1. INTRODUCTION
1.1. Market Overview
1.2. Market Definition
1.3. Scope of the Study
1.4. Market Segmentation
1.5. Currency
1.6. Assumptions
1.7. Base and Forecast Years Timeline
1.8. Key Benefits to the Stakeholder
2. RESEARCH METHODOLOGY
2.1. Research Design
2.2. Research Processes
3. EXECUTIVE SUMMARY
3.1. Key Findings
4. MARKET DYNAMICS
4.1. Market Drivers
4.2. Market Restraints
4.3. Porter’s Five Forces Analysis
4.3.1. Bargaining Power of Suppliers
4.3.2. Bargaining Power of Buyers
4.3.3. Threat of New Entrants
4.3.4. Threat of Substitutes
4.3.5. Competitive Rivalry in the Industry
4.4. Industry Value Chain Analysis
4.5. Analyst View
5. DATA CENTRE LOGICAL SECURITY MARKET BY DATA CENTER TYPE
5.1. Introduction
5.2. Small
5.3. Medium
5.4. Large
6. DATA CENTRE LOGICAL SECURITY MARKET BY SERVICE TYPE
6.1. Introduction
6.2. Security Consulting Services
6.3. Managed Security Services
7. DATA CENTRE LOGICAL SECURITY MARKET BY SOLUTION TYPE
7.1. Introduction
7.2. Threat and Service Type Security Solutions
7.3. Access Control and Compliance
7.4. Data Protection Solutions
8. DATA CENTRE LOGICAL SECURITY MARKET BY END-USER
8.1. Introduction
8.2. BFSI
8.3. Healthcare
8.4. Government
8.5. Energy
8.6. Retail
8.7. Others
9. DATA CENTRE LOGICAL SECURITY MARKET BY GEOGRAPHY
9.1. Introduction
9.2. North America
9.2.1. By Data Center Type
9.2.2. By Service Type
9.2.3. By Solution Type
9.2.4. By End-User
9.2.5. By Country
9.2.5.1. USA
9.2.5.2. Canada
9.2.5.3. Mexico
9.3. South America
9.3.1. By Data Center Type
9.3.2. By Service Type
9.3.3. By Solution Type
9.3.4. By End-User
9.3.5. By Country
9.3.5.1. Brazil
9.3.5.2. Argentina
9.3.5.3. Others
9.4. Europe
9.4.1. By Data Center Type
9.4.2. By Service Type
9.4.3. By Solution Type
9.4.4. By End-User
9.4.5. By Country
9.4.5.1. UK
9.4.5.2. Germany
9.4.5.3. France
9.4.5.4. Italy
9.4.5.5. Others
9.5. Middle East and Africa
9.5.1. By Data Center Type
9.5.2. By Service Type
9.5.3. By Solution Type
9.5.4. By End-User
9.5.5. By Country
9.5.5.1. UAE
9.5.5.2. Saudi Arabia
9.5.5.3. Israel
9.5.5.4. Others
9.6. Asia Pacific
9.6.1. By Data Center Type
9.6.2. By Service Type
9.6.3. By Solution Type
9.6.4. By End-User
9.6.5. By Country
9.6.5.1. Japan
9.6.5.2. China
9.6.5.3. India
9.6.5.4. South Korea
9.6.5.5. Taiwan
9.6.5.6. Thailand
9.6.5.7. Indonesia
9.6.5.8. Others
10. COMPETITIVE ENVIRONMENT AND ANALYSIS
10.1. Major Players and Strategy Analysis
10.2. Market Share Analysis
10.3. Mergers, Acquisitions, Agreements, and Collaborations
10.4. Competitive Dashboard
11. COMPANY PROFILES
11.1. Bosch Sicherheitssysteme GmbH
11.2. Check Point Software Technologies Ltd.
11.3. Trend Micro Incorporated
11.4. Telecom Italia (Italtel S.p.A.)
11.5. Hewlett Packard Enterprise (Juniper Networks, Inc.)
11.6. VMware, Inc
11.7. Fortinet, Inc.
11.8. Intel Corporation
11.9. IBM
11.10. Cisco Systems, Inc.
LIST OF FIGURES
LIST OF TABLES