S. NPPD
  • U.S. Office of Cyber and infrastructure Analysis (OCIA)
  • U.S. Office of Cybersecurity and Communications (CS&C)
  • U.S. Office of Personnel Management
  • U.S. Secret Service
  • U.S. Social Security Administration
  • U.S. Strategic Command
  • UK Cabinet Office
  • UK Computer Emergency Response Team (CERT-UK)
  • UK Defence Cyber Protection Partnership
  • UK Department for Business, Innovation & Skills (BIS)
  • UK Government Communications Headquarters
  • UK Government Digital Service
  • UK HM Treasury
  • UK Metropolitan Police Service (MPS)
  • UK the Cyber security information Sharing Partnership for Industry & Government
  • Washington Headquarters Services
  • Wikileaks
  • World Economic Forum
Back to Top