Ä«Å×°í¸®
Next Generation Cyber Security Market Forecast Report 2016-2021: Companies Advancing Beyond Traditional Firewalls Towards Cloud Based & Big Data Solutions For The Internet of Things (IoT)
¹ßÇà»ç
Visiongain
¹ßÇàÀÏ
2016-04-14
ºÐ·®
209 pages
¼ºñ½ºÇüÅÂ
Report
ÆǸŰ¡°Ý
PDF Single User : ¡Ì1,999
Table of Contents 1. Executive Summary 1.1 Next Generation Cyber Security Market Set to Take-off in 2016 1.2 Aim of the Report 1.3 Structure of the Report 1.4 Why You Should Read This Report 1.5 How This Report Delivers 1.6 Who is This Report For? 1.7 Methodology 1.8 Frequently Asked Questions (FAQ) 1.9 About visiongain 2. Introduction to the Next Generation Cyber Security Market 2.1 Next Generation Cyber Security Market Introduction 2.2 Assessing the Cyber Security Market Landscape 2.3 High Growth Rate Driving up the Next Generation Cyber Security Job and Skills Market 2.4 Next Generations Cyber Security Measures 2.5 Factors Driving the Next Generation Cyber Security Market 2.6 Cyber Security Threat Also Existing for Consumers 2.7 Competitive Ecosystem in the Next Generation Cyber Security Market 2.8 Trend Analysis of the Cyber Security Market 2.9 Why is Cyber Security So Important to Homeland Security? 2.10 What Does the Cyber Threat to Critical Infrastructure Encompass? 2.11 Intentions/Goals of Cyber Attack 2.12 Types of Cyber Attack 2.13 Methods of Cyber Defence 2.14 Notable Cyber Attacks & Incidents 2.14.1 Conficker 2.14.2 Operation Buckshot Yankee 2.14.3 Aurora 2.14.4 Chinese Diversion of Internet Traffic 2.14.5 Stuxnet 2.14.6 Duqu 2.14.7 RSA 2.14.8 Sony Corporation 2.14.9 Operation Shady RAT 2.14.10 Mitsubishi Heavy Industries 2.14.11 Flame / Operation: Olympic Games 2.14.12 Aramco 2.14.13 The Navy and Marine Corps Intranet (NMCI) 2.14.14 Operation Saffron Rose 2.14.15 Operation Dragonfly 2.14.16 Norwegian Oil and Gas 2.14.17 Sony Picture Entertainment 2.14.18 Operation Cleaver 2.15 List of Recent Cyber Security Attacks 3. Global Next Generation Cyber Security Market 3.1 Market Definition 3.1.1 Application Security Submarket Definition 3.1.2 Cloud Security Submarket Definition 3.1.3 Content Security Submarket Definition 3.1.4 Endpoint Security Submarket Definition 3.1.5 Network Security Submarket Definition 3.2 Global Next Generation Cyber Security Market Forecast 2016-2021 4. Global Next Generation Cyber Security Submarket Forecasts 2016-2021 4.1 What are the Leading Submarkets in Next Generation Cyber Security Revenue Forecast 2016-2021? 4.1.1 Global Next Generation Cyber Security Revenue Submarket Forecast AGR & CAGR 4.1.2 Network Security Sector Leading the Next Generation Cyber Security with a Market Share of 38.1% In 2016 4.2 Next Generation Application Security 4.2.1 Next Generation Cyber Security Application Security Submarket Forecast Summary 2016-2021 4.3 Next Generation Cloud Security 4.3.1 Next Generation Cyber Security Cloud Security Submarket Forecast Summary 2016-2021 4.4 Next Generation Content Security 4.4.1 Next Generation Cyber Security Content Security Submarket Forecast Summary 2016-2021 4.5 Next Generation Endpoint Security 4.5.1 Next Generation Cyber Security Endpoint Security Submarket Forecast Summary 2016-2021 4.6 Next Generation Network Security 4.6.1 Next Generation Cyber Security Network Security Submarket Forecast Summary 2016-2021 5. Regional Next Generation Cyber Security Forecasts 2016-2021 5.1 Overview 5.2 North America Leading Region in Terms of Revenue in 2016 5.2.1 Regional Next Generation Cyber Security Revenue Forecast AGR & CAGR 5.2.2 North America Leading Regional Next Generation Cyber Security Market Shares in 2016 with 33.9% 5.3 Top 10 National Next Generation Cyber Security Market Forecasts 2016-2021 5.4 United States Next Generation Cyber Security Market Forecasts 2016-2021 5.4.1 US Cyber Security Market Drivers & Restraints 5.4.2 Changing Concerns: Why the focus on Next Generation Cyber Security will Continue to Drive US Homeland Security Expenditure Upwards 5.4.3 Investment in Next Generation From the Energy Sector 5.4.4 What are Domestic Airlines and the US Federal Aviation Authority Doing to Guard Against a Major Cyber Attack? 5.5 Chinese Next Generation Cyber Security Market Forecasts 2016-2021 5.5.1 Chinese Cyber Security Market Drivers & Restraints 5.5.2 Another Brick in the Great Firewall: How Has China's Concern for the Control of Information Helped Shape its Defensive Cyber Posture? 5.5.3 A Digital Arms Race: How Strategic Competition with the United States Is Spurring on Chinese Ambitions to Become a Cyber Power 5.5.4 Recent Chinese Cyber Security Events 5.6 UK Next Generation Cyber Security Market Forecasts 2016-2021 5.6.1 U.K. Cyber Security Market Drivers & Restraints 5.7 Japan Next Generation Cyber Security Market Forecasts 2016-2021 5.7.1 Japanese Cyber Security Market Drivers & Restraints 5.7.2 What Measures Has Japan Taken To Boost It's Cyber Security Capabilities And What Challenges Remain? 5.7.3 Recent Japanese Cyber Security Events 5.8 Germany Next Generation Cyber Security Market Forecasts 2016-2021 5.8.1 German Cyber Security Market Drivers & Restraints 5.8.2 Have German Cyber Security Efforts Acquired New Emphasis? 5.8.3 Recent German Cyber Security Events 5.9 France Next Generation Cyber Security Market Forecasts 2016-2021 5.9.1 French Cyber Security Market Drivers & Restraints 5.9.2 What is the Current State of French Cyber Security? 5.9.3 Recent French Cyber Security Events 5.10 Italy Next Generation Cyber Security Market Forecasts 2016-2021 5.10.1 Italian Cyber Security Market Drivers & Restraints 5.11 Russia Next Generation Cyber Security Market Forecasts 2016-2021 5.11.1 Russian Cyber Security Market Drivers & Restraints 5.11.2 Russian Cyber Security Policy: How Stage Two Has Built Upon Previous Developments 5.11.3 Recent Russian Cyber Security Events 5.12 Brazil Next Generation Cyber Security Market Forecasts 2016-2021 5.12.1 Brazilian Cyber Security Market Drivers & Restraints 5.13 India Next Generation Cyber Security Market Forecasts 2016-2021 5.13.1 Indian Cyber Security Market Drivers & Restraints 5.13.2 How Have Repeated Blackouts Placed a Renewed Emphasis on Indian Critical Infrastructure Protection? 5.13.3 How Will the Recommendations of the JWG Affect Indian Cyber Security? 5.13.4 Recent Indian Cyber Security Events 5.14 Rest of World Next Generation Cyber Security Market Forecasts 2016-2021 5.14.1 Rest of the World Cyber Security Market Drivers & Restraints 5.14.2 Recent Rest of the World Cyber Security Events 6. SWOT Analysis of the Next Generation Cyber Security Market 7. Expert Opinion 7.1 Delve Labs Interview 7.1.1 Delve Labs Company Background & Cyber Security Offerings 7.1.2 Delve Lab's Strengths in the Cyber Security Sector 7.1.3 Defining Next Generation Cyber Security 7.1.4 Future of Cyber Security Industry 7.1.5 Trends and Factors Affecting Product Development or Implementation 7.1.6 Cyber Security Products and Solutions Clients Frequently Require 7.1.7 Cyber Security Sub-Markets Critical for Delve Lab's Growth 7.1.8 Cyber Security Market Drivers and Restraints 7.1.9 Technological Development in the Cyber Security Industry and the Impact on Delve Lab 7.1.10 Strong Regional Cyber Security Markets of the Future 7.1.11 Regional Cyber Security Markets Critical to Delve Labs 7.1.12 Challenges & Opportunities in the Cyber Security Market 7.2 Digital Guardian Interview 7.2.1 Digital Guardian Company Background & Cyber Security Offerings 7.2.2 Digital Guardian's Strengths in the Cyber Security Sector 7.2.3 Defining Next Generation Cyber Security 7.2.4 Future of Cyber Security Industry 7.2.5 Trends and Factors Affecting Product Development or Implementation 7.2.6 Cyber Security Products and Solutions Clients Frequently Require 7.2.7 Cyber Security Sub-Markets Critical for Digital Guardian's Growth 7.2.8 Cyber Security Market Drivers and Restraints 7.2.9 Technological Development in the Cyber Security Industry and the Impact on Digital Guardian 7.2.10 Strong Regional Cyber Security Markets of the Future 7.2.11 Regional Cyber Security Markets Critical to Digital Guardian 7.2.12 Challenges & Opportunities in the Cyber Security Market 7.3 LogRhythm Interview 7.3.1 LogRhythm Company Background & Cyber Security Offerings 7.3.2 LogRhythm's Strengths in the Cyber Security Sector 7.3.3 Defining Next Generation Cyber Security 7.3.4 Trends and Factors Affecting Product Development or Implementation 7.3.5 Cyber Security Products and Solutions Clients Frequently Require 7.3.6 Cyber Security Market Drivers and Restraints 7.3.7 Challenges & Opportunities in the Cyber Security Market 7.4 Nymi Interview 7.4.1 Nymi Company Background & Cyber Security Offerings 7.4.2 Nymi's Strengths in the Cyber Security Sector 7.4.3 Defining Next Generation Cyber Security 7.4.4 Future of Cyber Security Industry 7.4.5 Trends and Factors Affecting Product Development or Implementation 7.4.6 Cyber Security Products and Solutions Clients Frequently Require 7.4.7 Cyber Security Sub-Markets Critical for Nymi's Growth 7.4.8 Cyber Security Market Drivers and Restraints 7.4.9 Technological Development in the Cyber Security Industry and the Impact on Nymi 7.4.10 Regional Cyber Security Markets Critical to Nymi 7.5 Sandstorm.io Interview 7.5.1 Sandstorm.io Company Background & Cyber Security Offerings 7.5.2 Sandstorm's Strengths in the Cyber Security Sector 7.5.3 Sandstorm.io Views on the Next Generation Cyber Security Market 7.6 Spikes Security Interview 7.6.1 Spikes Security Company Background & Cyber Security Offerings 7.6.2 Spikes Security's Strengths in the Cyber Security Sector 7.6.3 Defining Next Generation Cyber Security 7.6.4 Future of Cyber Security Industry 7.6.5 Trends and Factors Affecting Product Development or Implementation 7.6.6 Cyber Security Products and Solutions Clients Frequently Require 7.6.7 Cyber Security Sub-Markets Critical for Spikes Security's Growth 7.6.8 Cyber Security Market Drivers and Restraints 7.6.9 Technological Development in the Cyber Security Industry and the Impact on Spikes Security 7.6.10 Strong Regional Cyber Security Markets of the Future 7.6.11 Regional Cyber Security Markets Critical to Spikes Security 7.6.12 Challenges & Opportunities in the Cyber Security Market 7.6.13 Final Thoughts on the Cyber Security Market 8. Significant Companies in the Next Generation Cyber Security Ecosystem 8.1 BAE Systems 8.1.1 BAE Systems Cyber Security Overview 8.1.2 BAE Systems Primary Market Competitors 8.1.3 BAE Systems SWOT Analysis 8.2 Barracuda Networks 8.2.1 Cyber Security Overview 8.2.2 Barracuda Networks Products 8.3 Bay Dynamics 8.3.1 Bay Dynamics Cyber Security Overview 8.4 Cisco Systems 8.4.1 Cisco Systems Cyber Security Overview 8.4.3 Cisco Systems Primary Market Competitors 8.4.4 Cisco Systems SWOT Analysis 8.5 Check Point 8.5.1 Cyber Security Overview 8.5.2 Check Point Primary Market Competitors 8.5.3 Check Point SWOT Analysis 8.6 FireEye 8.6.1 FireEye Latest developments 8.6.2 Challenges faced by FireEye 8.7 Fortinet 8.7.1 Fortinet Cyber Security Overview 8.7.3 Fortinet Primary Market Competitors 8.7.4 Fortinet SWOT Analysis 8.8 Herjavec Group 8.8.1 Overview of Herjavec Group's Cyber Security Offerings 8.8.2 Recent Acquisition and Expansion into United Kingdom & Europe 8.9 Hewlett Packard 8.9.1 Hewlett Packard Company's Role in the Cyber Security Market 8.9.2 Hewlett Packard Company's Organisational Structure 8.9.3 Hewlett Packard Company's Cyber Security Products 8.9.4 Hewlett Packard Company's Primary Market Competitors 8.9.5 Hewlett Packard Company's Recent M&A Activity 8.10 Intel Corporation 8.10.1 Intel Company Profile 8.10.2 Intel Primary Market Competitors 8.10.3 Intel SWOT Analysis 8.11 Juniper Networks 8.11.1 Recent Developments 8.11.2 Juniper Networks Partnerships and Ventures 8.11.3 Juniper Networks Products and Services 8.11.4 Juniper Networks Future Outlook 8.12 Norse 8.12.1 Norse Latest Developments 8.13 Palo Alto Networks 8.13.1 Palo Alto Networks Latest Developments 8.14 Splunk 8.14.1 Cyber Security Overview 8.14.2 Splunk Recent Developments 8.14.3 Splunk Products and Services 8.14.4 Splunk Partnerships 8.14.5 Splunk Future Outlook 8.15 Watch Guard 8.15.1 Watch Guard Recent Developments 8.15.2 Watch Guard Products and services 8.15.3 Watch Guard Partnerships and Ventures 8.15.4 Watch Guard Future Outlook 9. Conclusion 9.1 Huge Potential for Growth in the Cyber Security Space 9.2 Regional Analysis of Next Generation Cyber Security Market Growth 9.3 Cyber Security Vital to National Defence 9.4 Increasing Number of Cyber Attacks on Businesses 9.5 Analysing the Evolution of Traditional Cyber Security to Next Generation Cyber Security 9.6 Future Potential of Next Generation Cyber Security 10. Glossary List of Tables Table 2.1 Intentions/Goals of Cyber Attack (Type, Description) Table 2.2 Types of Cyber Attack (Type, Description) Table 2.3 Cyber Defence Systems (Method of Cyber Defence, Description) Table 2.4 Recent History of High Profile Cyber Attacks (Date, Description) Table 3.1 Global Next Generation Cyber Security Market Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.1 Global Next Generation Cyber Security Revenue Submarket Forecast 2016-2021 ($ billion) Table 4.2 Global Next Generation Cyber Security Revenue Submarket AGR Forecast 2017-2021 (AGR %) Table 4.3 Global Next Generation Cyber Security Revenue Submarket CAGR Forecast (%) 2016-2019, 2019-2021, and 2016-2021 Table 4.4 Global Next Generation Cyber Security Market Share Forecast by Type 2016-2021 (%) Table 4.5 Next Generation Cyber Security Application Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.6 Next Generation Cyber Security Cloud Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.7 Next Generation Cyber Security Content Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.8 Next Generation Cyber Security Endpoint Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.9 Next Generation Cyber Security Network Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.1 Regional Next Generation Cyber Security Revenue Forecast 2016-2021 ($ billion) Table 5.2 Regional Next Generation Cyber Security Revenue AGR Forecast 2017-2021 (AGR %) Table 5.3 Regional Next Generation Cyber Security Revenue CAGR Forecast (%) 2016-2019, 2019-2021, and 2016-2021 Table 5.4 Regional Next Generation Cyber Security Market Share Forecast 2016-2021 (%) Table 5.5 Top 10 National Next Generation Cyber Security Market Forecast 2016-2021 ($ Billions, AGR%, % Share) Table 5.6 US Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.8 China Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.9 Chinese Cyber Security Drivers & Restraints Table 5.10 UK Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.11 U.K. Cyber Security Market Drivers & Restraints Table 5.12 Japan Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.13 Japanese Cyber Security Market Drivers & Restraints Table 5.14 Germany Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.15 German Cyber Security Market Drivers & Restraints Table 5.16 France Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.17 French Cyber Security Market Drivers & Restraints Table 5.18 Italy Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.19 Italian Cyber Security Market Drivers & Restraints Table 5.20 Russia Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.21 Russian Cyber Security Market Drivers & Restraints Table 5.22 Brazil Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.23 Brazilian Cyber Security Market Drivers & Restraints Table 5.24 India Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.25 Indian Cyber Security Market Drivers & Restraints Table 5.26 RoW Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.27 Rest of the World Cyber Security Market Drivers & Restraints Table 6.1 SWOT Analysis of the Next Generation Cyber Security Market 2016 Table 8.1 Recent BAE Systems Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details) Table 8.2 BAE Systems Selected Cyber Security Products & Services (Company Division, Product, Specification) Table 8.3 SWOT Analysis of BAE Systems 2015 Table 8.4 Barracuda Cyber Security Solutions Table 8.5 Recent Cisco Systems Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details) Table 8.6 Cisco Systems Inc Selected Cyber-Security Products (Product/Service Name, Specification) Table 8.7 SWOT Analysis of Cisco Systems 2016 Table 8.8 Check Point Selected Cyber Security Products & Services (Product, Specification) Table 8.9 SWOT Analysis Check Point 2015 Table 8.10 Fortinet Major Cyber Security Contracts & Programmes 2013-2014 (Date, Country, Details) Table 8.11 Fortinet Selected Cyber Security Products & Services 2014 (Product, Specification) Table 8.12 SWOT Analysis of Fortinet 2015 Table 8.13 Overview of Herjavec Group's Cyber Security Offerings Table 8.14 Herjavec's core managed security services Table 8.15 Recent Hewlett Packard Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.16 Sample of Hewlett Packard Company's Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.17 Hewlett Packard Company Recent M&A Activity (Date, Details) Table 8.18 Intel Corporation Cyber-security (Product/Service Type, Company Division, Product/Service Name, Specification) Table 8.19 SWOT Analysis of Intel 2016 Table 8.20 Juniper Networks Products and Services Table 8.21 Splunk Products and Services List of Figures Figure 2.1 Operation Shady RAT Targets (Sector, Number of Targets) Figure 3.1 Next Generation Cyber Security Market Venn Diagram Representation Figure 3.2 Next Generation Cyber Security Sub-Market Segmentation Figure 3.3 Global Next Generation Cyber Security Market Forecast 2016-2021 ($ billion, AGR%) Figure 4.1 Global Next Generation Cyber Security Revenue Submarket Forecast 2016-2021 ($ billion) Figure 4.2 Global Next Generation Cyber Security Revenue Submarket AGR Forecast 2017-2021 (AGR %) Figure 4.3 Global Next Generation Cyber Security Market Share Forecast by Type 2016 (%) Figure 4.4 Global Next Generation Cyber Security Market Share Forecast by Type 2019 (%) Figure 4.5 Global Next Generation Cyber Security Market Share Forecast by Type 2021 (%) Figure 4.6 Next Generation Cyber Security Application Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.7 Next Generation Cyber Security Application Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.8 Next Generation Cyber Security Cloud Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.9 Next Generation Cyber Security Cloud Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.10 Next Generation Cyber Security Content Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.11 Next Generation Cyber Security Content Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.12 Next Generation Cyber Security Endpoint Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.13 Next Generation Cyber Security Endpoint Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.14 Next Generation Cyber Security Network Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.15 Next Generation Cyber Security Network Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 5.1 Regional Next Generation Cyber Security Revenue Forecast 2016-2021 ($ billion) Figure 5.2 Regional Next Generation Cyber Security Revenue AGR Forecast 2016-2021 (AGR%) Figure 5.3 Regional Next Generation Cyber Security Market Share Forecast 2016 (%) Figure 5.4 Regional Next Generation Cyber Security Market Share Forecast 2019 (%) Figure 5.5 Regional Next Generation Cyber Security Market Share Forecast 2021 (%) Figure 5.6 Top 10 National Next Generation Cyber Security Market Forecast 2016-2021 ($ Billions, AGR%, % Share) Figure 5.7 US Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.8 US Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.9 China Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.10 China Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.11 UK Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.12 UK Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.13 Japan Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.14 Japan Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.15 Germany Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.16 Germany Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.17 France Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.18 France Share of Global Next Generation Cyber Security Market Forecast 2016, 2021 and 2021 (% Share) Figure 5.19 Italy Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.20 Italy Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.21 Russia Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.22 Russia Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.23 Brazil Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.24 Brazil Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.25 India Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.26 Indian Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.27 RoW Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.27 RoW Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 8.1 BAE Systems Organisational Structure of Cyber Security Divisions 2016 Figure 8.2 BAE Systems Primary Market Competitors Figure 8.3 Cisco Systems Organisational Structure of Cyber Security Divisions Figure 8.4 BAE Systems plc Primary Market Competitors Figure 8.5 Check Point Primary Market Competitors Figure 8.6 Fortinet Organisational Structure of Cyber Security Divisions Figure 8.7 Fortinet Primary Market Competitors Figure 8.8 Hewlett Packard Company's Organisational Structure Figure 8.9 Hewlett Packard Primary Market Competitors Figure 8.10 Intel Organisational Structure of Cyber Security Divisions Figure 8.11 Intel Primary Market Competitors Figure 8.12 Watch Guard Data Loss Prevention and Automated Intelligence and Decision Making Framework Companies Listed Adobe Systems Altron Amazon Amazon Web Services (AWS) American Airlines AMSEC LLC Anthem Anthem Apple Autonomy Barracuda Networks Bay Dynamics Boeing Booz Allen Hamilton BorderWare Technologies British Aerospace (BAe) CACI International Checkpoint China Telecom Cisco Systems Clarent Corporation Cloudflare Code Green Networks Comcast Computer Sciences Corporation ConocoPhillips Cryptolocker CrySyS Lab CSC DELL Inc Delve Labs Digital Guardian Domino's Pizza Dtex Systems Easy Solutions Elderwood Group EMC Engility Extreme Networks ExxonMobil FASTNET Corporation Fireye Fortinet General Dynamics Corp General Electric Company plc (GEC) Global Technical Systems Google Herjavec Group Hewlett Packard Home Depot Honeywell Technology Solutions Horton Networks Huawei IBM IHI Corp. Industrial Defender Inc. Intel Interpath Communications Japan Airlines JP Morgan Chase Juniper Networks Kaspersky Lab Kawasaki Heavy Industries L-3 Services Inc Lockheed Martin LogRhythm Mandiant Marathon Oil Marconi Electronic Systems (MES) McAfee Microsoft Mitsubishi Heavy Industries Mt Gox Muthoot Fincorp Ltd NBC New York Times Norse Northrop Nymi Oracle Palo Alto Networks Primera Blue Cross Quick Heal Rackspace Raytheon Company Redstone Arsenal Rosoboronexport RSA Rusal Sabre Holdings SAIC Sandia National Laboratories Sandstorm.io Saudi Aramco Scientific Research Corporation SecureID Serco Silversky Sony Corporation Sony Entertainment Sourcefire Splunk Symantec Sysec Target Telefonica Telefónica Global Technology Thales Group The Learning Company Topface Trend Micro Tshinghua Tongfang TV5Monde UBS Verio Vertica Systems VINCI group Voltage Security Vu Security Watchguard Wells Fargo WorldTalk Corporation Yahoo Yahoo Japan Organizations Mentioned in the Report American Institute of Aeronautics and Astronautics (AIAA) Ajax Security Team' Belgian Foreign Ministry Bharatiya Janata Party (BJP) Canadian Air Transport Security Authority (CATSA) Chaos Computer Club Chinese Communist Party Control System Security Centre (CSSC) of Japan Cyber Security Information sharing Partnership Japan (J-CSIP) Cyberspace Administration of China Defence Metallurgical Research Laboratory (DMRL) Defence Research and Development Organisation (DRDO) Defense Intelligence Agency (DIA) Department of Homeland Security (DHS) DoD European Central Bank (ECB) European Network for Cyber Security (ENCS) European Union (EU) FBI Federal Aviation Authority (FAA) Federal Office for Information Security Federal Office for the Protection of the Constitution Federal Office of Civil Protection and Disaster Assistance French Agence nationale de la sécurité des systèmes d'information (ANSSI) French Network and Information Security Agency (FNISA) French Senate Committee on Foreign Affairs, Defence & Armed Forces General Office of the CPC Central Committee General Office of the State Council German Foreign Ministry German Government German Police Germany Cyber Security Council (NCS) Germany National Cyber Response Centre (NCAZ) Germany's Federal Office for Information Security Government of China Government of Georgia India's Computer Emergency Response Team (CERT-In) Indian Defence Research and Development Organisation (DRDO) Indian Ministry of Communication and Information Technology (MCIT) Indian Ministry of Human Resource Development (MHRD) Indian National Security Council Secretariat (NSCS) Indian Navy Indo-Tibetan Border Police (ITBP) INTERPOL Japan Ministry of Defence Japan Ministry of Internal Affairs MAHER Centre of Iranian National Computer Emergency Response Team (CERT) Marine Corps Ministry of Economy, Trade and Industry (METI) Ministry of Internal Affairs and Communications (MIC) NASA National Association of Software Services Companies National Information Security Centre's (NISC) National Institute of Standards and Technology (NIST) National Police Agency (NPA) National Protections and Programs Directorate (NPPD) National Security Agency (NSA) NATO NCAZ Network and Information Security Agency France Norwegian National Security Authority Office of the Chief Financial Officer (OCFO) People's Bank of China (PBOC) People's Liberation Army PLA Unit 61398 Presidential Decision Directive (PDD) Russian Central Bank Russian Cyber Command Russian Federal Security Service (FSB) Securities & Exchange Commission Syrian Electronic Army The Bundeswehr The Control System Security Centre (CSSC) of Japan The Customs Criminological Office The Federal Criminal Police Office The Federal Intelligence Service The Federal Police The National Fusion Center Association U.S. Computer Emergency Readiness Team (US-CERT) U.S. Department of Energy (DOE) U.S. Marine Corps U.S. National Security Agency (NSA) UK Ministry of Defence (MOD) UK Ministry of Justice US Cyber Command US Navy US Office of Personnel Management (OPM) Wikileaks Xian Jiaotong University