CHAPTER 1 INTRODUCTION
1.1. Market Definition
1.2. Executive Summary
1.3. The Scope of the Study
CHAPTER 2 RESEARCH METHODOLOGY
2.1. Secondary Research
2.2. Primary Research
2.3. Analytic Tools and Model
2.4. Economic Indicator
2.4.1. Base Year, Base Currency, Forecasting Period
2.5. Expert Validation
2.6. Study Timeline
CHAPTER 3 MARKET ANALYSIS
3.1. Industry Value Chain Analysis
3.2. Porter's Five Force Analysis
3.2.1. Bargaining Power of Buyers
3.2.2. Bargaining Power of Suppliers
3.2.3. Threats of Substitutes
3.2.4. Threats of New Entrants
3.2.5. Degree of Competition
3.3. PESTLE Analysis
3.3.1. Political
3.3.2. Economical
3.3.3. Social
3.3.4. Technological
3.3.5. Legal
3.3.6. Environmental
3.4. SWOT Analysis
3.4.1. Strengths
3.4.2. Weakness
3.4.3. Opportunities
3.4.4. Threats
3.5. Y-O-Y Analysis
CHAPTER 4 MARKET DYNAMICS
4.1. Market Drivers
4.1.1. Increasing demand for cloud computing and virtualization
4.1.2. Rising need for security upgradation
4.1.3. Growing network connections and data traffic
4.2. Market Restraints & Challenges
4.2.1. Growing availability of low cost alternative products
4.2.2. Lack of awareness about potential threats
4.3. Market Opportunities
4.3.1. Increasing number of new data centers
4.3.2. Growing common platform which incorporates logical and physical security
solutions
CHAPTER 5 GLOBAL DATA CENTER LOGICAL SECURITY MARKET – BY SOLUTION
5.1. Threat and Application Security Solutions
5.1.1. Intrusion Prevention and Detection Systems
5.1.2. Antivirus
5.1.3. Distributed Denial of Service (DDOS) Protection
5.1.4. Firewall
5.1.5. Domain Name System (DNS) Servers/Secure Socket Layer (SSL)
5.1.6. Virtualization Security Solutions
5.1.7. Unified Threat Management
5.2. Access Control and Compliance
5.2.1. Identity Access Management
5.2.2. Security Information and Event Management
5.2.3. Web Filtering Solutions
5.3. Data Protection Solutions
5.3.1. Data Leakage Protection
5.3.2. Disaster Recovery Solutions
5.3.3. Information Lifecycle Management (ILM) Solutions
CHAPTER 6 GLOBAL DATA CENTER LOGICAL SECURITY MARKET – BY SERVICE
6.1 Security Consulting Services
6.2. Managed Security Services
CHAPTER 7 GLOBAL DATA CENTER LOGICAL SECURITY MARKET – BY DATA CENTER SIZE
7.1. Large
7.2. Enterprise
7.3. Mid-Size
CHAPTER 8 GLOBAL DATA CENTER LOGICAL SECURITY MARKET – BY END USER
8.1. Banking, Financial Services, & Insurance (BFSI)
8.2. Government
8.3. Healthcare
8.4. Energy
8.5. Telecommunication & IT
8.6. Technology
8.7. Entertainment and Media
8.8. Others
CHAPTER 9 GLOBAL DATA CENTER LOGICAL SECURITY MARKET - BY GEOGRAPHY
9.1. Introduction
9.2. North America
9.2.1. U.S.
9.2.2. Canada
9.2.3. Mexico
9.2.4. Costa Rica
9.3. South America
9.3.1. Brazil
9.3.2. Argentina
9.3.3. Chile
9.3.4. Columbia
9.3.5. Others
9.4. Europe
9.4.1. U.K.
9.4.2. Germany
9.4.3. France
9.4.4. Italy
9.4.5. Spain
9.4.6. Russia
9.4.7. Netherlands
9.4.8. Switzerland
9.4.9. Poland
9.4.10. Others
9.5. Asia-Pacific
9.5.1. China
9.5.2. Japan
9.5.3. India
9.5.4. South Korea
9.5.5. Australia & New Zealand
9.5.6. Malaysia
9.5.7. Singapore
9.5.8. Others
9.6. Middle East & Africa
9.6.1. UAE
9.6.2. Saudi Arabia
9.6.3. Iran
9.6.4. Iraq
9.6.5. Qatar
9.6.6. South Africa
9.6.7. Algeria
9.6.8. Morocco
9.6.9. Nigeria
9.6.10. Egypt
9.6.11. Others
CHAPTER 10 GLOBAL DATA CENTER LOGICAL SECURITY MARKET - COMPANY PROFILES
10.1. Juniper Networks Inc.
10.2. Checkpoint Software Technologies Ltd.
10.3. VMware Inc.
10.4. Fortinet Inc.
10.5. McAfee Inc.
10.6. Trend Micro Inc.
10.7. Hewlett-Packard Enterprise Company
10.8 Cisco systems Inc.
10.9. IBM Corporation
10.10. Dell Inc.
10.11. Honeywell International Inc.
10.12. EMC Corporation
10.13. CFAO Group SA
10.14. Italtel Group S.p.A
10.15. Symantec Corporation
CHAPTER 11 GLOBAL DATA CENTER LOGICAL SECURITY MARKET - COMPETITIVE LANDSCAPE
11.1. Market Share Analysis
11.2. Strategies adopted by top companies
11.3. Mergers, Acquisitions, Collaborations & Agreements
CHAPTER 12 MARKET INSIGHTS
12.1. Industry Experts Insights
12.2. Analysts Opinions
12.3. Investment Opportunities
CHAPTER 13 APPENDIX
13.1. List of Tables
13.2. List of Figures