Table of Content


1 INTRODUCTION
1.1 Study Assumptions and Market Definition
1.2 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET INSIGHTS
4.1 Market Overview (Includes the impact of COVID-19)
4.2 Industry Attractiveness - Porter’s Five Force Analysis
4.2.1 Bargaining Power of Suppliers
4.2.2 Bargaining Power of Buyers
4.2.3 Threat of New Entrants
4.2.4 Threat of Substitutes
4.2.5 Intensity of Competitive Rivalry


5 MARKET DYNAMICS
5.1 Market Drivers
5.1.1 Increasing Number of Data Breaches
5.1.2 Security Perimeter of an Organization not Being Limited to Workplace
5.2 Market Restraints
5.2.1 Legacy applications, infrastructure, and operating systems not likely to adopt zero trust model


6 TECHNOLOGY SNAPSHOT
6.1 Zero Trust Networks
6.2 Zero Trust Devices
6.3 Zero Trust Data
6.4 Zero Trust Identities
6.5 Zero Trust Applications (Visibility & Analytics)


7 MARKET SEGMENTATION
7.1 Type of Deployment
7.1.1 On-Premise
7.1.2 Cloud
7.2 Enterprise Size
7.2.1 Small and medium Enterprises
7.2.2 Large Enterprises
7.3 End-user Industry
7.3.1 IT & Telecom
7.3.2 BFSI
7.3.3 Manufacturing
7.3.4 Healthcare
7.3.5 Energy and Power
7.3.6 Retail
7.3.7 Other End-User Industries
7.4 Geography
7.4.1 North America
7.4.1.1 United States
7.4.1.2 Canada
7.4.2 Europe
7.4.2.1 United Kingdom
7.4.2.2 Germany
7.4.2.3 France
7.4.2.4 Rest of Europe
7.4.3 Asia-Pacific
7.4.3.1 China
7.4.3.2 India
7.4.3.3 Japan
7.4.3.4 Rest of Asia-Pacific
7.4.4 Rest of the World
7.4.4.1 Latin America
7.4.4.2 Middle East and Africa


8 COMPETITIVE LANDSCAPE
8.1 Company Profiles
8.1.1 Cisco Systems Inc.
8.1.2 Palo Alto Networks Inc.
8.1.3 Vmware, Inc.
8.1.4 Broadcom Inc. (Symantec Corporation)
8.1.5 Microsoft Corporation
8.1.6 IBM Corporation
8.1.7 Google Inc.
8.1.8 Check Point Software Technologies Ltd.
8.1.9 Blackberry Limited
8.1.10 Akamai Technologies Inc
8.1.11 Centrify Corporation
8.1.12 Okta, Inc.
8.1.13 Fortinet Inc.
8.1.14 Sophos Group PLC
8.1.15 Cyxtera Technologies, Inc.


9 INVESTMENT ANALYSIS


10 FUTURE OF THE MARKET