Cyber Security Market 2015-2025
Cyber Security Market 2015-2025 Leading Companies in Network, Data, Endpoint, Application & Cloud Security, Identity Management & Security Operations Telecoms & Defence Report Publication date: 26th February 2015 ------------------------------------------------------------ |
The cyber security market is currently undergoing unprecedented growth and development due to a wide variety of internal and external factors. Almost every month a major cyber event occurs which forces security to the top of the news agenda, encouraging governments to pass new legislation and expand their defences and capabilities. Although for the most part limited to the disruption of web services or the theft of data, enough has happened for many leaders to consider cyber issues a national concern, relevant enough to feature into all future strategic military and security planning. This is driving growth in the most demanding cyber security sectors, and providing large defence contractors with more reason to acquire smaller companies that have been operating for many years, particularly in the area of critical infrastructure protection. Complementing this is a massive amount of private-sector interest in effective security, in addition to purchases made by worried consumers. The financial services industry especially is one vertical which has not been slow to seek outside expertise, and with more and more individuals purchasing smart-devices and using cloud services, the demand for protections is only likely to increase. As a consequence, visiongain has assessed that the value of the global cyber security market in 2015 will reach $75.4bn. Why you should buy Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations What are the prospects for the cyber security market? Visiongain's comprehensive analysis contains highly quantitative content delivering solid conclusions benefiting your analysis and illustrates new opportunities and potential revenue streams helping you to remain competitive. This definitive report will benefit your decision making and help to direct your future business strategy. At over 100,000 words, this report is one of visiongain's most comprehensive reports, and would be of essential use to those actively involved in defence, security, or technology markets, or those generally looking for an understanding of the components and processes that make the cyber security market as prominent as it is. In this 590 page report, we guarantee that you will receive key information: View global cyber security market forecasts and analysis from 2015-2025 to keep your knowledge ahead of your competition and ensure you exploit key business opportunities - The report provides detailed sales projections of the market, the competitors, and the commercial drivers and restraints allowing you to more effectively compete in the market. In addition to market forecasts fr om 2015-2025, our new study shows current market data, market shares, original critical analysis, and revealing insight into commercial developments See 7 exclusive interview transcripts from leading companies involved with cyber security - By reading the full transcripts of the exclusive expert opinion interviews contained in the report you will keep up to speed with what is really happening in the cyber security sector Don't' fall behind. You will gain a thorough knowledge on the cyber security sector finding strategic advantages for your work and will learn how your organisation can benefit - allowing you to assess prospects for investments and sales - DataSoft Corporation - Bayshore Networks, Inc. - CA Technologies, Inc. - Sentar, Inc. - N-Dimension Solutions, Inc. - Corero Network Security, Inc. - Intego, Inc. Discover sales predictions for the cyber security submarkets from 2015-2025 - What are the dynamics of th e cyber security submarkets? Which submarkets will generate the most revenue? Use our forecasts and expert insight to grow your business and give you more industry influence. Find where you can gain and how your organisation can succeed. Avoid falling behind. Stay informed about the potential for each of these cyber security submarkets with individual forecasts and analysis from 2015-2025. The 7 submarket forecasts are revealed at the global level, regional level and also individually for each of the 21 leading national markets, providing unprecedented detail. - Network Security forecast 2015-2025 - Security Operations forecast 2015-2025 - Data Security forecast 2015-2025 - Endpoint Security forecast 2015-2025 - Identity Management forecast 2015-2025 - Application Security forecast 2015-2025 - Cloud Security forecast 2015-2025 Understand the prospects for the leading national cyber security markets where will the highest revenues and opportunities occur? - Learn about the market potential for cyber security companies in the developed and developing countries, from 2013.onwards. You will see where and how opportunities exist with revealing individual market forecasts and analysis from 2015-2025 for 6 regions and 20 leading national cyber security markets. Each of the forecasts are further split into each of the 7 submarkets providing unrivalled detail. - North America Cyber Security Market & Submarket Forecasts 2015-2025 - Central & South America Cyber Security Market & Submarket Forecasts 2015-2025 - Europe Cyber Security Market & Submarket Forecasts 2015-2025 - Asia Pacific Cyber Security Market & Submarket Forecasts 2015-2025 - Middle East Cyber Security Market & Submarket Forecasts 2015-2025 - Africa Cyber Security Market & Submarket Forecasts 2015-2025 - U.S. Cyber Security Market & Submarket Forecasts 2015-2025 - Chinese Cyber Security Market & Su bmarket Forecasts 2015-2025 - Japanese Cyber Security Market & Submarket Forecasts 2015-2025 - Russian Cyber Security Market & Submarket Forecasts 2015-2025 - Republic of Korea Cyber Security Market & Submarket Forecasts 2015-2025 - Saudi Arabian Cyber Security Market & Submarket Forecasts 2015-2025 - Indian Cyber Security Market & Submarket Forecasts 2015-2025 - French Cyber Security Market & Submarket Forecasts 2015-2025 - U.K. Cyber Security Market & Submarket Forecasts 2015-2025 - German Cyber Security Market & Submarket Forecasts 2015-2025 - Israeli Cyber Security Market & Submarket Forecasts 2015-2025 - Canadian Cyber Security Market & Submarket Forecasts 2015-2025 - Australian Cyber Security Market & Submarket Forecasts 2015-2025 - Italian Cyber Security Market & Submarket Forecasts 2015-2025 - Spanish Cyber Security Market & Submarket Forecasts 2015-2025 - Brazilian Cyber Security M arket & Submarket Forecasts 2015-2025 - Turkish Cyber Security Market & Submarket Forecasts 2015-2025 - UAE Cyber Security Market & Submarket Forecasts 2015-2025 - Taiwanese Cyber Security Market & Submarket Forecasts 2015-2025 - Iranian Cyber Security Market & Submarket Forecasts 2015-2025 - Nigerian Cyber Security Market & Submarket Forecasts 2015-2025 - Rest of the World Cyber Security Market & Submarket Forecasts 2015-2025 Explore the factors affecting product developers, and everyone within the value chain. Learn about the forces influencing market dynamics. - Explore the political, economic, social, and technological (PEST) issues assessing product advances. Discover what the present and future outlook for business will be. Learn about the following business critical issues - - Research and development (R&D) strategy - Technological issues and constraints. - Supply and demand dynamics - Competitio n from new product types - Increasing specialisation by leading players - Increasing industry consolidation. - Advances in product quality - Analysis of barriers to entry Identify who the leading companies are in the cyber security industry - Our report reveals the companies which hold the greatest potential. In particular, exploring and analyzing the activities of these companies: See where the expected gains will be. View visiongain's assessment of the prospects for established cyber security competitors, rising companies, and new market entrants. Our work explains that potential, helping you stay ahead. Gain a thorough understanding of the competitive landscape with profiles of 20 leading cyber security companies examining their positioning, capabilities, product portfolios, R&D activity, services, focus, strategies, M&A activity, and future outlook. - Airbus Group - BAE Systems plc - Boeing Company - Booz Allen Hamilton, Inc. - Cisco Systems, Inc - Computer Sciences Corporation (CSC) - Finmeccanica S.p.A. - General Dynamics Corporation - Hewlett Packard Company - Intel Corporation - Kaspersky Lab - L-3 Communications Holdings, Inc - Leidos Inc - Lockheed Martin Corporation - Northrop Grumman Corporation - Raytheon Company - Symantec Corporation - Thales Group - Trend Micro, Inc. - Ultra Electronics plc Discover Information found nowhere else in this independent assessment of the cyber security market The Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations report provides impartial cyber security sector analysis. With the independent business intelligence found only in our work, you will discover where the prospects are for profit. In particular, our new research provides you with key strategic advantages: Our informed forecasts, ind ependent and objective analysis, exclusive interviews and revealing company profiles will provide you with that necessary edge, allowing you to gain ground over your competitors. What makes this report unique? Visiongain consulted widely with leading industry experts and 7 full transcripts from these exclusive interviews are included in the report. Visiongain's research methodology involves an exclusive blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global, submarket and regional markets forecasts from 2015-2025 Why choose visiongain business intelligence? Visiongain's; increasingly diverse sector coverage strengthens our research portfolio. The growing cross-sector convergence of key vert icals and the interplay of game changing technologies across hitherto unrelated industries are creating new synergies, resulting in new business opportunities for you to leverage. How the Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations report can benefit you Visiongain's report is for anyone requiring analysis of the cyber security market. You will discover market forecasts, technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are. Don't miss this key opportunity to gain a competitive advantage. If you buy our report today your knowledge will stay one step ahead of your competitors. Discover how our report could benefit your research, analyses and strategic decisions, saving you time. To gain an understanding of how to tap into the potential of this market and stay one step ahead of the competition you must order now our report the Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations. How this brand new 590 page report delivers: 492 tables, charts, and graphs 163 significant cyber security contracts and programmes 7 exclusive interview transcripts from leading companies involved with cyber security Global cyber security market forecasts and analysis from 2015-2025 Sales forecasts for 7 cyber security submarkets from 2015-2025 7 Regional and 21 leading national cyber security market forecasts all further segmented into the 7 cyber security submarkets PEST analysis and exploration of the factors affecting product developers, and everyone within the value chain Profiles of the leading 20 companies within the cyber security industry ------------------------------------------------------------ |
Pricing Single User License: Single user copies of this report are available for GBP1799 Departmental License: Entitles up to 5 individual users to access this report for GBP2999 (Not suitable for library usage) Site License: Allow your company to have access to this report at one location for GBP4999 (Suitable for library storage and use) Global License: Have your whole company worldwide to access this information for GBP6999 ------------------------------------------------------------ |
Ordering All you need to do to order this report is to contact Lorenzo Tacchio on: Telephone: +44(0)207 549 9952 or email: lorenzo.tacchio@vgtelecomreports.com And provide the following information: Report Title: Report License (Single User/Departmental/Site/Global): Name: User Email: Job Title: Company: Invoice Address: Telephone and Fax number: EEC VAT Number (only for E.U.): ------------------------------------------------------------ |
Table of Contents 1. Report Overview 1.1 Cyber Security Market Overview 1.2 Global Cyber Security Market Segmentation 1.3 Why You Should Read This Report 1.4 How This Report Delivers 1.5 Key Questions Answered by This Analytical Report Include: 1.6 Who is This Report For? 1.7 Methodology 1.7.1 Primary Research 1.7.2 Secondary Research 1.7.3 Market Evaluation & Forecasting Methodology 1.8 Frequently Asked Questions (FAQ) 1.9 Associated Visiongain Reports 1.10 About Visiongain 2. Introduction to the Global Cyber Security Market 2.1 Cyber Security Market Structure Overview 2.1.1 Network Security (NetSec) Submarket Definition 2.1.2 Data Secu rity (DataSec) Submarket Definition 2.1.3 Security Operations Management (SecOps) Submarket Definition 2.1.4 Identification Management (IdM) Submarket Definition 2.1.5 Endpoint Security (EndSec) Submarket Definition 2.1.6 Application Security (AppSec) Submarket Definition 2.1.7 Cloud Security (CloudSec) Submarket Definition 2.2 Why is Cybersecurity So Important to Homeland Security? 2.3 What Does the Cyber Threat to Critical Infrastructure Encompass? 2.4 Mechanisms of Cyber Attack 2.5 Types of Cyber Attack 2.6 Methods of Cyber Defence 2.5 Recent Notable Cyber Attacks & Incidents 2.5.1 Conficker 2.5.2 Operation Buckshot Yankee 2.5.3 Aurora 2.5.4 Chinese Diversion of Internet Traffic 2.5.5 Stuxnet 2.5.6 Duqu 2.5.7 RSA 2.5.8 Sony Corporation 2.5.9 Operation Shady RAT 2.5.10 Mitsubishi Heavy Industries 2.5.11 Flame / Operation: Olympic Games 2.5.12 Aramco 2.5.13 The Navy and Marine Corps Intranet (NMCI) 2.5.1 4 Operation Saffron Rose 2.5.15 Operation Dragonfly 2.5.16 Norwegian Oil and Gas 2.5.17 Sony Pictures Entertainment 2.5.18 Operation Cleaver 3. Global Cyber Security Market 2015-2025 3.1 Global Cyber Security Market 2015-2025 3.2 Regional Cyber Security Market Forecast 2015-2025 3.3 Regional Cyber Security AGR's% 2015-2025 3.4 Regional Cyber Security Market Share Breakdowns 2015-2025 3.5 Leading 21 National Cyber Security Market Forecast Annual Growth Rates and CAGR's 2015-2025 3.6 Cumulative Leading 21 National Cyber Security Market Expenditure & Market Share 2015-2025 3.7 Global Cyber Security Market Drivers & Restraints 4. Cyber Security Submarket Forecasts 2015-2025 4.1 Cyber Security Submarket Forecasts & Annual Growth Rates 2015-2025 4.2 Cyber Security Submarket Shares 2015, 2020, 2025 4.3 Cyber Security Network Security (NetSec) Submarket Forecast by Regional Market 2015-2025 4.3.1 Cybe r Security Network Security (NetSec) Submarket Forecast by National Market 2015-2025 4.3.2 Cyber Security Network Security (NetSec) Submarket National Shares 2015, 2020, 2025% 4.4 Cyber Security Security Operations (SecOps) Submarket Forecast by Regional Market 2015-2025 4.4.1 Cyber Security Security Operations (SecOps) Submarket Forecast by National Market 2015-2025 4.4.2 Cyber Security Security Operations (SecOps) Submarket National Shares 2015, 2020, 2025% 4.5 Cyber Security Data Security (DataSec) Submarket Forecast By Regional Market 2015-2025 4.5.1 Cyber Security Data Security (DataSec) Submarket Forecast by National Market 2015-2025 4.5.2 Cyber Security Data Security (DataSec) Submarket National Shares 2015, 2020, 2025% 4.6 Cyber Security Identity Management (IdM) Submarket Forecast By Regional Market 2015-2025 4.6.1 Cyber Security Identity Management (IdM) Submarket Forecast by National Market 2015-2025 4.6.2 Cyber Security Identity Management ( IdM) Submarket National Shares 2015, 2020, 2025% 4.7 Cyber Security Endpoint Security (EndSec) Submarket Forecast By Regional Market 2015-2025 4.7.1 Cyber Security Endpoint Security (EndSec) Submarket Forecast by National Market 2015-2025 4.7.2 Cyber Security Endpoint Security (EndSec) Submarket National Shares 2015, 2020, 2025% 4.8 Cyber Security Application Security (AppSec) Submarket Forecast By Regional Market 2015-2025 4.8.1 Cyber Security Application Security (AppSec) Submarket Forecast by National Market 2015-2025 4.8.2 Cyber Security Application Security (AppSec) Submarket National Shares 2015, 2020, 2025% 4.9 Cyber Security Cloud Security (CloudSec) Submarket Forecast By Regional Market 2015-2025 4.9.1 Cyber Security Cloud Security (CloudSec) Submarket Forecast by National Market 2015-2025 4.9.2 Cyber Security Cloud Security (CloudSec) Submarket National Shares 2015, 2020, 2025% 5. Leading 21 National Cyber Security Market Forecasts 2015 -2025 5.1 Leading 21 National Cyber Security Markets Share Forecast 2015-2025 5.2 Barriers to Entry Analysis of the Leading 21 National Cyber Security Markets 5.3 U.S. Cyber Security Market & Submarket Forecasts 2015-2025 5.3.1 U.S. Cyber Security Submarket Forecasts 2015-2025 5.3.2 U.S. Cyber Security Market Drivers & Restraints 5.3.3 Changing Concerns: Why the focus on Cybersecurity will Continue to Drive U.S. Homeland Security Expenditure Upwards 5.3.4 What are the Different Components of the U.S. Federal Government Spending on Cybersecurity? 5.3.5 What are the Individual U.S. State Authorities Spending on Cyber Security? 5.3.6 A Breakdown of the U.S. National Intelligence Program (NIP) 2011-2013 5.3.7 How is the U.S. Oil and Gas Industry Responding to Increased Cyber Security Threats? 5.3.8 What are Domestic Airlines and the U.S. Federal Aviation Authority Doing to Guard Against a Major Cyber Attack? 5.3.9 What are the Essential Co mponents of the U.S. Cybersecurity Establishment? 5.3.9.1 CNCI 5.3.9.2 US CYBERCOM 5.3.9.3 ARCYBER 5.3.9.4 AFCYBER (24th Air Force) 5.3.9.5 FLTCYBERCOM 5.3.9.6 MARFORCYBER 5.3.9.7 NSA 5.3.9.8 Perfect Citizen 5.3.9.9 DISA 5.3.9.10 DHS 5.3.9.11 National Protection and Programs Directorate 5.3.9.12 Office of Cyber Security and Communications 5.3.9.13 Einstein II 5.3.9.14 DARPA 5.3.9.15 780th Military Intelligence Brigade 5.3.10 Recent U.S. Cyber Security Events 5.3.11 U.S. Cyber Security Market Contracts & Programmes 5.4 Chinese Cyber Security Market & Submarket Forecasts 2015-2025 5.4.1 Chinese Cyber Security Submarket Forecast 2015-2025 5.4.2 Chinese Cyber Security Market Drivers & Restraints 5.4.3 A Breakdown of China's Domestic Security Budgets From 2008-2014: Transport, Agriculture, Aviation, Maritime, Justice, Customs, and the Supreme People's Procuratorate 5.4.4 Another Brick in the Great Firewall: How Has China's Concern for the Control of Information Helped Shape its Defensive Cyber Posture? 5.4.5 A Digital Arms Race: How Strategic Competition with the United States Is Spurring on Chinese Ambitions to Become a Cyber Power 5.4.6 Recent Chinese Cyber Security Events 5.5 Japanese Cyber Security Market & Submarket Forecasts 2015-2025 5.5.1 Japanese Cyber Security Market Submarket Forecast 2015-2025 5.5.2 Japanese Cyber Security Market Drivers & Restraints 5.5.3 What Measures Has Japan Taken To Boost Its Cyber Security Capabilities And What Challenges Remain? 5.5.4 How Much Has the Japanese Military Allocated to Cyber Security In the Past Three Years? 5.5.5 What is the Organisational Structure of Japan's New Military Cyber Command? 5.5.6 Recent Japanese Cyber Security Events 5.5.7 Japanese Cyber Security Market Contracts & Programmes 5.6 Russian Cyber Security Market & Submarket Forecasts 2015-2025 5.6.1 Russian Cyber Security Mark et Submarket Forecast 2015-2025 5.6.2 Russian Cyber Security Market Drivers & Restraints 5.6.3 Russian Cybersecurity Policy: How Stage Two Has Built Upon Previous Developments 5.6.4 Recent Russian Cyber Security Events 5.6.5 Russian Cyber Security Market Contracts & Programmes 5.7 Republic of Korea Cyber Security Market & Submarket Forecasts 2015-2025 5.7.1 Republic of Korea Cyber Security Submarket Forecast 2015-2025 5.7.2 Republic of Korea Cyber Security Market Drivers & Restraints 5.7.3 Forward Together: To What Extent Are South Korea's PPPs Effective? 5.8 Saudi Arabian Cyber Security Market & Submarket Forecasts 2015-2025 5.8.1 Saudi Arabian Cyber Security Market Submarket Forecast 2015-2025 5.8.2 Saudi Arabian Cyber Security Market Drivers & Restraints 5.8.3 Why Does Saudi Arabia Still Invest More in Physical Security Than Cybersecurity? 5.9 Indian Cyber Security Market & Submarket Forecasts 2015-2025 5.9.1 I ndian Cyber Security Submarket Forecast 2015-2025 5.9.2 Indian Cyber Security Market Drivers & Restraints 5.9.3 How Have Repeated Blackouts Placed a Renewed Emphasis on Indian Critical Infrastructure Protection? 5.9.4 How Will the Recommendations of the JWG Affect Indian Cyber Security? 5.9.5 Recent Indian Cyber Security Events 5.9.6 Indian Cyber Security Market Contracts & Programmes 5.10 French Cyber Security Market & Submarket Forecasts 2015-2025 5.10.1 French Cyber Security Submarket Forecast 2015-2025 5.10.2 French Cyber Security Market Drivers & Restraints 5.10.3 What is the Current State of French Cybersecurity? 5.10.4 Recent French Cyber Security Events 5.10.5 French Cyber Security Market Contracts & Programmes 5.11 U.K. Cyber Security Market & Submarket Forecasts 2015-2025 5.11.1 U.K. Cyber Security Submarket Forecast 2015-2025 5.11.2 U.K. Cyber Security Market Drivers & Restraints 5.11.3 Recent U.K. C yber Security Events 5.11.4 U.K. Cyber Security Market Contracts & Programmes 5.12 German Cyber Security Market & Submarket Forecasts 2015-2025 5.12.1 German Cyber Security Submarket Forecast 2015-2025 5.12.2 German Cyber Security Market Drivers & Restraints 5.12.3 Have German Cybersecurity Efforts Acquired New Emphasis? 5.12.4 Recent German Cyber Security Events 5.12.5 German Cyber Security Market Contracts & Programmes 5.13 Israeli Cyber Security Market & Submarket Forecasts 2015-2025 5.13.1 Israeli Cyber Security Submarket Forecast 2015-2025 5.13.2 Israeli Cyber Security Market Drivers & Restraints 5.13.3 Recent Israeli Cyber Security Events 5.13.4 Israeli Cyber Security Market Contracts & Programmes 5.14 Canadian Cyber Security Market & Submarket Forecasts 2015-2025 5.14.1 Canadian Cyber Security Submarket Forecast 2015-2025 5.14.2 Canadian Cyber Security Market Drivers & Restraints 5.14.3 How Do es Canada's Current Cyber Security Strategy Cover Critical Infrastructure? 5.14.4 Access Denied: Why Canada Also Continues to Block the Entry Of Huawei Into Its Markets 5.14.5 How is the Growing Threat of Eco-Terrorism Likely to Influence Canadian Infrastructure Security? 5.14.6 Recent Canadian Cyber Security Events 5.14.7 Canadian Cyber Security Market Contracts & Programmes 5.15 Australian Cyber Security Market & Submarket Forecasts 2015-2025 5.15.1 Australian Cyber Security Submarket Forecast 2015-2025 5.15.2 Australian Cyber Security Market Drivers & Restraints 5.15.3 Why Huawei Technologies Co. Ltd. Is Unlikely To Have Access To The Australian Telecommunications Market In The Near Future 5.15.4 Australian Cyber Security: Stronger Than Acknowledged? 5.15.5 Recent Australian Cyber Security Events 5.15.6 Australian Cyber Security Market Contracts & Programmes 5.16 Italian Cyber Security Market & Submarket Forecasts 2015-2025< br>5.16.1 Italian Cyber Security Submarket Forecast 2015-2025 5.16.2 Italian Cyber Security Market Drivers & Restraints 5.16.3 Recent Italian Cyber Security Events 5.16.4 Italian Cyber Security Market Contracts & Programmes 5.17 Spanish Cyber Security Market & Submarket Forecasts 2015-2025 5.17.1 Spanish Cyber Security Submarket Forecast 2015-2025 5.17.2 Spanish Cyber Security Market Drivers & Restraints 5.17.3 Recent Spanish Cyber Security Events 5.17.4 Spanish Cyber Security Market Contracts & Programmes 5.18 Brazilian Cyber Security Market & Submarket Forecasts 2015-2025 5.18.1 Brazilian Cyber Security Submarket Forecast 2015-2025 5.18.2 Brazilian Cyber Security Market Drivers & Restraints 5.18.3 Recent Brazilian Cyber Security Events 5.18.4 Brazilian Cyber Security Market Contracts & Programmes 5.19 Turkish Cyber Security Market & Submarket Forecasts 2015-2025 5.19.1 Turkish Cyber Security Submarket Forecast 2015-2025 5.19.2 Turkish Cyber Security Market Drivers & Restraints 5.19.3 Fighting the Three-Headed Monster: ISIS, Assad, and the PKK 5.19.4 Recent Turkish Cyber Security Events 5.19.5 Turkish Cyber Security Market Contracts & Programmes 5.20 UAE Cyber Security Market & Submarket Forecasts 2015-2025 5.20.1 UAE Cyber Security Submarket Forecast 2015-2025 5.20.2 UAE Cyber Security Market Drivers & Restraints 5.20.3 Guarding the Golden Goose: Infrastructure Protection in the United Arab Emirates 5.20.4 Recent UAE Cyber Security Events 5.20.5 UAE Cyber Security Market Contracts & Programmes 5.21 Taiwanese Cyber Security Market & Submarket Forecasts 2015-2025 5.21.1 Taiwanese Cyber Security Submarket Forecast 2015-2025 5.21.2 Taiwanese Cyber Security Market Drivers & Restraints 5.21.3 Recent Taiwanese Cyber Security Events 5.22 Iranian Cyber Security Market & Submarket Forecasts 2015-2025 5.22.1 Ir anian Cyber Security Submarket Forecast 2015-2025 5.22.2 Iranian Cyber Security Market Drivers & Restraints 5.23 Nigerian Cyber Security Market & Submarket Forecasts 2015-2025 5.23.1 Nigerian Cyber Security Submarket Forecast 2015-2025 5.23.2 Nigerian Cyber Security Market Drivers & Restraints 5.23.3 What Security Challenges Does Nigeria Currently Face, What Has the Country Done to Respond? 5.23.4 Recent Nigerian Cyber Security Events 5.23.5 Nigerian Cyber Security Market Contracts & Programmes 5.24 Rest of the World Cyber Security Market & Submarket Forecasts 2015-2025 5.24.1 Rest of the World Cyber Security Submarket Forecast 2015-2025 5.24.2 Rest of the World Cyber Security Market Drivers & Restraints 5.24.3 Recent Rest of the World Cyber Security Events 5.24.4 Rest of the World Cyber Security Market Contracts & Programmes 6. STEP Analysis of the Cyber Security Market 2015-2025 7. Expert Opinion < /b>7.1 John Bohlke, Product Manager, DataSoft Corporation 7.1.1 Company Background and History 7.1.2 DataSoft's Presence in the Market and It's 'Nova Network Security System' 7.1.3 The Effects of Increased Cyber Attacks Upon Product Development 7.1.4 Product Features and Advantages 7.1.5 DataSoft's Future Outlook and Market Plans 7.2 Francis Cianfrocca, CEO & Founder, Evan Birkhead, VP of Marketing, Bayshore Networks, Inc. 7.2.1 Company Background and Trends in Development 7.2.2 Bayshore's Contribution to the Cyber Security Market 7.2.3 Client Relationships and the Provision of Solutions 7.2.4 The Advantages of Bayshore's Services & Solutions 7.2.5 Bayshore's Strong Partnerships with Cisco & BAE Systems 7.2.6 Bayshore's Plans for Market Expansion & Future Development 7.2.7 Anticipation of Technological Change and Future Challenges 7.2.8 On the Matter of Systems Integration 7.2.9 The Nature of the Current Cyber Threat & It's Outlook for the Future 7.3 Paul Breo, U.K. Director of Security, CA Technologies, Inc. 7.3.1 Company Background and Trends in Development 7.3.2 CA Technologies' Market Products and Their Benefits 7.3.3 The Challenges of Systems Integration 7.3.4 The All-Inclusive Nature of CA Technologies' Solution and It's Appeal to Multiple Market Verticals 7.3.5 CA Technologies' Future Outlook and Plans for Development 7.4 Chandler Hall, Product & Program Manager Commercial Security Products & Technology, Sentar, Inc. 7.4.1 Company Background and Trends in Development 7.4.2 Company Products & Solutions 7.4.3 The Advantages of Sentar's Solutions 7.4.4 Sentar's Business Strategy and Thinking on the Future of the Cyber Security Market 7.5 Tom Ayers, President & CEO, N-Dimension Solutions, Inc. 7.5.1 Company Background and Trends in Development 7.5.2 N-Dimension Solutions Contribution to the Cyber Security Market 7.5.3 N-Dimension S olutions' Development of Products and Solutions 7.5.4 The Advantages of N-Dimension's Product Range 7.5.5 N-Dimension's Business Strategy for the Cyber Security Market 7.5.6 N-Dimension's Views on the Future 7.6 Stephen Gates, Chief Security Evangelist, Corero Network Security, Inc. 7.6.1 Company Background and Commercial History 7.6.2 Corero's Contribution to the Cyber Security Market 7.6.3 Product Development and Implementation 7.6.4 The Benefit of Using Corero's Products & Services 7.6.5 Corero's Business Strategy and Thoughts on the Role of DDoS 7.6.6 Corero's Plans for the Future 7.6.7 How the Future Cyber Security Environment Will Likely Look 7.7 Jeff Erwin, CEO, Intego, Inc. 7.7.1 Company Background and Commercial History 7.7.2 Intego's Contribution to the Cyber Security Market 7.7.3 Factors Affecting Product Development 7.7.4 Why Intego's Products are Superior 7.7.5 Intego's Business Strategy And Future Plans 8 . 20 Notable Companies in the Global Cyber Security Market 8.1 Airbus Group Overview 8.1.1 Airbus Group Organisational Structure 8.1.2 Airbus Group Cyber Security Products 8.1.3 Airbus Group's Role in the Cyber Security Market 8.1.4 Airbus Group Revenue 2009-2013 8.1.5 Airbus Group's Regional Revenue 2009-2013 8.1.6 Airbus Group Primary Market Competitors 8.1.7 Airbus Group Regional Emphasis / Focus 8.1.8 Airbus Group Recent M&A Activity 8.2 BAE Systems plc Overview 8.2.1 BAE Systems plc's Organisational Structure 8.2.2 BAE Systems plc Cyber Security Products 8.2.3 BAE Systems plc Role in the Cyber Security Market 8.2.4 BAE Systems plc's Revenue 2009-2013 8.2.5 BAE Systems plc's Regional Revenue 2009-2013 8.2.6 BAE Systems plc's Primary Market Competitors 8.2.7 BAE Systems plc's Regional Emphasis / Focus 8.2.8 BAE Systems plc's M&A Activity 8.3 Boeing Company Overview 8.3.1 Boeing Company Organisational Structur e 8.3.2 Boeing Company Cyber Security Products 8.3.3 Boeing Company's Role in the Cyber Security Market 8.3.4 Boeing Company Revenue 2009-2013 8.3.5 Boeing Company's Regional Revenue 2009-2013 8.3.6 Boeing Company's Primary Market Competitors 8.3.7 Boeing Company's Regional Emphasis / Focus 8.3.8 Boeing Company's M&A Activity 8.4 Booz Allen Hamilton, Inc. Overview 8.4.1 Booz Allen Hamilton, Inc. Organisational Structure 8.4.2 Booz Allen Hamilton, Inc. Cyber Security Market Products 8.4.3 Booz Allen Hamilton, Inc.'s Role in the Cyber Security Market 8.4.4 Booz Allen Hamilton, Inc.'s Revenue 2009-2013 8.4.5 Booz Allen Hamilton's Regional Revenue 2009-2013 8.4.6 Booz Allen Hamilton, Inc.'s Primary Market Competitors 8.4.7 Booz Allen Hamilton, Inc.'s Regional Emphasis / Focus 8.4.8 Booz Allen Hamilton, Inc.'s M&A Activity 8.5 Cisco Systems, Inc. Overview 8.5.1 Cisco Systems, Inc. Organisational Structure 8.5.2 Cisco System s, Inc. Market Products 8.5.3 Cisco Systems, Inc.'s Role in the Cyber Security Market 8.5.4 Cisco Systems, Inc.'s Revenue 2009-2013 8.5.5 Cisco Systems, Inc.'s Regional Revenue 2009-2013 8.5.6 Cisco Systems, Inc.'s Primary Market Competitors 8.5.7 Cisco Systems, Inc.'s Regional Emphasis / Focus 8.5.8 Cisco Systems, Inc.'s M&A Activity 8.6 Computer Sciences Corporation (CSC) Overview 8.6.1 Computer Sciences Corporation's Organisational Structure 8.6.2 Computer Sciences Corporation's Cyber Security Products 8.6.3 Computer Sciences Corporation's Role in the Cyber Security Market 8.6.4 Computer Sciences Corporation's Revenue 2009-2013 8.6.5 Computer Science Corporation's Regional Revenue 2009-2013 8.6.6 Computer Sciences Corporation's Primary Market Competitors 8.6.7 Computer Sciences Corporation's Regional Emphasis / Focus 8.6.8 Computer Sciences Corporation's Recent M&A Activity 8.7 Finmeccanica S.p.A. Overview 8.7.1 Finmeccan ica S.p.A.'s Organisational Structure 8.7.2 Finmeccanica S.p.A.'s Cyber Security Products 8.7.3 Finmeccanica S.p.A.'s Role in the Cyber Security Market 8.7.4 Finmeccanica S.p.A.'s Revenue 2009-2013 8.7.5 Finmeccanica S.p.A.'s Regional Revenue 2009-2013 8.7.6 Finmeccanica S.p.A.'s Primary Market Competitors 8.7.7 Finmeccanica S.p.A.'s Regional Emphasis / Focus 8.7.8 Finmeccanica S.p.A.'s Recent M&A Activity 8.8 General Dynamics Corporation Overview 8.8.1 General Dynamics Corporation's Organisational Structure 8.8.2 General Dynamics Corporation's Cyber Security Products 8.8.3 General Dynamics Corporation's Role in the Cyber Security Market 8.8.4 General Dynamics Corporation Revenue 2009-2013 8.8.5 General Dynamics Corporation's Regional Revenue 2009-2013 8.8.6 General Dynamics Corporation's Primary Market Competitors 8.8.7 General Dynamics Corporation's Regional Emphasis / Focus 8.8.8 General Dynamics Corporation's Recent M&A Act ivity 8.9 Hewlett Packard Company Overview 8.9.1 Hewlett Packard Company's Organisational Structure 8.9.2 Hewlett Packard Company's Cyber Security Products 8.9.3 Hewlett Packard Company's Role in the Cyber Security Market 8.9.4 Hewlett Packard Company's Revenue 2009-2013 8.9.5 Hewlett Packard Company's Regional Revenue 2009-2013 8.9.6 Hewlett Packard Company's Primary Market Competitors 8.9.7 Hewlett Packard Company's Regional Emphasis / Focus 8.9.8 Hewlett Packard Company's Recent M&A Activity 8.10 Intel Corporation Overview 8.10.1 Intel Corporation's Organisational Structure 8.10.2 Intel Corporation's Cyber Security Products 8.10.3 Intel Corporation's Role in the Cyber Security Market 8.10.4 Intel Corporation's Revenue 2009-2013 8.10.5 Intel Corporation's Regional Revenue 2009-2013 8.10.6 Intel Corporation's Primary Competitors 8.10.7 Intel Corporation's Regional Emphasis / Focus< br>8.10.8 Intel Corporation's Recent M&A Activity 8.11 Kaspersky Lab Overview 8.11.1 Kaspersky Lab's Organisational Structure 8.11.2 Kaspersky Lab's Cyber Security Products 8.11.3 Kaspersky Lab's Role in the Cyber Security Market 8.11.5 Kaspersky Lab's Primary Market Competitors 8.11.6 Kaspersky Lab's Regional Emphasis / Focus 8.11.7 Kaspersky Lab's Recent M&A Activity 8.12 L-3 Communications Holdings, Inc. Overview 8.12.1 L-3 Communications Holdings, Inc.'s Organisational Structure 8.12.2 L-3 Communications Holdings, Inc.'s Cyber Security Products 8.12.3 L-3 Communications Holdings, Inc.'s Role in the Cyber Security Market 8.12.4 L-3 Communications Holdings, Inc.'s Revenue 2009-2013 8.12.5 L-3 Communications' Regional Revenue 2009-2013 8.12.6 L-3 Communications Holdings, Inc.'s Primary Competitors 8.12.7 L-3 Communications Holdings, Inc.'s Regional Emphasis / Focus 8.12.8 L-3 Communications Holdings, Inc.'s Re cent M&A Activity 8.13 Leidos, Inc. Overview 8.13.1 Leidos, Inc.'s Organisational Structure 8.13.2 Leidos, Inc.'s Cyber Security Products 8.13.3 Leidos, Inc.'s Role in the Cyber Security Market 8.13.4 Leidos, Inc.'s Revenue 2009-2013 8.13.5 Leidos, Inc.'s Regional Revenue 2009-2013 8.13.6 Leidos, Inc.'s Primary Market Competitors 8.13.7 Leidos, Inc.'s Regional Emphasis / Focus 8.13.8 Leidos, Inc.'s Recent M&A Activity 8.14 Lockheed Martin Corporation Overview 8.14.1 Lockheed Martin Corporation's Organisational Structure 8.14.2 Lockheed Martin Corporation's Cyber Security Products 8.14.3 Lockheed Martin Corporation's Role in the Cyber Security Market 8.14.4 Lockheed Martin Corporation's Revenue 2009-2013 8.14.5 Lockheed Martin Corporation's Regional Revenue 2009-2013 8.14.6 Lockheed Martin Corporation's Primary Market Competitors 8.14.7 Lockheed Martin Corporation's Regional Emphasis / Focus< br> 8.14.8 Lockheed Martin Corporation's Recent M&A Activity 8.15 Northrop Grumman Corporation Overview 8.15.1 Northrop Grumman Corporation's Organisational Structure 8.15.2 Northrop Grumman Corporation's Cyber Security Products 8.15.3 Northrop Grumman Corporation's Role in the Cyber Security Market 8.15.4 Northrop Grumman Corporation's Revenue 2009-2013 8.15.5 Northrop Grumman Corporation's Regional Revenue 2009-2013 8.15.6 Northrop Grumman Corporation's Primary Market Competitors 8.15.7 Northrop Grumman Corporation's Regional Emphasis / Focus 8.15.8 Northrop Grumman Corporation's Recent M&A Activity . 8.16 Raytheon Company Overview 8.16.1 Raytheon Company's Organisational Structure 8.16.2 Raytheon Company's Cyber Security Products 8.16.3 Raytheon Company's Role in the Cyber Security Market 8.16.4 Raytheon Company's Revenue 2009-2013 8.18.5 Raytheon Company's Regional Revenue 2009-2013 8 .16.6 Raytheon Company's Primary Market Competitors 8.16.7 Raytheon Company's Regional Emphasis / Focus 8.16.8 Raytheon Company's M&A Activity 8.17 Symantec Corporation Overview 8.17.1 Symantec Corporation's Organisational Structure 8.17.2 Symantec Corporation's Cyber Security Products 8.17.3 Symantec Corporation's Role in the Cyber Security Market 8.17.4 Symantec Corporation's Revenue 2009-2013 8.17.5 Symantec Corporation's Regional Revenue 2009-2013 8.17.6 Symantec Corporation's Primary Market Competitors 8.17.7 Symantec Corporation's Regional Emphasis / Focus 8.17.8 Symantec Corporation's Recent M&A Activity 8.18 Thales Group Overview 8.18.1 Thales Group's Organisational Structure 8.18.2 Thales Group's Cyber Security Products 8.18.3 Thales Group's Role in the Cyber Security Market 8.18.4 Thales Group's Revenue 2009-2013 8.18.5 Thales Group's Regional Revenue 2009-2013 8.18.6 Thales Group's Primary Mark et Competitors 8.18.7 Thales Group's Regional Emphasis / Focus 8.18.8 Thales Group's M&A Activity 8.19 Trend Micro, Inc. Overview 8.19.1 Trend Micro, Inc.'s Organisational Structure 8.19.2 Trend Micro, Inc.'s Cyber Security Products 8.19.3 Trend Micro, Inc.'s Role in the Cyber Security Market 8.19.4 Trend Micro, Inc.'s Revenue 2009-2013 8.18.5 Trend Micro, Inc.'s Regional Revenue 2009-2013 8.19.6 Trend Micro, Inc.'s Primary Market Competitors 8.19.7 Trend Micro, Inc.'s Regional Emphasis / Focus 8.19.8 Trend Micro, Inc.'s Recent M&A Activity 8.20 Ultra Electronics Holdings plc Overview 8.20.1 Ultra Electronics Holdings plc's Organisational Structure 8.20.2 Ultra Electronics Holdings plc's Cyber Security Products 8.20.3 Ultra Electronics Holdings plc's Role in the Cyber Security Market 8.20.4 Ultra Electronics Holdings plc Revenue 2009-2013 8.20.5 Ultra Electronics' Regional Revenue 2009-2013< br>8.20.6 Ultra Electronics Holdings plc's Primary Market Competitors 8.20.7 Ultra Electronics Holdings plc's Regional Emphasis / Focus 8.20.8 Ultra Electronics Holdings plc's M&A Activity 8.21 Other Notable Companies in the Global Cyber Security Market 9. Conclusions 10. Glossary ------------------------------------------------------------ |
List of Tables Table 1.1 Example Table of Cyber Security Regional Forecasts 2015-2025 ($m, AGR%, Cumulative) Table 1.2 Example Table of Leading National Cyber Security Market Forecast by Submarket 2015-2025 ($m) Table 2.3 Mechanisms of Cyber Attack (Type, Description) Table 2.4 Types of Cyber Attack (Type, Description) Table 2.5 Methods of Cyber Defence (Type, Description) Table 3.1 Global Cyber Security Market Forecast 2015-2025 ($m, AGR %, CAGR%, Cumulative) Table 3.2 Regional Cyber Security Market Forecast 2015-2025 ($m, AGR%) Table 3.3 Leading 21 National Cyber Security Market Forecast Annual Growth Rates 2015-2025 (AGR %) Table 3.4 Leading 21 National Cyber Security l Market CAGR's 2015 -2025 (CAGR %)) Table 3.5 Cumulative Leading 21 National Cyber Security Market Expenditure and Market Share 2015-2025 ($m, Market %) Table 3.6 Global Cyber Security Market Drivers & Restraints Table 4.1 Cyber Security Submarket Forecasts 2015-2025 ($m, AGR%) Table 4.2 Cyber Security NetSec Submarket Forecast by Regional Market 2015-2025 ($m, AGR%, Cumulative) Table 4.3 Cyber Security NetSec Submarket Forecast by National Market 2015-2025 ($m, AGR%) Table 4.4 Cyber Security SecOps Submarket Forecast By Regional Market 2015-2025 ($m, Cumulative) Table 4.5 Cyber Security Security Operations (SecOps) Submarket Forecast by National Market 2015-25 ($m, AGR%) Table 4.6 Cyber Security DataSec Submarket Forecast By Regional Market 2015-2025 ($m, Cumulative) Table 4.7 Cyber Security DataSec Submarket Forecast by National Market 2015-25 ($m, AGR%) Table 4.8 Cyber Security IdM Submarket Forecast by Regional Market 2015-2025 ($m, Cumulative) Table 4.9 Cyber S ecurity IdM Submarket Forecast by National Market 2015-25 ($m, AGR%) Table 4.10 Cyber Security EndSec Submarket Forecast by Regional Market 2015-2025 ($m, Cumulative) Table 4.11 Cyber Security EndSec Submarket Forecast by National Market 2015-25 ($m, AGR%) Table 4.12 Cyber Security AppSec Submarket Forecast by Regional Market 2015-2025 ($m, Cumulative) Table 4.13 Cyber Security AppSec Submarket Forecast by National Market 2015-25 ($m, AGR%) Table 4.14 Cyber Security CloudSec Submarket Forecast by Regional Market 2015-2025 ($m, Cumulative) Table 4.15 Cyber Security CloudSec Submarket Forecast by National Market 2015-25 ($m, AGR%) Table 5.1 Leading 21 National Cyber Security Market Forecasts 2015-2025 ($m) Table 5.2 Barriers to Entry Rankings in 21 Leading National Markets (Barrier Rank, Country, AGR%, $m) Table 5.3 U.S. Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.4 U.S. Cyber Security Market Drivers &a mp; Restraints Table 5.5 U.S. Federal Government Contractual Cybersecurity Expenditure 2009-2014 (Department, Year, $m) Table 5.6 U.S. Federal Government Contractual Cybersecurity Expenditure 2009-2015 (Department, Year, $m) Table 5.7 U.S. Federal Government Contractual Cybersecurity Expenditure 2009-2014 (Department, Year, $m) Table 5.8 U.S. NIP Overall Budgetary Allocations 2011-2013 ($m, Section) Table 5.9 U.S. NIP Budgetary Allocations for Counterterrorism 2011-2013 ($m, Section) Table 5.10 U.S. NIP Budgetary Allocations for Homeland Security 2011-2013 ($m, Section) Table 5.11 U.S. NIP Budgetary Allocations for Counternarcotics 2011-2013 ($m, Section) Table 5.12 Major U.S. Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.13 Chinese Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.14 Chinese Cyber Security Drivers & Restraints Tab le 5.15 China's Official Ministry of Public Safety Budget Allocations for 2013-2014 (Department, $m) Table 5.16 China's Official Ministry of Transport Budget Allocations for 2013-2014 (Department, $m) Table 5.17 China's Official Ministry of Agriculture Budget Allocations for 2013-2014 (Department, $m) Table 5.18 China's Official Anti-Smuggling Police Budget Allocations for 2013-2014 (Department, $m) Table 5.19 China's Official Civil Aviation Administration Budget Allocations for 2013-2014 (Department, $m) Table 5.20 China's Official Ministry of Justice Budget Allocations for 2013-2014 (Department, $m) Table 5.21 China's Official Supreme People's Procuratorate Budget Allocations for 2013-2014 (Department, $m) Table 5.22 China's Official State Oceanic Administration (China Coast Guard) Budget Allocations for 2013-2014 (Department, $m) Table 5.23 Japanese Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.24 Japan ese Cyber Security Market Drivers & Restraints Table 5.25 Major Japanese Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.26 Russian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.27 Russian Cyber Security Market Drivers & Restraints Table 5.28 Major Russian Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.29 Republic of Korea Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.30 Republic of Korea Cyber Security Market Drivers & Restraints Table 5.31 Saudi Arabian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.32 Saudi Arabian Cyber Security Market Drivers & Restraints Table 5.33 Indian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cum ulative) Table 5.34 Indian Cyber Security Market Drivers & Restraints Table 5.35 Major Indian Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.36 French Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.37 French Cyber Security Market Drivers & Restraints Table 5.38 Major French Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.39 U.K. Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.40 U.K. Cyber Security Market Drivers & Restraints Table 5.41 Major U.K. Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.42 German Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.43 German Cyber Security Market Drivers & ; Restraints Table 5.44 Major German Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.45 Israeli Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.46 Israeli Cyber Security Market Drivers & Restraints Table 5.47 Major Israeli Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.48 Canadian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.49 Canadian Cyber Security Market Drivers & Restraints Table 5.50 Major Canadian Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.51 Australian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.52 Australian Cyber Security Market Drivers & Restraints Table 5.53 Australian Cyb er Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.54 Italian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.55 Italian Cyber Security Market Drivers & Restraints Table 5.56 Major Italian Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.57 Spanish Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.58 Spanish Cyber Security Market Drivers & Restraints Table 5.59 Major Spanish Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.60 Brazilian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.61 Brazilian Cyber Security Market Drivers & Restraints Table 5.62 Major Brazilian Cyber Security Market Contracts & Programm es (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.63 Turkish Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.64 Turkish Cyber Security Market Drivers & Restraints Table 5.65 Major Turkish Cyber Security Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.66 UAE Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.67 UAE Cyber Security Market Drivers & Restraints Table 5.68 Major UAE Cyber Security Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.69 Taiwanese Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.70 Taiwanese Cyber Security Market Drivers & Restraints Table 5.71 Iranian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.72 Iranian Cyber Securi ty Market Drivers & Restraints Table 5.73 Nigerian Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.74 Nigerian Cyber Security Market Drivers & Restraints Table 5.75 Major Nigerian Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.76 ROW Cyber Security Market & Submarket Forecast 2015-2025 ($m, AGR %, CAGR %, Cumulative) Table 5.77 Rest of the World Cyber Security Market Drivers & Restraints Table 5.78 Major RoW Cyber Security Market Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 6.1 STEP Analysis of the Cyber Security Market 2015-2025 Table 8.1 20 Notable Companies in the Cyber Security Market (Company, Total Revenue 2013 $m, Strongest Business Region, Primary Submarket Focus, Market Unit Revenue $m) Table 8.2 Airbus Group Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.3 Recent Airbus Group Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.4 Sample of Airbus Group Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.5 BAE Systems plc Overview 2013 (CEO, Total Company Revenue, Parent Company, Subsidiaries, HQ, Founded, No. of Employees, Ticker, Website) Table 8.6 Recent BAE Systems plc Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.7 Sample of BAE Systems plc Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.8 Boeing Company Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Parent Company, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.9 Recent Boeing Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, De tails) Table 8.10 Sample of Boeing Company Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.11 Booz Allen Hamilton, Inc. Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.12 Recent Booz Allen Hamilton, Inc. Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.13 Sample of Booz Allen Hamilton, Inc. Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.14 Cisco Systems, Inc. Overview 2013 (CEO, Total Company Revenue, Subsidiaries, HQ, Founded, No. of Employees, Ticker, Website) Table 8.15 Sample of Cisco Systems, Inc. Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.16 Computer Sciences Corporation (CSC) Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, Ticker, Website) Tabl e 8.17 Recent Computer Sciences Corporation (CSC) Cyber Security Contracts / Projects / Programmes (Date, Country, Value, Details) Table 8.18 Sample of Computer Sciences Corporation's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.19 Finmeccanica S.p.A. Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.20 Recent Finmeccanica S.p.A. Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.21 Sample of Finmeccanica S.p.A.'s Products / Services (Company Section, Product, Specification) Table 8.22 General Dynamics Corporation Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.23 Recent General Dynamics Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details)< br>Table 8.24 Sample of General Dynamics Corporation's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.25 Hewlett Packard Company Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.26 Recent Hewlett Packard Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.27 Sample of Hewlett Packard Company's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.28 Intel Corporation Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.29 Recent Intel Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.30 Sample of Intel Corporation's Cyber Security Market Products / Services (Company Section, Product, Specification s Table 8.31 Kaspersky Lab Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, IR Contact, Website) Table 8.32 Recent Kaspersky Lab Cyber Security Contracts / Projects / Programmes (Date, Country, Value, Details, Model/Type) Table 8.33 Sample of Kaspersky Lab's Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.34 L-3 Communications Holdings, Inc. Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.35 Recent L-3 Communications Holdings, Inc. Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.36 Sample of L-3 Communications Holdings, Inc.'s Products / Services (Company Section, Product, Specifications) Table 8.37 Leidos, Inc. Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Parent Company, HQ, Founded, Website) Table 8.3 8 Recent Leidos, Inc. Cyber Security Contracts / Projects / Programmes (Date, Country, Value, Details) Table 8.39 Sample of Leidos, Inc.'s Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.40 Lockheed Martin Corporation Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Website) Table 8.41 Recent Lockheed Martin Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Details) Table 8.42 Sample of Lockheed Martin Corporation's Cyber Security Products / Services (Company Section, Product, Specifications / Key Features) Table 8.43 Northrop Grumman Corporation Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.44 Recent Northrop Grumman Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.45 Sample of Northrop Gru mman Corporation's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.46 Raytheon Company Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, Website) Table 8.47 Recent Raytheon Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.48 Sample of Raytheon Company's Cyber Security Products / Services (Company Section, Product, Key Features Table 8.49 Symantec Corporation Overview 2013 (CEO, Total Company Revenue, Subsidiaries, HQ, Founded, No. of Employees, Ticker, Website) Table 8.50 Recent Symantec Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Details) Table 8.51 Sample of Symantec Corporation's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.52 Thales Group Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, F ounded, No. of Employees, Ticker, IR Contact, Website) Table 8.53 Recent Thales Group Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.54 Sample of Thales Group's Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.55 Trend Micro, Inc. Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.56 Sample of Trend Micro, Inc.'s Cyber Security Products / Services (Company Section, Product, Key Features) Table 8.57 Ultra Electronics Holdings plc Overview 2013 (CEO, Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, Ticker, IR Contact Website) Table 8.58 Sample of Ultra Electronics Holdings plc's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.59 Other Notable Companies in the Global Cyber Security Market (Company, Market Specialisation, W ebsite) ------------------------------------------------------------ |
List of Figures Figure 1.1 Global Cyber Security Market Segmentation Overview Figure 1.2 Example Figure of Regional Cyber Security Submarket Share Forecast 2015, 2020, 2025 (% Share) Figure 1.3 Example Figure of National Market Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 1.4 Example Figure of National Market Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 2.1 Cyber Security Market Structure Overview Figure 2.2 Operation Shady RAT Targets (Sector, Number of Targets) Figure 3.1 Global Cyber Security Market Forecast 2015-2025 ($m, AGR%) Figure 3.2 Cyber Security Regional Coverage Key (Region) Figure 3.3 Regional Cyber Security Market Forecast 2015-2025 ($m, AGR%) Figure 3.4 Regional Cyber Security Market Forecast 2015-2025 (AGR%) Figure 3.5 Regional Cyber Security Market Forecast 2015 (%) Figure 3.6 Regional Cyber Security Market Forecast 2020 (%) Figure 3.7 Regional Cyber Security Market Forecast 2025 (%) Figure 3.8 Top Five Fastest Growing Cyber Security National Markets 2015-2025 (AGR%) Figure 3.9 Leading 21 National Cyber Security Market CAGR's % 2015-2025 Figure 3.10 Change in Leading 21 National Cyber Security Market Share 2015-2025 (%) Figure 3.11 Cumulative Leading 21 National Cyber Security Market Share Forecast 2015-2025 (%) Figure 4.1 Cyber Security Submarket Forecasts 2015-2025 ($m, AGR%) Figure 4.2 Cyber Security Submarket Forecast Growth Rates 2015-2025 (AGR%) Figure 4.3 Cyber Security Submarkets Share Forecast 2015 (%) Figure 4.4 Cyber Security Submarkets Share Forecast 2020(%) Figure 4.5 Cyber Security Submarkets Share Forecast 2025 (%) Figure 4.6 Cyber Security NetSec Submarket Share Forecast by Regional Market 2015, 2020, 2025 (% Share) Figure 4.7 Cyber Security NetSec Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.8 Cyber Security NetSec Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.9 Cyber Security NetSec Submarket National Share Forecast 2015 (%) Figure 4.10 Cyber Security NetSec Submarket National Share Forecast 2020 (%) Figure 4.11 Cyber Security NetSec Submarket National Share Forecast 2025 (%) Figure 4.12 Cyber Security SecOps Submarket Regional Share Forecast 2015, 2020, 2025 (% Share) Figure 4.13 Cyber Security SecOps Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.14 Cyber Security Security Operations (SecOps) Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.15 Cyber Security SecOps Submarket National Share Forecast 2015 (%) Figure 4.16 Cyber Security SecOps Submarket National Share Forecast 2020 (%) Figure 4.17 Cyber Security SecOps Submarket National Share Forecast 2025 (%) Figure 4.18 Cyber Security DataSec Submarket Regional Share Forecast 2015, 2020, 2025 (% Share) Figure 4.19 Cyber Security DataSec Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.20 Cyber Security DataSec Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.21 Cyber Security DataSec Submarket National Share Forecast 2015 (%) Figure 4.22 Cyber Security DataSec Submarket National Share Forecast 2020 (%) Figure 4.23 Cyber Security DataSec Submarket National Share Forecast 2025 (%) Figure 4.24 Cyber Security IdM Submarket Share Forecast by Regional Market 2015, 2020, 2025 (% Share) Figure 4.25 Cyber Security IdM Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.26 Cyber Security IdM Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.27 Cyber Security IdM Submarket National Share Forecast 2015 (%) Figure 4.28 C yber Security IdM Submarket National Share Forecast 2020 (%) Figure 4.20 Cyber Security IdM Submarket National Share Forecast 2025 (%) Figure 4.30 Cyber Security EndSec Submarket Share Forecast by Regional Market 2015, 2020, 2025 (% Share) Figure 4.31 Cyber Security EndSec Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.32 Cyber Security EndSec Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.33 Cyber Security EndSec Submarket National Share Forecast 2015 (%) Figure 4.34 Cyber Security EndSec Submarket National Share Forecast 2020 (%) Figure 4.35 Cyber Security EndSec Submarket National Share Forecast 2025 (%) Figure 4.36 Cyber Security AppSec Submarket Share Forecast by Regional Market 2015, 2020, 2025 (% Share) Figure 4.37 Cyber Security AppSec Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.38 Cyber Security AppSec Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.39 Cybe r Security AppSec Submarket National Share Forecast 2015 (%) Figure 4.40 Cyber Security AppSec Submarket National Share Forecast 2020 (%) Figure 4.41 Cyber Security AppSec Submarket National Share Forecast 2025 (%) Figure 4.42 Cyber Security CloudSec Submarket Share Forecast by Regional Market 2015, 2020, 2025 (% Share) Figure 4.43 Cyber Security CloudSec Submarket Forecast by Regional Market 2015-2025 ($m, AGR%) Figure 4.44 Cyber Security CloudSec Submarket Forecast by National Market 2015-2025 ($m, AGR%) Figure 4.45 Cyber Security CloudSec Submarket National Share Forecast 2015 (%) Figure 4.46 Cyber Security CloudSec Submarket National Share Forecast 2020 (%) Figure 4.47 Cyber Security CloudSec Submarket National Share Forecast 2025 (%) Figure 5.1 Leading 21 National Cyber Security Market Forecast 2015-2025 ($m) Figure 5.2 Leading 21 National Cyber Security Markets Share Forecast 2015 (%) Figure 5.3 Leading 21 National Cyber Security Markets Share Forecast 2020 (%) Figure 5.4 Leading 21 National Cyber Security Markets Share Forecast 2025 (%) Figure 5.5 Barriers to Entry vs. Leading 21 National Cyber Security Market Size vs. AGR% 2015 ($m, AGR%) Figure 5.6 U.S. Cyber Security Market Forecast 2015, 2020, 2025 (% Share) Figure 5.7 US Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.8 North American Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.9 U.S. Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.10 US Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.11 U.S. Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.12 U.S. Federal Government Contractual Cybersecurity Expenditure 2009-2014 ($m, AGR%) Figure 5.13 Share Breakdown of U.S. Federal Cyber Security Spending 2014 (%) Figure 5.14 US Government and Military Cybersecurity Organisational Structure Figure 5.15 US CYBERCOM Organisational Structure Figure 5.16 Chinese Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.17 Chinese Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.18 Asia Pacific Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.19 Chinese Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.20 Chinese Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.21 Chinese Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.22 Share Breakdown of China's Official Public Security Budgets 2014 (%) Figure 5.23 Japanese Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.24 Japanese Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.25 Asia Pacific Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.26 Japanese Cyber Se curity Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.27 Japanese Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.28 Japanese Cyber Security Market Breakdown by Submarket 2015-2025 ($m, AGR %) Figure 5.29 Japanese Military Cyber Security Expenditure 2012-2015 ($m, AGR%) Figure 5.30 Japanese Cyber Command Structure Figure 5.31 Russian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.32 Russian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.33 European Cyber Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.34 Russian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.35 Russian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.36 Russian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.37 Republic of Korea Cyber Security Marke t Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.38 Republic of Korea Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.39 Asia Pacific Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.40 Republic of Korea Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.41 Republic of Korea Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.42 Republic of Korea Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.43 Saudi Arabian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.44 Saudi Arabian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.45 Middle Eastern Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.46 Saudi Arabian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.47 Saudi Arabian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.48 Saudi Arabian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.49 Indian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.50 Indian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.51 Asia Pacific Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.52 Indian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.53 Indian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.54 Indian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.55 French Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.56 French Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.57 European Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.58 French Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.59 French Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.60 French Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.61 U.K. Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.62 U.K. Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.63 European Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.64 U.K. Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.65 U.K. Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.66 U.K. Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.67 German Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.68 German Cyber Security Market Forecast 2015-2025 ($m, AGR %) Fi gure 5.69 European Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.70 German Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, Period) Figure 5.71 German Cyber Security Submarket Forecasts 2015-2025 ($m, AGR%) Figure 5.72 German Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.73 Israeli Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.74 Israeli Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.75 Middle Eastern Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.76 Israeli Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.77 Israeli Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.78 Israeli Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.79 Canadian Cyber Security Market Global Market Sha re Forecast 2015, 2020, 2025 (% Share) Figure 5.80 Canadian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.81 North American Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.82 Canadian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.83 Canadian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.84 Canadian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.85 Australian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.86 Australian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.87 Asia Pacific Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.88 Australian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.89 Australian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.90 Australian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.91 Italian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.92 Italian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.93 European Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.94 Italian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.95 Italian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.96 Italian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.97 Spanish Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.98 Spanish Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.99 European Cyber Security Market Regional Share Breakdown 2015, 2020, 2025 (% Share) Figure 5.100 Spanish Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.101 Spanish Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.102 Spanish Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.103 Brazilian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.104 Brazilian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.105 Central & South America Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.106 Brazilian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.107 Brazilian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.108 Brazilian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.109 Turkish Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.110 Turkish Cyber Security Market Forecast 2015-2025 ($m, AGR %) Fig ure 5.111 European Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.112 Turkish Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.113 Turkish Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.114 Turkish Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.115 Kurdish/PKK Zone of Regional Influence Figure 5.116 UAE Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.117 UAE Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.118 Middle Eastern Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.119 UAE Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.120 UAE Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.121 UAE Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5 .122 Taiwanese Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.123 Taiwanese Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.124 Asia Pacific Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.125 Taiwanese Cyber Security Market CAGR Forecasts VS Global CAG Figure 5.126 Taiwanese Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.126 Taiwanese Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.127 Taiwanese Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) R Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.128 Iranian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.129 Iranian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.130 Iranian Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.131 Iranian Cyber Security Market CAGR Forecasts VS Global CAGR Fo recasts 2015-2025 (CAGR%, CAGR Period) Figure 5.132 Iranian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.133 Iranian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.134 Nigerian Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.135 Nigerian Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.136 African Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.137 Nigerian Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.138 Nigerian Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.139 Nigerian Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 5.140 Rest of the World Cyber Security Market Global Market Share Forecast 2015, 2020, 2025 (% Share) Figure 5.141 Rest of the World Cyber Security Market Forecast 2015-2025 ($m, AGR %) Figure 5.14 2 Rest of the World Cyber Security Market Regional Breakdown 2015, 2020, 2025 (% Share) Figure 5.143 Rest of the World Cyber Security Market CAGR Forecasts VS Global CAGR Forecasts 2015-2025 (CAGR%, CAGR Period) Figure 5.144 Rest of the World Cyber Security Submarket Forecast 2015-2025 ($m, AGR %) Figure 5.145 Rest of the World Cyber Security Market Breakdown by Submarket 2015, 2020, 2025 (% Share) Figure 8.1 Overall Notable 20 Cyber Security Companies Revenue 2009-2013 ($m, AGR%) Figure 8.2 Relevant Unit Revenue of 20 Notable Cyber Security Companies 2009-2013 ($m, AGR%) Figure 8.3 Airbus Group Organisational Structure Figure 8.4 Airbus Group Revenue 2009-2013 ($m, AGR%) Figure 8.5 Airbus Defence & Space Revenue 2009-2013 ($m, AGR%) Figure 8.6 Airbus Group's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.7 Airbus Group's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.8 Airbus Group Regional Emphasis / Focus (Region) Figure 8.9 BAE Systems plc O rganisational Structure Figure 8.10 BAE Systems plc's Revenue 2009-2013 ($m, AGR%) Figure 8.11 BAE Systems plc's Cyber & Intelligence Revenue 2009-2013 ($m, AGR%) Figure 8.12 BAE Systems plc's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.13 BAE Systems plc's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.14 BAE Systems plc Regional Emphasis / Focus (Region) Figure 8.15 Boeing Company Organisational Structure Figure 8.16 Boeing Company Revenue 2009-2013 ($m, AGR%) Figure 8.17 Boeing Company's Global Services & Support Revenue 2009-2013 ($m, AGR%) Figure 8.18 Boeing Company's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.19 Boeing Company's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.20 Boeing Company's Regional Emphasis / Focus (Region) Figure 8.21 Booz Allen Hamilton, Inc. Organisational Structure Figure 8.22 Booz Allen Hamilton, Inc.'s Overall Revenue 2009-2013 ($m, AGR%) Figure 8.23 Booz Allen Hamilton's U.S. DoD Revenue 2009-201 3 ($m, AGR%) Figure 8.24 Booz Allen Hamilton's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.25 Booz Allen Hamilton's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.26 Booz Allen Hamilton, Inc.'s Regional Emphasis / Focus (Region) Figure 8.27 Cisco Systems, Inc. Organisational Structure Figure 8.28 Cisco Systems, Inc.'s Revenue 2009-2013 ($m, AGR%) Figure 8.29 Cisco Systems, Inc.'s Service Annual Revenue 2009-2013 ($m, AGR%) Figure 8.30 Cisco Systems, Inc.'s Regional Revenue 2009-2013 ($m, AGR%) Figure 8.31 Cisco Systems, Inc.'s Regional AGR's 2009-2013 ($m, AGR%) Figure 8.32 Cisco Systems, Inc.'s Regional Emphasis / Focus (Region, % Share) Figure 8.33 Computer Sciences Corporation's Organisational Structure Figure 8.34 Computer Sciences Corporation's Revenue 2008-2013($m, AGR%) Figure 8.35 Computer Sciences Corporation's NPS Revenue 2008-2013($m, AGR%) Figure 8.36 Computer Science Corporation's Regional Revenue 2009-2013 ($m, AGR%) Figure 8. 37 Computer Science Corporation's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.38 Computer Sciences Corporation's Regional Emphasis / Focus (Region) Figure 8.39 Finmeccanica S.p.A.'s Organisational Structure Figure 8.40 Finmeccanica S.p.A.'s Overall Revenue 2009-2013 ($m) Figure 8.41 Defense & Security Electronic's Annual Revenue 2009-2013 ($m) Figure 8.42 Finmeccanica S.p.A.'s Regional Revenue 2009-2013 ($m, AGR%) Figure 8.43 Finmeccanica S.p.A.'s Regional AGR's 2009-2013 ($m, AGR%) Figure 8.44 Finmeccanica S.p.A.'s Regional Emphasis / Focus (Region) Figure 8.45 General Dynamics Corporation's Organisational Structure Figure 8.46 General Dynamics Corporation Overall Revenue 2009-2013 ($m) Figure 8.47 General Dynamics Information Systems & Technology Annual Revenue 2009-2013 ($m) Figure 8.48 General Dynamics Corporation's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.49 General Dynamics Corporation's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.50 General Dynamics Corporation's Regional Emphasis / Focus (Region) Figure 8.51 Hewlett Packard Company's Organisational Structure Figure 8.52 Hewlett Packard Company's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.53 Hewlett Packard Enterprise Group's Revenue 2009-2013 ($m, AGR%) Figure 8.54 Hewlett Packard Company's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.55 Hewlett Packard Company's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.56 L-3 Communications Holdings, Inc. Company Regional Emphasis / Focus Figure 8.57 Intel Corporation's Organisational Structure Figure 8.58 Intel Corporation's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.59 Intel Corporation's Software & Services Revenue 2009-2013 ($m, AGR%) Figure 8.60 Intel Corporation's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.61 Intel Corporation's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.62 Intel Corporation's Regional Emphasis / Focus Figure 8.63 Kaspersky Lab's O rganisational Structure Figure 8.64 Kaspersky Lab's Regional Emphasis / Focus Figure 8.65 L-3 Communications Holdings, Inc.'s Organisational Structure Figure 8.66 L-3 Communications Holdings, Inc.'s Overall Revenue 2009-2013 ($m, AGR%) Figure 8.67 L-3 Communications Holdings, Inc.'s National Security Solutions Revenue 2009-2013 ($m, AGR%) Figure 8.68 L-3 Communications' Regional Revenue 2009-2013 ($m, AGR%) Figure 8.69 L-3 Communications' Regional AGR's 2009-2013 ($m, AGR%) Figure 8.70 L-3 Communications Holdings, Inc.'s Regional Emphasis /Focus Figure 8.71 Leidos, Inc.'s Organisational Structure Figure 8.72 Leidos, Inc.'s Overall Revenue 2009-2013 ($m, AGR%) Figure 8.73 Leidos' National Security Solutions Revenue 2009-2013 ($m, AGR%) Figure 8.74 Leidos, Inc.'s Regional Revenue 2009-2013 ($m, AGR%) Figure 8.75 Leidos, Inc.'s Regional AGR's 2009-2013 ($m, AGR%) Figure 8.76 Leidos, Inc.'s Regional Emphasis / Focus (Region) Figure 8.77 Lockheed Martin Corporation's Organisational Structure Figure 8.78 Lockheed Martin Corporation's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.79 Lockheed Martin Corporation's Information Systems & Global Solutions Revenue 2009-2013 ($m, AGR%) Figure 8.80 Lockheed Martin Corporation's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.81 Lockheed Martin Corporation's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.82 Lockheed Martin Corporation's Regional Emphasis /Focus (Region) Figure 8.83 Northrop Grumman Corporation's Organisational Structure Figure 8.84 Northrop Grumman Corporation's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.85 Northrop Grumman Corporation's Information Systems Revenue 2009-2013 ($m, AGR%) Figure 8.86 Northrop Grumman Corporation's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.87 Northrop Grumman Corporation's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.88 Northrop Grumman Corporation's Regional Emphasis / Focus Figure 8.89 Raythe on Company's Organisational Structure Figure 8.90 Raytheon Company's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.91 Raytheon Company's Intelligence, Information & Services Revenue 2009-2013 ($m, AGR%) Figure 8.92 Raytheon Company's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.93 Raytheon Regional AGR's 2009-2013 ($m, AGR%) Figure 8.94 Raytheon Company's Regional Emphasis / Focus (Region) Figure 8.95 Symantec Corporation's Organisational Structure Figure 8.96 Symantec Corporation's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.97 Symantec Corporation's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.98 Symantec Corporation's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.99 Symantec Corporation's Regional Emphasis / Focus (Region) Figure 8.100 Thales Group's Organisational Structure Figure 8.101 Thales Group's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.102 Thales Defence & Security Revenue 2009-2013 ($m, AGR%) Figure 8.103Thales G roup's Regional Revenue 2009-2013 ($m, AGR%) Figure 8.104 Thales Group's Regional AGR's 2009-2013 ($m, AGR%) Figure 8.105 Thales Group's Regional Emphasis / Focus (Region) Figure 8.106 Trend Micro, Inc.'s Organisational Structure Figure 8.107 Trend Micro, Inc.'s Overall Revenue 2009-2013 ($m, AGR%) Figure 8.108 Trend Micro, Inc.'s North American Revenue 2009-2013 ($m, AGR%) Figure 8.109 Trend Micro, Inc.'s Regional Revenue 2009-2013 ($m, AGR%) Figure 8.110 Trend Micro, Inc.'s Regional AGR's 2009-2013 ($m, AGR%) Figure 8.111 Trend Micro, Inc.'s Regional Emphasis / Focus Figure 8.112 Ultra Electronics Holdings plc's Organisational Structure Figure 8.113 Ultra Electronics Holdings plc's Overall Revenue 2009-2013 ($m, AGR%) Figure 8.114 Ultra Electronics Tactical & Sonar Systems Revenue 2009-2013 ($m, AGR%) Figure 8.115 Ultra Electronics' Regional Revenue 2009-2013 ($m, AGR%) Figure 8.116 Ultra Electronics' Regional AGR's 2009-2013 ($m, AGR%)Figure 8.117 Ultra Electronics Holdings plc's Regional Emphasis / Focus (Region) ------------------------------------------------------------ |
Companies Mentioned in this report 20 Minutes 3 Phoenix Inc. 3001 International Inc. 3Di Technologies LLC 3Eti 3PAR 42Six Solutions LLC Abacus Data ABB Ltd. Abu Dhabi National Oil Company (ADNOC) AC4S Accenture Plc. ActioNet Inc. ADI Technologies, Inc ADNOC Advanced C4 Solutions, Inc. AdvanceMed Corp Advizex Technologies LLC AEP Aermacchi, Quadrics Aeronix Afilon Agnitum Ltd. AgustaWestland AhnLab, Inc. Airborne Technologies Inc. (ATI) Airbus Airbus Defence & Space Airbus Group Airbus Military Airbus UK Al Shaheen Alcatel Lucent Alenia Aermacchi Alenia Aeronautica ALEX-AS, J.V. AlienVault LLC Alion Al-Jazeera ALKU Government Solutions Allied Associates International, Inc AllSource Global Management, LLC. ALON, Inc. Alteon Training LLC Altron American Airlines American Systems AMI Anglia Water Ansaldo Breda Ansaldo STS Apcom Inc. Apple Applied Communication Sciences Applied Fundamentals Consulting, LLC Applied Physical Science Corporation Applied Visions, Inc Argon ST ARINC Arisem Arkoon Network Security Arrowpoint Communications Associated Press Assured Information Security, Inc Astrium AT Solutions Group LLC A-T Solutions, Inc. Ateon Ltd. ATGS ATR AUSGAR Technologies, Inc. Autometric, Inc. Autonomy Avalon Systems Aveos Fleet Performance Aveshka, Inc. AVG Technologies Aviall Services Inc Avira Operations GmbH & Co. KG AxleTech International Inc. BAE Systems Australia BAE Systems Inc BAE Systems Integrated Systems Technologies BAE Systems Ma rine BAE Systems Maritime Naval Ships BAE Systems Maritime Submarines BAE Systems Military Air & Information BAE Systems Plc. BAE Systems Surface Fleet Solutions Bahrain Petroleum Company Balfour Beatty BarlingBay Barracuda Networks Basis Technology Bath Iron Works Battelle Bayshore Networks, Inc. Bechtel National Inc. Bell Canada Big-D Construction Corp. Bitdefender Blackberry Boeing Aircraft Holding Company Boeing Australia Boeing Canada Boeing Capital Boeing Commercial Airplanes Boeing Commercial Space Company Boeing Company Boeing Cyber Engagement centre (CEC) Boeing Defence UK Boeing Defense, Space & Security Boeing International Corporation India Private Limited Boeing Inventory Locator Service Boeing Middle East Ltd. Boeing Phantom Works Boeing Realty Corporation Boeing Rotorcraft Systems Boeing Satellite Systems International, Inc. Boeing Service Co, Boeing Aerospace Operations Inc. Boeing Store Boeing Travel Management Company Boeing-SVS, Inc. Bombardier Booz & Company Booz Allen Hamilton Corporation Brandon Technology Consulting, Inc. Braxton Technologies, LLC. Brightmail British Telecom (BT) BroadWare Technologies Broadweb BT Security BullGuard Business Computers Management Consulting Group, LLC Business Integra Technology Solutions, Inc. Byres Security Inc. C&K Systems CA Technologies, Inc. CACI International CACI, Inc. Camber Canadian Broadcasting Corporation Carl Zeiss Cassidian Cassidian Cybersecurity Cassidian Optronics CCSi Centrex Ethical Lab CenturyLink Certicom Corporation CGI Checkpoint Software Technologies Ltd. China Information Technology Inc. China Telecom Chugach Government Solutions, Inc. Cisco (India) Private Limited Cisco International Limited Cisco Media Solutions Inc. Cisco Systems (Tha iland) Limited Cisco Systems (USA) Pte. Ltd. Cisco Systems Capital Corp. Cisco Systems Finland Oy Cisco Systems G.K. Cisco Systems Inc. Cisco Systems International B.V. Cisco Videoscape Cloudflare Cloudshield Technologies CM Equity Partners Inc. Cognio Cohort plc. Comodo Group, Inc. Compatible Systems Computer Science Corporation (CSC) Computer Sciences Canada Inc. Conansys Corporation Concurrent Technologies Corporation ConocoPhillips Continental DataGraphics Ltd. Convair Corero Network Security, Inc. CrySyS Lab CSC Applied Technologies LLC. CSC Arabia Ltd. CSC Bulgaria E.O.O.D. CSC Computer Sciences B.V. CSC Computer Sciences Consulting Austria CSC Computer Sciences International Inc. CSC Computer Sciences Pte Ltd. CSC Consulting Inc. CSC Convansys Corporation CSC Credit Services, Inc. CSC Cybertek Corp. Cubic Defense Applications CUBRC CYBERINTEL Cybernet Systems Corp oration CyberSpace Operations Consulting Inc. Cylance DAHER-SOCATA Danaher Corporation DataSoft Corporation Defence Systems, Engineering & Support Def-Logix Dell Inc. Dell Services Federal Government, Inc. Deloitte Consulting LLP. Denim Group Detica Digital Receiver Technology Digitial Bond Inc. DMI Domino's Pizza DornerWorks, Ltd. DPR Construction Dr. Web DRS Technologies Dynamic Network Enterprises, Inc. Dynamicsoft Dyncorp DynPort Vaccine Company LLC EADS CASA EADS EFW Eagle Alliance Eagle Enterprise Inc. Eagle Research Group, Inc. Easy Solutions eBay Egged El Mundo El País Elbit Systems Ltd Electric Data Systems, Inc. Electric Launch Company Electronic Data Systems Electronic Warfare Associates, Inc. EMC Corporation EmeSec Emiraje Systems EnCana Corporation Energetics Technology Center Energy Sector Security Consortium Inc EnerNex Corporat ion Engineering Services Network, Inc. ENOC Enterprise Information Services EOIR Technologies EOTech ESET ESET Middle East Eurocopter Exelis, Inc. Exida Canada Experian ExxonMobil FCN Incorporated Federal Management Systems Inc. Fibercore Finmeccanica Defence Finmeccanica S.p.A. FireEye, Inc. First Consulting Group Inc. Fleet Support Limited Florida Institute of Technology Focke-Wulf Fondation Telecom Foreground Security Forensic Technology WAI Inc. Fortinet, Inc. Foxguard Solutions France Info France Inter Frontier Systems Inc. F-Secure Corporation Fujitsu Ltd. Fulcrum IT Services, LLC G Data Software, Inc. Gazprom General Atlantic General Dynamics General Dynamics Advanced Information Systems General Dynamics Armament Systems Inc. General Dynamics C4 Systems General Dynamics Corporation General Dynamics Electric Boat General Dynamics Government Systems C orp. General Dynamics Information Technologies Inc. General Dynamics Itronix Corporation General Dynamics Land Systems General Dynamics Ordnance & Tactical Systems Inc. General Dynamics OTS Inc. General Dynamics SATCOM Technologies Inc. General Dynamics United Kingdom Ltd. General Electric (GE) Gentex Corporation Georgia Tech Applied Research Georgia Tech Research Corporation GFI Software Gigasat Global Info Tek, Inc. Global Technical Systems Gnostech Inc. Goodwill Industries International Google Inc. Google Kenya Grumman Aircraft Corporation Gulfstream Aerospace Harris Corporation Havok Helibras HighAction, LLC Honeywell International Inc. HP Australia Pty Ltd. HP Autonomy HP Canada HP Company HP Enterprise Services, LLC HP France S.A.S HP Japan Ltd. HP Peru S.R.L HP Taiwan Ltd. HP Vietnam Ltd. HRL Laboratories, LLC HSBC Huawei Technologies Co. Ltd. IBM Corpor ation IBM Global Services IBM Research ICF International IHI Corp. Iltaccoditalia.info Imagine One StraCon Venture, LLC Industrial Defender, Inc. InDyne, Inc. Infinion Technologies AG InfoReliance Corp. InfoZen Infrax Systems Inc. Innominate Security Technologies AG Innovative Banking Solutions AG Insight Technology Inc. Insitu Intego, Inc. Integrits Corporation Intel Capital Intel Corporation Intel Corporation Hillsboro Intel Electronics Ltd. Intel International Intel Ireland Intel Israel Intel Massachusetts Inc. Intel Semiconductor Ltd. INTELLIGENT AUTOMATION INC intelliSolutions, Inc. International Resources Group Interstate Electronics Corp Interswitch Invincea IOActive Inc. IPKeys ISHPI Information Technologies, Inc. Israel Electric Company Israel National Gas Lines Ltd. Ithra ITT Advanced Engineering & Sciences Division Jabber, Inc. Jacobs Technolog y Inc. Japan Airlines Japan Times Jeppesen Jeppesen DataPlan Inc. Jet Aviation JetBlue John Hopkins University Applied Physics Laboratory LLC JouleX JP Morgan Chase & Co. Juniper Networks Inc. K7 Computing Pvt. Ltd. Kaspersky Lab Kawasaki Heavy Industries KCG KDI Precision Products Inc. Kestrel Enterprises Inc. Kestrel Technology, LLC Kingsoft Kiss Technology Kobe Shipyard & Machinery Works Kollmorgen Electro-optical Komodo Technology Kratos Defense & Security Solutions KRATOS Defense and Security Solutions, Inc. KT Mobile Networks Kuwait Oil Company L-3 Communications Canada Inc. L-3 Communications Corp L-3 Communications Holdings Inc. L-3 Communications Integrated Systems L.P. L-3 Communications MAPPS Inc. L-3 Communications MariPro, Inc. L-3 Communications Singapore Pte Ltd. L-3 Communications Vertex Aerospace LLC L-3 Communications Westwood Corp L-3 Services, I nc. Le Monde Le Parisien Leidos Australia Leidos Biomedical Research, Inc. Leidos Canada Leidos Engineering, LLC Leidos Health Leidos Inc. L'Express LGS Innovations Lightstream Linksys Litton Industries LiveTV Lockheed Martin Aeronautics Lockheed Martin Canada Lockheed Martin Corporation Lockheed Martin Global Training and Logistics Lockheed Martin Information Technology Lockheed Martin Missiles and Fire Control Lockheed Martin Mission Systems and Sensors Lockheed Martin Orincon Lockheed Martin Space Systems Lockheed Martin Systems Integration Owego Lockheed Martin Transportation & Security Services Lockheed Martin UK Logica Lookingglass Cyber Solutions Lookout Louis Berger Lunarline Inc. M5 Network Security Pty Ltd. MacAulay-Brown Inc. Mandiant Mantech Group ManTech International Corporation Marathon Oil Marianne Mastercard MBDA McAfee, Inc. McDonnell Douglas Measurement Systems Inc. Mediapart MEDPROTECT, LLC Melbourne Water Meraki Networks Mercury Interactive Merit Network Inc Merlin International MessageLabs Metreos Michigan Institute of Technology Microdyne Outsourcing Inc Microsoft MicroTech MITRE Corporation Mitsubishi Heavy Industries Mobiel Armor Mocana Corporation Montana Aviation Research Co. Morgan Advanced Materials PLC. Morgridge Institute for Research MOWAG GmbH MphasiS mPrest Systems Mynd Corp. Mynd International, Ltd. NACON Consulting, LLC Nagasaki Shipyard & Machinery Works Nagoya Guidance & Propulsion System Works Narus National Steel and Shipbuilding Company Naval Postgraduate School NCI, Inc. N-Dimension Solutions, Inc. Neoware Netasq NetSolve NetSpeed Network Security Systems Plus, Inc. Newport Systems Solutions NICTA Nike NISC Nitro Security Nonghyup Cooperative Nor throp Corporation Northrop Grumman Corporation Northrop Grumman Electronic Systems Northrop Grumman Information Systems Northrop Grumman Information Technology, Inc. Northrop Grumman Shipbuilding Northrop Grumman Space & Mission Systems Corporation Northrop Grumman Systems Corporation Northumbrian Water Limited (NWL) Nukona Oak Ridge National Laboratory Oasis Systems Odyssey software OK Magazine Okena One Source Open Kernel labs Opsware Orative Pacific NW National Laboratory Palm Inc. Panda Security SL Paradigm Technologies Parc Technologies Pari Networks Patria Paypal P-Cube Peregine Systems Perimeter Internetworking Corporation PESystems, Inc. Petrobras Petroleum Development Oman Piocon Technologies Inc. PIXIA Corp. PolysServe PostPath PostX Power Paragon Inc. Prescient Edge Preston Aviation Solutions Pty, Ltd Procerus Technologies Procket Networks P roCurve ProLogic PSafe Pure Digital Technologies Pure Networks Qantas Airways Qantas Defence Services Qatar Petroleum Qihoo 360 Technology Co. Ltd. QinetiQ Group plc QinetiQ North America Quanterion Solutions, Inc. Quick Heal Radiance Technologies, Inc. Radware RAM Laboratories, Inc. RandomStorm Raytheon Australia Raytheon BBN Technologies Raytheon Company Raytheon Ebasco Overseas Ltd. Raytheon ELCAN Optical Technologies Raytheon Engineers & Constructors Raytheon Integrated Defense Systems Raytheon Intelligence and Information Systems Raytheon Missile Systems Raytheon Technical Services Company ReliaQuest Relicore Research in Motion (RIM) Reuters Reveal Ricardo RLM Communications, Inc. Rocketdyne Rockwell Collins Rolta International Inc. Royal Ordnance RSA Rusal Sabre Holdings Salient Federal Solutions, Inc. Sandia National Laboratories Sarcos SAS I nstitute, Inc. Saudi Aramco Savi Technology SCALABLE Network Technologies, Inc. Scaled Composites Schweitzer Engineering Laboratories Science Applications International Corporation (SAIC) Scientific Atlanta SCITOR Corporation Secure Computing Secure Decisions Secure Tech Securenet SeKON Enterprises Incorporated SelectTech Services Corporation Selex ES Selex Sistemi Integrati Selsius Systems Sentar, Inc. Sentek Consulting, Inc. SENTEK Global SentinelOne Serco, Inc. ServiceMesh Servicentro TMLA S.A. de C.V. Siemens Sierra Nevada Corporation Signal Innovation Group (SIG) Silversky SITA Skunk Works Skype Skystone Systems Slate SNA Software, LLC Snapfish Software Engineering Institute - Carnegie Mellon Sojitz Corporation Solana Networks Solutions Made Simple Inc. Sony Corporation Sony Pictures Entertainment Sophos Ltd. SOTECH Sotera Defense Solutions, Inc.Sourcefire, Inc. Southwest Research Institute Spar Aerospace SPD Electrical Systems Inc. Spectrolab Inc. Spot Image SRA International, Inc. SRI International Starent Networks Statistics Canada Steelray Software Strategic Analysis Strategic Operational Solutions, Inc. StubHub SU53 Sumaria Systems, Inc. Sun News Network SURVICE Engineering Company Sygate Technologies Symantec SynApps Solutions SYSGO Syzygy Technologies, Inc. Takreer Tapestry Solutions Inc. Target Stores TASC Inc. Tasmania Network Systems TCS Technica Corporation TeleCommunication Systems, Inc. (TCS) Telia Telstra Tesco Tetra Tech, Inc. TG Soft TGMe Thales Air Defence Thales Alenia Space Thales Australia Thales Communications Thales Group Thales Nederland Thales Optronics Ltd. Thales Rail Signalling Solutions Thales Training & Simulation Thales UK Thales Underwater SystemsThe Daily Telegraph The Electric Power Research Institute The Grid Protection Alliance The Guardian The Independent The Indian Express The London Evening Standard The New York Times The Washington Post The Washington Times Tidal Software TippingPoint TISTA Science and Technology Corp Titan Corporation Tivella Torres Advanced Enterprise Solutions LLC Trend Micro Australia Pty. Ltd. Trend Micro China Incorporated Trend Micro Deutschland GmbH Trend Micro do Brasil Ltda. Trend Micro EMEA Ltd. Trend Micro France Trend Micro Hong Kong Limited Trend Micro Inc. Trend Micro India Private Limited. Trend Micro Italy S.r.L. Trend Micro Korea, Inc. Trend Micro Latinamerica S.A.de C.V. Trend Micro Malaysia Sdn.Bhd. Trend Micro New Zealand Limited Trend Micro Singapore Private Limited. Trend Micro Taiwan Incorporated Trend Micro Thailand Limited Trend Micro U.S., Inc. Trend Micro UK Ltd. TRL Technology TrustPort a.s. Trustwave Holdings, Inc. TSG-2 Joint Venture Tshinghua Tongfang TT Government Solutions Twingo Systems Ultra Electronics Advanced Tactical Systems Ultra Electronics Airport Systems Ultra Electronics Command & Control Systems Ultra Electronics Communication & Integrated Systems Ultra Electronics Flightline Systems Ultra Electronics Holdings plc. Ultra Electronics ID Ultra Electronics Maritime Systems Ultra Electronics Nuclear Control Systems Ultra Electronics Ocean Systems Ultra Electronics Precision Air & Land Systems Ultra Electronics Sensors & Process Instrumentation Ultra Electronics Sonar Systems Ultra Electronics Surveillance & Security Systems United Space Alliance Universal Music URLabs URS Corporation URS Federal Services USSI UXC Connect Vangent Holding Corporation Vangent Inc. Varec, Inc. Venatore LLC Verint Systems Ver is Group, LLC Verisign Veritas Capital Verizon Vertex Antennetechnik GmbH Vertica Systems Viasat Vigilance Networks Virtuata Virtutech VirusBlokAda Visa Visionix VMware VoodooPC Vovida Networks Vulnerability Research Labs W&D Holdings Limited Washington Headquarters Services Waterfall Security Solutions Ltd. WBB WebEx Webline Communications Webroot, Inc. Welkin Associates Ltd. WheelGroup WidePoint Corporation WIJET, LLC Wind River Systems Wurldtech Security Technologies Inc Wyle Laboratories Xicrom Yahoo Japan Yahoo! Yarrow Shipbuilders Youtube ZDNet Zemana ZTE Corporation Other Organisations Mentioned in this Report Abu Dhabi Police Al-Nusra Front Al-Qaeda American Institute of Aeronautics and Ast ronautics (AIAA) American National Hockey League Anonymous AntiSec Assinform Australian Defence Force Academy (AFDA) Australian Department of Broadband, Communications and the Digital Economy Australian Federal Police (AFP) Australian Labour Party Australian Liberal Party Australian Ministry of Defence Australian Secret Intelligence Services (ASIS) Bank of Montreal Belgian Foreign Ministry Bharatiya Janata Party (BJP) Boko Haram Brazilian Department of Justice and Consumer Citizenship Brazilian Ministry of External Relations Bundesamt für Sicherheit in der Informationstechnik (BIS) Canadian Air Transport Security Authority (CATSA) Canadian Communications Security Establishment (CSE) Canadian Cyber Incident Response Centre (CCIRC) Canadian Department of National Defence (DND) Canadian Department of Public Safety and Emergency Prepardness Canadian Finance Department Canadian Supreme Court Canadian Treasury B oard Carbanak Carnegie Mellon University China Computer Emergency Response Team (CERT) Chinese Anti-Smuggling Police Chinese Civil Aviation Administration Chinese Cyberspace Administration Chinese General Office of the CPC Chinese Ministry of Agriculture Chinese Ministry of Justice Chinese Ministry of Public Safety Chinese Ministry of Transport Chinese Office of the State Council Chinese People's Liberation Army (PLA) Chinese State Internet Information Office Chinese State Oceanic Administration Chinese Supreme People's Procuratorate Columbia University Communist Party of China (CPC) Cyber Security Information Sharing Partnership Japan (J-CSIP) CyberBerkut Czech Technical University Defence Research and Development Canada European Central Bank European Commission European Network for Cyber Security (ENCS) European Union FIFA French General Directorate of Armament French Network and Information Sec urity Agency (FNISA) French Prime Minister's Office French State Committee on Foreign Affairs Defence and Armed Forces GCHQ George Mason University Georgia Tech Research Institute Georgia Tech School of Electrical and Computer Engineering's National Electric Energy Testing, Research and Applications Center German Bundeswehr German Cyber Security Council (NCS) German Federal Intelligence Service German Federal Ministry of Interior German Federal Office for Information Security German Federal Office for the Protection of the Constitution German Federal Office of Civil Protection and Disaster Assistance German Foreign Ministry German National Cyber Response Centre (NCAZ) Hamas Indian Army Indian Computer Emergency Response Team (CERT-In) Indian Cyber Command Indian Defence Metallurgical Research Laboratory (DMRL) Indian Defence Research and Development Organisation (DRDO) Indian Eastern Naval Command Indian Joint Work ing Group (JWG) Indian Ministry of Communication and Information Technology (MCIT) Indian Ministry of Human Resource Development Indian National Association of Software Services Companies Indian National Critical Information Infrastructure Protection Centre Indian National Cyber Coordination Centre (NCCC) Indian National Security Council Secretariat (NSCS) Indian Navy Indiana University International Computer Science Institute INTERPOL Iranian National Computer Emergency Response Team Iraqi Army ISA Security Compliance Institute Islamic State (IS) Israeli Cyber Directorate Israeli Defence Forces (IDF) Istanbul Directorate of Security Istanbul's Governor's Office Japan Information-Technology Promotion Agency Japanese Combined Cyber Defence Unit (CDU) Japanese Control System Security Centre (CSSC) Japanese Cyber Defence Council Japanese House of Councillors Japanese Ministry of Defence Japanese Ministry of Econ omy, Trade and Industry (METI) Japanese Ministry of Internal Affairs and Communications (MIAC) Japanese National Information Security Centre (NISC) Japanese National Police Agency (NPA) Japanese SDF C4 Systems Command Japanese Self-Defence Forces (JSDF) Justice and Development Party (AKP) Kansas State University Khalifa University Korea Communications Commission (KCC) Kurdish Democratic Union Party (PYD) Kurdish National Council of Syria (KNC) Kurdish Workers Party (PKK) Lizard Squad London Underground LulzSec Maryland Procurement Office MI5 Missouri University of Science and Technology Movement for the Emancipation of the Niger Delta (MEND) National Aeronautics and Space Administration (NASA) National Bank of Canada National Defence Industry Association (NDIA) National Research Council of Canada (NRC) NATO Computer Incident Response Capability (NCIRC) Nigerian Computer Emergency Response Team (CERT) Niger ian Economical and Financial Crimes Commission (EFCC) Nigerian Federal Government Nigerian Ministry of Defence Nigerian Ministry of Foreign Affairs Nigerian Ministry of Science & Technology Nigerian National Malaria Control Programme Nigerian National Research Institute for Chemical Technology North Atlantic Treaty Organisation (NATO) Norwegian National Security Authority Oak Ridge National Laboratory OPEC Ottawa Police PakCyberEaglez Pennsylvania State University, People's Protection Units (YPG) People's Bank of China (PBOC) PLA Unit 61398 Public Safety Canada Purdue University RedHack Rex Mundi Rosoboronexport Royal Australian Air Force (RAAF) Royal Bank of Canada Russian Central Bank Russian Cyber Command (Rucyborg) Russian Federal Security Service (FSB) Russian Security Council Rutgers University - New Brunswick Campus Saudi Arabian Joint Commission on Critical Infrastructure and Border Se curity (JCCIP) South Korean Financial Supervisory Service South Korean Ministry of Science and Technology South Korean National Cyber Security Center Spamhaus Spanish Ministry of Defence Spanish Ministry of Foreign Affairs Spanish Ministry of Interior Spanish Ministry of the Presidency Spanish National Cyber Security Council Spanish National Intelligence Centre (NIC) Spanish National Police Spanish National Security Council Strategic Energy Institute Syrian Electronic Army Taiwanese Democratic Progressive Party Taiwanese Ministry of National Defence Taiwanese Ministry of Science & Technology Tarh Andishan TeaM Hckers of Iraq The Ajax Security Team The Bank of Brazil The Chaos Computer Club The Conservative Party of Canada The Cutting Sword of Justice The Guardians of Peace The Kurdish Democratic Union Party (PYD) The Military Police of São Paulo The National Rural Electric Cooperative Association The Pirate Bay The Russian Cyber Command (Rucyborg) The Trustees of Princeton University The University of Alabama at Birmingham The University of North Carolina at Chapel Hill The Vatican Trustees of Dartmouth College Trustees of Indiana University Turkish National Intelligence Organisation (MIT) Turkish Telecommunications Directorate U.K. Cyber Security Evaluation Centre (HCSEC) U.K. Department for Business Innovation & Skills (BIS) U.K. Environment Agency U.K. Highways Agency U.S .Missile Defence Agency U.S. 1st Information Operations Command U.S. 67th Network Warfare Wing U.S. 688th Information Operations Wing U.S. 689th Combat Communications Wing U.S. 780th Military Intelligence Brigade U.S. 9th Army Signal Command U.S. Air Force (USAF) U.S. Air Force Cyber Command (AFCYBER) U.S. Air Force Medical Services (AFMS) U.S. Air Force Office of Special Investigations (AFOSI) U.S. Air Force Research Labo ratory (AFRL) U.S. Army U.S. Army Aviation and Missile Life Cycle Management Command (AMCOM) U.S. Army Corps of Engineers U.S. Army Forces Cyber Command (ARCYBER) U.S. Army Information Systems Engineering Command (USAISEC) U.S. Army Intelligence and Security Command (INSCOM) U.S. Army Medical Research and Materiel Command (USAMRMC) U.S. Army Research Laboratory (ARL) U.S. Central Command (CENTCOM) U.S. Central Intelligence Agency (CIA) U.S. Citizenship and Immigration Services (UCIS) U.S. Coast Guard Cyber Command U.S. Computer Emergency Readiness Team (US-CERT) U.S. Cyber Command (Cybercom) U.S. Defense Advanced Research Projects Agency (DARPA) U.S. Defense Information Systems Agency (DISA) U.S. Defense Intelligence Agency (DIA) U.S. Defense Threat Reduction Agency (DTRA) U.S. Department of Agriculture U.S. Department of Alcohol, Tobacco, Firearms and Explosives (ATF) U.S. Department of Commerce U.S. Department of De fense (DoD) U.S. Department of Education U.S. Department of Energy (DoE) U.S. Department of Health & Human Services U.S. Department of Homeland Security (DHS) U.S. Department of Justice (DoJ) U.S. Department of Labor U.S. Department of State U.S. Department of the Interior U.S. Department of the Treasury U.S. Department of Transportation U.S. Department of Veterans Affairs U.S. DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) U.S. DHS Science and Technology Directorate (DHS S&T) U.S. Environmental Protection Agency (EPA) U.S. Federal Aviation Authority (FAA) U.S. Federal Bureau of Investigation (FBI) U.S. Federal Communications Commission U.S. Federal Transit Administration (FTA) U.S. Fleet Cyber Command (FLTCYBERCOM) U.S. General Services Administration U.S. Internal Revenue Service (IRS) U.S. Marine Corp (USMC) U.S. Marine Corps Cyberspace Command (MARFORCYBER) U.S. Marshals Serv ice (USMS) U.S. National Counter-Intelligence Executive U.S. National Cyber Response Coordination Group (NCRCG) U.S. National Cyber Security Center U.S. National Cyber Security Division U.S. National Cyber Security Center of Excellence (NCCoE) U.S. National Geospatial-Intelligence Agency U.S. National Institute of Standards and Technology (NIST) U.S. National Oceanic and Atmospheric Administration (NOAA) U.S. National Protection and Programs Directorate (NPPD) U.S. National Protections and Programs Directorate (NPPD) U.S. National Reconnaissance Office (NRO) U.S. National Security Agency (NSA) U.S. Naval Academy U.S. Naval Information Operations Command (NIOC) U.S. Naval Network Warfare Command (NNWC) U.S. Naval Supply Systems Command (NAVSUP) U.S. Navy (USN) U.S. Navy Command U.S. Navy Cyber Defense Operations Command (NCDOC) U.S. NESCO U.S. Network Enterprise Technology Command (NETCOM) U.S. NOAA Computer Incident R esponse Team (N-CIRT) U.S. NOAA Enterprise Security Services U.S. NOAA Security Operations Center U.S. Office of Cyber Security & Communication U.S. Office of Management and Budget U.S. Office of Naval Research U.S. Office of Personnel Management U.S. Office of the Chief Information Officer (OCIO) U.S. Office of the Director of Administration and Management U.S. Office of the Secretary of Defense (SECDEF) U.S. Postal Service U.S. Secret Service U.S. Securities & Exchange Commission U.S. SOUTHCOM's Joint Task Force-Bravo (JTF-B) U.S. Southern Command (SOUTHCOM) U.S. Space and Naval Warfare Systems Center Pacific (SSC Pacific) U.S. SSC Pacific Training Development Support Center U.S. Strategic Command (USSTRATCOM) U.S. Transport Security Administration (TSA) U.S. VA Office of Information & Technology UAE Computer Emergency Response Team (CERT) UAE Ministry of Interior UAE Telecommunications Regulatory Author ity Ukrainian Berkut University of Arizona University of California at Davies University of California Riverside University of California, San Diego University of Illinois at Urbana-Champaign University of Maryland University of Minnesota University of New South Wales University of Southern California Information Sciences Institute University of Washington US Navy & Space & Naval Warfare Systems Center Atlantic USMC Cryptological Support Battalion Wikileaks William and Flora Hewlett Foundation Xian Jiaotong University ------------------------------------------------------------ |
Pricing Single User License: Single user copies of this report are available for GBP1799 Departmental License: Entitles up to 5 individual users to access this report for GBP2999 (Not suitable for library usage) Site License: Allow your company to have access to this report at one location for GBP4999 (Suitable for library storage and use) Global License: Have your whole company worldwide to access this information for GBP6999 ----------------------------------------------------------- - |
Ordering All you need to do to order this report is to contact Lorenzo Tacchio on: Telephone: +44(0)207 549 9952 or email: lorenzo.tacchio@vgtelecomreports.com And provide the following information: Report Title: Report License (Single User/Departmental/Site/Global): Name: User Email: Job Title: Company: Invoice Address: Telephone and Fax number: EEC VAT Number (only for E.U.): Please contact me should you have any questions or wish to receive an executive summary of this report. I look forward to hearing from you. Best Regards, Lorenzo Tacchio Telecoms Industry Consultant |
Terms and Conditions By replying to this e-mail submitting your order for this product you have agreed without limitation or qualification to be bound by and to comply with these Terms and Conditions. You agree that you will not fail to complete any transaction after submitting an order to purchase a product or submit any order to purchase a product where you do not intend to complete the transaction. Management Reports will only be sent on receipt of payment. You are currently subscribed to this list as ali.ali-an@yandex.by . As a valued contact or customer, you are receiving this email with information that we believe will be relevant to you. If however, you wish to stop future m essages, please reply to this email typing "REMOVE" in the subject box. Registered Office: BSG House, 230 City Road, London, EC1V 2QY, U.K. |
Отправить комментарий