網絡安全技術:技術與全球市場
市場調查報告書
商品編碼
1071525

網絡安全技術:技術與全球市場

Cyber Security: Technologies and Global Markets

出版日期: | 出版商: BCC Research | 英文 346 Pages | 訂單完成後即時交付

價格

2021年全球網絡安全技術市場規模達到2054億美元。

預計從 2021 年到 2026 年,該市場將以 12.3% 的複合年增長率增長,到 2026 年達到 3673 億美元。

本報告探討了全球網絡安全技術市場,以及按類型、解決方案、部署模式、最終用戶組織規模、行業最終用戶、區域趨勢和市場進入的市場概況。我們提供公司簡介等。

目錄

第1章介紹

第2章總結與重點

第3章市場概況和背景

  • 市場概況
  • 網絡安全的重要性
  • 網絡安全目標
  • 網絡攻擊的類型
  • 組織注意事項
  • 生命週期分析
  • 安全要求
  • 對網絡安全的需求
  • 網絡安全的好處
  • 市場動態
  • 市場驅動力
  • 市場限制
  • 市場機會
  • 市場挑戰
  • 當前市場趨勢
  • 法規的影響
  • COVID-19 的影響
  • 網絡威脅形勢
  • 網絡安全解決方案

第 4 章市場細分,按類型

  • 簡介
  • 網絡安全
  • 雲安全
  • 端點安全
  • 無線安全
  • 應用安全
  • 內容安全
  • 其他

第 5 章市場細分,按解決方案

  • 簡介
  • 防病毒和防惡意軟件
  • 風險與合規管理
  • ID 和訪問控制 (IAM)
  • 網頁過濾

第 6 章市場細分,按部署模式

  • 簡介
  • 本地
  • 數據層
  • 應用層
  • 服務器層
  • 網絡層
  • 用戶界面(UI)層

第 7 章市場細分,按最終用戶組織規模分類

  • 簡介
  • 大公司
  • 中小企業

第 8 章市場細分,按行業最終用戶

  • 簡介
  • 銀行、金融服務和機構 (BFSI)
  • 電信、信息技術 (IT)
  • 國防、情報
  • 零售
  • 醫療保健
  • 政府
  • 其他

第 9 章市場細分,按地區

  • 簡介
  • 北美市場前景
  • 北美網絡安全法規
  • 歐洲網絡安全法規
  • 亞太市場展望
  • 其他區域市場展望

第10章競爭態勢

  • 市場份額分析
  • 戰略分析
  • 產品發布和開發
  • 合同、合作、夥伴關係
  • 收購、擴張、合併、投資

第 11 章公司簡介

  • ACCENTURE PLC
  • BAE SYSTEMS PLC
  • BARRACUDA NETWORKS INC.
  • BOOZ ALLEN HAMILTON HOLDING CORP.
  • CHECK POINT SOFTWARE TECHNOLOGIES LTD.
  • CISCO SYSTEMS INC.
  • DELL TECHNOLOGIES INC.(SONICWALL INC.)
  • DXC TECHNOLOGY CO.
  • FORTINET INC.
  • HEWLETT PACKARD ENTERPRISE CO.
  • INTERNATIONAL BUSINESS MACHINES(IBM)CORP.
  • INTEL CORP.
  • JUNIPER NETWORKS INC.
  • KASPERSKY LAB LTD.
  • LOCKHEED MARTIN CORP.
  • MCAFEE CORP.
  • MICROSOFT CORP.
  • NORTHROP GRUMMAN CORP.
  • NORTONLIFELOCK INC.
  • PALO ALTO NETWORKS INC.
  • RAPID7 INC.
  • RSA SECURITY LLC
  • SOPHOS GROUP PLC
  • THALES GROUP
  • TRELLIX US LLC
  • TREND MICRO INC.

第12章 附錄:頭文字清單

Product Code: IFT131C

Highlights:

The global cybersecurity technologies market should reach $367.3 billion by 2026 from $205.4 billion in 2021 at a compound annual growth rate (CAGR) of 12.3% for the forecast period of 2021 to 2026.

The network security segment of the global cybersecurity technologies market is expected to grow from $60.7 billion in 2021 to $106.9 billion in 2026 at a CAGR of 12.0% for the forecast period of 2021 to 2026.

The cloud security segment of the global cybersecurity technologies market is expected to grow from $30.2 billion in 2021 to $59.8 billion in 2026 at a CAGR of 14.7% for the forecast period of 2021 to 2026.

Report Scope:

The scope of the report encompasses various technologies used in cybersecurity applications and deployment types. The market is divided on the basis of enterprise size. Applications for the market are segmented into BFSI, defense and intelligence, healthcare, retail, IT and telecommunications, government, and others, which includes the education and manufacturing sectors. The present cybersecurity market offers an opportunity to stakeholders largely because of a surge in cloud-based services and the increased use of the internet for online financial transactions.

This report highlights different solutions in the cybersecurity market, which include identity and access management (IAM), encryption, data loss protection (DLP), firewalls, antivirus and antimalware, disaster recovery, risk and compliance management, and other solutions. Other types of solutions include unified threat management (UTM), distributed denial of service mitigation and web filtering. In addition, the report offers major regional analysis of North America, Europe, Asia-Pacific, the Middle East and Africa. The estimated and forecast market revenue considered in this report is the summation of prices for software, hardware and subscription services.

This report also offers insights on drivers, restraints and opportunities for the market, which was gathered through primary and secondary research. Strategies adopted by companies in the cybersecurity market are provided so readers can analyze ongoing trends in the market. The report provides market share analyses and key vendor profiles for the top cybersecurity companies.

COVID-19 has had a massive impact on society since the start of 2020. This report considers the impact of COVID-19 and the economic slowdown it created. With people relying more on technology, cyberattacks have increased. It is expected that the demand for cybersecurity solutions will increase and boost the cybersecurity market.

Report Includes:

  • 79 data tables and 87 additional tables
  • An up-to-date review and analysis of the global markets for cyber security technologies
  • Analyses of the global market trends, with data from 2020 to 2021, estimates for 2022 and 2024, and projections of compound annual growth rates (CAGRs) through 2026
  • Highlights of the upcoming market potential for cyber security industry, and areas of focus to forecast this market into various segments and subsegments
  • Evaluation and forecast the global cyber security market size, projected growth trends, and corresponding market share analysis by type, solution, deployment mode, organization size, end-user industry and region
  • Discussion of the key market dynamics (DROs) in the cyber security industry, technology updates, value chain analysis, and COVID-19 implications on the progress of this market
  • Insight into recent industry structure, current competitive scenario, major growth strategies, and company value share analysis based on their segmental revenues
  • Descriptive company profiles of the leading global players, including Accenture PLC, Dell Technologies Inc., IBM Corp., Microsoft Corp. and Thales Group

Table of Contents

Chapter 1 Introduction

  • Study Goals and Objectives
  • Reasons for Doing This Study
  • What's New in This Update?
  • Scope of Report
  • Research Methodology
  • Intended Audience
  • Geographic Breakdown
  • Analyst's Credentials
  • BCC Custom Research
  • Related BCC Research Reports

Chapter 2 Summary and Highlights

Chapter 3 Market Overview and Background

  • Market Overview
  • Importance of Cybersecurity
  • Cybersecurity Goals
  • Classification of Cyberattacks
  • Web-based Attacks
  • System-based Attacks
  • Types of Cyberattacks
  • Active Attacks
  • Passive Attacks
  • Cybersecurity vs. Information Security
  • Preventive Measures for Organizations
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
  • Mobile Security Management (MSM)
  • Milestones in Cybersecurity
  • Life Cycle Analysis
  • Analysis of Computing Environment
  • Security Requirement
  • Designing Hardware and Software
  • Implementation of Design
  • Testing and Integration
  • Need for Cybersecurity
  • For Individuals
  • For Government
  • For Business Organizations
  • Benefits of Cybersecurity
  • Market Dynamics
  • Market Drivers
  • Market Restraints
  • Market Opportunities
  • Market Challenges
  • Current Market Trends
  • Bring Your Own Device (BYOD)
  • Remote Working Cybersecurity Risks
  • Mobile Cybersecurity Becoming Front and Center
  • Regulatory Implications
  • Impact of COVID-19
  • Cyber Threat Landscape
  • Cybersecurity Solutions

Chapter 4 Market Breakdown by Type

  • Introduction
  • Network Security
  • Top Network Security Threats
  • Ways to Mitigate Network Security Threats
  • Cloud Security
  • Top Cloud Security Threats
  • Ways to Mitigate Cloud Security Threats
  • Endpoint Security
  • Top Endpoint Security Threats
  • Ways to Mitigate Endpoint Security Threats
  • Wireless Security
  • Top Wireless Security Threats
  • Ways to Mitigate Wireless Security Threats
  • Application Security
  • Application Security Types
  • Top Application Security Threats
  • Ways to Mitigate Application Security Threats
  • Content Security
  • Ways to Mitigate Content Security Threats
  • Other
  • Database Security
  • Internet of Things (IoT) Security
  • Mobile Security
  • Messaging Security

Chapter 5 Market Breakdown by Solution

  • Introduction
  • Antivirus and Antimalware
  • Risk and Compliance Management
  • Identity and Access Management (IAM)
  • Encryption
  • Encryption Types
  • Firewall
  • Disaster Recovery (DR)
  • Data Loss Protection (DLP)
  • Others
  • Web Filtering
  • Distributed Denial of Service (DDoS) Mitigation
  • Unified Threat Management (UTM)

Chapter 6 Market Breakdown by Deployment Mode

  • Introduction
  • On-premises
  • Cloud
  • Data Layer
  • Application Layer
  • Server Layer
  • Network Layer
  • User Interface (UI) Layer

Chapter 7 Market Breakdown by End-User Organization Size

  • Introduction
  • Large Enterprises
  • Small and Medium Enterprises (SMEs)

Chapter 8 Market Breakdown by Industry End User

  • Introduction
  • Banking, Financial Services, and Institutions (BFSI)
  • Telecom and Information Technology (IT)
  • Defense and Intelligence
  • Retail
  • Healthcare
  • Government
  • Others
  • Manufacturing
  • Education
  • Transportation
  • Energy and Utility

Chapter 9 Market Breakdown by Region

  • Introduction
  • North American Market Outlook
  • North American Cybersecurity Regulations
  • North American Market by Country
  • European Market Outlook
  • European Cybersecurity Regulations
  • European Market by Country
  • European Market by Type
  • Asia-Pacific Market Outlook
  • Asia-Pacific Cybersecurity Regulations
  • Asia-Pacific Market by Country
  • Asia-Pacific Market by Type
  • Rest of the World (RoW) Market Outlook
  • RoW Security Regulations
  • RoW Market, by Country/Region
  • RoW Market by Type

Chapter 10 Competitive Landscape

  • Market Share Analysis
  • Strategic Analysis
  • Product Launches and Developments
  • Agreements, Collaborations and Partnerships
  • Acquisitions, Expansions, Mergers and Investments

Chapter 11 Company Profiles

  • ACCENTURE PLC
  • BAE SYSTEMS PLC
  • BARRACUDA NETWORKS INC.
  • BOOZ ALLEN HAMILTON HOLDING CORP.
  • CHECK POINT SOFTWARE TECHNOLOGIES LTD.
  • CISCO SYSTEMS INC.
  • DELL TECHNOLOGIES INC. (SONICWALL INC.)
  • DXC TECHNOLOGY CO.
  • FORTINET INC.
  • HEWLETT PACKARD ENTERPRISE CO.
  • INTERNATIONAL BUSINESS MACHINES (IBM) CORP.
  • INTEL CORP.
  • JUNIPER NETWORKS INC.
  • KASPERSKY LAB LTD.
  • LOCKHEED MARTIN CORP.
  • MCAFEE CORP.
  • MICROSOFT CORP.
  • NORTHROP GRUMMAN CORP.
  • NORTONLIFELOCK INC.
  • PALO ALTO NETWORKS INC.
  • RAPID7 INC.
  • RSA SECURITY LLC
  • SOPHOS GROUP PLC
  • THALES GROUP
  • TRELLIX US LLC
  • TREND MICRO INC.

Chapter 12 Appendix: List of Acronyms

List of Tables

  • Summary Table : Global Market for Cybersecurity Technologies, by Type, Through 2026
  • Table 1 : Types of Cyberattacks
  • Table 2 : Global Market for Cybersecurity Technologies, by Type, Through 2026
  • Table 3 : Global Market for Network Security Technologies, by Region, Through 2026
  • Table 4 : Global Market for Cloud Security Technologies, by Region, Through 2026
  • Table 5 : Global Market for Endpoint Security Technologies, by Region, Through 2026
  • Table 6 : Global Market for Wireless Security Technologies, by Region, Through 2026
  • Table 7 : Global Market for Management Application Security Technologies, by Region, Through 2026
  • Table 8 : Global Market for Content Security Technologies, by Region, Through 2026
  • Table 9 : Global Market for Other Types of Cybersecurity Technologies, by Region, Through 2026
  • Table 10 : Global Market for Cybersecurity Technologies, by Solution, Through 2026
  • Table 11 : Antivirus vs Antimalware
  • Table 12 : Global Market for Antivirus and Antimalware, by Region, Through 2026
  • Table 13 : Global Market for Risk and Compliance Management Solutions, by Region, Through 2026
  • Table 14 : Global Market for Identity and Access Management Solutions, by Region, Through 2026
  • Table 15 : Global Market for Encryption Soutions, by Region, Through 2026
  • Table 16 : Hardware Firewall vs Software Firewall
  • Table 17 : Global Market for Firewall Solutions, by Region, Through 2026
  • Table 18 : Global Market for Disaster Recovery Solutions, by Region, Through 2026
  • Table 19 : Global Market for Data Loss Protection Solutions, by Region, Through 2026
  • Table 20 : Global Market for Other Types of Cybersecurity Solutions, by Region, Through 2026
  • Table 21 : Global Market for Cybersecurity Technologies, by Deployment Mode, Through 2026
  • Table 22 : Global Market for On-premise Deployment of Cybersecurity Technologies, by Region, Through 2026
  • Table 23 : Global Market for Cloud Deployment of Cybersecurity Technologies, by Region, Through 2026
  • Table 24 : Global Market for Cybersecurity Technologies, by End-User Organization Size, Through 2026
  • Table 25 : Global Market for Cybersecurity Technologies Used by Large Enterprises, by Region, Through 2026
  • Table 26 : Global Market for Cybersecurity Technologies Used by SMEs, by Region, Through 2026
  • Table 27 : Global Market for Cybersecurity Technologies, by Industry End User, Through 2026
  • Table 28 : Global Market for Cybersecurity Technologies for BFSI End Users, by Region, Through 2026
  • Table 29 : Global Market for Cybersecurity Technologies for Telecom and IT End Users, by Region, Through 2026
  • Table 30 : Global Market for of Cybersecurity Technologies for Defense and Intelligence End Users, Through 2026
  • Table 31 : Global Market for Cybersecurity Technologies for Retail End Users, by Region, Through 2026
  • Table 32 : Global Market for Cybersecurity Technologies for Healthcare End Users, by Region, Through 2026
  • Table 33 : Global Market for Cybersecurity Technologies for Government End Users, by Region, Through 2026
  • Table 34 : Global Market for Cybersecurity Technologies for Other Types of End Users, by Region, Through 2026
  • Table 35 : Global Market for Cybersecurity Technologies, by Region, Through 2026
  • Table 36 : North American Cybersecurity Regulations
  • Table 37 : North American Market for Cybersecurity Technologies, by Country, Through 2026
  • Table 38 : North American Market for Cybersecurity Technologies, by Type, Through 2026
  • Table 39 : North American Market for Cybersecurity Technologies, by Solution, Through 2026
  • Table 40 : North American Market for Cybersecurity Technologies, by Deployment Mode, Through 2026
  • Table 41 : North American Market for Cybersecurity Technologies, by Organization Size, Through 2026
  • Table 42 : North American Market for Cybersecurity Technologies, by Industry End User, Through 2026
  • Table 43 : European Cybersecurity Regulations
  • Table 44 : European Market for Cybersecurity Technologies, by Country, Through 2026
  • Table 45 : European Market for Cybersecurity Technologies, by Type, Through 2026
  • Table 46 : European Market for Cybersecurity Technologies, by Solution, Through 2026
  • Table 47 : European Market for Cybersecurity Technologies, by Deployment Mode, Through 2026
  • Table 48 : European Market for Cybersecurity Technologies, by End-User Organization Size, Through 2026
  • Table 49 : European Market for Cybersecurity Technologies, by Industry End User, Through 2026
  • Table 50 : Asia-Pacific Cybersecurity Regulations
  • Table 51 : Asia-Pacific Market for Cybersecurity Technologies, by Country, Through 2026
  • Table 52 : Asia-Pacific Market for Cybersecurity Technologies, by Type, Through 2026
  • Table 53 : Asia-Pacific Market for Cybersecurity Technologies, by Solution, Through 2026
  • Table 54 : Asia-Pacific Market for Cybersecurity Technologies, by Deployment Mode, Through 2026
  • Table 55 : Asia-Pacific Market for Cybersecurity Technologies, by End-User Organization Size, Through 2026
  • Table 56 : Asia-Pacific Market for Cybersecurity Technologies, by Industry End User, Through 2026
  • Table 57 : RoW Cybersecurity Regulations
  • Table 58 : RoW Market for Cybersecurity Technologies, by Country/Region, Through 2026
  • Table 59 : RoW Market for Cybersecurity Technologies, by Type, Through 2026
  • Table 60 : RoW Market for Cybersecurity Technologies, by Solution, Through 2026
  • Table 61 : RoW Market for Cybersecurity Technologies, by Deployment Mode, Through 2026
  • Table 62 : RoW Market for Cybersecurity Technologies, by End-User Organization Size, Through 2026
  • Table 63 : RoW Market for Cybersecurity Technologies, by Industry End User, Through 2026
  • Table 64 : Accenture PLC: Company Snapshot
  • Table 65 : Accenture PLC: Products/Services
  • Table 66 : Accenture plc: Company Revenue, 2019-2021
  • Table 67 : Accenture PLC: Business Developments
  • Table 68 : BAE Systems PLC: Company Snapshot
  • Table 69 : BAE Systems Inc.: Products/Services
  • Table 70 : BAE Systems Inc.: Company Revenue, 2018-2020
  • Table 71 : BAE Systems PLC: Business Developments
  • Table 72 : Barracuda Networks Inc.: Company Snapshot
  • Table 73 : Barracuda Networks Inc.: Products/Services
  • Table 74 : Barracuda Networks Inc.: Business Developments
  • Table 75 : Booz Allen Hamilton Holding Corp.: Company Snapshot
  • Table 76 : Booz Allen Hamilton Holding Corp.: Products/Services
  • Table 77 : Booz Allen Hamilton Holding Corp.: Company Revenue, 2019-2021
  • Table 78 : Booz Allen Hamilton Holding Corp.: Business Developments
  • Table 79 : Check Point Software Technologies Ltd.: Company Snapshot
  • Table 80 : Check Point Software Technologies Ltd.: Products/Services
  • Table 81 : Check Point Software Technologies Ltd.: Company Revenue, 2018-2020
  • Table 82 : Check Point Software Technologies Ltd.: Business Developments
  • Table 83 : Cisco Systems Inc.: Company Snapshot
  • Table 84 : Cisco Systems Inc.: Products/Services
  • Table 85 : Cisco Systems Inc.: Company Revenue, 2019-2021
  • Table 86 : Cisco Systems Inc.: Business Developments
  • Table 87 : Dell Technologies Inc.: Company Snapshot
  • Table 88 : Dell Technologies Inc.: Products/Services
  • Table 89 : Dell Technologies Inc.: Company Revenue, 2019-2021
  • Table 90 : Dell Technologies Inc.: Business Developments
  • Table 91 : DXC Technology Co.: Company Snapshot
  • Table 92 : DXC Technology Co.: Products/Services
  • Table 93 : DXC Technology Co.: Company Revenue, 2019-2021
  • Table 94 : DXC Technology Co.: Business Developments
  • Table 95 : Fortinet Inc.: Company Snapshot
  • Table 96 : Fortinet Inc.: Products/Services
  • Table 97 : Fortinet Inc.: Company Revenue, 2018-2020
  • Table 98 : Fortinet Inc.: Business Developments
  • Table 99 : Hewlett Packard Enterprise Co.: Company Snapshot
  • Table 100 : Hewlett Packard Enterprise Co.: Products/Services
  • Table 101 : Hewlett Packard Enterprise Co.: Company Revenue, 2018-2020
  • Table 102 : Hewlett Packard Enterprise Co.: Business Developments
  • Table 103 : IBM Corp.: Company Snapshot
  • Table 104 : IBM Corp.: Products/Services
  • Table 105 : IBM Corp.: Company Revenue, 2018-2020
  • Table 106 : IBM Corp.: Business Developments
  • Table 107 : Intel Corp.: Company Snapshot
  • Table 108 : Intel Corp.: Products/Services
  • Table 109 : Intel Corp.: Company Revenue, 2019-2021
  • Table 110 : Intel Corp.: Business Developments
  • Table 111 : Juniper Networks Inc.: Company Snapshot
  • Table 112 : Juniper Networks Inc.: Products/Services
  • Table 113 : Juniper Networks Inc.: Company Revenue, 2019-2021
  • Table 114 : Juniper Networks Inc.: Business Developments
  • Table 115 : Kaspersky Lab Ltd.: Company Snapshot
  • Table 116 : Kaspersky Lab Ltd.: Products/Services
  • Table 117 : Kaspersky Lab Ltd.: Company Revenue, 2018-2020
  • Table 118 : Kaspersky Lab Ltd.: Business Developments
  • Table 119 : Lockheed Martin Corp.: Company Snapshot
  • Table 120 : Lockheed Martin Corp.: Products/Services
  • Table 121 : Lockheed Martin Corp.: Company Revenue, 2018-2020
  • Table 122 : Lockheed Martin Corp.: Business Developments
  • Table 123 : McAfee Corp.: Company Snapshot
  • Table 124 : McAfee Corp.: Products/Services
  • Table 125 : McAfee Corp.: Company Revenue, 2018-2020
  • Table 126 : McAfee Corp.: Business Developments
  • Table 127 : Microsoft Corp.: Company Snapshot
  • Table 128 : Microsoft Corp.: Products/Services
  • Table 129 : Microsoft Corp.: Company Revenue, 2019-2021
  • Table 130 : Microsoft Corp.: Business Developments
  • Table 131 : Northrop Grumman Corp.: Company Snapshot
  • Table 132 : Northrop Grumman Corp.: Products/Services
  • Table 133 : Northrop Grumman Corp.: Company Revenue, 2018-2020
  • Table 134 : Northrop Grumman Corp.: Business Developments
  • Table 135 : NortonLifeLock Inc.: Company Snapshot
  • Table 136 : NortonLifeLock Inc.: Products/Services
  • Table 137 : NortonLifeLock Inc.: Company Revenue, 2019-2021
  • Table 138 : NortonLifeLock Inc.: Business Developments
  • Table 139 : Palo Alto Networks Inc.: Company Snapshot
  • Table 140 : Palo Alto Networks Inc.: Products/Services
  • Table 141 : Palo Alto Networks Inc.: Company Revenue, 2019-2021
  • Table 142 : Palo Alto Networks Inc.: Business Developments
  • Table 143 : Rapid7 Inc.: Company Snapshot
  • Table 144 : Rapid7 Inc.: Products/Services
  • Table 145 : Rapid7 Inc.: Company Revenue, 2018-2020
  • Table 146 : Rapid7 Inc.: Business Developments
  • Table 147 : RSA Security LLC: Company Snapshot
  • Table 148 : RSA Security LLC: Products/Services
  • Table 149 : RSA Security LLC: Business Developments
  • Table 150 : Sophos Group PLC: Company Snapshot
  • Table 151 : Sophos Group PLC: Products/Services
  • Table 152 : Sophos Group PLC: Company Revenue, 2018-2020
  • Table 153 : Sophos Group PLC: Business Developments
  • Table 154 : Thales Group: Company Snapshot
  • Table 155 : Thales Group: Products/Services
  • Table 156 : Thales Group: Company Revenue, 2018-2020
  • Table 157 : Thales Group: Business Developments
  • Table 158 : Trellix US LLC: Company Snapshot
  • Table 159 : Trellix US LLC: Products/Services
  • Table 160 : Trellix US LLC: Business Developments
  • Table 161 : Trend Micro Inc.: Company Snapshot
  • Table 162 : Trend Micro Inc.: Products/Services
  • Table 163 : Trend Micro Inc.: Company Revenue, 2018-2020
  • Table 164 : Trend Micro Inc.: Business Developments
  • Table 165 : List of Acronyms

List of Figures

Figure A : Research Methodology

  • Summary Figure : Global Market Shares of Cybersecurity Technologies, by Type, 2020
  • Figure 1 : Cybersecurity Goals
  • Figure 2 : Classification of Cyberattacks
  • Figure 3 : Types of Password Attacks
  • Figure 4 : Types of MITM Attacks
  • Figure 5 : Types of Malware
  • Figure 6 : Life Cycle Analysis of Cybersecurity
  • Figure 7 : Benefits of Cybersecurity
  • Figure 8 : Cybersecurity Market Dynamics
  • Figure 9 : Global Market Shares of Cybersecurity Technologies, by Type, 2020
  • Figure 10 : Global Market Shares of Network Security Technologies, by Region, 2020
  • Figure 11 : Global Market Shares of Cloud Security Technologies, by Region, 2020
  • Figure 12 : Global Market Shares of Endpoint Security Technologies, by Region, 2020
  • Figure 13 : Global Market Shares of Wireless Security Technologies, by Region, 2020
  • Figure 14 : Global Market Shares of Management Application Security Technologies, by Region, 2020
  • Figure 15 : Global Market Shares of Content Security Technologies, by Region, 2020
  • Figure 16 : Global Market Shares of Other Types of Cybersecurity Technologies, by Region, 2020
  • Figure 17 : Global Market Shares of Cybersecurity Technologies, by Solution, 2020
  • Figure 18 : Global Market Shares of Antivirus and Antimalware, by Region, 2020
  • Figure 19 : Global Market Shares of Risk and Compliance Management Solutions, by Region, 2020
  • Figure 20 : Global Market Shares of Identity and Access Management Solutions, by Region, 2020
  • Figure 21 : Global Market Shares of Encryption Soutions, by Region, 2020
  • Figure 22 : Global Market Shares of Firewall Solutions, by Region, 2020
  • Figure 23 : Global Market Shares of Disaster Recovery Solutions, by Region, 2020
  • Figure 24 : Global Market Shares of Data Loss Protection Solutions, by Region, 2020
  • Figure 25 : Global Market Shares of Other Types of Cybersecurity Solutions, by Region, 2020
  • Figure 26 : Global Market Shares of Cybersecurity Technologies, by Deployment Mode, 2020
  • Figure 27 : Global Market Shares of On-premise Deployment of Cybersecurity Technologies, by Region, 2020
  • Figure 28 : Global Market Shares of Cloud Deployment of Cybersecurity Technologies, by Region, 2020
  • Figure 29 : Global Market Shares of Cybersecurity Technologies, by End-User Organization Size, 2020
  • Figure 30 : Global Market Shares of Cybersecurity Technologies Used by Large Enterprises, by Region, 2020
  • Figure 31 : Global Market Shares of Cybersecurity Technologies Used by SMEs, by Region, 2020
  • Figure 32 : Global Market Shares of Cybersecurity Technologies, by Industry End User, 2020
  • Figure 33 : Global Market Shares of Cybersecurity Technologies for BFSI End Users, by Region, 2020
  • Figure 34 : Global Market Shares of Cybersecurity Technologies for Telecom and IT End Users, by Region, 2020
  • Figure 35 : Global Market Shares of Cybersecurity Technologies for Defense and Intelligence End Users, by Region, 2020
  • Figure 36 : Global Market Shares of Cybersecurity Technologies for Retail End Users, by Region, 2020
  • Figure 37 : Global Market Shares of Cybersecurity Technologies for Healthcare End Users, by Region, 2020
  • Figure 38 : Global Market Shares of Cybersecurity Technologies for Healthcare End Users, by Region, 2020
  • Figure 39 : Global Market Shares of Cybersecurity Technologies for Other Types of End Users, by Region, 2020
  • Figure 40 : Global Market Shares of Cybersecurity Technologies, by Region, 2020
  • Figure 41 : Global Market Shares of Network Security Technologies, by Country, 2020
  • Figure 42 : North American Market Shares of Cybersecurity Technologies, by Type, 2020
  • Figure 43 : North American Market Shares of Cybersecurity Technologies, by Solution, 2020
  • Figure 44 : North American Market Shares of Cybersecurity Technologies, by Deployment Mode, 2020
  • Figure 45 : North American Market Shares of Cybersecurity Technologies, by End-User Organization Size, 2020
  • Figure 46 : North American Market Shares of Cybersecurity Technologies, by Industry End User, 2020
  • Figure 47 : European Market Shares of Cybersecurity Technologies, by Country, 2020
  • Figure 48 : European Market Shares of Cybersecurity Technologies, by Type, 2020
  • Figure 49 : European Market Shares of Cybersecurity Technologies, by Solution, 2020
  • Figure 50 : European Market Shares of Cybersecurity Technologies, by Deployment Mode, 2020
  • Figure 51 : European Market Shares of Cybersecurity Technologies, by End-User Organization Size, 2020
  • Figure 52 : European Market Shares of Cybersecurity Technologies, by Industry End User, 2020
  • Figure 53 : Asia-Pacific Market Shares of Cybersecurity Technologies, by Country, 2020
  • Figure 54 : Asia-Pacific Market Shares of Cybersecurity Technologies, by Type, 2020
  • Figure 55 : Asia-Pacific Market Shares of Cybersecurity Technologies, by Solution, 2020
  • Figure 56 : Asia-Pacific Market Shares of Cybersecurity Technologies, by Deployment Mode, 2020
  • Figure 57 : Asia-Pacific Market Shares of Cybersecurity Technologies, by End-User Organization Size, 2020
  • Figure 58 : Asia-Pacific Market Shares of Cybersecurity Technologies, by Industry End User, 2020
  • Figure 59 : RoW Market Shares of Cybersecurity Technologies, by Country/Region, 2020
  • Figure 60 : RoW Market Shares of Cybersecurity Technologies, by Type, 2020
  • Figure 61 : RoW Market Shares of Cybersecurity Technologies, by Solution, 2020
  • Figure 62 : RoW Market Shares of Cybersecurity Technologies, by Deployment Mode, 2020
  • Figure 63 : RoW Market Shares of Cybersecurity Technologies, by End-User Organization Size, 2020
  • Figure 64 : RoW Market Shares of Cybersecurity Technologies, by Industry End User, 2020
  • Figure 65 : Global Market Shares of Cybersecurity Technologies, by Vendor, 2020
  • Figure 66 : Most Followed Strategies Adopted by Vendors in the Cybersecurity Market, 2019-2022*
  • Figure 67 : Top Strategies Adopted by Vendors in the Cybersecurity Market, 2019-2022*
  • Figure 68 : Number of Developments in the Cybersecurity Market, 2019-2022*
  • Figure 69 : Accenture PLC: Company Revenue Share, by Business Segment, 2021
  • Figure 70 : Accenture PLC: Company Revenue Share, by Region, 2021
  • Figure 71 : Accenture PLC: SWOT Analysis
  • Figure 72 : BAE Systems Inc.: Company Revenue Share, by Business Segment, 2020
  • Figure 73 : BAE Systems Inc.: Company Revenue Share, by Region, 2020
  • Figure 74 : BAE Systems Inc.: SWOT Analysis
  • Figure 75 : Barracuda Networks Inc.: SWOT Analysis
  • Figure 76 : Booz Allen Hamilton Holding Corp.: Company Revenue Share, by Contract Type, 2020
  • Figure 77 : Booz Allen Hamilton Holding Corp.: Company Revenue Share, by Customer Type, 2020
  • Figure 78 : Booz Allen Hamilton Holding Corp.: SWOT Analysis
  • Figure 79 : Check Point Software Technologies Ltd.: Company Revenue Share, by Business Activity, 2020
  • Figure 80 : Check Point Software Technologies Ltd.: Company Revenue Share, by Region, 2020
  • Figure 81 : Check Point Software Technologies Ltd.: SWOT Analysis
  • Figure 82 : Cisco Systems Inc.: Company Revenue Share, by Business Segment, 2021
  • Figure 83 : Cisco Systems Inc.: Company Revenue Share, by Region, 2021
  • Figure 84 : Cisco Systems Inc.: SWOT Analysis
  • Figure 85 : Dell Technologies Inc.: Company Revenue Share, by Business Segment, 2021
  • Figure 86 : Dell Technologies Inc.: Company Revenue Share, by Region, 2021
  • Figure 87 : Dell Technologies Inc.: SWOT Analysis
  • Figure 88 : DXC Technology Co.: Company Revenue Share, by Business Segment, 2021
  • Figure 89 : DXC Technology Co.: Company Revenue Share, by Region, 2021
  • Figure 90 : DXC Technology Co.: SWOT Analysis
  • Figure 91 : Fortinet Inc.: Company Revenue Share, by Business Segment, 2020
  • Figure 92 : Fortinet Inc.: Company Revenue Share, by Region, 2020
  • Figure 93 : Fortinet Inc.: SWOT Analysis
  • Figure 94 : Hewlett Packard Enterprise Co.: Company Revenue Share, by Business Segment, 2020
  • Figure 95 : Hewlett Packard Enterprise Co.: Company Revenue Share, by Region, 2020
  • Figure 96 : Hewlett Packard Enterprise Co.: SWOT Analysis
  • Figure 97 : IBM Corp.: Company Revenue Share, by Business Segment, 2020
  • Figure 98 : IBM Corp.: Company Revenue Share, by Region, 2020
  • Figure 99 : IBM Corp.: SWOT Analysis
  • Figure 100 : Intel Corp.: Company Revenue Share, by Business Segment, 2021
  • Figure 101 : Intel Corp.: Company Revenue Share, by Region, 2021
  • Figure 102 : Intel Corp.: SWOT Analysis
  • Figure 103 : Juniper Networks Inc.: Company Revenue Share, by Business Segment, 2021
  • Figure 104 : Juniper Networks Inc.: Company Revenue Share, by Region, 2021
  • Figure 105 : Juniper Networks Inc.: SWOT Analysis
  • Figure 106 : Kaspersky Lab Ltd.: SWOT Analysis
  • Figure 107 : Lockheed Martin Corp.: Company Revenue Share, by Business Segment, 2020
  • Figure 108 : Lockheed Martin Corp.: Company Revenue Share, by Region, 2020
  • Figure 109 : Lockheed Martin Corp.: SWOT Analysis
  • Figure 110 : McAfee Corp.: Company Revenue Share, by Business Segment, 2020
  • Figure 111 : McAfee Corp.: Company Revenue Share, by Region, 2020
  • Figure 112 : McAfee Corp.: SWOT Analysis
  • Figure 113 : Microsoft Corp.: Company Revenue Share, by Business Segment, 2021
  • Figure 114 : Microsoft Corp.: SWOT Analysis
  • Figure 115 : Northrop Grumman Corp.: Company Revenue Share, by Business Segment, 2020
  • Figure 116 : Northrop Grumman Corp.: Company Revenue Share, by Region, 2020
  • Figure 117 : Northrop Grumman Corp.: SWOT Analysis
  • Figure 118 : NortonLifeLock Inc.: Company Revenue Share, by Business Segment, 2021
  • Figure 119 : NortonLifeLock Inc.: Company Revenue Share, by Region, 2021
  • Figure 120 : NortonLifeLock Inc.: SWOT Analysis
  • Figure 121 : Palo Alto Networks Inc.: Company Revenue Share, by Business Segment, 2021
  • Figure 122 : Palo Alto Networks Inc.: Company Revenue Share, by Region, 2021
  • Figure 123 : Palo Alto Networks Inc.: SWOT Analysis
  • Figure 124 : Rapid7 Inc.: Company Revenue Share, by Business Segment, 2020
  • Figure 125 : Rapid7 Inc.: Company Revenue Share, by Region, 2020
  • Figure 126 : Rapid7 Inc.: SWOT Analysis
  • Figure 127 : RSA Security LLC: SWOT Analysis
  • Figure 128 : Sophos Group PLC: SWOT Analysis
  • Figure 129 : Thales Group: Company Revenue Share, by Business Segment, 2020
  • Figure 130 : Thales Group: Company Revenue Share, by Region, 2020
  • Figure 131 : Thales Group: SWOT Analysis
  • Figure 132 : Trellix US LLC: SWOT Analysis
  • Figure 133 : Trend Micro Inc.: Company Revenue Share, by Region, 2020
  • Figure 134 : Trend Micro Inc.: SWOT Analysis