Table of Content


1. Service Overview
1.1. Market Definition
1.2. Scope of the Market
1.2.1. Markets Covered
1.2.2. Years Considered for Study
1.2.3. Key Market Segmentations
2. Research Methodology
2.1. Objective of the Study
2.2. Baseline Methodology
2.3. Formulation of the Scope
2.4. Assumptions and Limitations
2.5. Sources of Research
2.5.1. Secondary Research
2.5.2. Primary Research
2.6. Approach for the Market Study
2.6.1. The Bottom-Up Approach
2.6.2. The Top-Down Approach
2.7. Methodology Followed for Calculation of Market Size & Market Shares
2.8. Forecasting Methodology
2.8.1. Data Triangulation & Validation
3. Executive Summary
4. Impact of COVID-19 on India Cybersecurity Market
5. Voice of Customer
6. India Cybersecurity Market Overview
7. India Cybersecurity Filters Market Outlook
7.1. Market Size & Forecast
7.1.1. By Value
7.2. Market Share & Forecast
7.2.1. By Security Type (Network Security, Application Security, Cloud Security, Endpoint Security, Content Security, Others)
7.2.2. By Solution Type (Firewall, Antivirus & Antimalware, Risk & Compliance Management, Identity & Access Management, Data Loss Prevention, Unified Threat Management, Encryption & Decryption, Intrusion Detection/Prevention System, Infrastructure Security, Others)
7.2.3. By Deployment Mode (Cloud & On-premises)
7.2.4. By End-User Industry (Government, BFSI, Corporates/Private Organizations, Retail, Healthcare, Education Technology & Others)
7.2.5. By Region (North India, South India, West India, East India)
7.3. By Company (2022)
7.4. Market Map
8. North India Cybersecurity Market Outlook
8.1. Market Size & Forecast
8.1.1. By Value
8.2. Market Share & Forecast
8.2.1. By Security Type
8.2.2. By Solution Type
8.2.3. By Deployment Mode
8.2.4. By End-User Industry
9. South India Cybersecurity Market Outlook
9.1. Market Size & Forecast
9.1.1. By Value
9.2. Market Share & Forecast
9.2.1. By Security Type
9.2.2. By Solution Type
9.2.3. By Deployment Mode
9.2.4. By End-User Industry
10. West India Cybersecurity Market Outlook
10.1. Market Size & Forecast
10.1.1. By Value
10.2. Market Share & Forecast
10.2.1. By Security Type
10.2.2. By Solution Type
10.2.3. By Deployment Mode
10.2.4. By End-User Industry
11. East India Cybersecurity Market Outlook
11.1. Market Size & Forecast
11.1.1. By Value
11.2. Market Share & Forecast
11.2.1. By Security Type
11.2.2. By Solution Type
11.2.3. By Deployment Mode
11.2.4. By End-User Industry
12. Market Dynamics
12.1. Drivers
12.2. Challenges
13. Market Trends and Developments
14. Company Profiles
14.1. Tata Consultancy Services
14.1.1. Business Overview
14.1.2. Key Revenue and Financials
14.1.3. Recent Developments
14.1.4. Key Personnel/Key Contact Person
14.1.5. Key Product/Services Offered
14.2. Wipro Limited
14.2.1. Business Overview
14.2.2. Key Revenue and Financials
14.2.3. Recent Developments
14.2.4. Key Personnel/Key Contact Person
14.2.5. Key Product/Services Offered
14.3. Larsen & Toubro Infotech Limited
14.3.1. Business Overview
14.3.2. Key Revenue and Financials
14.3.3. Recent Developments
14.3.4. Key Personnel/Key Contact Person
14.3.5. Key Product/Services Offered
14.4. HCL Technologies Limited
14.4.1. Business Overview
14.4.2. Key Revenue and Financials
14.4.3. Recent Developments
14.4.4. Key Personnel/Key Contact Person
14.4.5. Key Product/Services Offered
14.5. Info Edge India Limited
14.5.1. Business Overview
14.5.2. Key Revenue and Financials
14.5.3. Recent Developments
14.5.4. Key Personnel/Key Contact Person
14.5.5. Key Product/Services Offered
14.6. Tech Mahindra Limited
14.6.1. Business Overview
14.6.2. Key Revenue and Financials
14.6.3. Recent Developments
14.6.4. Key Personnel/Key Contact Person
14.6.5. Key Product/Services Offered
14.7. Cisco Systems, Inc.
14.7.1. Business Overview
14.7.2. Key Revenue and Financials
14.7.3. Recent Developments
14.7.4. Key Personnel/Key Contact Person
14.7.5. Key Product/Services Offered
14.8. Palo Alto Networks, Inc.
14.8.1. Business Overview
14.8.2. Key Revenue and Financials
14.8.3. Recent Developments
14.8.4. Key Personnel/Key Contact Person
14.8.5. Key Product/Services Offered
14.9. Fortinet, Inc.
14.9.1. Business Overview
14.9.2. Key Revenue and Financials
14.9.3. Recent Developments
14.9.4. Key Personnel/Key Contact Person
14.9.5. Key Product/Services Offered
14.10. FireEye, Inc.
14.10.1. Business Overview
14.10.2. Key Revenue and Financials
14.10.3. Recent Developments
14.10.4. Key Personnel/Key Contact Person
14.10.5. Key Product/Services Offered
15. Strategic Recommendations
16. About Us & Disclaimer