Table of Content


1 Preface

2 Scope and Methodology
2.1 Objectives of the Study
2.2 Stakeholders
2.3 Data Sources
2.3.1 Primary Sources
2.3.2 Secondary Sources
2.4 Market Estimation
2.4.1 Bottom-Up Approach
2.4.2 Top-Down Approach
2.5 Forecasting Methodology

3 Executive Summary

4 Introduction
4.1 Overview
4.2 Key Industry Trends

5 Global Security Analytics Market
5.1 Market Overview
5.2 Market Performance
5.3 Impact of Covid-19
5.4 Market Forecast

6 Market Breakup by Component
6.1 Solutions
6.1.1 Market Trends
6.1.2 Market Forecast
6.2 Services
6.2.1 Market Trends
6.2.2 Major Types
6.2.2.1 Professional Services
6.2.2.2 Managed Services
6.2.3 Market Forecast

7 Market Breakup by Application
7.1 Application Security Analytics
7.1.1 Market Trends
7.1.2 Market Forecast
7.2 Web Security Analytics
7.2.1 Market Trends
7.2.2 Market Forecast
7.3 Endpoint Security Analytics
7.3.1 Market Trends
7.3.2 Market Forecast
7.4 Network Security Analytics
7.4.1 Market Trends
7.4.2 Market Forecast
7.5 Others
7.5.1 Market Trends
7.5.2 Market Forecast

8 Market Breakup by Deployment Mode
8.1 Cloud-based
8.1.1 Market Trends
8.1.2 Market Forecast
8.2 On-premises
8.2.1 Market Trends
8.2.2 Market Forecast

9 Market Breakup by Organization Size
9.1 Small and Medium Enterprises
9.1.1 Market Trends
9.1.2 Market Forecast
9.2 Large Enterprises
9.2.1 Market Trends
9.2.2 Market Forecast

10 Market Breakup by Vertical
10.1 BFSI
10.1.1 Market Trends
10.1.2 Market Forecast
10.2 Healthcare
10.2.1 Market Trends
10.2.2 Market Forecast
10.3 Manufacturing
10.3.1 Market Trends
10.3.2 Market Forecast
10.4 Consumer Goods and Retail
10.4.1 Market Trends
10.4.2 Market Forecast
10.5 IT and Telecom
10.5.1 Market Trends
10.5.2 Market Forecast
10.6 Government and Defense
10.6.1 Market Trends
10.6.2 Market Forecast
10.7 Others
10.7.1 Market Trends
10.7.2 Market Forecast

11 Market Breakup by Region
11.1 North America
11.1.1 United States
11.1.1.1 Market Trends
11.1.1.2 Market Forecast
11.1.2 Canada
11.1.2.1 Market Trends
11.1.2.2 Market Forecast
11.2 Asia Pacific
11.2.1 China
11.2.1.1 Market Trends
11.2.1.2 Market Forecast
11.2.2 Japan
11.2.2.1 Market Trends
11.2.2.2 Market Forecast
11.2.3 India
11.2.3.1 Market Trends
11.2.3.2 Market Forecast
11.2.4 South Korea
11.2.4.1 Market Trends
11.2.4.2 Market Forecast
11.2.5 Australia
11.2.5.1 Market Trends
11.2.5.2 Market Forecast
11.2.6 Indonesia
11.2.6.1 Market Trends
11.2.6.2 Market Forecast
11.2.7 Others
11.2.7.1 Market Trends
11.2.7.2 Market Forecast
11.3 Europe
11.3.1 Germany
11.3.1.1 Market Trends
11.3.1.2 Market Forecast
11.3.2 France
11.3.2.1 Market Trends
11.3.2.2 Market Forecast
11.3.3 United Kingdom
11.3.3.1 Market Trends
11.3.3.2 Market Forecast
11.3.4 Italy
11.3.4.1 Market Trends
11.3.4.2 Market Forecast
11.3.5 Spain
11.3.5.1 Market Trends
11.3.5.2 Market Forecast
11.3.6 Russia
11.3.6.1 Market Trends
11.3.6.2 Market Forecast
11.3.7 Others
11.3.7.1 Market Trends
11.3.7.2 Market Forecast
11.4 Latin America
11.4.1 Brazil
11.4.1.1 Market Trends
11.4.1.2 Market Forecast
11.4.2 Mexico
11.4.2.1 Market Trends
11.4.2.2 Market Forecast
11.4.3 Others
11.4.3.1 Market Trends
11.4.3.2 Market Forecast
11.5 Middle East and Africa
11.5.1 Market Trends
11.5.2 Market Breakup by Country
11.5.3 Market Forecast

12 SWOT Analysis
12.1 Overview
12.2 Strengths
12.3 Weaknesses
12.4 Opportunities
12.5 Threats

13 Value Chain Analysis

14 Porters Five Forces Analysis
14.1 Overview
14.2 Bargaining Power of Buyers
14.3 Bargaining Power of Suppliers
14.4 Degree of Competition
14.5 Threat of New Entrants
14.6 Threat of Substitutes

15 Competitive Landscape
15.1 Market Structure
15.2 Key Players
15.3 Profiles of Key Players
15.3.1 Alert Logic Inc. (Welsh, Carson, Anderson & Stowe)
15.3.1.1 Company Overview
15.3.1.2 Product Portfolio
15.3.2 Alienvault Inc. (AT&T Cybersecurity)
15.3.2.1 Company Overview
15.3.2.2 Product Portfolio
15.3.3 Arbor Networks Inc. (NETSCOUT Systems Inc.)
15.3.3.1 Company Overview
15.3.3.2 Product Portfolio
15.3.4 Cisco Systems Inc.
15.3.4.1 Company Overview
15.3.4.2 Product Portfolio
15.3.4.3 Financials
15.3.4.4 SWOT Analysis
15.3.5 Fortinet Inc.
15.3.5.1 Company Overview
15.3.5.2 Product Portfolio
15.3.5.3 Financials
15.3.5.4 SWOT Analysis
15.3.6 Hewlett Packard Enterprise Development LP
15.3.6.1 Company Overview
15.3.6.2 Product Portfolio
15.3.6.3 Financials
15.3.6.4 SWOT Analysis
15.3.7 International Business Machines Corporation
15.3.7.1 Company Overview
15.3.7.2 Product Portfolio
15.3.7.3 Financials
15.3.7.4 SWOT Analysis
15.3.8 LogRhythm Inc. (Thoma Bravo LLC)
15.3.8.1 Company Overview
15.3.8.2 Product Portfolio
15.3.9 McAfee LLC (TPG Capital & Intel Corporation)
15.3.9.1 Company Overview
15.3.9.2 Product Portfolio
15.3.10 RSA Security LLC (Dell Technologies Inc.)
15.3.10.1 Company Overview
15.3.10.2 Product Portfolio
15.3.11 Splunk Inc.
15.3.11.1 Company Overview
15.3.11.2 Product Portfolio
15.3.11.3 Financials