Table of Content


1 INTRODUCTION
1.1 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET OPPORTUNITIES AND FUTURE TRENDS


5 MARKET INSIGHTS
5.1 Market Overview
5.2 Value Chain / Supply Chain Analysis
5.3 Industry Attractiveness - Porter’s Five Force Analysis
5.3.1 Threat of New Entrants
5.3.2 Bargaining Power of Buyers/Consumers
5.3.3 Bargaining Power of Suppliers
5.3.4 Threat of Substitute Products
5.3.5 Intensity of Competitive Rivalry


6 MARKET DYNAMICS
6.1 Introduction to Market Drivers and Restraints
6.2 Market Drivers
6.2.1 Increasing Need for Advanced Cloud Security Solutions
6.2.2 Increasing Trend of BYOD in Enterprises
6.3 Market Restraints
6.3.1 Vulnerability of Cloud-Based Applications to Cyber Crimes


7 MARKET SEGMENTATION
7.1 By Solution
7.1.1 Identity and Access Management
7.1.2 Secure Email Gateway
7.1.3 Secure Web Gateway
7.1.4 Vulnerability Management
7.1.5 Security Information and Event Management
7.1.6 Application Security Testing
7.1.7 Other Solutions
7.2 By Organization Size
7.2.1 Small and Medium Enterprises
7.2.2 Large Enterprises
7.3 Geography
7.3.1 North America
7.3.2 Europe
7.3.3 Asia-Pacific
7.3.4 Latin America
7.3.5 Middle East & Africa


8 COMPETITIVE LANDSCAPE
8.1 Company Profiles
8.1.1 Barracuda Networks Inc.
8.1.2 Dell Technologies
8.1.3 IBM Corporation
8.1.4 Proofpoint Inc.
8.1.5 Sophos PLC
8.1.6 Trend Micro Incorporated
8.1.7 Websense Inc.
8.1.8 ZSCaler Inc.
8.1.9 McAfee (Intel)
8.1.10 Cisco Systems Inc.
8.1.11 Symantec Corporation
8.1.12 Qualys Inc.