brochure - gcc cyber security market - estimation forecast, 2016-2022
TRANSCRIPT
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
GCC region has become exposed in a large extent to phishing and Distributed Denial of
Service (DDOS) attacks over the past few years. Increased interconnectivity, digitization, and
use of social media within the organizations have made the GCC region appear more
pregnable to cybercrimes.
The GCC Cyber Security market is at $5 billion in 2015 and is expected to grow at a CAGR
10.83% during the forecast period because of increased proliferation of cyber-attacks in the
GCC region, as well as governmental support and growing emphasis on Cyber Security in the
GCC region.
BIS RESEARCH 2016
www.bisresearch.com ©2015|BIS
Ÿ What are the key market trends and developments in the GCC Cyber Security market
Ÿ Cyber Security technological overview in the GCC region
Ÿ What are the benefits of cyber security in the GCC region
Ÿ What are the different types of cyber attacks prevalent in the GCC region
Ÿ What are the key drivers, challenges and opportunities for the Cyber Security market in the GCC region with their impact analysis
Ÿ Which key application verticals is utilizing Cyber Security in the GCC region with their market statistics
Ÿ What are the important Cyber Security solutions in the GCC region with their market statistics
Ÿ What are the important Cyber Security services in the GCC region with their market statistics
Ÿ Which GCC country will lead the Cyber Security market by the end of the forecast period
Ÿ Who are the key players in the GCC Cyber Security market
The answers to the following key questions can be found in the report:
Analysis & Forecast:
Base Year: 2015
7 Year Annual Estimated Forecast
(2016-2022)
Market, By Solutions: Network Security,
Endpoint Security, Content Security,
Application Security, Industrial Control
System Security, Cloud Security
Market, By Services: Consulting Services,
Risk Assessment Services, Training
Services, Design and Integration Services,
and Others
Market By Application Verticals: BFSI,
Aerospace and Defense, Healthcare,
Manufacturing, Telecommunications, and
Others
Market, By Country: Saudi Arabia, UAE,
Qatar, Kuwait, Bahrain, and Oman
$XXBillion
$XXBillion ATTRACTIVE MARKET OPPORTUNITIES
§ New Technological Advancements: Big Data and
Internet of Things (IOT)
§ Emerging market for smart devices
2015 2022
www.bisresearch.com ©2015|BIS
Table of Contents
1 EXECUTIVE SUMMARY 4.7.4 MARKET OPPORTUNITIES
4.7.4.1 NEW TECHNOLOGICAL ADVANCEMENTS LIKE BIG DATA AND INTERNET OF THINGS (IOT)2 RESEARCH SCOPE
4.7.4.2 EMERGING MARKET FOR SMART DEVICES2.1 MARKET DEFINITION
2.2 REPORT COVERAGE5 COMPETITIVE OVERVIEW2.2.1 MARKET CLASSIFICATION5.1 INTRODUCTION2.2.1.1 MARKET SEGMENTATION BY CYBER SECURITY
SOLUTIONS 5.2 KEY MARKET DEVELOPMENT TRENDS
2.2.1.2 MARKET SEGMENTATION BY CYBER SECURITY 5.3 PARTNERSHIPS, COLLABORATIONS AND SERVICES AGREEMENTS
2.2.1.3 MARKET SEGMENTATION BY APPLICATION 5.4 PRODUCT LAUNCHVERTICALS 5.5 ACQUISITIONS
2.2.1.4 MARKET SEGMENTATION BY COUNTRIES 5.6 BUSINESS EXPANSION2.3 STAKEHOLDERS 5.7 PORTER’S FIVE FORCES ANALYSIS
5.7.1 THREAT OF NEW ENTRANTS3 RESEARCH METHODOLOGY 5.7.2 BARGAINING POWER OF BUYERS3.1 RESEARCH FLOW 5.7.3 BARGAINING POWER OF SUPPLIERS3.2 FACTOR ANALYSIS 5.7.4 THREAT OF SUBSTITUTE PRODUCTS OR 3.2.1 DEMAND SIDE FACTORS SERVICES
3.2.2 SUPPLY SIDE FACTORS 5.7.5 RIVALRY AMONG EXISTING FIRMS
3.3 RESEARCH DESIGN
3.3.1 PARAMETERS 6 INDUSTRY ANALYSIS
3.3.2 SECONDARY RESEARCH 6.1 INTRODUCTION
3.3.2.1 KEY DATA POINTS FROM SECONDARY 6.2 LAWS /REGULATORY BODIESSOURCES 6.3 PATENTS
3.3.3 PRIMARY RESEARCH 6.4 STANDARDS3.3.3.1 KEY DATA POINTS FROM PRIMARY SOURCES 6.5 VALUE CHAIN ANALYSIS3.3.4 DATA TRIANGULATION 6.5.1 CYBER SECURITY PROBLEM RECOGNITION3.3.4.1 BOTTOM UP APPROACH 6.5.2 CYBER SECURITY SERVICE PROVIDERS3.3.5 TOP DOWN APPROACH 6.5.3 CYBER SECURITY SOLUTION PROVIDERS3.4 ASSUMPTIONS 6.5.4 DISTRIBUTORS3.5 YEARS CONSIDERED
7 GCC CYBER SECURITY MARKET BY 4 MARKET OVERVIEW SOLUTIONS AND SERVICES
4.1 INTRODUCTION 7.1 INTRODUCTION
4.2 HISTORY AND EVOLUTION OF CYBER CRIMES 7.1.1 MARKET STATISTICSGLOBALLY 7.2 GCC CYBER SECURITY MARKET BY
4.3 CYBER CRIMES IMPACT IN THE GCC REGION SOLUTIONS
4.4 CYBER SECURITY BENEFITS IN THE GCC 7.2.1 INTRODUCTIONREGION 7.2.1.1 MARKET STATISTICS
4.5 CYBER ATTACKS CLASSIFICATION 7.2.2 NETWORK SECURITY4.6 CYBER SECURITY TECHNOLOGICAL 7.2.3 INTRODUCTION
OVERVIEW 7.2.3.1 KEY FACTS4.7 MARKET DYNAMICS 7.2.3.2 SIGNIFICANT DEVELOPMENTS AND PLAYERS4.7.1 INTRODUCTION 7.2.4 ENDPOINT SECURITY4.7.2 MARKET DRIVERS 7.2.4.1 INTRODUCTION4.7.2.1 PROLIFERATION OF CYBER ATTACKS 7.2.4.2 KEY FACTS4.7.2.2 INCREASED GOVERNMENT 7.2.4.3 SIGNIFICANT DEVELOPMENTS AND KEY
ACKNOWLEDGMENT FOR CYBER SECURITY PLAYERS4.7.3 MARKET CHALLENGES 7.2.5 CONTENT SECURITY4.7.3.1 UNDER SKILLED WORKFORCE 7.2.5.1 INTRODUCTION
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
7.2.5.2 KEY FACTS 8.3.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS
7.2.5.3 SIGNIFICANT DEVELOPMENTS AND KEY 8.4 HEALTHCARE SECTORPLAYERS 8.4.1 INTRODUCTION
7.2.6 APPLICATION SECURITY 8.4.2 MARKET STATISTICS7.2.6.1 INTRODUCTION 8.4.3 SIGNIFICANT FACTS7.2.7 KEY FACTS 8.4.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS7.2.7.1 SIGNIFICANT DEVELOPMENTS AND PLAYERS 8.5 TELECOMMUNICATION SECTOR7.2.8 INDUSTRIAL CONTROL SYSTEM SECURITY 8.5.1 INTRODUCTION7.2.8.1 INTRODUCTION 8.5.2 MARKET STATISTICS7.2.8.2 KEY FACTS 8.5.3 KEY FACTS7.2.8.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 8.5.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS7.2.9 CLOUD SECURITY 8.6 MANUFACTURING SECTOR7.2.9.1 INTRODUCTION 8.6.1 INTRODUCTION7.2.9.2 KEY FACTS 8.6.2 MARKET STATISTICS7.2.9.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 8.6.3 KEY FACTS7.3 GCC CYBER SECURITY MARKET BY SERVICES 8.6.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS7.3.1 INTRODUCTION 8.6.5 OTHERS7.3.2 MARKET STATISTICS 8.6.5.1 Market statistics7.3.3 CYBER SECURITY CONSULTING SERVICES
7.3.3.1 INTRODUCTION 9 GCC CYBER SECURITY MARKET BY COUNTRY7.3.3.2 KEY FACTS 9.1 INTRODUCTION7.3.3.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 9.1.1 MARKET STATISTICS7.3.4 CYBER SECURITY RISK ASSESSMENT 9.2 UNITED ARAB EMIRATES (U.A.E)
SERVICES 9.2.1 POTENTIAL FACTS7.3.4.1 INTRODUCTION 9.2.2 MARKET STATISTICS7.3.4.2 KEY FACTS 9.2.3 KEY CYBER ATTACKS7.3.4.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 9.2.4 KEY REGULATORY BODIES/REGULATION/LAWS7.3.5 CYBER SECURITY DESIGN AND INTEGRATION 9.2.5 KEY DEVELOPMENTS
SERVICES9.2.6 KEY PLAYERS
7.3.5.1 INTRODUCTION9.2.7 KEY FACTORS DRIVING THE MARKET
7.3.5.2 KEY FACT9.3 SAUDI ARABIA
7.3.5.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS9.3.1 POTENTIAL FACTS
7.3.6 TRAINING AND EDUCATION SERVICES9.3.2 MARKET STATISTICS
7.3.6.1 INTRODUCTION9.3.3 KEY CYBER ATTACKS/THREATS
7.3.6.2 KEY FACTS9.3.4 KEY ACTS/LAWS
7.3.6.3 Significant Developments and Players9.3.5 KEY DEVELOPMENTS
7.3.7 OTHERS9.3.6 KEY PLAYERS
9.3.7 KEY FACTORS DRIVING THE MARKET8 GCC CYBER SECURITY MARKET BY
9.4 QATARAPPLICATION VERTICALS9.4.1 POTENTIAL FACTS8.1 INTRODUCTION9.4.2 MARKET STATISTICS8.1.1 MARKET STATISTICS9.4.3 KEY CYBER ATTACKS/THREATS IN QATAR8.2 BANKING, FINANCIAL SERVICES AND 9.4.4 KEY REGULATORY BODY/LAWINSURANCE (BFSI) SECTOR9.4.5 KEY DEVELOPMENTS8.2.1 INTRODUCTION9.4.6 KEY PLAYERS8.2.2 MARKET STATISTICS9.4.7 KEY FACTORS DRIVING THE MARKET8.2.3 KEY FACTS9.5 KUWAIT8.2.4 KEY DEVELOPMENTS AND PLAYERS9.5.1 POTENTIAL FACTS8.3 AEROSPACE AND DEFENCE SECTOR9.5.2 MARKET STATISTICS8.3.1 INTRODUCTION9.5.3 CYBER ATTACKS/THREATS8.3.2 MARKET STATISTICS
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
9.5.4 KEY LAW 10.1.4 FORTINET INC
9.5.5 KEY DEVELOPMENTS 10.1.4.1 OVERVIEW
9.5.6 KEY PLAYERS 10.1.4.2 FINANCIALS
9.5.7 KEY FACTORS DRIVING THE MARKET 10.1.4.2.1 Overall revenue
9.6 BAHRAIN 10.1.5 TREND MICRO INC
9.6.1 POTENTIAL FACTS 10.1.5.1 OVERVIEW
9.6.2 MARKET STATISTICS 10.1.5.2 FINANCIALS
9.6.3 CYBER ATTACKS/THREATS 10.1.5.2.1 Overall revenue
9.6.4 KEY LAW 10.2 KEY CYBER SECURITY SERVICE PROVIDERS
9.6.5 KEY DEVELOPMENTS 10.2.1 BOOZ ALLEN HAMILTON CORPORATION
9.6.6 KEY PLAYERS 10.2.1.1 OVERVIEW
9.6.7 KEY FACTORS DRIVING THE MARKET 10.2.1.2 FINANCIALS
9.7 OMAN 10.2.1.2.1 Overall Financials
9.7.1 POTENTIAL FACTS 10.2.1.3 KEY DEVELOPMENTS AND STRATEGIES (2012-2014)9.7.2 MARKET STATISTICS10.2.2 COMPUTER SCIENCE CORPORATION (CSC)9.7.3 KEY CYBER ATTACKS/THREATS10.2.2.1 OVERVIEW9.7.4 KEY LAW10.2.2.2 Financials9.7.5 KEY DEVELOPMENTS10.2.2.2.1 Overall Financials9.7.6 KEY PLAYERS10.2.2.3 KEY DEVELOPMENTS AND STRATEGIES (2012-9.7.7 KEY FACTORS DRIVING THE MARKET2014)
10.2.3 FIREEYE INC10 KEY MARKET PLAYERS PROFILE10.2.3.1 OVERVIEW10.1 KEY CYBER SECURITY SOLUTION PROVIDERS10.2.3.2 FINANCIALS10.1.1 CISCO CORPORATION10.2.3.2.1 Overall revenue10.1.1.1 OVERVIEW10.2.4 KASPERSKY LAB10.1.1.2 FINANCIALS10.2.4.1 OVERVIEW10.1.1.2.1 Overall Financials10.2.4.2 FINANCIALS10.1.1.2.2 Net revenue by business segments10.2.5 SYMANTEC CORPORATION10.1.1.3 KEY DEVELOPMENTS AND STRATEGIES (2015)10.2.5.1 OVERVIEW10.1.2 MCAFEE CORPORATION10.2.5.2 FINANCIALS10.1.2.1 OVERVIEW10.2.5.2.1 Overall revenue10.1.2.2 FINANCIALS
10.1.2.2.1 Overall Financials
10.1.2.3 KEY DEVELOPMENTS AND STRATEGIES(2013-2015)
10.1.3 CASSIDIAN CYBERSECURITY COMPANY
10.1.3.1 OVERVIEW
10.1.3.2 KEY DEVELOPMENTS AND STRATEGIES(2012-2014)
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
List of Tables
TABLE 1 SIGNIFICANT FACTS RELATED TO THE POTENTIAL OF CYBER SECURITY MARKET FOR THE GCC COUNTRIES
TABLE 2 MARKET ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY MARKET: CONSIDERATIONS AND CROSS MAPPING
TABLE 3 ASSUMPTION TABLE
TABLE 4 SIGNIFICANT CYBER THREATS PREVALENT IN THE GCC REGION
TABLE 5 SIGNIFICANT TECHNOLOGICAL SOLUTION AND KEY DEVELOPMENT IN THE GCC REGION
TABLE 6 PARTNERSHIPS, COLLABORATIONS AND AGREEMENTS IN THE GCC CYBER SECURITY MARKET
TABLE 7 PRODUCT LAUNCH IN THE GCC CYBER ECURITY MARKET
TABLE 8 ACQUISITIONS IN THE GCC CYBER SECURITY MARKET
TABLE 9 BUSINESS EXPANSION IN THE GCC CYBER SECURITY MARKET
TABLE 10 BUYERS AND SUPPLIERS IN GCC CYBER SECURITY MARKET
TABLE 11 KEY FACTORS CONSIDERED FOR THREAT FROM NEW ENTRANTS: GCC CYBER SECURITY MARKET
TABLE 12 KEY FACTORS AFFECTING BARGAINING POWER OF BUYERS: GCC CYBER SECURITY MARKET
TABLE 13 KEY FACTORS AFFECTING THE BARGAINING POWER OF SUPPLIERS: GCC CYBER SECURITY MARKET
TABLE 14 KEY FACTORS AFFECTING THREAT OF SUBSTITUTE PRODUCTS OR SERVICES: GCC CYBER SECURITY MARKET
TABLE 15 KEY FACTORS DETERMINING RIVALRY AMONG EXISTING FIRMS: GCC CYBER SECURITY MARKET
TABLE 16 KEY LAWS AND REGULATORY BODY: GCC CYBER SECURITY
TABLE 17 SOME KEY PLAYER’S PATENTS IN THE CYBER SECURITY MARKET
TABLE 18 KEY STANDARDS FOR CYBER SECURITY MARKET IN THE GULF REGION
TABLE 19 GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS AND SERVICES ($BILLION), 2015-2022
TABLE 20 MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SOLUTIONS
TABLE 21 GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($MILLION), 2015-2022
TABLE 22 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE APPLICATION VERTICALS ($MILLION), 2015-2022
TABLE 23 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN GCC COUNTRIES ($MILLION), 2015-2022
TABLE 24 SIGNIFICANT DEVELOPMENTS: NETWORK SECURITY IN GCC REGION
TABLE 25 SIGNIFICANT DEVELOPMENTS: ENDPOINT SECURITY IN THE GCC REGION
TABLE 26 SIGNIFICANT DEVELOPMENTS: CONTENT SECURITY IN THE GCC REGION
TABLE 27 SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION
TABLE 28 SIGNIFICANT DEVELOPMENTS: INDUSTRIAL CONTROL SECURITY IN THE GCC REGION
TABLE 29 SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION
TABLE 30 MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SERVICES
TABLE 31 GCC CYBER SECURITY MARKET VALUE BY SERVICES ($MILLION), 2015-2022
TABLE 32 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN APPLICATION VERTICALS ($MILLION), 2015-2022
TABLE 33 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN GCC COUNTRIES ($MILLION), 2015-2022
TABLE 34 SIGNIFICANT DEVELOPMENTS: CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION
TABLE 35 SIGNIFICANT DEVELOPMENTS: CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION
TABLE 36 SIGNIFICANT DEVELOPMENTS: CYBER SECURITY INTEGRATION AND DESIGN SERVICES IN THE
GCC REGION
TABLE 37 CYBER SECURITY TRAINING SERVICES IN THE GCC REGION: SIGNIFICANT DEVELOPMENTS
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
TABLE 38 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS ($MILLION), 2015-2022
TABLE 39 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE BFSI APPLICATION VERTICAL ($MILLION), 2015-2022
TABLE 40 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($ MILLION), 2015-2022
TABLE 41 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE BFSI DOMAIN ($MILLION), 2015-2022
TABLE 42 GCC CYBER SECURITY MARKET VALUE OF BFSI APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022
TABLE 43 GCC CYBER SECURITY BY BANKING AND FINANCIAL SECTOR: SIGNIFICANT DEVELOPMENTS
TABLE 44 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE AEROSPACE AND DEFENCE APPLICATION VERTICAL ($MILLION), 2015-2022
TABLE 45 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($MILLION), 2015-2022
TABLE 46 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE AEROSPACE AND DEFENCE DOMAIN ($MILLION), 2015-2022
TABLE 47 GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022
TABLE 48 GCC CYBER SECURITY BY AEROSPACE AND DEFENCE SECTOR: KEY DEVELOPMENTS
TABLE 49 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE HEALTHCARE
APPLICATION VERTICAL ($MILLION), 2015-2022
TABLE 50 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022
TABLE 51 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022
TABLE 52 GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022
TABLE 53 GCC CYBER SECURITY BY HEALTHCARE SECTOR: SIGNIFICANT DEVELOPMENTS
TABLE 54 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE TELECOMMUNICATION APPLICATION VERTICAL ($MILLION), 2015-2022
TABLE 55 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE TELECOMMUNICATION DOMAIN
($MILLION), 2015-2022
TABLE 56 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE TELECOMMUNICATION DOMAIN ($MILLION), 2015-2022
TABLE 57 GCC CYBER SECURITY MARKET VALUE OF TELECOMMUNICATION APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022
TABLE 58 GCC CYBER SECURITY BY TELECOMMUNICATION SECTOR: SIGNIFICANT DEVELOPMENTS
TABLE 59 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE MANUFACTURING APPLICATION VERTICAL ($MILLION), 2015-2022
TABLE 60 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022
TABLE 61 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022
TABLE 62 GCC CYBER SECURITY MARKET VALUE OF MANUFACTURING APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022
TABLE 63 GCC CYBER SECURITY BY MANUFACTURING SECTOR: KEY DEVELOPMENTS
TABLE 64 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION),
2015-2022
TABLE 65 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION), 2015-2022
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
TABLE 66 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL ($MILLION), 2015-2022
TABLE 67 GCC CYBER SECURITY MARKET VALUE OF OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022
TABLE 68 GCC CYBER SECURITY MARKET VALUE BY COUNTRIES ($MILLION), 2015-2022
TABLE 69 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE U.A.E ($MILLION),
2015-2022
TABLE 70 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN THE U.A.E ($MILLION),2015-2022
TABLE 71 SIGNIFICANT CYBER ATTACKS IN THE U.A.E
TABLE 72 U.A.E CYBER SECURITY REGULATORY BODY AND LAWS ILLUSTRATION
TABLE 73 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN THE UAE
TABLE 74 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN SAUDI ARABIA ($MILLION), 2015-2022
TABLE 75 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN SAUDI ARABIA ($MILLION), 2015-2022
TABLE 76 SIGNIFICANT CYBER ATTACKS/THREATS IN SAUDI ARABIA
TABLE 77 SAUDI ARABIA CYBER SECURITY LAW ILLUSTRATION
TABLE 78 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN SAUDI ARABIA
TABLE 79 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN QATAR ($MILLION),2015-2022
TABLE 80 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN QATAR ($MILLION),2015-2022
TABLE 81 SIGNIFICANT CYBER ATTACKS/THREATS IN QATAR
TABLE 82 QATAR CYBER SECURITY REGULATORY BODY AND LAWS ILLUSTRATION
TABLE 83 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN QATAR
TABLE 84 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN KUWAIT ($MILLION),2015-2022
TABLE 85 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN KUWAIT ($MILLION),2015-2022
TABLE 86 SIGNIFICANT CYBER ATTACKS/THREATS IN KUWAIT
TABLE 87 KUWAIT CYBER SECURITY LAW ILLUSTRATION
TABLE 88 CYBER SECURITY SIGNIFICANT DEVELOPMENTS IN KUWAIT
TABLE 89 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN BAHRAIN ($MILLION),
2015-2022
TABLE 90 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN BAHRAIN ($MILLION),2015-2022
TABLE 91 SIGNIFICANT CYBER ATTACKS/THREATS IN BAHRAIN
TABLE 92 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN BAHRAIN
TABLE 93 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OMAN ($MILLION),2015-2022
TABLE 94 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN OMAN ($MILLION),2015-2022
TABLE 95 SIGNIFICANT CYBER ATTACKS/THREATS IN OMAN
TABLE 96 ILLUSTRATION OF OMAN CYBER SECURITY LAW
TABLE 97 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN OMAN
TABLE 98 CISCO CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 24, 2015 ($BILLION)
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
TABLE 99 CISCO CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2015)
TABLE 100 MCAFEE CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 13, 2015 ($MILLION)
TABLE 101 MCAFEE CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2013-2015)
TABLE 102 CASSIDIAN CYBER SECURITY COMPANY: KEY DEVELOPMENTS AND STRATEGIES (2012-2014)
TABLE 103 BOOZ ALLEN HAMILTON: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION)
TABLE 104 BOOZ ALLEN HAMILTON CORPORTION: KEY DEVELOPMENTS AND STRATEGIES (2012-2014)
TABLE 105 COMPUTER SCIENCE CORPORATION: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION)
TABLE 106 COMPUTER SCIENCE CORPORATION (CSC): KEY DEVELOPMENTS AND STRATEGIES (2013-2015)
List of Figures
FIGURE 1 GCC CYBER SECURITY MARKET SIZE SNAPSHOT
FIGURE 2 GCC CYBER SECURITY MARKET SHARE BY SOLUTIONS AND SERVICES 2015 (%)
FIGURE 3 GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($BILLION), 2015-2022
FIGURE 4 GCC CYBER SECURITY MARKET SHARE BY SERVICES , 2015-2022
FIGURE 5 GCC CYBER SECURITY MARKET SHARE BY APPLICATION VERTICAL, 2015-2022
FIGURE 6 GCC CYBER SECURITY MARKET BY COUNTRIES, 2015-2022
FIGURE 7 REPORT COVERAGE SNAPSHOT: GCC CYBER SECURITY MARKET
FIGURE 8 MARKET CLASSIFICATION
FIGURE 9 KEY ELEMENTS CONSIDERED FOR DETAILED ANALYSIS OF EACH CLASSIFICATION IN THE GCC CYBER SECURITY MARKET
FIGURE 10 GCC CYBER SECURITY: MARKET SEGMENTATION BY SOLUTIONS
FIGURE 11 GCC CYBER SECURITY: MARKET SEGMENTATION BY SERVICES
FIGURE 12 GCC CYBER SECURITY: MARKET SEGMENTATION BY APPLICATION VERTICALS
FIGURE 13 GCC CYBER SECURITY: MARKET SEGMENTATION BY COUNTRIES
FIGURE 14 KEY STAKEHOLDERS
FIGURE 15 RESEARCH FLOW
FIGURE 16 DEMAND SIDE FACTORS
FIGURE 17 SUPPLY SIDE FACTORS
FIGURE 18 PARAMETERS
FIGURE 19 DATA POINTS FROM SECONDARY SOURCES
FIGURE 20 DATA POINTS FROM PRIMARY SOURCES
FIGURE 21 DATA TRIANGULATION
FIGURE 22 BOTTOM UP APPROACH
FIGURE 23 TOP DOWN APPROACH
FIGURE 24 YEARS CONSIDERED
FIGURE 25 MARKET OVERVIEW: KEY ELEMENTS COVERED
FIGURE 26 HISTORY OF SIGNIFICANT CYBER ATTACKS
FIGURE 27 CYBER SECURITY BENEFITS IN THE GCC REGION
FIGURE 28 MARKET DYNAMICS
FIGURE 29 KEY DRIVERS FOR THE GCC CYBER SECURITY MARKET
FIGURE 30 MARKET DRIVERS: IMPACT ANALYSIS
FIGURE 31 GOVERNMENT INITIATIVES FOR CYBER SECURITY IN THE GCC REGION
FIGURE 32 MARKET CHALLENGE IMPACT ANALYSIS
FIGURE 33 SKILL GAPS
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
FIGURE 34 GCC CYBER SECURITY MARKET OPPORTUNITIES
FIGURE 35 MARKET OPPORTUNITIES IMPACT ANALYSIS
FIGURE 36 COMPETITIVE OVERVIEW: GCC CYBER SECURITY MARKET
FIGURE 37 KEY MARKET DEVELOPMENT STRATEGIES
FIGURE 38 KEY TRENDS: GCC CYBER SECURITY MARKET
FIGURE 39 KEY PLAYERS IN PARTNERSHIP, COLLABORATION AND AGREEMENTS
FIGURE 40 KEY PLAYERS IN PRODUCT LAUNCH IN THE GCC CYBER SECURITY MARKET
FIGURE 41 KEY PLAYERS IN THE ACQUISITION IN THE GCC CYBER SECURITY MARKET
FIGURE 42 KEY PLAYERS IN THE GCC CYBER SECURITY MARKET
FIGURE 43 PORTER FIVE FORCES ANALYSIS FRAMEWORK
FIGURE 44 IMPACT OF EACH PORTER’S FIVE FORCES ON THE GCC CYBER SECURITY MARKET
FIGURE 45 VALUE CHAIN
FIGURE 46 GCC CYBER SECURITY MARKET BY SOLUTIONS AND SERVICES: SECTION COVERAGE
FIGURE 47 SOLUTIONS AND SERVICES: STATISTICAL COVERAGE
FIGURE 48 GCC CYBER SECURITY MARKET BY SOLUTIONS
FIGURE 49 NETWORK SECURITY COMPONENTS
FIGURE 50 NETWORK SECURITY IN THE GCC REGION: KEY FACTS
FIGURE 51 SOME KEY NETWORK SECURITY VENDORS: GCC REGION
FIGURE 52 ENDPOINT SECURITY: SNAPSHOT
FIGURE 53 KEY ELEMENTS IN THE ENDPOINT SECURITY MANAGEMENT
FIGURE 54 KEY FACTS: ENDPOINT SECURITY IN THE GCC REGION
FIGURE 55 KEY ENDPOINT SECURITY VENDORS: GCC REGION
FIGURE 56 PROCESS OF CROSS SITE SCRIPTING ATTACK
FIGURE 57 CONTENT SECURITY IN THE GCC REGION: KEY FACTS
FIGURE 58 KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION
FIGURE 59 APPLICATION SECURITY IMPLEMENTATION IN SDLC
FIGURE 60 APPLICATION SECURITY: KEY ELEMENTS
FIGURE 61 KEY FACTS: APPLICATION SECURITY IN THE GCC REGION
FIGURE 62 KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION
FIGURE 63 INDUSTRIAL CONTROL SYSTEM TYPES
FIGURE 64 KEY FACTS: INDUSTRIAL CONTROL SYSTEM SECURITY IN THE GCC REGION
FIGURE 65 KEY INDUSTRIAL CONTROL SECURITY SOLUTION VENDORS: GCC REGION
FIGURE 66 CLOUD SECURITY: KEY ELEMENTS
FIGURE 67 CLOUD SECURITY IN THE GCC REGION: KEY FACTS
FIGURE 68 KEY CLOUD SECURITY SOLUTION VENDORS: GCC REGION
FIGURE 69 GCC CYBER SECURITY MARKET BY SERVICES
FIGURE 70 CYBER SECURITY CONSULTING SERVICES: KEY ELEMENTS
FIGURE 71 CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION: KEY FACTS
FIGURE 72 KEY CYBER SECURITY CONSULTING PROVIDERS: GCC REGION
FIGURE 73 RISK ASSESSMENT IN CYBER SECURITY: KEY STEPS
FIGURE 74 CYBER SECURITY RISK ASSESSMENT PROCESS
FIGURE 75 CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION: KEY FACTS
FIGURE 76 KEY CYBER SECURITY RISK ASSESSMENT PROVIDERS: GCC REGION
FIGURE 77 INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORK
FIGURE 78 KEY CYBER SECURITY INTEGRATION AND DESIGN SERVICE PROVIDERS: GCC REGION
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
FIGURE 79 CYBER SECURITY TRAINING AND EDUCATION SERVICES: KEY ELEMENTS
FIGURE 80 KEY FACTS: CYBER SECURITY TRAINING SERVICES IN THE GULF REGION
FIGURE 81 KEY PLAYERS: CYBER SECURITY TRAIINING AND EDUCATION SERVICE PROVIDER IN THE GCC REGION
FIGURE 82 OTHER CYBER SECURITY SERVICES
FIGURE 83 GCC CYBER SECURITY MARKET SEGMENTATION BY APPLICATION VERTICALS
FIGURE 84 APPLICATION VERTICALS: STATISTICAL COVERAGE
FIGURE 85 BANKING MALWARE: GCC REGION
FIGURE 86 BFSI SECTOR KEY FACTS RELATED TO GCC CYBER SECURITY MARKET
FIGURE 87 CYBER ATTACKS: BANKING AND FINANCIAL SECTOR IN THE GCC REGION
FIGURE 88 KEY CYBER SECURITY PLAYERS IN THE BANKING AND FINANCIAL SECTOR IN THE GCC REGION
FIGURE 89 KEY CYBER SECURITY ELEMENTS: AEROSPACE AND DEFENCE SECTOR
FIGURE 90 KEY CYBER SECURITY PLAYERS IN THE AEROSPACE AND DEFENCE SECTOR IN THE GCC REGION
FIGURE 91 HEALTHCARE SECTOR SIGNIFICANT FACTS FOR THE GCC CYBER SECURITY MARKET
FIGURE 92 KEY CYBER SECURITY PLAYERS IN THE HEALTHCARE SECTOR IN THE GCC REGION
FIGURE 93 KEY FACTS RELATED TO TELECOMMUNICATIONS SECTOR FOR THE GCC CYBER SECURITY MARKET
FIGURE 94 KEY CYBER SECURITY PLAYERS IN THE TELECOMMUNICATION SECTOR IN THE GCC REGION
FIGURE 95 KEY CYBER SECURITY PLAYERS IN THE MANUFACTURING SECTOR IN THE GCC REGION
FIGURE 96 GCC REGION: COUNTRIES
FIGURE 97 GCC CYBER SECURITY MARKET: COUNTRIES SECTION COVERAGE
FIGURE 98 GCC COUNTRY ANALYSIS: STATISTICAL COVERAGE
FIGURE 99 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN THE UAE
FIGURE 100 KEY CYBER SECURITY PLAYERS IN THE U.A.E
FIGURE 101 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN THE U.A.E
FIGURE 102 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN SAUDI ARABIA
FIGURE 103 KEY CYBER SECURITY PLAYERS IN SAUDI ARABIA
FIGURE 104 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN SAUDI ARABIA
FIGURE 105 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN QATAR
FIGURE 106 KEY CYBER SECURITY PLAYERS IN QATAR
FIGURE 107 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN QATAR
FIGURE 108 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN KUWAIT
FIGURE 109 KEY CYBER SECURITY PLAYERS IN KUWAIT
FIGURE 110 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN KUWAIT
FIGURE 111 POTENTIAL FACTS FOR CYBER SECURITY IN BAHRAIN
FIGURE 112 KEY CYBER SECURITY PLAYERS IN BAHRAIN
FIGURE 113 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN BAHRAIN
FIGURE 114 POTENTIAL FACTS FOR CYBER SECURITY IN OMAN
FIGURE 115 KEY CYBER SECURITY PLAYERS IN OMAN
FIGURE 116 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN OMAN
FIGURE 117 CISCO CORPORATION: OVERALL FINANCIALS, 2013-2015 ($BILLION)
FIGURE 118 NET REVENUE BY PRODUCTS AND SERVICES
FIGURE 119 MCAFEE CORPORATION: OVERALL FINANCIALS, 2012-2014 ($MILLION)
FIGURE 120 FORTINET INC: OVERALL REVENUE, 2012-2014 ($MILLION)
FIGURE 121 FORTINET INC: TOTAL REVENE BY REGION ($MILLION)
GCC Cyber Security Market – Estimation & Forecast, 2016–2022
www.bisresearch.com ©2015|BIS
FIGURE 122 TREND MICRO CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION)
FIGURE 123 BOOZ ALLEN HAMILTON CORPORATION: OVERALL FINANCIALS, 2012-2014 ($BILLION)
FIGURE 124 COMPUTER SCIENCE CORPORATION (CSC): OVERALL FINANCIALS, 2013-2015 ($BILLION)
FIGURE 125 FIREEYE CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION)
FIGURE 126 SYMANTEC CORPORATION: OVERALL REVENUE, 2013-2015 ($BILLION)
About BIS (www.bisresearch.com)
BIS Research provides valuable market intelligence to an exclusive group of customers in response to orders. The report is licensed for
the customer's internal use only and is subject to restrictions set henceforth. This document and its contents are confidential and may not
be further distributed, published or reproduced, in whole or in part, by any medium or in any form for any purpose, without the express
written consent of BIS Research. Customer will not disclose the contents of the report, whether directly in any media or indirectly through
incorporation in a database, marketing list, report or otherwise, or use or permit the use of Information to generate any statistical or other
information that is or will be provided to third parties; or voluntarily produce Information in legal proceedings.
Market reports are based on expectations, estimates and projections as of the date such information is available. Any recommendation
contained in this report may not be suitable for all investors or businesses. The market conclusions drawn are necessarily based upon a
number of estimates and assumptions that, while considered reasonable by BIS Research as of the date of such statements, are
inherently subject to market fluctuations and business, economic and competitive uncertainties and contingencies
BIS Research
9100 West Bloomington Freeway,
Suite 159 Bloomington,
MN 55431
E-mail : [email protected]
Call Us : +1-650-228-0182
Global Delivery Center
A-21, Kailash Colony,
New Delhi,
India
Tel : +91 11 46120391
For more details regarding permission, please contact us:
GCC Cyber Security Market – Estimation & Forecast, 2016–2022