Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Volumes of Data Being Generated from Information-Escalated Applications is Driving the Market Growth
4.4 Market Restraints
4.4.1 Loss of Control over Data Location Hinders the Market
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Deployment
5.1.1 Public
5.1.2 Private
5.1.3 Hybrid
5.2 By End-user Vertical
5.2.1 BFSI
5.2.2 Retail
5.2.3 Government
5.2.4 Healthcare
5.2.5 IT & Telecom
5.2.6 Manufacturing
5.2.7 Other End-user Verticals
5.3 Geography
5.3.1 North America
5.3.2 Europe
5.3.3 Asia-Pacific
5.3.4 Latin America
5.3.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 IBM Corporation
6.1.2 Fortinet Technologies Inc.
6.1.3 Intel Security Group
6.1.4 McAfee Inc.
6.1.5 Oracle Pvt. Ltd
6.1.6 Imperva Inc.
6.1.7 NetLib Security Inc.
6.1.8 The Hewlett-Packard Company
6.1.9 Trustwave Holdings, Inc.
6.1.10 Informatica LLC
6.1.11 Voltage Security Inc.
6.1.12 Axis Technology LLC
6.1.13 Amazon Web Services


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS