Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Stringent Government Regulations and Mandates
4.3.2 Cyber Security Threat Owing to Digitalization
4.4 Market Restraints
4.4.1 Lack of Awareness
4.5 Industry Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Bargaining Power of Suppliers
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Threat of New Entrants
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry
4.7 Government Policies


5 MARKET SEGMENTATION
5.1 By Type
5.1.1 Software
5.1.1.1 Audit Management
5.1.1.2 Compliance Management
5.1.1.3 Risk Management
5.1.1.4 Policy Management
5.1.1.5 Incident Management
5.1.1.6 Internal Control
5.1.1.7 Information Security
5.1.2 Services
5.2 By Size of the Enterprise
5.2.1 Small & Medium Enterprise
5.2.2 Large Enterprise
5.3 By End-user Industry
5.3.1 BFSI
5.3.2 Government
5.3.3 Healthcare
5.3.4 Manufacturing
5.3.5 Telecom & IT
5.3.6 Other End-user Vertical
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia-Pacific
5.4.4 Latin America
5.4.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Dell EMC
6.1.2 IBM Corporation
6.1.3 Maclear LLC
6.1.4 MetricStream, Inc.
6.1.5 Microsoft Corporation
6.1.6 Future Shield, Inc.
6.1.7 Oracle Corporation
6.1.8 SAP SE
6.1.9 SAS Institute, Inc.
6.1.10 Wolters Kluwer
6.1.11 Software AG


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS