1 INTRODUCTION
1.1 OBJECTIVES OF THE STUDY
1.2 MARKET DEFINITION
1.3 MARKET SCOPE
1.3.1 MARKETS COVERED
1.3.2 YEARS CONSIDERED IN THE REPORT
1.4 CURRENCY AND PRICING
1.5 LIMITATIONS
1.6 STAKEHOLDERS


2 RESEARCH METHODOLOGY
2.1 RESEARCH DATA
2.1.1 SECONDARY DATA
2.1.1.1 Key data from secondary sources
2.1.2 PRIMARY DATA
2.1.2.1 Key data from primary sources
2.1.2.2 Key Industry Insights
2.1.2.3 Breakdown of primaries
2.2 MARKET SIZE ESTIMATION
2.2.1 BOTTOM-UP APPROACH
2.2.2 TOP-DOWN APPROACH
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION
2.4 RESEARCH ASSUMPTIONS


3 EXECUTIVE SUMMARY


4 PREMIUM INSIGHTS
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN DATA CENTER LOGICAL SECURITY MARKET
4.2 DATA CENTER LOGICAL SECURITY MARKET, BY SOLUTION TYPE
4.3 DATA CENTER LOGICAL SECURITY ACROSS VARIOUS REGIONS
4.4 LIFE CYCLE ANALYSIS, BY REGION


5 MARKET OVERVIEW
5.1 INTRODUCTION
5.2 MARKET SEGMENTATION
5.2.1 BY SOLUTION TYPE
5.2.2 BY SERVICE TYPE
5.2.3 BY DATA CENTER TYPE
5.2.4 BY REGION
5.2.5 BY VERTICAL
5.3 MARKET DYNAMICS
5.3.1 DRIVERS
5.3.1.1 Increasing usage of virtualization and cloud computing
5.3.1.2 High growth in network connectivity and data traffic
5.3.1.3 High and increasing need for security upgradation
5.3.2 RESTRAINTS
5.3.2.1 High availability of low-cost substitute products
5.3.2.2 High cost of advanced security solutions
5.3.3 OPPORTUNITIES
5.3.3.1 High growth in the number of new data centers
5.3.3.2 Providing common platform for integrated physical and logical security solutions
5.3.4 CHALLENGE
5.3.4.1 High pace of innovations


6 INDUSTRY TRENDS
6.1 INTRODUCTION
6.2 VALUE CHAIN ANALYSIS
6.3 PORTER’S FIVE FORCES ANALYSIS
6.3.1 THREAT OF NEW ENTRANTS
6.3.2 THREAT OF SUBSTITUTES
6.3.3 BARGAINING POWER OF SUPPLIERS
6.3.4 BARGAINING POWER OF BUYERS
6.3.5 INTENSITY OF COMPETITIVE RIVALRY
6.4 TECHNOLOGY TRENDS AND STANDARDS
6.4.1 INTRODUCTION
6.4.2 STANDARDS AND GUIDELINES FOR DATA CENTER LOGICAL SECURITY
6.4.2.1 Canadian Standards Association (CSA)
6.4.2.2 Underwriters Laboratory (UL)
6.4.2.3 Made in USA (For U.S. Region)


7 DATA CENTER LOGICAL SECURITY MARKET, BY SOLUTION TYPE
7.1 INTRODUCTION
7.2 THREAT AND APPLICATION SECURITY
7.2.1 INTRUSION DETECTION AND PREVENETION SYSTEMS (IPS/IDS)
7.2.2 VIRTIULAZATION SECURITY SOLUTIONS
7.2.3 FIREWALL
7.2.4 DISTRIBUTED DENIAL-OF-SERVICE (DDOS)
7.2.5 DOMAIN NAME SYSTEM (DNS) SERVERS/ SECURE SOCKET LAYER (SSL) MARKET
7.2.6 ANTIVIRUS
7.2.7 UNIFIED THREAT MANAGEMENT (UTM)
7.3 ACCESS CONTROL AND COMPLIANCE
7.3.1 IDENTITY ACCESS MANAGEMENT (IAM)
7.3.2 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
7.3.3 WEB FILTERING SOLUTION
7.4 DATA PROTECTION SOLUTIONS
7.4.1 DATA LOSS PREVENTION (DLP)
7.4.2 DISASTER RECOVERY SOLUTIONS
7.4.3 INFORMATION LIFE CYCLE MANAGEMENT (ILM) SOLUTIONS


8 DATA CENTER LOGICAL SECURITY MARKET, BY SERVICE TYPE
8.1 INTRODUCTION
8.2 SECURITY CONSULTING SERVICES
8.3 MANAGED SECURITY SERVICES
8.4 ON-PREMISES MANAGED SECURITY SERVICES
8.5 ON-CLOUD MANAGED SECURITY SERVICES


9 DATA CENTER LOGICAL SECURITY MARKET, BY DATA CENTER TYPE
9.1 INTRODUCTION
9.2 MID-SIZED DATA CENTERS
9.3 ENTERPRISE DATA CENTERS
9.4 LARGE DATA CENTERS


10 DATA CENTER LOGICAL SECURITY MARKET, BY VERTICAL
10.1 INTRODUCTION
10.2 BFSI
10.3 TELECOM AND IT
10.4 GOVERNMENT
10.5 HEALTHCARE
10.6 MEDIA AND ENTERTAINMENT
10.7 OTHERS


11 DATA CENTER LOGICAL SECURITY MARKET, BY REGION
11.1 INTRODUCTION
11.2 NORTH AMERICA (NA)
11.3 EUROPE
11.4 ASIA-PACIFIC (APAC)
11.5 MIDDLE EAST AND AFRICA (MEA)
11.6 LATIN AMERICA (LA)


12 COMPETITIVE LANDSCAPE
12.1 OVERVIEW
12.2 PRODUCT PORTFOLIO COMPARISON
12.3 COMPETITIVE SITUATION AND TRENDS
12.4 END-USER LANDSCAPE
12.4.1 MARKET OPPORTUNITY ANALYSIS
12.4.2 END-USER ANALYSIS
12.4.2.1 Electricity prices in the U.S. is expected to rise more than 21.35% in the coming 10 years
12.4.2.2 Mega data center market is expected to be worth $20.55 billion by 2019
12.4.2.3 World IT Security Spending
12.5 NEW PRODUCT AND SERVICES LAUNCHES
12.6 AGREEMENTS, PARTNERSHIPS, COLLABORATIONS, AND JOINT VENTURES
12.7 MERGERS & ACQUISITIONS


13 COMPANY PROFILES
(Overview, Products & Services, Strategies & Insights, Developments and MnM View)*
13.1 INTRODUCTION
13.2 HEWLETT-PACKARD
13.3 IBM
13.4 MCAFEE, INC. (SUBSIDIARY OF INTEL CORP.)
13.5 DELL, INC.
13.6 JUNIPER NETWORKS, INC.
13.7 CISCO SYSTEMS, INC.
13.8 FORTINET, INC.
13.9 CHECK POINT SOFTWARE TECHNOLOGIES
13.10 TREND MICRO
13.11 EMC
*Details on Overview, Products & Services, Strategies & Insights, Developments and MnM View might not be captured in case of unlisted companies.


14 APPENDIX
14.1 KEY INDUSTRY INSIGHTS
14.2 DISCUSSION GUIDE
14.3 INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
14.4 AVAILABLE CUSTOMIZATIONS
14.5 RELATED REPORTS