PLAYERS 4
TRENDS 5
Changing nature of cyber threats 5
Evolution of cybersecurity technologies 6
Industry growth drivers 7
Corporate governance trends 8
Cybersecurity trends in retail 9
INDUSTRY ANALYSIS 11
Impact of cybersecurity on retail 15
Retail case studies - major security breaches 16
Barnes & Noble 16
Key recommendations for retailers 18
Key recommendations for IT vendors 19
Market size and growth forecasts 20
M&A 21
Timeline 23
VALUE CHAIN 25
Network security 25
Unified threat management (UTM) 26
Artificial Intelligence (AI) 26
Deception-based cyber defenses (subset of AI) 27
Behavioral analytics (subset of AI) 27
SIEM 28
Endpoint security 28
Mobile security (subset of endpoint security) 29
Identity access management (IAM) 30
Data security 30
Application security 31
Email security 31
Cloud security 32
Managed security services 33
Post-breach consultancy services 33
COMPANIES SECTION 35
Public companies 35
Private companies 39
Retail companies 41
TECHNOLOGY BRIEFING 42
The NIST framework 42
GLOSSARY 44
APPENDIX: OUR “THEMATIC” RESEARCH METHODOLOGY 47

Companies Mentioned
- Ahnlab
- Airbus
- Akamai
- BAE Systems
- Barracuda Networks
- Check Point Software Technologies
- Cheetah Mobile
- Cisco
- CyberArk Software
- F5 Networks
- FireEye
- Fortinet
- F-secure
- Gemalto
- Gigamon
- IBM
- Imperva
- Intel
- Juniper Networks
- KEYW
- LifeLock
- Micro Focus
- Microsoft
- MobileIron
- NetScout Systems
- Palo Alto Networks
- ProofPoint
- Qualys
- Rapid7
- Raytheon
- SecureWorks
- Sophos
- Splunk
- Symantec
- Trend Micro
- Verint Systems
- Aker Security Solutions
- AlienVault
- Avira
- Bayshore Networks
- Carbon Black
- CloudFlare
- Darktrace
- Dell
- Demonsaw
- E8 Security
- HackerOne
- Herjavec Group
- Hillstone Networks
- Huawei
- Illusive Networks
- Kaspersky Lab
- Palantir
- Qihoo 360
- Tanium
- Untangle
- Veracode
- WatchGuard
- WhiteHat Security
- ZeroFOX
- Alibaba
- Amazon
- eBay
- Target