1. EXECUTIVE SUMMARY
2. MARKET SNAPSHOT
2.1. Market Overview
2.2. Market Definition
2.3. Scope of the Study
2.4. Market Segmentation
3. BUSINESS LANDSCAPE
3.1. Market Drivers
3.2. Market Restraints
3.3. Market Opportunities
3.4. Porter’s Five Forces Analysis
3.5. Industry Value Chain Analysis
3.6. Policies and Regulations
3.7. Strategic Recommendations
4. TECHNOLOGICAL OUTLOOK
5. ENDPOINT SECURITY MARKET BY ENDPOINT TYPE
5.1. Introduction
5.2. Computers & Laptops
5.3. Smartphones
5.4. IoT Devices
5.5. Others
6. ENDPOINT SECURITY MARKET BY SECURITY TYPE
6.1. Introduction
6.2. Endpoint Detection Response (EDR)
6.3. Endpoint Protection Platform (EPP)
6.4. Internet-of-Things (IoT) Security
6.5. Network Access Control (NAC)
6.6. Others
7. ENDPOINT SECURITY MARKET BY ENTERPRISE SIZE
7.1. Introduction
7.2. Small
7.3. Medium
7.4. Large
8. ENDPOINT SECURITY MARKET BY END-USER
8.1. Introduction
8.2. BFSI
8.3. Government & Defense
8.4. IT & Telecommunication
8.5. Retail
8.6. Healthcare
8.7. Others
9. ENDPOINT SECURITY MARKET BY GEOGRAPHY
9.1. Introduction
9.2. North America
9.2.1. By Endpoint Type
9.2.2. By Security Type
9.2.3. By Enterprise Size
9.2.4. By End-User
9.2.5. By Country
9.2.5.1. USA
9.2.5.2. Canada
9.2.5.3. Mexico
9.3. South America
9.3.1. By Endpoint Type
9.3.2. By Security Type
9.3.3. By Enterprise Size
9.3.4. By End-User
9.3.5. By Country
9.3.5.1. Brazil
9.3.5.2. Argentina
9.3.5.3. Others
9.4. Europe
9.4.1. By Endpoint Type
9.4.2. By Security Type
9.4.3. By Enterprise Size
9.4.4. By End-User
9.4.5. By Country
9.4.5.1. Germany
9.4.5.2. France
9.4.5.3. United Kingdom
9.4.5.4. Spain
9.4.5.5. Others
9.5. Middle East and Africa
9.5.1. By Endpoint Type
9.5.2. By Security Type
9.5.3. By Enterprise Size
9.5.4. By End-User
9.5.5. By Country
9.5.5.1. Saudi Arabia
9.5.5.2. UAE
9.5.5.3. Others
9.6. Asia Pacific
9.6.1. By Type
9.6.2. By Material
9.6.3. By End-User
9.6.4. By Country
9.6.4.1. China
9.6.4.2. India
9.6.4.3. Japan
9.6.4.4. South Korea
9.6.4.5. Indonesia
9.6.4.6. Thailand
9.6.4.7. Taiwan
9.6.4.8. Others
10. COMPETITIVE ENVIRONMENT AND ANALYSIS
10.1. Major Players and Strategy Analysis
10.2. Market Share Analysis
10.3. Mergers, Acquisitions, Agreements, and Collaborations
10.4. Competitive Dashboard
11. COMPANY PROFILES
11.1. Cisco Systems, Inc.
11.2. Fortinet Inc.
11.3. Palo Alto Networks, Inc
11.4. CrowdStrike Holdings, Inc
11.5. Broadcom Inc
11.6. Sophos Ltd.
11.7. Elasticsearch B.V.
11.8. AO Kaspersky Lab
11.9. Microsoft Corporation
11.10. Trend Micro Inc.
11.11. Check Point Software Technologies Ltd.
11.12. SentinelOne
12. APPENDIX
12.1. Currency
12.2. Assumptions
12.3. Base and Forecast Years Timeline
12.4. Key benefits for the stakeholders
12.5. Research Methodology
12.6. Abbreviations
LIST OF FIGURES
LIST OF TABLES