Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Number of Data Breaches
4.3.2 Emergence of Smart Cities
4.4 Market Restraints
4.4.1 Growing Complexity among Devices, Coupled with the Lack of Ubiquitous Legislation
4.5 Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Type of Security
5.1.1 Network Security
5.1.2 End-point Security
5.1.3 Application Security
5.1.4 Cloud Security
5.1.5 Others
5.2 By Type of Solution
5.2.1 Software
5.2.2 Services
5.3 By End-User vertical
5.3.1 Automotive
5.3.2 Healthcare
5.3.3 Government
5.3.4 Manufacturing
5.3.5 Energy & power
5.3.6 Retail
5.3.7 Others
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia Pacific
5.4.4 Latin America
5.4.5 Middle East and Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Symantec Corporation
6.1.2 IBM Corporation
6.1.3 Check Point Software Technologies
6.1.4 Intel Corporation
6.1.5 HP Enterprise Company
6.1.6 FireEye Inc.
6.1.7 Infineon Technologies AG
6.1.8 Trustwave Holdings
6.1.9 Gemalto NV
6.1.10 AT&T Inc.
6.1.11 Palo Alto Networks Inc.


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS