Table of Content
1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study
2 RESEARCH METHODOLOGY
3 EXECUTIVE SUMMARY
4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Number of Data Breaches
4.3.2 Emergence of Smart Cities
4.4 Market Restraints
4.4.1 Growing Complexity among Devices, Coupled with the Lack of Ubiquitous Legislation
4.5 Industry Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry
5 MARKET SEGMENTATION
5.1 By Type of Security
5.1.1 Network Security
5.1.2 End-point Security
5.1.3 Application Security
5.1.4 Cloud Security
5.1.5 Others
5.2 By Solution
5.2.1 Software
5.2.2 Services
5.3 By End-user Industry
5.3.1 Automotive
5.3.2 Healthcare
5.3.3 Government
5.3.4 Manufacturing
5.3.5 Energy & power
5.3.6 Retail
5.3.7 Others End-user Industries
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia-Pacific
5.4.4 Latin America
5.4.5 Middle East & Africa
6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Broadcom Inc. (Symantec Corporation)
6.1.2 IBM Corporation
6.1.3 Check Point Software Technologies Ltd.
6.1.4 Intel Corporation
6.1.5 Hewlett Packard Enterprise Co.
6.1.6 FireEye Inc.
6.1.7 Infineon Technologies AG
6.1.8 Trustwave Holdings
6.1.9 Gemalto NV
6.1.10 AT&T Inc.
6.1.11 Palo Alto Networks Inc.
7 INVESTMENT ANALYSIS
8 MARKET OPPORTUNITIES AND FUTURE TRENDS