お知らせ :東京証券取引所JASDAQスタンダード市場への新規上場に関するお知らせ
株式会社グローバルインフォメーション
デフォルト表紙
市場調査レポート
商品コード
1004590

サイバーセキュリティ-世界市場の見通し(2020~2028年)

Cyber Security - Global Market Outlook (2020-2028)

出版日: | 発行: Stratistics Market Research Consulting | ページ情報: 英文 150+ Pages | 納期: 2-3営業日

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=110.81円
サイバーセキュリティ-世界市場の見通し(2020~2028年)
出版日: 2021年04月01日
発行: Stratistics Market Research Consulting
ページ情報: 英文 150+ Pages
納期: 2-3営業日
  • 全表示
  • 概要
  • 図表
  • 目次
概要

世界のサイバーセキュリティの市場規模は2020年に1,430億9千万米ドルとなりました。

同市場は、予測期間中に16.2%のCAGRで拡大し、2028年までに4,756億2千万米ドルに達すると予測されています。クラウドベースのサイバーセキュリティソリューションに対する需要の高まり、企業間のマルウェアやフィッシングの脅威の増加、強力な認証方法の必要性の高まりが、市場の成長を推進する主な要因となっています。ただし、非構造化データの保存に関する課題、絶えず変化するサイバーセキュリティ業界の規制や基準、およびデバイスセキュリティの複雑さなどが、市場の成長を妨げています。

当レポートでは、サイバーセキュリティ市場について調査し、市場の概要とともに、コンポーネント別、ソリューション別、デプロイタイプ別、ユーザータイプ別、サービス別、セキュリティ別、ユースケース別、エンドユーザー別、地域別の動向、および市場に参入する企業のプロファイルなどを提供しています。

目次

第1章 エグゼクティブサマリー

第2章 序文

第3章 市場動向分析

  • イントロダクション
  • 促進要因
  • 抑制要因
  • 市場機会
  • 脅威
  • エンドユーザー分析
  • 新興市場
  • Covid-19の影響

第4章 ポーターズファイブフォース分析

第5章 世界のサイバーセキュリティ市場:コンポーネント別

  • イントロダクション
  • ハードウェア
  • ソフトウェア

第6章 世界のサイバーセキュリティ市場:ソリューション別

  • イントロダクション
  • 侵入検知システム/侵入防止システム
    • 無線
    • ネットワークベース
    • ホストベース
  • 脅威インテリジェンス
    • セキュリティと脆弱性の管理
    • リスクとコンプライアンスの管理
    • IDおよびアクセス管理
    • その他
  • 次世代ファイアウォール
  • ウイルス対策/ Antimalware
  • Webフィルタリング
  • 分散型サービス拒否軽減保護アプライアンス
  • 災害からの回復
  • 暗号化
  • データ損失防止
    • ネットワークデータ損失防止
    • ストレージ/データセンターのデータ損失防止
    • エンドポイントデータ損失防止
  • その他
    • アプリケーションホワイトリスト
    • パッチ管理

第7章 世界のサイバーセキュリティ市場:デプロイタイプ別

  • イントロダクション
  • クラウド
  • オンプレミス

第8章 世界のサイバーセキュリティ市場:ユーザータイプ別

  • イントロダクション
  • 大企業
  • 中小企業

第9章 世界のサイバーセキュリティ市場:サービス別

  • イントロダクション
  • プロフェッショナルサービス
    • 設計と統合
    • リスクと脅威の評価
    • コンサルティング
    • トレーニングと教育
    • サポートとメンテナンス
  • マネージドサービス
  • 統合サービス

第10章 世界のサイバーセキュリティ市場:セキュリティ別

  • イントロダクション
  • コンテンツセキュリティ
  • データセキュリティとプライバシーサービス
  • インフラストラクチャ保護
    • クラウドセキュリティ
    • Eメール/ Webゲートウェイ
    • 終点
  • 通信網
    • インターネットサービスプロバイダー機器
    • 仮想プライベートネットワーク(VPN)
    • 統合脅威管理(UTM)

企業

  • 産業用制御システム(ICS)のセキュリティ
  • モノのインターネット(IoT)セキュリティ
  • アプリケーションセキュリティ
  • Webセキュリティ

第11章 世界のサイバーセキュリティ市場:ユースケース別

  • イントロダクション
  • セキュリティ監視
  • ネットワークトラフィック分析
  • 脅威ハンティング
  • インシデント対応
  • データの漏えい

第12章 世界のサイバーセキュリティ市場:エンドユーザー別

  • イントロダクション
  • 自動車
  • 銀行、金融サービスおよび保険(BFSI)
  • 政府と防衛
  • 教育
  • エネルギーとユーティリティ
  • ヘルスケア
  • 情報技術(IT)とテレコム
  • ディスクリート製造
  • メディア&エンターテインメント
  • 公的機関
  • プロセス製造
  • 小売り
  • 輸送とロジスティクス
  • 投資サービスと保険
  • 航空宇宙

第13章 世界のサイバーセキュリティ市場:地域別

  • イントロダクション
  • 北米
    • 米国
    • カナダ
    • メキシコ
  • 欧州
    • ドイツ
    • 英国
    • イタリア
    • フランス
    • スペイン
    • その他
  • アジア太平洋
    • 日本
    • 中国
    • インド
    • オーストラリア
    • ニュージーランド
    • 韓国
    • その他
  • 南米
    • アルゼンチン
    • ブラジル
    • チリ
    • その他
  • 中東とアフリカ
    • サウジアラビア
    • アラブ首長国連邦
    • カタール
    • 南アフリカ
    • その他

第14章 主な発展

  • 契約、パートナーシップ、コラボレーション、ジョイントベンチャー
  • 買収と合併
  • 新製品の発売
  • 拡張
  • その他の重要な戦略

第15章 企業プロファイル

  • Accenture
  • Broadcom
  • Capgemini
  • Check Point Software Technology Ltd.
  • Cisco Systems, Inc.
  • Cognizant
  • F5, Inc.
  • Fireeye, Inc.
  • HCL Technologies Limited
  • IBM Corporation
  • Infosys Limited
  • L&T Technology Services Limited
  • McAfee, LLC
  • Palo Alto Networks, Inc.
  • Pricewaterhousecoopers International Limited
  • Tata Consultancy Services Limited
  • Tech Mahindra Limited
  • Trend Micro Incorporated
  • Wipro Limited
図表

List of Tables

  • Table 1 Global Cyber Security Market Outlook, By Region (2019-2028) ($MN)
  • Table 2 Global Cyber Security Market Outlook, By Component (2019-2028) ($MN)
  • Table 3 Global Cyber Security Market Outlook, By Hardware (2019-2028) ($MN)
  • Table 4 Global Cyber Security Market Outlook, By Software (2019-2028) ($MN)
  • Table 5 Global Cyber Security Market Outlook, By Solution (2019-2028) ($MN)
  • Table 6 Global Cyber Security Market Outlook, By Intrusion Detection Systems/Intrusion Prevention Systems (2019-2028) ($MN)
  • Table 7 Global Cyber Security Market Outlook, By Wireless (2019-2028) ($MN)
  • Table 8 Global Cyber Security Market Outlook, By Network -Based (2019-2028) ($MN)
  • Table 9 Global Cyber Security Market Outlook, By Host-Based (2019-2028) ($MN)
  • Table 10 Global Cyber Security Market Outlook, By Threat Intelligence (2019-2028) ($MN)
  • Table 11 Global Cyber Security Market Outlook, By Security and Vulnerability Management (2019-2028) ($MN)
  • Table 12 Global Cyber Security Market Outlook, By Risk and Compliance Management (2019-2028) ($MN)
  • Table 13 Global Cyber Security Market Outlook, By Identity and Access Management (2019-2028) ($MN)
  • Table 14 Global Cyber Security Market Outlook, By Other Threat Intelligence Solutions (2019-2028) ($MN)
  • Table 15 Global Cyber Security Market Outlook, By Next Generation Firewall (2019-2028) ($MN)
  • Table 16 Global Cyber Security Market Outlook, By Antivirus/Antimalware (2019-2028) ($MN)
  • Table 17 Global Cyber Security Market Outlook, By Web Filtering (2019-2028) ($MN)
  • Table 18 Global Cyber Security Market Outlook, By Distributed Denial Of Service Mitigation Protection Appliance (2019-2028) ($MN)
  • Table 19 Global Cyber Security Market Outlook, By Disaster Recovery (2019-2028) ($MN)
  • Table 20 Global Cyber Security Market Outlook, By Encryption (2019-2028) ($MN)
  • Table 21 Global Cyber Security Market Outlook, By Data Loss Prevention (2019-2028) ($MN)
  • Table 22 Global Cyber Security Market Outlook, By Network Data Loss Prevention (2019-2028) ($MN)
  • Table 23 Global Cyber Security Market Outlook, By Storage/ Data Center Data Loss Prevention (2019-2028) ($MN)
  • Table 24 Global Cyber Security Market Outlook, By Endpoint Data Loss Prevention (2019-2028) ($MN)
  • Table 25 Global Cyber Security Market Outlook, By Other Solutions (2019-2028) ($MN)
  • Table 26 Global Cyber Security Market Outlook, By Application Whitelisting (2019-2028) ($MN)
  • Table 27 Global Cyber Security Market Outlook, By Patch Management (2019-2028) ($MN)
  • Table 28 Global Cyber Security Market Outlook, By Deployment Type (2019-2028) ($MN)
  • Table 29 Global Cyber Security Market Outlook, By Cloud (2019-2028) ($MN)
  • Table 30 Global Cyber Security Market Outlook, By On-premises (2019-2028) ($MN)
  • Table 31 Global Cyber Security Market Outlook, By User Type (2019-2028) ($MN)
  • Table 32 Global Cyber Security Market Outlook, By Large Enterprises (2019-2028) ($MN)
  • Table 33 Global Cyber Security Market Outlook, By Small & Medium Enterprises (2019-2028) ($MN)
  • Table 34 Global Cyber Security Market Outlook, By Service (2019-2028) ($MN)
  • Table 35 Global Cyber Security Market Outlook, By Professional Services (2019-2028) ($MN)
  • Table 36 Global Cyber Security Market Outlook, By Design and Integration (2019-2028) ($MN)
  • Table 37 Global Cyber Security Market Outlook, By Risk and Threat Assessment (2019-2028) ($MN)
  • Table 38 Global Cyber Security Market Outlook, By Consulting (2019-2028) ($MN)
  • Table 39 Global Cyber Security Market Outlook, By Training and Education (2019-2028) ($MN)
  • Table 40 Global Cyber Security Market Outlook, By Support and Maintenance (2019-2028) ($MN)
  • Table 41 Global Cyber Security Market Outlook, By Managed Services (2019-2028) ($MN)
  • Table 42 Global Cyber Security Market Outlook, By Integration Services (2019-2028) ($MN)
  • Table 43 Global Cyber Security Market Outlook, By Security (2019-2028) ($MN)
  • Table 44 Global Cyber Security Market Outlook, By Content Security (2019-2028) ($MN)
  • Table 45 Global Cyber Security Market Outlook, By Data Security & Privacy Service (2019-2028) ($MN)
  • Table 46 Global Cyber Security Market Outlook, By Infrastructure Protection (2019-2028) ($MN)
  • Table 47 Global Cyber Security Market Outlook, By Cloud Security (2019-2028) ($MN)
  • Table 48 Global Cyber Security Market Outlook, By Email/Web Gateway (2019-2028) ($MN)
  • Table 49 Global Cyber Security Market Outlook, By Endpoint (2019-2028) ($MN)
  • Table 50 Global Cyber Security Market Outlook, By Network (2019-2028) ($MN)
  • Table 51 Global Cyber Security Market Outlook, By Internet Service Provider Equipment (2019-2028) ($MN)
  • Table 52 Global Cyber Security Market Outlook, By Virtual Private Network (VPN) (2019-2028) ($MN)
  • Table 53 Global Cyber Security Market Outlook, By Unified Threat Management (UTM) (2019-2028) ($MN)
  • Table 54 Global Cyber Security Market Outlook, By Enterprise (2019-2028) ($MN)
  • Table 55 Global Cyber Security Market Outlook, By Industrial Control System (ICS) Security (2019-2028) ($MN)
  • Table 56 Global Cyber Security Market Outlook, By Internet of Things (IoT) Security (2019-2028) ($MN)
  • Table 57 Global Cyber Security Market Outlook, By Application Security (2019-2028) ($MN)
  • Table 58 Global Cyber Security Market Outlook, By Web Security (2019-2028) ($MN)
  • Table 59 Global Cyber Security Market Outlook, By Use Case (2019-2028) ($MN)
  • Table 60 Global Cyber Security Market Outlook, By Security Monitoring (2019-2028) ($MN)
  • Table 61 Global Cyber Security Market Outlook, By Network Traffic Analysis (2019-2028) ($MN)
  • Table 62 Global Cyber Security Market Outlook, By Threat Hunting (2019-2028) ($MN)
  • Table 63 Global Cyber Security Market Outlook, By Incident Response (2019-2028) ($MN)
  • Table 64 Global Cyber Security Market Outlook, By Data Exfiltration (2019-2028) ($MN)
  • Table 65 Global Cyber Security Market Outlook, By End User (2019-2028) ($MN)
  • Table 66 Global Cyber Security Market Outlook, By Automotive (2019-2028) ($MN)
  • Table 67 Global Cyber Security Market Outlook, By Banking, Financial Services and Insurance (BFSI) (2019-2028) ($MN)
  • Table 68 Global Cyber Security Market Outlook, By Government and Defense (2019-2028) ($MN)
  • Table 69 Global Cyber Security Market Outlook, By Education (2019-2028) ($MN)
  • Table 70 Global Cyber Security Market Outlook, By Energy & Utilities (2019-2028) ($MN)
  • Table 71 Global Cyber Security Market Outlook, By Healthcare (2019-2028) ($MN)
  • Table 72 Global Cyber Security Market Outlook, By Information Technology (IT) & Telecom (2019-2028) ($MN)
  • Table 73 Global Cyber Security Market Outlook, By Discrete Manufacturing (2019-2028) ($MN)
  • Table 74 Global Cyber Security Market Outlook, By Media & Entertainment (2019-2028) ($MN)
  • Table 75 Global Cyber Security Market Outlook, By Public Sector (2019-2028) ($MN)
  • Table 76 Global Cyber Security Market Outlook, By Process Manufacturing (2019-2028) ($MN)
  • Table 77 Global Cyber Security Market Outlook, By Retail (2019-2028) ($MN)
  • Table 78 Global Cyber Security Market Outlook, By Transportation & Logistics (2019-2028) ($MN)
  • Table 79 Global Cyber Security Market Outlook, By Investment Services & Insurance (2019-2028) ($MN)
  • Table 80 Global Cyber Security Market Outlook, By Aerospace (2019-2028) ($MN)

Note: Tables for North America, Europe, APAC, South America, and Middle East & Africa Regions are also represented in the same manner as above.

目次

According to Stratistics MRC, the Global Cyber Security Market is accounted for $143.09 billion in 2020 and is expected to reach $475.62 billion by 2028 growing at a CAGR of 16.2% during the forecast period. Rise in demand for cloud-based cyber security solutions, increasing malware and phishing threats among enterprises, and growing need for strong authentication methods are the major factors propelling the market growth. However, challenges associated with storage of unstructured data and constantly changing cyber security industry regulations, standards, and complexities of device security are hampering the market growth.

Cyber security, also referred to as IT security, emphasizes on safeguarding computers, programs, networks, and data from unlicensed or spontaneous access. It comprises network security, application security, endpoint security, identity management, data security, cloud security, and infrastructure security. As cyber threats have increased at an alarming rate, security solutions have been gaining traction, globally. Solutions such as antivirus software and firewalls have grown in complexity and proven to be effective at preventing threats and attacks, such as malware, Trojans, and phishing. The success of these solutions has led to rapid development of the cyber security industry, as implementing technical defense has become a standard best practice in every enterprise.

Based on end user, the healthcare segment is going to have a lucrative growth during the forecast period owing to the rampant growth of cybercrime activities in healthcare in recent years. Cybercrime activities in healthcare facilities involve insider threats, data breaches, ransomware, advanced malware attacks, and distributed denial of service attacks, which may compromise the integrity of systems and disrupt patient care services. Moreover, the creation of misleading websites and phishing activities to obtain sensitive information could also increase investments in cyber preparedness measures. Besides, the growing adoption of cloud applications, connected devices, digital solutions, and open-source information for creating awareness among healthcare providers, payers, and patients also emphasizes the need for security solutions to reduce the risk of vulnerabilities.

By geography, Asia Pacific is going to have a lucrative growth during the forecast period due to the rising digitalization era at a rapid pace across the region. Enterprises from industries, such as telecom, energy, finance, and technology, in the region are targets of advanced persistent threat actors. Most attacks are prevalent amongst Southeast Asian nations. Governments and enterprises are involved in framing cyber defense strategies for future cyber defense preparedness. Some of the initiatives include strengthening critical infrastructures and developing a strong cyber defense ecosystem comprising skilled professionals. These efforts toward securing IT networks, critical infrastructures, and endpoints are anticipated to contribute to the growth of the regional market over the forecast period.

Some of the key players profiled in the Cyber Security Market include Accenture, Broadcom, Capgemini, Check Point Software Technology Ltd., Cisco Systems, Inc., Cognizant, F5, Inc., Fireeye, Inc., HCL Technologies Limited, IBM Corporation, Infosys Limited, L&T Technology Services Limited, McAfee, LLC, Palo Alto Networks, Inc, Pricewaterhousecoopers International Limited,Tata Consultancy Services Limited, Tech Mahindra Limited, Trend Micro Incorporated, and Wipro Limited.

Components Covered:

  • Hardware
  • Software

Solutions Covered:

  • Intrusion Detection Systems/Intrusion Prevention Systems
  • Threat Intelligence
  • Next Generation Firewall
  • Antivirus/Antimalware
  • Web Filtering
  • Distributed Denial Of Service Mitigation Protection Appliance
  • Disaster Recovery
  • Encryption
  • Data Loss Prevention
  • Other Solutions

Deployment Types Covered:

  • Cloud
  • On-premises

User Types Covered:

  • Large Enterprises
  • Small & Medium Enterprises

Services Covered:

  • Professional Services
  • Managed Services
  • Integration Services

Securities Covered:

  • Content Security
  • Data Security & Privacy Service
  • Infrastructure Protection
  • Enterprise
  • Industrial Control System (ICS) Security
  • Internet of Things (IoT) Security
  • Application Security
  • Web Security

Use Cases Covered:

  • Security Monitoring
  • Network Traffic Analysis
  • Threat Hunting
  • Incident Response
  • Data Exfiltration

End Users Covered:

  • Automotive
  • Banking, Financial Services and Insurance (BFSI)
  • Government and Defense
  • Education
  • Energy & Utilities
  • Healthcare
  • Information Technology (IT) & Telecom
  • Discrete Manufacturing
  • Media & Entertainment
  • Public Sector
  • Process Manufacturing
  • Retail
  • Transportation & Logistics
  • Investment Services & Insurance
  • Aerospace

Regions Covered:

  • North America
    • US
    • Canada
    • Mexico
  • Europe
    • Germany
    • UK
    • Italy
    • France
    • Spain
    • Rest of Europe
  • Asia Pacific
    • Japan
    • China
    • India
    • Australia
    • New Zealand
    • South Korea
    • Rest of Asia Pacific
  • South America
    • Argentina
    • Brazil
    • Chile
    • Rest of South America
  • Middle East & Africa
    • Saudi Arabia
    • UAE
    • Qatar
    • South Africa
    • Rest of Middle East & Africa

What our report offers:

  • Market share assessments for the regional and country-level segments
  • Strategic recommendations for the new entrants
  • Covers Market data for the years 2019, 2020, 2021, 2025, and 2028
  • Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations)
  • Strategic recommendations in key business segments based on the market estimations
  • Competitive landscaping mapping the key common trends
  • Company profiling with detailed strategies, financials, and recent developments
  • Supply chain trends mapping the latest technological advancements

Free Customization Offerings:

All the customers of this report will be entitled to receive one of the following free customization options:

  • Company Profiling
    • Comprehensive profiling of additional market players (up to 3)
    • SWOT Analysis of key players (up to 3)
  • Regional Segmentation
    • Market estimations, Forecasts and CAGR of any prominent country as per the client's interest (Note: Depends on feasibility check)
  • Competitive Benchmarking
    • Benchmarking of key players based on product portfolio, geographical presence, and strategic alliances

Table of Contents

1 Executive Summary

2 Preface

  • 2.1 Abstract
  • 2.2 Stake Holders
  • 2.3 Research Scope
  • 2.4 Research Methodology
    • 2.4.1 Data Mining
    • 2.4.2 Data Analysis
    • 2.4.3 Data Validation
    • 2.4.4 Research Approach
  • 2.5 Research Sources
    • 2.5.1 Primary Research Sources
    • 2.5.2 Secondary Research Sources
    • 2.5.3 Assumptions

3 Market Trend Analysis

  • 3.1 Introduction
  • 3.2 Drivers
  • 3.3 Restraints
  • 3.4 Opportunities
  • 3.5 Threats
  • 3.6 End User Analysis
  • 3.7 Emerging Markets
  • 3.8 Impact of Covid-19

4 Porters Five Force Analysis

  • 4.1 Bargaining power of suppliers
  • 4.2 Bargaining power of buyers
  • 4.3 Threat of substitutes
  • 4.4 Threat of new entrants
  • 4.5 Competitive rivalry

5 Global Cyber Security Market, By Component

  • 5.1 Introduction
  • 5.2 Hardware
  • 5.3 Software

6 Global Cyber Security Market, By Solution

  • 6.1 Introduction
  • 6.2 Intrusion Detection Systems/Intrusion Prevention Systems
    • 6.2.1 Wireless
    • 6.2.2 Network -Based
    • 6.2.3 Host-Based
  • 6.3 Threat Intelligence
    • 6.3.1 Security and Vulnerability Management
    • 6.3.2 Risk and Compliance Management
    • 6.3.3 Identity and Access Management
    • 6.3.4 Other Threat Intelligence Solutions
      • 6.3.4.1 Threat Intelligence Platforms
      • 6.3.4.2 Security Information and Event Management
      • 6.3.4.3 Incident Forensics
  • 6.4 Next Generation Firewall
  • 6.5 Antivirus/Antimalware
  • 6.6 Web Filtering
  • 6.7 Distributed Denial Of Service Mitigation Protection Appliance
  • 6.8 Disaster Recovery
  • 6.9 Encryption
  • 6.10 Data Loss Prevention
    • 6.10.1 Network Data Loss Prevention
    • 6.10.2 Storage/ Data Center Data Loss Prevention
    • 6.10.3 Endpoint Data Loss Prevention
  • 6.11 Other Solutions
    • 6.11.1 Application Whitelisting
    • 6.11.2 Patch Management

7 Global Cyber Security Market, By Deployment Type

  • 7.1 Introduction
  • 7.2 Cloud
  • 7.3 On-premises

8 Global Cyber Security Market, By User Type

  • 8.1 Introduction
  • 8.2 Large Enterprises
  • 8.3 Small & Medium Enterprises

9 Global Cyber Security Market, By Service

  • 9.1 Introduction
  • 9.2 Professional Services
    • 9.2.1 Design and Integration
    • 9.2.2 Risk and Threat Assessment
    • 9.2.3 Consulting
    • 9.2.4 Training and Education
    • 9.2.5 Support and Maintenance
  • 9.3 Managed Services
  • 9.3 Integration Services

10 Global Cyber Security Market, By Security

  • 10.1 Introduction
  • 10.2 Content Security
  • 10.3 Data Security & Privacy Service
  • 10.4 Infrastructure Protection
    • 10.4.1 Cloud Security
    • 10.4.2 Email/Web Gateway
    • 10.4.3 Endpoint
  • 10.5 Network
    • 10.5.1 Internet Service Provider Equipment
    • 10.5.2 Virtual Private Network (VPN)
    • 10.5.3 Unified Threat Management (UTM)

Enterprise

  • 10.6 Industrial Control System (ICS) Security
  • 10.7 Internet of Things (IoT) Security
  • 10.8 Application Security
  • 10.9 Web Security

11 Global Cyber Security Market, By Use Case

  • 11.1 Introduction
  • 11.2 Security Monitoring
  • 11.3 Network Traffic Analysis
  • 11.4 Threat Hunting
  • 11.5 Incident Response
  • 11.6 Data Exfiltration

12 Global Cyber Security Market, By End User

  • 12.1 Introduction
  • 12.2 Automotive
  • 12.3 Banking, Financial Services and Insurance (BFSI)
  • 12.4 Government and Defense
  • 12.5 Education
  • 12.6 Energy & Utilities
  • 12.7 Healthcare
  • 12.8 Information Technology (IT) & Telecom
  • 12.9 Discrete Manufacturing
  • 12.10 Media & Entertainment
  • 12.11 Public Sector
  • 12.12 Process Manufacturing
  • 12.13 Retail
  • 12.14 Transportation & Logistics
  • 12.15 Investment Services & Insurance
  • 12.16 Aerospace

13 Global Cyber Security Market, By Geography

  • 13.1 Introduction
  • 13.2 North America
    • 13.2.1 US
    • 13.2.2 Canada
    • 13.2.3 Mexico
  • 13.3 Europe
    • 13.3.1 Germany
    • 13.3.2 UK
    • 13.3.3 Italy
    • 13.3.4 France
    • 13.3.5 Spain
    • 13.3.6 Rest of Europe
  • 13.4 Asia Pacific
    • 13.4.1 Japan
    • 13.4.2 China
    • 13.4.3 India
    • 13.4.4 Australia
    • 13.4.5 New Zealand
    • 13.4.6 South Korea
    • 13.4.7 Rest of Asia Pacific
  • 13.5 South America
    • 13.5.1 Argentina
    • 13.5.2 Brazil
    • 13.5.3 Chile
    • 13.5.4 Rest of South America
  • 13.6 Middle East & Africa
    • 13.6.1 Saudi Arabia
    • 13.6.2 UAE
    • 13.6.3 Qatar
    • 13.6.4 South Africa
    • 13.6.5 Rest of Middle East & Africa

14 Key Developments

  • 14.1 Agreements, Partnerships, Collaborations and Joint Ventures
  • 14.2 Acquisitions & Mergers
  • 14.3 New Product Launch
  • 14.4 Expansions
  • 14.5 Other Key Strategies

15 Company Profiling

  • 15.1 Accenture
  • 15.2 Broadcom
  • 15.3 Capgemini
  • 15.4 Check Point Software Technology Ltd.
  • 15.5 Cisco Systems, Inc.
  • 15.6 Cognizant
  • 15.7 F5, Inc.
  • 15.8 Fireeye, Inc.
  • 15.9 HCL Technologies Limited
  • 15.10 IBM Corporation
  • 15.11 Infosys Limited
  • 15.12 L&T Technology Services Limited
  • 15.13 McAfee, LLC
  • 15.14 Palo Alto Networks, Inc.
  • 15.15 Pricewaterhousecoopers International Limited
  • 15.16 Tata Consultancy Services Limited
  • 15.17 Tech Mahindra Limited
  • 15.18 Trend Micro Incorporated
  • 15.19 Wipro Limited
株式会社グローバルインフォメーション
© Copyright 1996-2021, Global Information, Inc. All rights reserved.