Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET INSIGHTS
4.1 Market Overview
4.2 Industry Attractiveness - Porter’s Five Force Analysis
4.2.1 Bargaining Power of Suppliers
4.2.2 Bargaining Power of Buyers/Consumers
4.2.3 Threat of New Entrants
4.2.4 Threat of Substitute Products
4.2.5 Intensity of Competitive Rivalry


5 MARKET DYNAMICS
5.1 Market Drivers
5.1.1 Rise In Security Concerns
5.1.2 Growing Adoption Of BYOD
5.2 Market Restraints
5.2.1 High Cost Of Deployment And Scalability


6 MARKET SEGMENTATION
6.1 By Deployment
6.1.1 On-Premise
6.1.2 Cloud
6.2 By Organisation Type
6.2.1 Small & Medium Enterprises (SMEs)
6.2.2 Large Enterprises
6.3 By End-user Industry
6.3.1 Retail
6.3.2 BFSI
6.3.3 Manufacturing
6.3.4 Government
6.3.5 Healthcare
6.3.6 Other End-users
6.4 Geography
6.4.1 North America
6.4.1.1 US
6.4.1.2 Canada
6.4.2 Europe
6.4.2.1 Germany
6.4.2.2 UK
6.4.2.3 France
6.4.2.4 Rest of Europe
6.4.3 Asia Pacific
6.4.3.1 China
6.4.3.2 Japan
6.4.3.3 India
6.4.3.4 Rest of Asia Pacific
6.4.4 Latin America
6.4.4.1 Brazil
6.4.4.2 Argentina
6.4.4.3 Rest of Latin America
6.4.5 Middle East and Africa
6.4.5.1 UAE
6.4.5.2 Saudi Arabia
6.4.5.3 Rest of Middle East and Africa


7 COMPETITIVE LANDSCAPE
7.1 Company Profiles
7.1.1 IBM Corporation
7.1.2 Splunk Inc.
7.1.3 Fortinet Inc.
7.1.4 LogRhythm Inc.
7.1.5 McAfee LLC
7.1.6 Micro Focus International plc
7.1.7 RSA Security LLC (Dell Technologies)
7.1.8 Rapid7 Inc.
7.1.9 Exabeam Inc.
7.1.10 Securonix Inc.
7.1.11 AlienVault Inc.
7.1.12 Hewlett Packard Enterprise Company


8 INVESTMENT ANALYSIS


9 MARKET OPPORTUNITIES AND FUTURE TRENDS