株式会社グローバルインフォメーション
TEL: 044-952-0102
市場調査レポート

サイバーセキュリティ - 世界市場の将来展望(2017-2026)

Cyber Security - Global Market Outlook (2017-2026)

発行 Stratistics Market Research Consulting 商品コード 521367
出版日 ページ情報 英文 160 Pages
納期: 2-3営業日
価格
本日の銀行送金レート: 1USD=109.06円で換算しております。
Back to Top
サイバーセキュリティ - 世界市場の将来展望(2017-2026) Cyber Security - Global Market Outlook (2017-2026)
出版日: 2018年08月01日 ページ情報: 英文 160 Pages
概要

世界のサイバーセキュリティ市場は2017年に951億5,000万米ドルとなりました。今後は16.1%のCAGRで拡大し、2026年には3,652億6,000万米ドルに達すると予測されています。

当レポートでは、サイバーセキュリティの世界市場を調査し、市場の概要、タイプ、ソリューション、サービス、地域別の市場動向、市場規模の推移と予測、市場促進・阻害要因ならびに市場機会の分析、競合情勢、主要企業のプロファイルなど包括的な情報を提供しています。

目次

第1章 エグゼクティブサマリー

第2章 イントロダクション

第3章 市場動向分析

  • イントロダクション
  • 成長要因
  • 阻害要因
  • 市場機会
  • 脅威
  • エンドユーザー分析
  • 新興市場
  • 今後の市場のシナリオ

第4章 ファイブフォース分析

  • サプライヤーの交渉力
  • 買い手の交渉力
  • 代替品の脅威
  • 新規参入の脅威
  • 業界内での競争

第5章 サイバーセキュリティ市場:展開モード別

  • イントロダクション
  • オンプレミス
  • クラウド

第6章 サイバーセキュリティ市場:組織規模別

  • イントロダクション
  • 大企業
  • 中小企業

第7章 サイバーセキュリティ市場:セキュリティタイプ別

  • イントロダクション
  • アプリケーション・セキュリティ
  • クラウド・セキュリティ
  • エンドポイント・セキュリティ
  • ネットワーク・セキュリティー
  • エンタープライズ・セキュリティ
  • その他

第8章 サイバーセキュリティ市場:ソリューション別

  • イントロダクション
  • データ損失防止
  • 災害からの復旧
  • 分散型サービス拒否
  • 暗号化
  • ID・アクセス管理
  • 侵入検知システム/侵入防止システム
  • リスク・コンプライアンス管理
  • セキュリティ・脆弱性管理
  • セキュリティ情報・イベント管理
  • UTM (統合脅威管理)
  • その他

第9章 サイバーセキュリティ市場:コンポーネント別

  • イントロダクション
  • サービス
  • ソリューション

第10章 サイバーセキュリティ市場:サービス別

  • イントロダクション
  • プロフェッショナルサービス
  • マネージドセキュリティサービス(MSS)

第11章 サイバーセキュリティ市場:エンドユーザー別

  • イントロダクション
  • 航空宇宙・防衛・インテリジェンス
  • 銀行・金融サービス・保険(BFSI)
  • エネルギー・ユーティリティ
  • 政府・公共機関
  • 医療
  • IT・通信
  • 製造
  • 小売
  • その他

第12章 サイバーセキュリティ市場:地域別

  • イントロダクション
  • 北米
    • 米国
    • カナダ
    • メキシコ
  • 欧州
    • ドイツ
    • 英国
    • イタリア
    • フランス
    • スペイン
    • その他
  • アジア太平洋
    • 日本
    • 中国
    • インド
    • オーストラリア
    • ニュージーランド
    • 韓国
    • その他
  • 南米
    • アルゼンチン
    • ブラジル
    • チリ
    • その他
  • 中東・アフリカ
    • サウジアラビア
    • アラブ首長国連邦
    • カタール
    • 南アフリカ
    • その他

第13章 市場の主な動向

  • 合意、パートナーシップ、提携、合弁事業
  • 買収と合併
  • 新製品の発売
  • 拡大戦略
  • その他の主要戦略

第14章 企業プロファイル

  • Centrify Corporation
  • Checkpoint Software Technologies Ltd
  • Cisco Systems
  • Dell EMC (RSA Security)
  • EMC Corporation
  • FireEye
  • HPE
  • IBM Corporation
  • INTEL SECURITY (U.S.)
  • Kaspersky Labs India Private Limited
  • RAPID7, INC. (U.S.)
  • Sophos
  • Symantec Corporation
  • Trend Micro
  • Verizon Communications
  • Palo Alto Networks
  • McAfee
  • Juniper Networks
  • Fortinet
  • Hewlett Packard Enterprise (HPE)
  • Imperva
  • Cyber Ark Software, Ltd
  • AVG Technologies
  • Proofpoint, Inc.
図表

List of Tables

  • 1 Global Cyber Security Market Outlook, By Region (2016-2026) (US $MN)
  • 2 Global Cyber Security Market Outlook, By Deployment Mode (2016-2026) (US $MN)
  • 3 Global Cyber Security Market Outlook, By On-Premises (2016-2026) (US $MN)
  • 4 Global Cyber Security Market Outlook, By Cloud (2016-2026) (US $MN)
  • 5 Global Cyber Security Market Outlook, By Organization Size (2016-2026) (US $MN)
  • 6 Global Cyber Security Market Outlook, By Large Enterprises (2016-2026) (US $MN)
  • 7 Global Cyber Security Market Outlook, By Small and Medium-Sized Enterprises (2016-2026) (US $MN)
  • 8 Global Cyber Security Market Outlook, By Security Type (2016-2026) (US $MN)
  • 9 Global Cyber Security Market Outlook, By Application Security (2016-2026) (US $MN)
  • 10 Global Cyber Security Market Outlook, By Cloud Security (2016-2026) (US $MN)
  • 11 Global Cyber Security Market Outlook, By Endpoint Security (2016-2026) (US $MN)
  • 12 Global Cyber Security Market Outlook, By Network Security (2016-2026) (US $MN)
  • 13 Global Cyber Security Market Outlook, By Enterprise security (2016-2026) (US $MN)
  • 14 Global Cyber Security Market Outlook, By Industrial Control Systems Security (2016-2026) (US $MN)
  • 15 Global Cyber Security Market Outlook, By Other Security Types (2016-2026) (US $MN)
  • 16 Global Cyber Security Market Outlook, By Solution (2016-2026) (US $MN)
  • 17 Global Cyber Security Market Outlook, By Antivirus/Anti-Malware (2016-2026) (US $MN)
  • 18 Global Cyber Security Market Outlook, By Data Loss Prevention (2016-2026) (US $MN)
  • 19 Global Cyber Security Market Outlook, By Disaster Recovery (2016-2026) (US $MN)
  • 20 Global Cyber Security Market Outlook, By Distributed Denial of Service Mitigation (2016-2026) (US $MN)
  • 21 Global Cyber Security Market Outlook, By Encryption (2016-2026) (US $MN)
  • 22 Global Cyber Security Market Outlook, By Firewall (2016-2026) (US $MN)
  • 23 Global Cyber Security Market Outlook, By Identity and Access Management (2016-2026) (US $MN)
  • 24 Global Cyber Security Market Outlook, By Intrusion Detection System/Intrusion Prevention System (2016-2026) (US $MN)
  • 25 Global Cyber Security Market Outlook, By Risk and Compliance Management (2016-2026) (US $MN)
  • 26 Global Cyber Security Market Outlook, By Security and Vulnerability Management (2016-2026) (US $MN)
  • 27 Global Cyber Security Market Outlook, By Security Information and Event Management (2016-2026) (US $MN)
  • 28 Global Cyber Security Market Outlook, By Unified Threat Management (2016-2026) (US $MN)
  • 29 Global Cyber Security Market Outlook, By Web Filtering (2016-2026) (US $MN)
  • 30 Global Cyber Security Market Outlook, By White listing (2016-2026) (US $MN)
  • 31 Global Cyber Security Market Outlook, By Other Solutions (2016-2026) (US $MN)
  • 32 Global Cyber Security Market Outlook, By Component (2016-2026) (US $MN)
  • 33 Global Cyber Security Market Outlook, By Services (2016-2026) (US $MN)
  • 34 Global Cyber Security Market Outlook, By Solutions (2016-2026) (US $MN)
  • 35 Global Cyber Security Market Outlook, By Service (2016-2026) (US $MN)
  • 36 Global Cyber Security Market Outlook, By Professional Services (2016-2026) (US $MN)
  • 37 Global Cyber Security Market Outlook, By Consulting (2016-2026) (US $MN)
  • 38 Global Cyber Security Market Outlook, By Design and Integration (2016-2026) (US $MN)
  • 39 Global Cyber Security Market Outlook, By Risk and Threat Assessment (2016-2026) (US $MN)
  • 40 Global Cyber Security Market Outlook, By Support and Maintenance (2016-2026) (US $MN)
  • 41 Global Cyber Security Market Outlook, By Training and Education (2016-2026) (US $MN)
  • 42 Global Cyber Security Market Outlook, By Managed Security Services (MSS) (2016-2026) (US $MN)
  • 43 Global Cyber Security Market Outlook, By End User (2016-2026) (US $MN)
  • 44 Global Cyber Security Market Outlook, By Aerospace, Defense and Intelligence (2016-2026) (US $MN)
  • 45 Global Cyber Security Market Outlook, By Banking, Financial Services and Insurance (BFSI) (2016-2026) (US $MN)
  • 46 Global Cyber Security Market Outlook, By Energy and Utilities (2016-2026) (US $MN)
  • 47 Global Cyber Security Market Outlook, By Government and Public Utilities (2016-2026) (US $MN)
  • 48 Global Cyber Security Market Outlook, By Healthcare (2016-2026) (US $MN)
  • 49 Global Cyber Security Market Outlook, By IT and Telecom (2016-2026) (US $MN)
  • 50 Global Cyber Security Market Outlook, By Manufacturing (2016-2026) (US $MN)
  • 51 Global Cyber Security Market Outlook, By Retail (2016-2026) (US $MN)
  • 52 Global Cyber Security Market Outlook, By Other End users (2016-2026) (US $MN)

NOTE: Tables for North America, Europe, Asia Pacific, South America and Middle East & Africa are represented in the same manner above.

1 Executive Summary

2 Preface

  • 2.1 Abstract
  • 2.2 Stake Holders
  • 2.3 Research Scope
  • 2.4 Research Methodology
    • 2.4.1 Data Mining
    • 2.4.2 Data Analysis
    • 2.4.3 Data Validation
    • 2.4.4 Research Approach
  • 2.5 Research Sources
    • 2.5.1 Primary Research Sources
    • 2.5.2 Secondary Research Sources
    • 2.5.3 Assumptions

3 Market Trend Analysis

  • 3.1 Introduction
  • 3.2 Drivers
  • 3.3 Restraints
  • 3.4 Opportunities
  • 3.5 Threats
  • 3.6 End User Analysis
  • 3.7 Emerging Markets
  • 3.8 Futuristic Market Scenario

4 Porters Five Force Analysis

  • 4.1 Bargaining power of suppliers
  • 4.2 Bargaining power of buyers
  • 4.3 Threat of substitutes
  • 4.4 Threat of new entrants
  • 4.5 Competitive rivalry

5 Global Cyber Security Market, By Deployment Mode

  • 5.1 Introduction
  • 5.2 On-Premises
  • 5.3 Cloud

6 Global Cyber Security Market, By Organization Size

  • 6.1 Introduction
  • 6.2 Large Enterprises
  • 6.3 Small and Medium-Sized Enterprises

7 Global Cyber Security Market, By Security Type

  • 7.1 Introduction
  • 7.2 Application Security
  • 7.3 Cloud Security
  • 7.4 Endpoint Security
  • 7.5 Network Security
  • 7.6 Enterprise Security
  • 7.8 Other Security Types

8 Global Cyber Security Market, By Solution

  • 8.1 Introduction
  • 8.3 Data Loss Prevention
  • 8.4 Disaster Recovery
  • 8.5 Distributed Denial of Service Mitigation
  • 8.6 Encryption
  • 8.8 Identity and Access Management
  • 8.9 Intrusion Detection System/Intrusion Prevention System
  • 8.10 Risk and Compliance Management
  • 8.11 Security and Vulnerability Management
  • 8.12 Security Information and Event Management
  • 8.13 Unified Threat Management
  • 8.16 Other Solutions

9 Global Cyber Security Market, By Component

  • 9.1 Introduction
  • 9.2 Services
  • 9.3 Solutions

10 Global Cyber Security Market, By Service

  • 10.1 Introduction
  • 10.2 Professional Services
  • 10.3 Managed Security Services (MSS)

11 Global Cyber Security Market, By End User

  • 11.1 Introduction
  • 11.2 Aerospace, Defense and Intelligence
  • 11.3 Banking, Financial Services and Insurance (BFSI)
  • 11.4 Energy and Utilities
  • 11.5 Government and Public Utilities
  • 11.6 Healthcare
  • 11.7 IT and Telecom
  • 11.8 Manufacturing
  • 11.9 Retail
  • 11.10 Other End users

12 Global Cyber Security Market, By Geography

  • 12.1 Introduction
  • 12.2 North America
    • 12.2.1 US
    • 12.2.2 Canada
    • 12.2.3 Mexico
  • 12.3 Europe
    • 12.3.1 Germany
    • 12.3.2 UK
    • 12.3.3 Italy
    • 12.3.4 France
    • 12.3.5 Spain
    • 12.3.6 Rest of Europe
  • 12.4 Asia Pacific
    • 12.4.1 Japan
    • 12.4.2 China
    • 12.4.3 India
    • 12.4.4 Australia
    • 12.4.5 New Zealand
    • 12.4.6 South Korea
    • 12.4.7 Rest of Asia Pacific
  • 12.5 South America
    • 12.5.1 Argentina
    • 12.5.2 Brazil
    • 12.5.3 Chile
    • 12.5.4 Rest of South America
  • 12.6 Middle East & Africa
    • 12.6.1 Saudi Arabia
    • 12.6.2 UAE
    • 12.6.3 Qatar
    • 12.6.4 South Africa
    • 12.6.5 Rest of Middle East & Africa

13 Key Developments

  • 13.1 Agreements, Partnerships, Collaborations and Joint Ventures
  • 13.2 Acquisitions & Mergers
  • 13.3 New Product Launch
  • 13.4 Expansions
  • 13.5 Other Key Strategies

14 Company Profiling

  • 14.1 Centrify Corporation
  • 14.2 Checkpoint Software Technologies Ltd
  • 14.3 Cisco Systems
  • 14.4 Dell EMC (RSA Security)
  • 14.5 EMC Corporation
  • 14.6 FireEye
  • 14.7 HPE
  • 14.8 IBM Corporation
  • 14.9 INTEL SECURITY (U.S.)
  • 14.10 Kaspersky Labs India Private Limited
  • 14.11 RAPID7, INC. (U.S.)
  • 14.12 Sophos
  • 14.13 Symantec Corporation
  • 14.14 Trend Micro
  • 14.15 Verizon Communications
  • 14.16 Palo Alto Networks
  • 14.17 McAfee
  • 14.18 Juniper Networks
  • 14.19 Fortinet
  • 14.20 Hewlett Packard Enterprise (HPE)
  • 14.21 Imperva
  • 14.22 Cyber Ark Software, Ltd
  • 14.23 AVG Technologies
  • 14.24 Proofpoint, Inc.

List of Tables

  • Table 1 Global Cyber Security Market Outlook, By Region (2016-2026) (US $MN)
  • Table 2 Global Cyber Security Market Outlook, By Deployment Mode (2016-2026) (US $MN)
  • Table 3 Global Cyber Security Market Outlook, By On-Premises (2016-2026) (US $MN)
  • Table 4 Global Cyber Security Market Outlook, By Cloud (2016-2026) (US $MN)
  • Table 5 Global Cyber Security Market Outlook, By Organization Size (2016-2026) (US $MN)
  • Table 6 Global Cyber Security Market Outlook, By Large Enterprises (2016-2026) (US $MN)
  • Table 7 Global Cyber Security Market Outlook, By Small and Medium-Sized Enterprises (2016-2026) (US $MN)
  • Table 8 Global Cyber Security Market Outlook, By Security Type (2016-2026) (US $MN)
  • Table 9 Global Cyber Security Market Outlook, By Application Security (2016-2026) (US $MN)
  • Table 10 Global Cyber Security Market Outlook, By Cloud Security (2016-2026) (US $MN)
  • Table 11 Global Cyber Security Market Outlook, By Endpoint Security (2016-2026) (US $MN)
  • Table 12 Global Cyber Security Market Outlook, By Network Security (2016-2026) (US $MN)
  • Table 13 Global Cyber Security Market Outlook, By Enterprise security (2016-2026) (US $MN)
  • Table 14 Global Cyber Security Market Outlook, By Industrial Control Systems Security (2016-2026) (US $MN)
  • Table 15 Global Cyber Security Market Outlook, By Other Security Types (2016-2026) (US $MN)
  • Table 16 Global Cyber Security Market Outlook, By Solution (2016-2026) (US $MN)
  • Table 17 Global Cyber Security Market Outlook, By Antivirus/Anti-Malware (2016-2026) (US $MN)
  • Table 18 Global Cyber Security Market Outlook, By Data Loss Prevention (2016-2026) (US $MN)
  • Table 19 Global Cyber Security Market Outlook, By Disaster Recovery (2016-2026) (US $MN)
  • Table 20 Global Cyber Security Market Outlook, By Distributed Denial of Service Mitigation (2016-2026) (US $MN)
  • Table 21 Global Cyber Security Market Outlook, By Encryption (2016-2026) (US $MN)
  • Table 22 Global Cyber Security Market Outlook, By Firewall (2016-2026) (US $MN)
  • Table 23 Global Cyber Security Market Outlook, By Identity and Access Management (2016-2026) (US $MN)
  • Table 24 Global Cyber Security Market Outlook, By Intrusion Detection System/Intrusion Prevention System (2016-2026) (US $MN)
  • Table 25 Global Cyber Security Market Outlook, By Risk and Compliance Management (2016-2026) (US $MN)
  • Table 26 Global Cyber Security Market Outlook, By Security and Vulnerability Management (2016-2026) (US $MN)
  • Table 27 Global Cyber Security Market Outlook, By Security Information and Event Management (2016-2026) (US $MN)
  • Table 28 Global Cyber Security Market Outlook, By Unified Threat Management (2016-2026) (US $MN)
  • Table 29 Global Cyber Security Market Outlook, By Web Filtering (2016-2026) (US $MN)
  • Table 30 Global Cyber Security Market Outlook, By White listing (2016-2026) (US $MN)
  • Table 31 Global Cyber Security Market Outlook, By Other Solutions (2016-2026) (US $MN)
  • Table 32 Global Cyber Security Market Outlook, By Component (2016-2026) (US $MN)
  • Table 33 Global Cyber Security Market Outlook, By Services (2016-2026) (US $MN)
  • Table 34 Global Cyber Security Market Outlook, By Solutions (2016-2026) (US $MN)
  • Table 35 Global Cyber Security Market Outlook, By Service (2016-2026) (US $MN)
  • Table 36 Global Cyber Security Market Outlook, By Professional Services (2016-2026) (US $MN)
  • Table 37 Global Cyber Security Market Outlook, By Consulting (2016-2026) (US $MN)
  • Table 38 Global Cyber Security Market Outlook, By Design and Integration (2016-2026) (US $MN)
  • Table 39 Global Cyber Security Market Outlook, By Risk and Threat Assessment (2016-2026) (US $MN)
  • Table 40 Global Cyber Security Market Outlook, By Support and Maintenance (2016-2026) (US $MN)
  • Table 41 Global Cyber Security Market Outlook, By Training and Education (2016-2026) (US $MN)
  • Table 42 Global Cyber Security Market Outlook, By Managed Security Services (MSS) (2016-2026) (US $MN)
  • Table 43 Global Cyber Security Market Outlook, By End User (2016-2026) (US $MN)
  • Table 44 Global Cyber Security Market Outlook, By Aerospace, Defense and Intelligence (2016-2026) (US $MN)
  • Table 45 Global Cyber Security Market Outlook, By Banking, Financial Services and Insurance (BFSI) (2016-2026) (US $MN)
  • Table 46 Global Cyber Security Market Outlook, By Energy and Utilities (2016-2026) (US $MN)
  • Table 47 Global Cyber Security Market Outlook, By Government and Public Utilities (2016-2026) (US $MN)
  • Table 48 Global Cyber Security Market Outlook, By Healthcare (2016-2026) (US $MN)
  • Table 49 Global Cyber Security Market Outlook, By IT and Telecom (2016-2026) (US $MN)
  • Table 50 Global Cyber Security Market Outlook, By Manufacturing (2016-2026) (US $MN)
  • Table 51 Global Cyber Security Market Outlook, By Retail (2016-2026) (US $MN)
  • Table 52 Global Cyber Security Market Outlook, By Other End users (2016-2026) (US $MN)

NOTE: Tables for North America, Europe, Asia Pacific, South America and Middle East & Africa are represented in the same manner above.

目次

According to Stratistics MRC, the Global Cyber Security Market is accounted for $95.15 billion in 2017 and is expected to reach $365.26 billion by 2026 growing at a CAGR of 16.1% from 2017 to 2026. Stringent compliance & regulatory requirements, rising demand for IT security budget, growing attractiveness of digitalization, increasing cyber attacks and growing awareness of the security risks are the factors fueling the market growth. However, lack of awareness regarding benefits of effective security solutions especially in Small and Medium Enterprises (SMEs) are restricting the growth of the market.

Cyber security is a body of technologies, processes and practices designed to protect networks, computers, programs and data from unauthorized access. Cyber security is basically computer security. There is a significant increase in the cyber security because cyber security solutions increase cyber speed and offers number of options to save data. Cyber security is coupled with information technology security, which focuses on protecting computers and confidential data stored in it from cyber criminals. Cyber security market offers a number of advantages including enhanced security of cyberspaces, expanded digital safeguard and quicker reaction time to national crises. These advantages of cyber security market automatically enhance the value of service given to the market end-users.

Amongst Deployment Mode, On-premises held considerable market share as it provide high level of security and complete control over the critical data. Government, banking, financial services, and insurance (BFSI), and manufacturing sectors widely implement the on-premises cyber security solutions. By geography, North America dominated the market during the predicted period due to existence of prominent players offering enhanced solution and services to all the sectors in the region.

Some of the key players in Cyber Security market include Centrify Corporation, Checkpoint Software Technologies Ltd, Cisco Systems, Dell EMC (RSA Security), EMC Corporation, FireEye, HPE, IBM Corporation, INTEL SECURITY (U.S.), Kaspersky Labs India Private Limited, RAPID7, INC. (U.S.), Sophos, Symantec Corporation, Trend Micro, Verizon Communications, Palo Alto Networks, McAfee, Juniper Networks, Fortinet, Hewlett Packard Enterprise (HPE), Imperva, Cyber Ark Software, Ltd, AVG Technologies and Proofpoint, Inc.

Deployment Modes Covered:

  • On-Premises
  • Cloud

Organization Sizes Covered:

  • Large Enterprises
  • Small and Medium-Sized Enterprises

Security Types Covered:

  • Application Security
  • Cloud Security
  • Endpoint Security
  • Network Security
  • Wireless Security
  • Enterprise Security
  • Other Security Types

Solutions Covered:

  • Data Loss Prevention
  • Disaster Recovery
  • Distributed Denial of Service Mitigation
  • Encryption
  • Identity and Access Management
  • Intrusion Detection System/Intrusion Prevention System
  • Risk and Compliance Management
  • Security and Vulnerability Management
  • Security Information and Event Management
  • Unified Threat Management
  • Other Solutions

Components Covered:

  • Services
  • Solutions

Services Covered:

  • Professional Services
  • Managed Security Services (MSS)

End Users Covered:

  • Aerospace, Defense and Intelligence
  • Banking, Financial Services and Insurance (BFSI)
  • Energy and Utilities
  • Government and Public Utilities
  • Healthcare
  • IT and Telecom
  • Manufacturing
  • Retail
  • Other End users

Regions Covered:

  • North America
    • US
    • Canada
    • Mexico
  • Europe
    • Germany
    • UK
    • Italy
    • France
    • Spain
    • Rest of Europe
  • Asia Pacific
    • Japan
    • China
    • India
    • Australia
    • New Zealand
    • South Korea
    • Rest of Asia Pacific
  • South America
    • Argentina
    • Brazil
    • Chile
    • Rest of South America
  • Middle East & Africa
    • Saudi Arabia
    • UAE
    • Qatar
    • South Africa
    • Rest of Middle East & Africa

What our report offers:

  • Market share assessments for the regional and country level segments
  • Market share analysis of the top industry players
  • Strategic recommendations for the new entrants
  • Market forecasts for a minimum of 9 years of all the mentioned segments, sub segments and the regional markets
  • Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations)
  • Strategic recommendations in key business segments based on the market estimations
  • Competitive landscaping mapping the key common trends
  • Company profiling with detailed strategies, financials, and recent developments
  • Supply chain trends mapping the latest technological advancements

Table of Contents

1 Executive Summary

2 Preface

  • 2.1 Abstract
  • 2.2 Stake Holders
  • 2.3 Research Scope
  • 2.4 Research Methodology
    • 2.4.1 Data Mining
    • 2.4.2 Data Analysis
    • 2.4.3 Data Validation
    • 2.4.4 Research Approach
  • 2.5 Research Sources
    • 2.5.1 Primary Research Sources
    • 2.5.2 Secondary Research Sources
    • 2.5.3 Assumptions

3 Market Trend Analysis

  • 3.1 Introduction
  • 3.2 Drivers
  • 3.3 Restraints
  • 3.4 Opportunities
  • 3.5 Threats
  • 3.6 End User Analysis
  • 3.7 Emerging Markets
  • 3.8 Futuristic Market Scenario

4 Porters Five Force Analysis

  • 4.1 Bargaining power of suppliers
  • 4.2 Bargaining power of buyers
  • 4.3 Threat of substitutes
  • 4.4 Threat of new entrants
  • 4.5 Competitive rivalry

5 Global Cyber Security Market, By Deployment Mode

  • 5.1 Introduction
  • 5.2 On-Premises
  • 5.3 Cloud

6 Global Cyber Security Market, By Organization Size

  • 6.1 Introduction
  • 6.2 Large Enterprises
  • 6.3 Small and Medium-Sized Enterprises

7 Global Cyber Security Market, By Security Type

  • 7.1 Introduction
  • 7.2 Application Security
  • 7.3 Cloud Security
  • 7.4 Endpoint Security
  • 7.5 Network Security
  • 7.6 Enterprise Security
  • 7.8 Other Security Types

8 Global Cyber Security Market, By Solution

  • 8.1 Introduction
  • 8.3 Data Loss Prevention
  • 8.4 Disaster Recovery
  • 8.5 Distributed Denial of Service Mitigation
  • 8.6 Encryption
  • 8.8 Identity and Access Management
  • 8.9 Intrusion Detection System/Intrusion Prevention System
  • 8.10 Risk and Compliance Management
  • 8.11 Security and Vulnerability Management
  • 8.12 Security Information and Event Management
  • 8.13 Unified Threat Management
  • 8.16 Other Solutions

9 Global Cyber Security Market, By Component

  • 9.1 Introduction
  • 9.2 Services
  • 9.3 Solutions

10 Global Cyber Security Market, By Service

  • 10.1 Introduction
  • 10.2 Professional Services
  • 10.3 Managed Security Services (MSS)

11 Global Cyber Security Market, By End User

  • 11.1 Introduction
  • 11.2 Aerospace, Defense and Intelligence
  • 11.3 Banking, Financial Services and Insurance (BFSI)
  • 11.4 Energy and Utilities
  • 11.5 Government and Public Utilities
  • 11.6 Healthcare
  • 11.7 IT and Telecom
  • 11.8 Manufacturing
  • 11.9 Retail
  • 11.10 Other End users

12 Global Cyber Security Market, By Geography

  • 12.1 Introduction
  • 12.2 North America
    • 12.2.1 US
    • 12.2.2 Canada
    • 12.2.3 Mexico
  • 12.3 Europe
    • 12.3.1 Germany
    • 12.3.2 UK
    • 12.3.3 Italy
    • 12.3.4 France
    • 12.3.5 Spain
    • 12.3.6 Rest of Europe
  • 12.4 Asia Pacific
    • 12.4.1 Japan
    • 12.4.2 China
    • 12.4.3 India
    • 12.4.4 Australia
    • 12.4.5 New Zealand
    • 12.4.6 South Korea
    • 12.4.7 Rest of Asia Pacific
  • 12.5 South America
    • 12.5.1 Argentina
    • 12.5.2 Brazil
    • 12.5.3 Chile
    • 12.5.4 Rest of South America
  • 12.6 Middle East & Africa
    • 12.6.1 Saudi Arabia
    • 12.6.2 UAE
    • 12.6.3 Qatar
    • 12.6.4 South Africa
    • 12.6.5 Rest of Middle East & Africa

13 Key Developments

  • 13.1 Agreements, Partnerships, Collaborations and Joint Ventures
  • 13.2 Acquisitions & Mergers
  • 13.3 New Product Launch
  • 13.4 Expansions
  • 13.5 Other Key Strategies

14 Company Profiling

  • 14.1 Centrify Corporation
  • 14.2 Checkpoint Software Technologies Ltd
  • 14.3 Cisco Systems
  • 14.4 Dell EMC (RSA Security)
  • 14.5 EMC Corporation
  • 14.6 FireEye
  • 14.7 HPE
  • 14.8 IBM Corporation
  • 14.9 INTEL SECURITY (U.S.)
  • 14.10 Kaspersky Labs India Private Limited
  • 14.11 RAPID7, INC. (U.S.)
  • 14.12 Sophos
  • 14.13 Symantec Corporation
  • 14.14 Trend Micro
  • 14.15 Verizon Communications
  • 14.16 Palo Alto Networks
  • 14.17 McAfee
  • 14.18 Juniper Networks
  • 14.19 Fortinet
  • 14.20 Hewlett Packard Enterprise (HPE)
  • 14.21 Imperva
  • 14.22 Cyber Ark Software, Ltd
  • 14.23 AVG Technologies
  • 14.24 Proofpoint, Inc.
Back to Top