Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Market Drivers
4.2.1 Ongoing Migration to The Cloud, Adoption of IoT & BYOD
4.2.2 Stringent Data Compliance Requirements and Need for Scalable Data Safeguarding Strategies
4.3 Market Restraints
4.3.1 Growing Demand for Open-Source Security Standards
4.4 Value Chain / Supply Chain Analysis
4.5 Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry
4.6 PESTLE Analysis
4.7 Assessment of COVID-19 Impact on the Industry


5 MARKET SEGMENTATION
5.1 Type
5.1.1 Solutions
5.1.2 Services
5.2 Deployment Mode
5.2.1 Cloud
5.2.2 On-Premise
5.3 End-User Verticals
5.3.1 BFSI
5.3.2 Telecom and IT
5.3.3 Healthcare
5.3.4 Retail
5.3.5 Government
5.3.6 Other End-user Verticals
5.4 Geography
5.4.1 North America
5.4.2 Europe?
5.4.3 Asia-Pacific
5.4.4 Rest of the World


6 COMPETITIVE LANDSCAPE
6.1 Vendor Market Share
6.2 Mergers & Acquisitions
6.3 Company Profiles
6.3.1 Perimeter 81
6.3.2 ZScaler
6.3.3 Cisco Systems, Inc
6.3.4 Okta, Inc
6.3.5 APPGate
6.3.6 Check Point
6.3.7 Broadcom (Symantec)
6.3.8 Cato Networks Limited
6.3.9 Unisys Corporation
6.3.10 Fortinent Corporation
6.3.11 Palo Alto Networks Inc.
6.3.12 Safe-T Group Limited
6.3.13 Akamai Technologies, Inc (Soha Systems)
6.3.14 Verizon Communications (Vidder)


7 MARKET OPPORTUNITIES AND FUTURE TRENDS