Cover Image
市場調查報告書

管理·安全服務的全球市場 - 規模,佔有率,全球趨勢,企業簡介,需求,考察,分析,調查,報告,市場機會,分類,市場預測:2013∼2020年

Global Managed Security Services Market (Deployment Modes, Organization Size, Applications, Verticals, Geographies) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Opportunities, Segmentation, Forecast 2013-2020

出版商 Allied Market Research 商品編碼 329497
出版日期 內容資訊 英文 125 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
管理·安全服務的全球市場 - 規模,佔有率,全球趨勢,企業簡介,需求,考察,分析,調查,報告,市場機會,分類,市場預測:2013∼2020年 Global Managed Security Services Market (Deployment Modes, Organization Size, Applications, Verticals, Geographies) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Opportunities, Segmentation, Forecast 2013-2020
出版日期: 2015年04月15日 內容資訊: 英文 125 Pages
簡介

所謂管理·安全服務(MSS)是為了有效率地保護企業的重要資料,由第三方服務供應商所提供 的IT安全功能之遠端監視及管理。隨著商務的成長,資訊安全由於其量、結構及行動終端、社群媒體、雲端服務、巨量資料的利用等因素,造成其功能的複雜度與日俱增。網路犯罪者透過群體對安全的功擊及惡意行為的增力口,讓商務在各種層面皆有所憂。

本報告提供管理·安全服務的全球市場概要和趨勢,提供您結構,抑制因素與市場機會分析,到2020年前的定量分析,價值鏈分析等資訊。

第1章 簡介

  • 本報告概要
  • 主要的優點
  • 主要市場分類
  • 調查手法
    • 二次調查
    • 一次調查
    • 分析工具和模式

第2章 摘要整理

  • CXO的見解
  • 摘要整理
  • 今後的市場:到2025年前的期待
    • 緩慢的方案
    • 樂觀的方案
    • 縮小方案

第3章 市場概要

  • 市場定義和調查範圍
  • 主要調查結果
    • 主要的影響因素
    • 主要的投資策略
    • 主要的勝策略
  • 波特的五力分析
    • 供應商的增加使供應商談判力低
    • 自訂解決方案的需求保持了某種程度的買主談判力
    • 內部安全管理用資本和IT資源的不足降低了替代品的威脅
    • 技術性及政策的要件降低了新加入廠商的威脅
    • 強力的企業存在讓競爭日益激烈
  • 價值鏈分析
  • 市場佔有率分析
  • 市場動態
    • 促進要素
    • 抑制因素
    • 市場機會

第4章 MSS的全球市場(引進模式別)

  • 簡介
    • 市場規模與預測
  • 託管/雲端型管理·安全服務
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 內部部署/顧客區域內設備(CPE)型管理·安全服務
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第5章 MSS的全球市場(不同企業規模)

  • 簡介
    • 市場規模與預測
  • 中小企業
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 大企業
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第6章 MSS的全球市場(各應用領域)

  • 簡介
    • 市場規模與預測
  • 管理侵入防止系統(IPS)和入侵檢測系統(IDS)
    • 市場規模與預測
  • DDoS(Distributed Denial of Services)
    • 市場規模與預測
  • 保護資訊與活動管理(SIEM)
    • 市場規模與預測
  • 端點安全防護
    • 市場規模與預測
  • 防火牆管理
    • 市場規模與預測
  • 其他
    • 市場規模與預測

第7章 MSS的全球市場(各產業)

  • 簡介
    • 市場規模與預測
  • 銀行·金融服務·保險
    • 市場規模與預測
  • 醫療
    • 市場規模與預測
  • 製造
    • 市場規模與預測
  • 零售
    • 市場規模與預測
  • 通訊·資訊技術
    • 市場規模與預測
  • 其他
    • 市場規模與預測

第8章 MSS的全球市場(各地區)

  • 北美
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 歐洲
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 亞太地區
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測
  • 南美·中東·非洲
    • 主要市場趨勢
    • 競爭方案
    • 主要的成長因素與市場機會
    • 市場規模與預測

第9章 企業簡介

  • International Business Machines Corporation (IBM)
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Hewlett Packard
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • AT&T Inc.
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Computer Science Corporation (CSC)
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Symantec Corporation
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Dell SecureWorks Inc.
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Cisco Systems Inc.
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Fortinet Inc.
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • Check Point Software Technologies Ltd.
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
  • BT Group
    • 概要
    • 產業實際成果
    • 策略與發展
    • SWOT分析與策略
目錄
Product Code: IC 15217

Managed Security Services (MSS) refers to the remote monitoring and management of IT security functions by third-party service providers in order to effectively protect the sensitive data of the organizations. The task of information security is becoming more complex with the growth of the business in terms of size and structure, and utilization of mobile devices, social media, cloud services and big data. Rising number of security attacks and malicious practices by organized cyber criminals have been creating concerns among of all sectors of businesses. Additionally, increased complexities in network infrastructure and lack of capital and skilled IT professionals are proving to be major hindrances in data security management. In such scenario, the outsourcing of security task to managed security service providers has emerged as a lucrative option for the organizations. Managed security services may either be delivered by setting up necessary security infrastructure on-site in the organization, or completely controlled by the service provider from remote location.

The trend of BYOD adoption at workplaces to improve the productivity by allowing the employee to access corporate data via personal devices has been rising, thereby increasing the need for data security. Lack of capital resources and skilled IT staff has been diverting organizations from in-house security management. Additionally, compliance requirements for data security are stimulating the organizations to outsource the data security tasks. However, reluctance to share sensitive data and varying customer demands regarding security package are the major challenges for the market. Further, the growing awareness and concerns about data breaches would create the opportunities for MSSPs in the future.

The global managed security services market is segmented on the basis of deployment mode, organization size, application, verticals and geography. Application segment include managed IPS/IDS, Distributed Denial of Services (DDoS), Unified threat management (UTM), firewall management, and endpoint security. Deployment mode includes cloud-based and on-premise or customer-premise equipment deployment mode. The organizations are divided into small- and medium-sized businesses and large businesses. Verticals segment includes BFSI, telecom and IT, retail, healthcare, manufacturing sectors and other. Key players in MSS market include IBM, HP, Cisco Systems Inc., Dell SecureWorks, AT&T, Computer Science Corp., Symantec Corp., Fortinet Inc., Check Point Software Technologies Ltd. and BT Group.KEY BENEFITS

This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market

The report provides information regarding key drivers, restraints and opportunities with impact analysis

Porter's five forces analysis and a SWOT analysis of the key market players are provided to illustrate the business strategies adopted by them

The value chain analysis of the industry provides a clear view of key intermediaries involved and elaborates their roles and value addition at every stage in the chain

The quantitative analysis of the market through 2013-2020 is provided to elaborate the market potential

Key Market Segments:

The market is segmented on the basis of deployment mode, organization size, application, verticals and geography.

Deployment Mode:

  • Hosted or cloud-based MSS
  • On-premise or customer-premise equipment (CPE) MSS

Organization Size:

  • Small- and Medium-sized businesses
  • Large businesses

Applications:

  • Managed IPS and IDS
  • Distributed Denial of Services (DDoS)
  • Unified threat management (UTM)
  • Secured information and event management (SIEM)
  • Firewall management
  • Endpoint Security
  • Others

Verticals:

  • Banking Financial Services and Insurance (BFSI)
  • Healthcare
  • Manufacturing
  • Retail
  • Telecom & IT
  • Others
  • Geography:
  • North America
  • Europe
  • Asia-Pacific
  • Latin America, Middle East and Africa (LAMEA)

Key Players:

  • IBM Corporation
  • HP
  • Cisco Systems Inc.
  • Dell SecureWorks
  • AT&T
  • Computer Science Corp.
  • Symantec Corp.
  • Fortinet Inc.
  • Check Point Software Technologies Ltd.
  • BT Group

Table of Contents

CHAPTER 1 - INTRODUCTION

  • 1.1. Report description
  • 1.2. Key benefits
  • 1.3. Key market segments
  • 1.4. Research methodology
    • 1.4.1. Secondary research
    • 1.4.2. Primary research
    • 1.4.3. Analyst tools and models

CHAPTER 2 - EXECUTIVE SUMMARY

  • 2.1. CXO perspective
  • 2.2. Market beyond: What to expect by 2025
    • 2.2.1. Moderate case scenario
    • 2.2.2. Optimistic case scenario
    • 2.2.3. Diminishing case scenario

CHAPTER 3 - MARKET OVERVIEW

  • 3.1. Market definition and scope
  • 3.2. Key findings
    • 3.2.1. Top impacting factors
    • 3.2.2. Top investment pockets
    • 3.2.3. Top winning strategies
  • 3.3. Porter's five forces analysis
    • 3.3.1. Plenty of suppliers lowers the bargaining power of suppliers
    • 3.3.2. Demand of customized solutions keeps buyers bargaining power at moderate level
    • 3.3.3. Lack of capital and IT resources for in-house security management lowers the threat of substitute
    • 3.3.4. Technological and policy requirement lowers the threat of new entrants
    • 3.3.5. Presence of strong players intensifies the rivalry
  • 3.4. Value chain analysis
  • 3.5. Market share analysis
  • 3.6. Market dynamics
    • 3.6.1. Drivers
      • 3.6.1.1. Increasing cyber crime activities
      • 3.6.1.2. Cost effectiviness
      • 3.6.1.3. Stringent government regulations
      • 3.6.1.4. Growing trend of mobile devices at workplaces
      • 3.6.1.5. Rise in electronic data
    • 3.6.2. Restraints
      • 3.6.2.1. Hesitation to share sensitive data
      • 3.6.2.2. Demand of customized services
    • 3.6.3. Opportunities
      • 3.6.3.1. Growing awareness about data security
      • 3.6.3.2. Growing importance of e-business

CHAPTER 4 - GLOBAL MSS MARKET BY DEPLOYMENT MODE

  • 4.1. Introduction
    • 4.1.1. Market size and forecast
  • 4.2. Hosted or cloud based managed security services
    • 4.2.1. Key market trends
    • 4.2.2. Competitive scenario
    • 4.2.3. Key growth factors and opportunities
    • 4.2.4. Market size and forecast
  • 4.3. On-premise or Customer Premise Equipment (CPE) managed security services
    • 4.3.1. Key market trends
    • 4.3.2. Competitive scenario
    • 4.3.3. Key growth factors and opportunities
    • 4.3.4. Market size and forecast

CHAPTER 5 - GLOBAL MSS MARKET BY ORGANIZATION SIZE

  • 5.1. Introduction
    • 5.1.1. Market size and forecast
  • 5.2. Small and medium sized business
    • 5.2.1. Key market trends
    • 5.2.2. Competitive scenario
    • 5.2.3. Key growth factors and opportunities
    • 5.2.4. Market size and forecast
  • 5.3. Large businesses
    • 5.3.1. Key market trends
    • 5.3.2. Competitive scenario
    • 5.3.3. Key growth factors and opportunities
    • 5.3.4. Market size and forecast

CHAPTER 6 - GLOBAL MSS MARKET BY APPLICATION

  • 6.1. Introduction
    • 6.1.1. Market size and forecast
  • 6.2. Managed Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS)
    • 6.2.1. Market size and forecast
  • 6.3. Distributed Denial of Services (DDoS)
    • 6.3.1. Market size and forecast
  • 6.4. Unified Threat Management (UTM)
    • 6.4.1. Market size and forecast
  • 6.5. Secured Information and Event Management (SIEM)
    • 6.5.1. Market size and forecast
  • 6.6. Endpoint security
    • 6.6.1. Market size and forecast
  • 6.7. Firewall management
    • 6.7.1. Market size and forecast
  • 6.8. Others
    • 6.8.1. Market size and forecast

CHAPTER 7 - GLOBAL MSS MARKET BY VERTICALS

  • 7.1. Introduction
    • 7.1.1. Market size and forecast
  • 7.2. Banking, Financial Services and Insurance (BFSI)
    • 7.2.1. Market size and forecast
  • 7.3. Healthcare
    • 7.3.1. Market size and forecast
  • 7.4. Manufacturing
    • 7.4.1. Market size and forecast
  • 7.5. Retail
    • 7.5.1. Market size and forecast
  • 7.6. Telecom and information technology
    • 7.6.1. Market size and forecast
  • 7.7. Others
    • 7.7.1. Market size and forecast

CHAPTER 8 - GLOBAL MSS MARKET BY GEOGRAPHY

  • 8.1. North America
    • 8.1.1. Key market trends
    • 8.1.2. Competitive scenario
    • 8.1.3. Key growth factors and opportunities
    • 8.1.4. Market size and forecast
  • 8.2. Europe
    • 8.2.1. Key market trends
    • 8.2.2. Competitive scenario
    • 8.2.3. Key growth factors and opportunities
    • 8.2.4. Market size and forecast
  • 8.3. Asia Pacific
    • 8.3.1. Key Market trends
    • 8.3.2. Competitive scenario
    • 8.3.3. Key growth factors and opportunities
    • 8.3.4. Market size and forecast
  • 8.4. Latin America, Middle East and Africa (LAMEA)
    • 8.4.1. Key market trends
    • 8.4.2. Competitive scenario
    • 8.4.3. Key growth factors and opportunities
    • 8.4.4. Market size and forecast

CHAPTER 9 - COMPANY PROFILES

  • 9.1. International Business Machines Corporation (IBM)
    • 9.1.1. Company overview
    • 9.1.2. Company Snapshot
    • 9.1.1. Business Performance
    • 9.1.2. Strategic Moves and Developments
    • 9.1.3. SWOT Analysis and Strategic Conclusion of IBM Corp.
  • 9.2. Hewlett Packard
    • 9.2.1. Company Overview
    • 9.2.2. Company Snapshot
    • 9.2.3. Business performance
    • 9.2.4. Strategic Moves and Developments
    • 9.2.5. SWOT Analysis and Strategic Conclusion of Hewlett Packard
  • 9.3. AT&T Inc.
    • 9.3.1. Company overview
    • 9.3.2. Company snapshot
    • 9.3.3. Business performance
    • 9.3.4. Strategic moves and developments
    • 9.3.5. SWOT analysis and strategic conclusion of AT&T Inc.
  • 9.4. Computer Science Corporation (CSC)
    • 9.4.1. Company overview
    • 9.4.2. Company snapshot
    • 9.4.3. Business performance
    • 9.4.4. Strategic moves and developments
    • 9.4.5. SWOT analysis and strategic conclusion of CSC
  • 9.5. Symantec Corporation
    • 9.5.1. Company overview
    • 9.5.2. Company snapshot
    • 9.5.3. Business performance
    • 9.5.4. Strategic moves and developments
    • 9.5.5. SWOT analysis and strategic conclusion of Symantec Corp.
  • 9.6. Dell SecureWorks Inc.
    • 9.6.1. Company overview
    • 9.6.2. Company snapshot
    • 9.6.3. Business performance
    • 9.6.4. Strategic moves and developments
    • 9.6.5. SWOT analysis and strategic conclusion of Dell SecureWorks
  • 9.7. Cisco Systems Inc.
    • 9.7.1. Company overview
    • 9.7.2. Company snapshot
    • 9.7.3. Business performance
    • 9.7.4. Strategic moves and developments
    • 9.7.5. SWOT analysis and strategic conclusion of Cisco Systems Inc.
  • 9.8. Fortinet Inc.
    • 9.8.1. Company overview
    • 9.8.2. Company snapshot
    • 9.8.3. Business performance
    • 9.8.4. Strategic moves and developments
    • 9.8.5. SWOT analysis and strategic conclusion of Fortinet Inc.
  • 9.9. Check Point Software Technologies Ltd.
    • 9.9.1. Company overview
    • 9.9.2. Company snapshot
    • 9.9.3. Business performance
    • 9.9.4. Strategic moves and developments
    • 9.9.5. SWOT analysis and strategic conclusion of Check Point Software Technologies Ltd.
  • 9.10. BT Group
    • 9.10.1. Company overview
    • 9.10.2. Company snapshot
    • 9.10.3. Business performance
    • 9.10.4. Strategic moves and developments
    • 9.10.5. SWOT analysis and strategic conclusion of BT Group

List of Tables

  • TABLE 1: GLOBAL MSS MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 2: GLOBAL MSS MARKET REVENUE MODERATE GROWTH SCENARIO, 2020 - 2025 ($MILLION)
  • TABLE 3: GLOBAL MSS MARKET REVENUE RAPID GROWTH SCENARIO, 2020 - 2025 ($MILLION)
  • TABLE 4: GLOBAL MSS MARKET REVENUE DIMINISHING GROWTH SCENARIO, 2020 - 2025 ($MILLION)
  • TABLE 5: TOTAL NET COST OF CYBERCRIME IN USA AND WORLDWIDE
  • TABLE 6: COST COMPARISON OF IN-HOUSE SIEM AND MSSP SECURITY SOLUTIONS, 2014
  • TABLE 7: DIFFERENCE BETWEEN ON-PREMISE AND CLOUD BASED MANAGED SECURITY SERVICES
  • TABLE 8: GLOBAL MSS MARKET REVENUE BY DEPLOYMENT MODE, 2013-2020 ($MILLION)
  • TABLE 9: GLOBAL HOSTED OR CLOUD BASED MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 10: GLOBAL ON-PREMISE OR CUSTOMER PREMISE EQUIPMENT MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 11: GLOBAL MSS MARKET BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 12: GLOBAL SMALL AND MEDIUM SIZED BUSINESSES MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 13: GLOBAL LARGE BUSINESSES MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 14: GLOBAL MSS MARKET BY APPLICATION, 2013-2020 ($MILLION)
  • TABLE 15: GLOBAL MANAGED IPS/IDS MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 16: GLOBAL DDOS MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 17: GLOBAL UTM MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 18: GLOBAL SIEM MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 19: GLOBAL ENDPOINT SECURITY MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 20: GLOBAL FIREWALL MANAGEMENT MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 21: GLOBAL OTHER APPLICATIONS MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 22: GLOBAL MSS MARKET BY VERTICALS, 2013-2020 ($MILLION)
  • TABLE 23: SECURITY LOSS IN VARIOUS BANKS IN INDIA
  • TABLE 24: GLOBAL BFSI SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 25: GLOBAL HEALTHCARE SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 26: GLOBAL MANUFACTURING SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 27: GLOBAL RETAIL SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 28: GLOBAL TELECOM AND IT SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 29: GLOBAL OTHER SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
  • TABLE 30: MSS MARKET IN NORTH AMERICA, 2013-2020 ($MILLION)
  • TABLE 31: MSS MARKET IN EUROPE, 2013-2020 ($MILLION)
  • TABLE 32: MSS MARKET IN ASIA PACIFIC, 2013-2020 ($MILLION)
  • TABLE 33: MSS MARKET IN LAMEA, 2013-2020 ($MILLION)
  • TABLE 34: IBM CORPORATION SNAPSHOT
  • TABLE 35: HEWLETT PACKARD SNAPSHOT
  • TABLE 36: AT&T INC. SNAPSHOT
  • TABLE 37: CSC SNAPSHOT
  • TABLE 38: SYMANTEC CORP. SNAPSHOT
  • TABLE 39: DELL SECUREWORKS SNAPSHOT
  • TABLE 40: CISCO SYSTEMS INC. SNAPSHOT
  • TABLE 41: FORTINET INC. SNAPSHOT
  • TABLE 42: CHECK POINT SOFTWARE TECHNOLOGIES LTD. SNAPSHOT
  • TABLE 43: BT GROUP SNAPSHOT

List of Figures

  • FIG. 1: TOP IMPACTING FACTORS, MODERATE GROWTH SCENARIO (2020-2025)
  • FIG. 2: TOP IMPACTING FACTORS, RAPID GROWTH SCENARIO (2020-2025)
  • FIG. 3: TOP IMPACTING FACTORS, DIMINISHING GROWTH SCENARIO (2020-2025)
  • FIG. 4: TOP FACTORS IMPACTING GLOBAL MSS MARKET
  • FIG. 5: TOP INVESTMENT POCKETS
  • FIG. 6: TOP WINNING STRATEGIES
  • FIG. 7: PORTER'S FIVE FORCES ANALYSIS
  • FIG. 8: VALUE CHAIN ANALYSIS
  • FIG. 9: MARKET SHARE ANALYSIS, 2013
  • FIG. 10: AVERAGE ANNUALIZED COST DUE TO CYBERCRIME BY INDUSTRY SECTOR IN US $, 2011
  • FIG. 11: MALWARE TARGETING ANDROID IN 2011 AND 2012
  • FIG. 12: GROWING E-COMMERCE MARKET
  • FIG. 13: USE OF CLOUD COMPUTING SERVICES AMONG EUROPEAN ENTERPRISES, 2014
  • FIG. 14: APPLICATIOINS LEAST FREQUENTLY TRANSFERRED FROM ON-PREMISE TO CLOUD, 2011(% OF COMPANIES)
  • FIG. 15: WORLDWIDE SMB IT SPENDING VS WORLDWIDE CORPORATE IT SPENDING
  • FIG. 16: E-COMMERCE SPENDING IN 2011 COMPARED TO 2010 IN UNITED STATES, $ MILLION
  • FIG. 17: COST OF DATA BREACH (U. S.) BY CAUSE OVER TIME
  • FIG. 18: REVENUE GENERATED BY IBM CORP., 2013-2011, $ MILLION
  • FIG. 19: REVENUE OF IBM CORP. BY BUSINESS SEGMENT, 2013
  • FIG. 20: REVENUE OF IBM CORP. BY GEOGRAPHY, 2013
  • FIG. 21: SWOT ANALYSIS OF IBM
  • FIG. 22: REVENUE GENERATED BY HEWLETT PACKARD, 2013-2011, $ MILLION
  • FIG. 23: REVENUE OF HEWLETT PACKARD BY BUSINESS SEGMENT, 2013
  • FIG. 24: REVENUE OF HEWLETT PACKARD BY GEOGRAPHY, 2013
  • FIG. 25: SWOT ANALYSIS OF HEWLETT PACKARD
  • FIG. 26: REVENUE GENERATED BY AT&T INC., 2011-2013, $ MILLION
  • FIG. 27: REVENUE OF AT&T INC. BY BUSINESS SEGMENT, 2013
  • FIG. 28: SWOT ANALYSIS OF AT&T INC.
  • FIG. 29: REVENUE GENERATED BY CSC, 2012-2014, $ MILLION
  • FIG. 30: REVENUE OF CSC BY BUSINESS SEGMENT, 2014
  • FIG. 31: REVENUE OF CSC BY GEOGRAPHY, 2014
  • FIG. 32: SWOT ANALYSIS OF CSC
  • FIG. 33: REVENUE GENERATED BY SYMANTEC CORP., 2012-2014, $ MILLION
  • FIG. 34: REVENUE OF SYMANTEC CORP. BY BUSINESS SEGMENT, 2014
  • FIG. 35: REVENUE OF SYMANTEC CORP. BY GEOGRAPHY, 2014
  • FIG. 36: SWOT ANALYSIS OF SYMANTEC CORP.
  • FIG. 37: REVENUE GENERATED BY DELL SECUREWORKS, 2011-2013, $ MILLION
  • FIG. 38: REVENUE OF DELL SECUREWORKS BY BUSINESS SEGMENT, 2013
  • FIG. 39: REVENUE OF DELL SECUREWORKS BY GEOGRAPHY, 2013
  • FIG. 40: SWOT ANALYSIS OF DELL SECUREWORKS
  • FIG. 41: REVENUE GENERATED BY CISCO SYSTEMS INC., 2011-2013, $ MILLION
  • FIG. 42: REVENUE OF CISCO SYSTEMS INC. BY BUSINESS SEGMENT, 2013
  • FIG. 43: REVENUE OF CISCO SYSTEMS INC. BY GEOGRAPHY, 2013
  • FIG. 44: SWOT ANALYSIS OF CISCO SYSTEMS INC.
  • FIG. 45: REVENUE GENERATED BY FORTINET INC., 2011-2013, $ MILLION
  • FIG. 46: REVENUE OF FORTINET INC. BY BUSINESS SEGMENT, 2013
  • FIG. 47: REVENUE OF FORTINET INC. BY GEOGRAPHY, 2013
  • FIG. 48: SWOT ANALYSIS OF FORTINET INC.
  • FIG. 49: REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES LTD., 2011-2013, $ MILLION
  • FIG. 50: REVENUE OF CHECK POINT SOFTWARE TECHNOLOGIES LTD. BY BUSINESS SEGMENT, 2013
  • FIG. 51: SWOT ANALYSIS OF CHECK POINT SOFTWARE TECHNOLOGIES LTD.
  • FIG. 52: REVENUE GENERATED BY BT GROUP, 2011-2013, $ MILLION
  • FIG. 53: REVENUE OF BT GROUP BY BUSINESS SEGMENT, 2013
  • FIG. 54: SWOT ANALYSIS OF BT GROUP
Back to Top