2017-02-20

NEW YORK, Feb. 20, 2017 /PRNewswire/ -- rt analyzes the worldwide markets for Cyber Security in US$ Million by the following Segments: Application Security, Content Security, Endpoint Security, Network Security, Services, and Others. Further, the End-Use sectors also analyzed include: Banking & Financial Sector, Public Sector & Aerospace, Medical Care Sector, Manufacturing Sector, IT & Telecom Sector, and Others. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World.

Read the full report: http://www.reportlinker.com/p04707121-summary/view-report.html

Annual estimates and forecasts are provided for the period 2015 through 2022. Also, a six-year historic analysis is provided for these markets. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs.

The report profiles 213 companies including many key and niche players such as:
- Avast Software
- Booz Allen Hamilton
- CA Technologies, Inc.
- Check Point Software Technologies Ltd.
- Cisco Systems, Inc.

Read the full report: http://www.reportlinker.com/p04707121-summary/view-report.html

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

Study Reliability and Reporting Limitations I-1 Disclaimers.............. I-2 Data Interpretation & Reporting Level I-2 Quantitative Techniques & Analytics I-3 Product Definitions and Scope of Study I-3 Application Security..............I-3 Content Security.............. I-3 Endpoint Security..............I-4 Network Security.............. I-4 Services.............. I-4 Others.............. I-4

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW.............. II-1 Internet & the Modern Digital Infrastructure II-1 Key Statistical Findings..............II-2 Table 1: Number of Internet Users (in Million) and Penetration Percentage for Years 2013 Through 2016 (includes corresponding Graph/Chart)..............II-2 Internet Opens Up a Range of Online Security Issues for Organizations, Brings Importance of 'Cyber Security' to the Forefront.............. II-2 Avoiding Unnecessary Costs - Key Rationale for Organizational Adoption of Cyber Security Solutions II-4 Table 2: Global Cost of Cyber Crime (in US$ Billion) for the Years 2015 & 2020 (includes corresponding Graph/Chart) II-4

Table 3: Distribution of Annual Costs Incurred for External Consequences of Cyber-Attacks on Global Companies in 2016 (includes corresponding Graph/Chart) II-5 Difficult Economic Environment Increases Cyber Crime Attacks - Magnifies the Business Case for Cyber Security II-5 Outlook.............. II-6 Developed Markets Lead from the Front But Developing Markets Turn Hotspots for Growth..............II-7 Table 4: Percentage Share Breakdown of Number of Cyber-Attacks by Region for the Year 2016 (includes corresponding Graph/Chart)..............II-8

Table 5: Percentage Share Breakdown of Number of Internet Users by Region for Years 2013 & 2016E (includes corresponding Graph/Chart)..............II-8 Competitive Landscape..............II-9 Table 6: Leading Players in the Global Network Security Market (2015): Percentage Share Breakdown of Revenues by Leading Players (includes corresponding Graph/Chart) II-9 Consolidation Wave in Cyber Security Market II-10 M&A Activity in Recent Times..............II-10

2. NOTEWORTHY TRENDS, GROWTH DRIVERS & ISSUES II-11 Major Trends & Growth Drivers..............II-11 Rise in Volume & Magnitude of Cyber Crime to Drive Increased Adoption of Cyber Security Solutions & Services II-11 Table 7: Most Common Forms of Cyber Attacks in Organizations Presented as a Percentage Share of Organizations Against the Type of Cyber Attacks They Experienced as of 2016 (includes corresponding Graph/Chart)..............II-13

Table 8: Percentage Share Breakdown of Number of Cyber-Attacks by Intent of Attack as of 2015 (includes corresponding Graph/Chart)..............II-13 Types of External IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence II-14 Types of Internal IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence II-14 Increasing Prevalence of Malware to Drive Robust Demand for Cyber Security Solutions & Services II-14 Trojan: Fastest Growing Data-Stealing Malware II-15 Table 9: World Malware on the Web (2015): Percentage Share Breakdown of Leading Countries Hosting Malware on the Web (includes corresponding Graph/Chart) II-15

Table 10: World Spam on the Web (2015): Percentage Share Breakdown of Leading Spam Relaying Countries (includes corresponding Graph/Chart)..............II-15 Hactivism on the Prowl - Creates Need for Efficient Cyber Security Solutions..............II-16 APTs Emerge as a New Sophisticated Threat II-16 Instances of Cyberterrorism to Strengthen Demand for Cyber Security Solutions & Services..............II-16 Security Threats from Virtualization & Cloud Infrastructure Deployments to Drive Demand for Cyber Security Solutions in Government & Private Organizations II-17 Table 11: Growing Proliferation of Cloud Computing: Percentage Share Breakdown of Cloud IT Spending As a Percentage of Total IT Infrastructure Spending 2015 & 2019 (includes corresponding Graph/Chart) II-18

Table 12: Global Virtualization Software Market (2015): Percentage Share Breakdown of Revenue by Geographic Region (includes corresponding Graph/Chart) II-19

Table 13: Attacks on Cloud Hosting Provider by Incident Classes (2015): Percentage Breakdown of Average Frequency of Attacks for Brute Force, Malware/Botnet, Web App Attack & Others (includes corresponding Graph/Chart) II-19 Inherent Security Challenges of Mobile Infrastructure Lends Traction to Cyber Security Market II-19 Table 14: Global Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Workers by Nature of Work (includes corresponding Graph/Chart) II-21

Table 15: Global Mobile Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Mobile Workers by Nature of Work (includes corresponding Graph/Chart) II-21 Phenomenal Rise of Social Networking Sites Drives Usage Case for Cyber Security Solutions II-22 IPv6 Boosts Adoption of Cyber Security Solutions and Services II-23 Regulatory Compliance Requirements Continues to Drive Demand for Cyber Security..............II-24 Government Sector - A Major Revenue Contributor II-24 Priority for Cyber Threat Listed by Country II-25 Growing Use of Cyber Security Solutions in Public Utilities for Securing Smart Grid Infrastructure II-25 Cyber Security Seeks New Opportunities in Defense Applications II-26 Private Organizations Lend Traction to Growth in Cyber Security Market.............. II-27 High Usage of Digital Platforms Makes Private Establishments Highly Vulnerable to Cyber Security Threats II-27 Cyber Security Turns into a Top Investment Priority for Businesses.............. II-28 Top Priority Malicious Elements Threatening Cyber Security in Enterprises: On a Scale 1 - 10 (10 - High Priority; 1 - Low Priority)..............II-29 Factors Affecting Implementation of Cyber Security Solutions by Enterprises Worldwide - Ranked in Order of Influence.............. II-29 Key Focus Areas for Enterprises in Implementation of Cyber Security in their Premises: Ranked in Order of Relative Importance.............. II-29 Cyber Security - A Critical Necessity in Banking and Finance Sector.............. II-30 Major External & Internal Breaches in Financial Services Sector.............. II-30 Top Security Initiatives by Industry Segment II-31 Mobile Banking Keeps Cyber Security Busy II-31 Mobile Banking Services: At a Glance II-31 Broker Dealers & Investment Advisers in Securities Market too Embrace Cyber Security Solutions II-31 Regulatory Compliance: A High Priority for Financial Institutions.............. II-32 Advanced Solutions Gain Traction in Financial Services Sector II-32 Key Barriers in Cyber Security for Financial Services Sector II-32 Telecommunication and IT..............II-33 DOS Attacks Threaten Mobile Network Security - Drive Demand for Cyber Security Solutions in Telecom Industry II-33 Overbilling Attack: A Business Case for Cyber Security Solutions in Telecom Industry II-33 VPN to Make Telecommunication Networks More Safer II-33 Opportunities for Wireless Network Security in Telecom Industry.............. II-33 Table 16: Worldwide Mobile Data Traffic by Device Type (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly Data Traffic Volume for Laptops, Non-Smartphones, Smartphones, Tablets, and Others (includes corresponding Graph/Chart).............. II-34

Table 17: Worldwide Mobile Data Traffic by Application (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly Data Traffic Volume for Data, File Sharing, M2M, and Video (includes corresponding Graph/Chart) II-35

Table 18: Worldwide Mobile Networks (2013 & 2018): Percentage Share Breakdown of Number of Connections by Type of Network Technology (includes corresponding Graph/Chart).............. II-35 Production Systems Also Seek Cyber Security II-36 Growing Demand in Healthcare Sector II-36 Small and Mid-Sized Businesses - A Lucrative Market Segment II-36 Key Issues.............. II-37 Major Restraints to Effective Cyber Security in Enterprises II-37 Inadequate Budget - The Key Constraint II-37 Lack of Comprehensive Security Solutions II-38 Lack of Alignment between Business Objectives and Security II-38 External Threats More Recognized than Internal Threats II-38 Most Organizations Continue to Remain Reactive Rather than Proactive.............. II-38 Availability of 'Freemium' and Free Products Niggles the Market II-39 Growing Sophistication & Complexity of Security Threats - A Challenge to Reckon With for Cyber Security Solution Providers.............. II-39 Stealthier Infiltration Methods Pose Challenges for Cyber Security.............. II-40 Advanced Security Solutions - The Need of the Hour II-41 Security Analytics to See Light in the Enterprise Sector II-41 Big Data Analytics Set to Storm the Cyber Security Market II-41 Convergence Gains Strength..............II-42 Vendors Come Up with Integrated Solutions to Stay Ahead II-42

3. A REVIEW OF KEY PRODUCT & SEGMENTS II-43 Network Security Solutions Market - The Largest Market Segment II-43 Security of Internal Network Infrastructure - A Key Necessity for Any Business..............II-43 Table 19: Global Network Security Market (2015): Percentage Share Breakdown of Revenues by Product Segment (includes corresponding Graph/Chart)..............II-44 Content Security - A Prominent Market Segment II-44 Secure Content Management Grows in Prominence II-45 Endpoint Security Maintains Steady Demand II-45 General Trends Underpinning the Endpoint Security Solutions Market.............. II-46 Tremendous Adoption of Mobile End-Points in Enterprises Make Enterprise Endpoint Security a Lucrative Market II-46 Application Security Market - A Review II-47 Robust Pace of Cloud & Mobile Infrastructure Deployments Make Cloud & Wireless Security Solutions Fastest Growing Product Categories.............. II-47 Table 20: Global Cloud Computing Services Market (2014, 2016, 2018 & 2020): Breakdown of Annual Revenue Figures in US$ Million & CAGR % by Region (includes corresponding Graph/Chart).............. II-48

Table 21: Robustly Growing Spending on Enterprise Mobility Projects Spurs the Convergence of Unified Communications With Mobile Platforms: Global Spending On Mobile Enterprise Infrastructure Software and Services (in US$ Million) by Geographic Region for the Years 2016 & 2020 (includes corresponding Graph/Chart)..............II-49

Table 22: Growing Mobile Worker Population Strengthens the Business Case for Mobile UCC Deployment: Breakdown of Global Mobile Worker Population (in Million) by Geographic Region for the Years 2010 & 2015 (includes corresponding Graph/Chart).............. II-49 BYOD Driven-Mobile Malware Enhances Need for Mobile Cyber Security in Private & Government Organizations II-50 Table 23: With a Projected 11.7% Increase in the Share of Corporate-Owned Tablets by 2018, BYOD Goes Mainstream Spurring Opportunities for Cyber Security Solutions: Global Percentage Breakdown of Installed Base of Corporate-Owned and Consumer Owned Tablets for the Years 2011, 2014 & 2017 (includes corresponding Graph/Chart) II-50

Table 24: Robust Penetration of BYOD Devices as Measured by the Per Capita Distribution of Connected Devices Per Knowledge Worker in Select Countries for the Year 2012 & 2015 (includes corresponding Graph/Chart) II-51 Cloud Technology: Optimally Positioned to Provide Cyber Security Solutions as 'Service' II-52 All Factors Point Towards Robust Demand for Cloud Based Cyber Security Solutions..............II-53 Dearth of Trained Staff and In-House Infrastructure to Boost Market Prospects for Cyber Security Services II-54 A Look into Key Opportunities for Select Categories of Cyber Security Solutions.............. II-55 Identity & Access Management Solutions II-55 IAM: A Key Security Initiative for Enterprises II-56 An Integral Part of Corporate Strategy II-57 Risk & Compliance Management..............II-57 Data Encryption Solutions Continue to Find Robust Demand II-57 E-mail Encryption Gathers Steam II-58 Demand for Messaging Security (E-mail Scanning) Will Continue to Rise.............. II-58 Growing Significance of Data Loss Protection II-58 Unified Threat Management (UTM) II-58 XTMs Emerge as More Potential Tool II-59 VPN Market on an Upswing..............II-59 Advanced Firewall Solutions to Boost Market Prospects II-59 Antivirus Software Continues to Call Shots II-60 Compliance Requirements Boost Security & Vulnerability Management Market.............. II-60 Diverse Delivery Systems for SVM Products II-60 Disaster Recovery Solutions Poised to Gain II-61 Internet Filtering Solutions: Protection at the Gateway II-61 Rise in Deployments of SSL-Encrypted Application II-61 Purchase Patterns Go Beyond Preventive Solutions to Planning & Detection Solutions..............II-62 Integrated Solutions - The New Trend II-62

4. PRODUCT OVERVIEW.............. II-63 Cyber Crime: An Introduction..............II-63 Cyber Crimes Against Individuals II-63 Cyber Crimes against Property II-63 Cyber Crimes against Government II-63 Types of Cyber Crimes..............II-64 Harassment through e-mails..............II-64 Cyber-stalking.............. II-64 Cyber Defamation.............. II-64 Indecent Exposure or Pornography II-64 Phishing.............. II-64 E-mail Spoofing.............. II-64 Intellectual Property Crime..............II-64 Computer Vandalism.............. II-64 Online Cheating and Fraud..............II-65 Electronic Money Laundering and Tax Evasion II-65 Cyber Trafficking..............II-65 Cyber Terrorism.............. II-65 Social Networking Site Scams..............II-65 Bot Networks.............. II-65 Methods of Committing Cyber Crime II-65 Theft of Electronically Stored Information II-65 Illegal Access of Computer System II-65 Email Bombing.............. II-65 Salami Attack.............. II-66 Data Diddling.............. II-66 Denial of Service Attack..............II-66 Logic Bombs.............. II-66 Worm and Virus Attacks..............II-66 Trojan Attack.............. II-66 Web Jacking.............. II-66 Internet Time Theft..............II-66 Damages Caused by Security Breaches II-67 Proprietary Information Destruction II-67 Disruption in Systems Performance II-67 Data/Application Damage or Corruption II-67 Types of Cyber Security Strategies II-67 Network Security Solutions & Services II-67 Endpoint Security Solutions & Services II-68 Application Security Solutions & Services II-68 Content Security Solutions & Services II-68 Other Security Solutions & Services II-69 Different Categories of Cyber Security Solutions II-69 Identity & Access Management Solutions II-69 Risk & Compliance Management Solutions II-69 Encryption Solutions..............II-70 Data Loss Protection (DLP) Solutions II-70 Types of DLP Systems..............II-70 Network DLP.............. II-70 Endpoint DLP.............. II-70 Unified Threat Management (UTM) II-70 Firewall.............. II-71 Major Firewall Types..............II-71 Packet Filter Firewall..............II-71 Stateful Packet Inspection Firewall II-71 Application Layer Gateways or Proxies II-72 Available Forms of Firewalls II-72 Software Firewalls..............II-72 Hardware Firewalls..............II-72 Firewall/VPN Appliances..............II-72 Anti-Virus/Anti-Malware Solutions II-72 Intrusion Detection System/ Intrusion Prevention System (IDS /IPS).............. II-72 Intrusion Detection/Prevention Appliances II-73 Intrusion Detection System (IDS) II-73 Types of IDS.............. II-73 Intrusion Prevention System (IPS) II-73 Security & Vulnerability Management II-74 Disaster Recovery..............II-74 Distributed Denial of Service (DDoS) Mitigation II-75 Web/Filtering.............. II-75 Different Categories of Cyber Security Services II-75 Consulting Services..............II-75 Implementation Services..............II-75 Risk and Threat Assessment Services II-76 Managed Services.............. II-76 Education and Training Services II-76

5. PRODUCT & SERVICE LAUNCHES..............II-77 Trend Micro Introduces XGen™ Endpoint Security II-77 Ethnos IT Solutions Launches Webroot Cloud-based Cybersecurity Solution (Nigeria).............. II-77 Kaspersky Lab Launches First Cybersecurity Index II-77 Booz Allen Introduces "Virtual Cloud Defense" Solution for Securing Application Workloads in the Public Cloud II-77 AVG Introduces its Next-Gen Products II-77 AVG Business Introduces Managed Workplace 9.2 II-77 BAE Systems Introduces Cloud-Based Cyber Security in Canada II-77 AVG Business Releases New AVG Business Managed Workplace Platform II-78 Razberi Technologies Launches LocBeri Cyber Security System for Video Surveillance..............II-78 NRI SecureTechnologies Introduces New Security Operation Center in US.............. II-78 AVG Introduces AVG Business Secure Sign-On for Small Businesses & Service Providers..............II-78 AVG Business Introduces VMware® ESXi Service Module II-78 Capgemini Group Introduces Cybersecurity Global Service Line II-78 Parsons Launches Cran™..............II-78 Skybox Security Rolls Out Skybox Risk Control 7.0 II-79 CSG International Launches CSG Invotas II-79 ESET Launches Improved ESET CyberSecurity and ESET CyberSecurity Pro..............II-79 DRDO Launches DHRUVA-3 High Performance Computing System II-79 Shape Security Rolls Out ShapeShifter Appliance II-79 Validian Unveils Update on Roll Out of Validian- Enabled Enterprise Applications..............II-79

6. RECENT INDUSTRY ACTIVITY..............II-80 Aon Set to Take Over Stroz Friedberg II-80 Symantec Chooses VMware AirWatch For Building Better Enhanced Security Integrations..............II-80 BSI Snaps Up Info-Assure..............II-80 Avast Completes Acquisition of AVG Technologies II-80 Volkswagen Establishes New Cybersecurity Company for Car Security II-80 Dell Completes Acquisition of EMC II-80 Wipro Acquires a Minor Stake in Insights Cyber Intelligence Limited.............. II-80 Investcorp to Take Over Up Nebulas II-81 Fortinet Enters into a Partnership Agreement with Korea Internet & Security Agency..............II-81 Symantec Closes Blue Coat Acquisition II-81 WISeKey & OpenLimit to Expand Cybersecurity Business II-81 Carbon Black Acquires Anti-Virus Company, Confer II-81 US Cyber Command Awards a Contract to Booz Allen Hamilton to Bolster Nation's Cyber Capabilities II-81 EU commission, Infineon & NXP Enter into a Cyber Security Agreement.............. II-81 Thales & Cisco Enter into a Cybersecurity Agreement II-81 Samsung Electronics America, & Booz Allen Hamilton Announce New Partnership.............. II-82 Aurionpro Snaps Up Spikes Security II-82 HARMAN Closes Acquisition of TowerSec Automotive Cyber Security II-82 Booz Allen Chosen by Department of Defense as Prime Awardee of $5 Billion IDIQ Cybersecurity and Information Systems Contract.............. II-82 Cisco Completes Acquisition of Portcullis II-82 Microsoft to Acquire Israel-based Secure Islands II-82 Conecta Enters into a Partnership with AVG in Brazil II-82 Cisco to Take Over Lancope..............II-83 Microsoft Signs Agreement with NATO to Strengthen European Cyber-Security.............. II-83 Triumfant Parters with Booz Allen Hamilton to Build New Predictive Intelligence Solutions for Tackling Cyber Threats II-83 Microsoft Set to buy Israeli Cybersecurity Firm Adallom II-83 Cisco Closes Acquisition of OpenDNS II-83 CyberArk Acquires Israeli Company, Cybertinel Ltd. II-83 Accenture Snaps Up FusionX..............II-83 Booz Allen Hamilton Partners with Trend Micro II-83 Northrop Grumman Collaborates with NEC Corporation II-84 F-Secure Snaps Up nSense..............II-84 Palo Alto Networks Snaps Up CirroSecure II-84 AVG Takes Over Privax..............II-84 Booz Allen Hamilton Bags an Order from Department of Homeland Security.............. II-84 Munich Re and Hewlett-Packard Join Forces II-84 Singtel Acquires Stake in Trustwave II-84 Deloitte & Verizon Team Up for Cyber Security II-84 PayPal Acquires CyActive..............II-84 BAE Systems Closes Acquisition of SilverSky II-85 PCCW Global Snaps Up Crypteia Networks II-85 AVG Acquires Location Labs..............II-85 Lockheed Martin Takes Over Industrial Defender II-85 Akamai Technologies Takes Over Prolexic Technologies II-85 Blackstone to Takeover Majority Stake in Accuvant II-85 Palo Alto Networks Takes Over Morta Security II-85 L-3 Communications Takes Over Data Tactics II-85 Google Takes Over Impermium..............II-86 FIS Teams Up with Microsoft to Fight Cybercrime II-86 Kaspersky Lab Unveils Interactive Cyberthreat Map II-86 Palo Alto Networks to Acquire Cyvera II-86

7. FOCUS ON SELECT PLAYERS..............II-87 Avast Software (Czech Republic)..............II-87 Booz Allen Hamilton (US)..............II-87 CA Technologies, Inc. (US)..............II-87 Check Point Software Technologies Ltd. (Israel) II-88 Cisco Systems, Inc. (US)..............II-88 CSC (US).............. II-89 Deloitte LLP (US).............. II-89 Forcepoint LLC. (US)..............II-90 F-Secure Corporation (Finland) II-90 IBM Corporation (US)..............II-90 Juniper Networks, Inc. (US)..............II-91 Kaspersky Lab (Russia)..............II-91 Lockheed Martin Corporation (US) II-92 McAfee, Inc. (US).............. II-92 Microsoft Corporation (US)..............II-93 Northrop Grumman Corp. (US)..............II-93 Panda Security (Spain)..............II-94 SafeNet, Inc (US).............. II-94 Sophos PLC (UK).............. II-94 Symantec Corporation (US)..............II-95 Trend Micro Incorporated (US)..............II-95 Utimaco Safeware AG (Germany)..............II-96

8. GLOBAL MARKET PERSPECTIVE..............II-97 Table 25: World Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-97

Table 26: World Historic Review for Cyber Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-98

Table 27: World 14-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-99

Table 28: World Recent Past, Current & Future Analysis for Application Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-100

Table 29: World Historic Review for Application Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-101

Table 30: World 14-Year Perspective for Application Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-102

Table 31: World Recent Past, Current & Future Analysis for Content Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-103

Table 32: World Historic Review for Content Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-104

Table 33: World 14-Year Perspective for Content Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-105

Table 34: World Recent Past, Current & Future Analysis for Endpoint Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-106

Table 35: World Historic Review for Endpoint Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-107

Table 36: World 14-Year Perspective for Endpoint Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-108

Table 37: World Recent Past, Current & Future Analysis for Network Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-109

Table 38: World Historic Review for Network Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-110

Table 39: World 14-Year Perspective for Network Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-111

Table 40: World Recent Past, Current & Future Analysis for Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-112

Table 41: World Historic Review for Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-113

Table 42: World 14-Year Perspective for Services by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-114

Table 43: World Recent Past, Current & Future Analysis for Others by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............II-115

Table 44: World Historic Review for Others by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) II-116

Table 45: World 14-Year Perspective for Others by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) II-117

Table 46: World Recent Past, Current & Future Analysis for Cyber Security by Sector - Banking & Financial Sector, Public Sector & Aerospace, Medical Care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) II-118

Table 47: World Historic Review for Cyber Security by Sector - Banking & Financial Sector, Public Sector & Aerospace, Medical Care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart)..............II-119

Table 48: World 14-Year Perspective for Cyber Security by Sector - Percentage Breakdown of Revenues for Banking & Financial Sector, Public Sector & Aerospace, Medical Care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart).............. II-120

III. MARKET

1. THE UNITED STATES.............. III-1 A.Market Analysis.............. III-1 Current & Future Analysis..............III-1 Overview.............. III-1 Table 49: US Cyber Security Market (2015): Percentage Share Breakdown of Number of Incidents in Critical Infrastructure Sectors (includes corresponding Graph/Chart) III-2 Opportunities for Cyber Security Solutions & Services in Private Sector - A Review..............III-2 Table 50: US Information Security Services Market in Private Sector (2015): Percentage Share Breakdown of Revenues by Key End-Use Industries (includes corresponding Graph/Chart).............. III-2 Banking/Financial Institutions: A Key End Use Industry III-3 Government Entities Continue to Invest Heavily in Cyber Security.............. III-3 Table 51: US Government Cyber Security Market (2015): Percentage Share Breakdown of Spending by Entity (includes corresponding Graph/Chart)..............III-4 The US Military Seeks Next-Generation Cyber Security Solutions for Telecom Networks III-4 Regulatory Environment..............III-4 Laws Governing the Data Security III-5 Demand for Cyber Security Experts Soars III-5 Product Launches..............III-6 Strategic Corporate Developments III-7 Key Players.............. III-11 B.Market Analytics..............III-18 Table 52: US Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-18

Table 53: US Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) III-19

Table 54: US 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-20

2. CANADA.............. III-21 A.Market Analysis.............. III-21 Current & Future Analysis..............III-21 Market Overview.............. III-21 Product Launch.............. III-21 B.Market Analytics..............III-22 Table 55: Canadian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-22

Table 56: Canadian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-23

Table 57: Canadian 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-24

3. JAPAN.............. III-25 A.Market Analysis.............. III-25 Current & Future Analysis..............III-25 Cyber Security Market - A Primer III-25 Highlights.............. III-25 Growing Demand for Cloud Infrastructure to Boost Market for Security Solutions..............III-26 Regulatory Environment..............III-26 Strategic Corporate Development III-26 B.Market Analytics..............III-27 Table 58: Japanese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-27

Table 59: Japanese Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-28

Table 60: Japanese 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-29

4. EUROPE.............. III-30 A.Market Analysis.............. III-30 Current & Future Analysis..............III-30 Market Overview.............. III-30 Cyber Security - High on Enterprise Priority III-30 Regulatory Environment..............III-31 B.Market Analytics..............III-32 Table 61: European Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart).............. III-32

Table 62: European Historic Review for Cyber Security by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) III-33

Table 63: European 14-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart)..............III-34

Table 64: European Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-35

Table 65: European Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-36

Table 66: European 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-37

4a. FRANCE.............. III-38 A.Market Analysis.............. III-38 Current & Future Analysis..............III-38 Market Overview.............. III-38 Product Launch.............. III-38 B.Market Analytics..............III-39 Table 67: French Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-39

Table 68: French Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-40

Table 69: French 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-41

4b. GERMANY.............. III-42 A.Market Analysis.............. III-42 Current & Future Analysis..............III-42 Market Overview.............. III-42 Strategic Corporate Developments III-42 A Key Player.............. III-43 B.Market Analytics..............III-44 Table 70: German Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-44

Table 71: German Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-45

Table 72: German 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-46

4c. ITALY.............. III-47 A.Market Analysis.............. III-47 Current & Future Analysis..............III-47 Market Overview.............. III-47 B.Market Analytics..............III-48 Table 73: Italian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-48

Table 74: Italian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-49

Table 75: Italian 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-50

4d. THE UNITED KINGDOM..............III-51 A.Market Analysis.............. III-51 Current & Future Analysis..............III-51 Market Overview.............. III-51 Strategic Corporate Developments III-51 A Key Player.............. III-52 B.Market Analytics..............III-53 Table 76: UK Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-53

Table 77: UK Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart) III-54

Table 78: UK 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-55

4e. SPAIN.............. III-56 A.Market Analysis.............. III-56 Current & Future Analysis..............III-56 A Key Player.............. III-56 B.Market Analytics..............III-57 Table 79: Spanish Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-57

Table 80: Spanish Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-58

Table 81: Spanish 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-59

4f. RUSSIA.............. III-60 A.Market Analysis.............. III-60 Current & Future Analysis..............III-60 Product Launch.............. III-60 Strategic Corporate Development III-60 A Key Player.............. III-60 B.Market Analytics..............III-62 Table 82: Russian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-62

Table 83: Russian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-63

Table 84: Russian 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-64

4g. REST OF EUROPE.............. III-65 A.Market Analysis.............. III-65 Current & Future Analysis..............III-65 Product Launches..............III-65 Strategic Corporate Developments III-66 Key Players.............. III-67 B.Market Analytics..............III-68 Table 85: Rest of Europe Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-68

Table 86: Rest of Europe Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-69

Table 87: Rest of Europe 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-70

5. ASIA-PACIFIC.............. III-71 A.Market Analysis.............. III-71 Current & Future Analysis..............III-71 Market Overview.............. III-71 Web Security Gains Prominence..............III-72 Large Enterprises Dominate Web Security Market with High Investments.............. III-72 B.Market Analytics..............III-73 Table 88: Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-73

Table 89: Asia-Pacific Historic Review for Cyber Security by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-74

Table 90: Asia-Pacific 14-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart).............. III-75

Table 91: Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-76

Table 92: Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-77

Table 93: Asia-Pacific 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-78

5a. CHINA.............. III-79 A.Market Analysis.............. III-79 Current & Future Analysis..............III-79 Market Overview.............. III-79 Regulatory Overview..............III-80 B.Market Analytics..............III-81 Table 94: Chinese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-81

Table 95: Chinese Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-82

Table 96: Chinese 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-83

5b. INDIA.............. III-84 A.Market Analysis.............. III-84 Current & Future Analysis..............III-84 Market Overview.............. III-84 Impact of Cyber Crimes on Indian Companies III-85 The Indian Security Market..............III-85 India Eyes Indigenous Expertise in Cyber Security III-85 Indian Anti-Virus Market..............III-86 Product Launch.............. III-86 A Key Player.............. III-86 B.Market Analytics..............III-87 Table 97: Indian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart)..............III-87

Table 98: Indian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-88

Table 99: Indian 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-89

5c. REST OF ASIA-PACIFIC..............III-90 A.Market Analysis.............. III-90 Current & Future Analysis..............III-90 Strategic Corporate Development III-90 B.Market Analytics..............III-91 Table 100: Rest of Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-91

Table 101: Rest of Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart)..............III-92

Table 102: Rest of Asia-Pacific 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-93

6. LATIN AMERICA.............. III-94 A.Market Analysis.............. III-94 Current & Future Analysis..............III-94 Network Security Market Shows Steady Growth III-94 Banking & Finance: The Major End-Use Segment for Network Security.............. III-95 B.Market Analytics..............III-95 Table 103: Latin American Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-95

Table 104: Latin American Historic Review for Cyber Security by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-96

Table 105: Latin American 14-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-97

Table 106: Latin American Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-98

Table 107: Latin American Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-99

Table 108: Latin American 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-100

6a. BRAZIL.............. III-101 A.Market Analysis.............. III-101 Strategic Corporate Development III-101 B.Market Analytics..............III-102 Table 109: Brazilian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-102

Table 110: Brazilian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-103

Table 111: Brazilian 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-104

6b. REST OF LATIN AMERICA..............III-105 Market Analysis.............. III-105 Table 112: Rest of Latin America Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-105

Table 113: Rest of Latin America Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart)..............III-106

Table 114: Rest of Latin America 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-107

7. REST OF WORLD.............. III-108 A.Market Analysis.............. III-108 Current & Future Analysis..............III-108 Security Software Market in Gulf States on the Rise III-108 Product Launch.............. III-108 Strategic Corporate Development III-108 A Key Player.............. III-109 B.Market Analytics..............III-111 Table 115: Rest of World Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2015 through 2022 (includes corresponding Graph/Chart) III-111

Table 116: Rest of World Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2014 (includes corresponding Graph/Chart).............. III-112

Table 117: Rest of World 14-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2009, 2016 & 2022 (includes corresponding Graph/Chart) III-113

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 213 (including Divisions/Subsidiaries - 233)

The United States (112) Canada (4) Japan (8) Europe (70) - France (3) - Germany (9) - The United Kingdom (30) - Spain (1) - Rest of Europe (27) Asia-Pacific (Excluding Japan) (31) Middle East</span

Show more