Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Growth in Smart Devices
4.3.2 Increasing Number of Data Breaches
4.4 Market Restraints
4.4.1 Lack of Awareness about Cyberattacks
4.5 Industry Attractiveness - Porter’s Five Forces Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By End User
5.1.1 Consumer
5.1.2 Business
5.1.2.1 BFSI
5.1.2.2 Government
5.1.2.3 Manufacturing
5.1.2.4 Healthcare
5.1.2.5 Energy and Power
5.1.2.6 Retail
5.1.2.7 Other Businesses
5.2 Geography
5.2.1 North America
5.2.2 Europe
5.2.3 Asia-Pacific
5.2.4 Latin America
5.2.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Carbon Black Inc.
6.1.2 Cisco Systems Inc.
6.1.3 Cylance Inc.
6.1.4 McAfee LLC
6.1.5 CrowdStrike Inc.
6.1.6 Trend Micro Inc.
6.1.7 Broadcom Inc. (Symantec Corporation)
6.1.8 Palo Alto Networks Inc.
6.1.9 RSA Security LLC
6.1.10 FireEye Inc.
6.1.11 SentinelOne Inc.
6.1.12 Sophos Group PLC
6.1.13 Microsoft Corporation
6.1.14 Kaspersky Lab Inc.
6.1.15 Panda Security SL
6.1.16 ESET LLC
6.1.17 Fortinet Inc.
6.1.18 Avast Software SRO
6.1.19 Bitdefender LLC


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS