Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Need for Threat Intelligence at an Early Stage is Driving the Market Growth
4.4 Market Restraints
4.4.1 Unawareness of Security Services is Discouraging the Market Expansion
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Deployment Type
5.1.1 On-Premise
5.1.2 Cloud
5.2 By Solution Type
5.2.1 Intrusion Detection and Prevention
5.2.2 Threat Prevention
5.2.3 Distributed Denial of Services
5.2.4 Firewall Management
5.2.5 End-Point Security
5.2.6 Risk Assesment
5.3 By Managed Security Service Provider
5.3.1 IT Service Providers
5.3.2 Managed Security Specialist
5.3.3 Telecom Service Provider
5.4 By End-user Vertical
5.4.1 BFSI
5.4.2 Government & Defense
5.4.3 Retail
5.4.4 Manufacturing
5.4.5 Healthcare & Life Sciences
5.4.6 IT & Telecom
5.5 Geography
5.5.1 North America
5.5.2 Europe
5.5.3 Asia-Pacific
5.5.4 Latin America
5.5.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Verizon Communications
6.1.2 IBM Corporation
6.1.3 Symantec Corporation
6.1.4 At&T
6.1.5 Secureworks, Inc.
6.1.6 Cisco Systems, Inc.
6.1.7 Ericsson
6.1.8 Trustwave Holdings Inc.
6.1.9 Accenture Plc
6.1.10 HP Enterprise
6.1.11 Computer Sciences Corporation


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS