Enjoy complimentary customisation on priority with our Enterprise License!
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Scope
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Summary of Figures
05.1 Summary of Key Figures by Geographical Segmentation
06. Market Insights
07. Introduction
08. Market Description
08.1 Types of Threats
08.1.1 Trojan
08.1.2 Virus
08.1.3 Worms
08.1.4 Adware
08.1.5 Keylogger
08.1.6 Backdoor
08.1.7 Exploit
08.1.8 Dropper
08.1.9 Phishing
08.1.10 Cookies
08.1.1 Bluesnarfing
08.1.12 Boot Sector Virus
08.1.13 Mousetrapping
08.1.14 Browser Hijackers
08.1.15 Obfuscated Spam
08.1.16 Crimeware
08.2 Consequences of Security Threats
08.3 Need for Specialized Threat Analysis and Protection
08.4 Detection Techniques of Specialized Threat Analysis and Protection
08.4.1 Sandboxing
08.4.2 Emulation
08.4.3 Big Data Analysis
08.4.4 Containerization
08.5 Functionalities Involved in Specialized Threat Analysis and Protection
08.5.1 Endpoint Security
08.5.2 Web Security
08.5.3 Messaging Security
08.5.4 Network Security
08.5.5 Security Management
08.5.6 Vulnerability Management
08.5.7 Cloud-based Security
08.6 Components of Specialized Threat Analysis and Protection
08.6.1 Identity and Access Management
08.6.2 Encryption
08.6.3 Intrusion Detection and Prevention
08.6.4 Advanced Security Software
09. Market Landscape
09.1 Market Overview
09.2 Product Life Cycle Analysis
09.3 Global Specialized Threat Analysis and Protection Market
09.3.1 Market Size and Forecast
09.4 Five Forces Analysis
10. Geographical Segmentation
10.1 Global Specialized Threat Analysis and Protection Market by Geography 2014-2019
10.2 Global Specialized Threat Analysis and Protection Market by Geography 2014-2019 (Revenue)
10.2.1 Specialized Threat Analysis and Protection Market in Americas
10.2.2 Specialized Threat Analysis and Protection Market in EMEA
10.2.3 Specialized Threat Analysis and Protection Market in APAC
11. Buying Criteria
12. Market Growth Drivers
13. Drivers and their Impact
14. Market Challenges
15. Impact of Drivers and Challenges
16. Market Trends
16.1.1 Mergers and Acquisitions
17. Trends and their Impact
18. Vendor Landscape
18.1 Competitive Scenario
18.2 News Updates
18.2.1 Key News
18.3 List of Key Vendors 2014
18.4 Description of Key Vendors
18.4.1 Check Point Software Technologies
18.4.2 Cisco Systems
18.4.3 EMC²
18.4.4 Fortinet
18.4.5 McAfee
18.4.6 Palo Alto Networks
18.4.7 Symantec
18.4.8 Trend Micro
18.5 Other Prominent Vendors
19. Key Vendor Analysis
19.1 Check Point Software Technologies
19.1.1 Key Facts
19.1.2 Business Overview
19.1.3 Business Strategy
19.1.4 Recent Developments
19.1.5 SWOT Analysis
19.2 Cisco Systems
19.2.1 Key Facts
19.2.2 Business Overview
19.2.3 Business Segmentation by Revenue
19.2.4 Geographical Segmentation by Revenue
19.2.5 Business Strategy
19.2.6 Key Information
19.2.7 SWOT Analysis
19.3 EMC²
19.3.1 Key Facts
19.3.2 Business Overview
19.3.3 Business Segmentation by Revenue 2013
19.3.4 Business Segmentation by Revenue 2012 and 2013
19.3.5 Geographical Segmentation by Revenue 2013
19.3.6 Business Strategy
19.3.7 Recent Developments
19.3.8 SWOT Analysis
19.4 Fortinet
19.4.1 Key Facts
19.4.2 Business Overview
19.4.3 Business Segmentation by Revenue
19.4.4 Business Segmentation by Revenue
19.4.5 Geographical Segmentation by Revenue
19.4.6 Business Strategy
19.4.7 Key Information
19.4.8 Recent Developments
19.4.9 SWOT Analysis
19.5 McAfee
19.5.1 Key Facts
19.5.2 Business Overview
19.5.3 Product Segmentation
19.5.4 Key Locations
19.5.5 Business Strategy
19.5.6 Recent Developments
19.5.7 SWOT Analysis
19.6 Symantec
19.6.1 Key Facts
19.6.2 Business Overview
19.6.3 Business Segmentation by Revenue 2013
19.6.4 Business Segmentation by Revenue 2013 and 2014
19.6.5 Geographical Segmentation by Revenue 2013
19.6.6 Business Strategy
19.6.7 Recent Developments
19.6.8 SWOT Analysis
19.7 Trend Micro
19.7.1 Key Facts
19.7.2 Business Overview
19.7.3 Geographical Segmentation by Revenue 2012 and 2013
19.7.4 Geographical Segmentation by Revenue 2013
19.7.5 Business Strategy
19.7.6 Recent Developments
19.7.7 SWOT Analysis
20. Other Reports in this Series
Research Framework
Technavio presents a detailed picture of the market by way of study, synthesis, and summation of data from multiple sources. The analysts have presented the various facets of the market with a particular focus on identifying the key industry influencers. The data thus presented is comprehensive, reliable, and the result of extensive research, both primary and secondary.
INFORMATION SOURCES
Primary sources
Secondary sources
DATA ANALYSIS
Data Synthesis
Data Validation
REPORT WRITING
Qualitative
Quantitative
Get the report (PDF) sent to your email within minutes.
Complimentary full Excel data with your report purchase.
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Quick Report Overview:
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. You may change your settings based on a legitimate interest at any time, by selecting “Manage Settings” on our site. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to.
The information does not usually directly identify you, but it can give you a more personalised web experience. Because we respect your right to privacy. Click on the different category headings to find out more. These cookies will be stored in your browser only with your consent. Please read our Privacy & Cookie Notice. before managing your preferences.
Read moreThese cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. These cookies are essential in order to enable You to move around the site and use its features, such as accessing secure areas of the site. These cookies do not store any personally identifiable information.
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers like Freshdesk, Piwik whose services we have added to our pages. These cookies cannot track your browsing activity on other websites. All information these cookies collect is anonymous and is only used to improve how this website works. If you do not allow these cookies we will not know when you have visited our site and will not be able to monitor its performance.
This website uses Google Analytics, a web analytics service provided by Google, Inc. (Google). These cookies are used to calculate visitor, session, and campaign data, and to keep track of site usage for this site’s analytics report. These cookies store the behaviour of each user’s information such as your login information, what pages you visit, how long you stayed on the page, the device you were using, your time zone, what language you’re using, where you’re logging in from, and the operating system of the device you are on. Such information is necessary for a website’s digital marketing efforts, increasing the chances of campaign success by tailoring content to the target audience.