Enjoy complimentary customisation on priority with our Enterprise License!
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Components of IT Security
06.1.1 Network Security
06.1.2 Access Control
06.1.3 Business Continuity
06.1.4 Compliance
06.1.5 Confidentiality
06.1.6 Risk Assessment
06.2 Implementation of IT Security Solutions
06.2.1 On-Premise
06.2.2 Cloud-based
06.2.3 Hybrid
06.3 Regulations Against IT Security Threats
06.4 IT Security Breaches
06.4.1 IT Security Breaches in Enterprises 2010-2014
06.4.2 IT Security Breaches by Regions 2014
07. Market Landscape
07.1 Market Overview
07.2 Market Size and Forecast
07.3 Five Forces Analysis
08. Product Lifecycle Analysis
09. Cyber Insurance: A New Way to Curb Cyber Loss
10. Market Segmentation by Solutions
10.1 Global IT Security Spending Market by Solutions 2014-2019
10.2 Global IT Security Products Spending Market
10.2.1 Market Size and Forecast
10.3 Global IT Security Services Spending Market
10.3.1 Market Size and Forecast
11. Geographical Segmentation
11.1 Global IT Security Spending Market by Geographical Segmentation 2014-2019
11.1.1 Global IT Security Spending Market by Geographical Segmentation 2014-2019 (revenue)
11.1.2 IT Security Spending market in Americas
11.1.3 IT Security Spending market in EMEA
11.1.4 IT Security Spending market in APAC
12. Buying Criteria
13. Market Growth Drivers
14. Drivers and their Impact
15. Market Challenges
16. Impact of Drivers and Challenges
17. Market Trends
18. Trends and their Impact
19. Vendor Landscape
19.1 Competitive Scenario
19.2 Product Offerings
19.3 Competitive Analysis 2014
19.4 Other Prominent Vendors
20. Key Vendor Analysis
20.1 Check Point Software
20.1.1 Key Facts
20.1.2 Business Overview
20.1.3 Business Strategy
20.1.4 Recent Developments
20.1.5 SWOT Analysis
20.2 Cisco Systems
20.2.1 Key facts
20.2.2 Business overview
20.2.3 Business segmentation by revenue
20.2.4 Geographical segmentation by revenue
20.2.5 Business strategy
20.2.6 Key developments
20.2.7 SWOT analysis
20.3 EMC
20.3.1 Key Facts
20.3.2 Business Overview
20.3.3 Business Segmentation by Revenue 2013
20.3.4 Business Segmentation by Revenue 2012 and 2013
20.3.5 Geographical Segmentation by Revenue 2013
20.3.6 Business Strategy
20.3.7 Recent Developments
20.3.8 SWOT Analysis
20.4 Fortinet
20.4.1 Key Facts
20.4.2 Key Information
20.4.3 Business Overview
20.4.4 Business Segmentation by Revenue
20.4.5 Business Segmentation by Revenue
20.4.6 Geographical Segmentation by Revenue
20.4.7 Business Strategy
20.4.8 Recent Developments
20.4.9 SWOT Analysis
20.5 Juniper Networks
20.5.1 Key Facts
20.5.2 Business Overview
20.5.3 Business Segmentation
20.5.4 Business Segmentation by Revenue 2012 and 2013
20.5.5 Sales by Geography 2013
20.5.6 Business Strategy
20.5.7 Recent Developments
20.5.8 SWOT Analysis
20.6 McAfee
20.6.1 Key facts
20.6.2 Business overview
20.6.3 Product segmentation
20.6.4 Key locations
20.6.5 Business strategy
20.6.6 Recent developments
20.6.7 SWOT Analysis
20.7 Symantec
20.7.1 Key facts
20.7.2 Business overview
20.7.3 Business segmentation by revenue 2013
20.7.4 Business segmentation by revenue 2013 and 2014
20.7.5 Geographical segmentation by revenue 2013
20.7.6 Business strategy
20.7.7 Recent developments
20.7.8 SWOT analysis
20.8 Trend Micro
20.8.1 Key facts
20.8.2 Business overview
20.8.3 Geographical segmentation by revenue 2012 and 2013
20.8.4 Geographical segmentation by revenue 2013
20.8.5 Business strategy
20.8.6 Recent developments
20.8.7 SWOT analysis
21. Assumptions
22. Other Reports in this Series
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Cookie Policy
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.