CHAPTER 1 INTRODUCTION
1.1. Market Definition
1.2. Executive Summary
1.3. The Scope of the Study
CHAPTER 2 RESEARCH METHODOLOGY
2.1. Secondary Research
2.2. Primary Research
2.3. Analytic Tools and Model
2.4. Economic Indicator
2.4.1 Base Year, Base Currency, Forecasting Period
2.5. Expert Validation
2.6. Study Timeline
CHAPTER 3 MARKET ANALYSIS
3.1. Industry Value Chain Analysis
3.2. Porter's Five Force Analysis
3.2.1. Bargaining Power of Buyers
3.2.2. Bargaining Power of Suppliers
3.2.3. Threats of Substitutes
3.2.4. Threats of New Entrants
3.2.5. Degree of Competition
3.3. PESTLE Analysis
3.3.1. Political
3.3.2. Economical
3.3.3. Social
3.3.4. Technological
3.3.5. Legal
3.3.6. Environmental
3.4. SWOT Analysis
3.4.1. Strengths
3.4.2. Weakness
3.4.3. Opportunities
3.4.4. Threats
3.5. Y-O-Y Analysis
CHAPTER 4 MARKET DYNAMICS
4.1. Market Drivers
4.1.1. Increasing use of mobile devices & software
4.1.2. Rising usage of M2M communication in enterprises
4.1.3. Efficient and best way to remediate post-breach
4.1.4. Necessary for a true understanding of a breach
4.2. Market Restraints & Challenges
4.2.1. Limited security solutions
4.2.4. The complexity of network infrastructure
4.2.3. High cost for implementing
4.3. Market Opportunities
4.3.1. Growth in regulatory compliance requirements
4.3.2. Rising DDoS attacks
4.3.3. Increasing mergers and acquisitions between market players
4.3.4. Growing demand for integrated security solution
CHAPTER 5 GLOBAL NETWORK SECURITY MARKET – BY TYPE
5.1. Appliances
5.1.1. Data Center
5.1.2. Virtualized Appliances
5.1.3. Dedicated Appliances
5.1.4. Others
5.2. Software
5.2.1. Threat Emulation
5.2.2. IPsec VPN
5.2.3. Intrusion Prevention System
5.2.4. Application Control
5.2.5. URL Filtering
5.2.6. Anti-Bot
5.2.7. Antivirus
5.2.8. Identity Awareness
5.2.9. Data Loss Prevention
5.2.10. Web Security
5.2.11. Anti-Spam and Email Security
5.2.12. Advanced Networking
5.2.13. Acceleration and Clustering
5.2.14. Others
5.3. Solutions
5.3.1. Integrated Solutions
5.3.2. Identity Access Management
5.3.3. Risk and Compliance Management
5.3.4. Data Encryption
5.3.5. Data Loss Prevention
5.3.6. Data Recovery Solutions
5.3.7. Unified Threat Management
5.3.8. Intrusion Prevention System/Intrusion Detection System
5.3.10. Firewall
5.3.11. Vulnerability Management
5.3.12. Remote Access Solutions
5.3.13. VoIP
5.3.14. ATM Security
5.3.15. Virtualisation Security
5.3.16. Others
CHAPTER 6 GLOBAL NETWORK SECURITY MARKET – BY TECHNOLOGY
TYPE
6.1. Network Recorders
6.2. Application Performance Monitoring and Application-Aware Network Performance
Monitoring
6.3. Traditional Network Security Forensics and Packet Capture
6.4. Security Information and Event Management (SIEM)
6.5. Continuous Forensics
CHAPTER 7 GLOBAL NETWORK SECURITY MARKET – BY ORGANISATION
SIZE
7.1. Small and Medium Enterprises
7.2. Large Enterprises
CHAPTER 8 GLOBAL NETWORK SECURITY MARKET – BY END USERS
8.1. BFSI
8.2. Telecom & IT
8.3. Education
8.4. Healthcare
8.5. Retail
8.6. Others
CHAPTER 9 GLOBAL NETWORK SECURITY MARKET - BY GEOGRAPHY
9.1. Introduction
9.2. North America
9.2.1. U.S.
9.2.2. Canada
9.2.3. Mexico
9.2.4. Costa Rica
9.3. South America
9.3.1. Brazil
9.3.2. Argentina
9.3.3. Chile
9.3.4. Columbia
9.3.5. Others
9.4. Europe
9.4.1. U.K.
9.4.2. Germany
9.4.3. France
9.4.4. Italy
9.4.5. Spain
9.4.6. Russia
9.4.7. Netherlands
9.4.8. Switzerland
9.4.9. Poland
9.4.10. Others
9.5. APAC
9.5.1. China
9.5.2. Japan
9.5.3. India
9.5.4. South Korea
9.5.5. Australia & New Zealand
9.5.6. Malaysia
9.5.7. Singapore
9.5.8. Others
9.6. Middle East & Africa
9.6.1. UAE
9.6.2. Saudi Arabia
9.6.3. Iran
9.6.4. Iraq
9.6.5. Qatar
9.6.6. South Africa
9.6.7. Algeria
9.6.8. Morocco
9.6.9. Nigeria
9.6.10. Egypt
9.6.11. Others
CHAPTER 10 GLOBAL NETWORK SECURITY MARKET - COMPANY PROFILES
10.1. Enterasys Networks, Inc.
10.2. WatchGuard Technologies, Inc.
10.3. Symantec Corporation
10.4. Fortinet, Inc.
10.5. Juniper Networks Inc.
10.6. Check Point Software Technologies Ltd.,
10.7. NFR Security, Inc.
10.8. Avaya, Inc.
10.9. IBM Corporation
10.10. International Space Station
10.11. Nokia Corporation
10.12. Cisco Systems Inc.
10.13. McAfee, LLC
10.14. Fortress Investment Group, LLC
10.15. SonicWALL Inc.
CHAPTER 11 GLOBAL NETWORK SECURITY MARKET - COMPETITIVE
LANDSCAPE
11.1. Market Share Analysis
11.2. Strategies adopted by top companies
11.3. Mergers, Acquisitions, Collaborations & Agreements
CHAPTER 12 MARKET INSIGHTS
12.1. Industry Experts Insights
12.2. Analysts Opinions
12.3. Investment Opportunities
CHAPTER 13 APPENDIX
13.1. List of Tables
13.2. List of Figures