Enjoy complimentary customisation on priority with our Enterprise License!
"01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Summary of Figures
05.1 Summary of Figures of Global Enterprise IT Security Market by Security Components
06. Introduction
07. Market Insights
07.1 Types of Threats
07.1.1 Trojan
07.1.2 Virus
07.1.3 Worms
07.1.4 Adware
07.1.5 Keylogger
07.1.6 Backdoor
07.1.7 Exploit
07.1.8 Dropper
07.1.9 Phishing
07.1.10 Cookies
07.1.11 Bluesnarfing
07.1.12 Boot Sector Virus
07.1.13 Mousetrapping
07.1.14 Browser Hijackers
07.1.15 Obfuscated Spam
07.1.16 Crimeware
07.2 Global Data Breaches 2014
07.3 Global Identity Theft 2014
07.4 Victims of Phishing Attacks 2014
07.5 Consequences of Corporate Data Loss
07.6 Causes of Data Breaches in Enterprises 2014
07.7 Data Breaches by Industry Sector 2014
07.8 Impact of Cyber Threats on BYOD Adoption in Enterprises
07.9 Impact of Threats on Enterprises
07.10 Need for IT Security
08. Emerging IT Security Technologies
08.1 Mobile Application Wrappers or Containerization
08.2 Introduction of Multi-factor Authentication
09. Market Description
09.1 Components of Enterprise IT Security Market
09.2 Description of Enterprise IT Security Market Components
09.2.1 Enterprise Network Security
09.2.2 Enterprise Endpoint Security
09.2.3 Enterprise Content Security
09.2.4 Enterprise Cyber Security
10. Market Landscape
10.1 Market Overview
10.2 Product Life Cycle Analysis
10.3 Global Enterprise IT Security Market
10.3.1 Market Size and Forecast
10.4 Five Forces Analysis
11. Segmentation of Market by Security Components
11.1 Segmentation of Global Enterprise IT Security Market by Security Components 2014
11.2 Segmentation of Global Enterprise IT Security Market by Security Components 2014-2019
11.3 Global Enterprise Network Security Market
11.3.1 Market Size and Forecast
11.4 Global Enterprise Endpoint Security Market
11.4.1 Market Size and Forecast
11.5 Global Enterprise Content Security Market
11.5.1 Market Size and Forecast
11.6 Global Enterprise Cyber Security Market
11.6.1 Market Size and Forecast
12. Geographical Segmentation
12.1 Segmentation of Global Enterprise IT Security Market by Geography 2014
12.2 Global Enterprise IT Security Market by Geography 2014-2019 (Revenue)
12.2.1 Enterprise IT Security Market in Americas
12.2.2 Enterprise IT Security Market in EMEA
12.2.3 Enterprise IT Security Market in APAC
13. Buying Criteria
14. Market Growth Drivers
15. Drivers and their Impact
16. Market Challenges
17. Impact of Drivers and Challenges
18. Market Trends
19. Trends and their Impact
20. Vendor Landscape
20.1 Competitive Scenario
20.2 Major Vendors 2014
20.3 News Updates
20.3.1 Key News
20.3.2 Mergers and Acquisitions
20.4 Description of Major Vendors
20.4.1 Cisco Systems
20.4.2 Kaspersky Lab
20.4.3 McAfee
20.4.4 Symantec
20.4.5 Trend Micro
20.5 Other Prominent Vendors
21. Market Summary
22. Key Vendor Analysis
22.1 Cisco Systems
22.1.1 Key Facts
22.1.2 Business Overview
22.1.3 Business Segmentation by Revenue
22.1.4 Geographical Segmentation by Revenue
22.1.5 Business Strategy
22.1.6 Key Information
22.1.7 SWOT Analysis
22.2 Kaspersky Lab
22.2.1 Key Facts
22.2.2 Business Overview
22.2.3 Business Segmentation
22.2.4 Business Strategy
22.2.5 Recent Developments
22.2.6 SWOT Analysis
22.3 McAfee
22.3.1 Key Facts
22.3.2 Business Overview
22.3.3 Product Segmentation
22.3.4 Key Locations
22.3.5 Business Strategy
22.3.6 Recent Developments
22.3.7 SWOT Analysis
22.4 Symantec
22.4.1 Key Facts
22.4.2 Business Overview
22.4.3 Business Segmentation by Revenue 2013
22.4.4 Business Segmentation by Revenue 2013 and 2014
22.4.5 Geographical Segmentation by Revenue 2013
22.4.6 Business Strategy
22.4.7 Recent Developments
22.4.8 SWOT Analysis
22.5 Trend Micro
22.5.1 Key Facts
22.5.2 Business Overview
22.5.3 Geographical Segmentation by Revenue 2012 and 2013
22.5.4 Geographical Segmentation by Revenue 2013
22.5.5 Business Strategy
22.5.6 Recent Developments
22.5.7 SWOT Analysis
23. Assumptions
24. Other Reports in this Series
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Cookie Policy
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.