Table of Content


1 INTRODUCTION
1.1 Study Assumptions and Market Definition
1.2 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 INDUSTRY ECOSYSTEM ANALYSIS


5 MARKET DYNAMICS
5.1 Current Market Scenario and Evolution of Cybersecurity-related Practices
5.2 Market Drivers
5.2.1 Rapidly Increasing Cybersecurity Incidents and Regulations Regarding their Reporting
5.2.2 Growing M2M/IoT Connections’ Demand for Strengthened Cybersecurity in Enterprises
5.3 Market Challenges
5.3.1 Lack of Cybersecurity Professionals
5.3.2 High Reliance on Traditional Authentication Methods and Low Preparedness
5.4 Market Opportunities
5.5 Industry Attractiveness - Porter’s Five Forces Analysis
5.5.1 Bargaining Power of Suppliers
5.5.2 Bargaining Power of Consumers
5.5.3 Threat of New Entrants
5.5.4 Intensity of Competitive Rivalry
5.5.5 Threat of Substitutes


6 ANALYSIS OF MAJOR SECURITY BREACHES AT A GLOBAL AND REGIONAL LEVEL


7 IMPACT OF COVID-19 ON THE CYBERSECURITY MARKET


8 MARKET SEGMENTATION
8.1 By Product Type
8.1.1 Solutions
8.1.1.1 Application Security
8.1.1.2 Cloud Security
8.1.1.3 Consumer Security Software
8.1.1.4 Data Security
8.1.1.5 Identity and Access Management
8.1.1.6 Infrastructure Protection
8.1.1.7 Integrated Risk Management
8.1.1.8 Network Security Equipment
8.1.1.9 Other Solutions
8.1.2 Services
8.1.2.1 Professional
8.1.2.2 Managed
8.2 By Deployment
8.2.1 On-premise
8.2.2 Cloud
8.3 By End-user Industry
8.3.1 BFSI
8.3.2 Healthcare
8.3.3 Aerospace and Defense
8.3.4 IT and Telecommunication
8.3.5 Government
8.3.6 Retail
8.3.7 Manufacturing
8.3.8 Other End-user Industries
8.4 By Geography
8.4.1 North America
8.4.2 Europe
8.4.3 Asia-Pacific
8.4.4 Rest of the World
8.4.4.1 Latin America
8.4.4.2 Middle-East


9 VENDOR MARKET SHARE ANALYSIS


10 COMPETITIVE LANDSCAPE
10.1 Company Profiles
10.1.1 AVG Technologies
10.1.2 Check Point Software Technologies Ltd
10.1.3 Cisco Systems Inc.
10.1.4 CyberArk Software Ltd
10.1.5 Dell Technologies Inc.
10.1.6 Mandiant Inc.
10.1.7 Fortinet Inc.
10.1.8 IBM Corporation
10.1.9 Imperva Inc.
10.1.10 Intel Security
10.1.11 Palo Alto Networks Inc.
10.1.12 Proofpoint Inc.
10.1.13 Rapid7 Inc.
10.1.14 Nortonlifelock Inc.
10.1.15 Trend Micro Inc.


11 INVESTMENT ANALYSIS


12 FUTURE OF THE MARKET