A quick peek into the report
Table of Contents
1 | EXECUTIVE SUMMARY |
2.1 | MARKET DEFINITION |
2.2 | REPORT COVERAGE |
2.2.1 | MARKET CLASSIFICATION |
2.2.1.1 | MARKET SEGMENTATION BY CYBER SECURITY SOLUTIONS |
2.2.1.2 | MARKET SEGMENTATION BY CYBER SECURITY SERVICES |
2.2.1.3 | MARKET SEGMENTATION BY APPLICATION VERTICALS |
2.2.1.4 | MARKET SEGMENTATION BY COUNTRIES |
2.3 | STAKEHOLDERS |
3.1 | RESEARCH FLOW |
3.2 | FACTOR ANALYSIS |
3.2.1 | DEMAND SIDE FACTORS |
3.2.2 | SUPPLY SIDE FACTORS |
3.3 | RESEARCH DESIGN |
3.3.1 | PARAMETERS |
3.3.2 | SECONDARY RESEARCH |
3.3.2.1 | KEY DATA POINTS FROM SECONDARY SOURCES |
3.3.3 | PRIMARY RESEARCH |
3.3.3.1 | KEY DATA POINTS FROM PRIMARY SOURCES |
3.3.4 | DATA TRIANGULATION |
3.3.4.1 | BOTTOM UP APPROACH |
3.3.4.2 | TOP DOWN APPROACH |
3.4 | ASSUMPTIONS |
3.5 | YEARS CONSIDERED |
4.1 | INTRODUCTION |
4.2 | HISTORY AND EVOLUTION OF CYBER CRIMES GLOBALLY |
4.3 | CYBERCRIMES IMPACT IN THE GCC REGION |
4.4 | CYBER SECURITY BENEFITS IN THE GCC REGION |
4.5 | CYBER ATTACKS CLASSIFICATION |
4.6 | CYBER SECURITY TECHNOLOGICAL OVERVIEW |
4.7 | MARKET DYNAMICS |
4.7.1 | INTRODUCTION |
4.7.2 | MARKET DRIVERS |
4.7.2.1 | PROLIFERATION OF CYBER ATTACKS |
4.7.2.2 | INCREASED GOVERNMENT ACKNOWLEDGMENT FOR CYBER SECURITY |
4.7.3 | MARKET CHALLENGES |
4.7.3.1 | UNDER SKILLED WORKFORCE |
4.7.4 | MARKET OPPORTUNITIES |
4.7.4.1 | NEW TECHNOLOGICAL ADVANCEMENTS LIKE BIG DATA AND INTERNET OF THINGS (IOT) |
4.7.4.2 | EMERGING MARKET FOR SMART DEVICES |
5.1 | INTRODUCTION |
5.2 | KEY MARKET DEVELOPMENT TRENDS |
5.3 | PARTNERSHIPS, COLLABORATIONS AND AGREEMENTS |
5.4 | PRODUCT LAUNCH |
5.5 | ACQUISITIONS |
5.6 | BUSINESS EXPANSION |
5.7 | PORTER’S FIVE FORCES ANALYSIS |
5.7.1 | THREAT OF NEW ENTRANTS |
5.7.2 | BARGAINING POWER OF BUYERS |
5.7.3 | BARGAINING POWER OF SUPPLIERS |
5.7.4 | THREAT OF SUBSTITUTE PRODUCTS OR SERVICES |
5.7.5 | RIVALRY AMONG EXISTING FIRMS |
6.1 | INTRODUCTION |
6.2 | LAWS /REGULATORY BODIES |
6.3 | PATENTS |
6.4 | STANDARDS |
6.5 | VALUE CHAIN ANALYSIS |
6.5.1 | CYBER SECURITY PROBLEM RECOGNITION |
6.5.2 | CYBER SECURITY SERVICE PROVIDERS |
6.5.3 | CYBER SECURITY SOLUTION PROVIDERS |
6.5.4 | DISTRIBUTORS |
7.1 | INTRODUCTION |
7.1.1 | MARKET STATISTICS |
7.2 | GCC CYBER SECURITY MARKET BY SOLUTIONS |
7.2.1 | INTRODUCTION |
7.2.1.1 | MARKET STATISTICS |
7.2.2 | NETWORK SECURITY |
7.2.2.1 | INTRODUCTION |
7.2.2.2 | KEY FACTS |
7.2.2.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.2.3 | ENDPOINT SECURITY |
7.2.3.1 | INTRODUCTION |
7.2.3.2 | KEY FACTS |
7.2.3.3 | SIGNIFICANT DEVELOPMENTS AND KEY PLAYERS |
7.2.4 | CONTENT SECURITY |
7.2.4.1 | INTRODUCTION |
7.2.4.2 | KEY FACTS |
7.2.4.3 | SIGNIFICANT DEVELOPMENTS AND KEY PLAYERS |
7.2.5 | APPLICATION SECURITY |
7.2.5.1 | INTRODUCTION |
7.2.5.2 | KEY FACTS |
7.2.5.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.2.6 | INDUSTRIAL CONTROL SYSTEM SECURITY |
7.2.6.1 | INTRODUCTION |
7.2.6.2 | KEY FACTS |
7.2.6.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.2.7 | CLOUD SECURITY |
7.2.7.1 | INTRODUCTION |
7.2.7.2 | KEY FACTS |
7.2.7.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3 | GCC CYBER SECURITY MARKET BY SERVICES |
7.3.1 | INTRODUCTION |
7.3.1.1 | MARKET STATISTICS |
7.3.2 | CYBER SECURITY CONSULTING SERVICES |
7.3.2.1 | INTRODUCTION |
7.3.2.2 | KEY FACTS |
7.3.2.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.3 | CYBER SECURITY RISK ASSESSMENT SERVICES |
7.3.3.1 | INTRODUCTION |
7.3.3.2 | KEY FACTS |
7.3.3.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.4 | CYBER SECURITY DESIGN AND INTEGRATION SERVICES |
7.3.4.1 | INTRODUCTION |
7.3.4.2 | KEY FACT |
7.3.4.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.5 | TRAINING AND EDUCATION SERVICES |
7.3.5.1 | INTRODUCTION |
7.3.5.2 | KEY FACTS |
7.3.5.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.6 | OTHERS |
8.1 | INTRODUCTION |
8.1.1 | MARKET STATISTICS |
8.2 | BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI) SECTOR |
8.2.1 | INTRODUCTION |
8.2.2 | MARKET STATISTICS |
8.2.3 | KEY FACTS |
8.2.4 | KEY DEVELOPMENTS AND PLAYERS |
8.3 | AEROSPACE AND DEFENCE SECTOR |
8.3.1 | INTRODUCTION |
8.3.2 | MARKET STATISTICS |
8.3.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.4 | HEALTHCARE SECTOR |
8.4.1 | INTRODUCTION |
8.4.2 | MARKET STATISTICS |
8.4.3 | SIGNIFICANT FACTS |
8.4.4 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.5 | TELECOMMUNICATION SECTOR |
8.5.1 | INTRODUCTION |
8.5.2 | MARKET STATISTICS |
8.5.3 | KEY FACTS |
8.5.4 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.6 | MANUFACTURING SECTOR |
8.6.1 | INTRODUCTION |
8.6.2 | MARKET STATISTICS |
8.6.3 | KEY FACTS |
8.6.4 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.6.5 | OTHERS |
8.6.5.1 | MARKET STATISTICS |
9.1 | INTRODUCTION |
9.1.1 | MARKET STATISTICS |
9.2 | UNITED ARAB EMIRATES (U.A.E) |
9.2.1 | POTENTIAL FACTS |
9.2.2 | MARKET STATISTICS |
9.2.3 | KEY CYBER ATTACKS |
9.2.4 | KEY REGULATORY BODIES/REGULATION/LAWS |
9.2.5 | KEY DEVELOPMENTS |
9.2.6 | KEY PLAYERS |
9.2.7 | KEY FACTORS DRIVING THE MARKET |
9.3 | SAUDI ARABIA |
9.3.1 | POTENTIAL FACTS |
9.3.2 | MARKET STATISTICS |
9.3.3 | KEY CYBER ATTACKS/THREATS |
9.3.4 | KEY ACTS/LAWS |
9.3.5 | KEY DEVELOPMENTS |
9.3.6 | KEY PLAYERS |
9.3.7 | KEY FACTORS DRIVING THE MARKET |
9.4 | QATAR |
9.4.1 | POTENTIAL FACTS |
9.4.2 | MARKET STATISTICS |
9.4.3 | KEY CYBER ATTACKS/THREATS IN QATAR |
9.4.4 | KEY REGULATORY BODY/LAW |
9.4.5 | KEY DEVELOPMENTS |
9.4.6 | KEY PLAYERS |
9.4.7 | KEY FACTORS DRIVING THE MARKET |
9.5 | KUWAIT |
9.5.1 | POTENTIAL FACTS |
9.5.2 | MARKET STATISTICS |
9.5.3 | CYBER ATTACKS/THREATS |
9.5.4 | KEY LAW |
9.5.5 | KEY DEVELOPMENTS |
9.5.6 | KEY PLAYERS |
9.5.7 | KEY FACTORS DRIVING THE MARKET |
9.6 | BAHRAIN |
9.6.1 | POTENTIAL FACTS |
9.6.2 | MARKET STATISTICS |
9.6.3 | CYBER ATTACKS/THREATS |
9.6.4 | KEY LAW |
9.6.5 | KEY DEVELOPMENTS |
9.6.6 | KEY PLAYERS |
9.6.7 | KEY FACTORS DRIVING THE MARKET |
9.7 | OMAN |
9.7.1 | POTENTIAL FACTS |
9.7.2 | MARKET STATISTICS |
9.7.3 | KEY CYBER ATTACKS/THREATS |
9.7.4 | KEY LAW |
9.7.5 | KEY DEVELOPMENTS |
9.7.6 | KEY PLAYERS |
9.7.7 | KEY FACTORS DRIVING THE MARKET |
10.1 | KEY CYBER SECURITY SOLUTION PROVIDERS |
10.1.1 | CISCO CORPORATION |
10.1.1.1 | OVERVIEW |
10.1.1.2 | FINANCIALS |
10.1.1.2.1 | OVERALL FINANCIALS |
10.1.1.3 | NET REVENUE BY BUSINESS SEGMENTS |
10.1.1.4 | KEY DEVELOPMENTS AND STRATEGIES (2015) |
10.1.2 | MCAFEE CORPORATION |
10.1.2.1 | OVERVIEW |
10.1.2.2 | FINANCIALS |
10.1.2.2.1 | OVERALL FINANCIALS |
10.1.2.3 | KEY DEVELOPMENTS AND STRATEGIES (2013-2015) |
10.1.3 | CASSIDIAN CYBERSECURITY COMPANY |
10.1.3.1 | OVERVIEW |
10.1.3.2 | KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
10.1.4 | FORTINET INC |
10.1.4.1 | OVERVIEW |
10.1.4.2 | FINANCIALS |
10.1.4.2.1 | OVERALL REVENUE |
10.1.5 | TREND MICRO INC |
10.1.5.1 | OVERVIEW |
10.1.5.2 | FINANCIALS |
10.1.5.2.1 | OVERALL REVENUE |
10.2 | KEY CYBER SECURITY SERVICE PROVIDERS |
10.2.1 | BOOZ ALLEN HAMILTON CORPORATION |
10.2.1.1 | OVERVIEW |
10.2.1.2 | FINANCIALS |
10.2.1.2.1 | OVERALL FINANCIALS |
10.2.1.3 | KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
10.2.2 | COMPUTER SCIENCE CORPORATION (CSC) |
10.2.2.1 | OVERVIEW |
10.2.2.2 | FINANCIALS |
10.2.2.2.1 | OVERALL FINANCIALS |
10.2.2.3 | KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
10.2.3 | FIREEYE INC |
10.2.3.1 | OVERVIEW |
10.2.3.2 | FINANCIALS |
10.2.3.2.1 | OVERALL REVENUE |
10.2.4 | KASPERSKY LAB |
10.2.4.1 | OVERVIEW |
10.2.4.2 | FINANCIALS |
10.2.5 | SYMANTEC CORPORATION |
10.2.5.1 | OVERVIEW |
10.2.5.2 | FINANCIALS |
10.2.5.2.1 | OVERALL REVENUE |
TABLE 1 | SIGNIFICANT FACTS RELATED TO THE POTENTIAL OF CYBER SECURITY MARKET FOR THE GCC COUNTRIES |
TABLE 2 | MARKET ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY MARKET: CONSIDERATIONS AND CROSS MAPPING |
TABLE 3 | ASSUMPTION TABLE |
TABLE 4 | SIGNIFICANT CYBER THREATS PREVALENT IN THE GCC REGION |
TABLE 5 | SIGNIFICANT TECHNOLOGICAL SOLUTION AND KEY DEVELOPMENT IN THE GCC REGION |
TABLE 6 | MARKET DRIVERS: IMPACT ANALYSIS |
TABLE 7 | MARKET CHALLENGE IMPACT ANALYSIS |
TABLE 8 | MARKET OPPORTUNITIES IMPACT ANALYSIS |
TABLE 9 | PARTNERSHIPS, COLLABORATIONS AND AGREEMENTS IN THE GCC CYBER SECURITY MARKET |
TABLE 10 | PRODUCT LAUNCH IN THE GCC CYBER ECURITY MARKET |
TABLE 11 | ACQUISITIONS IN THE GCC CYBER SECURITY MARKET |
TABLE 12 | BUSINESS EXPANSION IN THE GCC CYBER SECURITY MARKET |
TABLE 13 | BUYERS AND SUPPLIERS IN GCC CYBER SECURITY MARKET |
TABLE 14 | KEY FACTORS CONSIDERED FOR THREAT FROM NEW ENTRANTS: GCC CYBER SECURITY MARKET |
TABLE 15 | KEY FACTORS AFFECTING BARGAINING POWER OF BUYERS: GCC CYBER SECURITY MARKET |
TABLE 16 | KEY FACTORS AFFECTING THE BARGAINING POWER OF SUPPLIERS: GCC CYBER SECURITY MARKET |
TABLE 17 | KEY FACTORS AFFECTING THREAT OF SUBSTITUTE PRODUCTS OR SERVICES: GCC CYBER SECURITY MARKET |
TABLE 18 | KEY FACTORS DETERMINING RIVALRY AMONG EXISTING FIRMS: GCC CYBER SECURITY MARKET |
TABLE 19 | KEY LAWS AND REGULATORY BODY: GCC CYBER SECURITY |
TABLE 20 | SOME KEY PLAYER’S PATENTS IN THE CYBER SECURITY MARKET |
TABLE 21 | KEY STANDARDS FOR CYBER SECURITY MARKET IN THE GULF REGION |
TABLE 22 | GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS AND SERVICES ($BILLION), 2015-2022 |
TABLE 23 | MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SOLUTIONS |
TABLE 24 | GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($MILLION), 2015-2022 |
TABLE 25 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE APPLICATION VERTICALS ($MILLION ), 2015-2022 |
TABLE 26 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN GCC COUNTRIES ($MILLION ), 2015-2022 |
TABLE 27 | SIGNIFICANT DEVELOPMENTS: NETWORK SECURITY IN GCC REGION |
TABLE 28 | SIGNIFICANT DEVELOPMENTS: ENDPOINT SECURITY IN THE GCC REGION |
TABLE 29 | SIGNIFICANT DEVELOPMENTS: CONTENT SECURITY IN THE GCC REGION |
TABLE 30 | SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION |
TABLE 31 | SIGNIFICANT DEVELOPMENTS: INDUSTRIAL CONTROL SECURITY IN THE GCC REGION |
TABLE 32 | SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION |
TABLE 33 | MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SERVICES |
TABLE 34 | GCC CYBER SECURITY MARKET VALUE BY SERVICES ($MILLION ), 2015-2022 |
TABLE 35 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN APPLICATION VERTICALS ($MILLION), 2015-2022 |
TABLE 36 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 37 | SIGNIFICANT DEVELOPMENTS: CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION |
TABLE 38 | SIGNIFICANT DEVELOPMENTS: CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION |
TABLE 39 | SIGNIFICANT DEVELOPMENTS: CYBER SECURITY INTEGRATION AND DESIGN SERVICES IN THE GCC REGION |
TABLE 40 | CYBER SECURITY TRAINING SERVICES IN THE GCC REGION: SIGNIFICANT DEVELOPMENTS |
TABLE 41 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS ($ MILLION), 2015-2022 |
TABLE 42 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE BFSI APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 43 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($ MILLION), 2015-2022 |
TABLE 44 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE BFSI DOMAIN ($MILLION), 2015-2022 |
TABLE 45 | GCC CYBER SECURITY MARKET VALUE OF BFSI APPLICATION VERTICAL BY GCC COUNTRIES ($ MILLION), 2015-2022 |
TABLE 46 | GCC CYBER SECURITY BY BANKING AND FINANCIAL SECTOR: SIGNIFICANT DEVELOPMENTS |
TABLE 47 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE AEROSPACE AND DEFENCE APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 48 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($MILLION), 2015-2022 |
TABLE 49 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE AEROSPACE AND DEFENCE DOMAIN ($MILLION), 2015-2022 |
TABLE 50 | GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 51 | GCC CYBER SECURITY BY AEROSPACE AND DEFENCE SECTOR: KEY DEVELOPMENTS |
TABLE 52 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE HEALTHCARE APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 53 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022 |
TABLE 54 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022 |
TABLE 55 | GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 56 | GCC CYBER SECURITY BY HEALTHCARE SECTOR: SIGNIFICANT DEVELOPMENTS |
TABLE 57 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE TELECOMMUNICATION APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 58 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE TELECOMMUNICATION DOMAIN ($MILLION), 2015-2022 |
TABLE 59 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE TELECOMMUNICATION DOMAIN ($MILLION), 2015-2022 |
TABLE 60 | GCC CYBER SECURITY MARKET VALUE OF TELECOMMUNICATION APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 61 | GCC CYBER SECURITY BY TELECOMMUNICATION SECTOR: SIGNIFICANT DEVELOPMENTS |
TABLE 62 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE MANUFACTURING APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 63 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022 |
TABLE 64 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022 |
TABLE 65 | GCC CYBER SECURITY MARKET VALUE OF MANUFACTURING APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 66 | GCC CYBER SECURITY BY MANUFACTURING SECTOR: KEY DEVELOPMENTS |
TABLE 67 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OTHER APPLICATION(RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION), 2015-2022 |
TABLE 68 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION), 2015-2022 |
TABLE 69 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL ($MILLION), 2015-2022 |
TABLE 70 | GCC CYBER SECURITY MARKET VALUE OF OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 71 | GCC CYBER SECURITY MARKET VALUE BY COUNTRIES ($MILLION), 2015-2022 |
TABLE 72 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE U.A.E ($MILLION), 2015-2022 |
TABLE 73 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN THE U.A.E ($MILLION), 2015-2022 |
TABLE 74 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN THE UAE |
TABLE 75 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN SAUDI ARABIA ($MILLION), 2015-2022 |
TABLE 76 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN SAUDI ARABIA ($MILLION), 2015-2022 |
TABLE 77 | SIGNIFICANT CYBER ATTACKS/THREATS IN SAUDI ARABIA |
TABLE 78 | SAUDI ARABIA CYBER SECURITY LAW ILLUSTRATION |
TABLE 79 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN SAUDI ARABIA |
TABLE 80 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN QATAR ($MILLION), 2015-2022 |
TABLE 81 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN QATAR ($MILLION), 2015-2022 |
TABLE 82 | SIGNIFICANT CYBER ATTACKS/THREATS IN QATAR |
TABLE 83 | QATAR CYBER SECURITY REGULATORY BODY AND LAWS ILLUSTRATION |
TABLE 84 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN QATAR |
TABLE 85 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN KUWAIT ($MILLION), 2015-2022 |
TABLE 86 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN KUWAIT ($MILLION), 2015-2022 |
TABLE 87 | SIGNIFICANT CYBER ATTACKS/THREATS IN KUWAIT |
TABLE 88 | KUWAIT CYBER SECURITY LAW ILLUSTRATION |
TABLE 89 | CYBER SECURITY SIGNIFICANT DEVELOPMENTS IN KUWAIT |
TABLE 90 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN BAHRAIN ($MILLION), 2015-2022 |
TABLE 91 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN BAHRAIN ($MILLION), 2015-2022 |
TABLE 92 | SIGNIFICANT CYBER ATTACKS/THREATS IN BAHRAIN |
TABLE 93 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN BAHRAIN |
TABLE 94 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OMAN ($MILLION), 2015-2022 |
TABLE 95 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN OMAN ($MILLION), 2015-2022 |
TABLE 96 | SIGNIFICANT CYBER ATTACKS/THREATS IN OMAN |
TABLE 97 | ILLUSTRATION OF OMAN CYBER SECURITY LAW |
TABLE 98 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN OMAN |
TABLE 99 | CISCO CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 24, 2015 ($BILLION) |
TABLE 100 | CISCO CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2015) |
TABLE 101 | MCAFEE CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 13, 2015 ($MILLION) |
TABLE 102 | MCAFEE CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2013-2015) |
TABLE 103 | CASSIDIAN CYBER SECURITY COMPANY: KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
TABLE 104 | BOOZ ALLEN HAMILTON: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION) |
TABLE 105 | BOOZ ALLEN HAMILTON CORPORTION: KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
TABLE 106 | COMPUTER SCIENCE CORPORATION: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION) |
TABLE 107 | COMPUTER SCIENCE CORPORATION (CSC): KEY DEVELOPMENTS AND STRATEGIES (2013-2015) |
FIGURE 1 | GCC CYBER SECURITY MARKET SIZE SNAPSHOT |
FIGURE 2 | GCC CYBER SECURITY MARKET SHARE BY SOLUTIONS AND SERVICES (%)2015 |
FIGURE 3 | GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($BILLION), 2015-2022 |
FIGURE 4 | GCC CYBER SECURITY MARKET SHARE BY SERVICES , 2015-2022 |
FIGURE 5 | GCC CYBER SECURITY MARKET SHARE BY APPLICATION VERTICAL, 2015-2022 |
FIGURE 6 | GCC CYBER SECURITY MARKET BY COUNTRIES, 2015-2022 |
FIGURE 7 | REPORT COVERAGE SNAPSHOT: GCC CYBER SECURITY MARKET |
FIGURE 8 | MARKET CLASSIFICATION |
FIGURE 9 | KEY ELEMENTS CONSIDERED FOR DETAILED ANALYSIS OF EACH CLASSIFICATION IN THE GCC CYBER SECURITY MARKET |
FIGURE 10 | GCC CYBER SECURITY: MARKET SEGMENTATION BY SOLUTIONS |
FIGURE 11 | GCC CYBER SECURITY: MARKET SEGMENTATION BY SERVICES |
FIGURE 12 | GCC CYBER SECURITY: MARKET SEGMENTATION BY APPLICATION VERTICALS |
FIGURE 13 | GCC CYBER SECURITY: MARKET SEGMENTATION BY COUNTRIES |
FIGURE 14 | KEY STAKEHOLDERS |
FIGURE 15 | RESEARCH FLOW |
FIGURE 16 | DEMAND SIDE FACTORS |
FIGURE 17 | SUPPLY SIDE FACTORS |
FIGURE 18 | PARAMETERS |
FIGURE 19 | DATA POINTS FROM SECONDARY SOURCES |
FIGURE 20 | DATA POINTS FROM PRIMARY SOURCES |
FIGURE 21 | DATA TRIANGULATION |
FIGURE 22 | BOTTOM UP APPROACH |
FIGURE 23 | TOP DOWN APPROACH |
FIGURE 24 | YEARS CONSIDERED |
FIGURE 25 | MARKET OVERVIEW: KEY ELEMENTS COVERED |
FIGURE 26 | HISTORY OF SIGNIFICANT CYBER ATTACKS |
FIGURE 27 | CYBER SECURITY BENEFITS IN THE GCC REGION |
FIGURE 28 | MARKET DYNAMICS |
FIGURE 29 | KEY DRIVERS FOR THE GCC CYBER SECURITY MARKET |
FIGURE 30 | GOVERNMENT INITIATIVES FOR CYBER SECURITY IN THE GCC REGION |
FIGURE 31 | SKILL GAPS |
FIGURE 32 | GCC CYBER SECURITY MARKET OPPORTUNITIES |
FIGURE 33 | COMPETITIVE OVERVIEW: GCC CYBER SECURITY MARKET |
FIGURE 34 | KEY MARKET DEVELOPMENT STRATEGIES |
FIGURE 35 | KEY TRENDS: GCC CYBER SECURITY MARKET |
FIGURE 36 | KEY PLAYERS IN PARTNERSHIP, COLLABORATION AND AGREEMENTS |
FIGURE 37 | KEY PLAYERS IN PRODUCT LAUNCH IN THE GCC CYBER SECURITY MARKET |
FIGURE 38 | KEY PLAYERS IN THE ACQUISITION IN THE GCC CYBER SECURITY MARKET |
FIGURE 39 | KEY PLAYERS IN THE GCC CYBER SECURITY MARKET |
FIGURE 40 | PORTER FIVE FORCES ANALYSIS FRAMEWORK |
FIGURE 41 | IMPACT OF EACH PORTER’S FIVE FORCES ON THE GCC CYBER SECURITY MARKET |
FIGURE 42 | VALUE CHAIN |
FIGURE 43 | GCC CYBER SECURITY MARKET BY SOLUTIONS AND SERVICES: SECTION COVERAGE |
FIGURE 44 | SOLUTIONS AND SERVICES: STATISTICAL COVERAGE |
FIGURE 45 | GCC CYBER SECURITY MARKET BY SOLUTIONS |
FIGURE 46 | NETWORK SECURITY COMPONENTS |
FIGURE 47 | NETWORK SECURITY IN THE GCC REGION: KEY FACTS |
FIGURE 48 | SOME KEY NETWORK SECURITY VENDORS: GCC REGION |
FIGURE 49 | ENDPOINT SECURITY: SNAPSHOT |
FIGURE 50 | KEY ELEMENTS IN THE ENDPOINT SECURITY MANAGEMENT |
FIGURE 51 | KEY FACTS: ENDPOINT SECURITY IN THE GCC REGION |
FIGURE 52 | KEY ENDPOINT SECURITY VENDORS: GCC REGION |
FIGURE 53 | PROCESS OF CROSS SITE SCRIPTING ATTACK |
FIGURE 54 | CONTENT SECURITY IN THE GCC REGION: KEY FACTS |
FIGURE 55 | KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 56 | APPLICATION SECURITY IMPLEMENTATION IN SDLC |
FIGURE 57 | APPLICATION SECURITY: KEY ELEMENTS |
FIGURE 58 | KEY FACTS: APPLICATION SECURITY IN THE GCC REGION |
FIGURE 59 | KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 60 | INDUSTRIAL CONTROL SYSTEM TYPES |
FIGURE 61 | KEY FACTS: INDUSTRIAL CONTROL SYSTEM SECURITY IN THE GCC REGION |
FIGURE 62 | KEY INDUSTRIAL CONTROL SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 63 | CLOUD SECURITY: KEY ELEMENTS |
FIGURE 64 | CLOUD SECURITY IN THE GCC REGION: KEY FACTS |
FIGURE 65 | KEY CLOUD SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 66 | GCC CYBER SECURITY MARKET BY SERVICES |
FIGURE 67 | CYBER SECURITY CONSULTING SERVICES: KEY ELEMENTS |
FIGURE 68 | CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION: KEY FACTS |
FIGURE 69 | KEY CYBER SECURITY CONSULTING PROVIDERS: GCC REGION |
FIGURE 70 | RISK ASSESSMENT IN CYBER SECURITY: KEY STEPS |
FIGURE 71 | CYBER SECURITY RISK ASSESSMENT PROCESS |
FIGURE 72 | CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION: KEY FACTS |
FIGURE 73 | KEY CYBER SECURITY RISK ASSESSMENT PROVIDERS: GCC REGION |
FIGURE 74 | INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORK |
FIGURE 75 | KEY CYBER SECURITY INTEGRATION AND DESIGN SERVICE PROVIDERS: GCC REGION |
FIGURE 76 | CYBER SECURITY TRAINING AND EDUCATION SERVICES: KEY ELEMENTS |
FIGURE 77 | KEY FACTS: CYBER SECURITY TRAINING SERVICES IN THE GULF REGION |
FIGURE 78 | KEY PLAYERS: CYBER SECURITY TRAIINING AND EDUCATION SERVICE PROVIDER IN THE GCC REGION |
FIGURE 79 | OTHER CYBER SECURITY SERVICES |
FIGURE 80 | GCC CYBER SECURITY MARKET SEGMENTATION BY APPLICATION VERTICALS |
FIGURE 81 | APPLICATION VERTICALS: STATISTICAL COVERAGE |
FIGURE 82 | BANKING MALWARE: GCC REGION |
FIGURE 83 | BFSI SECTOR KEY FACTS RELATED TO GCC CYBER SECURITY MARKET |
FIGURE 84 | CYBER ATTACKS: BANKING AND FINANCIAL SECTOR IN THE GCC REGION |
FIGURE 85 | KEY CYBER SECURITY PLAYERS IN THE BANKING AND FINANCIAL SECTOR IN THE GCC REGION |
FIGURE 86 | KEY CYBER SECURITY ELEMENTS: AEROSPACE AND DEFENCE SECTOR |
FIGURE 87 | KEY CYBER SECURITY PLAYERS IN THE AEROSPACE AND DEFENCE SECTOR IN THE GCC REGION |
FIGURE 88 | HEALTHCARE SECTOR SIGNIFICANT FACTS FOR THE GCC CYBER SECURITY MARKET |
FIGURE 89 | KEY CYBER SECURITY PLAYERS IN THE HEALTHCARE SECTOR IN THE GCC REGION |
FIGURE 90 | KEY FACTS RELATED TO TELECOMMUNICATIONS SECTOR FOR THE GCC CYBER SECURITY MARKET |
FIGURE 91 | KEY CYBER SECURITY PLAYERS IN THE TELECOMMUNICATION SECTOR IN THE GCC REGION |
FIGURE 92 | KEY CYBER SECURITY PLAYERS IN THE MANUFACTURING SECTOR IN THE GCC REGION |
FIGURE 93 | GCC REGION: COUNTRIES |
FIGURE 94 | GCC CYBER SECURITY MARKET: COUNTRIES SECTION COVERAGE |
FIGURE 95 | GCC COUNTRY ANALYSIS: STATISTICAL COVERAGE |
FIGURE 96 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN THE UAE |
FIGURE 97 | KEY CYBER SECURITY PLAYERS IN THE U.A.E |
FIGURE 98 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN THE U.A.E |
FIGURE 99 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN SAUDI ARABIA |
FIGURE 100 | KEY CYBER SECURITY PLAYERS IN SAUDI ARABIA |
FIGURE 101 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN SAUDI ARABIA |
FIGURE 102 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN QATAR |
FIGURE 103 | KEY CYBER SECURITY PLAYERS IN QATAR |
FIGURE 104 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN QATAR |
FIGURE 105 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN KUWAIT |
FIGURE 106 | KEY CYBER SECURITY PLAYERS IN KUWAIT |
FIGURE 107 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN KUWAIT |
FIGURE 108 | POTENTIAL FACTS FOR CYBER SECURITY IN BAHRAIN |
FIGURE 109 | KEY CYBER SECURITY PLAYERS IN BAHRAIN |
FIGURE 110 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN BAHRAIN |
FIGURE 111 | POTENTIAL FACTS FOR CYBER SECURITY IN OMAN |
FIGURE 112 | KEY CYBER SECURITY PLAYERS IN OMAN |
FIGURE 113 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN OMAN |
FIGURE 114 | CISCO CORPORATION: OVERALL FINANCIALS, 2013-2015 ($BILLION) |
FIGURE 115 | NET REVENUE BY PRODUCTS AND SERVICES |
FIGURE 116 | MCAFEE CORPORATION: OVERALL FINANCIALS, 2012-2014 ($MILLION) |
FIGURE 117 | FORTINET INC: OVERALL REVENUE, 2012-2014 ($MILLION) |
FIGURE 118 | FORTINET INC: TOTAL REVENE BY REGION ($MILLION) |
FIGURE 119 | TREND MICRO CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION) |
FIGURE 120 | BOOZ ALLEN HAMILTON CORPORATION: OVERALL FINANCIALS, 2012-2014 ($BILLION) |
FIGURE 121 | COMPUTER SCIENCE CORPORATION (CSC): OVERALL FINANCIALS, 2013-2015 ($BILLION) |
FIGURE 122 | FIREEYE CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION) |
FIGURE 123 | SYMANTEC CORPORATION: OVERALL REVENUE, 2013-2015 ($BILLION) |
Report Description
The GCC region has become the centre point for cyber attacks because of the region’s strategic and economic significance. The combination of attacks on Saudi Aramco and the major banks in the GCC region has put most of the Gulf countries towards the attention of various new cyber threats they might face in the future.
Our market study includes an overview and analysis of the GCC Cyber Security market by solutions and services, application verticals and GCC countries, allowing the research to develop a comprehensive outlook of the market. The report provides extensive insights of the different developments, trends and key participants.
While highlighting the key driving and restraining forces for this market, the report also provides a comprehensive section of the prominent laws, patents and standards for the GCC Cyber Security market.
Key Questions Answered in this Report
The answers to the following key questions can be found in the report:
• What are the key market trends and developments in the GCC Cyber Security market
•What is the Cyber Security technological overview in the GCC region
•What are the benefits of cyber security in the GCC region
•What are the different types of cyber attacks prevalent in the GCC region
•What are the key drivers, challenges and opportunities for the Cyber Security market in the GCC region with their impact analysis
•Which key application verticals is utilizing Cyber Security in the GCC region with their market statistics
•What are the important Cyber Security solutions in the GCC region with their market statistics
•What are the important Cyber Security services in the GCC region with their market statistics
•Which GCC country will lead the Cyber Security market by the end of the forecast period
•Who are the key players in the GCC Cyber Security market
Market Overview
The GCC region acquires a significant share of the world’s energy resources and with an increased usage of personal internet and smart devices for banking applications over the past few years, the region has become more exposed to phishing and DDOS attacks. Globally, the United Arab Emirates (U.A.E) is placed at the fifteenth position as a victim of cyber attacks due to the high density of established commercial and government organizations in the country. Increased interconnectivity, digitization, and use of social media within the organizations have made the GCC appear more pregnable to cyber crimes. In 2012, Saudi Aramco, the world’s largest oil company, was hit by a virus attack, which caused large scale damage of about $15 million and loss of critical data. In 2015, around 50% of the organizations faced Distributed Denial of Service (DDOS) attacks.
The GCC Cyber Security market is estimated to grow over $10.41 billion by the end of 2022. Currently, Cyber Security solutions are acquiring a major share of the market because of an increase in the internet users in the GCC region with current estimation being approximately 40 million. Also, 45% of the social networking users in the U.A.E witnessed cyber crimes in 2015.
Cyber space is continually expanding with new and innovative developments like ‘Internet of Things’ and ‘Big Data’, which will add to more levels of complexities and security challenges with regard to the various networks and systems. Therefore, cyber security will prove to be an important element of any organization and will attempt to provide many opportunities to a number of vendors to foster cyber security solutions in the GCC region.
GCC Cyber Security Market - Estimation & Forecast, 2016
Focus on Solutions (Network Security, Endpoint Security & Others), Services (Consulting, Risk Assessment, and Others), Application (BFSI, Telecommunication & Others)