Report - Enterprise Endpoint Cyber Security Market Report 2015-2020
Enterprise Endpoint Cyber Security Market Report 2015-2020 Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response Cyber Report Publication date: 4th Dec 2015 Number of Pages: 286 ------------------------------------------------------------ |
This new report offers comprehensive analysis of Enterprise Endpoint Cyber Security solutions and related companies. Visiongain assesses that the Enterprise Endpoint Cyber Security market will reach $4.98bn in 2015. Questions will be answered such as: How is the Enterprise Endpoint Cyber Security market evolving? What is driving and restraining Enterprise Endpoint Cyber Security market dynamics? How will each Enterprise Endpoint Cyber Security submarket segment grow over the forecast period and how much revenue will these submarkets account for in 2020? How will market shares of each Enterprise Endpoint Cyber Security submarket develop from 2015-2020? Which individual technologies will prevail and how these shifts are responded to? Which Enterprise Endpoint Cyber Security submarket will be the main driver of the overall market? How will political and regulatory factors influence regional Enterprise Endpoint Cyber Security markets and submarkets? Will leading national Enterprise Endpoint Cyber Security markets broadly follow macroeconomic dynamics, or will individual country sectors outperform the rest of the economy? How will market shares of regional markets change by 2020, and which regions will lead the market in 2020? Who are the leading players and what are their prospects over the forecast period? How will the sector evolve as alliances form during the period between 2015 and 2020? Why order th e Enterprise Endpoint Cyber Security Market Report 2015-2020?:
- Cisco
Keep updated with the latest knowledge of the Cyber Security market. Reinforces strategic decision-making made within your business operations. Learn how to exploit new technological trends and patterns. Realise your company's full potential within the market Become equipped with substantial knowledge of the competitive landscape of enterprises shifting towards the dynamic Cyber sector. Order our report - Enterprise Endpoint Cyber Security Market Report 2015-2020: Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response ------------ ------------------------------------------------ |
Table of Contents 1. Report Overview 1.1 Global Enterprise Endpoint Security Market Overview 1.2 Global Enterprise Endpoint Security Market Segmentation 1.3 Why You Should Read This Report 1.4 How This Report Delivers 1.5 Key Questions Answered by This Analytical Report Include: 1.6 Who is This Report For? 1.7 Methodology 1.7.1 Primary Research 1.7.2 Secondary Research 1.7.3 Market Evaluation & Forecasting Methodology 1.8 Frequently Asked Questions (FAQ) 1.9 Associated Visiongain Reports 1.10 About Visiongain 2. Introduction to the Enterprise Endpoint Security Market 2.1 Global Enterprise Endpoint Security Market Structure 2.2 Enterprise Endpoint Security Market Landscape 2.2.1 Enterprise Endpoint Security Market Definition 2.2.2 The Increasing Importance of Endpoint Security 2.2.3 The Global Cyber Threats to Enterprises 2.2.4 Most Common Methods of Cyber Attacks 2.2.5 Main Objectives of Cyber Attackers 2.2.6 Most Important Mechanisms of Cyber Attacks 2.2.7 Stage of Cyber Attacks 3. Global Enterprise Endpoint Security Market 2015-2020 3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020 3.2 Global Enterprise Endpoint Security Drivers & Restraints 2015 3.2.1 Global Enterprise Endpoint Security Market Drivers 2015 3.2.1.1 The Sophistication of Threats towards Endpoints 3.2.1.2 The Changes in Communicating 3.2.1.3 The Evolution of Business Operating 3.2.1.3.1 Cloudification 3.2.1.3.2 Mobility 3.2.1.3.3 BYOD 3.2.1.4 The Explosion of New Internet-Connected Devices 3.2.2 Glob al Enterprise Endpoint Security Market Restraints 2015 3.2.2.1 The Costs 3.2.2.2 The Underestimated Threats 3.2.2.3 The Customer Confusion 4. Global Enterprise Endpoint Security Submarket 2015-2025 4.1 Analysis of the Enterprise Endpoint Security Market through its Technologies 4.1.1 Antimalware 4.1.1.1 Signature-Based Detection 4.1.1.2 Heuristics Detection 4.1.1.3 Data Mining Detection 4.1.2 Firewall 4.1.2.1 Packet-Filter firewalls 4.1.2.2 Stateful firewall 4.1.2.3 Application-layer firewalls 4.1.2.4 Proxy Firewalls 4.1.2.5 Next Generation Firewalls 4.1.3 Intrusion Detection System 4.1.3.1 Host-Based Intrusion Detection System 4.1.3.2 Network-Based Intrusion Detection System 4.1.4 Intrusion Prevention System 4.1.5 Encryption 4.1.5.1 Symmetric Encryption 4.1.5.2 Asymmetric Encryption 4.1.6 Configuration Management 4.1.7 Mobile Device Management 4.1.8 Data Loss Prevention 4.1.9 Application Contro l 4.1.10 Computer Intrusion Detector 4.2 Analysis of the Enterprise Endpoint Security Market through its Solutions 4.2.1 Endpoint Protection Definition 4.2.2 Endpoint Detection and Response Definition 4.2.3 Next Generation Endpoint Security Definition 4.3 Enterprise Endpoint Security Submarket Analysis 5. Regional Enterprise Endpoint Security Market Forecast 2015-2020 5.1 Regional Enterprise Endpoint Security Market Share Forecast 2015-2020 5.2 Asia-Pacific Enterprise Endpoint Security Market Forecast 2015-2020 5.2.1 Asia-Pacific Enterprise Endpoint Security Market Analysis 5.2.1.1 Asia-Pacific Economic Overview 5.2.1.2 Asia-Pacific Digital Penetration Overview 5.2.1.3 Asia-Pacific Cyber Attacks Overview 5.2.1.4 The Enterprise Endpoint Security Market in Asia-Pacific 5.2.2 Asia-Pacific Enterprise Endpoint Security Market Drivers & Restraints 5.3 Europe Enterprise Endpoint Security Market Forecast 2015-2020 5.3.1 Europ ean Enterprise Endpoint Security Market Analysis 5.3.1.1 European Economic Overview 5.3.1.2 European Digital Penetration Overview 5.3.1.3 European Cyber Attacks Overview 5.3.1.4 The Enterprise Endpoint Security Market in Europe 5.3.2 European Enterprise Endpoint Security Market Drivers & Restraints 5.4 Latin America Enterprise Endpoint Security Market Forecast 2015-2020 5.4.1 Latin America Enterprise Endpoint Security Market Analysis 5.4.1.1 Latin America Economy Overview 5.4.1.2 Latin America Digital Penetration Overview 5.4.1.3 Latin America Cyber Attacks Overview 5.4.1.4 The Enterprise Endpoint Security Market in Latin America 5.4.2 Latin America Enterprise Endpoint Security Market Drivers & Restraints 5.5 Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 5.5.1 Middle-East & Africa Enterprise Endpoint Security Market Analysis 5.5.1.1 Middle-East & Africa Economic Overview 5.5.1.2 Middle- East & Africa Digital Penetration Overview 5.5.1.3 Middle-East & Africa Cyber Attacks Overview 5.5.1.4 The Enterprise Endpoint Security Market in the Middle-East and Africa 5.5.2 Middle East & Africa Enterprise Endpoint Security Market Drivers & Restraints 5.6 North America Enterprise Endpoint Security Market Forecast 2015-2020 5.6.1 North America Enterprise Endpoint Security Market Analysis 5.6.1.1 North America Economy Overview 5.6.1.2 North America Digital Penetration Overview 5.6.1.3 North America Cyber Attacks Overview 5.6.1.4 The Enterprise Endpoint Security Market in the North American 5.6.2 North America Enterprise Endpoint Security Market Drivers & Restraints 6. SWOT Analysis of the Enterprise Endpoint Security Market 2015-2020 7. Expert Opinion 7.1 Michael Applebaum, Vice President of Marketing, Invincea 7.1.1 View of Invincea on the Endpoint Security Market 7.2 Todd Weller, Vice Preside nt of Corporate Development & Marketing, Hexis Cyber Solutions 7.2.1 Hexis Cyber Solutions' view on the Endpoint Security Market 7.2.2 Presence of Hexis Cyber Solutions in the Endpoint Security Market 7.3 Raj Samani, Vice President, Chief Technology Officer, Intel Security 7.3.1 Intel Security's view on the Endpoint Security Market 7.3.2 Presence of Intel Security in the Endpoint Security Market 8. Leading 13 Enterprise Endpoint Security Companies 8.1 Leading 13 Enterprise Endpoint Security Companies Revenue Share Analysis 2015 8.2 Cisco 8.2.1 Cisco Total Company Sales 2008-2015 8.2.2 Cisco Net Profit 2010-2015 8.2.3 Cisco Capital Expenditure 2012-2015 8.2.4 Cisco Cost of Research & Development 2010-2015 8.2.5 Cisco Sales by Segment of Business 2010-2015 8.2.6 Cisco Regional Emphasis / Focus 8.2.7 Cisco Organisational Structure / Subsidiaries / Number of Employees 8.2.8 Cisco Mergers & Acquisitions (M&A) Acti vity 8.2.9 Cisco's Role in the Enterprise Endpoint Security Market 8.3 EMC 8.3.1 EMC Total Company Sales 2008-2014 8.3.2 EMC Net Profit 2010-2014 8.3.3 EMC Capital Expenditure 2010-2014 8.3.4 EMC Cost of Research & Development 2010-2014 8.3.5 EMC Sales by Segment of Business 2010-2014 8.3.6 EMC Regional Emphasis / Focus 8.3.7 EMC Organisational Structure / Subsidiaries / Number of Employees 8.3.8 EMC Mergers & Acquisitions (M&A) Activity 8.3.9 EMC's Role in the Enterprise Endpoint Security Market 8.4 ESET 8.4.1 ESET Total Company Sales 2013-2015 8.4.2 ESET Regional Emphasis / Focus 8.4.3 ESET Mergers & Acquisitions (M&A) Activity 8.4.4 ESET's Role in the Enterprise Endpoint Security Market 8.5 FireEye, Inc. 8.5.1 FireEye Total Company Sales 2009-2014 8.5.2 FireEye Net Loss 2010-2014 8.5.3 FireEye Cost of Research & Development 2010-2014 8.5.4 FireEye Sales by Segment of Business 2009-2014 8.5.6 FireEye Regional Emphasis / Focus 8.5.7 FireEye Organisational Structure / Subsidiaries / Number of Employees 8.5.8 FireEye Mergers & Acquisitions (M&A) Activity 8.5.9 FireEye's Role in the Enterprise Endpoint Security Market 8.6 Intel Corporation 8.6.1 Intel Corporation Total Company Sales 2008-2014 8.6.2 Intel Corporation Net Profit 2010-2014 8.6.3 Intel Corporation Capital Expenditure 2009-2013 8.6.4 Intel Corporation Cost of Research & Development 2010-2014 8.6.5 Intel Corporation Sales by Segment of Business 2010-2014 8.6.6 Intel Corporation Regional Emphasis / Focus 8.6.7 Intel Corporation Organisational Structure / Subsidiaries / Number of Employees 8.6.8 Intel Corporation Mergers & Acquisitions (M&A) Activity 8.6.9 Intel Corporation's Role in the Enterprise Endpoint Security Market 8.7 International Business Machines (IBM) Corporation 8.7.1 IBM Total Company Sales 2008-2014 8.7.2 IBM Net Profit 2010-2014 8.7.3 IBM Capital Expenditure 2008-2014 8.7.4 IBM Cost of Research & Development 2010-2014 8.7.5 IBM Sales by Segment of Business 2010-2014 8.7.6 IBM Regional Emphasis / Focus 8.7.7 IBM Organisational Structure / Subsidiaries / Number of Employees 8.7.8 IBM Mergers & Acquisitions (M&A) Activity 8.7.9 IBM's Role in the Enterprise Endpoint Security Market 8.8 Kaspersky Lab 8.8.1 Kaspersky Lab Total Company Sales 2008-2014 8.8.2 Kaspersky Lab Regional Emphasis / Focus 8.8.3 Kaspersky Lab Organisational Structure / Subsidiaries 8.8.4 Kaspersky Lab Mergers & Acquisitions (M&A) Activity 8.8.5 Kaspersky's Role in the Enterprise Endpoint Security Market 8.9 Microsoft Corporation 8.9.1 Microsoft Total Company Sales 2008-2015 8.9.2 Microsoft Net Profit 2010-2015 8.9.3 Microsoft Cost of Research & Development 2010-2015 8.9.4 Microsoft Sales by Segment of Business 2012-2014 8.9.5 Microsoft Regional Emphasis / Focus8.9.6 Microsoft Organisational Structure / Subsidiaries / Number of Employees 8.9.7 Microsoft Mergers & Acquisitions (M&A) Activity 8.9.8 Microsoft's Role in the Enterprise Endpoint Security Market 8.10 Palo Alto Networks 8.10.1 Palo Alto Networks Total Company Sales 2008-2015 8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015 8.10.3 Palo Alto Networks Capital Expenditure 2010-2012 8.10.4 Palo Alto Networks Cost of Research & Development 2010-2015 8.10.5 Palo Alto Networks Sales by Segment of Business 2010-2015 8.10.6 Palo Alto Networks Regional Emphasis / Focus 8.10.7 Palo Alto Networks Organisational Structure / Subsidiaries / Number of Employees 8.10.8 Palo Alto Networks Mergers & Acquisitions (M&A) Activity 8.10.9 Palo Alto Networks' Role in the Enterprise Endpoint Security Market 8.11 Raytheon 8.11.1 Raytheon Total Company Sales 2005-2014 8.11.2 Raytheon Net Profit 2005-2014 8.11.3 Raytheon Capital Expenditu re 2005-2014 8.11.4 Raytheon Cost of Research & Development 2010-2014 8.11.5 Raytheon Sales by Segment of Business 2008-2014 8.11.6 Raytheon Regional Emphasis / Focus 8.11.7 Raytheon Organisational Structure / Subsidiaries / Number of Employees 8.11.8 Raytheon Mergers & Acquisitions (M&A) Activity 8.11.9 Raytheon's Role in the Enterprise Endpoint Security Market 8.12 Sophos 8.12.1 Sophos Total Company Sales 2013-2015 8.12.2 Sophos Net Loss 2013-2015 8.12.3 Sophos Capital Expenditure 2013-2015 8.12.4 Sophos Cost of Research & Development 2013-2015 8.12.5 Sophos Sales by Segment of Business 2013-2015 8.12.6 Sophos Regional Emphasis / Focus 8.12.7 Sophos Organisational Structure / Subsidiaries / Number of Employees 8.12.8 Sophos Mergers & Acquisitions (M&A) Activity 8.12.9 Sophos' Role in the Enterprise Endpoint Security Market 8.13 Symantec Corporation 8.13 1 Symantec Total Company Sales 2008-2015 8.13.2 Symantec Net Profit 2010-2015 8.13.3 Symantec Capital Expenditure 2008-2015 8.13.4 Symantec Cost of Research & Development 2010-2015 8.13.5 Symantec Sales by Segment of Business 2014-2015 8.13.6 Symantec Regional Emphasis / Focus 8.13.7 Symantec Organisational Structure / Subsidiaries / Number of Employees 8.13.8 Symantec Mergers & Acquisitions (M&A) Activity 8.13.9 Symantec's Role in the Enterprise Endpoint Security Market 8.14 Trend Micro 8.14.1 Trend Micro Total Company Sales 2008-2014 8.14.2 Trend Micro Net Profit 2010-2014 8.14.3 Trend Micro Cost of Research & Development 2011-2014 8.14.4 Trend Micro Regional Emphasis / Focus 8.14.5 Trend Micro Organisational Structure / Subsidiaries 8.14.6 Trend Micro Mergers & Acquisitions (M&A) Activity 8.14.7 Trend Micro's Role in the Enterprise Endpoint Security Market 9. Conclusions and Recommendations 9.1 Enterprise Endpoint Security Conclusion 9.2 E nterprise Endpoint Security Recommendations 10. Glossary ------------------------------------------------------------ |
List of Tables 2015-2020 (US$m, AGR%, Cumulative) Table 1.2 Example of Leading National Enterprise Endpoint Security Market Forecast by Submarket 2015-2020 (US$m, AGR%, Cumulative) Table 2.1 Methods of Cyber Attacks (Type, Description) Table 2.2 Objectives of Cyber Attackers (Type, Description) Table 2.3 Mechanisms of Cyber Attacks (Type, Description) Table 3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative) Table 5.1 Regional Enterprise Endpoint Security Market Overview (GDP Growth %, Internet Users m, Internet Penetration %, Smartphone Penetration %) Table 5.2 Regional Enterprise Endpoint Security Market Forecast 2015-2020 (Sales US$m, AGR%, Cumulative) Table 5.3 Regional Enterprise Endpoint Security Market CAGR Forecast 2015-2020 (CAGR%) Table 5.4 Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change) Table 5.5 Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative) Table 5.6 Asia-Pacific Major Cyber Attacks 2006-2015 (Attack, Country, Description) Table 5.7 Asia-Pacific Enterprise Endpoint Security Market Drivers & Restraints 2015 Table 5.8 Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative) Table 5.9 Europe Major Cyber Attacks 2007-2015 (Attacks Country, Description) Table 5.10 European Enterprise Endpoint Security M arket Drivers & Restraints 2015 Table 5.11 Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative) Table 5.12 Latin America Major Cyber Attacks 2010-2014 (Attack, Country, Description) Table 5.13 Latin America Enterprise Endpoint Security Market Drivers & Restraints 2015 Table 5.14 Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative) Table 5.15 Middle East and Africa Major Cyber Attacks 2010-2015 (Attack, Country, Description) Table 5.16 Latin America Enterprise Endpoint Security Market Drivers & Restraints 2015 Table 5.17 North America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative) Table 5.18 North America Major Cyber Attacks 2005-2015 (Attack, Country, Description) Table 5.19 North America Enterprise Endpoint Security Market Drivers & Restraints 2015 Table 6.1 Global Enterprise Endpoint Secu rity Market SWOT Analysis 2015-2020 Table 8.1 Leading 15 Enterprise Endpoint Security Companies Sales Share 2015 (Rank, Company, Total Company Sales US$m, Sales in the Market US$m, Share of Total Company Sales from Sales in the Market %, Share of the Global Market %, Primary Market Specialisation) Table 8.2 Cisco Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.2.1 Cisco Total Company Sales 2008-2015 ($m, AGR %) Table 8.2.2 Cisco Net Profit 2010-2015 (US$m, AGR%) Table 8.2.3 Cisco Capital Expenditure 2012-2015 (US$m, AGR%) Table 8.2.4 Cisco Cost of Research & Development 2010-2015 (US$m, AGR%) Table 8.2.5 Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%) Table 8.2.6 Cisco Sales by Geographical Location 2010-2015 (US$m, AGR%) Table 8.2.7 Cisco P rimary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.2.8 Cisco Number of Employees 2012-2015 (No. of Employees, AGR%) Table 8.2.9 Cisco Recent Acquisitions 2013-2015 (Date, Details) Table 8.3 EMC Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, Submarket Involvement, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.3.1 EMC Total Company Sales 2008-2014 ($m, AGR %) Table 8.3.2 EMC Net Profit 2010-2014 (US$m, AGR%) Table 8.3.3 EMC Capital Expenditure 2010-2014 (US$m, AGR%) Table 8.3.4 EMC Cost of Research & Development 2010-2014 (US$m, AGR%) Table 8.3.5 EMC Sales by Segment of Business 2010-2014 (US$m, AGR%) Table 8.3.6 EMC Sales by Geographical Location 2008-2014 (US$m, AGR%) Table 8.3.7 EMC Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.3 .8 EMC Number of Employees 2010-2014 (No. of Employees, AGR%) Table 8.3.9 EMC Recent Acquisitions 2004-2015 (Date, Details) Table 8.3.10 EMC Divestitures 2015 (Date, Details) Table 8.3.11 EMC Mergers/Partnerships 2015 (Date, Details) Table 8.4 ESET Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, No. of Employees, Website) Table 8.4.1 ESET Total Company Sales 2013-2015 ($m, AGR %) Table 8.4.2 ESET International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.4.3 ESET Acquisition 2015 (Date, Details) Table 8.5 FireEye Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.5.1 FireEye Total Company Sales 2009-2014 ($m, AGR %) Table 8.5.2 FireEye Net Loss 2010-2014 (US$m, AGR%) T able 8.5.3 FireEye Cost of Research & Development 2010-2014 (US$m, AGR%) Table 8.5.4 FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%) Table 8.5.5 FireEye Sales by Geographical Location 2011-2014 (US$m, AGR%) Table 8.5.6 FireEye Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.5.7 FireEye Number of Employees 2011-2014 (No. of Employees, AGR%) Table 8.5.8 FireEye Recent Acquisitions 2013-2014 (date, Details) Table 8.6 Intel Corporation Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, Ticker, Website) Table 8.6.1 Intel Corporation Total Company Sales 2008-2014 ($m, AGR %) Table 8.6.2 Intel Corporation Net Profit 2010-2014 (US$m, AGR%) Table 8.6.3 Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%) Table 8.6.4 Intel Corporation Cost of Rese arch & Development 2010-2014 (US$m, AGR%) Table 8.6.5 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%) Table 8.6.6 Intel Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%) Table 8.6.7 Intel Corporation Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.6.8 Intel Corporation Number of Employees 2010-2014 (No. of Employees, AGR%) Table 8.6.9 Intel Corporation Recent Acquisitions 2007-2015 (Date, Details) Table 8.6.10 Intel Corporation Divestiture 2015 (Date, Details) Table 8.7 IBM Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.7.1 IBM Total Company Sales 2008-2014 ($m, AGR %) Table 8.7.2 IBM Net Profit 2010-2014 (US$m, AGR%) Table 8.7.3 IBM Capital Expenditure 2008-2014 (US$m, AGR%) Table 8.7.4 IBM Cost of Research & Development 2010-2014 (US$m, AGR%) Table 8.7.5 IBM Sales by Segment of Business 2010-2014 (US$m, AGR%) Table 8.7.6 IBM Sales by Geographical Location 2010-2014 (US$m, AGR%) Table 8.7.7 IBM Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.7.8 IBM Number of Employees 2010-2014 (No. of Employees, AGR%) Table 8.7.9 IBM Recent Acquisitions 2013-2015 (Date, Details) Table 8.7.10 IBM Recent Divestiture 2014 (Date, Details) Table 8.8 Kaspersky Lab Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, Website) Table 8.8.1 Kaspersky Lab Total Company Sales 2008-2014 ($m, AGR %) Table 8.8.2 Kaspersky Lab Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.8.3 Kaspersky Lab Acquisitions 2005-2012 (Date, Details) Table 8.8.4 Kaspersky Lab Divestiture 2011 (Date, Details) Table 8.9 Microsoft Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.9.1 Microsoft Total Company Sales 2008-2015 ($m, AGR %) Table 8.9.2 Microsoft Net Profit 2010-2015 (US$m, AGR%) Table 8.9.3 Microsoft Cost of Research & Development 2010-2015 (US$m, AGR%) Table 8.9.4 Microsoft Sales by Segment of Business 2012-2014 (US$m, AGR%) Table 8.9.5 Microsoft Sales by Geographical Location 2008-2015 (US$m, AGR%) Table 8.9.6 Microsoft Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.9.7 Microsoft Number of Employees 2010-2015 (No. of Employees, AGR%) Table 8.9.8 Microsoft Acquisitions 2014-2015 (Date, Details) Table 8.9.9 Microsoft M&A Activity Divestitures 2014-2015 (Date, Details) Table 8.10 Palo Alto Networks Profile 2015 (CEO, Total Company Sales US$ m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.10.1 Palo Alto Networks Total Company Sales 2008-2015 ($m, AGR %) Table 8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015 (US$m) Table 8.10.3 Palo Alto Networks Capital Expenditure 2010-2012 (US$m, AGR%) Table 8.10.4 Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR%) Table 8.10.5 Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%) Table 8.10.6 Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, AGR%) Table 8.10.7 Palo Alto Networks Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.10.8 Palo Alto Networks Number of Employees 2012-2015 (No. of Employees, AGR%) Table 8.10.9 Palo Alto Networks Recent Acquisitions 2014-2015 (Date, Details) Table 8.11 Raytheon Pr ofile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.11.1 Raytheon Total Company Sales 2005-2014 ($m, AGR %) Table 8.11.2 Raytheon Net Profit 2005-2014 (US$m, AGR%) Table 8.11.3 Raytheon Capital Expenditure 2005-2014 (US$m, AGR%) Table 8.11.4 Raytheon Cost of Research & Development 2010-2014 (US$m, AGR%) Table 8.11.5 Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%) Table 8.11.6 Raytheon Sales by Geographical Location 2008-2014 (US$m, AGR%) Table 8.11.7 Raytheon Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.11.8 Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%) Table 8.11.9 Raytheon Company Recent Acquisitions 2010-2013 (Date, Details) Table 8.11.10 Raytheon Company Partnerships 2001-2013 (Date, De tails) Table 8.12 Sophos Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.12.1 Sophos Total Company Sales 2013-2015 ($m, AGR %) Table 8.12.2 Sophos Net Loss 2013-2015 (US$m, AGR%) Table 8.12.3 Sophos Capital Expenditure 2013-2015 (US$m, AGR%) Table 8.12.4 Sophos Cost of Research & Development 2013-2015 (US$m, AGR%) Table 8.12.5 Sophos Sales by Segment of Business 2013-2015 (US$m, AGR%) Table 8.12.6 Sophos Sales by Geographical Location 2013-2015 (US$m, AGR%) Table 8.12.7 Sophos Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.12.8 Sophos Number of Employees 2013-2015 (No. of Employees, AGR%) Table 8.12.9 Sophos Acquisitions 2007-2014 (Date, Details) Table 8.12.10 Sophos Divestiture 2006-2010 (Date, Details) Table 8.13 Symantec Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website) Table 8.13.1 Symantec Total Company Sales 2008-2015 ($m, AGR %) Table 8.13.2 Symantec Net Profit 2010-2015 (US$m, AGR%) Table 8.13.3 Symantec Capital Expenditure 2008-2015 (US$m, AGR%) Table 8.13.4 Symantec Cost of Research & Development 2010-2015 (US$m, AGR%) Table 8.13.5 Symantec Sales by Segment of Business 2014-2015 (US$m, AGR%) Table 8.13.6 Symantec Sales by Geographical Location 2008-2015 (US$m, AGR%) Table 8.13.7 Symantec Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.13.8 Symantec Number of Employees 2010-2015 (No. of Employees, AGR%) Table 8.13.9 Symantec Recent Acquisitions 2000-2015 (Date, Details) Table 8.13.10 Symantec Divestitures 2015 (Date, Details ) Table 8.13.11 Symantec Mergers 2004 (Date, Details) Table 8.14 Trend Micro Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, IR Contact, Ticker, Website) Table 8.14.1 Trend Micro Total Company Sales 2008-2014 ($m, AGR %) Table 8.14.2 Trend Micro Net Profit 2010-2014 (US$m, AGR%) Table 8.14.3 Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR%) Table 8.14.4 Trend Micro Sales by Geographical Location 2008-2014 (US$m, AGR%) Table 8.14.5 Trend Micro Primary International Subsidiaries 2015 (Region, Subsidiary, Location) Table 8.14.6 Trend Micro Recent Acquisitions 2008-2015 (Date, Details) Table 8.14.7 Trend Micro Divestitures 2015 (Date, Details) ------------------------------------------------------------ |
List of Figures Figure 1.1 Global Enterprise Endpoint Security Market Segmentation Overview Figure 1.2 Example of Enterprise Endpoint Security Market by Regional Market Share Forecast 2015, 2020 (% Share) Figure 1.3 Example Regional vs. Global Enterprise Endpoint Security Market CAGR Forecast 2015, 2020, 2015-2020 (CAGR%) Figure 1.4 Example of Regional Enterprise Endpoint Security Market by Submarket Forecast 2015-2020 (US$m, AGR %) Figure 2.1 Global Enterprise Endpoint Security Market Segmentation Overview Figure 2.2 Share of Global Cyber Threats to Enterprises by the Type of Attacker 2014 (%Share) Figure 2.3 Common Stages of Cyber Attacks Figure 3.1 Global Enterprise Endpoint Security Market Fo recast 2015-2020 (US$m, AGR%) Figure 4.1 Functions of Endpoint Security Technologies Figure 5.1 Enterprise Endpoint Security Regional Coverage Figure 5.2 Regional Enterprise Endpoint Security Market Share Forecast 2015 (% Share) Figure 5.3 Regional Enterprise Endpoint Security Market Share Forecast 2020 (% Share) Figure 5.4 Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change) Figure 5.5 Regional Enterprise Endpoint Security Market Cumulative Sales 2015-2020 ($US$m) Figure 5.6 Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Asia Pacific Market Sales AGR%, Global Market Sales AGR %) Figure 5.7 Asia Pacific vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %) Figure 5.8 Asia Pacific vs. Global Digital Penetration Rate 2015 (%) Figure 5.9 Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Europe Market Sales AGR%, Global Market Sales AGR %) Figure 5.10 Europe vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %) Figure 5.11 Europe vs. Global Digital Penetration Rate 2015 (%) Figure 5.12 Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Latin America Market Sales AGR%, Global Market Sales AGR %) Figure 5.13 Latin America vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %) Figure 5.14 Latin America vs. Global Digital Penetration Rate 2015 (%) Figure 5.15 Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Middle-East & Africa Market Sales AGR%, Global Market Sales AGR %) Figure 5.16 Middle East & Africa vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %) Figure 5.17 Middle East & Africa vs. Global Digital Penetration Rate 2015 (%) Figure 5.18 North America Enterp rise Endpoint Security Market Forecast 2015-2020 (US$m, North America Market Sales AGR%, Global Market Sales AGR %) Figure 5.19 North America vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %) Figure 5.20 North America vs. Global Digital Penetration Rate 2015 (%) Figure 8.1 Leading 13 Enterprise Endpoint Security Companies Total Sales 2014 ($US$m ) Figure 8.2 Leading 13 Enterprise Endpoint Security Companies Share of the Market 2014 (% Share) Figure 8.2.1 Cisco Total Company Sales 2008-2015 (US$m, AGR%) Figure 8.2.2 Cisco Net Profit 2010-2015 (US$m, AGR%) Figure 8.2.3 Cisco Capital Expenditure 2012-2015 (US$m, AGR%) Figure 8.2.4 Cisco Cost of Research & Development 2010-2015 (US$m, AGR%) Figure 8.2.5 Cisco Sales by Segment of Business 2011-2015 (US$m, AGR%) Figure 8.2.6 Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%) Figure 8.2.7 Cisco Primary International Operations 2015 Figure 8.2.8 Cisco Sales AGR by Geographical Location 2011-2015 (%) Figure 8.2.9 Cisco Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR%) Figure 8.2.10 Cisco Organisational Structure 2015 Figure 8.2.11 Cisco Number of Employees 2012-2015 (No. of Employees, AGR%) Figure 8.3.1 EMC Total Company Sales 2008-2014 (US$m, AGR%) Figure 8.3.2 EMC Net Profit 2010-2014 (US$m, AGR%) Figure 8.3.3 EMC Capital Expenditure 2010-2014 (US$m, AGR%) Figure 8.3.4 EMC Cost of Research & Development 2010-2014 (US$m, AGR%) Figure 8.3.5 EMC Sales AGR by Segment of Business 2011-2014 (AGR%) Figure 8.3.6 EMC Sales by Segment of Business 2010-2014 (US$m, AGR%) Figure 8.3.7 EMC Primary International Operations 2015 Figure 8.3.8 EMC Sales AGR by Geographical Location 2009-2014 (AGR%) Figure 8.3.9 EMC Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%) Figure 8.3.10 EMC Organisational Structure 2015 Figure 8.3.11 EMC Number of Employee s 2010-2014 (No of Employees, AGR%) Figure 8.4.1 ESET Total Company Sales 2013-2015 (US$m) Figure 8.4.2 ESET Primary International Operations 2015 Figure 8.5.1 FireEye Total Company Sales 2009-2014 (US$m, AGR%) Figure 8.5.2 FireEye Net Loss 2010-2014 (US$m, AGR%) Figure 8.5.3 FireEye Cost of Research & Development 2010-2014 (US$m, AGR%) Figure 8.5.4 FireEye Sales AGR by Segment of Business 2010-2014 (AGR%) Figure 8.5.5 FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%) Figure 8.5.6 FireEye Primary International Operations 2015 Figure 8.5.7 FireEye Sales AGR by Geographical Location 2012-2014 (AGR%) Figure 8.5.8 FireEye Sales by Geographical Location 2011-2014 (US$m, Total Company Sales AGR%) Figure 8.5.9 FireEye Organisational Structure 2015 Figure 8.5.10 FireEye Number of Employees 2011-2014 (No of Employees, AGR%) Figure 8.6.1 Intel Corporation Total Company Sales 2008-2014 (US$m, AGR%) Figure 8.6.2 Intel Corporation Net Profi t 2010-2014 (US$m, AGR%) Figure 8.6.3 Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%) Figure 8.6.4 Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR%) Figure 8.6.5 Intel Corporation Sales AGR by Segment of Business 2011-2014 (AGR%) Figure 8.6.6 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%) Figure 8.6.7 Intel Corporation Primary International Operations 2015 Figure 8.6.8 Intel Corporation Sales AGR by Geographical Location 2011-2014 (AGR%) Figure 8.6.9 Intel Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%) Figure 8.6.10 Intel Corporation Organisational Structure 2015 Figure 8.6.11 Intel Corporation Number of Employees 2010-2014 (No of Employees, AGR%) Figure 8.7.1 IBM Total Company Sales 2008-2014 (US$m, AGR%) Figure 8.7.2 IBM Net Profit 2010-2014 (US$m, AGR%) Figure 8.7.3 IBM Capital Expenditure 2008-2014 (US$m, AGR%) Figure 8.7.4 IBM Cost of Resea rch & Development 2010-2014 (US$m, AGR%) Figure 8.7.5 IBM Sales AGR by Segment of Business 2011-2014 (AGR%) Figure 8.7.6 IBM Sales by Segment of Business 2010-2014 (AGR%) Figure 8.7.7 IBM Primary International Operations 2015 Figure 8.7.8 IBM Sales AGR by Geographical Location 2011-2014 (AGR%) Figure 8.7.9 IBM Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%) Figure 8.7.10 IBM Organisational Structure 2015 Figure 8.7.11 IBM Number of Employees 2010-2014 (No Of Employees, AGR%) Figure 8.8.1 Kaspersky Lab Total Company Sales 2008-2014 (US$m, AGR%) Figure 8.8.2 Kaspersky Lab Primary International Operations 2015 Figure 8.8.3 Kaspersky Lab Organisational Structure 2015 Figure 8.9.1 Microsoft Total Company Sales 2008-2015 (US$m, AGR%) Figure 8.9.2 Microsoft Net Profit 2010-2015 (US$m, AGR%) Figure 8.9.3 Microsoft Cost of Research & Development 2010-2015 (US$m, AGR%) Figure 8.9.4 Microsoft Sales AGR by Segment of Bu siness 2013-2015 (AGR%) Figure 8.9.5 Microsoft Sales by Segment of Business 2012-2015 (US$m, AGR%) Figure 8.9.6 Microsoft Primary International Operations 2015 Figure 8.9.7 Microsoft Sales AGR by Geographical Location 2009-2015 (AGR%) Figure 8.9.8 Microsoft Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR%) Figure 8.9.9 Microsoft Organisational Structure 2015 Figure 8.9.10 Microsoft Number of Employees 2010-2015 (No of Employees, AGR%) Figure 8.10.1 Palo Alto Networks Total Company Sales 2008-2015 (US$m, AGR%) Figure 8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015 (US$m) Figure 8.10.3 Palo Alto Networks Capital Expenditure 2010-2012 (US$m) Figure 8.10.4 Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR%) Figure 8.10.5 Palo Alto Networks Sales AGR by Segment of Business 2010-2015 (AGR%) Figure 8.10.6 Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%) Figure 8.10.7 Palo Alto Networks Primary International Operations 2015 Figure 8.10.8 Palo Alto Networks Sales AGR by Geographical Location 2011-2015 (AGR%) Figure 8.10.9 Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR%) Figure 8.10.10 Palo Alto Networks Organisational Structure 2015 Figure 8.10.11 Palo Alto Networks Number of Employees 2012-2015 (No of Employees, AGR%) Figure 8.11.1 Raytheon Total Company Sales 2005-2014 (US$m, AGR%) Figure 8.11.2 Raytheon Net Profit 2005-2014 (US$m, AGR%) Figure 8.11.3 Raytheon Capital Expenditure 2005-2014 (US$m, AGR%) Figure 8.11.4 Raytheon Cost of Research & Development 2010-2014 (US$m, AGR%) Figure 8.11.5 Raytheon Sales AGR by Segment of Business 2009-2014 (AGR%) Figure 8.11.6 Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%) Figure 8.11.7 Raytheon Primary International Operations 2015 Figure 8.11.8 Raytheon Sales AGR by Geographical Location 2009-2014 (%) Figure 8.11.9 Ra ytheon Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%) Figure 8.11.10 Raytheon Organisational Structure 2015 Figure 8.11.11 Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%) Figure 8.12.1 Sophos Total Company Sales 2013-2015 (US$m) Figure 8.12.2 Sophos Net Loss 2013-2015 (US$m) Figure 8.12.3 Sophos Capital Expenditure 2013-2015 (US$m) Figure 8.12.4 Sophos Cost of Research & Development 2013-2015 (US$m) Figure 8.12.5 Sophos Sales by Segment of Business 2013-2015 (US$m) Figure 8.12.6 Sophos Primary International Operations 2015 Figure 8.12.7 Sophos Sales by Geographical Location 2013-2015 (US$m, Total Company Sales) Figure 8.12.8 Sophos Organisational Structure 2015 Figure 8.12.9 Sophos Number of Employees 2013-2015 (No. of Employees) Figure 8.13.1 Symantec Total Company Sales 2008-2015 (US$m, AGR%) Figure 8.13.2 Symantec Net Profit 2010-2015 (US$m, AGR%) Figure 8.13.3 Symantec Capital Expenditure 20 08-2015 (US$m, AGR%) Figure 8.13.4 Symantec Cost of Research & Development 2010-2015 (US$m, AGR%) Figure 8.13.5 Symantec Sales by Segment of Business 2014-2015 (US$m) Figure 8.13.6 Symantec Primary International Operations 2015 Figure 8.13.7 Symantec Sales AGR by Geographical Location 2009-2015 (AGR%) Figure 8.13.8 Symantec Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR%) Figure 8.13.9 Symantec Organisational Structure 2015 Figure 8.13.10 Symantec Number of Employees 2010-2015 (No. of Employees, AGR%) Figure 8.14.1 Trend Micro Total Company Sales 2010-2014 (US$m, AGR%) Figure 8.14.2 Trend Micro Net Profit 2010-2014 (US$m, AGR%) Figure 8.14.3 Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR%) Figure 8.14.4 Trend Micro Primary International Operations 2015 Figure 8.14.5 Trend Micro Sales AGR by Geographical Location 2009-2014 (AGR%) Figure 8.14.6 Trend Micro Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%) Figure 8.14.7 Trend Micro Organisational Structure 2015 ------------------------------------------------------------ |
Companies Mentioned in this report @Stake 4FrontSecurity 6Wunderkinder Acompli ActiveState Actona Technologies Ltd Adallom Adaptivity Adxstudio Inc AffirmTrust Air Command Systems International SAS (ACSI) Airespace Wireless Networks Private Ltd Aironet Canada Inc Aironet Canada Ltd Alchemy API Altera Altiris Inc Amazon Americas HQ Anschutz Japan Co Ltd Anthem Inc AOL Aorato Apax P artners Applied Signal Technology, Inc AppStream Arroyo Video Solutions LLC Ashley Madison AsiaInfo Technologies Aspera Inc Astaro Aveksa Inc AXENT Technologies Inc Baidu Banco IBM SA BarcoNet Pty Ltd Belgacom BigFix Bindview Development Corporation Bit9 + Carbon Black Blackfin Security Blue Box Group Inc BlueStripe Software Boleto Bancário Brightmail Broadware Technologies LLC Broadweb Bromium BT Alex Brown Inc Canada Inc Capptain CBS China Aerospace Science & Industry Corporation (CASIC) CirroSecure Cisco Cisco Albania SHPK Cisco Bahrain (SPC) Cisco Cameroon Ltd Cisco Capital (Dubai) Ltd Cisco Comercio E Servicos De Hardware E Software Do Brasil LTDA Cisco Development India Private Ltd Cisco Do Brasil Ltda Cisco Fast Data LLC Cisco International Ltd Cisco Iris Inc Cisco IronPort Systems LLC Cisco ISH BV Cisco ISH II BV Cisco Linksys Kiss ApS Cisco Malaysia Managed Services Sdn Bhd Cisco Managed Solutions Inc Cisco Media Solutions Inc Cisco MO BV Cisco Photonics Italy Srl Cisco QSTP-LLC Cisco Ravenscourt LLC Cisco RZ LLC (formerly Richard Zeta Intelligence Inc) Cisco SBAIF III Inc Cisco Serbia doo Beograd Cisco Services Malaysia Sdn Bhd Cisco Systems (Argentina) SA Cisco Systems (Bermuda) Holdings Ltd Cisco Systems (Bermuda) Ltd Cisco Systems (China) Information Technology Services Ltd Cisco Systems (China) Networking Technology Co., Ltd. Cisco Systems (China) Research and Development Co., Ltd. Cisco Systems (Colombia) Ltda Cisco Systems (Czech Republic) SRO Cisco Systems (Ethiopia) PLC Cisco Systems (HK) Ltd Cisco Systems (India) Ltd Cisco Systems (India) Prv Ltd Cisco Systems (Italy) Srl Cisco Systems (Jordan) Cisco Systems (Korea) Ltd Cisco Systems (Malaysia) Sdn Bhd Cisco Systems (Nigeria) Ltd Cisco Systems (Puerto Rico) Corp Cisc o Systems (Scotland) Ltd Cisco Systems (Senegal) SUARL Cisco Systems (South Africa) (Proprietary) Ltd Cisco Systems (Spain) SL Cisco Systems (Sweden) AB Cisco Systems (Switzerland) GmbH Cisco Systems (Switzerland) Investments Ltd Cisco Systems (Thailand) Ltd Cisco Systems (Trinidad & Tobago) Ltd Cisco Systems (USA) Pte Ltd Cisco Systems Algeria EURL Cisco Systems Australia Pty Ltd Cisco Systems Austria GmbH Cisco Systems Belgium BVBA/SPRL Cisco Systems Bulgaria EOOD Cisco Systems Canada Co Cisco Systems Capital (Australia) Pty Ltd Cisco Systems Capital (India) Private Ltd Cisco Systems Capital (Korea) Ltd Cisco Systems Capital (Thailand) Ltd Cisco Systems Capital Asia Pte Ltd Cisco Systems Capital Canada Co Cisco Systems Capital China Corporation Cisco Systems Capital Corporation Cisco Systems Capital France SAS Cisco Systems Capital GmbH Cisco Systems Capital Italy Srl Cisco Systems Capital KK C isco Systems Capital Netherlands BV Cisco Systems Capital Sdn Bhd Cisco Systems Capital South Africa (Proprietary) Ltd Cisco Systems Capital Spain SL Cisco Systems Chile SA Cisco Systems Co Cisco Systems Costa Rica SA Cisco Systems Croatia Ltd for Trade Cisco Systems Cyprus Ltd Cisco Systems De Mexico SA de CV Cisco Systems Denmark ApS Cisco Systems Dominicana SA Cisco Systems Ecuador SA Cisco Systems Egypt Ltd Cisco Systems El Salvador Ltda de CV Cisco Systems Estonia OU Cisco Systems Finance International Cisco Systems Finance International Holdings I Ltd Cisco Systems Finance International Holdings II Ltd Clearwell Systems Inc Cleversafe Inc Cloudant Inc Cloudscaling Group Cognitive Collaborate Comneon Compagnie IBM France SAS Companhia IBM Portuguesa SA. Company-i Components Intel de Costa Rica SA Compose Inc Composite Software Compucat Research Pty Ltd CounterTack CrossIdeas Crowdstrike CSL International Cybereason Cyberoam Technologies Cylance Cyvera Cyvera Ltd (d/b/a Palo Alto Networks (Israel) Ltd) Cyvera Inc Daeja Image Systems Ltd DarkTrace Data Logic Inc (US) Datazen Dell Inc DESlock+ Domino's Pizza DSSD Inc EBay Electronica Nayarit SA Embrane EMC EMC (Benelux) BV EMC (RSA) EMC Information Systems International EMC International Company EMC International U.S. Holdings Inc ENDFORCE Equivio ESET ESET ASIA PTE LTD ESET Latin America ESET spol s ro ESET LLC ESY Export Company Inc E-Systems Technologies Holding Inc EUREST Raytheon Support Services EverythingAircraft LLC Experian Explorys Fiberlink Communications FieldOne FireEye Australia Pty Ltd FireEye Cybersecurity Private Ltd FireEye Hong Kong Ltd FireEye Inc FireEye International Inc FireEye Ireland Ltd FireEye Israel Ltd FireEye KK FireEye Ko rea Ltd FireEye Mexico SA de CV FireEye Singapore Private Ltd FireEye South Africa (Pty) Ltd FireEye Technology Ltd FireEye UK Ltd First Communications Company General Atlantic General Electric Co Gideon Technologies Inc Global HQ Global HQ Sophos Ltd Globalfoundries Inc GreenButton GuardianEdge Technologies Inc Hacker Academy Havok Henggeler Computer Consultants Inc Hexis Cyber Solutions HockeyApp Home Depot Inc HP TippingPoint HRL Research Analytics Inc Hughes Airport Development Corporation Sdn Bhd Hughes Arabia Ltd Hughes Asia Pacific Hong Kong Ltd Hughes Training Italia Srl Humyo IBM (China) Co Ltd IBM (China) Investment Company Ltd IBM (International Business Machines) Turk Ltd Sirketi IBM Argentina Sociedad de Responsabilidad Ltda IBM Australia Ltd IBM Bahamas Ltd IBM Bangladesh Private Ltd IBM BrasilIndustria, Maquinas e Servicos Ltda IBM Bulgaria Ltd IBM Burkina Faso SARL IBM Business Transformation Center Srl IBM Canada LtdIBM Canada Ltd IBM Capital Inc. IBM Ceska Republika spol. sro IBM China/Hong Kong Ltd IBM Congo SARL IBM Credit LLC IBM Croatia Ltd./IBM Hrvatska doo IBM de Chile SAC IBM de Colombia & CIA SCA IBM de Mexico, Comercializacion y Servicios S de RL de CV IBM de Mexicon S de RL IBM de Venezuela SA IBM del Ecuador CA IBM del Peru SA IBM del Uruguay SA IBM Denmark ApS IBM Deutschland GmbH IBM Deutschland Kreditbank GmbH IBM East Africa Ltd IBM East Europe/Asia Ltd IBM Eesti Osauhing (IBM Estonia Ou) IBM Egypt Business Support Services IBM Foreign Sales Corporation IBM France Financement SA IBM Global Financing Australia Ltd IBM Hellas Information Handling Systems SA IBM India Private Ltd IBM International Foundation IBM International Group BV IBM International Group Capital LLC IBM Ireland Ltd IBM Ireland Product Dis tribution Ltd IBM Israel Ltd IBM Italia SpA IBM Japan Ltd IBM Korea Inc IBM Lietuva IBM Ltd IBM Magyarorszagi Kft IBM Malaysia Sdn Bhd IBM Malta Ltd IBM Maroc IBM Mauritius IBM Middle East FZLLC IBM Nederland B.V. IBM New Zealand Ltd IBM Niger SARLU IBM Oesterreich Internationale Bueromaschinen GmbH IBM Philippines, Incorporated IBM Polska Sp z oo IBM Qatar SSC IBM RDC IBM Romania Srl IBM Schweiz AGIBM Suisse SAIBM Suizzera SAIBM Switzerland Ltd. IBM Services Financial Sector Luxembourg Sarl IBM Singapore Pte. Ltd. IBM Slovenija d.o.o. IBM Slovensko spol s.r.o. IBM South Africa (Pty) Ltd. IBM Svenska Aktiebolag IBM Taiwan Corporation IBM Tanzania Ltd IBM Tchad SARLU IBM Thailand Company Ltd IBM Tunisie IBM Ukraine IBM United Kingdom Asset Leasing Ltd IBM United Kingdom Financial Services Ltd IBM United Kingdom Ltd IBM Vietnam Company IBM World Trade Corporation IBMInternational Business Machines d.o.o., Belgrade Identum Imlogic Inc Incent Games Inc. Indra ATM S.L. SPA inMage Insieme Intel America, Inc Intel Asia holding Ltd Intel Benelux B.V. Intel Capital (Cayman) Corporation Intel Capital Corporation Intel China Ltd. Intel Corporation Intel Corporation (UK) Ltd. Intel Electronics Finance Ltd Intel Electronics Ltd. Intel Europe, Inc. Intel Holdings B.V. Intel International Intel Investment Management Ltd Intel Ireland Ltd Intel Israel (74) Ltd Intel Israel Holdings B.V. Intel Kabushiki Kaisha Intel Massachusetts, Inc Intel Mobile Communications GmbH Intel Overseas Funding Corporation Intel Security (McAfee) Intel Semi Conductors, Ltd. Intel Semiconductor (Dalian) Ltd. Intel Semiconductor (US) Ltd International Business Machines International Business Machines AS International Business Machines Gabon SARL International Business Machin es Ghana Ltd International Business Machines Madagascar SARLU International Business Machines of Belgium spry/buba International Business Machines Senegal International Business Machines West Africa Ltd International Business Machines Zambia Ltd International Business Machines, S.A. International Information Services Management Ltd International Monetary Fund Intucell Invincea J.P. Morgan Japan Pension Services JouleX Karlsruhe Kaspersky Lab Kaspersky Lab Argentina Kaspersky Lab Asia-Pacific HQ Kaspersky Lab Australia and New Zealand Kaspersky Lab Benelux Kaspersky Lab Canada Kaspersky Lab China Kaspersky Lab France Kaspersky Lab Germany Kaspersky Lab Iberia Kaspersky Lab India Kaspersky Lab Italy Kaspersky Lab Japan Kaspersky Lab Korea Kaspersky Lab Malaysia Kaspersky Lab Mexico Kaspersky Lab Nordics Kaspersky Lab Polska sp z oo Kaspersky Lab Romania Kaspersky Lab South Africa (Pty ) Ltd. Kaspersky Lab Switzerland Kaspersky Lab Turkey Kaspersky Lab UK Kazakhstan KEYW Corporation Ktech Corporation Lancope, Inc. Latin America Lighthouse Security Group, LLC Liric Associates LiveOffice Lockheed Martin Corporation Lumension Maginatics MaintenanceNet Mandiant McAfee, Inc Melbourne branch Memoir Systems Merge Healthcare Incorporated MessageLabs Metacloud Meteorix LLC Mi5 Networks Microsoft Microsoft Capital Group, LLC Microsoft Global Finance Microsoft Ireland Operations Ltd Microsoft Ireland Research Microsoft Licensing, GP Microsoft Online, Inc. Microsoft Operations Pte Ltd Microsoft Operations Puerto Rico, LLC Microsoft Regional Sales Corporation Middle-East branch Middle-East FZ-LCC Mission College Investments Ltd. Mitsubishi Heavy Industries Mobile Armor Mojang Mojang Synergies AB Mojave Networks MOL Corporation Morta Se curity Morta Security, Inc. M-Pesa Myanma Posts and telecommunications Nasdaq Neophis Network Access Control Nicolaus & Co. Inc Niederlassung Oesterreich NitroDesk NitroSecurity North Sydney branch Nova Scotia Company Novell nPulse Technologies nSuite Technologies, Inc. Nukona ON Technology OpenDNS Opower Oy IBM Finland AB Palo Alto Networks Palo Alto Networks (Australia) Pty Ltd Palo Alto Networks (Brasil) Ltda. Palo Alto Networks (Canada) Inc. Palo Alto Networks (Germany) GmbH Palo Alto Networks (India) Private Ltd Palo Alto Networks (Malaysia), LLC Palo Alto Networks (Mexico) S. de R.L. de C.V. Palo Alto Networks (Netherlands) B.V. Palo Alto Networks (Norway) AS Palo Alto Networks (Singapore) Holding Company Pte. Ltd. Palo Alto Networks (Singapore) PTE. LTD. Palo Alto Networks (UK) Ltd Palo Alto Networks Belgium B.V.B.A. Palo Alto Networks FZ LLC Palo Alto Networks Godo Kaisha Palo Alto Networks Holding B.V. Palo Alto Networks International, Inc. Palo Alto Networks Korea, Ltd. Palo Alto Networks, L.L.C. PAN C.V. PAN LLC Parature ParStream Parthenon Group PasswordBank Patriot Overseas Support Company Pawaa PC Tools Pegasystems Pender Financial PGP Corporation Phytel Pikewerks Corporation PistonCloud Computing Platform Logic Ponemon Institute Portcullis Computer Security, Ltd Prudential Securities PT IBM Indonesia PWC Raphael Advanced Defense Systems Ltd. RAYCOM, INC. Raytheon (Websense) Raytheon Advanced Systems Company Raytheon Air Control Company Raytheon Aircraft Holdings, Inc. Raytheon Aircraft Services, Inc. Raytheon Appliances Asia, Inc. Raytheon Australia Raytheon Australia International PTY Ltd Raytheon Canada Ltd (RCL) Raytheon Deutschland GmbH Raytheon Espana, S.A. Raytheon Europe International Company Raytheon Internati onal Korea, Inc. Raytheon Ltd Raytheon Philippines, Inc. Raytheon Saudi Arabia Ltd Raytheon Systems Holding Company LLC Raytheon Systems Israel Company Raytheon Training International Raytheon-Tag Components Ltd Recon Instruments Relicore Inc. Revolution Analytics RL3 JV RUS RockYou RSA Sabiedriba ar irobezotu atbildibu IBM Latvija SafeNet Inc. Saudi Aramco ScaleIO Secure Computing Secure DNA Consulting, Inc. Secure DNA Holdings, Inc. Secure DNA Managed Services, Inc. SecureID SecureWorks Seismograph Service France Seneweb.com Sensage SentinelOne Sentrigo Servicentro TMLA S.A.de C.V. Silicium Security Silverpop Silver Lake Silver Tail Systems Skype Communications Sarl SoftLayer Technologies Inc. SoftScan SolveDirect Sony Corporation Sony Pictures Entertainment Sophos Sophos AB Sophos B.V. Sophos Computer Security Pte Ltd (Makati City) Sophos Computer Se curity Pte Ltd (Malaysia) Sophos Computer Security Pte Ltd (Singapore) Sophos Computer Security Pte Ltd (Taipei City) Sophos Computer Security Pte Ltd Jakarta Sophos Computer Security Pte Ltd. (Beijing) Sophos Computer Security Pte Ltd. (Shanghai) Sophos Hong Kong Company Ltd. Sophos Iberia SRL Sophos Italia Srl Sophos KK Sophos Ltd. Sophos Sarl Sophos Schweiz AG Sophos Technology Solutions India Pvt Ltd (Ahmadabad) Sophos Technology Solutions India Pvt Ltd (Mumbai) Sophos Technology Solutions India Pvt Ltd (New Delhi) Sophos training Center SOS Pacasia Technologies, Inc. Sourcefire Splunk Star Analytics Inc. Stifel StrongLoop, Inc. Sunrise SwapDrive Switchcraft de Mexico S.A. de C.V. Sygate Technology Symantec Symantec (UK) Ltd Symantec Asia Pacific Pte. Ltd. Symantec Holdings Ltd Symantec International Symantec Japan LLC Symantec Ltd Symantec Operating Corporation Symantec Soft ware India Private Ltd. Syncplicity SyntaxTree TAG Halbleiter GmbH Tail-f Systems TalkTalk Tanium Target Technology Associates Inc. Technology Products and Services Ltd Teligy Inc. Thales Thales Raytheon Systems Arabia L.P. Thales-Raytheon Systems Co. LLC Thales-Raytheon Systems Company Ltd Thales-Raytheon Systems Company S.A.S. (TRS SAS) The Gulf Industrial Technology Company (KSC) The Now Factory Third Brigade ThreatGrid T-Mobile Transparent Logic Technologies Trend Micro Trend Micro (China) Incorporated Trend Micro (EMEA) Ltd Trend Micro (NZ) Ltd Trend Micro (Singapore) Private Ltd Trend Micro (Thailand) Ltd Trend Micro (UK) Ltd Trend Micro Australia Pty. Ltd. Trend Micro Deutschland GmbH Trend Micro do Brasil Ltda. Trend Micro France Trend Micro Hong Kong Ltd Trend Micro Inc. Trend Micro Incorporated Trend Micro India Private Ltd Trend Micro Italy Srl Trend Micro Kor ea Inc. Trend Micro Latinoamerica S.A.de C.V. Trend Micro Malaysia Sdn Bhd Tropo Trusted Computer Solutions Inc Trusteer TurnTide TV5 Monde TwinStrata Uber Ubiquisys Ultimaco Safeware AG UnityVS UrbanCode Inc VeriSign VERITAS Software Corporation Verizon Virtustream Virtutech VirusBuster Visto Equity Partners LLC Visual Analytics Inc. VMware Bermuda Ltd VMware, Inc. VoloMetrix Vontu Websense Westinghouse WholeSecurity Wind River Systems, Inc WTC Insurance Corporation, Ltd. Xtify Inc. XtreamLok ZiiLabs Organisations Mentioned in this Report Agence de l'Informatique de l'Etat du Sénégal Agence Nationale de la Sécurité des Systèmes D'information (ANSSI) Ajax Security Team Anonymous Collective Boko Haram Cyber Fighters of Izz ad-Din Al Qassam CyberCaliphate Dubai Centre for E-Security Estonian Parliament European Commission European Cybercrime Centre (EC3) Europol French Ministry of Finance G20 Groupe Speciale Mobile Association (GSMA) Harvard Business School Information Systems Security Association (ISSA) Iranian Cyber Army Iranian National Computer Emergency Response Team (CERT) Islamic State (IS) London Stock Exchange (LSE) MAHER Centre Mexican Centre for Investigation and National Security Mexican Secretariat of National Defense Mexican Secretariat of the Navy Naikon Group Nigerian Defense Headquarters Norwegian National Security Authority Princeton University Redstone Arsenal Rex Mundi Sandia National Laboratories Seoul Metro South Korea Financial Service The Impact Team U.S. Central Command U.S. Cyber Command U.S. Federal Bureau of Investigation (FBI) U.S. Governmen t U.S. Intelligence Community U.S. National Aeronautics and Space Administration (NASA) U.S. National Security Agency (NSA) U.S. Navy and Marine Corps Intranet (NMCI) U.S. Securities and Exchange Commission (SEC) UK Government UK Government Communications Headquarters (GCHQ) United Nations (UN) University of Maryland Wikileaks Yantai Airport (YTN) ------------------------------------------------------------ |
Pricing Single User License: Single user copies of this report are available for EUR2429/ USD2519/ GBP1799 Departmental License: Entitles up to 5 individual users to access this report for EUR4049/ USD4199/ GBP2999 (Not suitable for library usage) Site License: Allow your company to have access to this report at one location for EUR6749/ USD6999/ GBP4999 (Suitable for library storage and use) Global License: Have your whole company worldwide to access this information for EUR9449/ USD9799/ GBP6999 ------------------------------------------------------------ |
Ordering To order this report, contact Peter Turay on: Telephone: +44( 0)207 549 0537 or email: peter.turay@vgreports.com And provide the following information: Report Title: Report License (Single User/Departmental/Site/Global): Name: User Email: Job Title: Company: Invoice Address: Telephone and Fax number: EEC VAT Number (only for E.U.): Please contact me should you have any questions or wish to receive an executive summary of this report. I look forward to hearing from you. Best Regards, Peter Turay Telecoms Industry Consultant |
Terms and Conditions By replying to this e-mail submitting your order for this product you have agreed without limitation or qualification to be bound by and to comply with these Terms and Conditions. You agree that you will not fail to complete any transaction after submitting an or der to purchase a product or submit any order to purchase a product where you do not intend to complete the transaction. Management Reports will only be sent on receipt of payment. You are currently subscribed to this list as ali.ali-an@yandex.by . As a valued contact or customer, you are receiving this email with information that we believe will be relevant to you. If however, you wish to stop future messages, please reply to this email typing "REMOVE" in the subject box. Registered Office: BSG House, 230 City Road, London, EC1V 2QY, U.K. |
Отправить комментарий