Executive Summary
Key Findings
Key Findings (continued)
Market Definitions - Cloud Workload and Cloud Applications
What is a Cloud Workload?
The Rise of Public Cloud Workloads
Workloads in the Cloud
Typical Workloads in the Hybrid Cloud

Mounting Risks and the Failure of Legacy Security Approaches
Mounting Risks to Data Security
The Shared-Responsibility Security Model
The Failure of Legacy Security Tools

Key Requirements for Cloud Workload Protection
Key Requirements for Cloud Workload Protection
Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools
Key Requirements for Cloud Workload Protection––Failure of Legacy Security Tools (continued)
What is Cloud Workload Protection (CWP)?
Cloud Workload Protection Architecture
CWP Architecture - Agent-based, Agent-less or API-based, and Hybrid
Hybrid Monitoring and Protection Model
Cloud Workload Protection Layers

Cloud Workload Protection Market Landscape
Market Landscape
Top Cloud Workload Protection by Cloud Service Providers (CSP)
Cloud Workload Protection by Amazon Web Services (AWS)
Cloud Workload Protection by Google Cloud
Cloud Workload Protection by Microsoft Azure
Cloud Workload Protection by IBM Cloud
Cloud Workload Protection by Oracle
Cloud Workload Protection by VMware
Cloud Service Providers Key Capability Comparison
Top Cloud Workload Protection Platforms by Security Vendors
Vendor Profiling - Cisco Systems
Vendor Profiling - Check Point Software Technologies
Vendor Profiling - McAfee
Vendor Profiling - Palo Alto Networks
Vendor Profiling - Symantec
Vendor Profiling - Trend Micro
Vendor Profiling - VMware (Carbon Black)
Vendor Profiling - Crowdstrike
Vendor Key Capability Comparison
Growth Opportunities and Companies to Action
Transformation in CWP Ecosystem
Growth Opportunity 1-Market Education Essential at Early Stage Along with Collaboration with Local CSPs
Growth Opportunity 2-Increasing Need for Managed CWP Services
Growth Opportunity 3-Foresee More Threat Intelligence Service Integration
Growth Opportunity 4-Need for DevSecOps and Security Training
Strategic Imperatives for Success and Growth
The Last Word
The Last Word
Legal Disclaimer
Appendix
List of Exhibits
The Frost & Sullivan Story
The Frost & Sullivan Story
Value Proposition: Future of Your Company & Career
Global Perspective
Industry Convergence
360º Research Perspective
Implementation Excellence
Our Blue Ocean Strategy