Table of Content
1 INTRODUCTION
1.1 Study Assumptions and Market Definition
1.2 Scope of the Study
2 RESEARCH METHODOLOGY
3 EXECUTIVE SUMMARY
4 MARKET INSIGHTS
4.1 Market Overview
4.2 Industry Value Chain Analysis
4.3 Industry Attractiveness - Porter’s Five Forces Analysis
4.3.1 Bargaining Power of Suppliers
4.3.2 Bargaining Power of Consumers
4.3.3 Threat of New Entrants
4.3.4 Intensity of Competitive Rivalry
4.3.5 Threat of Substitutes
4.4 Assessment of COVID-19 Impact on the Market
4.5 Analysis of Major Security Breaches at a Global and Regional Level
5 MARKET DYNAMICS
5.1 Market Drivers
5.1.1 Rapidly Increasing Cybersecurity Incidents and Regulations Requiring their Reporting
5.1.2 Growing M2M/IoT Connections Demanding Strengthened Cybersecurity in Enterprises
5.2 Market Challenge
5.2.1 Lack of Cybersecurity Professionals
5.2.2 High Reliance on Traditional Authentication Methods and Low Preparedness
5.3 Market Opportunities
5.3.1 Rise in Trends for IoT, BYOD, Artificial Intelligence, and Machine Learning in Cybersecurity
6 MARKET SEGMENTATION
6.1 By Product Type
6.1.1 Application Security
6.1.2 Cloud Security
6.1.3 Consumer Security Software
6.1.4 Data Security
6.1.5 Identity Access Management
6.1.6 Infrastructure Protection
6.1.7 Integrated Risk Management
6.1.8 Network Security Equipment
6.1.9 Other Solution Types
6.2 By Service
6.2.1 Professional
6.2.2 Managed
6.3 By Deployment
6.3.1 On-Premise
6.3.2 Cloud
6.4 By End-User Industry
6.4.1 BFSI
6.4.2 Healthcare
6.4.3 Aerospace and Defense
6.4.4 IT and Telecommunication
6.4.5 Government
6.4.6 Retail
6.4.7 Manufacturing
6.4.8 Other End-user Industries
7 COMPETITIVE LANDSCAPE
7.1 Company Profiles
7.1.1 AVG Technologies
7.1.2 Check Point Software Technologies Ltd?
7.1.3 Cisco Systems Inc.
7.1.4 Cyber Ark Software Ltd
7.1.5 Dell Technologies Inc.
7.1.6 FireEye Inc.
7.1.7 Fortinet Inc.
7.1.8 IBM Corporation
7.1.9 Imperva Inc.
8 INVESTMENT ANALYSIS
9 FUTURE OF THE MARKET