Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Variety And Volume of Business Data Generated from Various Sources
4.3.2 Increasing Cyber-Attacks Demand for Scalable High Security Solutions
4.3.3 Growth of E- Commerce Industry
4.4 Market Restraints
4.4.1 Lack of Data Security Awareness
4.4.2 Low Data Security Budget And High Installation Cost of Solution
4.4.3 Lack of Security Expertise And Skilled Personnel
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Component
5.1.1 Solutions
5.1.2 Services
5.2 By Organization Size
5.2.1 Small & Medium Enterprises
5.2.2 Large Enterprises
5.3 By End-user Industry
5.3.1 Banking, Financial Services, & Insurance (BFSI)
5.3.2 Manufacturing
5.3.3 IT & Telecommunication
5.3.4 Aerospace & Defense
5.3.5 Healthcare
5.3.6 Other End-users
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia Pacific
5.4.4 Rest of the World


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Oracle Corporation
6.1.2 IBM Corporation
6.1.3 Microsoft Corporation
6.1.4 Amazon Web Services
6.1.5 Broadcom Inc. (Symantec Corporation)
6.1.6 Hewlett Packard Enterprise
6.1.7 Thales Group (Gemalto NV)
6.1.8 Cloudera Inc.
6.1.9 Centrify Corporation
6.1.10 Mcafee, LLC
6.1.11 Check Point Software Technologies Ltd
6.1.12 Imperva, Inc.
6.1.13 Dell Technologies


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS