表紙
市場調査レポート

サイバーセキュリティ企業トップ100社:クラウド、エンドポイント、ネット、アプリケーション、データ、セキュリティオペレーションおよびID管理のリーダー企業

Top 100 Cyber Security Companies - Ones to Watch in 2016: Leaders in Cloud, Endpoint, Net, App, Data, Security Operations & Identification Management

発行 Visiongain Ltd 商品コード 347363
出版日 ページ情報 英文 356 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1GBP=141.53円で換算しております。

ご注意:
Single UserとDepartmentalライセンスは、DRM (デジタル著作権管理システム) 付PDFになります。
制限内容は、上記ライセンスの[?]アイコンをクリックしてご確認ください。

Back to Top
サイバーセキュリティ企業トップ100社:クラウド、エンドポイント、ネット、アプリケーション、データ、セキュリティオペレーションおよびID管理のリーダー企業 Top 100 Cyber Security Companies - Ones to Watch in 2016: Leaders in Cloud, Endpoint, Net, App, Data, Security Operations & Identification Management
出版日: 2015年12月16日 ページ情報: 英文 356 Pages
概要

当レポートは、2016年のサイバーセキュリティ市場で注目すべきサイバーセキュリティ企業の上位100社について包括的に調査し、企業のプロファイル、製品とサービス、および展望などについてまとめています。

第1章 エグゼクティブサマリー

第2章 サイバーセキュリティ市場のイントロダクション

  • 主要サイバーセキュリティ企業100社のイントロダクション
  • サイバーセキュリティ市場情勢の評価
  • 世界の国境警備市場の概要
  • 世界のサイバーセキュリティ市場の定義
  • 世界のサイバーセキュリティ市場の区分
  • サイバーセキュリティ市場の成長を促進する要因
  • サイバーセキュリティ市場の動向分析
  • サイバー攻撃のメカニズム
  • サイバー攻撃の種類
  • サイバー防衛の手段
  • 近年のサイバーセキュリティ攻撃リスト

第3章 世界のサイバーセキュリティエコシステムにおける主要企業の分析

  • サイバーセキュリティ市場における大きな成長の可能性
  • サイバーセキュリティ市場情勢の評価
  • 従来のサイバーセキュリティ市場を破壊する可能性を示す新たなサイバーセキュリティ企業

第4章 サイバーセキュリティ市場のSWOT分析

  • 強み
  • 弱み
  • 機会
  • 脅威

第5章 サイバーセキュリティ市場における主要企業100社

  • Absolute Software Corporation
  • Absolute Software
  • Airbus Group
  • Akamai Technologies Inc.
  • AlienVault
  • Arbor Networks
  • Arxan Technology Inc.
  • AT&T
  • Authentify
  • AVG Technologies
  • Avira
  • BAE Systems
  • Barracuda Networks
  • Bay Dynamics
  • Bayshore Networks
  • Berkley Varitronics
  • Bit9
  • Bitdefender
  • Black Duck Software
  • BlueCoat Systems
  • Boeing
  • Booz Allen Hamilton
  • Bromium
  • BT
  • Centrify
  • CertainSafe
  • Check Point
  • Cisco Systems
  • ClearSwift
  • Clearwater Compliance
  • Coalfire
  • Code42
  • CodeDX
  • Core Security
  • Corero Network Security
  • CSC (Computer Science Corporation)
  • Cybera
  • CyberArk
  • DB Networks
  • Dell
  • Deloitte
  • Digital Shadows
  • Easy Solutions
  • EMC Corporation
  • Ernst & Young (EY)
  • Finmeccanica
  • FireEye
  • Fortinet
  • F-Secure
  • Gemalto
  • General Dynamics
  • Haverjac Group
  • Hewlett Packard
  • High-Tech Bridge
  • Honeywell
  • IBM Corporation
  • Intel Corporation
  • IT Security
  • Juniper Networks
  • Kaspersky Lab
  • Kroll
  • L-3 Communications
  • Lancope
  • Leidos
  • Lockheed Martin Corporation
  • Malwarebytes
  • MobileIron
  • Nexusguard
  • Norse
  • Northrop Grumman Corporation
  • Palantir Technologies
  • Palo Alto Networks
  • Panda Security
  • Pindrop Security
  • Ping Identity
  • Proofpoint
  • PWC
  • Qualys
  • Radware
  • Raytheon Company
  • Resilient Systems
  • SecuEra
  • Seculert
  • Sera-Brynn
  • Sophos
  • Splunk
  • Symantec Corporation
  • Synopsys
  • Templar Shield
  • Thales Group
  • Trend Micro
  • Tripwire
  • Ultra Electronics
  • vArmour
  • Veracode
  • VMWare
  • Voltage Security
  • Watch Guard
  • WatchDox
  • Webroot

第6章 専門家の見解

第7章 結論

第8章 用語

図表

目次
Product Code: CYB0005

The latest report from business intelligence provider visiongain offers comprehensive analysis of the top 100 cyber security companies. These are the ones that you need to watch in 2016 as the cyber security market gathers pace.

Now: The cyber security market is going through a period of rapid growth and innovation as industry leaders and policymakers struggle to contain the effects of cyber-attacks and data breaches, hence the high rate of mergers and acquisitions in the sector. The highest valued acquisition in the cyber security sector was announced in October 2015 when Dell announced the takeover of EMC. This is an example of the business critical headline that you need to know about - and more importantly, you need to read visiongain's objective analysis of how this will impact your company and the industry more broadly. How are you and your company reacting to this news? Are you sufficiently informed?

How this report will benefit you

We know that the cyber security market is highly fragmented, very dynamic with high levels of M&A activity and there is much to play for with established incumbents at risk of losing significant business opportunities to aspiring innovators.

Read on to discover how you can exploit the future business opportunities emerging in the cyber security sector. Visiongain's new study tells you and tells you NOW.

In this brand new report you will receive 137 in-depth tables, charts and graphs PLUS 8 EXCLUSIVE expert interviews - all unavailable elsewhere.

The 356 page report provides clear detailed insight into the top 100 companies in the cyber security market. It reveals the key drivers and challenges affecting the market.

By ordering and reading our brand new report today you will be better informed and ready to act.

Report Scope

  • 8 full transcripts of exclusive visiongain interviews with key opinion-leaders in the market, from the following companies:
    • Arxan
    • Bayshore Networks
    • Cisco
    • CodeDx
    • Corero Network Security
    • Haverjac Group
    • High-Tech Bridge
    • Nexusguard
  • Examination of how the cyber security market is evolving
  • Analysis of game changing technological trends being employed by the leading cyber security players and how these will shape the industry.
  • Who are the leading 100 cyber security companies and what are their prospects over the forecast period? See profiles of the companies operating within the sector with analysis of their prospects
  • See tables of significant contracts for the leading cyber security companies
  • SWOT analysis of the major strengths and weaknesses of the market, together with the opportunities available and the key threats faced.
  • Market conclusions & recommendations.

How will you benefit from this report?

  • This report will keep your cyber security knowledge base up to speed. Don't get left behind
  • This report will reinforce strategic decision decision-making based upon definitive and reliable market data
  • You will learn how to exploit new technological trend within cyber security
  • You will be able to realise your company's full potential within the market
  • You will better understand the competitive landscape and identify potential new business opportunities & partnerships

Who should read this report?

  • Anyone within the cyber security value chain.
  • CEO's
  • COO's
  • CIO's
  • Business development managers
  • Marketing managers
  • Technologists
  • Suppliers
  • Investors
  • Banks
  • Government agencies
  • Contractors

Visiongain's study is intended for anyone requiring commercial analyses for the top companies in the cyber security market. You will find data, trends and predictions.

Buy our report today Top 100 Cyber Security Companies: Ones to Watch in 2016: Leaders in Cloud, Endpoint, Net, App, Data, Security Operations & Identification Management. Avoid missing out by staying informed - order our report now.

visiongain is a trading partner with the US Federal Government.

Table of Contents

1. Executive Summary

  • 1.1. Cyber Security Market Set to Take-off in 2016
  • 1.2. Aim of the Report
  • 1.3. Structure of the Report
  • 1.4. Why You Should Read This Report
  • 1.5. How This Report Delivers
  • 1.6. Who is This Report For?
  • 1.7. Methodology
  • 1.8. About Visiongain

2. Introduction to the Cyber Security Market

  • 2.1. Introduction to the Leading 100 Cyber Security Companies
  • 2.2. Assessing the Cyber Security Market Landscape
  • 2.3. Overview of the Global Border Security Market
  • 2.4. Defining the Global Cyber Security Market
  • 2.5. Global Cyber Security Market Segmentation
  • 2.6. Factors Driving Cyber Security's Market Growth
  • 2.7. Trend Analysis of the Cyber Security Market
  • 2.8. Mechanisms of Cyber Attack
  • 2.9. Types of Cyber Attack
  • 2.10. Methods of Cyber Defence
  • 2.11. List of Recent Cyber Security Attacks

3. Analysis of Leading Companies in the Global Cyber Security Ecosystem

  • 3.1. Huge Potential for Growth in the Cyber Security Space
  • 3.2. Assessing the Cyber Security Market Landscape
  • 3.3. New Cyber Security Players Showing Potential to Disrupt Traditional Cyber Security Market
    • 3.3.1. Shifting Expertise in the Cyber Security Market
    • 3.3.2. Regional Breakdown of the Leading Companies in the Cyber Security Market

4. SWOT Analysis of the Cyber Security Market 2015

  • 4.1. Strengths
  • 4.2. Weaknesses
  • 4.3. Opportunities
  • 4.4. Threats

5. Leading 100 Companies in the Cyber Security Market

  • 5.1. Absolute Software Corporation
    • 5.1.1. Cyber Security Overview
    • 5.1.2. Absolute Software Recent Developments
    • 5.1.3. Absolute Software Products and Service Offerings
    • 5.1.4. Absolute Software Partnerships and Ventures
    • 5.1.5. Absolute Software Future Outlook
  • 5.2. Absolute Software
    • 5.2.1. Cyber Security Overview
    • 5.2.2. Absolute Software Products & Solutions
  • 5.3. Airbus Group
    • 5.3.1. Cyber Security Overview
    • 5.3.2. Airbus Group Cyber Security Products
    • 5.3.3. Airbus Group M&A Activity
    • 5.3.4. Airbus Group Primary Market Competitors
    • 5.3.5. Airbus Group Organisational Structure
  • 5.4. Akamai Technologies Inc.
    • 5.4.1. Cyber Security Overview
    • 5.4.2. Akamai Technologies Recent Developments
    • 5.4.3. Akamai Technologies Products and Services
    • 5.4.4. Akamai Technologies Partnerships and Ventures
    • 5.4.5. Akamai Technologies Future Outlook
  • 5.5. AlienVault
    • 5.5.1. Cyber Security Overview
    • 5.5.2. AlienVault Latest Developments
  • 5.6. Arbor Networks
    • 5.6.1. Cyber Security Overview
    • 5.6.2. Arbor Networks Products & Services
  • 5.7. Arxan Technology Inc.
    • 5.7.1. Cyber Security Overview
    • 5.7.2. Arxan Technology Products & Services
  • 5.8. AT&T
    • 5.8.1. Cyber Security Overview
    • 5.8.2. AT&T Recent Developments
    • 5.8.3. AT&T Cyber Security Products and Services
    • 5.8.4. AT&T Partnerships and Ventures
    • 5.8.5. AT&T Future Outlook
  • 5.9. Authentify
    • 5.9.1. Cyber Security Overview
    • 5.9.2. Authentify Products & Services
  • 5.10. AVG Technologies
    • 5.10.1. Cyber Security Overview
    • 5.10.2. AVG Technologies Latest Developments
  • 5.11. Avira
    • 5.11.1. Introduction and Cyber Security Overview
    • 5.11.1. Avira Recent Developments
    • 5.11.2. List of Avira Products and Services
    • 5.11.3. Avira Partnerships and Ventures
    • 5.11.4. Avira Future Outlook
  • 5.12. BAE Systems
    • 5.12.1. BAE Systems Cyber Security Overview
    • 5.12.2. BAE Systems Primary Market Competitors
    • 5.12.3. BAE Systems SWOT Analysis
  • 5.13. Barracuda Networks
    • 5.13.1. Cyber Security Overview
    • 5.13.2. Barracuda Networks Products
  • 5.14. Bay Dynamics
    • 5.14.1. Bay Dynamics Cyber Security Overview
  • 5.15. Bayshore Networks
    • 5.15.1. Cyber Security Overview
    • 5.15.2. Bayshore Networks Products
  • 5.16. Berkley Varitronics
    • 5.16.1. Cyber Security Overview
    • 5.16.2. Berkley Varitronics Products
    • 5.16.3. Berkley Varitronics Customers
  • 5.17. Bit9
    • 5.17.1. Cyber Security Overview
    • 5.17.2. Bit9 Products
  • 5.18. Bitdefender
    • 5.18.1. Cyber Security Overview
    • 5.18.2. Bitdefender Products
  • 5.19. Black Duck Software
    • 5.19.1. Cyber Security Overview
    • 5.19.2. OSS concerns and Solutions
    • 5.19.3. Black Duck Hub
  • 5.20. BlueCoat Systems
    • 5.20.1. Cyber Security Overview
    • 5.20.2. BlueCoat Systems Products
    • 5.20.3. BlueCoat Systems Company Outlook
  • 5.21. Boeing
    • 5.21.1. Cyber Security Overview
    • 5.21.2. Boeing Company Cyber Security Products
    • 5.21.3. Boeing Company's Primary Market Competitors
    • 5.21.4. Boeing Company's Regional Emphasis / Focus
    • 5.21.5. Boeing Company's M&A Activity
  • 5.22. Booz Allen Hamilton
    • 5.22.1. Cyber Security Overview
    • 5.22.2. Booz Allen Hamilton, Inc. Cyber Security Market Products
    • 5.22.3. Booz Allen Hamilton Cyber Security Contracts
    • 5.22.4. Booz Allen Hamilton Primary Competitors
    • 5.22.5. Booz Allen Hamilton, Inc.'s M&A Activity
  • 5.23. Bromium
    • 5.23.1. Cyber Security Overview
    • 5.23.2. Bromium Products
  • 5.24. BT
    • 5.24.1. Cyber security Overview
    • 5.24.2. BT Recent Developments
    • 5.24.3. BT Products and Services
    • 5.24.4. BT Partnerships
    • 5.24.5. BT Future Outlook
  • 5.25. Centrify
    • 5.25.1. Cyber security Overview
    • 5.25.2. Centrify Recent Developments
    • 5.25.3. Centrify Products and Services
    • 5.25.4. Centrify Partnerships and Ventures
    • 5.25.5. Centrify Future Outlook
  • 5.26. CertainSafe
    • 5.26.1. Cyber Security Overview
    • 5.26.2. CertainSafe Solutions
  • 5.27. Check Point
    • 5.27.1. Cyber Security Overview
    • 5.27.2. Check Point Primary Market Competitors
    • 5.27.3. Check Point SWOT Analysis
  • 5.28. Cisco Systems
    • 5.3.2. Cisco Systems Cyber Security Overview
    • 5.3.3. Cisco Systems Primary Market Competitors
    • 5.3.4. Cisco Systems SWOT Analysis
    • 5.29. ClearSwift
    • 5.29.1. Cyber Security Overview
    • 5.29.2. ClearSwift Solutions
  • 5.30. Clearwater Compliance
    • 5.30.1. ClearSwift Latest Developments
  • 5.31. Coalfire
    • 5.31.1. Coalfire Cyber Security Overview
    • 5.31.2. Coalfire Cyber Security Offerings
  • 5.32. Code42
    • 5.32.1. Cybersecurity Overview
    • 5.32.2. Code42 Recent developments
    • 5.32.3. Code42 Products and Services
    • 5.32.4. Code42 Partnerships and Ventures
    • 5.32.5. Code42 Future Outlook
  • 5.33. CodeDX
    • 5.33.1. Cyber Security Overview
    • 5.33.2. CodeDX Products
  • 5.34. Core Security
    • 5.34.1. Cyber Security Overview
    • 5.34.2. Core Security Products
  • 5.35. Corero Network Security
    • 5.35.1. Cyber Security Overview
    • 5.35.2. Corero Network Security Products
  • 5.36. CSC (Computer Science Corporation)
    • 5.36.1. CSC Recent Developments
    • 5.36.2. CSC Products and services
    • 5.36.3. CSC Partnerships and Ventures
    • 5.36.4. CSC Future Outlook
  • 5.37. Cybera
    • 5.37.1. Cybersecurity Overview
    • 5.37.2. Cybera Recent Developments
    • 5.37.3. Cybera Products and Services
    • 5.37.4. Cybera Partnership and Ventures
    • 5.37.5. Cybera Future Outlook
  • 5.38. CyberArk
    • 5.38.1. Cyber Security Overview
    • 5.38.2. CyberArk Products
  • 5.39. DB Networks
    • 5.39.1. Cyber Security Overview
  • 5.39. DB Networks Products
  • 5.40. Dell
    • 5.40.1. Dell's Vision for Connected Security
    • 5.40.2. Dell Inc Competitors
    • 5.40.3. Reshaping Operations as a Private Company - Understanding Dell's Strategy
    • 5.40.4. Dell Inc Mergers and Acquisitions
    • 5.40.5. Dell Inc SWOT Analysis
  • 5.41. Deloitte
    • 5.41.1. Deloitte Cyber Security Overview
    • 5.41.3. Deloitte Primary Market Competitors
    • 5.41.4. Deloitte SWOT Analysis
  • 5.42. Digital Shadows
    • 5.42.1. Cyber Security Overview
    • 5.42.2. Digital Shadows Solutions
  • 5.43. Easy Solutions
    • 5.43.1. Easy Solutions Latest Developments
  • 5.44. EMC Corporation
    • 5.44.1. EMC Corporation Company Profile
    • 5.5.3. EMC Corporation Primary Market Competitors
    • 5.3.4. EMC Corporation SWOT Analysis
  • 5.45. Ernst & Young (EY)
    • 5.45.1. EY Company Profile
    • 5.6.3. EY Primary Market Competitors
    • 5.6.4. EY SWOT Analysis
  • 5.46. Finmeccanica
    • 5.46.1. Finmeccanica Role in the Cyber Security Market
    • 5.46.2. Finmeccanica Organisational Structure
    • 5.46.3. Finmeccanica Cyber Security Products
    • 5.46.4. Finmeccanica Primary Market Competitors
    • 5.46.5. Finmeccanica S.p.A.'s Recent M&A Activity
  • 5.47. FireEye
    • 5.47.1. FireEye Latest developments
    • 5.47.2. Challenges faced by FireEye
  • 5.48. Fortinet
    • 5.48.1. Fortinet Cyber Security Overview
    • 5.48.3. Fortinet Primary Market Competitors
    • 5.48.4. Fortinet SWOT Analysis
  • 5.49. F-Secure
    • 5.49.1. Cyber Security Overview
    • 5.49.2. F-Secure Enterprise Security Solutions
  • 5.50. Gemalto
    • 5.50.1. Cyber Security Overview
    • 5.50.2. Gemalto Products & Services
  • 5.51. General Dynamics
    • 5.51.1. General Dynamics Corporation's Role in the Cyber Security Market
    • 5.51.2. General Dynamics Corporation's Organisational Structure
    • 5.51.3. General Dynamics Corporation's Cyber Security Products
    • 5.51.4. General Dynamics Corporation's Primary Market Competitors
    • 5.51.5. General Dynamics Corporation's Regional Emphasis / Focus
    • 5.51.6. General Dynamics Corporation's Recent M&A Activity
  • 5.52. Haverjac Group
    • 5.52.1. Overview of Haverjac's Group Cyber Security Offerings
    • 5.52.2. Recent Acquisition and Expansion into United Kingdom & Europe
  • 5.53. Hewlett Packard
    • 5.53.1. Hewlett Packard Company's Role in the Cyber Security Market
    • 5.53.2. Hewlett Packard Company's Organisational Structure
    • 5.53.3. Hewlett Packard Company's Cyber Security Products
    • 5.53.4. Hewlett Packard Company's Primary Market Competitors
    • 5.53.5. Hewlett Packard Company's Recent M&A Activity
  • 5.54. High-Tech Bridge
    • 5.54.1. Cyber Security Overview
    • 5.54.2. High-Tech Bridge Products & Services
  • 5.55. Honeywell
    • 5.55.1. Cyber Security Overview
    • 5.55.2. Strengths in Cyber Security
    • 5.55.3. Compliance with US Cyber Security Regulatory Standards
  • 5.56. IBM Corporation
    • 5.56.1. Cyber Security Overview
    • 5.56.2. IBM Latest Developments
    • 5.56.3. IBM Primary Market Competitors
    • 5.56.4. IBM SWOT Analysis
  • 5.57. Intel Corporation
    • 5.57.1. Intel Company Profile
    • 5.57.2. Intel Primary Market Competitors
    • 5.57.3. Intel SWOT Analysis
  • 5.58. IT Security
    • 5.58.1. Cyber Security Overview
    • 5.58.2. IT Security Products & Services
  • 5.59. Juniper Networks
    • 5.59.1. Recent Developments
    • 5.59.2. Juniper Networks Products and Services
    • 5.59.3. Juniper Networks Partnerships and Ventures
    • 5.59.4. Juniper Networks Future Outlook
  • 5.60. Kaspersky Lab
    • 5.60.1. Kaspersky Lab's Role in the Cyber Security Market
    • 5.60.2. Kaspersky Lab's Organisational Structure
    • 5.60.3. Kaspersky Lab's Cyber Security Products
    • 5.60.4. Kaspersky Lab's Primary Market Competitors
    • 5.60.5. Kaspersky Lab's Recent M&A Activity
  • 5.61. Kroll
    • 5.61.1. Recent Developments
    • 5.61.2. Kroll Products and Services
    • 5.61.3. Kroll Partnerships and Ventures
    • 5.61.4. Kroll Future Outlook
  • 5.62. L-3 Communications
    • 5.62.1. L-3 Communications Role in the Cyber Security Market
    • 5.62.2. L-3 Communications Organisational Structure
    • 5.62.3. L-3 Communications Holdings, Inc.'s Cyber Security Products
    • 5.62.4. Communications Primary Competitors
    • 5.62.5. L-3 Communications Recent M&A Activity
  • 5.63. Lancope
    • 5.63.1. Lancope Latest developments
  • 5.64. Leidos
    • 5.64.1. Leidos Role in the Cyber Security Market
    • 5.64.2. Leidos Organisational Structure
    • 5.64.3. Leidos Cyber Security Products
    • 5.64.4. Leidos Primary Market Competitors
    • 5.64.5. Leidos Regional Emphasis / Focus
    • 5.64.6. Leidos Recent M&A Activity
  • 5.65. Lockheed Martin Corporation
    • 5.65.1. Cyber Security Overview
    • 5.65.2. Latest Developments
    • 5.65.3. Lockheed Martin Primary Market Competitors
    • 5.65.4. Lockheed Martin SWOT Analysis
  • 5.66. Malwarebytes
    • 5.66.1. Cyber Security Overview
    • 5.66.2. Malwarebytes Products
  • 5.67. MobileIron
    • 5.67.1. Cyber Security Overview
    • 5.67.2. MobileIron Products
  • 5.68. Nexusguard
    • 5.68.1. Nexusguard Recent Developments
    • 5.68.2. Nexusguard Products and Services
    • 5.68.3. Nexusguard Partnerships and Ventures
    • 5.68.4. Nexusguard Future Outlook
  • 5.69. Norse
    • 5.69.1. Norse Latest Developments
  • 5.70. Northrop Grumman Corporation
    • 5.70.1. Northrop Grumman Corporation's Role in the Cyber Security Market
    • 5.70.2. Northrop Grumman Corporation's Organisational Structure
    • 5.70.3. Northrop Grumman Corporation's Cyber Security Products
    • 5.70.4. Northrop Grumman Corporation's Primary Market Competitors
    • 5.70.5. Northrop Grumman Corporation's Recent M&A Activity
  • 5.71. Palantir Technologies
    • 5.71.1. Cyber Security Overview
    • 5.71.2. Palantir Technologies Products
  • 5.72. Palo Alto Networks
    • 5.72.1. Palo Alto Networks Latest Developments
  • 5.73. Panda Security
    • 5.73.1. Panda Security Recent Developments
    • 5.73.2. Panda Security Products and Services
    • 5.73.3. Panda Security Partnerships and Ventures
    • 5.73.4. Panda Security Future Outlook
  • 5.74. Pindrop Security
    • 5.74.1. Cyber Security Overview
    • 5.74.2. Pindrop Cyber Security Services
    • 5.74.3. Pindrop Security Research & Development
  • 5.75. Ping Identity
    • 5.75.1. Cyber Security Overview
    • 5.75.2. Ping Identity Products
  • 5.76. Proofpoint
    • 5.76.1. Cyber Security Overview
    • 5.76.2. Proofpoint Solutions
  • 5.77. PWC
    • 5.77.1. PWC Cyber Security Overview
    • 5.77.2. PWC Primary Market Competitors
    • 5.77.3. PWC SWOT Analysis
  • 5.78. Qualys
    • 5.78.1. Cyber Security Overview
    • 5.78.2. Qualys Products
  • 5.79. Radware
    • 5.79.1. Cyber Security Overview
    • 5.79.2. Radware Solutions
  • 5.80. Raytheon Company
    • 5.80.1. Raytheon Company Cyber Security Overview
    • 5.80.2. Raytheon Primary Market Competitors
    • 5.80.3. Raytheon SWOT Analysis
  • 5.81. Resilient Systems
    • 5.81.1. Cyber Security Overview
    • 5.81.2. Resilient Systems Products
  • 5.82. SecuEra
    • 5.82.1. Cyber Security Overview
    • 5.82.2. SecuEra Products
  • 5.83. Seculert
    • 5.83.1. Cyber Security Overview
    • 5.83.2. Seculert Products
  • 5.84. Sera-Brynn
    • 5.84.1. Cyber Security Overview
    • 5.84.2. Sera-Brynn Services
  • 5.85. Sophos
    • 5.85.1. Sophos Recent Developments
    • 5.85.2. Sophos Products and Services
    • 5.85.3. Sophos Partnerships and Ventures
    • 5.85.4. Sophos Future Outlook
  • 5.86. Splunk
    • 5.86.1. Cybersecurity Overview
    • 5.86.2. Splunk Recent Developments
    • 5.86.3. Splunk Products and Services
    • 5.86.4. Splunk Partnerships
    • 5.86.5. Splunk Future Outlook
  • 5.87. Symantec Corporation
    • 5.87.1. Symantec Company Profile
    • 5.87.2. Symantec Primary Market Competitors
    • 5.87.3. Symantec SWOT Analysis
  • 5.88. Synopsys
    • 5.88.1. Coverity
    • 5.88.2. Codenomicon
    • 5.88.3. Cyber Security Overview
    • 5.88.4. Synopsys Services
  • 5.89. Templar Shield
    • 5.89.1. Cyber Security Overview
    • 5.89.2. Templar Shield Services
  • 5.90. Thales Group
    • 5.90.1. Thales Group's Role in the Cyber Security Market
    • 5.90.2. Thales Group's Organisational Structure
    • 5.90.3. Thales Group's Cyber Security Products
    • 5.90.4. Thales Group's Primary Market Competitors
    • 5.90.5. Thales Group's Regional Emphasis / Focus
    • 5.90.6. Thales Group's M&A Activity
  • 5.91. Trend Micro
    • 5.91.1. Trend Micro Role in the Cyber Security Market
    • 5.91.2. Trend Micro Organisational Structure
    • 5.91.3. Trend Micro Cyber Security Products
    • 5.91.4. Trend Micro, Inc.'s Recent M&A Activity
    • 5.91.5. Trend Micro SWOT Analysis
  • 5.92. Tripwire
    • 5.92.1. Cyber Security Overview
    • 5.92.2. Tripwire Industry Solutions
  • 5.93. Ultra Electronics
    • 5.93.1. Ultra Electronics Role in the Cyber Security Market
    • 5.93.2. Ultra Electronics Organisational Structure
    • 5.93.3. Ultra Electronics Cyber Security Products
    • 5.93.4. Ultra Electronics Primary Market Competitors
    • 5.93.5. Ultra Electronics Regional Emphasis / Focus
    • 5.93.6. Ultra Electronics M&A Activity
  • 5.94. vArmour
    • 5.94.1. vArmour Recent Developments
    • 5.94.2. vArmour Products and Services
    • 5.94.3. vArmour Partnerships and Ventures
    • 5.94.4. vArmour Future Outlook
  • 5.95. Veracode
    • 5.95.1. Veracode Latest Developments
  • 5.96. VMWare
    • 5.96.1. Cyber Security Overview
    • 5.96.2. VMWare Products
  • 5.97. Voltage Security
    • 5.97.1. Cyber Security Overview
    • 5.97.2. Voltage Security Recent Developments
    • 5.97.3. Voltage Security Partnerships and Ventures
    • 5.97.4. Voltage Security Future Outlook
    • 5.97.5. Voltage Security Products and Services
  • 5.98. Watch Guard
    • 5.98.1. Watch Guard Recent Developments
    • 5.98.2. Watch Guard Products and services
    • 5.98.3. Watch Guard Partnerships and Ventures
    • 5.98.4. Watch Guard Future Outlook
  • 5.99. WatchDox
    • 5.99.1. Cyber Security Overview
    • 5.99.2. WatchDox Products
  • 5.100. Webroot
    • 5.100.1. Webroot Recent Developments
    • 5.100.2. Webroot Products and Services
    • 5.100.3. Webroot Partnerships and Ventures
    • 5.100.4. Webroot Future Outlook

6. Expert Opinion

  • 6.1. Arxan Interview
    • 6.1.1. Arxan Company Background & Cyber Security Offerings
    • 6.1.2Arxan's Strengths in Cyber Security Sector
    • 6.1.3. Trends and Factors Effecting Product development or Implementation
    • 6.1.4. Cyber Security Products and Solutions Clients Frequently Require
    • 6.1.5. Cyber Security Sub-Markets Critical for Arxan's Growth
    • 6.1.6. Cyber Security Market Drivers and Restraints
    • 6.1.7. Technological Developments in Cyber Security Market and Impact on Arxan
    • 6.1.8. Regional Cyber Security Markets Critical to Arxan
    • 6.1.9. Challenges & Opportunities in the Cyber Security Market
    • 6.1.10. Final Thoughts on the Cyber Security Market
  • 6.2. Bayshore Networks Interview
  • 6.2.1. Bayshore Networks Company Background & Cyber Security Offerings
    • 6.2.2. Bayshore Networks' Strengths in Cyber Security Sector
    • 6.2.3. Cyber Security Products and Solutions Clients Frequently Require
    • 6.2.4. Cyber Security Sub-Markets Critical for Bayshore Networks' Growth
    • 6.2.5. Cyber Security Market Drivers and Restraints
    • 6.2.6. Technological Developments in Cyber Security Market and Impact on Bayshore Networks
    • 6.2.7. Regional Cyber Security Markets Critical to Bayshore Networks
    • 6.2.8. Challenges & Opportunities in the Cyber Security Market
  • 6.3. Cisco Interview
    • 6.3.1. Cisco Company Background & Cyber Security Offerings
    • 6.3.2Cisco's Strengths in Cyber Security Sector
    • 6.3.3. Trends and Factors Effecting Product development or Implementation
    • 6.3.4. Cyber Security Products and Solutions Clients Frequently Require
    • 6.3.5. Cyber Security Sub-Markets Critical for Arxan's Growth
    • 6.3.6. Cyber Security Market Drivers and Restraints
    • 6.3.7. Technological Developments in Cyber Security Market and Impact on Cisco
    • 6.3.8. Regional Cyber Security Markets Critical to Cisco
    • 6.3.9. Challenges & Opportunities in the Cyber Security Market
  • 6.4. CodeDx Interview
    • 6.4.1. CodeDx CEO Background and Involvement with Cyber Security
    • 6.4.2. CodeDx Company Background and Focus
    • 6.4.3. CodeDx Product Offerings in Application Security
    • 6.4.4. CodeDx's Strengths in Cyber Security Sector
    • 6.4.5. Key Trends in Application Security
    • 6.4.6. How and Where are CodeDx Cyber Security Products and Solutions Deployed
    • 6.4.7. Market Drivers in Application Security
    • 6.4.8. Key Regional Cyber Security Markets Critical to CodeDx
    • 6.4.9. Challenges & Opportunities in the Application Security Market
  • 6.5. Corero Network Security Interview
    • 6.5.1. Corero Company Background & Cyber Security Offerings
    • 6.5.2. Corero's Strengths in Cyber Security Sector
    • 6.5.3. Trends and Factors Effecting Product development or Implementation
    • 6.5.4. Cyber Security Products and Solutions Clients Frequently Require
    • 6.5.5. Cyber Security Sub-Markets Critical for Arxan's Growth
    • 6.5.6. Cyber Security Market Drivers and Restraints
    • 6.5.7. Technological Developments in Cyber Security Market and Impact on Corero
    • 6.5.8. Regional Cyber Security Markets Critical to Corero
    • 6.5.9. Challenges & Opportunities in the Cyber Security Market
  • 6.6. Haverjac Group Interview
    • 6.6.1. Cyber Security Market Drivers and Restraints
    • 6.6.2. Challenges & Opportunities in the Cyber Security Market
  • 6.7. High-Tech Bridge Interview
    • 6.7.1. High-Tech Bridge Company Background & Cyber Security Offerings
    • 6.7.2. High-Tech Bridge's Strengths in Cyber Security Sector
    • 6.7.3. Trends and Factors Effecting Product development or Implementation
    • 6.7.4. Cyber Security Products and Solutions Clients Frequently Require
    • 6.7.5. Cyber Security Sub-Markets Critical for High-Tech Bridge's Growth
    • 6.7.6. Cyber Security Market Drivers and Restraints
    • 6.7.7. Technological Developments in Cyber Security Market and Impact on High-Tech Bridge
    • 6.7.8. Regional Cyber Security Markets Critical to High-Tech Bridge
  • 6.8. Nexusguard Interview
    • 6.8.1. Nexusguard Company Background & Cyber Security Offerings
    • 6.8.2. Nexusguard's Strengths in Cyber Security Sector
    • 6.8.3. Trends and Factors Effecting Product development or Implementation
    • 6.8.4. Cyber Security Products and Solutions Clients Frequently Require
    • 6.8.5. Cyber Security Sub-Markets Critical for Nexusguard's Growth
    • 6.8.6. Cyber Security Market Drivers and Restraints
    • 6.8.7. Technological Developments in Cyber Security Market and Impact on Nexusguard
    • 6.8.8. Regional Cyber Security Markets Critical to Nexusguard

7. Conclusion

  • 7.1. Why Will the Cyber Security Market Continue to Grow?
  • 7.2. Large Players Struggling to Maintain Top Position
  • 7.3. Cyber Security a Vital to National Defense
  • 7.4. Increasing Number of Cyber Attacks on Businesses
  • 7.5. Analysing the Future Outlook of the Cyber Security Market

8. Glossary

List of Tables

  • Table 2.1: Mechanisms of Cyber Attack (Type, Description)
  • Table 2.2: Types of Cyber Attack (Type, Description)
  • Table 2.3: Cyber Defence Systems (Method of Cyber Defence, Description)
  • Table 2.4: Recent History of High Profile Cyber Attacks (Date, Description)
  • Table 4.1: SWOT Analysis of the Global Cyber Security Market 2015
  • Table 5.1: Accuvant Cyber Security Services
  • Table 5.2: Sample of Airbus Group Cyber Security Products / Services (Company Section, Product, Key Features)
  • Table 5.3: Arbor Products & Services
  • Table 5.4: Arxan Industry Services
  • Table 5.5: Authentify Cyber Security Industry Applications
  • Table 5.6: Recent BAE Systems Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details)
  • Table 5.7: BAE Systems Selected Cyber Security Products & Services (Company Division, Product, Specification)
  • Table 5.8: SWOT Analysis of BAE Systems 2015
  • Table 5.9: Barracuda Cyber Security Solutions
  • Table 5.10: Bayshore Networks Cyber Security Industry Usage
  • Table 5.11: Cit9 Cyber Security Solutions
  • Table 5.12: Recent Boeing Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.13: Sample of Boeing Company Cyber Security Products / Services (Company Section, Product, Specifications)
  • Table 5.14: Sample of Booz Allen Hamilton, Inc. Cyber Security Products / Services (Company Section, Product, Specifications)
  • Table 5.15: Recent Booz Allen Hamilton, Inc. Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.16: Bromium Cyber Security Industry Solutions
  • Table 5.17: Certain Safe Cyber Security Industry Services
  • Table 5.18: Check Point Selected Cyber Security Products & Services (Product, Specification)
  • Table 5.19: SWOT Analysis Check Point 2015
  • Table 5.20: Recent Cisco Systems Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details)
  • Table 5.21: Cisco Systems Inc Selected Cyber-Security Products (Product/Service Name, Specification)
  • Table 5.22: SWOT Analysis of Cisco Systems 2015
  • Table 5.23: Clearswift History
  • Table 5.24: Core Security Industry Solutions
  • Table 5.25: Corero Network Cyber Security Solutions
  • Table 5.26: Dell Inc Major Cyber Security Contracts & Programmes 2011-2014 (Date, Country, Value $m, Details)
  • Table 5.27: Dell Inc Selected Cyber Security Products & Services 2014 (Company Division, Product, Specification)
  • Table 5.28: Dell Inc SWOT Analysis 2015
  • Table 5.29: Deloitte Selected Cyber Security Products & Services 2014 (Product, Specification)
  • Table 5.30: SWOT Analysis Deloitte 2015
  • Table 5.31: EMC Corporation Selected Cyber Security Products & Services 2014 (Product, Specification)
  • Table 5.32: SWOT Analysis of EMC Corporation 2015
  • Table 5.33: EY Selected Cyber Security Products & Services (Product, Specification)
  • Table 5.34: SWOT Analysis of EY 2015
  • Table 5.35: Sample of Finmeccanica Products / Services (Company Section, Product, Specification)
  • Table 5.36: Fortinet Major Cyber Security Contracts & Programmes 2010-2014 (Date, Country, Value ($m), Details)
  • Table 5.37: Fortinet Selected Cyber Security Products & Services 2014 (Product, Specification)
  • Table 5.38: SWOT Analysis of Fortinet 2015
  • Table 5.39: Fortinet Cyber Security End User Products
  • Table 5.40: Gemalto Major Shareholders
  • Table 5.41: Recent General Dynamics Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.42: Sample of General Dynamics Corporation's Cyber Security Products / Services (Company Section, Product, Specifications)
  • Table 5.43: Haverjac's core managed security services
  • Table 5.44: Recent Hewlett Packard Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.45: Sample of Hewlett Packard Company's Cyber Security Products / Services (Company Section, Product, Specifications)
  • Table 5.46: Recent IBM Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details)
  • Table 5.47: IBM Corporation Cyber-security (Product/Service Type, Company Division, Product/Service Name, Specification)
  • Table 5.48: SWOT Analysis of IBM 2015
  • Table 5.49: Intel Corporation Cyber-security (Product/Service Type, Company Division, Product/Service Name, Specification)
  • Table 5.50: SWOT Analysis of Intel 2015
  • Table 5.51: IT Security Cyber Security Services
  • Table 5.52: Sample of Kaspersky Lab's Cyber Security Products / Services (Company Section, Product, Key Features)
  • Table 5.53: Recent L-3 Communications Holdings, Inc. Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.54: Sample of L-3 Communications Holdings, Inc.'s Products / Services (Company Section, Product, Specifications)
  • Table 5.55: Recent Leidos Cyber Security Contracts / Projects / Programmes (Date, Country, Value, Details)
  • Table 5.56: Sample of Leidos, Inc.'s Cyber Security Products / Services (Company Section, Product, Key Features)
  • Table 5.57: Lockheed Martin Corporation Cyber Security Contracts & Programmes 2010-2014 (Date, Country, Value ($m), Details)
  • Table 5.58: Lockheed Martin Selected Cyber Security Products & Services 2014 (Product, Specification)
  • Table 5.59: SWOT Analysis of Lockheed Martin 2015
  • Table 5.60: MobileIron Cyber Security Solutions
  • Table 5.61: Recent Northrop Grumman Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.62: Sample of Northrop Grumman Corporation's Cyber Security Products / Services (Company Section, Product, Specifications)
  • Table 5.63: PinDrop Lab Partners
  • Table 5.64: PWC Selected Cyber Security Products & Services 2015 (Product, Specification)
  • Table 5.65: SWOT Analysis of PWC 2015
  • Table 5.66: Latest Cyber Security Products
  • Table 5.67: Raytheon Company Major Cyber Security Contracts & Programmes 2010-2015 (Date, Country, Value ($m), Details)
  • Table 5.68: Raytheon Company Selected Cyber Security Products & Services 2015 (Company Division, Product, Specification)
  • Table 5.69: SWOT Analysis of Raytheon 2015
  • Table 5.70: Seculert Cyber Security Industry Solutions
  • Table 5.71: Symantec Corporation Selected Cyber Security Products & Services (Product)
  • Table 5.72: SWOT Analysis of Symantec 2015
  • Table 5.73: Coverity Products
  • Table 5.74: Templar Shield Cyber Security Services
  • Table 5.75: Recent Thales Group Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)
  • Table 5.76: Sample of Thales Group's Cyber Security Products / Services (Company Section, Product, Key Features)
  • Table 5.77: Sample of Trend Micro Cyber Security Products / Services (Company Section, Product, Key Features)
  • Table 5.78: SWOT Analysis of Trend Micro 2015
  • Table 5.79: TripWire Cyber Security Products
  • Table 5.80: Sample of Ultra Electronics Holdings plc's Cyber Security Products / Services (Company Section, Product, Specifications)
  • Table 5.81: WatchDox Cyber Security Industry Services

List of Figures

  • Figure 2.1: Global Cyber Security Market Segmentation Overview
  • Figure 5.1: Airbus Group Organisational Structure
  • Figure 5.2: BAE Systems Organisational structure of cyber security divisions 2015
  • Figure 5.3: BAE Systems Primary Market Competitors
  • Figure 5.4: Boeing Company Organisational Structure
  • Figure 5.5: Boeing Company's Regional Emphasis / Focus (Region)
  • Figure 5.6: Check Point Primary Market Competitors
  • Figure 5.7: Cisco Systems Organisational structure of cyber security divisions
  • Figure 5.8: BAE Systems plc Primary Market Competitors
  • Figure 5.9: CSC Products & Services
  • Figure 5.10: Dell Inc Organisational Structure
  • Figure 5.11: Deloitte Organisational Structure 2015
  • Figure 5.12: Deloitte Primary Market Competitors
  • Figure 5.13: EMC Corporation Organisational structure of cyber security divisions 2014
  • Figure 5.14: EMC Corporation Primary Market Competitors
  • Figure 5.15: EY Organisational Structure 2015
  • Figure 5.16: EY Primary Market Competitors
  • Figure 5.17: Finmeccanica S.p.A.'s Organisational Structure
  • Figure 5.18: Fortinet Organisational structure of cyber security divisions
  • Figure 5.19: Fortinet Primary Market Competitors
  • Figure 5.20: General Dynamics Corporation's Organisational Structure
  • Figure 5.21: General Dynamics Corporation's Regional Emphasis / Focus (Region)
  • Figure 5.22: Hewlett Packard Company's Organisational Structure
  • Figure 5.23: IBM Organisational structure of cyber security divisions
  • Figure 5.24: General Dynamics Primary Market Competitors
  • Figure 5.25: Intel Organisational structure of cyber security divisions
  • Figure 5.26: General Dynamics Primary Market Competitors
  • Figure 5.27: Kaspersky Lab's Organisational Structure
  • Figure 5.28: L-3 Communications Organisational Structure
  • Figure 5.29: Leidos Organisational Structure
  • Figure 5.30: Leidos, Inc.'s Regional Emphasis / Focus (Region)
  • Figure 5.31: Lockheed Martin Organisational structure of cyber security divisions
  • Figure 5.32: Lockheed Martin Primary Market Competitors
  • Figure 5.33: Northrop Grumman Corporation's Organisational Structure
  • Figure 5.34: PWC Organisational structure of cyber security divisions
  • Figure 5.35: PWC Primary Market Competitors
  • Figure 5.36: Raytheon Organisational structure of cyber security divisions
  • Figure 5.37: Raytheon Primary Market Competitors
  • Figure 5.38: Sophos Cyber Security Offerings
  • Figure 5.39: Symantec Organisational structure of cyber security divisions
  • Figure 5.40: General Dynamics Primary Market Competitors
  • Figure 5.41: Thales Group's Organisational Structure
  • Figure 5.42: Thales Group's Regional Emphasis / Focus (Region)
  • Figure 5.43: Trend Micro Organisational Structure
  • Figure 5.44: Ultra Electronics Organisational Structure
  • Figure 5.45: Ultra Electronics Regional Emphasis / Focus (Region)
  • Figure 5.46: vArmour's Cyber Security Offerings
  • Figure 5.47: Voltage Security Data Security Offerings
  • Figure 5.48: Voltage Security Email Security Offerings
  • Figure 5.49: Watch Guard Data Loss Prevention and Automated Intelligence and Decision Making Framework
  • Figure 5.50: Webroot Firm's Products Diagram

Companies Listed

  • 3000 International inc.
  • 3Di Technologies LLC
  • Absolute Software Corporation
  • Accenture
  • Accuvant
  • ACS
  • ActivIdentity
  • AGNITiO
  • AgustaWestland
  • Airborne Technologies Inc (ATI)
  • Airbus Defence & Space
  • Airbus Group
  • Airbus Helicopters
  • Airbus Military
  • Akamai Technologies Inc.
  • Alenia Aeronautica
  • AlienVault
  • AMSEC LLC
  • Amundi
  • AppAssure
  • Apple
  • Applied Physical Science Corporation
  • Applied Visions Inc.
  • Arbor Networks
  • Argon ST
  • ARINC
  • Arkoon Network Security
  • Arxan Technology Inc.
  • Astrium
  • AT&T
  • Atalla Solutions
  • Authentify
  • AVAYA DEVCONNECT
  • AVG Technologies
  • Avira
  • BAE Applied Intelligence
  • BAE Systems
  • BAE Systems Applied Intelligence
  • BAE Systems Detica
  • BAE Systems Inc.
  • BAE Systems Intelligence & Security
  • BAE Systems PLC
  • Bain & Co.
  • Baird Capital
  • Baltimore Technologies
  • Barclays Bank
  • Barracuda Networks
  • Bay Dynamics
  • Bayshore Networks
  • BBN Technologies
  • Belden Inc
  • Benchmark Capital
  • Berkley Varitronics
  • Bit9
  • Bitdefender
  • Black Duck Software
  • Blackberry
  • BlackRock
  • Bluecoat Systems Inc.
  • Boeing Capital
  • Boeing Commercial Airplane (BCA)
  • Boeing Company
  • Boeing Cyber Engagement Center (CEC)
  • Boeing Defense Space & Security (BDS)
  • Boeing Engineering, Operations & Technology
  • Boeing Information Solutions
  • Boeing Shared Services Group.
  • Booz & Company
  • Booz Allen Hamilton Inc
  • Borderware Technologies
  • Boston Consulting Group
  • Box
  • Broadweb
  • Bromium
  • BT Global Services
  • BT Group plc
  • CACI International
  • Caisse des Dépôts et Consignations (CDC)
  • CANARIE
  • Canonical
  • Capta
  • Carl Zeiss
  • Cassidian
  • Cassidian Cyber Security
  • Cassidian Optronics
  • CDW
  • CDW Government LLC
  • Centrify Corporation
  • CertainSafe
  • CGI Group Inc.
  • Check Point Software Technologies Ltd.
  • Cisco
  • Cisco Security Business Group
  • Cisco Talos Security Intelligence & Research Group
  • Clarant Corporation
  • Clearswift
  • Clearwater Compliance
  • CM Equity Partners
  • Coalfire Systems inc.
  • Code42
  • CodeDX
  • Cognizant Technology Solutions
  • Cohort PLC
  • Computer Sciences Corporation (CSC)
  • Contact Solutions
  • Content Technologies
  • Contrast Security
  • Core Security
  • CoreLabs
  • Corero Network Security
  • Coverity Inc
  • Credant Technologies
  • Crossbeam
  • Crowdstrike
  • CSC Government Services
  • CYAN Networks
  • Cybera, Inc.
  • CyberArk
  • Cybereason
  • DB Networks
  • Deep Secure
  • Defense Systems Engineering & Support
  • Dell
  • Dell Federal Systems LP
  • Deloitte Consulting LLP
  • Deloitte Touche Tohmatsu Limited
  • Denali Holding Inc
  • Digital Shadows
  • Dimensional Research
  • DMI
  • Docomo Capital
  • DRC Systems
  • Dropbox
  • DRS Technical Services Inc.
  • DRS Technologies Inc.
  • Dtex Systems
  • Easy Solutions
  • EMC Corporation
  • Engility Holdings, Inc.
  • Ernst & Young (EY)
  • Eurocopter
  • Europacific Growth Fund
  • Eutelsat SA
  • Expedia
  • EZSource
  • FASTNET Corporation
  • Finmeccanica
  • Finmeccanica Defence
  • FireEye
  • Fondation Telecom
  • Forensic Technology WAI Inc.
  • Fortinet Inc.
  • Foundation Capital
  • FPT Software
  • Fruition Partners
  • F-Secure
  • Fujitsu
  • Gain Capital
  • Gemalto
  • Gemplus International
  • General Atlantic
  • General Dynamics Corporation
  • Genesys
  • Gentex Corporation
  • Getac
  • Global Technical Systems
  • Goldman Sachs
  • Gulfstream Aerospace
  • Haverjac Group
  • HCL Comnet
  • Hewlett Packard
  • High-Tech Bridge
  • Honeywell
  • Honeywell technical Services
  • HorthWorks
  • HP
  • Huawei
  • Hulu
  • Hyperwise
  • IBM
  • IBM Global Technology Services
  • IBM ISS
  • IBM Security
  • i-Canada Alliance
  • Idolody
  • Industrial Defender
  • Infosys
  • Insight Technology
  • Intel Corporation
  • Intel Security
  • intelligence AG
  • Interpath Communications
  • Intersense
  • IPC IP Converge Data Services
  • Iron Bow Technologies
  • IT Security
  • Iusacell
  • iWayAfrica
  • Jedda Systems Pty Ltd
  • Jerusalem Venture Partners (JVP)
  • JP Morgan Chase
  • Juniper
  • KACE Networks
  • Kaspersky Lab
  • Knowledge Consulting Group (KCG)
  • Kollmorgen Electro-Optical
  • KPMG
  • Kratos Defense
  • Kroll Security Group
  • L-3 Communications Holdings
  • Lacoon Mobile Security
  • Lancope
  • LegalShield
  • Leidos Engineering LLC
  • Leidos Inc.
  • Lenovo
  • Level 3
  • Linkful Software
  • Lockheed Martin Corporation
  • Lockheed Martin Cyber Security Alliance
  • Lockheed Martin Information Services & Global Solutions (ISGS)
  • Lockheed Martin Simulation, Training & Support
  • Louis Berger
  • Lyceum Capital
  • M5 Network Security Pty Ltd
  • Malwarebytes
  • ManTech International Corporation
  • McAfee
  • McKinsey
  • McLaren
  • McLaren Mercedes
  • Microdasys
  • Microsoft
  • Microtech Systems
  • Mobile Armor
  • MobileIron
  • Mojave Networks
  • Morgan Advanced Materials PLC
  • Morgan Stanley
  • MPC
  • Muru
  • Muthoot Fincorp Ltd
  • Mykonos Software
  • Narus
  • NASDAQ
  • Netasq
  • NET-TEL
  • NEXTEL Mexico
  • Nexusguard
  • NFCA
  • NICTA
  • Norse
  • Northrop Grumman Corporation
  • Northrop Grumman Information Technology, Inc.
  • Northrop Grumman IT Inc.
  • Novell
  • NSS labs
  • NTT
  • Nutanix
  • Open Kernel Labs
  • OpenDNS
  • OPSWAT
  • Optiv NTT
  • Oracle
  • Palantir Technologies
  • Palo Alto Networks Inc.
  • Panda Security
  • PCI solutions
  • Perot Systems Government Services Inc
  • PFU Systems
  • Pindrop Security
  • Ping Identity
  • Pivotal Software
  • Prestigio
  • Price Waterhouse Coopers
  • Privax
  • Proofpoint
  • PWC
  • Qantas Airways Ltd
  • Qantas Defence Services (QDS)
  • Qualcomm
  • Qualys
  • Quest Software
  • Radware
  • Raytheon Company
  • Raytheon Cybersecurity Solutions
  • Raytheon intelligence and information Systems
  • Raytheon SI Government Solutions Inc
  • Raytheon Websense
  • Resilient Systems
  • Ricardo
  • Roche
  • RSA
  • Safran S.A.
  • SAIC
  • Salesforce.com
  • Samsung Electronics
  • Samsung Ventures
  • Scaled Composites
  • Scientific Research Corporation
  • SecuEra
  • Seculert
  • SecureTech
  • SecureWorks
  • SELEX ES
  • Sera-Brynn LLC
  • Serco Inc.
  • Shell
  • SI Government Solutions Inc
  • Silver Lake Partners
  • Silversky
  • Singapore Telecommunications Limited (Singtel)
  • Sofradr
  • Solidware Technologies
  • Solutions Made Simple Inc.
  • SonicWall Inc
  • Sony
  • Sony Pictures Entertainment
  • Sophos
  • Sourcefire
  • SpeechPro
  • Splunk
  • SRA International Inc
  • Sun
  • Symantec Corporation
  • Synapsys
  • Synergy Systems
  • Sysec LTD
  • Systems Engineering & Assessment Limited
  • Target Corporation
  • Tasc Inc.
  • Tata Communications
  • Technica
  • Tektronix Communications
  • Telefonica
  • Telefónica Global Technology
  • Templar Shield Inc.
  • Thales Group
  • Thales Optronics Ltd.
  • Thales UK
  • ThalesRaytheonSystems
  • The Boeing Company
  • The Carlyle Group
  • The Chertoff Group
  • The Learning Company
  • The Louis Berger Group Inc.
  • Toshiba
  • Trend micro
  • Tripwire Inc.
  • TRL Technology
  • Trusteer
  • Trustwave Holdings
  • Ultimaco
  • Ultra Electronics
  • Ultra Electronics Holdings PLC
  • Unicorn Government Inc
  • Unicredit
  • Vangent Holding Corporation
  • Vangent, Inc.
  • vArmour
  • Veracode
  • Verio
  • Veritas Capital
  • Veritas Technologies Corporation
  • Verizon
  • Vertica Systems
  • VINCI Energies
  • VINCI Group
  • Visionix
  • Vista Equity Partners
  • VMware
  • VMWare Corporation
  • Vodafone
  • Voltage Security
  • W&D Holdings Limited
  • WANDL
  • Watch Guard
  • Watch Guard Live Security Alliance
  • WatchDox
  • Webrooot
  • Websense
  • WestGrid
  • Wildfire
  • Wind River Systems
  • Wipro
  • World Wide Technology Inc.
  • WorldTalk Corporation
  • Xerox

Organizations Mentioned in the Report

  • AHIMA (American Health Information Management Association)
  • Air Force Research Laboratory
  • Alabama A&M University
  • American Hospital Association
  • Bank of England
  • British Foreign and Commonwealth Office
  • Bundeswehr
  • Calgary Chamber of Commerce
  • CESG
  • Cloud Security Alliance (CSA)
  • CREST
  • DHS (Department of Homeland Security
  • DIA (Defense Intelligence Agency
  • DoD (U.S. Department of Defense)
  • Estonian Ministry of Defence
  • Estonian Ministry of Defense
  • Federal Bureau of Investigation
  • Florida International University in Miami
  • French Prime Minister's Office
  • General Services Administration
  • Georgia Tech
  • Harvard University
  • IAPP (International Association of Privacy Professionals)
  • information technology Association of Canada
  • Internet Engineering Task Force (IETF)
  • ISA Security Compliance Institute (ISCI)
  • ISO (International Organization for Standardization)
  • Metropolitan Police Service (MPS)
  • Minnesota Business Magazine
  • NASA
  • National Geographic
  • National Institute of Standards and Technology
  • NERC CIP Standards
  • New Zealand Department of Internal Affairs
  • NSA (National Security Agency)
  • Personnel Force Innovation
  • Princeton University
  • U.S. Space and Naval Warfare Systems Center
Back to Top