Table of Content
1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study
2 RESEARCH METHODOLOGY
3 EXECUTIVE SUMMARY
4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Rising Incidence of Cyber Attacks
4.3.2 Convergence of IT and OT Networks
4.4 Market Restraints
4.4.1 Complexity in Installing and Upgrading the Security Systems
4.5 Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry
4.7 Technology Snapshot (Network Security, Endpoint Security, etc.)S
5 MARKET SEGMENTATION
5.1 By End-user Industry
5.1.1 Automotive
5.1.2 Chemical and Petrochemical
5.1.3 Utilities
5.1.4 Pharmaceuticals
5.1.5 Food and Beverage
5.1.6 Oil & Gas
5.1.7 Other End-user Industries
5.2 Geography
5.2.1 North America
5.2.1.1 United States
5.2.1.2 Canada
5.2.2 Europe
5.2.2.1 United Kingdom
5.2.2.2 Germany
5.2.2.3 France
5.2.2.4 Rest of Europe
5.2.3 Asia Pacific
5.2.3.1 China
5.2.3.2 India
5.2.3.3 Japan
5.2.3.4 Rest of Asia-Pacific
5.2.4 Latin America
5.2.5 Middle East & Africa
6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Darktrace Ltd.
6.1.2 FireEye Inc.
6.1.3 IBM Corporation
6.1.4 Cisco Systems Inc.
6.1.5 Fortinet Inc.
6.1.6 Check Point Software Technologies Ltd.
6.1.7 Honeywell International Inc.
6.1.8 Symantec Corporation
6.1.9 AhnLab Inc.
6.1.10 McAfee, LLC
6.1.11 Rockwell Automation Inc.
7 INVESTMENT ANALYSIS
8 MARKET OPPORTUNITIES AND FUTURE TRENDS