1. Market Research
  2. > IT Services
  3. > Hosting Market Trends
  4. > Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response

Report Details
This new report offers comprehensive analysis of enterprise endpoint cyber security solutions and related companies. Visiongain assesses that the enterprise endpoint cyber security market will reach $4.98bn in 2015.

Visiongain’s report will ensure that you keep informed and ahead of your competitors. Gain that competitive advantage.

The report will answer questions such as:
- How is the Enterprise Endpoint Cyber Security market evolving?
- What is driving and restraining Enterprise Endpoint Cyber Security market dynamics?
- How will each Enterprise Endpoint Cyber Security submarket segment grow over the forecast period and how much revenue will these submarkets account for in 2020?
- How will market shares of each Enterprise Endpoint Cyber Security submarket develop from 2015-2020?
- Which individual technologies will prevail and how will these shifts be responded to?
- Which Enterprise Endpoint Cyber Security submarket will be the main driver of the overall market from 2015-2020?
- How will political and regulatory factors influence regional Enterprise Endpoint Cyber Security markets and submarkets?
- Will leading national Enterprise Endpoint Cyber Security markets broadly follow macroeconomic dynamics, or will individual country sectors outperform the rest of the economy?
- How will market shares of the regional markets change by 2020 and which regions will lead the market in 2020?
- Who are the leading players and what are their prospects over the forecast period?
- How will the sector evolve as alliances form during the period between 2015 and 2020?

5 Reasons why you must order and read this report today:

1) The report provides the market share and detailed profiles of 13 leading companies operating within the Enterprise Endpoint Cyber Security market:
- Cisco
- EMC
- ESET
- FireEye
- Intel
- IBM
- Kaspersky
- Microsoft
- Palo Alto Networks
- Raytheon
- Sophos
- Symantec
- Trend Micro

2) The study reveals where and how companies are investing in the enterprise endpoint security. We show you the prospects for the following regions:
- Asia-Pacific
- Europe
- Latin America
- Middle-East & Africa
- North America

3) The analysis is also underpinned by our exclusive interviews with leading experts
- Raj Samani, Vice President, Chief Technology Officer, Intel Security
- Michael Applebaum, Vice President of Marketing, Invincea
- Todd Weller, Vice President of Corporate Development & Marketing, Hexis Cyber Solutions

4) Our overview and analyses these technologies from 2015-2020
- Endpoint Protection
- Endpoint Detection and Response
- Next-Generation Endpoint Security

Competitive advantage
This independent, 286 pages, report guarantees you will remain better informed than your competitors. With 299 tables, figures and chart examining the enterprise endpoint cyber security market space, the report gives you an immediate, one-stop breakdown of your market, keeping your knowledge that one step ahead of your rivals.

Who should read this report?
- Anyone within the enterprise endpoint cyber security value chain.
- CEO’s
- COO’s
- CIO’s
- CTO’s
- Business development managers
- Marketing managers
- Technologists
- Suppliers
- Investors
- Banks
- Government agencies
- Contractors

How will you benefit from this report?
- This report you will keep your knowledge base up to speed. Don’t get left behind
- This report will allow you to reinforce strategic decision decision-making based upon definitive and reliable market data
- You will learn how to exploit new technological trends
- You will be able to realise your company’s full potential within the market
- You will better understand the competitive landscape and identify potential new business opportunities & partnerships

Don’t miss out
This report is essential reading for you or anyone in the cyber security sector with an interest in endpoint security. Purchasing this report today will help you to recognise those important market opportunities and understand the possibilities there. Order the Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response report now. We look forward to receiving your order.

Table Of Contents

Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies and Solutions for Endpoint Protection, Detection and Response
Table of Contents
1. Report Overview
1.1 Global Enterprise Endpoint Security Market Overview
1.2 Global Enterprise Endpoint Security Market Segmentation
1.3 Why You Should Read This Report
1.4 How This Report Delivers
1.5 Key Questions Answered by This Analytical Report Include:
1.6 Who is This Report For?
1.7 Methodology
1.7.1 Primary Research
1.7.2 Secondary Research
1.7.3 Market Evaluation and Forecasting Methodology
1.8 Frequently Asked Questions (FAQ)
1.9 Associated Visiongain Reports
1.10 About Visiongain

2. Introduction to the Enterprise Endpoint Security Market
2.1 Global Enterprise Endpoint Security Market Structure
2.2 Enterprise Endpoint Security Market Landscape
2.2.1 Enterprise Endpoint Security Market Definition
2.2.2 The Increasing Importance of Endpoint Security
2.2.3 The Global Cyber Threats to Enterprises
2.2.4 Most Common Methods of Cyber Attacks
2.2.5 Main Objectives of Cyber Attackers
2.2.6 Most Important Mechanisms of Cyber Attacks
2.2.7 Stage of Cyber Attacks

3. Global Enterprise Endpoint Security Market 2015-2020
3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020
3.2 Global Enterprise Endpoint Security Drivers and Restraints 2015
3.2.1 Global Enterprise Endpoint Security Market Drivers 2015
3.2.1.1 The Sophistication of Threats towards Endpoints
3.2.1.2 The Changes in Communicating
3.2.1.3 The Evolution of Business Operating
3.2.1.3.1 Cloudification
3.2.1.3.2 Mobility
3.2.1.3.3 BYOD
3.2.1.4 The Explosion of New Internet-Connected Devices
3.2.2 Global Enterprise Endpoint Security Market Restraints 2015
3.2.2.1 The Costs
3.2.2.2 The Underestimated Threats
3.2.2.3 The Customer Confusion

4. Global Enterprise Endpoint Security Submarket 2015-2025
4.1 Analysis of the Enterprise Endpoint Security Market through its Technologies
4.1.1 Antimalware
4.1.1.1 Signature-Based Detection
4.1.1.2 Heuristics Detection
4.1.1.3 Data Mining Detection
4.1.2 Firewall
4.1.2.1 Packet-Filter firewalls
4.1.2.2 Stateful firewall
4.1.2.3 Application-layer firewalls
4.1.2.4 Proxy Firewalls
4.1.2.5 Next Generation Firewalls
4.1.3 Intrusion Detection System
4.1.3.1 Host-Based Intrusion Detection System
4.1.3.2 Network-Based Intrusion Detection System
4.1.4 Intrusion Prevention System
4.1.5 Encryption
4.1.5.1 Symmetric Encryption
4.1.5.2 Asymmetric Encryption
4.1.6 Configuration Management
4.1.7 Mobile Device Management
4.1.8 Data Loss Prevention
4.1.9 Application Control
4.1.10 Computer Intrusion Detector
4.2 Analysis of the Enterprise Endpoint Security Market through its Solutions
4.2.1 Endpoint Protection Definition
4.2.2 Endpoint Detection and Response Definition
4.2.3 Next Generation Endpoint Security Definition
4.3 Enterprise Endpoint Security Submarket Analysis

5. Regional Enterprise Endpoint Security Market Forecast 2015-2020
5.1 Regional Enterprise Endpoint Security Market Share Forecast 2015-2020
5.2 Asia-Pacific Enterprise Endpoint Security Market Forecast 2015-2020
5.2.1 Asia-Pacific Enterprise Endpoint Security Market Analysis
5.2.1.1 Asia-Pacific Economic Overview
5.2.1.2 Asia-Pacific Digital Penetration Overview
5.2.1.3 Asia-Pacific Cyber Attacks Overview
5.2.1.4 The Enterprise Endpoint Security Market in Asia-Pacific
5.2.2 Asia-Pacific Enterprise Endpoint Security Market Drivers and Restraints
5.3 Europe Enterprise Endpoint Security Market Forecast 2015-2020
5.3.1 European Enterprise Endpoint Security Market Analysis
5.3.1.1 European Economic Overview
5.3.1.2 European Digital Penetration Overview
5.3.1.3 European Cyber Attacks Overview
5.3.1.4 The Enterprise Endpoint Security Market in Europe
5.3.2 European Enterprise Endpoint Security Market Drivers and Restraints
5.4 Latin America Enterprise Endpoint Security Market Forecast 2015-2020
5.4.1 Latin America Enterprise Endpoint Security Market Analysis
5.4.1.1 Latin America Economy Overview
5.4.1.2 Latin America Digital Penetration Overview
5.4.1.3 Latin America Cyber Attacks Overview
5.4.1.4 The Enterprise Endpoint Security Market in Latin America
5.4.2 Latin America Enterprise Endpoint Security Market Drivers and Restraints
5.5 Middle East and Africa Enterprise Endpoint Security Market Forecast 2015-2020
5.5.1 Middle-East and Africa Enterprise Endpoint Security Market Analysis
5.5.1.1 Middle-East and Africa Economic Overview
5.5.1.2 Middle-East and Africa Digital Penetration Overview
5.5.1.3 Middle-East and Africa Cyber Attacks Overview
5.5.1.4 The Enterprise Endpoint Security Market in the Middle-East and Africa
5.5.2 Middle East and Africa Enterprise Endpoint Security Market Drivers and Restraints
5.6 North America Enterprise Endpoint Security Market Forecast 2015-2020
5.6.1 North America Enterprise Endpoint Security Market Analysis
5.6.1.1 North America Economy Overview
5.6.1.2 North America Digital Penetration Overview
5.6.1.3 North America Cyber Attacks Overview
5.6.1.4 The Enterprise Endpoint Security Market in the North American
5.6.2 North America Enterprise Endpoint Security Market Drivers and Restraints

6. SWOT Analysis of the Enterprise Endpoint Security Market 2015-2020

7. Expert Opinion
7.1 Michael Applebaum, Vice President of Marketing, Invincea
7.1.1 View of Invincea on the Endpoint Security Market
7.2 Todd Weller, Vice President of Corporate Development and Marketing, Hexis Cyber Solutions
7.2.1 Hexis Cyber Solutions' view on the Endpoint Security Market
7.2.2 Presence of Hexis Cyber Solutions in the Endpoint Security Market
7.3 Raj Samani, Vice President, Chief Technology Officer, Intel Security
7.3.1 Intel Security's view on the Endpoint Security Market
7.3.2 Presence of Intel Security in the Endpoint Security Market

8. Leading 13 Enterprise Endpoint Security Companies
8.1 Leading 13 Enterprise Endpoint Security Companies Revenue Share Analysis 2015
8.2 Cisco
8.2.1 Cisco Total Company Sales 2008-2015
8.2.2 Cisco Net Profit 2010-2015
8.2.3 Cisco Capital Expenditure 2012-2015
8.2.4 Cisco Cost of Research and Development 2010-2015
8.2.5 Cisco Sales by Segment of Business 2010-2015
8.2.6 Cisco Regional Emphasis / Focus
8.2.7 Cisco Organisational Structure / Subsidiaries / Number of Employees
8.2.8 Cisco Mergers and Acquisitions (MandA) Activity
8.2.9 Cisco's Role in the Enterprise Endpoint Security Market
8.3 EMC
8.3.1 EMC Total Company Sales 2008-2014
8.3.2 EMC Net Profit 2010-2014
8.3.3 EMC Capital Expenditure 2010-2014
8.3.4 EMC Cost of Research and Development 2010-2014
8.3.5 EMC Sales by Segment of Business 2010-2014
8.3.6 EMC Regional Emphasis / Focus
8.3.7 EMC Organisational Structure / Subsidiaries / Number of Employees
8.3.8 EMC Mergers and Acquisitions (MandA) Activity
8.3.9 EMC's Role in the Enterprise Endpoint Security Market
8.4 ESET
8.4.1 ESET Total Company Sales 2013-2015
8.4.2 ESET Regional Emphasis / Focus
8.4.3 ESET Mergers and Acquisitions (MandA) Activity
8.4.4 ESET's Role in the Enterprise Endpoint Security Market
8.5 FireEye, Inc.
8.5.1 FireEye Total Company Sales 2009-2014
8.5.2 FireEye Net Loss 2010-2014
8.5.3 FireEye Cost of Research and Development 2010-2014
8.5.4 FireEye Sales by Segment of Business 2009-2014
8.5.6 FireEye Regional Emphasis / Focus
8.5.7 FireEye Organisational Structure / Subsidiaries / Number of Employees
8.5.8 FireEye Mergers and Acquisitions (MandA) Activity
8.5.9 FireEye's Role in the Enterprise Endpoint Security Market
8.6 Intel Corporation
8.6.1 Intel Corporation Total Company Sales 2008-2014
8.6.2 Intel Corporation Net Profit 2010-2014
8.6.3 Intel Corporation Capital Expenditure 2009-2013
8.6.4 Intel Corporation Cost of Research and Development 2010-2014
8.6.5 Intel Corporation Sales by Segment of Business 2010-2014
8.6.6 Intel Corporation Regional Emphasis / Focus
8.6.7 Intel Corporation Organisational Structure / Subsidiaries / Number of Employees
8.6.8 Intel Corporation Mergers and Acquisitions (MandA) Activity
8.6.9 Intel Corporation's Role in the Enterprise Endpoint Security Market
8.7 International Business Machines (IBM) Corporation
8.7.1 IBM Total Company Sales 2008-2014
8.7.2 IBM Net Profit 2010-2014
8.7.3 IBM Capital Expenditure 2008-2014
8.7.4 IBM Cost of Research and Development 2010-2014
8.7.5 IBM Sales by Segment of Business 2010-2014
8.7.6 IBM Regional Emphasis / Focus
8.7.7 IBM Organisational Structure / Subsidiaries / Number of Employees
8.7.8 IBM Mergers and Acquisitions (MandA) Activity
8.7.9 IBM's Role in the Enterprise Endpoint Security Market
8.8 Kaspersky Lab
8.8.1 Kaspersky Lab Total Company Sales 2008-2014
8.8.2 Kaspersky Lab Regional Emphasis / Focus
8.8.3 Kaspersky Lab Organisational Structure / Subsidiaries
8.8.4 Kaspersky Lab Mergers and Acquisitions (MandA) Activity
8.8.5 Kaspersky‘s Role in the Enterprise Endpoint Security Market
8.9 Microsoft Corporation
8.9.1 Microsoft Total Company Sales 2008-2015
8.9.2 Microsoft Net Profit 2010-2015
8.9.3 Microsoft Cost of Research and Development 2010-2015
8.9.4 Microsoft Sales by Segment of Business 2012-2014
8.9.5 Microsoft Regional Emphasis / Focus
8.9.6 Microsoft Organisational Structure / Subsidiaries / Number of Employees
8.9.7 Microsoft Mergers and Acquisitions (MandA) Activity
8.9.8 Microsoft's Role in the Enterprise Endpoint Security Market
8.10 Palo Alto Networks
8.10.1 Palo Alto Networks Total Company Sales 2008-2015
8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015
8.10.3 Palo Alto Networks Capital Expenditure 2010-2012
8.10.4 Palo Alto Networks Cost of Research and Development 2010-2015
8.10.5 Palo Alto Networks Sales by Segment of Business 2010-2015
8.10.6 Palo Alto Networks Regional Emphasis / Focus
8.10.7 Palo Alto Networks Organisational Structure / Subsidiaries / Number of Employees
8.10.8 Palo Alto Networks Mergers and Acquisitions (MandA) Activity
8.10.9 Palo Alto Networks' Role in the Enterprise Endpoint Security Market
8.11 Raytheon
8.11.1 Raytheon Total Company Sales 2005-2014
8.11.2 Raytheon Net Profit 2005-2014
8.11.3 Raytheon Capital Expenditure 2005-2014
8.11.4 Raytheon Cost of Research and Development 2010-2014
8.11.5 Raytheon Sales by Segment of Business 2008-2014
8.11.6 Raytheon Regional Emphasis / Focus
8.11.7 Raytheon Organisational Structure / Subsidiaries / Number of Employees
8.11.8 Raytheon Mergers and Acquisitions (MandA) Activity
8.11.9 Raytheon's Role in the Enterprise Endpoint Security Market
8.12 Sophos
8.12.1 Sophos Total Company Sales 2013-2015
8.12.2 Sophos Net Loss 2013-2015
8.12.3 Sophos Capital Expenditure 2013-2015
8.12.4 Sophos Cost of Research and Development 2013-2015
8.12.5 Sophos Sales by Segment of Business 2013-2015
8.12.6 Sophos Regional Emphasis / Focus
8.12.7 Sophos Organisational Structure / Subsidiaries / Number of Employees
8.12.8 Sophos Mergers and Acquisitions (MandA) Activity
8.12.9 Sophos' Role in the Enterprise Endpoint Security Market
8.13 Symantec Corporation
8.13 1 Symantec Total Company Sales 2008-2015
8.13.2 Symantec Net Profit 2010-2015
8.13.3 Symantec Capital Expenditure 2008-2015
8.13.4 Symantec Cost of Research and Development 2010-2015
8.13.5 Symantec Sales by Segment of Business 2014-2015
8.13.6 Symantec Regional Emphasis / Focus
8.13.7 Symantec Organisational Structure / Subsidiaries / Number of Employees
8.13.8 Symantec Mergers and Acquisitions (MandA) Activity
8.13.9 Symantec's Role in the Enterprise Endpoint Security Market
8.14 Trend Micro
8.14.1 Trend Micro Total Company Sales 2008-2014
8.14.2 Trend Micro Net Profit 2010-2014
8.14.3 Trend Micro Cost of Research and Development 2011-2014
8.14.4 Trend Micro Regional Emphasis / Focus
8.14.5 Trend Micro Organisational Structure / Subsidiaries
8.14.6 Trend Micro Mergers and Acquisitions (MandA) Activity
8.14.7 Trend Micro's Role in the Enterprise Endpoint Security Market

9. Conclusions and Recommendations
9.1 Enterprise Endpoint Security Conclusion
9.2 Enterprise Endpoint Security Recommendations

10. Glossary

List of Tables
2015-2020 (US$m, AGR%, Cumulative)
Table 1.2 Example of Leading National Enterprise Endpoint Security Market Forecast by Submarket 2015-2020 (US$m, AGR%, Cumulative)
Table 2.1 Methods of Cyber Attacks (Type, Description)
Table 2.2 Objectives of Cyber Attackers (Type, Description)
Table 2.3 Mechanisms of Cyber Attacks (Type, Description)
Table 3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.1 Regional Enterprise Endpoint Security Market Overview (GDP Growth %, Internet Users m, Internet Penetration %, Smartphone Penetration %)
Table 5.2 Regional Enterprise Endpoint Security Market Forecast 2015-2020 (Sales US$m, AGR%, Cumulative)
Table 5.3 Regional Enterprise Endpoint Security Market CAGR Forecast 2015-2020 (CAGR%)
Table 5.4 Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change)
Table 5.5 Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.6 Asia-Pacific Major Cyber Attacks 2006-2015 (Attack, Country, Description)
Table 5.7 Asia-Pacific Enterprise Endpoint Security Market Drivers and Restraints 2015
Table 5.8 Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.9 Europe Major Cyber Attacks 2007-2015 (Attacks Country, Description)
Table 5.10 European Enterprise Endpoint Security Market Drivers and Restraints 2015
Table 5.11 Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.12 Latin America Major Cyber Attacks 2010-2014 (Attack, Country, Description)
Table 5.13 Latin America Enterprise Endpoint Security Market Drivers and Restraints 2015
Table 5.14 Middle East and Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.15 Middle East and Africa Major Cyber Attacks 2010-2015 (Attack, Country, Description)
Table 5.16 Latin America Enterprise Endpoint Security Market Drivers and Restraints 2015
Table 5.17 North America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.18 North America Major Cyber Attacks 2005-2015 (Attack, Country, Description)
Table 5.19 North America Enterprise Endpoint Security Market Drivers and Restraints 2015
Table 6.1 Global Enterprise Endpoint Security Market SWOT Analysis 2015-2020
Table 8.1 Leading 15 Enterprise Endpoint Security Companies Sales Share 2015 (Rank, Company, Total Company Sales US$m, Sales in the Market US$m, Share of Total Company Sales from Sales in the Market %, Share of the Global Market %, Primary Market Specialisation)
Table 8.2 Cisco Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.2.1 Cisco Total Company Sales 2008-2015 ($m, AGR %)
Table 8.2.2 Cisco Net Profit 2010-2015 (US$m, AGR%)
Table 8.2.3 Cisco Capital Expenditure 2012-2015 (US$m, AGR%)
Table 8.2.4 Cisco Cost of Research and Development 2010-2015 (US$m, AGR%)
Table 8.2.5 Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%)
Table 8.2.6 Cisco Sales by Geographical Location 2010-2015 (US$m, AGR%)
Table 8.2.7 Cisco Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.2.8 Cisco Number of Employees 2012-2015 (No. of Employees, AGR%)
Table 8.2.9 Cisco Recent Acquisitions 2013-2015 (Date, Details)
Table 8.3 EMC Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, Submarket Involvement, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.3.1 EMC Total Company Sales 2008-2014 ($m, AGR %)
Table 8.3.2 EMC Net Profit 2010-2014 (US$m, AGR%)
Table 8.3.3 EMC Capital Expenditure 2010-2014 (US$m, AGR%)
Table 8.3.4 EMC Cost of Research and Development 2010-2014 (US$m, AGR%)
Table 8.3.5 EMC Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 8.3.6 EMC Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 8.3.7 EMC Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.3.8 EMC Number of Employees 2010-2014 (No. of Employees, AGR%)
Table 8.3.9 EMC Recent Acquisitions 2004-2015 (Date, Details)
Table 8.3.10 EMC Divestitures 2015 (Date, Details)
Table 8.3.11 EMC Mergers/Partnerships 2015 (Date, Details)
Table 8.4 ESET Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, No. of Employees, Website)
Table 8.4.1 ESET Total Company Sales 2013-2015 ($m, AGR %)
Table 8.4.2 ESET International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.4.3 ESET Acquisition 2015 (Date, Details)
Table 8.5 FireEye Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.5.1 FireEye Total Company Sales 2009-2014 ($m, AGR %)
Table 8.5.2 FireEye Net Loss 2010-2014 (US$m, AGR%)
Table 8.5.3 FireEye Cost of Research and Development 2010-2014 (US$m, AGR%)
Table 8.5.4 FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%)
Table 8.5.5 FireEye Sales by Geographical Location 2011-2014 (US$m, AGR%)
Table 8.5.6 FireEye Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.5.7 FireEye Number of Employees 2011-2014 (No. of Employees, AGR%)
Table 8.5.8 FireEye Recent Acquisitions 2013-2014 (date, Details)
Table 8.6 Intel Corporation Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, Ticker, Website)
Table 8.6.1 Intel Corporation Total Company Sales 2008-2014 ($m, AGR %)
Table 8.6.2 Intel Corporation Net Profit 2010-2014 (US$m, AGR%)
Table 8.6.3 Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%)
Table 8.6.4 Intel Corporation Cost of Research and Development 2010-2014 (US$m, AGR%)
Table 8.6.5 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 8.6.6 Intel Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 8.6.7 Intel Corporation Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.6.8 Intel Corporation Number of Employees 2010-2014 (No. of Employees, AGR%)
Table 8.6.9 Intel Corporation Recent Acquisitions 2007-2015 (Date, Details)
Table 8.6.10 Intel Corporation Divestiture 2015 (Date, Details)
Table 8.7 IBM Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.7.1 IBM Total Company Sales 2008-2014 ($m, AGR %)
Table 8.7.2 IBM Net Profit 2010-2014 (US$m, AGR%)
Table 8.7.3 IBM Capital Expenditure 2008-2014 (US$m, AGR%)
Table 8.7.4 IBM Cost of Research and Development 2010-2014 (US$m, AGR%)
Table 8.7.5 IBM Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 8.7.6 IBM Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 8.7.7 IBM Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.7.8 IBM Number of Employees 2010-2014 (No. of Employees, AGR%)
Table 8.7.9 IBM Recent Acquisitions 2013-2015 (Date, Details)
Table 8.7.10 IBM Recent Divestiture 2014 (Date, Details)
Table 8.8 Kaspersky Lab Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, Website)
Table 8.8.1 Kaspersky Lab Total Company Sales 2008-2014 ($m, AGR %)
Table 8.8.2 Kaspersky Lab Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.8.3 Kaspersky Lab Acquisitions 2005-2012 (Date, Details)
Table 8.8.4 Kaspersky Lab Divestiture 2011 (Date, Details)
Table 8.9 Microsoft Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.9.1 Microsoft Total Company Sales 2008-2015 ($m, AGR %)
Table 8.9.2 Microsoft Net Profit 2010-2015 (US$m, AGR%)
Table 8.9.3 Microsoft Cost of Research and Development 2010-2015 (US$m, AGR%)
Table 8.9.4 Microsoft Sales by Segment of Business 2012-2014 (US$m, AGR%)
Table 8.9.5 Microsoft Sales by Geographical Location 2008-2015 (US$m, AGR%)
Table 8.9.6 Microsoft Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.9.7 Microsoft Number of Employees 2010-2015 (No. of Employees, AGR%)
Table 8.9.8 Microsoft Acquisitions 2014-2015 (Date, Details)
Table 8.9.9 Microsoft MandA Activity Divestitures 2014-2015 (Date, Details)
Table 8.10 Palo Alto Networks Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.10.1 Palo Alto Networks Total Company Sales 2008-2015 ($m, AGR %)
Table 8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
Table 8.10.3 Palo Alto Networks Capital Expenditure 2010-2012 (US$m, AGR%)
Table 8.10.4 Palo Alto Networks Cost of Research and Development 2010-2015 (US$m, AGR%)
Table 8.10.5 Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%)
Table 8.10.6 Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, AGR%)
Table 8.10.7 Palo Alto Networks Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.10.8 Palo Alto Networks Number of Employees 2012-2015 (No. of Employees, AGR%)
Table 8.10.9 Palo Alto Networks Recent Acquisitions 2014-2015 (Date, Details)
Table 8.11 Raytheon Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.11.1 Raytheon Total Company Sales 2005-2014 ($m, AGR %)
Table 8.11.2 Raytheon Net Profit 2005-2014 (US$m, AGR%)
Table 8.11.3 Raytheon Capital Expenditure 2005-2014 (US$m, AGR%)
Table 8.11.4 Raytheon Cost of Research and Development 2010-2014 (US$m, AGR%)
Table 8.11.5 Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%)
Table 8.11.6 Raytheon Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 8.11.7 Raytheon Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.11.8 Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%)
Table 8.11.9 Raytheon Company Recent Acquisitions 2010-2013 (Date, Details)
Table 8.11.10 Raytheon Company Partnerships 2001-2013 (Date, Details)
Table 8.12 Sophos Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.12.1 Sophos Total Company Sales 2013-2015 ($m, AGR %)
Table 8.12.2 Sophos Net Loss 2013-2015 (US$m, AGR%)
Table 8.12.3 Sophos Capital Expenditure 2013-2015 (US$m, AGR%)
Table 8.12.4 Sophos Cost of Research and Development 2013-2015 (US$m, AGR%)
Table 8.12.5 Sophos Sales by Segment of Business 2013-2015 (US$m, AGR%)
Table 8.12.6 Sophos Sales by Geographical Location 2013-2015 (US$m, AGR%)
Table 8.12.7 Sophos Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.12.8 Sophos Number of Employees 2013-2015 (No. of Employees, AGR%)
Table 8.12.9 Sophos Acquisitions 2007-2014 (Date, Details)
Table 8.12.10 Sophos Divestiture 2006-2010 (Date, Details)
Table 8.13 Symantec Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.13.1 Symantec Total Company Sales 2008-2015 ($m, AGR %)
Table 8.13.2 Symantec Net Profit 2010-2015 (US$m, AGR%)
Table 8.13.3 Symantec Capital Expenditure 2008-2015 (US$m, AGR%)
Table 8.13.4 Symantec Cost of Research and Development 2010-2015 (US$m, AGR%)
Table 8.13.5 Symantec Sales by Segment of Business 2014-2015 (US$m, AGR%)
Table 8.13.6 Symantec Sales by Geographical Location 2008-2015 (US$m, AGR%)
Table 8.13.7 Symantec Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.13.8 Symantec Number of Employees 2010-2015 (No. of Employees, AGR%)
Table 8.13.9 Symantec Recent Acquisitions 2000-2015 (Date, Details)
Table 8.13.10 Symantec Divestitures 2015 (Date, Details)
Table 8.13.11 Symantec Mergers 2004 (Date, Details)
Table 8.14 Trend Micro Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, IR Contact, Ticker, Website)
Table 8.14.1 Trend Micro Total Company Sales 2008-2014 ($m, AGR %)
Table 8.14.2 Trend Micro Net Profit 2010-2014 (US$m, AGR%)
Table 8.14.3 Trend Micro Cost of Research and Development 2011-2014 (US$m, AGR%)
Table 8.14.4 Trend Micro Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 8.14.5 Trend Micro Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.14.6 Trend Micro Recent Acquisitions 2008-2015 (Date, Details)
Table 8.14.7 Trend Micro Divestitures 2015 (Date, Details)

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Canadian IT Security Hardware, Software, Services, and Cloud Forecast, 2016-2020

Canadian IT Security Hardware, Software, Services, and Cloud Forecast, 2016-2020

  • $ 7500
  • Industry report
  • September 2016
  • by IDC

This IDC study forecasts all security markets in Canada, including hardware, software, SaaS, and security services, down to the subfunctional level as defined in IDC's Worldwide Security Products Taxonomy, ...

Penetration Testing Market by Testing Service, Deployment Mode, Organization Size, Vertical, and Region - Global Forecast to 2021

Penetration Testing Market by Testing Service, Deployment Mode, Organization Size, Vertical, and Region - Global Forecast to 2021

  • $ 5650
  • Industry report
  • August 2016
  • by MarketsandMarkets

“Increased sophistication level in attacking techniques is driving the growth of the penetration testing market” MarketsandMarkets estimates the global penetration testing market to grow from USD 594.7 ...

User and Entity Behavior Analytics Market by Type, Deployment Type, Vertical - Global Forecast to 2021

User and Entity Behavior Analytics Market by Type, Deployment Type, Vertical - Global Forecast to 2021

  • $ 5650
  • Industry report
  • August 2016
  • by MarketsandMarkets

“Increasing need to prevent insider threats posed by users is one of the factors driving the global user and entity behavior analytics market.” The global user and entity behavior analytics (UEBA) ...


ref:plp2015

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.