1. INTRODUCTION
1.1. MARKET OVERVIEW
1.2. MARKET DEFINITION
1.3. SCOPE OF THE STUDY
1.4. CURRENCY
1.5. SEGMENTATION
1.6. ASSUMPTIONS
1.7. BASE, AND FORECAST YEARS TIMELINE
2. RESEARCH METHODOLOGY
2.1. RESEARCH DESIGN
2.2. SECONDARY SOURCES
2.3. VALIDATION
3. KEY FINDINGS
4. MARKET DYNAMICS
4.1. DRIVERS
4.1.1. SURGE IN CYBER-ATTACK AND DATA BREACH INCIDENCES
4.1.2. TECHNOLOGICAL ADVANCEMENTS
4.2. RESTRAINTS
4.2.1. LACK OF KNOWLEDGE AND SKILLED WORKFORCE
4.2.2. HIGH COSTS ASSOCIATED WITH CLOUD SECURITY
4.3. PORTER’S FIVE FORCES ANALYSIS
4.3.1. BARGAINING POWER OF SUPPLIERS
4.3.2. BARGAINING POWER OF BUYERS
4.3.3. THREAT OF NEW ENTRANTS
4.3.4. THREAT OF SUBSTITUTES
4.3.5. COMPETITIVE RIVALRY IN THE INDUSTRY
4.4. INDUSTRY VALUE CHAIN ANALYSIS
5. CLOUD SECURITY MARKET BY DEPLOYMENT MODEL
5.1. INTRODUCTION
5.2. PRIVATE
5.3. PUBLIC
5.4. HYBRID
6. CLOUD SECURITY MARKET BY SECURITY TYPE
6.1. INTRODUCTION
6.2. EMAIL AND WEB SECURITY
6.3. CLOUD DATABASE SECURITY AND DATA LOSS PREVENTION
6.4. CLOUD IAM
6.5. NETWORK SECURITY
6.6. OTHERS
7. CLOUD SECURITY MARKET BY END-USER
7.1. INTRODUCTION
7.2. GOVERNMENT
7.3. LEISURE
7.4. RETAIL
7.5. BFSI
7.6. COMMUNICATION AND TECHNOLOGY
7.7. HEALTHCARE
7.8. OTHERS
8. CLOUD SECURITY MARKET BY GEOGRAPHY
8.1. INTRODUCTION
8.2. NORTH AMERICA
8.2.1. THE UNITED STATES
8.2.2. CANADA
8.2.3. MEXICO
8.3. SOUTH AMERICA
8.3.1. BRAZIL
8.3.2. ARGENTINA
8.3.3. OTHERS
8.4. EUROPE
8.4.1. UNITED KINGDOM
8.4.2. GERMANY
8.4.3. SWEDEN
8.4.4. DENMARK
8.4.5. OTHERS
8.5. MIDDLE EAST AND AFRICA
8.5.1. UAE
8.5.2. ISRAEL
8.5.3. SOUTH AFRICA
8.5.4. OTHERS
8.6. ASIA PACIFIC
8.6.1. CHINA
8.6.2. JAPAN
8.6.3. SOUTH KOREA
8.6.4. INDIA
8.6.5. AUSTRALIA
8.6.6. OTHERS
9. COMPETITIVE ENVIRONMENT AND ANALYSIS
9.1. MAJOR PLAYERS AND STRATEGY ANALYSIS
9.2. EMERGING PLAYERS AND MARKET LUCRATIVENESS
9.3. MERGERS, ACQUISITIONS, AGREEMENTS, AND COLLABORATIONS
9.4. VENDOR COMPETITIVENESS MATRIX
10. COMPANY PROFILES
10.1. AMAZON WEB SERVICES INC.
10.2. PALO ALTO NETWORK INC.
10.3. CISCO SYSTEMS INC.
10.4. IBM CORPORATION
10.5. FORTINET
10.6. MICROSOFT (MICROSOFT AZURE)
10.7. INTEL SECURITY GROUP
10.8. SKYHIGH SECURITY
10.9. TRUSTWAVE HOLDINGS
10.10. CA TECHNOLOGIES
10.11. TREND MICRO
10.12. AKAMAI TECHNOLOGIES, INC