Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Rising Trend of Adoption of BYOD
4.3.2 Growing Security Concerns to Protect Enormous Amount of Corporate Data
4.4 Market Restraints
4.4.1 High Initial Investment during the Deployment in the Infrastructure
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Solution
5.1.1 Application Management
5.1.2 Device Management
5.1.3 Security Management
5.2 By Deployment Type
5.2.1 On - Premise
5.2.2 Cloud
5.3 By End-user Vertical
5.3.1 Telecom & Information Technology
5.3.2 Banking and Financial Service
5.3.3 Healthcare
5.3.4 Retail
5.3.5 Government
5.3.6 Manufacturing
5.3.7 Other End-user Verticals
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia-Pacific
5.4.4 Latin America
5.4.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Vmware, Inc.
6.1.2 Citrix Systems, Inc.
6.1.3 MobileIron Inc.
6.1.4 IBM Corporation
6.1.5 Broadcom Inc. (Symantec Corporation)
6.1.6 Sophos Group plc.
6.1.7 Centrify Corporation
6.1.8 Kaspersky Lab Inc.
6.1.9 SAP SE
6.1.10 Ivanti Software Inc.
6.1.11 Cisco Systems Inc.


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS