1. Market Research
  2. > Computer Security Market Trends
  3. > Cyber Security Market Report 2016-2021: Forecasts, Analysis & Profiles of Top Companies in Network, Data, Endpoint, Application and Cloud Security, and Identity & Access Management

Report Details
The inexorable rise of cyber attacks worldwide has led visiongain to publish this timely report. The rapid emergence of the cyber security industry has led to visiongain’s assessment that the cyber security market will reach $81.4bn in 2016.

This report offers comprehensive analysis of the market dynamics and the cyber security companies. Visiongain’s report will ensure that you keep informed and ahead of your competitors. Gain that competitive advantage.

The report will answer questions such as:
- How is the Cyber Security market evolving?
- What is driving and restraining Cyber Security market dynamics?
- How will each Cyber Security submarket segment grow over the forecast period and how much sales will these submarkets account for in 2021?
- How will market shares of each Cyber Security submarket develop from 2016-2021?
- Which individual Cyber Security technologies will prevail and how will these shifts be responded to?
- Which Cyber Security submarket will be the main driver of the overall market from 2016-2021?
- How will political and regulatory factors influence regional Cyber Security markets and submarkets?
- Will leading national Cyber Security markets broadly follow macroeconomic dynamics, or will individual country sectors outperform the rest of the economy?
- Who are the leading players and what are their prospects over the forecast period?
- How will the sector evolve as alliances form during the period between 2016 and 2021?

5 Reasons why you must order and read this report today:
1) The analysis is underpinned by our 3 exclusive interviews with leading Cyber Security experts
- James Hanlon and Laurence Pitt, Security Strategist and Product Management, Symantec.
- Martin Roesch, Vice President and Chief Architect, Cisco
- Florian Schütz, Business Development, RUAG

2) The report provides detailed profiles of 15 leading companies operating within the Cyber Security market:
- Blue Coat Systems
- Check Point Technologies
- Cisco
- EMC
- Fortinet
- Hewlett-Packard Company
- IBM
- Intel Corporation
- Kaspersky
- Lockheed Martin Corporation
- Northrop Grumman Corporation
- Optiv
- Palo Alto Networks
- Symantec Corporation
- Trend Micro

3) The study reveals where and how companies are investing in Cyber Security. We show you the prospects for the following 9 leading nations with forecasts and analysis:
- China
- France
- Israel
- Japan
- Russia
- Saudi Arabia
- South Korea
- US
- UK
- RoW

4) Our overview also forecasts these 7 cyber security submarkets from 2016-2021
- Network security
- Data Security
- Endpoint security
- Application security
- Cloud security
- Identity and Access Management
- Other

5) The document also details 54 significant cyber security contracts

How will you benefit from this report?
- This report you will keep your Cyber Security knowledge base up to speed. Don’t get left behind
- This report will allow you to reinforce strategic decision decision-making based upon definitive and reliable Cyber Security market data
- You will learn how to exploit new Cyber Security technological trends
- You will be able to realise your company’s full potential within the Cyber Security market
- You will better understand the competitive landscape and identify potential new business opportunities & partnerships

Competitive advantage
This independent 402 page, report guarantees you will remain better informed than your competitors. With 185 tables and 226 figures examining the Cyber Security market space, the report gives you an immediate, one-stop breakdown of your market, keeping your knowledge that one step ahead of your rivals.

Who should read this report?
IT companies, Cyber Security firms, IoT companies, telecommunication , internet and technology providers, CEOs, asset managers, grid security vendors, smart grid hardware and software vendors, heads of strategic development, marketing staff, market analysts, procurement staff, utility company managers, industry administrators, industry associations, utility company procurement departments, analysts and consultants, managers, utility security managers, governmental departments & agencies.

Don’t miss out
This report is essential reading for you or anyone in the IT sector with an interest in cyber security. Purchasing this report today will help you to recognise those important market opportunities and understand the possibilities there. Order the Cyber Security Market Report 2016-2021: Forecasts, Analysis & Profiles of Top Companies in Network, Data, Endpoint, Application and Cloud Security, and Identity & Access Management now. We look forward to receiving your order.

Table Of Contents

Cyber Security Market Report 2016-2021: Forecasts, Analysis and Profiles of Top Companies in Network, Data, Endpoint, Application and Cloud Security, and Identity and Access Management
1. Report Overview
1.1 Global Cyber Security Market Overview
1.2 Global Cyber Security Market Segmentation
1.3 Why You Should Read This Report
1.4 How This Report Delivers
1.5 Key Questions Answered by This Analytical Report Include:
1.6 Who is This Report For?
1.7 Methodology
1.7.1 Primary Research
1.7.2 Secondary Research
1.7.3 Market Evaluation and Forecasting Methodology
1.8 Frequently Asked Questions (FAQ)
1.9 Associated visiongain Reports
1.10 About visiongain
2. Introduction to the Cyber Security Market
2.1 Global Cyber Security Market Structure Overview
2.2 Cyber Security Market Definition
2.3 Cyber Security Submarkets Definition
2.3.1 Network Security (NetSec) Submarket Definition
2.3.2 Data Security (DataSec) Submarket Definition
2.3.3 Identity and Access Management (IAM) Submarket Definition
2.3.4 Endpoint Security (EndSec) Submarket Definition
2.3.5 Application Security (AppSec) Submarket Definition
2.3.6 Cloud Security (CloudSec) Submarket Definition
2.4 Most Common Methods of Cyber Attacks
2.5 Main Objectives of Cyber Attackers
2.6 Most Important Mechanisms of Cyber Attacks
2.7 Stage of Cyber Attacks
2.8 The Evolving Surface of Cyber Attack 2015-2020
2.9 Recent Notable Cyber Attacks and Incidents
3. Global Cyber Security Market 2016-2021
3.1 Global Cyber Security Market Forecast 2016-2021
3.2 Regional Cyber Security Market Forecast 2016-2021
3.3 Regional Cyber Security Market Share Breakdowns 2016-2021
3.2 Global Cyber Security Drivers and Restraints 2016
4. Global Cyber Security Submarket Forecast 2016-2021
5. Leading 9 National Cyber Security Markets Forecast 2016-2021
5.1 Leading 9 National Cyber Security Markets Share Forecast 2016-2021
5.2 China Cyber Security Market Forecast 2016-2021
5.2.1 Cyber Security in China
5.2.1.1 Chinese Military Cyber Strategy
5.2.1.2 Chinese National Cyber Strategy
5.2.2 China Cyber Security Market Drivers and Restraints
5.3 France Cyber Security Market Forecast 2016-2021
5.3.1 French Cyber Security Agency: ANSSI
5.3.2 Cyber Security in France
5.3.3 France Cyber Security Market Drivers and Restraints
5.4 Israel Cyber Security Market Forecast 2016-2021
5.4.1 Israeli Defence Contracts Value 2007-2014
5.4.2 Cyber Security in Israel
5.4.3 Israel Cyber Security Market Drivers and Restraints
5.5 Japan Cyber Security Market Forecast 2016-2021
5.5.1 Japan Spending on IT Software and Services 2012-2014
5.5.2 Japan Ministry of Defence Spending on Cyber Security 2012-2016
5.5.3 Cyber Security in Japan
5.5.4 Japan Cyber Security Market Drivers and Restraints
5.6 Russia Cyber Security Market Forecast 2016-2021
5.6.1 Cyber Security in Russia
5.6.2 Russia Cyber Security Market Drivers and Restraints
5.7 Saudi Arabia Cyber Security Market Forecast 2016-2021
5.7.1 Cyber Security in Saudi Arabia
5.7.2 Saudi Arabia Cyber Security Market Drivers and Restraints
5.8 South Korea Cyber Security Market Forecast 2016-2021
5.8.1 Cyber Security in South Korea
5.8.2 South Korea Cyber Security Market Drivers and Restraints
5.9 United States Cyber Security Market Forecast 2016-2021
5.9.1 United States Cyber Security Market Contracts and Programmes
5.9.2 United States Federal Government's Budget for Cyber Security
5.9.3 United States Federal Departments Spending on Cyber Security by Departments
5.9.4 United States Federal Spending on Cyber Security by States
5.9.5 Cyber Security in United States
5.9.5.1 Essential Components of the U.S. Cyber Security Power
5.9.5.2 The United States Department of Defense
5.9.5.3 The United States Department of Homeland Security
5.9.5.4 The United States Department of Justice
5.9.5.5 The United States Overall Budget
5.9.6 United States Cyber Security Market Drivers and Restraints
5.10 United Kingdom Cyber Security Market Forecast 2016-2021
5.10.1 United Kingdom Government Spending on Cyber Security
5.10.2 United Kingdom Cyber Security Export
5.10.3 Cyber Security in the United Kingdom
5.10.4 United Kingdom Cyber Security Market Drivers and Restraints
6. SWOT Analysis of the Cyber Security Market 2016-2021
7. Expert Opinion
7.1 Florian Schütz, Business Development, Cyber and Intelligence, RUAG
7.2.1 RUAG's view on the Cyber Security Market
7.1.2 Presence of RUAG in the Cyber Security Market
7.2 James Hanlon, Security Strategist, Office of the CTO and Laurence Pitt, Director, Product Management EMEA, Symantec
7.2.1 Symantec's view on the Cyber Security Market
7.2.2 Presence of Symantec in the Cyber Security Market
7.3 Martin Roesch, Vice President and Chief Architect, Cisco's Security Business Group
7.3.1 Presence of Cisco in the Cyber Security Market
8. Leading 15 Cyber Security Companies
8.1 Leading 15 Cyber Security Company Sales Share Analysis 2015
8.2 Blue Coat Systems, Inc
8.2.1 Blue Coat Systems Total Company Sales 2007-2011
8.2.2 Blue Coat Systems Sales by Segment of Business 2007-2011
8.2.3 Blue Coat Systems Net Profit / Loss 2007-2011
8.2.4 Blue Coat Systems Cost of Research and Development 2007-2011
8.2.5 Blue Coat Systems Regional Emphasis / Focus
8.2.6 Blue Coat Systems Organisational Structure / Subsidiaries / Number of Employees
8.2.7 Blue Coat Systems Primary Market Competitors 2015
8.2.8 Blue Coat Systems Mergers and Acquisitions (MandA) Activity
8.2.9 Blue Coat Systems' Role in the Cyber Security Market
8.3 Check Point Software Technologies Ltd
8.3.1 Check Point Software Technologies Ltd Total Company Sales 2005-2014
8.3.2 Check Point Software Technologies Ltd Net Income 2005-2014
8.3.3 Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014
8.3.4 Check Point Software Technologies Ltd Net Cost of Research and Development 2005-2014
8.3.5 Check Point Software Technologies Ltd Regional Emphasis / Focus
8.3.6 Check Point Software Technologies Ltd Organisational Structure / Subsidiaries / Number of Employees
8.3.7 Check Point Software Technologies Ltd Primary Market Competitors
8.3.8 Check Point Software Technologies Ltd Mergers and Acquisitions (MandA) Activity
8.3.9 Check Point Software Technologies' Role in the Cyber Security Market
8.4 Cisco Systems
8.4.1 Cisco Total Company Sales 2008-2015
8.4.2 Cisco Net Profit 2010-2015
8.4.3 Cisco Cost of Research and Development 2010-2015
8.4.5 Cisco Sales by Segment of Business 2010-2015
8.4.6 Cisco Regional Emphasis / Focus
8.4.7 Cisco Organisational Structure / Subsidiaries / Number of Employees
8.4.8 Cisco Primary Market Competitors 2015
8.4.9 Cisco Mergers and Acquisitions (MandA) Activity
8.4.10 Cisco's Role in the Cyber Security Market
8.5 EMC
8.5.1 EMC Total Company Sales 2008-2014
8.5.2 EMC Net Profit 2010-2014
8.5.3 EMC Cost of Research and Development 2010-2014
8.5.4 EMC Sales by Segment of Business 2010-2014
8.5.5 EMC Regional Emphasis / Focus
8.5.6 EMC Organisational Structure / Subsidiaries / Number of Employees
8.5.7 EMC Primary Market Competitors
8.5.8 EMC Mergers and Acquisitions (MandA) Activity
8.5.9 EMC's Role in the Cyber Security Market
8.6 Fortinet Inc
8.6.1 Fortinet Inc Total Company Sales 2009-2014
8.6.2 Fortinet Inc Net Income 2010-2014
8.6.3 Fortinet Inc Net Capital Expenditure 2010-2014
8.6.4 Fortinet Inc Sales by Segment of Business 2009-2014
8.6.5 Fortinet Inc Regional Emphasis / Focus
8.6.6 Fortinet Inc Organisational Structure / Subsidiaries / Number of Employees
8.6.7 Fortinet Inc Primary Market Competitors
8.6.8 Fortinet Inc Mergers and Acquisitions (MandA) Activity
8.6.9 Fortinet Inc's Role in the Cyber Security Market
8.7 Hewlett-Packard (HP)
8.7.1 Hewlett-Packard (HP) Cyber Security Selected Recent Contracts / Projects / Programmes
8.7.2 Hewlett-Packard (HP) Total Company Sales 2010-2015
8.7.3 Hewlett-Packard (HP) Net Income / Loss 2010-2015
8.7.4 Hewlett-Packard (HP) Sales by Segment of Business 2010-2015
8.7.5 The Hewlett-Packard Company (HP) Regional Emphasis / Focus
8.7.6 The Hewlett-Packard Company (HP) Organisational Structure / Subsidiaries
8.7.7 Hewlett-Packard (HP) Primary Market Competitors
8.7.8 Hewlett-Packard (HP) Mergers and Acquisitions (MandA) Activity
8.7.9 Hewlett-Packard (HP)'s Role in the Cyber Security Market
8.8 Intel Corporation
8.8.1 Intel Corporation Total Company Sales 2008-2014
8.8.2 Intel Corporation Net Profit 2010-2014
8.8.3 Intel Corporation Cost of Research and Development 2010-2014
8.8.4 Intel Corporation Sales by Segment of Business 2010-2014
8.8.5 Intel Corporation Regional Emphasis / Focus
8.8.6 Intel Corporation Organisational Structure / Subsidiaries / Number of Employees
8.8.7 Intel Corporation Primary Market Competitors
8.8.8 Intel Corporation Mergers and Acquisitions (MandA) Activity
8.8.9 Intel Corporation's Role in the Cyber Security Market
8.9 International Business Machines (IBM) Corporation
8.9.1 IBM Cyber Security Selected Recent Contracts / Projects / Programmes
8.9.2 IBM Total Company Sales 2008-2014
8.9.3 IBM Net Profit 2010-2014
8.9.4 IBM Cost of Research and Development 2010-2014
8.9.5 IBM Sales by Segment of Business 2010-2014
8.9.6 IBM Regional Emphasis / Focus
8.9.7 IBM Organisational Structure / Subsidiaries / Number of Employees
8.9.8 IBM Primary Market Competitors 2015
8.9.9 IBM Mergers and Acquisitions (MandA) Activity
8.9.10 IBM's Role in the Cyber Security Market
8.10 Kaspersky Lab
8.10.1 Kaspersky Lab Total Company Sales 2008-2014
8.10.2 Kaspersky Lab Regional Emphasis / Focus
8.10.3 Kaspersky Lab Organisational Structure / Subsidiaries
8.10.4 Kaspersky Lab Primary Market Competitors
8.10.5 Kaspersky Lab Mergers and Acquisitions (MandA) Activity
8.10.6 Kaspersky‘s Role in the Cyber Security Market
8.11 Lockheed Martin Corporation
8.11.1 Lockheed Martin Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
8.11.2 Lockheed Martin Corporation Total Company Sales 2010-2014
8.11.3 Lockheed Martin Corporation Net Income 2010-2014
8.11.4 Lockheed Martin Corporation Net Capital Expenditure 2010-2014
8.11.5 Lockheed Martin Corporation Sales by Segment of Business 2010-2014
8.11.6 Lockheed Martin Corporation Regional Emphasis / Focus
8.11.7 Lockheed Martin Corporation Organisational Structure / Subsidiaries / Number of Employees
8.11.8 Lockheed Martin Corporation Primary Market Competitors
8.11.9 Lockheed Martin Corporation Mergers and Acquisitions (MandA) Activity
8.11.10 Lockheed Martin Corporation's Role in the Cyber Security Market
8.12 Northrop Grumman Corporation
8.12.1 Northrop Grumman Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
8.12.2 Northrop Grumman Corporation Total Company Sales 2008-2014
8.12.3 Northrop Grumman Corporation Net Profit 2009-2014
8.12.4 Northrop Grumman Corporation Sales by Segment of Business 2010-2014
8.12.5 Northrop Grumman Corporation Regional Emphasis / Focus
8.12.6 Northrop Grumman Corporation Organisational Structure / Subsidiaries / Number of Employees
8.12.7 Northrop Grumman Corporation Primary Market Competitors
8.12.8 Northrop Grumman Corporation Mergers and Acquisitions (MandA) Activity
8.12.9 Northrop Grumman Corporation's Role in the Cyber Security Market
8.13 Optiv
8.13.1 Optiv Regional Emphasis / Focus
8.13.2 Optiv Organisational Structure / Subsidiaries / Number of Employees
8.13.3 Optiv Primary Market Competitors 2015
8.13.4 Optiv Mergers and Acquisitions (MandA) Activity
8.13.5 Optiv's Role in the Cyber Security Market
8.14 Palo Alto Networks
8.14.1 Palo Alto Networks Total Company Sales 2008-2015
8.14.2 Palo Alto Networks Net Profit/Loss 2010-2015
8.14.3 Palo Alto Networks Cost of Research and Development 2010-2015
8.14.4 Palo Alto Networks Sales by Segment of Business 2010-2015
8.14.5 Palo Alto Networks Regional Emphasis / Focus
8.14.6 Palo Alto Networks Organisational Structure / Subsidiaries / Number of Employees
8.14.7 Palo Alto Networks Primary Market Competitors
8.14.8 Palo Alto Networks Mergers and Acquisitions (MandA) Activity
8.14.9 Palo Alto Networks' Role in the Cyber Security Market
8.15 Symantec Corporation
8.15 1 Symantec Total Company Sales 2008-2015
8.15.2 Symantec Net Profit 2010-2015
8.15.3 Symantec Cost of Research and Development 2010-2015
8.15.4 Symantec Sales by Segment of Business 2014-2015
8.15.5 Symantec Regional Emphasis / Focus
8.15.6 Symantec Organisational Structure / Subsidiaries / Number of Employees
8.15.7 Symantec Primary Market Competitors
8.15.8 Symantec Mergers and Acquisitions (MandA) Activity
8.15.9 Symantec's Role in the Cyber Security Market
8.16 Trend Micro
8.16.1 Trend Micro Total Company Sales 2008-2014
8.16.2 Trend Micro Net Profit 2010-2015
8.16.3 Trend Micro Cost of Research and Development 2011-2014
8.16.4 Trend Micro Regional Emphasis / Focus
8.16.5 Trend Micro Organisational Structure / Subsidiaries
8.16.6 Trend Micro Primary Market Competitors
8.16.7 Trend Micro Mergers and Acquisitions (MandA) Activity
8.16.8 Trend Micro's Role in the Cyber Security Market
8.17 Other Companies Involved in the Cyber Security Market 2016
9. Conclusions and Predictions
9.1 Conclusion
9.2 Predictions
10. Glossary

List of Tables
Table 1.1 Example of Cyber Security Market by Regional Market Forecast 2016-2021 (US$m, AGR%, Cumulative)
Table 1.2 Example of Leading National Cyber Security Market Forecast by Submarket 2016-2021 (US$m, AGR%, Cumulative)
Table 2.1 Methods of Cyber Attacks (Type, Description)
Table 2.2 Objectives of Cyber Attackers (Type, Description)
Table 2.3 Mechanisms of Cyber Attacks (Type, Description)
Table 2.4 Cyber Attack Surface 2015-2020
Table 2.5 Notable Cyber Attacks and Incidents worldwide 1988-2015 (Date, Name of the Attack / Incident, Description)
Table 3.1 Global Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 3.2 Regional Cyber Security Market Forecast 2015-2021 (Sales US$m, AGR%, Cumulative)
Table 3.3 Regional Cyber Security Market Percentage Change in Market Share 2016-2021 (% Change)
Table 3.4 Global Cyber Security Market Drivers and Restraints 2016
Table 4.1 Global Cyber Security Submarket Forecast 2016-2021 (US$m, AGR%, Cumulative)
Table 4.2 Global Cyber Security Submarket Cumulative Sales Forecast 2016-2021 ($USm)
Table 5.1 Leading 9 National Cyber Security Markets Forecast 2016-2021 (US$m, Global AGR%, Cumulative)
Table 5.2 Leading 9 National Cyber Security Markets CAGR Forecast 2016-2021 (CAGR %)
Table 5.3 China Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.4 China Cyber Security Market Drivers and Restraints 2016
Table 5.5 France Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.6 France Cyber Security Agency (ANSSI) Budget 2010-2014 (US$m)
Table 5.7 France Cyber Security Market Drivers and Restraints 2016
Table 5.8 Israel Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.9 Israeli Defence Contracts Total Value 2007-2014 (US$m)
Table 5.10 Israel Cyber Security Market Drivers and Restraints 2016
Table 5.11 Japan Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.12 Japan Spending on IT Software and Services 2012-2014 (US$m)
Table 5.13 Japan Ministry of Defence Spending on Cyber Security 2012-2016(US$m, AGR %)
Table 5.14 Japan Cyber Security Market Drivers and Restraints 2016
Table 5.15 Russia Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.16 Russia Cyber Security Market Drivers and Restraints 2016
Table 5.17 Saudi Arabia Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.18 Saudi Arabia Cyber Security Market Drivers and Restraints 2016
Table 5.19 South Korea Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.20 South Korea Cyber Security Market Drivers and Restraints 2016
Table 5.21 U.S. Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.22 U.S. Cyber Security Market Major Contracts and Programmes 2015 (Date, Organisation, Contractor, Value US$m, Product, Details)
Table 5.23 U.S. Federal Government's Global Budget for Cyber Security 2013-2016 (US$m, AGR %)
Table 5.24 U.S. Federal Government's Budget for Cyber Security by Departments 2015-2016 (US$m)
Table 5.25 U.S. Federal Spending on Cyber Security by Departments 2010-2015 (US$m, AGR %)
Table 5.26 U.S. Federal Spending on Cyber Security by States 2010-2015 (US$m, AGR %)
Table 5.27 U.S. Government and Military Cyber Security Organisations' Role (US Code, Title, Focus, Organisation, Role)
Table 5.28 U.S. Cyber Security Market Drivers and Restraints 2016
Table 5.29 UK Cyber Security Market Forecast 2016-2021 (US$m, AGR %, CAGR%, Cumulative)
Table 5.30 UK National Cyber Security Programme Total Spending Forecast 2011-2020 (US$m)
Table 5.31 UK National Cyber Security Programme Spending by Segments Share 2014-2015 (US$m)
Table 5.32 UK Cyber Security Export in the Security Sector 2012-2015 (US$m, AGR %)
Table 5.33 UK Cyber Security Market Drivers and Restraints 2016
Table 6.1 Global Cyber Security Market SWOT Analysis 2016-2021
Table 8.1 Leading 15 Cyber Security Companies Sales Share 2015 ( Company, FY2014/2015 Total Company Sales US$m, FY2014/2015 Estimated Sales in the Market US$m, Share of FY2015 Total Sales from Sales in the Market US$m, Primary Market Specialisation)
Table 8.2 Blue Coat Systems Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, HQ, Founded, No. of Employees, IR Contact, Website)
Table 8.2.1 Blue Coat Systems Total Company Sales 2007-2011 (US$m, AGR %)
Table 8.2.2 Blue Coat Systems Sales by Segment of Business 2007-2011 (US$m, AGR %)
Table 8.2.3 Blue Coat Systems Net Profit / Loss 2007-2011 (US$m, AGR %)
Table 8.2.4 Blue Coat Systems Cost of Research and Development 2007-2011 (US$m, AGR %)
Table 8.2.5 Blue Coat Systems Sales by Geographical Location 2007-2011 (US$m, AGR %)
Table 8.2.6 Blue Coat Systems Subsidiaries 2015 (Subsidiary, Location)
Table 8.2.7 Blue Coat Systems Number of Employees 2007-2011 (No. of Employees, AGR %)
Table 8.2.8 Blue Coat Systems Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.2.9 Blue Coat Systems Merger (Date, Company Involved, Value US$m, Details)
Table 8.3 Check Point Software Technologies Ltd Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market (%), Net Income US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.3.1Check Point Software Technologies Ltd Total Company Sales 2005-2014 (US$m, AGR %)
Table 8.3.2 Check Point Software Technologies Ltd Net Income 2005-2014 (US$m, AGR %)
Table 8.3.3 Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014 (US$m, AGR %)
Table 8.3.4 Check Point Software Technologies Ltd Net Capital Expenditure 2005-2014 (US$m, AGR %)
Table 8.3.5 Check Point Software Technologies Ltd Sales by Geographical Location 2009-2014 (US$m, AGR %)
Table 8.3.6 Check Point Software Technologies Ltd Subsidiaries (Subsidiary, Location)
Table 8.3.7 Check Point Software Technologies Ltd Number of Employees 2009-2014 (Number, AGR %)
Table 8.3.8 Check Point Software Technologies Ltd Acquisitions (Date, Company Involved, Value US$m, Details)
Table 4.3.9 Check Point Software Technologies Ltd Partnerships 2015 (Date, Company Involved, Details)
Table 8.4 Cisco Systems Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.4.1 Cisco Total Company Sales 2008-2015 ($m, AGR %)
Table 8.4.2 Cisco Net Profit 2010-2015 (US$m, AGR %)
Table 8.4.3 Cisco Cost of Research and Development 2010-2015 (US$m, AGR %)
Table 8.4.4 Cisco Sales by Segment of Business 2010-2015 (US$m, AGR %)
Table 8.4.5 Cisco Sales by Geographical Location 2010-2015 (US$m, AGR %)
Table 8.4.6 Cisco Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.4.7 Cisco Number of Employees 2012-2015 (No. of Employees, AGR %)
Table 8.4.8 Cisco Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.5 EMC Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, Net Capital Expenditure US$m, Submarket Involvement, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.5.1 EMC Total Company Sales 2008-2014 ($m, AGR %)
Table 8.5.2 EMC Net Profit 2010-2014 (US$m, AGR %)
Table 8.5.3 EMC Cost of Research and Development 2010-2014 (US$m, AGR %)
Table 8.5.4 EMC Sales by Segment of Business 2010-2014 (US$m, AGR %)
Table 8.5.5 EMC Sales by Geographical Location 2008-2014 (US$m, AGR %)
Table 8.5.6 EMC Primary International Subsidiaries 2016 (Region, Subsidiary, Location)
Table 8.5.7 EMC Number of Employees 2010-2014 (No. of Employees, AGR %)
Table 8.5.8 EMC Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.5.9 EMC Divestitures 2015 (Date, Details)
Table 8.5.10 EMC Mergers/Partnerships 2015 (Date, Details)
Table 8.6 Fortinet Inc Profile 2016 ( CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Income US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.6.1 Fortinet Inc Total Company Sales 2009-2014 (US$m, AGR %)
Table 8.6.2 Fortinet Inc Net Income 2010-2014 (US$m, AGR %)
Table 8.6.3 Fortinet Inc Net Capital Expenditure 2010-2014 (US$m, AGR %)
Table 8.6.4 Fortinet Inc Net Sales by Segment of Business 2009-2014 (US$m, AGR %)
Table 8.6.5 Fortinet Inc Sales by Geographical Location 2010-2014 (US$m, AGR %)
Table 8.6.6 Fortinet Primary International Subsidiaries 2016 (Subsidiary, Location)
Table 8.6.7 Fortinet Inc Number of Employees 2011-2014 (Number, AGR %)
Table 8.6.8 Fortinet Inc Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.6.9 Fortinet Inc Partnerships (Date, Company Involved, Details)
Table 8.7 Hewlett-Packard (HP) Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Net Income US$m, Share in the Cyber Security Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.7.1 Selected Recent Hewlett-Packard (HP) Cyber Security Contracts / Projects / Programmes (Date, Country, Subcontractor, Value US$m, Product, Details)
Table 8.7.2 Hewlett-Packard (HP) Total Company Sales 2010-2015 (US$m, AGR %)
Table 8.7.3 Hewlett-Packard (HP) Net Income / Loss 2010-2015 (US$m)
Table 8.7.4 Hewlett-Packard (HP) Sales by Segment of Business 2010-2015 (US$m, AGR %)
Table 8.7.5 Hewlett-Packard (HP) Acquisitions 2011-2015 (Date, Company Involved, Value US$m, Details)
Table 8.7.6 Hewlett-Packard (HP) Joint Venture 2015 (Date, Company Involved, Value US$m, Details)
Table 8.7.7 Hewlett-Packard (HP) Partnerships 2015 (Date, Company Involved, Details)
Table 8.7.8 Hewlett-Packard (HP) Divestitures 2015 (Date, Company Involved, Details)
Table 8.8 Intel Corporation Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, Ticker, Website)
Table 8.8.1 Intel Corporation Total Company Sales 2008-2014 ($m, AGR %)
Table 8.8.2 Intel Corporation Net Profit 2010-2014 (US$m, AGR %)
Table 8.8.3 Intel Corporation Cost of Research and Development 2010-2014 (US$m, AGR %)
Table 8.8.4 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
Table 8.8.5 Intel Corporation Sales by Geographical Location 2010-2014 (US$m, AGR %)
Table 8.8.6 Intel Corporation Primary International Subsidiaries 2015 ( Subsidiary, Location)
Table 8.8.7 Intel Corporation Number of Employees 2010-2014 (No. of Employees, AGR %)
Table 8.8.8 Intel Corporation Acquisitions 2011-2015 (Date, Company Involved, Value US$m, Details)
Table 8.8.9 Intel Corporation Divestiture 2015 (Date, Details)
Table 8.9 IBM Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.9.1 Selected Recent International Business Machines (IBM) Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Product, Details)
Table 8.9.2 IBM Total Company Sales 2008-2014 ($m, AGR %)
Table 8.9.3 IBM Net Profit 2010-2014 (US$m, AGR %)
Table 8.9.4 IBM Cost of Research and Development 2010-2014 (US$m, AGR %)
Table 8.9.5 IBM Sales by Segment of Business 2010-2014 (US$m, AGR %)
Table 8.9.6 IBM Sales by Geographical Location 2010-2014 (US$m, AGR %)
Table 8.9.7 IBM Primary International Subsidiaries 2016 (Region, Subsidiary, Location)
Table 8.9.8 IBM Number of Employees 2010-2014 (No. of Employees, AGR %)
Table 8.9.9 IBM Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.9.10 IBM Recent Divestiture 2014 (Date, Details)
Table 8.10 Kaspersky Lab Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, HQ, Founded, Website)
Table 8.10.1 Kaspersky Lab Total Company Sales 2008-2014 ($m, AGR %)
Table 8.10.2 Kaspersky Lab Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.10.3 Kaspersky Lab Acquisitions 2005-2012 (Date, Details)
Table 8.10.4 Kaspersky Lab Divestiture 2011 (Date, Details)
Table 8.11 Lockheed Martin Corporation Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Net Income US$m, Share in the cyber Security Market %, HQ, No. of Countries Present Worldwide, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.11.1 Selected Recent Lockheed Martin Corporation Cyber Security Contracts / Projects / Programmes (Date, Country , Value US$m, Product, Details)
Table 8.11.2 Lockheed Martin Corporation Total Company Sales 2010-2014 (US$m, AGR %)
Table 8.11.3 Lockheed Martin Corporation Net Income 2010-2014 (US$m, AGR %)
Table 8.11.4 Lockheed Martin Corporation Net Capital Expenditure 2010-2014 (US$m, AGR %)
Table 8.11.5 Lockheed Martin Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
Table 8.11.6 Lockheed Martin Corporation Sales by Geographical Location 2010-2014 (US$m, AGR %)
Table 8.11.7 Lockheed Martin Corporation Subsidiaries (Subsidiary, Location)
Table 8.11.8 Lockheed Martin Corporation Number of Employees 2010-2014 (Number, AGR %)
Table 8.11.9 Lockheed Martin Corporation Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.11.10 Lockheed Martin Corporation Divestitures (Date, Company Involved, Value US$m, Details)
Table 8.12 Northrop Grumman Corporation Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Income US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.12.1 Selected Recent Northrop Grumman Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Details)
Table 8.12.2 Northrop Grumman Corporation Total Company Sales 2008-2014 (US$m, AGR %)
Table 8.12.3 Northrop Grumman Corporation Net Profit 2009-2014 (US$m, AGR %)
Table 8.12.4 Northrop Grumman Corporation Sales by Segment of Business 2010-2014 (US$m, AGR %)
Table 8.12.5 Northrop Grumman Corporation Sales by Geographical Location 2010-2014 (US$m, AGR %)
Table 8.12.6 Northrop Grumman Corporation Subsidiaries (Subsidiary, Location)
Table 8.12.7 Northrop Grumman Corporation Number of Employees 2010-2014 (Number, AGR %)
Table 8.12.8 Northrop Grumman Corporation Mergers and Acquisitions (Date, Company Involved, Details)
Table 8.12.9 Northrop Grumman Corporation Divestitures (Date, Company Involved, Details)
Table 8.13 Optiv Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.13.1 Northrop Grumman Corporation Divestitures (Date, Company Involved, Details)
Table 8.14 Palo Alto Networks Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.14.1 Palo Alto Networks Total Company Sales 2008-2015 ($m, AGR %)
Table 8.14.2 Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
Table 8.14.3 Palo Alto Networks Cost of Research and Development 2010-2015 (US$m, AGR %)
Table 8.14.4 Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR %)
Table 8.14.5 Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, AGR %)
Table 8.14.6 Palo Alto Networks Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.14.7 Palo Alto Networks Number of Employees 2012-2015 (No. of Employees, AGR %)
Table 8.14.8 Palo Alto Networks Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.15 Symantec Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.15.1 Symantec Total Company Sales 2008-2015 ($m, AGR %)
Table 8.15.2 Symantec Net Profit 2010-2015 (US$m, AGR %)
Table 8.15.3 Symantec Cost of Research and Development 2010-2015 (US$m, AGR %)
Table 8.15.4 Symantec Sales by Segment of Business 2014-2015 (US$m, AGR %)
Table 8.15.5 Symantec Sales by Geographical Location 2008-2015 (US$m, AGR %)
Table 8.15.6 Symantec Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.15.7 Symantec Number of Employees 2010-2015 (No. of Employees, AGR %)
Table 8.15.8 Symantec Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.15.9 Symantec Divestitures 2015 (Date, Details)
Table 8.15.10 Symantec Mergers 2004 (Date, Details)
Table 8.16 Trend Micro Profile 2016 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share in the Cyber Security Market %, Net Profit US$m, HQ, Founded, IR Contact, Ticker, Website)
Table 8.16.1 Trend Micro Total Company Sales 2008-2015 ($m, AGR %)
Table 8.16.2 Trend Micro Net Profit 2010-2015 (US$m, AGR %)
Table 8.16.3 Trend Micro Cost of Research and Development 2011-2014 (US$m, AGR %)
Table 8.16.4 Trend Micro Sales by Geographical Location 2008-2014 (US$m, AGR %)
Table 8.16.5 Trend Micro Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.16.6 Trend Micro Acquisitions (Date, Company Involved, Value US$m, Details)
Table 8.16.7 Trend Micro Divestitures 2015 (Date, Details)
Table 8.17 Other Companies Involved in the Cyber Security Market 2016 (Company, Estimated Sales in the Market $USm, Location)

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Cyber Security Market by Solutions, Services, Security Type, Deployment Mode, Organization Size, Vertical & Region - Global Forecast to 2021

Cyber Security Market by Solutions, Services, Security Type, Deployment Mode, Organization Size, Vertical & Region - Global Forecast to 2021

  • $ 7150
  • Industry report
  • July 2016
  • by MarketsandMarkets

“Rise in security breaches targeting enterprises driving the growth of the cyber security market” MarketsandMarkets estimates the global cyber security market to grow from USD 122.45 billion in 2016 ...

Analysis of the India Secure Content Management Market

Analysis of the India Secure Content Management Market

  • $ 4950
  • Industry report
  • September 2016
  • by Frost & Sullivan

Targeted and Ransomware Attacks are Driving the SCM Market The Indian SCM market grew strongly at 11.7% year-on-year in 2015 with the web security segment growing at 12.4% and the email security segment ...

Japan Cybersecurity Products and Services Forecast,  2016-2020

Japan Cybersecurity Products and Services Forecast, 2016-2020

  • $ 4500
  • Industry report
  • November 2016
  • by IDC

This IDC study is a translation of the Japanese document IDC #JPJ40602016 that categorizes the Japan cybersecurity solutions market into security products and security services segment, and provides the ...


ref:plp2016

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.