表紙
市場調査レポート

企業向けエンドポイントサイバーセキュリティ市場 2015-2020年:主要企業・市場予測・市場分析・技術&ソリューション

Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response

発行 Visiongain Ltd 商品コード 346225
出版日 ページ情報 英文 286 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1GBP=134.80円で換算しております。

ご注意:
Single UserとDepartmentalライセンスは、DRM (デジタル著作権管理システム) 付PDFになります。
制限内容は、上記ライセンスの[?]アイコンをクリックしてご確認ください。

Back to Top
企業向けエンドポイントサイバーセキュリティ市場 2015-2020年:主要企業・市場予測・市場分析・技術&ソリューション Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response
出版日: 2015年12月04日 ページ情報: 英文 286 Pages
概要

2015年、世界の企業向けエンドポイントサイバーセキュリティの市場は49億8000万米ドルの規模に達すると予測されています。

当レポートでは、世界の企業向けエンドポイントサイバーセキュリティの市場について調査し、市場の定義、市場環境、市場成長の推進因子・阻害因子の分析、技術およびソリューション区分別の市場規模の推移と予測、地域別の市場背景・市場動向・市場成長予測、SWOT分析、専門家の見解、主要企業のプロファイルなどをまとめています。

第1章 調査概要

第2章 イントロダクション:企業向けエンドポイントセキュリティ市場

  • 世界市場の構造
  • 市場環境
    • 市場の定義
    • エンドポイントセキュリティの重要性の拡大
    • 世界の企業にとってのサイバー脅威
    • サイバー攻撃のもっとも一般的手法
    • サイバー攻撃の主な目的
    • サイバー攻撃のもっとも重要なメカニズム
    • サイバー攻撃のステージ

第3章 世界の企業向けエンドポイントセキュリティ市場の予測

  • 世界市場の予測
  • 世界市場の成長推進因子・阻害因子
    • 市場成長推進因子
      • エンドポイントにおける脅威の高度化
      • 通信技術の変化
      • 事業運営の進化
        • クラウディフィケーション
        • モビリティ
        • BYOD
      • 新たなインターネット接続デバイスの急増
    • 市場成長阻害因子
      • コスト
      • 脅威の過小評価
      • 顧客の混乱

第4章 世界の企業向けエンドポイントセキュリティ市場の予測:詳細区分別

  • 市場分析:技術別
    • アンチマルウェア
      • 署名ベース
      • 発見的手法
      • データマイニング
    • ファイアーウォール
      • パケットフィルタリング型
      • ステートフルインスペクション
      • アプリケーション層
      • プロキシ型
      • 次世代ファイアーウォール
    • 侵入検知システム
      • ホストベース
      • ネットワークベース
    • 侵入防止システム
    • 暗号化
      • 対称性
      • 非対称性
    • コンフィギュレーション管理
    • モバイルデバイス管理
    • データ損失防止
    • アプリケーション制御
    • コンピュータ侵入検知
  • 市場分析:ソリューション別
    • エンドポイントプロテクションの定義
    • エンドポイント検知・対応:定義
    • 次世代エンドポイントセキュリティ:定義

第5章 地域市場の予測

  • 地域別シェアの予測
  • アジア太平洋
    • 市場分析
      • 経済概要
      • デジタルの普及率:概要
      • サイバー攻撃:概要
      • 企業向けエンドポイントセキュリティ市場
    • 市場成長推進因子・阻害因子
  • 欧州
    • 市場分析
      • 経済概要
      • デジタルの普及率:概要
      • サイバー攻撃:概要
      • 企業向けエンドポイントセキュリティ市場
    • 市場成長推進因子・阻害因子
  • ラテンアメリカ
    • 市場分析
      • 経済概要
      • デジタルの普及率:概要
      • サイバー攻撃:概要
      • 企業向けエンドポイントセキュリティ市場
    • 市場成長推進因子・阻害因子
  • 中東・アフリカ
    • 市場分析
      • 経済概要
      • デジタルの普及率:概要
      • サイバー攻撃:概要
      • 企業向けエンドポイントセキュリティ市場
    • 市場成長推進因子・阻害因子
  • 北米
    • 市場分析
      • 経済概要
      • デジタルの普及率:概要
      • サイバー攻撃:概要
      • 企業向けエンドポイントセキュリティ市場
    • 市場成長推進因子・阻害因子

第6章 SWOT分析

第7章 専門家の見解

第8章 主要13社のプロファイル

  • 主要13者の収益実績のシェア
  • Cisco
  • EMC
  • ESET
  • FireEye, Inc.
  • Intel Corporation
  • International Business Machines (IBM) Corporation
  • Kaspersky Lab
  • Microsoft Corporation
  • Palo Alto Networks
  • Raytheon
  • Sophos
  • Symantec Corporation
  • Trend Micro

第9章 総論・提言

第10章 用語

図表

目次
Product Code: CYB0004

This new report offers comprehensive analysis of enterprise endpoint cyber security solutions and related companies. Visiongain assesses that the enterprise endpoint cyber security market will reach $4.98bn in 2015.

Visiongain's report will ensure that you keep informed and ahead of your competitors. Gain that competitive advantage.

The report will answer questions such as:

  • How is the Enterprise Endpoint Cyber Security market evolving?
  • What is driving and restraining Enterprise Endpoint Cyber Security market dynamics?
  • How will each Enterprise Endpoint Cyber Security submarket segment grow over the forecast period and how much revenue will these submarkets account for in 2020?
  • How will market shares of each Enterprise Endpoint Cyber Security submarket develop from 2015-2020?
  • Which individual technologies will prevail and how will these shifts be responded to?
  • Which Enterprise Endpoint Cyber Security submarket will be the main driver of the overall market from 2015-2020?
  • How will political and regulatory factors influence regional Enterprise Endpoint Cyber Security markets and submarkets?
  • Will leading national Enterprise Endpoint Cyber Security markets broadly follow macroeconomic dynamics, or will individual country sectors outperform the rest of the economy?
  • How will market shares of the regional markets change by 2020 and which regions will lead the market in 2020?
  • Who are the leading players and what are their prospects over the forecast period?
  • How will the sector evolve as alliances form during the period between 2015 and 2020?

5 Reasons why you must order and read this report today:

1) The report provides the market share and detailed profiles of 13 leading companies operating within the Enterprise Endpoint Cyber Security market:

  • Cisco
  • EMC
  • ESET
  • FireEye
  • Intel
  • IBM
  • Kaspersky
  • Microsoft
  • Palo Alto Networks
  • Raytheon
  • Sophos
  • Symantec
  • Trend Micro

2) The study reveals where and how companies are investing in the enterprise endpoint security. We show you the prospects for the following regions:

  • Asia-Pacific
  • Europe
  • Latin America
  • Middle-East & Africa
  • North America

3) The analysis is also underpinned by our exclusive interviews with leading experts

  • Raj Samani, Vice President, Chief Technology Officer, Intel Security
  • Michael Applebaum, Vice President of Marketing, Invincea
  • Todd Weller, Vice President of Corporate Development & Marketing, Hexis Cyber Solutions

4) Our overview and analyses these technologies from 2015-2020

  • Endpoint Protection
  • Endpoint Detection and Response
  • Next-Generation Endpoint Security

Competitive advantage

This independent, 286 pages, report guarantees you will remain better informed than your competitors. With 299 tables, figures and chart examining the enterprise endpoint cyber security market space, the report gives you an immediate, one-stop breakdown of your market, keeping your knowledge that one step ahead of your rivals.

Who should read this report?

  • Anyone within the enterprise endpoint cyber security value chain.
  • CEO's
  • COO's
  • CIO's
  • CTO's
  • Business development managers
  • Marketing managers
  • Technologists
  • Suppliers
  • Investors
  • Banks
  • Government agencies
  • Contractors

How will you benefit from this report?

  • This report you will keep your knowledge base up to speed. Don't get left behind
  • This report will allow you to reinforce strategic decision decision-making based upon definitive and reliable market data
  • You will learn how to exploit new technological trends
  • You will be able to realise your company's full potential within the market
  • You will better understand the competitive landscape and identify potential new business opportunities & partnerships

Don't miss out

This report is essential reading for you or anyone in the cyber security sector with an interest in endpoint security. Purchasing this report today will help you to recognise those important market opportunities and understand the possibilities there. Order the Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response report now. We look forward to receiving your order.

visiongain is a trading partner with the US Federal Government.

Table of Contents

1. Report Overview

  • 1.1. Global Enterprise Endpoint Security Market Overview
  • 1.2. Global Enterprise Endpoint Security Market Segmentation
  • 1.3. Why You Should Read This Report
  • 1.4. How This Report Delivers
  • 1.5. Key Questions Answered by This Analytical Report Include:
  • 1.6. Who is This Report For?
  • 1.7. Methodology
    • 1.7.1. Primary Research
    • 1.7.2. Secondary Research
    • 1.7.3. Market Evaluation & Forecasting Methodology
  • 1.8. Frequently Asked Questions (FAQ)
  • 1.9. Associated Visiongain Reports
  • 1.10. About Visiongain

2. Introduction to the Enterprise Endpoint Security Market

  • 2.1. Global Enterprise Endpoint Security Market Structure
  • 2.2. Enterprise Endpoint Security Market Landscape
    • 2.2.1. Enterprise Endpoint Security Market Definition
    • 2.2.2. The Increasing Importance of Endpoint Security
    • 2.2.3. The Global Cyber Threats to Enterprises
    • 2.2.4. Most Common Methods of Cyber Attacks
    • 2.2.5. Main Objectives of Cyber Attackers
    • 2.2.6. Most Important Mechanisms of Cyber Attacks
    • 2.2.7. Stage of Cyber Attacks

3. Global Enterprise Endpoint Security Market 2015-2020

  • 3.1. Global Enterprise Endpoint Security Market Forecast 2015-2020
  • 3.2. Global Enterprise Endpoint Security Drivers & Restraints 2015
    • 3.2.1. Global Enterprise Endpoint Security Market Drivers 2015
      • 3.2.1.1. The Sophistication of Threats towards Endpoints
      • 3.2.1.2. The Changes in Communicating
      • 3.2.1.3. The Evolution of Business Operating
        • 3.2.1.3.1. Cloudification
        • 3.2.1.3.2. Mobility
        • 3.2.1.3.3. BYOD
      • 3.2.1.4. The Explosion of New Internet-Connected Devices
    • 3.2.2. Global Enterprise Endpoint Security Market Restraints 2015
      • 3.2.2.1. The Costs
      • 3.2.2.2. The Underestimated Threats
      • 3.2.2.3. The Customer Confusion

4. Global Enterprise Endpoint Security Submarket 2015-2025

  • 4.1. Analysis of the Enterprise Endpoint Security Market through its Technologies
    • 4.1.1. Antimalware
      • 4.1.1.1. Signature-Based Detection
      • 4.1.1.2. Heuristics Detection
      • 4.1.1.3. Data Mining Detection
    • 4.1.2. Firewall
      • 4.1.2.1. Packet-Filter firewalls
      • 4.1.2.2. Stateful firewall
      • 4.1.2.3. Application-layer firewalls
      • 4.1.2.4. Proxy Firewalls
      • 4.1.2.5. Next Generation Firewalls
    • 4.1.3. Intrusion Detection System
      • 4.1.3.1. Host-Based Intrusion Detection System
      • 4.1.3.2. Network-Based Intrusion Detection System
    • 4.1.4. Intrusion Prevention System
    • 4.1.5. Encryption
      • 4.1.5.1. Symmetric Encryption
      • 4.1.5.2. Asymmetric Encryption
    • 4.1.6. Configuration Management
    • 4.1.7. Mobile Device Management
    • 4.1.8. Data Loss Prevention
    • 4.1.9. Application Control
    • 4.1.10. Computer Intrusion Detector
  • 4.2. Analysis of the Enterprise Endpoint Security Market through its Solutions
    • 4.2.1. Endpoint Protection Definition
    • 4.2.2. Endpoint Detection and Response Definition
    • 4.2.3. Next Generation Endpoint Security Definition
  • 4.3. Enterprise Endpoint Security Submarket Analysis

5. Regional Enterprise Endpoint Security Market Forecast 2015-2020

  • 5.1. Regional Enterprise Endpoint Security Market Share Forecast 2015-2020
  • 5.2. Asia-Pacific Enterprise Endpoint Security Market Forecast 2015-2020
    • 5.2.1. Asia-Pacific Enterprise Endpoint Security Market Analysis
      • 5.2.1.1. Asia-Pacific Economic Overview
      • 5.2.1.2. Asia-Pacific Digital Penetration Overview
      • 5.2.1.3. Asia-Pacific Cyber Attacks Overview
      • 5.2.1.4. The Enterprise Endpoint Security Market in Asia-Pacific
    • 5.2.2. Asia-Pacific Enterprise Endpoint Security Market Drivers & Restraints
  • 5.3. Europe Enterprise Endpoint Security Market Forecast 2015-2020
    • 5.3.1. European Enterprise Endpoint Security Market Analysis
      • 5.3.1.1. European Economic Overview
      • 5.3.1.2. European Digital Penetration Overview
      • 5.3.1.3. European Cyber Attacks Overview
      • 5.3.1.4. The Enterprise Endpoint Security Market in Europe
    • 5.3.2. European Enterprise Endpoint Security Market Drivers & Restraints
  • 5.4. Latin America Enterprise Endpoint Security Market Forecast 2015-2020
    • 5.4.1. Latin America Enterprise Endpoint Security Market Analysis
      • 5.4.1.1. Latin America Economy Overview
      • 5.4.1.2. Latin America Digital Penetration Overview
      • 5.4.1.3. Latin America Cyber Attacks Overview
      • 5.4.1.4. The Enterprise Endpoint Security Market in Latin America
    • 5.4.2. Latin America Enterprise Endpoint Security Market Drivers & Restraints
  • 5.5. Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020
    • 5.5.1. Middle-East & Africa Enterprise Endpoint Security Market Analysis
      • 5.5.1.1. Middle-East & Africa Economic Overview
      • 5.5.1.2. Middle-East & Africa Digital Penetration Overview
      • 5.5.1.3. Middle-East & Africa Cyber Attacks Overview
      • 5.5.1.4. The Enterprise Endpoint Security Market in the Middle-East and Africa
    • 5.5.2. Middle East & Africa Enterprise Endpoint Security Market Drivers & Restraints
  • 5.6. North America Enterprise Endpoint Security Market Forecast 2015-2020
    • 5.6.1. North America Enterprise Endpoint Security Market Analysis
      • 5.6.1.1. North America Economy Overview
      • 5.6.1.2. North America Digital Penetration Overview
      • 5.6.1.3. North America Cyber Attacks Overview
      • 5.6.1.4. The Enterprise Endpoint Security Market in the North American
    • 5.6.2. North America Enterprise Endpoint Security Market Drivers & Restraints

6. SWOT Analysis of the Enterprise Endpoint Security Market 2015-2020

7. Expert Opinion

  • 7.1. Michael Applebaum, Vice President of Marketing, Invincea
    • 7.1.1. View of Invincea on the Endpoint Security Market
  • 7.2. Todd Weller, Vice President of Corporate Development & Marketing, Hexis Cyber Solutions
    • 7.2.1. Hexis Cyber Solutions' view on the Endpoint Security Market
    • 7.2.2. Presence of Hexis Cyber Solutions in the Endpoint Security Market
  • 7.3. Raj Samani, Vice President, Chief Technology Officer, Intel Security
    • 7.3.1. Intel Security's view on the Endpoint Security Market
    • 7.3.2. Presence of Intel Security in the Endpoint Security Market

8. Leading 13 Enterprise Endpoint Security Companies

  • 8.1. Leading 13 Enterprise Endpoint Security Companies Revenue Share Analysis 2015
  • 8.2. Cisco
    • 8.2.1. Cisco Total Company Sales 2008-2015
    • 8.2.2. Cisco Net Profit 2010-2015
    • 8.2.3. Cisco Capital Expenditure 2012-2015
    • 8.2.4. Cisco Cost of Research & Development 2010-2015
    • 8.2.5. Cisco Sales by Segment of Business 2010-2015
    • 8.2.6. Cisco Regional Emphasis / Focus
    • 8.2.7. Cisco Organisational Structure / Subsidiaries / Number of Employees
    • 8.2.8. Cisco Mergers & Acquisitions (M&A) Activity
    • 8.2.9. Cisco's Role in the Enterprise Endpoint Security Market
  • 8.3. EMC
    • 8.3.1. EMC Total Company Sales 2008-2014
    • 8.3.2. EMC Net Profit 2010-2014
    • 8.3.3. EMC Capital Expenditure 2010-2014
    • 8.3.4. EMC Cost of Research & Development 2010-2014
    • 8.3.5. EMC Sales by Segment of Business 2010-2014
    • 8.3.6. EMC Regional Emphasis / Focus
    • 8.3.7. EMC Organisational Structure / Subsidiaries / Number of Employees
    • 8.3.8. EMC Mergers & Acquisitions (M&A) Activity
    • 8.3.9. EMC's Role in the Enterprise Endpoint Security Market
  • 8.4. ESET
    • 8.4.1. ESET Total Company Sales 2013-2015
    • 8.4.2. ESET Regional Emphasis / Focus
    • 8.4.3. ESET Mergers & Acquisitions (M&A) Activity
    • 8.4.4. ESET's Role in the Enterprise Endpoint Security Market
  • 8.5. FireEye, Inc.
    • 8.5.1. FireEye Total Company Sales 2009-2014
    • 8.5.2. FireEye Net Loss 2010-2014
    • 8.5.3. FireEye Cost of Research & Development 2010-2014
    • 8.5.4. FireEye Sales by Segment of Business 2009-2014
    • 8.5.6. FireEye Regional Emphasis / Focus
    • 8.5.7. FireEye Organisational Structure / Subsidiaries / Number of Employees
    • 8.5.8. FireEye Mergers & Acquisitions (M&A) Activity
    • 8.5.9. FireEye's Role in the Enterprise Endpoint Security Market
  • 8.6. Intel Corporation
    • 8.6.1. Intel Corporation Total Company Sales 2008-2014
    • 8.6.2. Intel Corporation Net Profit 2010-2014
    • 8.6.3. Intel Corporation Capital Expenditure 2009-2013
    • 8.6.4. Intel Corporation Cost of Research & Development 2010-2014
    • 8.6.5. Intel Corporation Sales by Segment of Business 2010-2014
    • 8.6.6. Intel Corporation Regional Emphasis / Focus
    • 8.6.7. Intel Corporation Organisational Structure / Subsidiaries / Number of Employees
    • 8.6.8. Intel Corporation Mergers & Acquisitions (M&A) Activity
    • 8.6.9. Intel Corporation's Role in the Enterprise Endpoint Security Market
  • 8.7. International Business Machines (IBM) Corporation
    • 8.7.1. IBM Total Company Sales 2008-2014
    • 8.7.2. IBM Net Profit 2010-2014
    • 8.7.3. IBM Capital Expenditure 2008-2014
    • 8.7.4. IBM Cost of Research & Development 2010-2014
    • 8.7.5. IBM Sales by Segment of Business 2010-2014
    • 8.7.6. IBM Regional Emphasis / Focus
    • 8.7.7. IBM Organisational Structure / Subsidiaries / Number of Employees
    • 8.7.8. IBM Mergers & Acquisitions (M&A) Activity
    • 8.7.9. IBM's Role in the Enterprise Endpoint Security Market
  • 8.8. Kaspersky Lab
    • 8.8.1. Kaspersky Lab Total Company Sales 2008-2014
    • 8.8.2. Kaspersky Lab Regional Emphasis / Focus
    • 8.8.3. Kaspersky Lab Organisational Structure / Subsidiaries
    • 8.8.4. Kaspersky Lab Mergers & Acquisitions (M&A) Activity
    • 8.8.5. Kaspersky's Role in the Enterprise Endpoint Security Market
  • 8.9. Microsoft Corporation
    • 8.9.1. Microsoft Total Company Sales 2008-2015
    • 8.9.2. Microsoft Net Profit 2010-2015
    • 8.9.3. Microsoft Cost of Research & Development 2010-2015
    • 8.9.4. Microsoft Sales by Segment of Business 2012-2014
    • 8.9.5. Microsoft Regional Emphasis / Focus
    • 8.9.6. Microsoft Organisational Structure / Subsidiaries / Number of Employees
    • 8.9.7. Microsoft Mergers & Acquisitions (M&A) Activity
    • 8.9.8. Microsoft's Role in the Enterprise Endpoint Security Market
  • 8.10. Palo Alto Networks
    • 8.10.1. Palo Alto Networks Total Company Sales 2008-2015
    • 8.10.2. Palo Alto Networks Net Profit/Loss 2010-2015
    • 8.10.3. Palo Alto Networks Capital Expenditure 2010-2012
    • 8.10.4. Palo Alto Networks Cost of Research & Development 2010-2015
    • 8.10.5. Palo Alto Networks Sales by Segment of Business 2010-2015
    • 8.10.6. Palo Alto Networks Regional Emphasis / Focus
    • 8.10.7. Palo Alto Networks Organisational Structure / Subsidiaries / Number of Employees
    • 8.10.8. Palo Alto Networks Mergers & Acquisitions (M&A) Activity
    • 8.10.9. Palo Alto Networks' Role in the Enterprise Endpoint Security Market
  • 8.11. Raytheon
    • 8.11.1. Raytheon Total Company Sales 2005-2014
    • 8.11.2. Raytheon Net Profit 2005-2014
    • 8.11.3. Raytheon Capital Expenditure 2005-2014
    • 8.11.4. Raytheon Cost of Research & Development 2010-2014
    • 8.11.5. Raytheon Sales by Segment of Business 2008-2014
    • 8.11.6. Raytheon Regional Emphasis / Focus
    • 8.11.7. Raytheon Organisational Structure / Subsidiaries / Number of Employees
    • 8.11.8. Raytheon Mergers & Acquisitions (M&A) Activity
    • 8.11.9. Raytheon's Role in the Enterprise Endpoint Security Market
  • 8.12. Sophos
    • 8.12.1. Sophos Total Company Sales 2013-2015
    • 8.12.2. Sophos Net Loss 2013-2015
    • 8.12.3. Sophos Capital Expenditure 2013-2015
    • 8.12.4. Sophos Cost of Research & Development 2013-2015
    • 8.12.5. Sophos Sales by Segment of Business 2013-2015
    • 8.12.6. Sophos Regional Emphasis / Focus
    • 8.12.7. Sophos Organisational Structure / Subsidiaries / Number of Employees
    • 8.12.8. Sophos Mergers & Acquisitions (M&A) Activity
    • 8.12.9. Sophos' Role in the Enterprise Endpoint Security Market
  • 8.13. Symantec Corporation
    • 8.13.1. Symantec Total Company Sales 2008-2015
    • 8.13.2. Symantec Net Profit 2010-2015
    • 8.13.3. Symantec Capital Expenditure 2008-2015
    • 8.13.4. Symantec Cost of Research & Development 2010-2015
    • 8.13.5. Symantec Sales by Segment of Business 2014-2015
    • 8.13.6. Symantec Regional Emphasis / Focus
    • 8.13.7. Symantec Organisational Structure / Subsidiaries / Number of Employees
    • 8.13.8. Symantec Mergers & Acquisitions (M&A) Activity
    • 8.13.9. Symantec's Role in the Enterprise Endpoint Security Market
  • 8.14. Trend Micro
    • 8.14.1. Trend Micro Total Company Sales 2008-2014
    • 8.14.2. Trend Micro Net Profit 2010-2014
    • 8.14.3. Trend Micro Cost of Research & Development 2011-2014
    • 8.14.4. Trend Micro Regional Emphasis / Focus
    • 8.14.5. Trend Micro Organisational Structure / Subsidiaries
    • 8.14.6. Trend Micro Mergers & Acquisitions (M&A) Activity
    • 8.14.7. Trend Micro's Role in the Enterprise Endpoint Security Market

9. Conclusions and Recommendations

  • 9.1. Enterprise Endpoint Security Conclusion
  • 9.2. Enterprise Endpoint Security Recommendations

10. Glossary

List of Tables

  • 2015-2020 (US$m, AGR%, Cumulative)
  • Table 1.2: Example of Leading National Enterprise Endpoint Security Market Forecast by Submarket 2015-2020 (US$m, AGR%, Cumulative)
  • Table 2.1: Methods of Cyber Attacks (Type, Description)
  • Table 2.2: Objectives of Cyber Attackers (Type, Description)
  • Table 2.3: Mechanisms of Cyber Attacks (Type, Description)
  • Table 3.1: Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.1: Regional Enterprise Endpoint Security Market Overview (GDP Growth %, Internet Users m, Internet Penetration %, Smartphone Penetration %)
  • Table 5.2: Regional Enterprise Endpoint Security Market Forecast 2015-2020 (Sales US$m, AGR%, Cumulative)
  • Table 5.3: Regional Enterprise Endpoint Security Market CAGR Forecast 2015-2020 (CAGR%)
  • Table 5.4: Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change)
  • Table 5.5: Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.6: Asia-Pacific Major Cyber Attacks 2006-2015 (Attack, Country, Description)
  • Table 5.7: Asia-Pacific Enterprise Endpoint Security Market Drivers & Restraints 2015
  • Table 5.8: Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.9: Europe Major Cyber Attacks 2007-2015 (Attacks Country, Description)
  • Table 5.10: European Enterprise Endpoint Security Market Drivers & Restraints 2015
  • Table 5.11: Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.12: Latin America Major Cyber Attacks 2010-2014 (Attack, Country, Description)
  • Table 5.13: Latin America Enterprise Endpoint Security Market Drivers & Restraints 2015
  • Table 5.14: Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.15: Middle East and Africa Major Cyber Attacks 2010-2015 (Attack, Country, Description)
  • Table 5.16: Latin America Enterprise Endpoint Security Market Drivers & Restraints 2015
  • Table 5.17: North America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
  • Table 5.18: North America Major Cyber Attacks 2005-2015 (Attack, Country, Description)
  • Table 5.19: North America Enterprise Endpoint Security Market Drivers & Restraints 2015
  • Table 6.1: Global Enterprise Endpoint Security Market SWOT Analysis 2015-2020
  • Table 8.1: Leading 15 Enterprise Endpoint Security Companies Sales Share 2015 (Rank, Company, Total Company Sales US$m, Sales in the Market US$m, Share of Total Company Sales from Sales in the Market %, Share of the Global Market %, Primary Market Specialisation)
  • Table 8.2: Cisco Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.2.1: Cisco Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.2.2: Cisco Net Profit 2010-2015 (US$m, AGR%)
  • Table 8.2.3: Cisco Capital Expenditure 2012-2015 (US$m, AGR%)
  • Table 8.2.4: Cisco Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Table 8.2.5: Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%)
  • Table 8.2.6: Cisco Sales by Geographical Location 2010-2015 (US$m, AGR%)
  • Table 8.2.7: Cisco Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.2.8: Cisco Number of Employees 2012-2015 (No. of Employees, AGR%)
  • Table 8.2.9: Cisco Recent Acquisitions 2013-2015 (Date, Details)
  • Table 8.3: EMC Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, Submarket Involvement, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.3.1: EMC Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.3.2: EMC Net Profit 2010-2014 (US$m, AGR%)
  • Table 8.3.3: EMC Capital Expenditure 2010-2014 (US$m, AGR%)
  • Table 8.3.4: EMC Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Table 8.3.5: EMC Sales by Segment of Business 2010-2014 (US$m, AGR%)
  • Table 8.3.6: EMC Sales by Geographical Location 2008-2014 (US$m, AGR%)
  • Table 8.3.7: EMC Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.3.8: EMC Number of Employees 2010-2014 (No. of Employees, AGR%)
  • Table 8.3.9: EMC Recent Acquisitions 2004-2015 (Date, Details)
  • Table 8.3.10: EMC Divestitures 2015 (Date, Details)
  • Table 8.3.11: EMC Mergers/Partnerships 2015 (Date, Details)
  • Table 8.4: ESET Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, No. of Employees, Website)
  • Table 8.4.1: ESET Total Company Sales 2013-2015 ($m, AGR %)
  • Table 8.4.2: ESET International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.4.3: ESET Acquisition 2015 (Date, Details)
  • Table 8.5: FireEye Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.5.1: FireEye Total Company Sales 2009-2014 ($m, AGR %)
  • Table 8.5.2: FireEye Net Loss 2010-2014 (US$m, AGR%)
  • Table 8.5.3: FireEye Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Table 8.5.4: FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%)
  • Table 8.5.5: FireEye Sales by Geographical Location 2011-2014 (US$m, AGR%)
  • Table 8.5.6: FireEye Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.5.7: FireEye Number of Employees 2011-2014 (No. of Employees, AGR%)
  • Table 8.5.8: FireEye Recent Acquisitions 2013-2014 (date, Details)
  • Table 8.6: Intel Corporation Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, Ticker, Website)
  • Table 8.6.1: Intel Corporation Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.6.2: Intel Corporation Net Profit 2010-2014 (US$m, AGR%)
  • Table 8.6.3: Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%)
  • Table 8.6.4: Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Table 8.6.5: Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
  • Table 8.6.6: Intel Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%)
  • Table 8.6.7: Intel Corporation Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.6.8: Intel Corporation Number of Employees 2010-2014 (No. of Employees, AGR%)
  • Table 8.6.9: Intel Corporation Recent Acquisitions 2007-2015 (Date, Details)
  • Table 8.6.10: Intel Corporation Divestiture 2015 (Date, Details)
  • Table 8.7: IBM Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.7.1: IBM Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.7.2: IBM Net Profit 2010-2014 (US$m, AGR%)
  • Table 8.7.3: IBM Capital Expenditure 2008-2014 (US$m, AGR%)
  • Table 8.7.4: IBM Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Table 8.7.5: IBM Sales by Segment of Business 2010-2014 (US$m, AGR%)
  • Table 8.7.6: IBM Sales by Geographical Location 2010-2014 (US$m, AGR%)
  • Table 8.7.7: IBM Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.7.8: IBM Number of Employees 2010-2014 (No. of Employees, AGR%)
  • Table 8.7.9: IBM Recent Acquisitions 2013-2015 (Date, Details)
  • Table 8.7.10: IBM Recent Divestiture 2014 (Date, Details)
  • Table 8.8: Kaspersky Lab Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, Website)
  • Table 8.8.1: Kaspersky Lab Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.8.2: Kaspersky Lab Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.8.3: Kaspersky Lab Acquisitions 2005-2012 (Date, Details)
  • Table 8.8.4: Kaspersky Lab Divestiture 2011 (Date, Details)
  • Table 8.9: Microsoft Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.9.1: Microsoft Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.9.2: Microsoft Net Profit 2010-2015 (US$m, AGR%)
  • Table 8.9.3: Microsoft Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Table 8.9.4: Microsoft Sales by Segment of Business 2012-2014 (US$m, AGR%)
  • Table 8.9.5: Microsoft Sales by Geographical Location 2008-2015 (US$m, AGR%)
  • Table 8.9.6: Microsoft Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.9.7: Microsoft Number of Employees 2010-2015 (No. of Employees, AGR%)
  • Table 8.9.8: Microsoft Acquisitions 2014-2015 (Date, Details)
  • Table 8.9.9: Microsoft M&A Activity Divestitures 2014-2015 (Date, Details)
  • Table 8.10: Palo Alto Networks Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.10.1: Palo Alto Networks Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.10.2: Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
  • Table 8.10.3: Palo Alto Networks Capital Expenditure 2010-2012 (US$m, AGR%)
  • Table 8.10.4: Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Table 8.10.5: Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%)
  • Table 8.10.6: Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, AGR%)
  • Table 8.10.7: Palo Alto Networks Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.10.8: Palo Alto Networks Number of Employees 2012-2015 (No. of Employees, AGR%)
  • Table 8.10.9: Palo Alto Networks Recent Acquisitions 2014-2015 (Date, Details)
  • Table 8.11: Raytheon Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.11.1: Raytheon Total Company Sales 2005-2014 ($m, AGR %)
  • Table 8.11.2: Raytheon Net Profit 2005-2014 (US$m, AGR%)
  • Table 8.11.3: Raytheon Capital Expenditure 2005-2014 (US$m, AGR%)
  • Table 8.11.4: Raytheon Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Table 8.11.5: Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%)
  • Table 8.11.6: Raytheon Sales by Geographical Location 2008-2014 (US$m, AGR%)
  • Table 8.11.7: Raytheon Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.11.8: Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%)
  • Table 8.11.9: Raytheon Company Recent Acquisitions 2010-2013 (Date, Details)
  • Table 8.11.10: Raytheon Company Partnerships 2001-2013 (Date, Details)
  • Table 8.12: Sophos Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.12.1: Sophos Total Company Sales 2013-2015 ($m, AGR %)
  • Table 8.12.2: Sophos Net Loss 2013-2015 (US$m, AGR%)
  • Table 8.12.3: Sophos Capital Expenditure 2013-2015 (US$m, AGR%)
  • Table 8.12.4: Sophos Cost of Research & Development 2013-2015 (US$m, AGR%)
  • Table 8.12.5: Sophos Sales by Segment of Business 2013-2015 (US$m, AGR%)
  • Table 8.12.6: Sophos Sales by Geographical Location 2013-2015 (US$m, AGR%)
  • Table 8.12.7: Sophos Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.12.8: Sophos Number of Employees 2013-2015 (No. of Employees, AGR%)
  • Table 8.12.9: Sophos Acquisitions 2007-2014 (Date, Details)
  • Table 8.12.10: Sophos Divestiture 2006-2010 (Date, Details)
  • Table 8.13: Symantec Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
  • Table 8.13.1: Symantec Total Company Sales 2008-2015 ($m, AGR %)
  • Table 8.13.2: Symantec Net Profit 2010-2015 (US$m, AGR%)
  • Table 8.13.3: Symantec Capital Expenditure 2008-2015 (US$m, AGR%)
  • Table 8.13.4: Symantec Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Table 8.13.5: Symantec Sales by Segment of Business 2014-2015 (US$m, AGR%)
  • Table 8.13.6: Symantec Sales by Geographical Location 2008-2015 (US$m, AGR%)
  • Table 8.13.7: Symantec Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.13.8: Symantec Number of Employees 2010-2015 (No. of Employees, AGR%)
  • Table 8.13.9: Symantec Recent Acquisitions 2000-2015 (Date, Details)
  • Table 8.13.10: Symantec Divestitures 2015 (Date, Details)
  • Table 8.13.11: Symantec Mergers 2004 (Date, Details)
  • Table 8.14: Trend Micro Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, IR Contact, Ticker, Website)
  • Table 8.14.1: Trend Micro Total Company Sales 2008-2014 ($m, AGR %)
  • Table 8.14.2: Trend Micro Net Profit 2010-2014 (US$m, AGR%)
  • Table 8.14.3: Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR%)
  • Table 8.14.4: Trend Micro Sales by Geographical Location 2008-2014 (US$m, AGR%)
  • Table 8.14.5: Trend Micro Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
  • Table 8.14.6: Trend Micro Recent Acquisitions 2008-2015 (Date, Details)
  • Table 8.14.7: Trend Micro Divestitures 2015 (Date, Details)

List of Figures

  • Figure 1.1: Global Enterprise Endpoint Security Market Segmentation Overview
  • Figure 1.2: Example of Enterprise Endpoint Security Market by Regional Market Share Forecast 2015, 2020 (% Share)
  • Figure 1.3: Example Regional vs. Global Enterprise Endpoint Security Market CAGR Forecast 2015, 2020, 2015-2020 (CAGR%)
  • Figure 1.4: Example of Regional Enterprise Endpoint Security Market by Submarket Forecast 2015-2020 (US$m, AGR %)
  • Figure 2.1: Global Enterprise Endpoint Security Market Segmentation Overview
  • Figure 2.2: Share of Global Cyber Threats to Enterprises by the Type of Attacker 2014 (%Share)
  • Figure 2.3: Common Stages of Cyber Attacks
  • Figure 3.1: Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR%)
  • Figure 4.1: Functions of Endpoint Security Technologies
  • Figure 5.1: Enterprise Endpoint Security Regional Coverage
  • Figure 5.2: Regional Enterprise Endpoint Security Market Share Forecast 2015 (% Share)
  • Figure 5.3: Regional Enterprise Endpoint Security Market Share Forecast 2020 (% Share)
  • Figure 5.4: Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change)
  • Figure 5.5: Regional Enterprise Endpoint Security Market Cumulative Sales 2015-2020 ($US$m)
  • Figure 5.6: Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Asia Pacific Market Sales AGR%, Global Market Sales AGR %)
  • Figure 5.7: Asia Pacific vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
  • Figure 5.8: Asia Pacific vs. Global Digital Penetration Rate 2015 (%)
  • Figure 5.9: Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Europe Market Sales AGR%, Global Market Sales AGR %)
  • Figure 5.10: Europe vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
  • Figure 5.11: Europe vs. Global Digital Penetration Rate 2015 (%)
  • Figure 5.12: Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Latin America Market Sales AGR%, Global Market Sales AGR %)
  • Figure 5.13: Latin America vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
  • Figure 5.14: Latin America vs. Global Digital Penetration Rate 2015 (%)
  • Figure 5.15: Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Middle-East & Africa Market Sales AGR%, Global Market Sales AGR %)
  • Figure 5.16: Middle East & Africa vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
  • Figure 5.17: Middle East & Africa vs. Global Digital Penetration Rate 2015 (%)
  • Figure 5.18: North America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, North America Market Sales AGR%, Global Market Sales AGR %)
  • Figure 5.19: North America vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
  • Figure 5.20: North America vs. Global Digital Penetration Rate 2015 (%)
  • Figure 8.1: Leading 13 Enterprise Endpoint Security Companies Total Sales 2014 ($US$m )
  • Figure 8.2: Leading 13 Enterprise Endpoint Security Companies Share of the Market 2014 (% Share)
  • Figure 8.2.1: Cisco Total Company Sales 2008-2015 (US$m, AGR%)
  • Figure 8.2.2: Cisco Net Profit 2010-2015 (US$m, AGR%)
  • Figure 8.2.3: Cisco Capital Expenditure 2012-2015 (US$m, AGR%)
  • Figure 8.2.4: Cisco Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Figure 8.2.5: Cisco Sales by Segment of Business 2011-2015 (US$m, AGR%)
  • Figure 8.2.6: Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%)
  • Figure 8.2.7: Cisco Primary International Operations 2015
  • Figure 8.2.8: Cisco Sales AGR by Geographical Location 2011-2015 (%)
  • Figure 8.2.9: Cisco Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR%)
  • Figure 8.2.10: Cisco Organisational Structure 2015
  • Figure 8.2.11: Cisco Number of Employees 2012-2015 (No. of Employees, AGR%)
  • Figure 8.3.1: EMC Total Company Sales 2008-2014 (US$m, AGR%)
  • Figure 8.3.2: EMC Net Profit 2010-2014 (US$m, AGR%)
  • Figure 8.3.3: EMC Capital Expenditure 2010-2014 (US$m, AGR%)
  • Figure 8.3.4: EMC Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Figure 8.3.5: EMC Sales AGR by Segment of Business 2011-2014 (AGR%)
  • Figure 8.3.6: EMC Sales by Segment of Business 2010-2014 (US$m, AGR%)
  • Figure 8.3.7: EMC Primary International Operations 2015
  • Figure 8.3.8: EMC Sales AGR by Geographical Location 2009-2014 (AGR%)
  • Figure 8.3.9: EMC Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
  • Figure 8.3.10: EMC Organisational Structure 2015
  • Figure 8.3.11: EMC Number of Employees 2010-2014 (No of Employees, AGR%)
  • Figure 8.4.1: ESET Total Company Sales 2013-2015 (US$m)
  • Figure 8.4.2: ESET Primary International Operations 2015
  • Figure 8.5.1: FireEye Total Company Sales 2009-2014 (US$m, AGR%)
  • Figure 8.5.2: FireEye Net Loss 2010-2014 (US$m, AGR%)
  • Figure 8.5.3: FireEye Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Figure 8.5.4: FireEye Sales AGR by Segment of Business 2010-2014 (AGR%)
  • Figure 8.5.5: FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%)
  • Figure 8.5.6: FireEye Primary International Operations 2015
  • Figure 8.5.7: FireEye Sales AGR by Geographical Location 2012-2014 (AGR%)
  • Figure 8.5.8: FireEye Sales by Geographical Location 2011-2014 (US$m, Total Company Sales AGR%)
  • Figure 8.5.9: FireEye Organisational Structure 2015
  • Figure 8.5.10: FireEye Number of Employees 2011-2014 (No of Employees, AGR%)
  • Figure 8.6.1: Intel Corporation Total Company Sales 2008-2014 (US$m, AGR%)
  • Figure 8.6.2: Intel Corporation Net Profit 2010-2014 (US$m, AGR%)
  • Figure 8.6.3: Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%)
  • Figure 8.6.4: Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Figure 8.6.5: Intel Corporation Sales AGR by Segment of Business 2011-2014 (AGR%)
  • Figure 8.6.6: Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
  • Figure 8.6.7: Intel Corporation Primary International Operations 2015
  • Figure 8.6.8: Intel Corporation Sales AGR by Geographical Location 2011-2014 (AGR%)
  • Figure 8.6.9: Intel Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
  • Figure 8.6.10: Intel Corporation Organisational Structure 2015
  • Figure 8.6.11: Intel Corporation Number of Employees 2010-2014 (No of Employees, AGR%)
  • Figure 8.7.1: IBM Total Company Sales 2008-2014 (US$m, AGR%)
  • Figure 8.7.2: IBM Net Profit 2010-2014 (US$m, AGR%)
  • Figure 8.7.3: IBM Capital Expenditure 2008-2014 (US$m, AGR%)
  • Figure 8.7.4: IBM Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Figure 8.7.5: IBM Sales AGR by Segment of Business 2011-2014 (AGR%)
  • Figure 8.7.6: IBM Sales by Segment of Business 2010-2014 (AGR%)
  • Figure 8.7.7: IBM Primary International Operations 2015
  • Figure 8.7.8: IBM Sales AGR by Geographical Location 2011-2014 (AGR%)
  • Figure 8.7.9: IBM Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
  • Figure 8.7.10: IBM Organisational Structure 2015
  • Figure 8.7.11: IBM Number of Employees 2010-2014 (No Of Employees, AGR%)
  • Figure 8.8.1: Kaspersky Lab Total Company Sales 2008-2014 (US$m, AGR%)
  • Figure 8.8.2: Kaspersky Lab Primary International Operations 2015
  • Figure 8.8.3: Kaspersky Lab Organisational Structure 2015
  • Figure 8.9.1: Microsoft Total Company Sales 2008-2015 (US$m, AGR%)
  • Figure 8.9.2: Microsoft Net Profit 2010-2015 (US$m, AGR%)
  • Figure 8.9.3: Microsoft Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Figure 8.9.4: Microsoft Sales AGR by Segment of Business 2013-2015 (AGR%)
  • Figure 8.9.5: Microsoft Sales by Segment of Business 2012-2015 (US$m, AGR%)
  • Figure 8.9.6: Microsoft Primary International Operations 2015
  • Figure 8.9.7: Microsoft Sales AGR by Geographical Location 2009-2015 (AGR%)
  • Figure 8.9.8: Microsoft Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR%)
  • Figure 8.9.9: Microsoft Organisational Structure 2015
  • Figure 8.9.10: Microsoft Number of Employees 2010-2015 (No of Employees, AGR%)
  • Figure 8.10.1: Palo Alto Networks Total Company Sales 2008-2015 (US$m, AGR%)
  • Figure 8.10.2: Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
  • Figure 8.10.3: Palo Alto Networks Capital Expenditure 2010-2012 (US$m)
  • Figure 8.10.4: Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Figure 8.10.5: Palo Alto Networks Sales AGR by Segment of Business 2010-2015 (AGR%)
  • Figure 8.10.6: Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%)
  • Figure 8.10.7: Palo Alto Networks Primary International Operations 2015
  • Figure 8.10.8: Palo Alto Networks Sales AGR by Geographical Location 2011-2015 (AGR%)
  • Figure 8.10.9: Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR%)
  • Figure 8.10.10: Palo Alto Networks Organisational Structure 2015
  • Figure 8.10.11: Palo Alto Networks Number of Employees 2012-2015 (No of Employees, AGR%)
  • Figure 8.11.1: Raytheon Total Company Sales 2005-2014 (US$m, AGR%)
  • Figure 8.11.2: Raytheon Net Profit 2005-2014 (US$m, AGR%)
  • Figure 8.11.3: Raytheon Capital Expenditure 2005-2014 (US$m, AGR%)
  • Figure 8.11.4: Raytheon Cost of Research & Development 2010-2014 (US$m, AGR%)
  • Figure 8.11.5: Raytheon Sales AGR by Segment of Business 2009-2014 (AGR%)
  • Figure 8.11.6: Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%)
  • Figure 8.11.7: Raytheon Primary International Operations 2015
  • Figure 8.11.8: Raytheon Sales AGR by Geographical Location 2009-2014 (%)
  • Figure 8.11.9: Raytheon Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
  • Figure 8.11.10: Raytheon Organisational Structure 2015
  • Figure 8.11.11: Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%)
  • Figure 8.12.1: Sophos Total Company Sales 2013-2015 (US$m)
  • Figure 8.12.2: Sophos Net Loss 2013-2015 (US$m)
  • Figure 8.12.3: Sophos Capital Expenditure 2013-2015 (US$m)
  • Figure 8.12.4: Sophos Cost of Research & Development 2013-2015 (US$m)
  • Figure 8.12.5: Sophos Sales by Segment of Business 2013-2015 (US$m)
  • Figure 8.12.6: Sophos Primary International Operations 2015
  • Figure 8.12.7: Sophos Sales by Geographical Location 2013-2015 (US$m, Total Company Sales)
  • Figure 8.12.8: Sophos Organisational Structure 2015
  • Figure 8.12.9: Sophos Number of Employees 2013-2015 (No. of Employees)
  • Figure 8.13.1: Symantec Total Company Sales 2008-2015 (US$m, AGR%)
  • Figure 8.13.2: Symantec Net Profit 2010-2015 (US$m, AGR%)
  • Figure 8.13.3: Symantec Capital Expenditure 2008-2015 (US$m, AGR%)
  • Figure 8.13.4: Symantec Cost of Research & Development 2010-2015 (US$m, AGR%)
  • Figure 8.13.5: Symantec Sales by Segment of Business 2014-2015 (US$m)
  • Figure 8.13.6: Symantec Primary International Operations 2015
  • Figure 8.13.7: Symantec Sales AGR by Geographical Location 2009-2015 (AGR%)
  • Figure 8.13.8: Symantec Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR%)
  • Figure 8.13.9: Symantec Organisational Structure 2015
  • Figure 8.13.10: Symantec Number of Employees 2010-2015 (No. of Employees, AGR%)
  • Figure 8.14.1: Trend Micro Total Company Sales 2010-2014 (US$m, AGR%)
  • Figure 8.14.2: Trend Micro Net Profit 2010-2014 (US$m, AGR%)
  • Figure 8.14.3: Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR%)
  • Figure 8.14.4: Trend Micro Primary International Operations 2015
  • Figure 8.14.5: Trend Micro Sales AGR by Geographical Location 2009-2014 (AGR%)
  • Figure 8.14.6: Trend Micro Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
  • Figure 8.14.7: Trend Micro Organisational Structure 2015

Companies Listed

  • @Stake
  • 4FrontSecurity
  • 6Wunderkinder
  • Acompli
  • ActiveState
  • Actona Technologies Ltd
  • Adallom
  • Adaptivity
  • Adxstudio Inc
  • AffirmTrust
  • Air Command Systems International SAS (ACSI)
  • Airespace Wireless Networks Private Ltd
  • Aironet Canada Inc
  • Aironet Canada Ltd
  • Alchemy API
  • Altera
  • Altiris Inc
  • Amazon
  • Americas HQ
  • Anschutz Japan Co Ltd
  • Anthem Inc
  • AOL
  • Aorato
  • Apax Partners
  • Applied Signal Technology, Inc
  • AppStream
  • Arroyo Video Solutions LLC
  • Ashley Madison
  • AsiaInfo Technologies
  • Aspera Inc
  • Astaro
  • Aveksa Inc
  • AXENT Technologies Inc
  • Baidu
  • Banco IBM SA
  • BarcoNet Pty Ltd
  • Belgacom
  • BigFix
  • Bindview Development Corporation
  • Bit9 + Carbon Black
  • Blackfin Security
  • Blue Box Group Inc
  • BlueStripe Software
  • Boleto Bancário
  • Brightmail
  • Broadware Technologies LLC
  • Broadweb
  • Bromium
  • BT Alex Brown Inc
  • Canada Inc
  • Capptain
  • CBS
  • China Aerospace Science & Industry Corporation (CASIC)
  • CirroSecure
  • Cisco
  • Cisco Albania SHPK
  • Cisco Bahrain (SPC)
  • Cisco Cameroon Ltd
  • Cisco Capital (Dubai) Ltd
  • Cisco Comercio E Servicos De Hardware E Software Do Brasil LTDA
  • Cisco Development India Private Ltd
  • Cisco Do Brasil Ltda
  • Cisco Fast Data LLC
  • Cisco International Ltd
  • Cisco Iris Inc
  • Cisco IronPort Systems LLC
  • Cisco ISH BV
  • Cisco ISH II BV
  • Cisco Linksys Kiss ApS
  • Cisco Malaysia Managed Services Sdn Bhd
  • Cisco Managed Solutions Inc
  • Cisco Media Solutions Inc
  • Cisco MO BV
  • Cisco Photonics Italy Srl
  • Cisco QSTP-LLC
  • Cisco Ravenscourt LLC
  • Cisco RZ LLC (formerly Richard Zeta Intelligence Inc)
  • Cisco SBAIF III Inc
  • Cisco Serbia doo Beograd
  • Cisco Services Malaysia Sdn Bhd
  • Cisco Systems (Argentina) SA
  • Cisco Systems (Bermuda) Holdings Ltd
  • Cisco Systems (Bermuda) Ltd
  • Cisco Systems (China) Information Technology Services Ltd
  • Cisco Systems (China) Networking Technology Co., Ltd.
  • Cisco Systems (China) Research and Development Co., Ltd.
  • Cisco Systems (Colombia) Ltda
  • Cisco Systems (Czech Republic) SRO
  • Cisco Systems (Ethiopia) PLC
  • Cisco Systems (HK) Ltd
  • Cisco Systems (India) Ltd
  • Cisco Systems (India) Prv Ltd
  • Cisco Systems (Italy) Srl
  • Cisco Systems (Jordan)
  • Cisco Systems (Korea) Ltd
  • Cisco Systems (Malaysia) Sdn Bhd
  • Cisco Systems (Nigeria) Ltd
  • Cisco Systems (Puerto Rico) Corp
  • Cisco Systems (Scotland) Ltd
  • Cisco Systems (Senegal) SUARL
  • Cisco Systems (South Africa) (Proprietary) Ltd
  • Cisco Systems (Spain) SL
  • Cisco Systems (Sweden) AB
  • Cisco Systems (Switzerland) GmbH
  • Cisco Systems (Switzerland) Investments Ltd
  • Cisco Systems (Thailand) Ltd
  • Cisco Systems (Trinidad & Tobago) Ltd
  • Cisco Systems (USA) Pte Ltd
  • Cisco Systems Algeria EURL
  • Cisco Systems Australia Pty Ltd
  • Cisco Systems Austria GmbH
  • Cisco Systems Belgium BVBA/SPRL
  • Cisco Systems Bulgaria EOOD
  • Cisco Systems Canada Co
  • Cisco Systems Capital (Australia) Pty Ltd
  • Cisco Systems Capital (India) Private Ltd
  • Cisco Systems Capital (Korea) Ltd
  • Cisco Systems Capital (Thailand) Ltd
  • Cisco Systems Capital Asia Pte Ltd
  • Cisco Systems Capital Canada Co
  • Cisco Systems Capital China Corporation
  • Cisco Systems Capital Corporation
  • Cisco Systems Capital France SAS
  • Cisco Systems Capital GmbH
  • Cisco Systems Capital Italy Srl
  • Cisco Systems Capital KK
  • Cisco Systems Capital Netherlands BV
  • Cisco Systems Capital Sdn Bhd
  • Cisco Systems Capital South Africa (Proprietary) Ltd
  • Cisco Systems Capital Spain SL
  • Cisco Systems Chile SA
  • Cisco Systems Co
  • Cisco Systems Costa Rica SA
  • Cisco Systems Croatia Ltd for Trade
  • Cisco Systems Cyprus Ltd
  • Cisco Systems De Mexico SA de CV
  • Cisco Systems Denmark ApS
  • Cisco Systems Dominicana SA
  • Cisco Systems Ecuador SA
  • Cisco Systems Egypt Ltd
  • Cisco Systems El Salvador Ltda de CV
  • Cisco Systems Estonia OU
  • Cisco Systems Finance International
  • Cisco Systems Finance International Holdings I Ltd
  • Cisco Systems Finance International Holdings II Ltd
  • Clearwell Systems Inc
  • Cleversafe Inc
  • Cloudant Inc
  • Cloudscaling Group
  • Cognitive
  • Collaborate
  • Comneon
  • Compagnie IBM France SAS
  • Companhia IBM Portuguesa SA.
  • Company-i
  • Components Intel de Costa Rica SA
  • Compose Inc
  • Composite Software
  • Compucat Research Pty Ltd
  • CounterTack
  • CrossIdeas
  • Crowdstrike
  • CSL International
  • Cybereason
  • Cyberoam Technologies
  • Cylance
  • Cyvera
  • Cyvera Ltd (d/b/a Palo Alto Networks (Israel) Ltd)
  • Cyvera Inc
  • Daeja Image Systems Ltd
  • DarkTrace
  • Data Logic Inc (US)
  • Datazen
  • Dell Inc
  • DESlock+
  • Domino's Pizza
  • DSSD Inc
  • EBay
  • Electronica Nayarit SA
  • Embrane
  • EMC
  • EMC (Benelux) BV
  • EMC (RSA)
  • EMC Information Systems International
  • EMC International Company
  • EMC International U.S. Holdings Inc
  • ENDFORCE
  • Equivio
  • ESET
  • ESET ASIA PTE LTD
  • ESET Latin America
  • ESET spol s ro
  • ESET LLC
  • ESY Export Company Inc
  • E-Systems Technologies Holding Inc
  • EUREST Raytheon Support Services
  • EverythingAircraft LLC
  • Experian
  • Explorys
  • Facebook
  • Fiberlink Communications
  • FieldOne
  • FireEye Australia Pty Ltd
  • FireEye Cybersecurity Private Ltd
  • FireEye Hong Kong Ltd
  • FireEye Inc
  • FireEye International Inc
  • FireEye Ireland Ltd
  • FireEye Israel Ltd
  • FireEye KK
  • FireEye Korea Ltd
  • FireEye Mexico SA de CV
  • FireEye Singapore Private Ltd
  • FireEye South Africa (Pty) Ltd
  • FireEye Technology Ltd
  • FireEye UK Ltd
  • First Communications Company
  • General Atlantic
  • General Electric Co
  • Gideon Technologies Inc
  • Global HQ
  • Global HQ Sophos Ltd
  • Globalfoundries Inc
  • Google
  • GreenButton
  • GuardianEdge Technologies Inc
  • Hacker Academy
  • Havok
  • Henggeler Computer Consultants Inc
  • Hexis Cyber Solutions
  • HockeyApp
  • Home Depot Inc
  • HP TippingPoint
  • HRL Research Analytics Inc
  • Hughes Airport Development Corporation Sdn Bhd
  • Hughes Arabia Ltd
  • Hughes Asia Pacific Hong Kong Ltd
  • Hughes Training Italia Srl
  • Humyo
  • IBM (China) Co Ltd
  • IBM (China) Investment Company Ltd
  • IBM (International Business Machines) Turk Ltd Sirketi
  • IBM Argentina Sociedad de Responsabilidad Ltda
  • IBM Australia Ltd
  • IBM Bahamas Ltd
  • IBM Bangladesh Private Ltd
  • IBM Brasil-Industria, Maquinas e Servicos Ltda
  • IBM Bulgaria Ltd
  • IBM Burkina Faso SARL
  • IBM Business Transformation Center Srl
  • IBM Canada Ltd-IBM Canada Ltd
  • IBM Capital Inc.
  • IBM Ceska Republika spol. sro
  • IBM China/Hong Kong Ltd
  • IBM Congo SARL
  • IBM Credit LLC
  • IBM Croatia Ltd./IBM Hrvatska doo
  • IBM de Chile SAC
  • IBM de Colombia & CIA SCA
  • IBM de Mexico, Comercializacion y Servicios S de RL de CV
  • IBM de Mexicon S de RL
  • IBM de Venezuela SA
  • IBM del Ecuador CA
  • IBM del Peru SA
  • IBM del Uruguay SA
  • IBM Denmark ApS
  • IBM Deutschland GmbH
  • IBM Deutschland Kreditbank GmbH
  • IBM East Africa Ltd
  • IBM East Europe/Asia Ltd
  • IBM Eesti Osauhing (IBM Estonia Ou)
  • IBM Egypt Business Support Services
  • IBM Foreign Sales Corporation
  • IBM France Financement SA
  • IBM Global Financing Australia Ltd
  • IBM Hellas Information Handling Systems SA
  • IBM India Private Ltd
  • IBM International Foundation
  • IBM International Group BV
  • IBM International Group Capital LLC
  • IBM Ireland Ltd
  • IBM Ireland Product Distribution Ltd
  • IBM Israel Ltd
  • IBM Italia SpA
  • IBM Japan Ltd
  • IBM Korea Inc
  • IBM Lietuva
  • IBM Ltd
  • IBM Magyarorszagi Kft
  • IBM Malaysia Sdn Bhd
  • IBM Malta Ltd
  • IBM Maroc
  • IBM Mauritius
  • IBM Middle East FZ-LLC
  • IBM Nederland B.V.
  • IBM New Zealand Ltd
  • IBM Niger SARLU
  • IBM Oesterreich Internationale Bueromaschinen GmbH
  • IBM Philippines, Incorporated
  • IBM Polska Sp z oo
  • IBM Qatar SSC
  • IBM RDC
  • IBM Romania Srl
  • IBM Schweiz AG-IBM Suisse SA-IBM Suizzera SA-IBM Switzerland Ltd.
  • IBM Services Financial Sector Luxembourg Sarl
  • IBM Singapore Pte. Ltd.
  • IBM Slovenija d.o.o.
  • IBM Slovensko spol s.r.o.
  • IBM South Africa (Pty) Ltd.
  • IBM Svenska Aktiebolag
  • IBM Taiwan Corporation
  • IBM Tanzania Ltd
  • IBM Tchad SARLU
  • IBM Thailand Company Ltd
  • IBM Tunisie
  • IBM Ukraine
  • IBM United Kingdom Asset Leasing Ltd
  • IBM United Kingdom Financial Services Ltd
  • IBM United Kingdom Ltd
  • IBM Vietnam Company
  • IBM World Trade Corporation
  • IBM-International Business Machines d.o.o., Belgrade
  • Identum
  • Imlogic Inc
  • Incent Games Inc.
  • Indra ATM S.L. SPA
  • inMage
  • Insieme
  • Intel America, Inc
  • Intel Asia holding Ltd
  • Intel Benelux B.V.
  • Intel Capital (Cayman) Corporation
  • Intel Capital Corporation
  • Intel China Ltd.
  • Intel Corporation
  • Intel Corporation (UK) Ltd.
  • Intel Electronics Finance Ltd
  • Intel Electronics Ltd.
  • Intel Europe, Inc.
  • Intel Holdings B.V.
  • Intel International
  • Intel Investment Management Ltd
  • Intel Ireland Ltd
  • Intel Israel (74) Ltd
  • Intel Israel Holdings B.V.
  • Intel Kabushiki Kaisha
  • Intel Massachusetts, Inc
  • Intel Mobile Communications GmbH
  • Intel Overseas Funding Corporation
  • Intel Security (McAfee)
  • Intel Semi Conductors, Ltd.
  • Intel Semiconductor (Dalian) Ltd.
  • Intel Semiconductor (US) Ltd
  • International Business Machines
  • International Business Machines AS
  • International Business Machines Gabon SARL
  • International Business Machines Ghana Ltd
  • International Business Machines Madagascar SARLU
  • International Business Machines of Belgium spry/buba
  • International Business Machines Senegal
  • International Business Machines West Africa Ltd
  • International Business Machines Zambia Ltd
  • International Business Machines, S.A.
  • International Information Services Management Ltd
  • International Monetary Fund
  • Intucell
  • Invincea
  • J.P. Morgan
  • Japan Pension Services
  • JouleX
  • Karlsruhe
  • Kaspersky Lab
  • Kaspersky Lab Argentina
  • Kaspersky Lab Asia-Pacific HQ
  • Kaspersky Lab Australia and New Zealand
  • Kaspersky Lab Benelux
  • Kaspersky Lab Canada
  • Kaspersky Lab China
  • Kaspersky Lab France
  • Kaspersky Lab Germany
  • Kaspersky Lab Iberia
  • Kaspersky Lab India
  • Kaspersky Lab Italy
  • Kaspersky Lab Japan
  • Kaspersky Lab Korea
  • Kaspersky Lab Malaysia
  • Kaspersky Lab Mexico
  • Kaspersky Lab Nordics
  • Kaspersky Lab Polska sp z oo
  • Kaspersky Lab Romania
  • Kaspersky Lab South Africa (Pty) Ltd.
  • Kaspersky Lab Switzerland
  • Kaspersky Lab Turkey
  • Kaspersky Lab UK
  • Kazakhstan
  • KEYW Corporation
  • Ktech Corporation
  • Lancope, Inc.
  • Latin America
  • Lighthouse Security Group, LLC
  • LinkedIn
  • Liric Associates
  • LiveOffice
  • Lockheed Martin Corporation
  • Lumension
  • Maginatics
  • MaintenanceNet
  • Mandiant
  • McAfee, Inc
  • Melbourne branch
  • Memoir Systems
  • Merge Healthcare Incorporated
  • MessageLabs
  • Metacloud
  • Meteorix LLC
  • Mi5 Networks
  • Microsoft
  • Microsoft Capital Group, LLC
  • Microsoft Global Finance
  • Microsoft Ireland Operations Ltd
  • Microsoft Ireland Research
  • Microsoft Licensing, GP
  • Microsoft Online, Inc.
  • Microsoft Operations Pte Ltd
  • Microsoft Operations Puerto Rico, LLC
  • Microsoft Regional Sales Corporation
  • Middle-East branch
  • Middle-East FZ-LCC
  • Mission College Investments Ltd.
  • Mitsubishi Heavy Industries
  • Mobile Armor
  • Mojang
  • Mojang Synergies AB
  • Mojave Networks
  • MOL Corporation
  • Morta Security
  • Morta Security, Inc.
  • M-Pesa
  • Myanma Posts and telecommunications
  • Nasdaq
  • Neophis
  • Network Access Control
  • Nicolaus & Co. Inc
  • Niederlassung Oesterreich
  • NitroDesk
  • NitroSecurity
  • North Sydney branch
  • Nova Scotia Company
  • Novell
  • nPulse Technologies
  • nSuite Technologies, Inc.
  • Nukona
  • ON Technology
  • OpenDNS
  • Opower
  • Oy IBM Finland AB
  • Palo Alto Networks
  • Palo Alto Networks (Australia) Pty Ltd
  • Palo Alto Networks (Brasil) Ltda.
  • Palo Alto Networks (Canada) Inc.
  • Palo Alto Networks (Germany) GmbH
  • Palo Alto Networks (India) Private Ltd
  • Palo Alto Networks (Malaysia), LLC
  • Palo Alto Networks (Mexico) S. de R.L. de C.V.
  • Palo Alto Networks (Netherlands) B.V.
  • Palo Alto Networks (Norway) AS
  • Palo Alto Networks (Singapore) Holding Company Pte. Ltd.
  • Palo Alto Networks (Singapore) PTE. LTD.
  • Palo Alto Networks (UK) Ltd
  • Palo Alto Networks Belgium B.V.B.A.
  • Palo Alto Networks FZ LLC
  • Palo Alto Networks Godo Kaisha
  • Palo Alto Networks Holding B.V.
  • Palo Alto Networks International, Inc.
  • Palo Alto Networks Korea, Ltd.
  • Palo Alto Networks, L.L.C.
  • PAN C.V.
  • PAN LLC
  • Parature
  • ParStream
  • Parthenon Group
  • PasswordBank
  • Patriot Overseas Support Company
  • Pawaa
  • PC Tools
  • Pegasystems
  • Pender Financial
  • PGP Corporation
  • Phytel
  • Pikewerks Corporation
  • PistonCloud Computing
  • Platform Logic
  • Ponemon Institute
  • Portcullis Computer Security, Ltd
  • Prudential Securities
  • PT IBM Indonesia
  • PWC
  • Raphael Advanced Defense Systems Ltd.
  • RAYCOM, INC.
  • Raytheon (Websense)
  • Raytheon Advanced Systems Company
  • Raytheon Air Control Company
  • Raytheon Aircraft Holdings, Inc.
  • Raytheon Aircraft Services, Inc.
  • Raytheon Appliances Asia, Inc.
  • Raytheon Australia
  • Raytheon Australia International PTY Ltd
  • Raytheon Canada Ltd (RCL)
  • Raytheon Deutschland GmbH
  • Raytheon Espana, S.A.
  • Raytheon Europe International Company
  • Raytheon International Korea, Inc.
  • Raytheon Ltd
  • Raytheon Philippines, Inc.
  • Raytheon Saudi Arabia Ltd
  • Raytheon Systems Holding Company LLC
  • Raytheon Systems Israel Company
  • Raytheon Training International
  • Raytheon-Tag Components Ltd
  • Recon Instruments
  • Relicore Inc.
  • Revolution Analytics
  • RL3 JV RUS
  • RockYou
  • RSA
  • Sabiedriba ar irobezotu atbildibu IBM Latvija
  • SafeNet Inc.
  • Saudi Aramco
  • ScaleIO
  • Secure Computing
  • Secure DNA Consulting, Inc.
  • Secure DNA Holdings, Inc.
  • Secure DNA Managed Services, Inc.
  • SecureID
  • SecureWorks
  • Seismograph Service France
  • Seneweb.com
  • Sensage
  • SentinelOne
  • Sentrigo
  • Servicentro TMLA S.A.de C.V.
  • Silicium Security
  • Silverpop
  • Silver Lake
  • Silver Tail Systems
  • Skype Communications Sarl
  • SoftLayer Technologies Inc.
  • SoftScan
  • SolveDirect
  • Sony Corporation
  • Sony Pictures Entertainment
  • Sophos
  • Sophos AB
  • Sophos B.V.
  • Sophos Computer Security Pte Ltd (Makati City)
  • Sophos Computer Security Pte Ltd (Malaysia)
  • Sophos Computer Security Pte Ltd (Singapore)
  • Sophos Computer Security Pte Ltd (Taipei City)
  • Sophos Computer Security Pte Ltd Jakarta
  • Sophos Computer Security Pte Ltd. (Beijing)
  • Sophos Computer Security Pte Ltd. (Shanghai)
  • Sophos Hong Kong Company Ltd.
  • Sophos Iberia SRL
  • Sophos Italia Srl
  • Sophos KK
  • Sophos Ltd.
  • Sophos Sarl
  • Sophos Schweiz AG
  • Sophos Technology Solutions India Pvt Ltd (Ahmadabad)
  • Sophos Technology Solutions India Pvt Ltd (Mumbai)
  • Sophos Technology Solutions India Pvt Ltd (New Delhi)
  • Sophos training Center
  • SOS Pacasia Technologies, Inc.
  • Sourcefire
  • Splunk
  • Star Analytics Inc.
  • Stifel
  • StrongLoop, Inc.
  • Sunrise
  • SwapDrive
  • Switchcraft de Mexico S.A. de C.V.
  • Sygate Technology
  • Symantec
  • Symantec (UK) Ltd
  • Symantec Asia Pacific Pte. Ltd.
  • Symantec Holdings Ltd
  • Symantec International
  • Symantec Japan LLC
  • Symantec Ltd
  • Symantec Operating Corporation
  • Symantec Software India Private Ltd.
  • Syncplicity
  • SyntaxTree
  • TAG Halbleiter GmbH
  • Tail-f Systems
  • TalkTalk
  • Tanium
  • Target
  • Technology Associates Inc.
  • Technology Products and Services Ltd
  • Teligy Inc.
  • Thales
  • Thales Raytheon Systems Arabia L.P.
  • Thales-Raytheon Systems Co. LLC
  • Thales-Raytheon Systems Company Ltd
  • Thales-Raytheon Systems Company S.A.S. (TRS SAS)
  • The Gulf Industrial Technology Company (KSC)
  • The Now Factory
  • Third Brigade
  • ThreatGrid
  • T-Mobile
  • Transparent Logic Technologies
  • Trend Micro
  • Trend Micro (China) Incorporated
  • Trend Micro (EMEA) Ltd
  • Trend Micro (NZ) Ltd
  • Trend Micro (Singapore) Private Ltd
  • Trend Micro (Thailand) Ltd
  • Trend Micro (UK) Ltd
  • Trend Micro Australia Pty. Ltd.
  • Trend Micro Deutschland GmbH
  • Trend Micro do Brasil Ltda.
  • Trend Micro France
  • Trend Micro Hong Kong Ltd
  • Trend Micro Inc.
  • Trend Micro Incorporated
  • Trend Micro India Private Ltd
  • Trend Micro Italy Srl
  • Trend Micro Korea Inc.
  • Trend Micro Latinoamerica S.A.de C.V.
  • Trend Micro Malaysia Sdn Bhd
  • Tropo
  • Trusted Computer Solutions Inc
  • Trusteer
  • TurnTide
  • TV5 Monde
  • TwinStrata
  • Twitter
  • Uber
  • Ubiquisys
  • Ultimaco Safeware AG
  • UnityVS
  • UrbanCode Inc
  • VeriSign
  • VERITAS Software Corporation
  • Verizon
  • Virtustream
  • Virtutech
  • VirusBuster
  • Visto Equity Partners LLC
  • Visual Analytics Inc.
  • VMware Bermuda Ltd
  • VMware, Inc.
  • VoloMetrix
  • Vontu
  • Websense
  • Westinghouse
  • WholeSecurity
  • Wind River Systems, Inc
  • WTC Insurance Corporation, Ltd.
  • Xtify Inc.
  • XtreamLok
  • ZiiLabs

Organisations Mentioned in This Report

  • Agence de l'Informatique de l'Etat du Sénégal
  • Agence Nationale de la Sécurité des Systèmes D'information (ANSSI)
  • Ajax Security Team
  • Anonymous Collective
  • Boko Haram
  • Cyber Fighters of Izz ad-Din Al Qassam
  • CyberCaliphate
  • Dubai Centre for E-Security
  • Estonian Parliament
  • European Commission
  • European Cybercrime Centre (EC3)
  • Europol
  • French Ministry of Finance
  • G20
  • Groupe Speciale Mobile Association (GSMA)
  • Harvard Business School
  • Information Systems Security Association (ISSA)
  • Iranian Cyber Army
  • Iranian National Computer Emergency Response Team (CERT)
  • Islamic State (IS)
  • London Stock Exchange (LSE)
  • MAHER Centre
  • Mexican Centre for Investigation and National Security
  • Mexican Secretariat of National Defense
  • Mexican Secretariat of the Navy
  • Naikon Group
  • Nigerian Defense Headquarters
  • Norwegian National Security Authority
  • Princeton University
  • Redstone Arsenal
  • Rex Mundi
  • Sandia National Laboratories
  • Seoul Metro
  • South Korea Financial Service
  • The Impact Team
  • U.S. Central Command
  • U.S. Cyber Command
  • U.S. Federal Bureau of Investigation (FBI)
  • U.S. Government
  • U.S. Intelligence Community
  • U.S. National Aeronautics and Space Administration (NASA)
  • U.S. National Security Agency (NSA)
  • U.S. Navy and Marine Corps Intranet (NMCI)
  • U.S. Securities and Exchange Commission (SEC)
  • UK Government
  • UK Government Communications Headquarters (GCHQ)
  • United Nations (UN)
  • University of Maryland
  • Wikileaks
  • Yantai Airport (YTN)
Back to Top