Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increase in?Cyber Security Threat
4.3.2 Cost Reduction, Scalability and Efficiency by Cloud Computing
4.4 Market Restraints
4.4.1 Vulnerability to Attacks
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Type of Software
5.1.1 Cloud Identity and Access Management Software
5.1.2 Cloud Email Security Software
5.1.3 Cloud Intrusion Detection and Prevention System
5.1.4 Cloud Encryption Software
5.1.5 Cloud Network Security Software
5.2 Geography
5.2.1 North America
5.2.2 Europe
5.2.3 Asia-Pacific
5.2.4 Latin America
5.2.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Google Cloud Platform
6.1.2 Salesforce
6.1.3 Vormetric, Inc.
6.1.4 Boxcryptor
6.1.5 Trend Micro
6.1.6 Sophos
6.1.7 Wave Systems
6.1.8 Microsoft Azure
6.1.9 Temenos
6.1.10 nCino


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS