Table of Content


1 Preface

2 Scope and Methodology
2.1 Objectives of the Study
2.2 Stakeholders
2.3 Data Sources
2.3.1 Primary Sources
2.3.2 Secondary Sources
2.4 Market Estimation
2.4.1 Bottom-Up Approach
2.4.2 Top-Down Approach
2.5 Forecasting Methodology

3 Executive Summary

4 Introduction
4.1 Overview
4.2 Key Industry Trends

5 Global Cloud Security Software Market
5.1 Market Overview
5.2 Market Performance
5.3 Impact of COVID-19
5.4 Market Breakup by Type
5.5 Market Breakup by Deployment
5.6 Market Breakup by End-User
5.7 Market Breakup by Vertical
5.8 Market Breakup by Region
5.9 Market Forecast

6 Market Breakup by Type
6.1 Cloud Identity and Access Management
6.1.1 Market Trends
6.1.2 Market Forecast
6.2 Data Loss Prevention
6.2.1 Market Trends
6.2.2 Market Forecast
6.3 Email and Web Security
6.3.1 Market Trends
6.3.2 Market Forecast
6.4 Cloud Database Security
6.4.1 Market Trends
6.4.2 Market Forecast
6.5 Network Security
6.5.1 Market Trends
6.5.2 Market Forecast
6.6 Cloud Encryption
6.6.1 Market Trends
6.6.2 Market Forecast

7 Market Breakup by Deployment
7.1 Public
7.1.1 Market Trends
7.1.2 Market Forecast
7.2 Private
7.2.1 Market Trends
7.2.2 Market Forecast
7.3 Hybrid
7.3.1 Market Trends
7.3.2 Market Forecast

8 Market Breakup by End-User
8.1 Small and Midsize Business (SMBs)
8.1.1 Market Trends
8.1.2 Market Forecast
8.2 Large Enterprises
8.2.1 Market Trends
8.2.2 Market Forecast
8.3 Cloud Service Providers
8.3.1 Market Trends
8.3.2 Market Forecast
8.4 Government Agencies
8.4.1 Market Trends
8.4.2 Market Forecast
8.5 Others/Third Party Vendors
8.5.1 Market Trends
8.5.2 Market Forecast

9 Market Breakup by Vertical
9.1 Healthcare
9.1.1 Market Trends
9.1.2 Market Forecast
9.2 Banking, Financial Services and Insurance (BFSI)
9.2.1 Market Trends
9.2.2 Market Forecast
9.3 Information Technology (IT) & Telecom
9.3.1 Market Trends
9.3.2 Market Forecast
9.4 Government Agencies
9.4.1 Market Trends
9.4.2 Market Forecast
9.5 Retail
9.5.1 Market Trends
9.5.2 Market Forecast
9.6 Others
9.6.1 Market Trends
9.6.2 Market Forecast

10 Market Breakup by Region
10.1 North America
10.1.1 Market Trends
10.1.2 Market Forecast
10.2 Europe
10.2.1 Market Trends
10.2.2 Market Forecast
10.3 Asia Pacific
10.3.1 Market Trends
10.3.2 Market Forecast
10.4 Middle East and Africa
10.4.1 Market Trends
10.4.2 Market Forecast
10.5 Latin America
10.5.1 Market Trends
10.5.2 Market Forecast

11 SWOT Analysis
11.1 Overview
11.2 Strengths
11.3 Weaknesses
11.4 Opportunities
11.5 Threats

12 Value Chain Analysis

13 Porters Five Forces Analysis
13.1 Overview
13.2 Bargaining Power of Buyers
13.3 Bargaining Power of Suppliers
13.4 Degree of Competition
13.5 Threat of New Entrants
13.6 Threat of Substitutes

14 Price Analysis

15 Competitive Landscape
15.1 Market Structure
15.2 Key Players
15.3 Profiles of Key Players
15.3.1 Broadcom, Inc.
15.3.2 Trend Micro Incorporated
15.3.3 IBM Corporation
15.3.4 Cisco Systems, Inc.
15.3.5 RSA Security LLC
15.3.6 McAfee, LLC
15.3.7 Microsoft Corporation
15.3.8 Dell Technologies, Inc.
15.3.9 Hewlett Packard Enterprise Company
15.3.10 BMC Software, Inc.
15.3.11 Bitium
15.3.12 CipherCloud, Inc.
15.3.13 CloudPassage Inc.
15.3.14 Check Point Software Technologies Ltd,
15.3.15 Fortinet, Inc.
15.3.16 VMware, Inc.
15.3.17 Sophos Limited
15.3.18 Gemalto NV
15.3.19 Imperva, Inc.