1 | EXECUTIVE SUMMARY |
A quick peek into the report
Table of Contents
EXECUTIVE SUMMARY
RESEARCH SCOPE
2.1 | MARKET DEFINITION |
2.2 | REPORT COVERAGE |
2.2.1 | MARKET CLASSIFICATION |
2.2.1.1 | MARKET SEGMENTATION BY CYBER SECURITY SOLUTIONS |
2.2.1.2 | MARKET SEGMENTATION BY CYBER SECURITY SERVICES |
2.2.1.3 | MARKET SEGMENTATION BY APPLICATION VERTICALS |
2.2.1.4 | MARKET SEGMENTATION BY COUNTRIES |
2.3 | STAKEHOLDERS |
RESEARCH METHODOLOGY
3.1 | RESEARCH FLOW |
3.2 | FACTOR ANALYSIS |
3.2.1 | DEMAND SIDE FACTORS |
3.2.2 | SUPPLY SIDE FACTORS |
3.3 | RESEARCH DESIGN |
3.3.1 | PARAMETERS |
3.3.2 | SECONDARY RESEARCH |
3.3.2.1 | KEY DATA POINTS FROM SECONDARY SOURCES |
3.3.3 | PRIMARY RESEARCH |
3.3.3.1 | KEY DATA POINTS FROM PRIMARY SOURCES |
3.3.4 | DATA TRIANGULATION |
3.3.4.1 | BOTTOM UP APPROACH |
3.3.4.2 | TOP DOWN APPROACH |
3.4 | ASSUMPTIONS |
3.5 | YEARS CONSIDERED |
MARKET OVERVIEW
4.1 | INTRODUCTION |
4.2 | HISTORY AND EVOLUTION OF CYBER CRIMES GLOBALLY |
4.3 | CYBERCRIMES IMPACT IN THE GCC REGION |
4.4 | CYBER SECURITY BENEFITS IN THE GCC REGION |
4.5 | CYBER ATTACKS CLASSIFICATION |
4.6 | CYBER SECURITY TECHNOLOGICAL OVERVIEW |
4.7 | MARKET DYNAMICS |
4.7.1 | INTRODUCTION |
4.7.2 | MARKET DRIVERS |
4.7.2.1 | PROLIFERATION OF CYBER ATTACKS |
4.7.2.2 | INCREASED GOVERNMENT ACKNOWLEDGMENT FOR CYBER SECURITY |
4.7.3 | MARKET CHALLENGES |
4.7.3.1 | UNDER SKILLED WORKFORCE |
4.7.4 | MARKET OPPORTUNITIES |
4.7.4.1 | NEW TECHNOLOGICAL ADVANCEMENTS LIKE BIG DATA AND INTERNET OF THINGS (IOT) |
4.7.4.2 | EMERGING MARKET FOR SMART DEVICES |
COMPETITIVE OVERVIEW
5.1 | INTRODUCTION |
5.2 | KEY MARKET DEVELOPMENT TRENDS |
5.3 | PARTNERSHIPS, COLLABORATIONS AND AGREEMENTS |
5.4 | PRODUCT LAUNCH |
5.5 | ACQUISITIONS |
5.6 | BUSINESS EXPANSION |
5.7 | PORTER’S FIVE FORCES ANALYSIS |
5.7.1 | THREAT OF NEW ENTRANTS |
5.7.2 | BARGAINING POWER OF BUYERS |
5.7.3 | BARGAINING POWER OF SUPPLIERS |
5.7.4 | THREAT OF SUBSTITUTE PRODUCTS OR SERVICES |
5.7.5 | RIVALRY AMONG EXISTING FIRMS |
INDUSTRY ANALYSIS
6.1 | INTRODUCTION |
6.2 | LAWS /REGULATORY BODIES |
6.3 | PATENTS |
6.4 | STANDARDS |
6.5 | VALUE CHAIN ANALYSIS |
6.5.1 | CYBER SECURITY PROBLEM RECOGNITION |
6.5.2 | CYBER SECURITY SERVICE PROVIDERS |
6.5.3 | CYBER SECURITY SOLUTION PROVIDERS |
6.5.4 | DISTRIBUTORS |
GCC CYBER SECURITY MARKET BY SOLUTIONS AND SERVICES
7.1 | INTRODUCTION |
7.1.1 | MARKET STATISTICS |
7.2 | GCC CYBER SECURITY MARKET BY SOLUTIONS |
7.2.1 | INTRODUCTION |
7.2.1.1 | MARKET STATISTICS |
7.2.2 | NETWORK SECURITY |
7.2.2.1 | INTRODUCTION |
7.2.2.2 | KEY FACTS |
7.2.2.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.2.3 | ENDPOINT SECURITY |
7.2.3.1 | INTRODUCTION |
7.2.3.2 | KEY FACTS |
7.2.3.3 | SIGNIFICANT DEVELOPMENTS AND KEY PLAYERS |
7.2.4 | CONTENT SECURITY |
7.2.4.1 | INTRODUCTION |
7.2.4.2 | KEY FACTS |
7.2.4.3 | SIGNIFICANT DEVELOPMENTS AND KEY PLAYERS |
7.2.5 | APPLICATION SECURITY |
7.2.5.1 | INTRODUCTION |
7.2.5.2 | KEY FACTS |
7.2.5.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.2.6 | INDUSTRIAL CONTROL SYSTEM SECURITY |
7.2.6.1 | INTRODUCTION |
7.2.6.2 | KEY FACTS |
7.2.6.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.2.7 | CLOUD SECURITY |
7.2.7.1 | INTRODUCTION |
7.2.7.2 | KEY FACTS |
7.2.7.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3 | GCC CYBER SECURITY MARKET BY SERVICES |
7.3.1 | INTRODUCTION |
7.3.1.1 | MARKET STATISTICS |
7.3.2 | CYBER SECURITY CONSULTING SERVICES |
7.3.2.1 | INTRODUCTION |
7.3.2.2 | KEY FACTS |
7.3.2.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.3 | CYBER SECURITY RISK ASSESSMENT SERVICES |
7.3.3.1 | INTRODUCTION |
7.3.3.2 | KEY FACTS |
7.3.3.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.4 | CYBER SECURITY DESIGN AND INTEGRATION SERVICES |
7.3.4.1 | INTRODUCTION |
7.3.4.2 | KEY FACT |
7.3.4.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.5 | TRAINING AND EDUCATION SERVICES |
7.3.5.1 | INTRODUCTION |
7.3.5.2 | KEY FACTS |
7.3.5.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
7.3.6 | OTHERS |
GCC CYBER SECURITY MARKET BY APPLICATION VERTICALS
8.1 | INTRODUCTION |
8.1.1 | MARKET STATISTICS |
8.2 | BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI) SECTOR |
8.2.1 | INTRODUCTION |
8.2.2 | MARKET STATISTICS |
8.2.3 | KEY FACTS |
8.2.4 | KEY DEVELOPMENTS AND PLAYERS |
8.3 | AEROSPACE AND DEFENCE SECTOR |
8.3.1 | INTRODUCTION |
8.3.2 | MARKET STATISTICS |
8.3.3 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.4 | HEALTHCARE SECTOR |
8.4.1 | INTRODUCTION |
8.4.2 | MARKET STATISTICS |
8.4.3 | SIGNIFICANT FACTS |
8.4.4 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.5 | TELECOMMUNICATION SECTOR |
8.5.1 | INTRODUCTION |
8.5.2 | MARKET STATISTICS |
8.5.3 | KEY FACTS |
8.5.4 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.6 | MANUFACTURING SECTOR |
8.6.1 | INTRODUCTION |
8.6.2 | MARKET STATISTICS |
8.6.3 | KEY FACTS |
8.6.4 | SIGNIFICANT DEVELOPMENTS AND PLAYERS |
8.6.5 | OTHERS |
8.6.5.1 | MARKET STATISTICS |
GCC CYBER SECURITY MARKET BY COUNTRY
9.1 | INTRODUCTION |
9.1.1 | MARKET STATISTICS |
9.2 | UNITED ARAB EMIRATES (U.A.E) |
9.2.1 | POTENTIAL FACTS |
9.2.2 | MARKET STATISTICS |
9.2.3 | KEY CYBER ATTACKS |
9.2.4 | KEY REGULATORY BODIES/REGULATION/LAWS |
9.2.5 | KEY DEVELOPMENTS |
9.2.6 | KEY PLAYERS |
9.2.7 | KEY FACTORS DRIVING THE MARKET |
9.3 | SAUDI ARABIA |
9.3.1 | POTENTIAL FACTS |
9.3.2 | MARKET STATISTICS |
9.3.3 | KEY CYBER ATTACKS/THREATS |
9.3.4 | KEY ACTS/LAWS |
9.3.5 | KEY DEVELOPMENTS |
9.3.6 | KEY PLAYERS |
9.3.7 | KEY FACTORS DRIVING THE MARKET |
9.4 | QATAR |
9.4.1 | POTENTIAL FACTS |
9.4.2 | MARKET STATISTICS |
9.4.3 | KEY CYBER ATTACKS/THREATS IN QATAR |
9.4.4 | KEY REGULATORY BODY/LAW |
9.4.5 | KEY DEVELOPMENTS |
9.4.6 | KEY PLAYERS |
9.4.7 | KEY FACTORS DRIVING THE MARKET |
9.5 | KUWAIT |
9.5.1 | POTENTIAL FACTS |
9.5.2 | MARKET STATISTICS |
9.5.3 | CYBER ATTACKS/THREATS |
9.5.4 | KEY LAW |
9.5.5 | KEY DEVELOPMENTS |
9.5.6 | KEY PLAYERS |
9.5.7 | KEY FACTORS DRIVING THE MARKET |
9.6 | BAHRAIN |
9.6.1 | POTENTIAL FACTS |
9.6.2 | MARKET STATISTICS |
9.6.3 | CYBER ATTACKS/THREATS |
9.6.4 | KEY LAW |
9.6.5 | KEY DEVELOPMENTS |
9.6.6 | KEY PLAYERS |
9.6.7 | KEY FACTORS DRIVING THE MARKET |
9.7 | OMAN |
9.7.1 | POTENTIAL FACTS |
9.7.2 | MARKET STATISTICS |
9.7.3 | KEY CYBER ATTACKS/THREATS |
9.7.4 | KEY LAW |
9.7.5 | KEY DEVELOPMENTS |
9.7.6 | KEY PLAYERS |
9.7.7 | KEY FACTORS DRIVING THE MARKET |
KEY MARKET PLAYERS PROFILE
10.1 | KEY CYBER SECURITY SOLUTION PROVIDERS |
10.1.1 | CISCO CORPORATION |
10.1.1.1 | OVERVIEW |
10.1.1.2 | FINANCIALS |
10.1.1.2.1 | OVERALL FINANCIALS |
10.1.1.3 | NET REVENUE BY BUSINESS SEGMENTS |
10.1.1.4 | KEY DEVELOPMENTS AND STRATEGIES (2015) |
10.1.2 | MCAFEE CORPORATION |
10.1.2.1 | OVERVIEW |
10.1.2.2 | FINANCIALS |
10.1.2.2.1 | OVERALL FINANCIALS |
10.1.2.3 | KEY DEVELOPMENTS AND STRATEGIES (2013-2015) |
10.1.3 | CASSIDIAN CYBERSECURITY COMPANY |
10.1.3.1 | OVERVIEW |
10.1.3.2 | KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
10.1.4 | FORTINET INC |
10.1.4.1 | OVERVIEW |
10.1.4.2 | FINANCIALS |
10.1.4.2.1 | OVERALL REVENUE |
10.1.5 | TREND MICRO INC |
10.1.5.1 | OVERVIEW |
10.1.5.2 | FINANCIALS |
10.1.5.2.1 | OVERALL REVENUE |
10.2 | KEY CYBER SECURITY SERVICE PROVIDERS |
10.2.1 | BOOZ ALLEN HAMILTON CORPORATION |
10.2.1.1 | OVERVIEW |
10.2.1.2 | FINANCIALS |
10.2.1.2.1 | OVERALL FINANCIALS |
10.2.1.3 | KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
10.2.2 | COMPUTER SCIENCE CORPORATION (CSC) |
10.2.2.1 | OVERVIEW |
10.2.2.2 | FINANCIALS |
10.2.2.2.1 | OVERALL FINANCIALS |
10.2.2.3 | KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
10.2.3 | FIREEYE INC |
10.2.3.1 | OVERVIEW |
10.2.3.2 | FINANCIALS |
10.2.3.2.1 | OVERALL REVENUE |
10.2.4 | KASPERSKY LAB |
10.2.4.1 | OVERVIEW |
10.2.4.2 | FINANCIALS |
10.2.5 | SYMANTEC CORPORATION |
10.2.5.1 | OVERVIEW |
10.2.5.2 | FINANCIALS |
10.2.5.2.1 | OVERALL REVENUE |
List of Tables
TABLE 1 | SIGNIFICANT FACTS RELATED TO THE POTENTIAL OF CYBER SECURITY MARKET FOR THE GCC COUNTRIES |
TABLE 2 | MARKET ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY MARKET: CONSIDERATIONS AND CROSS MAPPING |
TABLE 3 | ASSUMPTION TABLE |
TABLE 4 | SIGNIFICANT CYBER THREATS PREVALENT IN THE GCC REGION |
TABLE 5 | SIGNIFICANT TECHNOLOGICAL SOLUTION AND KEY DEVELOPMENT IN THE GCC REGION |
TABLE 6 | MARKET DRIVERS: IMPACT ANALYSIS |
TABLE 7 | MARKET CHALLENGE IMPACT ANALYSIS |
TABLE 8 | MARKET OPPORTUNITIES IMPACT ANALYSIS |
TABLE 9 | PARTNERSHIPS, COLLABORATIONS AND AGREEMENTS IN THE GCC CYBER SECURITY MARKET |
TABLE 10 | PRODUCT LAUNCH IN THE GCC CYBER ECURITY MARKET |
TABLE 11 | ACQUISITIONS IN THE GCC CYBER SECURITY MARKET |
TABLE 12 | BUSINESS EXPANSION IN THE GCC CYBER SECURITY MARKET |
TABLE 13 | BUYERS AND SUPPLIERS IN GCC CYBER SECURITY MARKET |
TABLE 14 | KEY FACTORS CONSIDERED FOR THREAT FROM NEW ENTRANTS: GCC CYBER SECURITY MARKET |
TABLE 15 | KEY FACTORS AFFECTING BARGAINING POWER OF BUYERS: GCC CYBER SECURITY MARKET |
TABLE 16 | KEY FACTORS AFFECTING THE BARGAINING POWER OF SUPPLIERS: GCC CYBER SECURITY MARKET |
TABLE 17 | KEY FACTORS AFFECTING THREAT OF SUBSTITUTE PRODUCTS OR SERVICES: GCC CYBER SECURITY MARKET |
TABLE 18 | KEY FACTORS DETERMINING RIVALRY AMONG EXISTING FIRMS: GCC CYBER SECURITY MARKET |
TABLE 19 | KEY LAWS AND REGULATORY BODY: GCC CYBER SECURITY |
TABLE 20 | SOME KEY PLAYER’S PATENTS IN THE CYBER SECURITY MARKET |
TABLE 21 | KEY STANDARDS FOR CYBER SECURITY MARKET IN THE GULF REGION |
TABLE 22 | GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS AND SERVICES ($BILLION), 2015-2022 |
TABLE 23 | MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SOLUTIONS |
TABLE 24 | GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($MILLION), 2015-2022 |
TABLE 25 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE APPLICATION VERTICALS ($MILLION ), 2015-2022 |
TABLE 26 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN GCC COUNTRIES ($MILLION ), 2015-2022 |
TABLE 27 | SIGNIFICANT DEVELOPMENTS: NETWORK SECURITY IN GCC REGION |
TABLE 28 | SIGNIFICANT DEVELOPMENTS: ENDPOINT SECURITY IN THE GCC REGION |
TABLE 29 | SIGNIFICANT DEVELOPMENTS: CONTENT SECURITY IN THE GCC REGION |
TABLE 30 | SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION |
TABLE 31 | SIGNIFICANT DEVELOPMENTS: INDUSTRIAL CONTROL SECURITY IN THE GCC REGION |
TABLE 32 | SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION |
TABLE 33 | MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SERVICES |
TABLE 34 | GCC CYBER SECURITY MARKET VALUE BY SERVICES ($MILLION ), 2015-2022 |
TABLE 35 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN APPLICATION VERTICALS ($MILLION), 2015-2022 |
TABLE 36 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 37 | SIGNIFICANT DEVELOPMENTS: CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION |
TABLE 38 | SIGNIFICANT DEVELOPMENTS: CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION |
TABLE 39 | SIGNIFICANT DEVELOPMENTS: CYBER SECURITY INTEGRATION AND DESIGN SERVICES IN THE GCC REGION |
TABLE 40 | CYBER SECURITY TRAINING SERVICES IN THE GCC REGION: SIGNIFICANT DEVELOPMENTS |
TABLE 41 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS ($ MILLION), 2015-2022 |
TABLE 42 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE BFSI APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 43 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($ MILLION), 2015-2022 |
TABLE 44 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE BFSI DOMAIN ($MILLION), 2015-2022 |
TABLE 45 | GCC CYBER SECURITY MARKET VALUE OF BFSI APPLICATION VERTICAL BY GCC COUNTRIES ($ MILLION), 2015-2022 |
TABLE 46 | GCC CYBER SECURITY BY BANKING AND FINANCIAL SECTOR: SIGNIFICANT DEVELOPMENTS |
TABLE 47 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE AEROSPACE AND DEFENCE APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 48 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($MILLION), 2015-2022 |
TABLE 49 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE AEROSPACE AND DEFENCE DOMAIN ($MILLION), 2015-2022 |
TABLE 50 | GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 51 | GCC CYBER SECURITY BY AEROSPACE AND DEFENCE SECTOR: KEY DEVELOPMENTS |
TABLE 52 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE HEALTHCARE APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 53 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022 |
TABLE 54 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022 |
TABLE 55 | GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 56 | GCC CYBER SECURITY BY HEALTHCARE SECTOR: SIGNIFICANT DEVELOPMENTS |
TABLE 57 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE TELECOMMUNICATION APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 58 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE TELECOMMUNICATION DOMAIN ($MILLION), 2015-2022 |
TABLE 59 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE TELECOMMUNICATION DOMAIN ($MILLION), 2015-2022 |
TABLE 60 | GCC CYBER SECURITY MARKET VALUE OF TELECOMMUNICATION APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 61 | GCC CYBER SECURITY BY TELECOMMUNICATION SECTOR: SIGNIFICANT DEVELOPMENTS |
TABLE 62 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE MANUFACTURING APPLICATION VERTICAL ($MILLION), 2015-2022 |
TABLE 63 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022 |
TABLE 64 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022 |
TABLE 65 | GCC CYBER SECURITY MARKET VALUE OF MANUFACTURING APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 66 | GCC CYBER SECURITY BY MANUFACTURING SECTOR: KEY DEVELOPMENTS |
TABLE 67 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OTHER APPLICATION(RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION), 2015-2022 |
TABLE 68 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION), 2015-2022 |
TABLE 69 | GCC CYBER SECURITY MARKET VALUE OF SERVICES IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL ($MILLION), 2015-2022 |
TABLE 70 | GCC CYBER SECURITY MARKET VALUE OF OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022 |
TABLE 71 | GCC CYBER SECURITY MARKET VALUE BY COUNTRIES ($MILLION), 2015-2022 |
TABLE 72 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE U.A.E ($MILLION), 2015-2022 |
TABLE 73 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN THE U.A.E ($MILLION), 2015-2022 |
TABLE 74 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN THE UAE |
TABLE 75 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN SAUDI ARABIA ($MILLION), 2015-2022 |
TABLE 76 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN SAUDI ARABIA ($MILLION), 2015-2022 |
TABLE 77 | SIGNIFICANT CYBER ATTACKS/THREATS IN SAUDI ARABIA |
TABLE 78 | SAUDI ARABIA CYBER SECURITY LAW ILLUSTRATION |
TABLE 79 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN SAUDI ARABIA |
TABLE 80 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN QATAR ($MILLION), 2015-2022 |
TABLE 81 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN QATAR ($MILLION), 2015-2022 |
TABLE 82 | SIGNIFICANT CYBER ATTACKS/THREATS IN QATAR |
TABLE 83 | QATAR CYBER SECURITY REGULATORY BODY AND LAWS ILLUSTRATION |
TABLE 84 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN QATAR |
TABLE 85 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN KUWAIT ($MILLION), 2015-2022 |
TABLE 86 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN KUWAIT ($MILLION), 2015-2022 |
TABLE 87 | SIGNIFICANT CYBER ATTACKS/THREATS IN KUWAIT |
TABLE 88 | KUWAIT CYBER SECURITY LAW ILLUSTRATION |
TABLE 89 | CYBER SECURITY SIGNIFICANT DEVELOPMENTS IN KUWAIT |
TABLE 90 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN BAHRAIN ($MILLION), 2015-2022 |
TABLE 91 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN BAHRAIN ($MILLION), 2015-2022 |
TABLE 92 | SIGNIFICANT CYBER ATTACKS/THREATS IN BAHRAIN |
TABLE 93 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN BAHRAIN |
TABLE 94 | GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OMAN ($MILLION), 2015-2022 |
TABLE 95 | GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN OMAN ($MILLION), 2015-2022 |
TABLE 96 | SIGNIFICANT CYBER ATTACKS/THREATS IN OMAN |
TABLE 97 | ILLUSTRATION OF OMAN CYBER SECURITY LAW |
TABLE 98 | SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN OMAN |
TABLE 99 | CISCO CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 24, 2015 ($BILLION) |
TABLE 100 | CISCO CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2015) |
TABLE 101 | MCAFEE CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 13, 2015 ($MILLION) |
TABLE 102 | MCAFEE CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2013-2015) |
TABLE 103 | CASSIDIAN CYBER SECURITY COMPANY: KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
TABLE 104 | BOOZ ALLEN HAMILTON: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION) |
TABLE 105 | BOOZ ALLEN HAMILTON CORPORTION: KEY DEVELOPMENTS AND STRATEGIES (2012-2014) |
TABLE 106 | COMPUTER SCIENCE CORPORATION: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION) |
TABLE 107 | COMPUTER SCIENCE CORPORATION (CSC): KEY DEVELOPMENTS AND STRATEGIES (2013-2015) |
List of Figures
FIGURE 1 | GCC CYBER SECURITY MARKET SIZE SNAPSHOT |
FIGURE 2 | GCC CYBER SECURITY MARKET SHARE BY SOLUTIONS AND SERVICES (%)2015 |
FIGURE 3 | GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($BILLION), 2015-2022 |
FIGURE 4 | GCC CYBER SECURITY MARKET SHARE BY SERVICES , 2015-2022 |
FIGURE 5 | GCC CYBER SECURITY MARKET SHARE BY APPLICATION VERTICAL, 2015-2022 |
FIGURE 6 | GCC CYBER SECURITY MARKET BY COUNTRIES, 2015-2022 |
FIGURE 7 | REPORT COVERAGE SNAPSHOT: GCC CYBER SECURITY MARKET |
FIGURE 8 | MARKET CLASSIFICATION |
FIGURE 9 | KEY ELEMENTS CONSIDERED FOR DETAILED ANALYSIS OF EACH CLASSIFICATION IN THE GCC CYBER SECURITY MARKET |
FIGURE 10 | GCC CYBER SECURITY: MARKET SEGMENTATION BY SOLUTIONS |
FIGURE 11 | GCC CYBER SECURITY: MARKET SEGMENTATION BY SERVICES |
FIGURE 12 | GCC CYBER SECURITY: MARKET SEGMENTATION BY APPLICATION VERTICALS |
FIGURE 13 | GCC CYBER SECURITY: MARKET SEGMENTATION BY COUNTRIES |
FIGURE 14 | KEY STAKEHOLDERS |
FIGURE 15 | RESEARCH FLOW |
FIGURE 16 | DEMAND SIDE FACTORS |
FIGURE 17 | SUPPLY SIDE FACTORS |
FIGURE 18 | PARAMETERS |
FIGURE 19 | DATA POINTS FROM SECONDARY SOURCES |
FIGURE 20 | DATA POINTS FROM PRIMARY SOURCES |
FIGURE 21 | DATA TRIANGULATION |
FIGURE 22 | BOTTOM UP APPROACH |
FIGURE 23 | TOP DOWN APPROACH |
FIGURE 24 | YEARS CONSIDERED |
FIGURE 25 | MARKET OVERVIEW: KEY ELEMENTS COVERED |
FIGURE 26 | HISTORY OF SIGNIFICANT CYBER ATTACKS |
FIGURE 27 | CYBER SECURITY BENEFITS IN THE GCC REGION |
FIGURE 28 | MARKET DYNAMICS |
FIGURE 29 | KEY DRIVERS FOR THE GCC CYBER SECURITY MARKET |
FIGURE 30 | GOVERNMENT INITIATIVES FOR CYBER SECURITY IN THE GCC REGION |
FIGURE 31 | SKILL GAPS |
FIGURE 32 | GCC CYBER SECURITY MARKET OPPORTUNITIES |
FIGURE 33 | COMPETITIVE OVERVIEW: GCC CYBER SECURITY MARKET |
FIGURE 34 | KEY MARKET DEVELOPMENT STRATEGIES |
FIGURE 35 | KEY TRENDS: GCC CYBER SECURITY MARKET |
FIGURE 36 | KEY PLAYERS IN PARTNERSHIP, COLLABORATION AND AGREEMENTS |
FIGURE 37 | KEY PLAYERS IN PRODUCT LAUNCH IN THE GCC CYBER SECURITY MARKET |
FIGURE 38 | KEY PLAYERS IN THE ACQUISITION IN THE GCC CYBER SECURITY MARKET |
FIGURE 39 | KEY PLAYERS IN THE GCC CYBER SECURITY MARKET |
FIGURE 40 | PORTER FIVE FORCES ANALYSIS FRAMEWORK |
FIGURE 41 | IMPACT OF EACH PORTER’S FIVE FORCES ON THE GCC CYBER SECURITY MARKET |
FIGURE 42 | VALUE CHAIN |
FIGURE 43 | GCC CYBER SECURITY MARKET BY SOLUTIONS AND SERVICES: SECTION COVERAGE |
FIGURE 44 | SOLUTIONS AND SERVICES: STATISTICAL COVERAGE |
FIGURE 45 | GCC CYBER SECURITY MARKET BY SOLUTIONS |
FIGURE 46 | NETWORK SECURITY COMPONENTS |
FIGURE 47 | NETWORK SECURITY IN THE GCC REGION: KEY FACTS |
FIGURE 48 | SOME KEY NETWORK SECURITY VENDORS: GCC REGION |
FIGURE 49 | ENDPOINT SECURITY: SNAPSHOT |
FIGURE 50 | KEY ELEMENTS IN THE ENDPOINT SECURITY MANAGEMENT |
FIGURE 51 | KEY FACTS: ENDPOINT SECURITY IN THE GCC REGION |
FIGURE 52 | KEY ENDPOINT SECURITY VENDORS: GCC REGION |
FIGURE 53 | PROCESS OF CROSS SITE SCRIPTING ATTACK |
FIGURE 54 | CONTENT SECURITY IN THE GCC REGION: KEY FACTS |
FIGURE 55 | KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 56 | APPLICATION SECURITY IMPLEMENTATION IN SDLC |
FIGURE 57 | APPLICATION SECURITY: KEY ELEMENTS |
FIGURE 58 | KEY FACTS: APPLICATION SECURITY IN THE GCC REGION |
FIGURE 59 | KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 60 | INDUSTRIAL CONTROL SYSTEM TYPES |
FIGURE 61 | KEY FACTS: INDUSTRIAL CONTROL SYSTEM SECURITY IN THE GCC REGION |
FIGURE 62 | KEY INDUSTRIAL CONTROL SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 63 | CLOUD SECURITY: KEY ELEMENTS |
FIGURE 64 | CLOUD SECURITY IN THE GCC REGION: KEY FACTS |
FIGURE 65 | KEY CLOUD SECURITY SOLUTION VENDORS: GCC REGION |
FIGURE 66 | GCC CYBER SECURITY MARKET BY SERVICES |
FIGURE 67 | CYBER SECURITY CONSULTING SERVICES: KEY ELEMENTS |
FIGURE 68 | CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION: KEY FACTS |
FIGURE 69 | KEY CYBER SECURITY CONSULTING PROVIDERS: GCC REGION |
FIGURE 70 | RISK ASSESSMENT IN CYBER SECURITY: KEY STEPS |
FIGURE 71 | CYBER SECURITY RISK ASSESSMENT PROCESS |
FIGURE 72 | CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION: KEY FACTS |
FIGURE 73 | KEY CYBER SECURITY RISK ASSESSMENT PROVIDERS: GCC REGION |
FIGURE 74 | INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORK |
FIGURE 75 | KEY CYBER SECURITY INTEGRATION AND DESIGN SERVICE PROVIDERS: GCC REGION |
FIGURE 76 | CYBER SECURITY TRAINING AND EDUCATION SERVICES: KEY ELEMENTS |
FIGURE 77 | KEY FACTS: CYBER SECURITY TRAINING SERVICES IN THE GULF REGION |
FIGURE 78 | KEY PLAYERS: CYBER SECURITY TRAIINING AND EDUCATION SERVICE PROVIDER IN THE GCC REGION |
FIGURE 79 | OTHER CYBER SECURITY SERVICES |
FIGURE 80 | GCC CYBER SECURITY MARKET SEGMENTATION BY APPLICATION VERTICALS |
FIGURE 81 | APPLICATION VERTICALS: STATISTICAL COVERAGE |
FIGURE 82 | BANKING MALWARE: GCC REGION |
FIGURE 83 | BFSI SECTOR KEY FACTS RELATED TO GCC CYBER SECURITY MARKET |
FIGURE 84 | CYBER ATTACKS: BANKING AND FINANCIAL SECTOR IN THE GCC REGION |
FIGURE 85 | KEY CYBER SECURITY PLAYERS IN THE BANKING AND FINANCIAL SECTOR IN THE GCC REGION |
FIGURE 86 | KEY CYBER SECURITY ELEMENTS: AEROSPACE AND DEFENCE SECTOR |
FIGURE 87 | KEY CYBER SECURITY PLAYERS IN THE AEROSPACE AND DEFENCE SECTOR IN THE GCC REGION |
FIGURE 88 | HEALTHCARE SECTOR SIGNIFICANT FACTS FOR THE GCC CYBER SECURITY MARKET |
FIGURE 89 | KEY CYBER SECURITY PLAYERS IN THE HEALTHCARE SECTOR IN THE GCC REGION |
FIGURE 90 | KEY FACTS RELATED TO TELECOMMUNICATIONS SECTOR FOR THE GCC CYBER SECURITY MARKET |
FIGURE 91 | KEY CYBER SECURITY PLAYERS IN THE TELECOMMUNICATION SECTOR IN THE GCC REGION |
FIGURE 92 | KEY CYBER SECURITY PLAYERS IN THE MANUFACTURING SECTOR IN THE GCC REGION |
FIGURE 93 | GCC REGION: COUNTRIES |
FIGURE 94 | GCC CYBER SECURITY MARKET: COUNTRIES SECTION COVERAGE |
FIGURE 95 | GCC COUNTRY ANALYSIS: STATISTICAL COVERAGE |
FIGURE 96 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN THE UAE |
FIGURE 97 | KEY CYBER SECURITY PLAYERS IN THE U.A.E |
FIGURE 98 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN THE U.A.E |
FIGURE 99 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN SAUDI ARABIA |
FIGURE 100 | KEY CYBER SECURITY PLAYERS IN SAUDI ARABIA |
FIGURE 101 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN SAUDI ARABIA |
FIGURE 102 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN QATAR |
FIGURE 103 | KEY CYBER SECURITY PLAYERS IN QATAR |
FIGURE 104 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN QATAR |
FIGURE 105 | POTENTIAL FACTS FOR CYBER SECURITY MARKET IN KUWAIT |
FIGURE 106 | KEY CYBER SECURITY PLAYERS IN KUWAIT |
FIGURE 107 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN KUWAIT |
FIGURE 108 | POTENTIAL FACTS FOR CYBER SECURITY IN BAHRAIN |
FIGURE 109 | KEY CYBER SECURITY PLAYERS IN BAHRAIN |
FIGURE 110 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN BAHRAIN |
FIGURE 111 | POTENTIAL FACTS FOR CYBER SECURITY IN OMAN |
FIGURE 112 | KEY CYBER SECURITY PLAYERS IN OMAN |
FIGURE 113 | KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN OMAN |
FIGURE 114 | CISCO CORPORATION: OVERALL FINANCIALS, 2013-2015 ($BILLION) |
FIGURE 115 | NET REVENUE BY PRODUCTS AND SERVICES |
FIGURE 116 | MCAFEE CORPORATION: OVERALL FINANCIALS, 2012-2014 ($MILLION) |
FIGURE 117 | FORTINET INC: OVERALL REVENUE, 2012-2014 ($MILLION) |
FIGURE 118 | FORTINET INC: TOTAL REVENE BY REGION ($MILLION) |
FIGURE 119 | TREND MICRO CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION) |
FIGURE 120 | BOOZ ALLEN HAMILTON CORPORATION: OVERALL FINANCIALS, 2012-2014 ($BILLION) |
FIGURE 121 | COMPUTER SCIENCE CORPORATION (CSC): OVERALL FINANCIALS, 2013-2015 ($BILLION) |
FIGURE 122 | FIREEYE CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION) |
FIGURE 123 | SYMANTEC CORPORATION: OVERALL REVENUE, 2013-2015 ($BILLION) |
GCC Cyber Security Market - Estimation & Forecast, 2016
Focus on Solutions (Network Security, Endpoint Security & Others), Services (Consulting, Risk Assessment, and Others), Application (BFSI, Telecommunication & Others)