Enjoy complimentary customisation on priority with our Enterprise License!
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Advantages and Disadvantages
06.2 Working of Access Control Systems
06.3 Working of Surveillance Systems
06.4 Working of Perimeter Intrusion Prevention Systems
06.5 Stages of Cyber Security Solution
07. Market Landscape
07.1 Market Overview
07.1.1 Market Structure
07.1.2 Market Size and Forecast
07.2 Five Forces Analysis
08. Market Scenario by 2019
09. Product Life Cycle Analysis
10. Market Segmentation by Product
10.1 Global Utility Infrastructure Security Market by Product 2014
10.2 Global Utility Infrastructure Security Market by Product 2014-2019
10.3 Global Utility Infrastructure Security Market by Physical Security
10.3.1 Market Size and Forecast
10.4 Global Utility Infrastructure Security Market by Cyber Security
10.4.1 Market Size and Forecast
11. Market Segmentation by Application
11.1 Global Utility Infrastructure Security Market by Application 2014
12. Market Segmentation by End-users
12.1 Global Utility Infrastructure Security Market by End-users 2014
12.2 Global Utility Infrastructure Security Market by End-users 2014-2019
12.3 Global Utility Infrastructure Security Market by Electricity Sector
12.3.1 Market Size and Forecast
12.4 Global Utility Infrastructure Security Market by Oil and Gas Sector
12.4.1 Market Size and Forecast
13. Geographical Segmentation
13.1 Global Utility Infrastructure Security Market by Geographical Segmentation 2014
13.2 Global Utility Infrastructure Security Market by Geographical Segmentation 2014-2019
13.2.1 Global Utility Infrastructure Security Market by Geographical Segmentation 2014-2019 (US$ billion)
13.2.2 Utility Infrastructure Security Market in Americas
13.2.3 Utility Infrastructure Security Market in EMEA Region
13.2.4 Utility Infrastructure Security Market in APAC Region
14. Market Attractiveness
14.1 Market Attractiveness by Geography
14.2 Market Attractiveness by End-user
14.3 Market Attractiveness by Product
15. Buying Criteria
16. Market Growth Drivers
17. Drivers and their Impact
18. Market Challenges
19. Impact of Drivers and Challenges
20. Market Trends
21. Trends and their Impact
22. Vendor Landscape
22.1 Competitive Scenario
22.2 Vendor Analysis 2014
22.2.1 Comparison of the Vendors based on the Products
22.2.2 Mergers and Acquisitions
22.3 Other Prominent Vendors
23. Key Vendor Analysis
23.1 Axis Communications
23.1.1 Key Facts
23.1.2 Business Overview
23.1.3 Key Products
23.1.4 Customer Segmentation
23.1.5 Geographical Segmentation by Revenue 2013
23.1.6 Business Strategy
23.1.7 Recent Developments
23.1.8 SWOT Analysis
23.2 Bosch Security Systems
23.2.1 Key Facts
23.2.2 Business Overview
23.2.3 Product Segmentation
23.2.4 SWOT Analysis
23.3 Honeywell Security Group
23.3.1 Key Facts
23.3.2 Business Overview
23.3.3 Key Product Offerings
23.3.4 Recent Developments
23.3.5 SWOT Analysis
23.4 Lockheed Martin
23.4.1 Key Facts
23.4.2 Business Overview
23.4.3 Business Segmentation by Revenue 2013
23.4.4 Business Segmentation by Revenue 2012 and 2013
23.4.5 Business Strategy
23.4.6 Recent Developments
23.4.7 SWOT Analysis
23.5 NICE Systems
23.5.1 Key Facts
23.5.2 Business Overview
23.5.3 Business Segmentation by Revenue 2013
23.5.4 Business Segmentation by Revenue 2012 and 2013
23.5.5 Geographical Segmentation by Revenue 2013
23.5.6 Business Strategy
23.5.7 Recent Developments
23.5.8 SWOT Analysis
23.6 Schneider Electric
23.6.1 Key Facts
23.6.2 Key Information
23.6.3 Business Overview
23.6.4 Business Segmentation by Revenue 2013
23.6.5 Business Segmentation by Revenue 2012 and 2013
23.6.6 Geographical Segmentation by Revenue 2013
23.6.7 Business Strategy
23.6.8 Recent Developments
23.6.9 SWOT Analysis
24. Key Insights
24.1 Region-wise Adoption of Physical Security Devices
24.2 Country-wise Adoption of Utility Infrastructure Security Solutions
24.3 Sector-wise Adoption of Physical Security Devices
24.4 Adoption Rate of Applications 2014-2019
25. Other Reports in this Series
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Cookie Policy
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.