Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Number of Security Frauds and Technology Penetration
4.3.2 Increasing Number of Malware Attacks (Ransomware) across Cloud Computing Ecosystem
4.4 Market Restraints
4.4.1 Lack of Skilled AI Professionals
4.5 Industry Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Security Type
5.1.1 Network Security
5.1.2 Application Security
5.1.3 Cloud Security
5.2 By Service
5.2.1 Professional Services
5.2.2 Managed Services
5.3 By Deployment
5.3.1 On-premise
5.3.2 Cloud
5.4 By End-user Industry
5.4.1 Government & Defense
5.4.2 Retail
5.4.3 BFSI
5.4.4 Manufacturing
5.4.5 Healthcare
5.4.6 Automotive & Transportation
5.4.7 Other End-user Industries
5.5 Geography
5.5.1 North America
5.5.2 Europe
5.5.3 Asia-Pacific
5.5.4 Latin America
5.5.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 IBM Corporation
6.1.2 Facebook Inc
6.1.3 F-Secure Corporation
6.1.4 Tech Mahindra Limited
6.1.5 Cisco Systems Inc
6.1.6 Nvidia Corporation
6.1.7 Samsung Electronics Co., Ltd
6.1.8 Xilinx, Inc
6.1.9 ThreatMetrix Inc (RELX Group)
6.1.10 Broadcom Inc. (Symantec Corporation)
6.1.11 Fortinet, Inc
6.1.12 Juniper Network, Inc
6.1.13 Micron Technology, Inc


7 MARKET OPPORTUNITIES AND FUTURE TRENDS


8 INVESTMENT ANALYSIS