Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Adoption of IoT across the Supply Chain
4.3.2 Increasing Number of Cyber Threats
4.4 Market Restraints
4.4.1 Integration with Existing Architecture
4.5 Industry Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Solution Type
5.1.1 Identity and Access Management
5.1.2 Data Loss Prevention
5.1.3 IDS/IPS
5.1.4 Security Information and Event Management
5.1.5 Encryption
5.1.6 Other Solution Type
5.2 By Security Type
5.2.1 Application Security
5.2.2 Database Security
5.2.3 Endpoint Security
5.2.4 Network Security
5.2.5 Web & Email Security
5.2.6 Other Security Type
5.3 By Service Model
5.3.1 Infrastructure-as-a-Service
5.3.2 Platform-as-a-Service
5.3.3 Software-as-a-Service
5.4 By Deployment Type
5.4.1 Public Cloud
5.4.2 Private Cloud
5.4.3 Hybrid Cloud
5.5 Geography
5.5.1 North America
5.5.2 Europe
5.5.3 Asia-Pacific
5.5.4 Latin America
5.5.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 IBM Corporation
6.1.2 Intel Security - McAfee
6.1.3 Broadcom Inc.
6.1.4 Cisco Systems, Inc.
6.1.5 Qualys, Inc.
6.1.6 Nutanix
6.1.7 ProtectWise


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS