Enjoy complimentary customisation on priority with our Enterprise License!
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Structure of NGFW
06.2 Deployment Options of NGFW
06.2.1 On-premises
06.2.2 Cloud-based
06.3 Types of Cyber-attacks
06.4 Advantages of NGFW
07. Market Landscape
07.1 Market Overview
07.1.1 Product Life Cycle of NGFW
07.2 Market Size and Forecast
07.3 Five Forces Analysis
08. Market Segmentation by End-users
08.1 Global NGFW Market by End-users 2014
08.2 Global NGFW Market by End-users 2014-2019
08.3 Global NGFW Market in Large Enterprises
08.3.1 Market Size and Forecast
08.4 Global NGFW Market in SMEs
08.4.1 Market Size and Forecast
08.5 Global NGFW Market by Government
08.5.1 Market Size and Forecast
09. Geographical Segmentation
09.1 Global NGFW Market by Geographical Segmentation 2014
09.2 Global NGFW Market by Geographical Segmentation 2014-2019
09.2.1 NGFW Market in Americas
09.2.2 NGFW Market in EMEA Region
09.2.3 NGFW Market in APAC Region
10. Market Attractiveness
10.1 Market Attractiveness by End-users
10.2 Market Attractiveness by Geographical Segmentation
11. Buying Criteria
12. Market Growth Drivers
13. Drivers and their Impact
14. Market Challenges
15. Impact of Drivers and Challenges
16. Market Trends
17. Trends and their Impact
18. Vendor Landscape
18.1 Competitive Scenario
18.2 Competitive Analysis
18.3 Other Prominent Vendors
19. Key Vendor Analysis
19.1 Check Point Software Technologies
19.1.1 Key Facts
19.1.2 Business Overview
19.1.3 Business Strategy
19.1.4 Recent Developments
19.1.5 SWOT Analysis
19.2 Cisco Systems
19.2.1 Key Facts
19.2.2 Business Overview
19.2.3 Business Segmentation by Revenue
19.2.4 Geographical Segmentation by Revenue
19.2.5 Business Strategy
19.2.6 Key Information
19.2.7 SWOT Analysis
19.3 Fortinet
19.3.1 Key Facts
19.3.2 Key Information
19.3.3 Business Overview
19.3.4 Business Segmentation by Revenue
19.3.5 Business Segmentation by Revenue
19.3.6 Geographical Segmentation by Revenue
19.3.7 Business Strategy
19.3.8 Recent Developments
19.3.9 SWOT Analysis
19.4 Juniper Networks
19.4.1 Key Facts
19.4.2 Business Overview
19.4.3 Business Segmentation
19.4.4 Business Segmentation by Revenue 2012 and 2013
19.4.5 Sales by Geography 2013
19.4.6 Business Strategy
19.4.7 Recent Developments
19.4.8 SWOT Analysis
19.5 McAfee
19.5.1 Key Facts
19.5.2 Business Overview
19.5.3 Product Segmentation
19.5.4 Key Locations
19.5.5 Business Strategy
19.5.6 Recent Developments
19.5.7 SWOT Analysis
19.6 Palo Alto Networks
19.6.1 Key Facts
19.6.2 Key Information
19.6.3 Business Overview
19.6.4 Business Segmentation by Revenue
19.6.5 Business Segmentation by Revenue
19.6.6 Geographical Segmentation by Revenue
19.6.7 Business Strategy
19.6.8 Recent Developments
19.6.9 SWOT Analysis
20. Assumptions
21. Other Reports in this Series
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Cookie Policy
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.