Product Code: TC 9102
The global endpoint protection platform (EPP) market size is projected to grow from USD 17.4 billion in 2024 to USD 29.0 billion by 2029 at a Compound Annual Growth Rate (CAGR) of 10.7% during the forecast period. The proliferation of remote work and BYOD policies has expanded the attack surface, increasing the demand for advanced EPP solutions. As cyberattacks are rising against remote employees and personal devices, organizations realize the need for adaptive endpoint security. EPP solutions offer centralized management, better visibility, and threat-hunting capabilities to keep sensitive data safe and business operational in the changing digital world.
Scope of the Report |
Years Considered for the Study | 2018-2029 |
Base Year | 2023 |
Forecast Period | 2024-2029 |
Units Considered | USD (Billion) |
Segments | Offering, Enforcement Point, Deployment Mode, Organization Size, Vertical, And Region |
Regions covered | North America, Europe, Asia Pacific, Middle East & Africa, and Latin America |
"By vertical, the healthcare segment accounts for the highest CAGR during the forecast period."
The healthcare vertical is proliferating in the EPP market due to the increasing adoption of technology and the need to safeguard patients' critical information. Healthcare organizations are deploying electronic health records (EHRs) and connected medical devices; however, these organizations are increasingly being targeted by cyber attackers. Hence, the need for robust endpoint protection becomes inevitable. Endpoint protection solutions defend against data breaches such as theft or illegal access to patient information and potential identity thefts or financial scams while complying with HIPAA rules. Some of the leading solutions in the EPP market are SentinelOne Singularity, CrowdStrike Falcon, Sophos Intercept X, and Bitdefender GravityZone. These solutions provides state-of-the-art capabilities for threat detection and response in real time against threats for an enhanced security posture and increased operational efficiency. With increased digitalization in healthcare, endpoint protection is critical to efficiently maintain the patient data security trust base and reduce the associated risks from emerging cyber threats.
"By Enforcement Point, the mobile devices segment accounts for a larger market share."
Mobile devices are dominating the EPP market since they are part of the integral workforce of today. This general adoption has been accelerated because of remote work and cloud computing. A survey by the US Bureau of Labor Statistics shows that many businesses are dependent on teleworking, which has increased reliance on mobile devices even more. The increased usage has also increased vulnerability gaps, making Apple and Android devices a lucrative target for cybercriminals. According to the 2023 Global Mobile Threat Report, there has been a sudden increase in device compromise, therefore making the implementation of robust EPP solutions critical. EPP platforms provide anti-malware and antivirus with data encryption to protect mobile devices by putting complete security measures in place. They include total security measures with centralized management and real-time monitoring, two critical elements for the effective detection and mitigation of mobile threats within very differing environments. With increasing operations becoming more mobile-centric, sophisticated EPP solutions will turn into crucial mechanisms to protect sensitive organizational and personal data.
Breakdown of primaries
The study contains insights from various industry experts, from component suppliers to Tier 1 companies and OEMs. The break-up of the primaries is as follows:
- By Company Type: Tier 1 - 35%, Tier 2 - 45%, and Tier 3 - 20%
- By Designation: C-level - 40% and Managers and Other Levels - 60%
- By Region: North America - 35%, Europe - 20%, Asia Pacific - 25%, Middle East & Africa - 15%, Latin America - 5%
Major vendors in the global endpoint protection platform market include as Microsoft (US), CrowdStrike (US), Trend Micro (Japan), Palo Alto Networks (US), SentinelOne (US), Check Point (US), Broadcom (US), VMware (US), Fortinet (US), Tanium (US), Cisco (US), BlackBerry (Canada), ESET (Slovak Republic), Sophos (England), Bitdefender (Romania), WithSecure (Finland), Cybereason (US), WatchGuard (US), AhnLab (South Korea), Trellix (US), Absolute (US), CoSoSys (US), Webroot (US), Xcitium (US), ThreatLocker (US), and Deep Instinct (US).
The study includes an in-depth competitive analysis of the key players in the endpoint protection platform market, their company profiles, recent developments, and key market strategies.
Research Coverage
The report segments the endpoint protection platform market and forecasts its size by Offering (Platform and Services (Professional Services and Managed Services), Enforcement Point (Workstations, Mobile Devices, Servers, POS Terminals, and Other Enforcement Points), Deployment Mode (On-Premise, Cloud, and Hybrid), Organization Size (Large Enterprises and SMEs), Vertical (BFSI, Healthcare, Government, IT & ITeS, Telecommunication, Manufacturing, Retail & E-Commerce, Energy & Utilities, Education, and Other Vertical), and Region (North America, Europe, Asia Pacific, Middle East and Africa, and Latin America).
The study also includes an in-depth competitive analysis of the market's key players, their company profiles, key observations related to product and business offerings, recent developments, and key market strategies.
Key Benefits of Buying the Report
The report will help the market leaders/new entrants with information on the closest approximations of the revenue numbers for the overall endpoint protection platform market and the subsegments. This report will help stakeholders understand the competitive landscape and gain more insights to position their businesses better and plan suitable go-to-market strategies. The report also helps stakeholders understand the market pulse and provides information on key market drivers, restraints, challenges, and opportunities.
The report provides insights on the following pointers:
- Analysis of key drivers (increasing cyber threats to spur demand for robust EPP solutions, surge in remote work, and proliferation of endpoints and BYOD), restraints (high implementation and maintenance cost and complexity and integration issue), opportunities (integration of EPP and EDR, rise in cloud-based EPP solutions, and adoption of advanced technologies like AI and ML in EPP), and challenges (lack of user awareness and training and shortage of cybersecurity skill)
- Product Development/Innovation: Detailed insights on upcoming technologies, research & development activities, and new product & service launches in the endpoint protection platform market.
- Market Development: Comprehensive information about lucrative markets - the report analyses the endpoint protection platform market across varied regions.
- Market Diversification: Exhaustive information about new products & services, untapped geographies, recent developments, and investments in the endpoint protection platform market.
- Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players Microsoft (US), CrowdStrike (US), Trend Micro (Japan), Palo Alto Networks (US), SentinelOne (US), among others, in the endpoint protection platform market strategies.
TABLE OF CONTENTS
1 INTRODUCTION
- 1.1 STUDY OBJECTIVES
- 1.2 MARKET DEFINITION
- 1.2.1 INCLUSIONS AND EXCLUSIONS
- 1.3 MARKET SCOPE
- 1.3.1 MARKET SEGMENTATION
- 1.3.2 YEARS CONSIDERED
- 1.4 CURRENCY CONSIDERED
- 1.5 STAKEHOLDERS
2 RESEARCH METHODOLOGY
- 2.1 RESEARCH DATA
- 2.1.1 SECONDARY DATA
- 2.1.2 PRIMARY DATA
- 2.1.2.1 Breakup of primaries
- 2.1.2.2 Key industry insights
- 2.2 MARKET BREAKUP AND DATA TRIANGULATION
- 2.3 MARKET SIZE ESTIMATION
- 2.3.1 TOP-DOWN APPROACH
- 2.3.2 BOTTOM-UP APPROACH
- 2.4 MARKET FORECAST
- 2.5 RESEARCH ASSUMPTIONS
- 2.6 STUDY LIMITATIONS
3 EXECUTIVE SUMMARY
4 PREMIUM INSIGHTS
- 4.1 ATTRACTIVE OPPORTUNITIES FOR KEY MARKET PLAYERS
- 4.2 ENDPOINT PROTECTION PLATFORM MARKET, BY OFFERING, 2024
- 4.3 ENDPOINT PROTECTION PLATFORM MARKET, BY ENFORCEMENT POINT, 2024
- 4.4 ENDPOINT PROTECTION PLATFORM MARKET, BY DEPLOYMENT MODE, 2024
- 4.5 ENDPOINT PROTECTION PLATFORM MARKET, BY ORGANIZATION SIZE, 2024
- 4.6 ENDPOINT PROTECTION PLATFORM MARKET, BY VERTICAL, 2024-2029
- 4.7 MARKET INVESTMENT SCENARIO
5 MARKET OVERVIEW AND INDUSTRY TRENDS
- 5.1 INTRODUCTION
- 5.2 MARKET DYNAMICS
- 5.2.1 DRIVERS
- 5.2.1.1 Increasing cyberthreats to spur demand for robust EPP solutions
- 5.2.1.2 Surge in remote work
- 5.2.1.3 Proliferation of endpoint and BYOD
- 5.2.2 RESTRAINTS
- 5.2.2.1 High implementation and maintenance cost
- 5.2.2.2 Complexity and integration issue
- 5.2.3 OPPORTUNITIES
- 5.2.3.1 Integration of EPP with EDR
- 5.2.3.2 Rise of cloud-based EPP solutions
- 5.2.3.3 Adoption of advanced technologies like AI and ML in EPP
- 5.2.4 CHALLENGES
- 5.2.4.1 Lack of user awareness and training
- 5.2.4.2 Shortage of cybersecurity skill
- 5.3 INTRODUCTION TO ARTIFICIAL INTELLIGENCE AND GENERATIVE AI
- 5.3.1 INTEGRATING AI IN CYBERSECURITY
- 5.3.2 USE CASES OF GENERATIVE AI IN CYBERSECURITY
- 5.3.3 BEST PRACTICES TO LEVERAGE AI FOR CYBERSECURITY
- 5.3.4 TREND OF GENERATIVE AI IN ENDPOINT SECURITY
- 5.3.4.1 Impact of Generative AI on EPP
- 5.3.4.2 Future of Generative AI in EPP
- 5.4 CASE STUDY ANALYSIS
- 5.4.1 CASE STUDY 1: WITHSECURE HELPED ZOLTEK ENHANCE GLOBAL ENDPOINT SECURITY AND PRODUCTIVITY
- 5.4.2 CASE STUDY 2: THREATSCAPE ENHANCED ITS CYBERSECURITY WITH SYMANTEC ENDPOINT SECURITY COMPLETE
- 5.4.3 CASE STUDY 3: CITY OF VENICE STRENGTHENED CYBERSECURITY WITH VMWARE CARBON BLACK CLOUD
- 5.4.4 CASE STUDY 4: SANGFOR TECHNOLOGIES BOLSTERED FRIEM'S CYBERSECURITY WITH ADVANCED SOLUTIONS
- 5.4.5 CASE STUDY 5: BLACKBERRY HELPED LEIBOLD & AMANN THWART CYBERATTACK WITH CYLANCEPROTECT
- 5.4.6 CASE STUDY 6: MICROSOFT AND TANIUM COLLABORATION STREAMLINED CYBERSECURITY FOR JONES LANG LASALLE
- 5.5 VALUE CHAIN ANALYSIS
- 5.5.1 RESEARCH AND DEVELOPMENT
- 5.5.2 PLANNING AND DESIGNING
- 5.5.3 SOLUTION AND SERVICE PROVIDERS
- 5.5.4 SYSTEM INTEGRATORS
- 5.5.5 RETAIL/DISTRIBUTION/VARS
- 5.5.6 END USERS
- 5.6 ECOSYSTEM
- 5.7 PORTER'S FIVE FORCES ANALYSIS
- 5.7.1 THREAT OF NEW ENTRANTS
- 5.7.2 THREAT OF SUBSTITUTES
- 5.7.3 BARGAINING POWER OF SUPPLIERS
- 5.7.4 BARGAINING POWER OF BUYERS
- 5.7.5 INTENSITY OF COMPETITIVE RIVALRY
- 5.8 PRICING ANALYSIS
- 5.8.1 AVERAGE SELLING PRICE TREND OF KEY PLAYERS, BY SOLUTION
- 5.8.2 INDICATIVE PRICING ANALYSIS, BY OFFERING
- 5.9 TECHNOLOGY ANALYSIS
- 5.9.1 KEY TECHNOLOGIES
- 5.9.1.1 Endpoint Detection and Response (EDR)
- 5.9.1.2 Artificial Intelligence and Machine Learning
- 5.9.2 COMPLEMENTARY TECHNOLOGIES
- 5.9.2.1 Sandboxing
- 5.9.2.2 Patch Management
- 5.9.3 ADJACENT TECHNOLOGIES
- 5.9.3.1 Unified Threat Management (UTM)
- 5.9.3.2 Zero Trust Network Access (ZTNA)
- 5.10 PATENT ANALYSIS
- 5.10.1 LIST OF TOP PATENTS IN ENDPOINT PROTECTION PLATFORM MARKET, 2022-2024
- 5.11 TRENDS AND DISRUPTIONS IMPACTING CUSTOMERS' BUSINESSES
- 5.12 KEY STAKEHOLDERS & BUYING CRITERIA
- 5.12.1 KEY STAKEHOLDERS IN BUYING PROCESS
- 5.12.2 BUYING CRITERIA
- 5.13 REGULATORY LANDSCAPE
- 5.13.1 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD
- 5.13.2 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT
- 5.13.3 GENERAL DATA PROTECTION REGULATION
- 5.13.4 ISO 27001
- 5.13.5 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS
- 5.14 KEY CONFERENCES & EVENTS IN 2024-2025
- 5.15 BUSINESS MODEL ANALYSIS
- 5.16 INVESTMENT AND FUNDING SCENARIO
6 ENDPOINT PROTECTION PLATFORM MARKET, BY OFFERING
- 6.1 INTRODUCTION
- 6.1.1 OFFERING: MARKET DRIVERS
- 6.2 PLATFORMS
- 6.2.1 COMPREHENSIVE SECURITY SOLUTIONS TO MITIGATE CYBER THREATS
- 6.2.2 NEXT-GENERATION ANTIVIRUS (NGAV)/ANTI-MALWARE
- 6.2.3 APPLICATION CONTROL/DEVICE CONTROL
- 6.2.4 WEB CONTENT FILTERING
- 6.2.5 FIREWALLS
- 6.2.6 INTRUSION DETECTION/PREVENTION SYSTEMS (IDPS)
- 6.2.7 INTEGRATED EDR FUNCTIONALITY
- 6.2.8 OTHERS
- 6.3 SERVICES
- 6.3.1 UTILIZING EPP SERVICES FOR ENDPOINT DEFENSE TO DRIVE MARKET GROWTH
- 6.3.2 PROFESSIONAL SERVICES
- 6.3.3 MANAGED SERVICES
7 ENDPOINT PROTECTION PLATFORM MARKET, BY ENFORCEMENT POINT
- 7.1 INTRODUCTION
- 7.1.1 ENFORCEMENT POINT: MARKET DRIVERS
- 7.2 WORKSTATIONS
- 7.2.1 ENHANCING WORKSTATION SECURITY: LEVERAGING BEHAVIORAL ANALYTICS AND MACHINE LEARNING
- 7.3 MOBILE DEVICES
- 7.3.1 COMPREHENSIVE EPPS FOR IOS AND ANDROID DEVICES TO DRIVE MARKET GROWTH
- 7.4 SERVERS
- 7.4.1 ADDRESSING SERVER THREATS WITH ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
- 7.5 POINT OF SALE TERMINALS
- 7.5.1 EMPOWERING POS SECURITY WITH EPP INNOVATIONS TO DRIVE MARKET GROWTH
- 7.6 OTHER ENFORCEMENT POINTS
8 ENDPOINT PROTECTION PLATFORM MARKET, BY DEPLOYMENT MODE
- 8.1 INTRODUCTION
- 8.1.1 DEPLOYMENT MODE: MARKET DRIVERS
- 8.2 ON-PREMISES
- 8.2.1 ENSURING COMPLIANCE AND CONTROL WITH ON-PREMISES ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
- 8.3 CLOUD
- 8.3.1 SCALABILITY AND EFFICIENCY TO DRIVE CLOUD-BASED EPP ADOPTION
- 8.4 HYBRID
- 8.4.1 BALANCING SECURITY AND SCALABILITY WITH HYBRID ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
9 ENDPOINT PROTECTION PLATFORM MARKET, BY ORGANIZATION SIZE
- 9.1 INTRODUCTION
- 9.1.1 ORGANIZATION SIZE: MARKET DRIVERS
- 9.2 LARGE ENTERPRISES
- 9.2.1 NEED TO MAINTAIN OPERATIONAL INTEGRITY AND REGULATORY COMPLIANCE TO DRIVE EPP GROWTH IN LARGE ENTERPRISES
- 9.3 SMES
- 9.3.1 INITIATIVES TAKEN BY GOVERNMENTS TO DRIVE EPP GROWTH IN SMES
10 ENDPOINT PROTECTION PLATFORM MARKET, BY VERTICAL
- 10.1 INTRODUCTION
- 10.1.1 VERTICAL: MARKET DRIVERS
- 10.2 BFSI
- 10.2.1 INCREASING CYBERATTACKS TO DRIVE NEED FOR INTEGRATED SOLUTIONS
- 10.3 HEALTHCARE
- 10.3.1 NEED TO SAFEGUARD SENSITIVE PATIENT DATA TO DRIVE SURGE IN HEALTHCARE ENDPOINT PROTECTION
- 10.4 GOVERNMENT
- 10.4.1 NEED TO FORTIFY GOVERNMENT NETWORKS TO DRIVE SURGE IN EPP
- 10.5 IT & ITES
- 10.5.1 DEMAND TO MAINTAIN OPERATIONAL CONTINUITY TO SPUR EPP GROWTH
- 10.6 TELECOMMUNICATIONS
- 10.6.1 LEVERAGING EPP SOLUTIONS TO ENSURE UNINTERRUPTED SERVICE WILL DRIVE MARKET GROWTH
- 10.7 MANUFACTURING
- 10.7.1 ENHANCING MANUFACTURING SECURITY WITH ADVANCED ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
- 10.8 RETAIL & E-COMMERCE
- 10.8.1 PROLIFERATION OF ONLINE TRANSACTIONS PLATFORM TO SPUR DEMAND FOR EPPS
- 10.9 ENERGY & UTILITIES
- 10.9.1 ADOPTION OF ADVANCED TECHNOLOGIES AND MEETING REGULATORY COMPLIANCE TO DRIVE DEMAND FOR EPPS
- 10.10 EDUCATION
- 10.10.1 EPPS TO SAFEGUARD EDUCATIONAL INSTITUTIONS WITH ADVANCED ENDPOINT PROTECTION
- 10.11 OTHER VERTICALS
11 ENDPOINT PROTECTION PLATFORM MARKET, BY REGION
- 11.1 INTRODUCTION
- 11.2 NORTH AMERICA
- 11.2.1 NORTH AMERICA: MARKET DRIVERS
- 11.2.2 US
- 11.2.2.1 Investments and partnerships in US to propel EPP advancements
- 11.2.3 CANADA
- 11.2.3.1 University of Toronto to enhance security with next-gen EPP deployment
- 11.3 EUROPE
- 11.3.1 EUROPE: MARKET DRIVERS
- 11.3.2 UK
- 11.3.2.1 Increase in cyberattacks to drive need for endpoint protection platforms
- 11.3.3 GERMANY
- 11.3.3.1 Cybersecurity innovations in Germany to boost EPP growth
- 11.3.4 FRANCE
- 11.3.4.1 Digital expansion to strengthen endpoint protection in France
- 11.3.5 ITALY
- 11.3.5.1 Strategic initiatives by companies to enhance endpoint protection in Italy
- 11.3.6 REST OF EUROPE
- 11.4 ASIA PACIFIC
- 11.4.1 ASIA PACIFIC: MARKET DRIVERS
- 11.4.2 CHINA
- 11.4.2.1 Increasing internet penetration in China to drive demand for endpoint protection platforms
- 11.4.3 JAPAN
- 11.4.3.1 Strategic collaborations by companies in Japan to drive EPP market growth
- 11.4.4 INDIA
- 11.4.4.1 Rapid digitalization transformation in India to spur demand for EPP
- 11.4.5 SINGAPORE
- 11.4.5.1 Remote work trends boosting EPP adoption in Singapore
- 11.4.6 REST OF ASIA PACIFIC
- 11.5 MIDDLE EAST & AFRICA
- 11.5.1 MIDDLE EAST & AFRICA: MARKET DRIVERS
- 11.5.2 GULF COOPERATION COUNCIL (GCC)
- 11.5.2.1 KSA
- 11.5.2.1.1 Transformative cybersecurity initiatives in KSA to drive EPP growth
- 11.5.2.2 UAE
- 11.5.2.2.1 Cybersecurity initiatives to propel UAE's endpoint protection platform market growth
- 11.5.2.3 Rest of GCC countries
- 11.5.3 SOUTH AFRICA
- 11.5.3.1 Local expertise and comprehensive solutions to drive EPP market growth in South Africa
- 11.5.4 REST OF MIDDLE EAST & AFRICA
- 11.6 LATIN AMERICA
- 11.6.1 LATIN AMERICA: MARKET DRIVERS
- 11.6.2 BRAZIL
- 11.6.2.1 Acronis and Xcitium to fortify EPP landscape in Brazil
- 11.6.3 MEXICO
- 11.6.3.1 AWS's strategic investment to create opportunity for EPP advancements in Mexico
- 11.6.4 REST OF LATIN AMERICA
12 COMPETITIVE LANDSCAPE
- 12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN
- 12.2 REVENUE ANALYSIS
- 12.3 MARKET SHARE ANALYSIS
- 12.4 BRAND COMPARISON
- 12.5 COMPANY VALUATION AND FINANCIAL METRICS
- 12.5.1 COMPANY VALUATION
- 12.5.2 FINANCIAL METRICS USING EV/EBITDA
- 12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023
- 12.6.1 STARS
- 12.6.2 EMERGING LEADERS
- 12.6.3 PERVASIVE PLAYERS
- 12.6.4 PARTICIPANTS
- 12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2024
- 12.6.5.1 Company footprint
- 12.6.5.2 Regional footprint
- 12.6.5.3 Offering footprint
- 12.6.5.4 Deployment mode footprint
- 12.6.5.5 Vertical footprint
- 12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023
- 12.7.1 PROGRESSIVE COMPANIES
- 12.7.2 RESPONSIVE COMPANIES
- 12.7.3 DYNAMIC COMPANIES
- 12.7.4 STARTING BLOCKS
- 12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023
- 12.7.5.1 Detailed list of key startups/SMEs
- 12.7.5.2 Competitive benchmarking of key startups/SMEs
- 12.8 COMPETITIVE SCENARIO
- 12.8.1 PRODUCT LAUNCHES
- 12.8.2 DEALS
13 COMPANY PROFILES
- 13.1 KEY PLAYERS
- 13.1.1 MICROSOFT
- 13.1.1.1 Business overview
- 13.1.1.2 Products/Solutions/Services offered
- 13.1.1.3 MnM view
- 13.1.1.3.1 Key strengths
- 13.1.1.3.2 Strategic choices
- 13.1.1.3.3 Weaknesses and competitive threats
- 13.1.2 CROWDSTRIKE
- 13.1.2.1 Business overview
- 13.1.2.2 Products/Solutions/Services offered
- 13.1.2.3 Recent developments
- 13.1.2.4 MnM view
- 13.1.2.4.1 Key strengths
- 13.1.2.4.2 Strategic choices
- 13.1.2.4.3 Weaknesses and competitive threats
- 13.1.3 TREND MICRO
- 13.1.3.1 Business overview
- 13.1.3.2 Products/Solutions/Services offered
- 13.1.3.3 Recent developments
- 13.1.3.4 MnM view
- 13.1.3.4.1 Key strengths
- 13.1.3.4.2 Strategic choices
- 13.1.3.4.3 Weaknesses and competitive threats
- 13.1.4 PALO ALTO NETWORKS
- 13.1.4.1 Business overview
- 13.1.4.2 Products/Solutions/Services offered
- 13.1.4.3 Recent developments
- 13.1.4.4 MnM view
- 13.1.4.4.1 Key strengths
- 13.1.4.4.2 Strategic choices
- 13.1.4.4.3 Weaknesses and competitive threats
- 13.1.5 SENTINELONE
- 13.1.5.1 Business overview
- 13.1.5.2 Products/Solutions/Services offered
- 13.1.5.3 Recent developments
- 13.1.5.4 MnM view
- 13.1.5.4.1 Key strengths
- 13.1.5.4.2 Strategic choices
- 13.1.5.4.3 Weaknesses and competitive threats
- 13.1.6 CHECK POINT
- 13.1.6.1 Business overview
- 13.1.6.2 Products/Solutions/Services offered
- 13.1.6.3 Recent developments
- 13.1.7 BROADCOM
- 13.1.7.1 Business overview
- 13.1.7.2 Products/Solutions/Services offered
- 13.1.8 VMWARE
- 13.1.8.1 Business overview
- 13.1.8.2 Products/Solutions/Services offered
- 13.1.9 FORTINET
- 13.1.9.1 Business overview
- 13.1.9.2 Products/Solutions/Services offered
- 13.1.10 TANIUM
- 13.1.10.1 Business overview
- 13.1.10.2 Products/Solutions/Services offered
- 13.1.10.3 Recent developments
- 13.1.11 CISCO
- 13.1.11.1 Business overview
- 13.1.11.2 Products/Solutions/Services offered
- 13.1.11.3 Recent developments
- 13.1.12 BLACKBERRY
- 13.1.12.1 Business overview
- 13.1.12.2 Products/Solutions/Services offered
- 13.1.12.3 Recent developments
- 13.1.13 ESET
- 13.1.13.1 Business overview
- 13.1.13.2 Products/Solutions/Services offered
- 13.1.13.3 Recent developments
- 13.1.14 SOPHOS
- 13.1.14.1 Business overview
- 13.1.14.2 Products/Solutions/Services offered
- 13.1.14.3 Recent developments
- 13.1.15 BITDEFENDER
- 13.1.15.1 Business overview
- 13.1.15.2 Products/Solutions/Services offered
- 13.1.15.3 Recent developments
- 13.1.16 WITHSECURE
- 13.1.17 CYBEREASON
- 13.1.18 WATCHGUARD
- 13.1.19 AHNLAB
- 13.1.20 TRELLIX
- 13.2 OTHER PLAYERS
- 13.2.1 ABSOLUTE
- 13.2.2 COSOSYS
- 13.2.3 WEBROOT
- 13.2.4 XCITIUM
- 13.2.5 THREATLOCKER
- 13.2.6 DEEP INSTINCT
14 ADJACENT AND APPENDIX
- 14.1 INTRODUCTION
- 14.2 LIMITATIONS
- 14.2.1 CYBERSECURITY MARKET
- 14.2.2 IOT SECURITY MARKET
- 14.3 DISCUSSION GUIDE
- 14.4 KNOWLEDGESTORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL
- 14.5 CUSTOMIZATION OPTIONS
- 14.6 RELATED REPORTS
- 14.7 AUTHOR DETAILS