1. EXECUTIVE SUMMARY
2. MARKET SNAPSHOT
2.1. Market Overview
2.2. Market Definition
2.3. Scope of the Study
2.4. Market Segmentation
3. BUSINESS LANDSCAPE
3.1. Market Drivers
3.2. Market Restraints
3.3. Market Opportunities
3.4. Porter’s Five Forces Analysis
3.5. Industry Value Chain Analysis
3.6. Policies and Regulations
3.7. Strategic Recommendations
4. TECHNOLOGICAL OUTLOOK
5. NETWORK SECURITY MARKET BY COMPONENT
5.1. Introduction
5.2. Solutions
5.2.1. Firewall
5.2.2. Intrusion Prevention System (IPS)
5.2.3. Network Access Control (NAC)
5.2.4. Antivirus Software
5.2.5. Others
5.3. Services
6. NETWORK SECURITY MARKET BY DEPLOYMENT
6.1. Introduction
6.2. Cloud
6.3. On-Premise
7. NETWORK SECURITY MARKET BY ENTERPRISE SIZE
7.1. Introduction
7.2. Small
7.3. Medium
7.4. Large
8. NETWORK SECURITY MARKET BY END-USER
8.1. Introduction
8.2. BFSI
8.3. IT & Telecommunication
8.4. Government & Defense
8.5. Retail
8.6. Manufacturing
8.7. Others
9. NETWORK SECURITY MARKET BY GEOGRAPHY
9.1. Introduction
9.2. North America
9.2.1. By Component
9.2.2. By Deployment
9.2.3. By Enterprise Size
9.2.4. By End-User
9.2.5. By Country
9.2.5.1. USA
9.2.5.2. Canada
9.2.5.3. Mexico
9.3. South America
9.3.1. By Component
9.3.2. By Deployment
9.3.3. By Enterprise Size
9.3.4. By End-User
9.3.5. By Country
9.3.5.1. Brazil
9.3.5.2. Argentina
9.3.5.3. Others
9.4. Europe
9.4.1. By Component
9.4.2. By Deployment
9.4.3. By Enterprise Size
9.4.4. By End-User
9.4.5. By Country
9.4.5.1. Germany
9.4.5.2. France
9.4.5.3. United Kingdom
9.4.5.4. Spain
9.4.5.5. Others
9.5. Middle East and Africa
9.5.1. By Component
9.5.2. By Deployment
9.5.3. By Enterprise Size
9.5.4. By End-User
9.5.5. By Country
9.5.5.1. Saudi Arabia
9.5.5.2. UAE
9.5.5.3. Others
9.6. Asia Pacific
9.6.1. By Component
9.6.2. By Deployment
9.6.3. By Enterprise Size
9.6.4. By End-User
9.6.5. By Country
9.6.5.1. China
9.6.5.2. India
9.6.5.3. Japan
9.6.5.4. South Korea
9.6.5.5. Indonesia
9.6.5.6. Thailand
9.6.5.7. Taiwan
9.6.5.8. Others
10. COMPETITIVE ENVIRONMENT AND ANALYSIS
10.1. Major Players and Strategy Analysis
10.2. Market Share Analysis
10.3. Mergers, Acquisitions, Agreements, and Collaborations
10.4. Competitive Dashboard
11. COMPANY PROFILES
11.1. Cisco Systems, Inc.
11.2. Fortinet, Inc.
11.3. IBM
11.4. SonicWall Inc (Francisco Partners)
11.5. McAfee
11.6. Check Point Software Technologies Ltd
11.7. CDW Corporation
11.8. Auvik Networks Inc.
11.9. Palo Alto Networks, Inc.
11.10. Hewlett Packard Enterprise
12. APPENDIX
12.1. Currency
12.2. Assumptions
12.3. Base and Forecast Years Timeline
12.4. Key benefits for the stakeholders
12.5. Research Methodology
12.6. Abbreviations
LIST OF FIGURES
LIST OF TABLES