Table of Content
1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study
2 RESEARCH METHODOLOGY
3 EXECUTIVE SUMMARY
4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Threats to Data Security
4.3.2 Increasing Need to Control Organization Data and Spot Human Errors
4.4 Market Restraints
4.4.1 Financial Constraints and High Innovation Costs
4.5 Industry Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry
5 TECHNOLOGY SNAPSHOTS
6 MARKET SEGMENTATION
6.1 By Organization Size
6.1.1 Small and Medium Enterprises
6.1.2 Large Enterprises
6.2 By Deployment Type
6.2.1 Cloud
6.2.2 On-Premises
6.3 By Installation Mode
6.3.1 Agent-Based
6.3.2 Agentless
6.4 By End User
6.4.1 Retail
6.4.2 BFSI
6.4.3 Hospitality
6.4.4 Healthcare
6.4.5 Government
6.4.6 Entertainment
6.4.7 Other End Users
6.5 Geography
6.5.1 North America
6.5.2 Europe
6.5.3 Asia-Pacific
6.5.4 Latin America
6.5.5 Middle East & Africa
7 COMPETITIVE LANDSCAPE
7.1 Company Profiles
7.1.1 McAfee, LLC
7.1.2 Tripwire, Inc.
7.1.3 Cimcor, Inc.
7.1.4 AlienVault, Inc.
7.1.5 Qualys, Inc.
7.1.6 SolarWinds Worldwide, LLC
7.1.7 LogRhythm, Inc.
7.1.8 New Net Technologies LLC
7.1.9 Trend Micro Inc.
7.1.10 TrustWave Holdings, Inc.
7.1.11 Ionx Solutions LLP
7.1.12 Splunk Technology
7.1.13 Software Diversified Services
8 INVESTMENT ANALYSIS
9 MARKET OPPORTUNITIES AND FUTURE TRENDS