[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis

April 2013 | 169 pages | ID: GF245E341E6EN
Visiongain

US$ 2,635.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The global market for cyber solutions has been a topic of increasing interest in a variety of industries and public sector organisations for several years and for a number of reasons. The first of these is the indisputable rise of cyber crime, malware attack, information theft and hacking which has accompanied the expansion of the internet. Threat of attack via cyberspace has in recent years become a real concern not only of public organisations guarding state secrets, but also of commercial entities seeking to remain profitable.

Whether the threat is from loss of valuable data, disruption to financial services, release of intellectual property, the shutting down of critical national infrastructure or simply the reputational damage of being known to have been compromised, the possibility of cyber attack represents both a danger to national security and a potential source of major losses.

The stakes are high; visiongain has assessed the cyber security market will reach $68.34bn in 2013. As global defence budgets diminish, defence contractors are increasingly taking an interest in the growing area of cyber security through acquisitions and organic growth, which is posing a challenge to incumbent IT security providers.

What makes this report unique?

Visiongain consulted widely with industry experts and has included full transcripts from interviews with BAE Systems Detica, Booz Allen Hamilton and Finmeccanica's Selex ES within this report. As such, our reports have a unique blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments, as well as identifying the technological issues. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including company market share, revenue and contract income - all identifying strategic business opportunities.

Why you should buy Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis
  • Stay ahead with this comprehensive analysis of the defence industry prospects
    • The report comprises 169 pages
  • Get ahead by studying highly quantitative content that delivers solid conclusions benefiting your research and analysis
    • 140 tables, charts, and figures quantifying and analysing the company involvement
  • Read exclusive expert opinion interviews from industry specialists informing the analysis
    • BAE Systems Detica
    • Booz Allen Hamilton
    • Finmeccanica's Selex ES
  • View global company cyber security market share to find out who your biggest competitors are
    • The report details the global share of the cyber security market held for the 20 largest companies
  • See details of the most successful companies' product offerings and strategy
    • Read analysis of each leading company's performance and outlook.
  • Understand the competitive landscape with profiles of the 20 leading companies in the cyber security market including details of significant cyber security contracts, product & services, and analysis of their regional emphasis and strategy.
    • BAE Systems PLC
    • Boeing Company
    • Booz Allen Hamilton Inc
    • Computer Sciences Corporation (CSC)
    • EADS Group
    • Finmeccanica Group
    • General Dynamics Corporation
    • Hewlett Packard Company
    • International Business Machines Corporation (IBM)
    • Intel Corporation
    • Kaspersky Lab
    • L-3 Communications Holdings Inc
    • Lockheed Martin Corporation
    • Northrop Grumman Corporation
    • Raytheon Company
    • Science Applications International Corporation (SAIC)
    • Sophos PLC
    • Symantec Corporation
    • Thales Group
    • Trend Micro Inc
  • Discover the qualitative analysis informing the market forecasts
    • STEP analysis of competitive factors: social, technological, economic and political, factors revealing what drives and restrains companies in the cyber security market
How the Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis report can benefit you

Visiongain's report is for anyone who requires concise, accurate analysis of the cyber security market. You will discover market and technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are.

If you buy our report today your knowledge will stay one step ahead of your competitors. Discover how our report could benefit your research, analyses and strategic decisions, saving you time. To gain an understanding of how to tap into the potential of this market and keep one step ahead of the competition you must order now our report Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis.
1. EXECUTIVE SUMMARY

1.1 Assessing the Cyber Security Market Landscape
1.2 Report Benefits and Highlights
1.3 Report Structure
1.4 Methodology

2. INTRODUCTION TO THE LEADING 20 CYBER SECURITY COMPANIES 2013

2.1 Defining the Cyber Security Market
2.2 Types of Cyber Security Threat
2.3 Methods of Cyber Attack
2.4 Recent High Profile Cyber Attacks

3. COMPETITOR POSITIONING IN THE CYBER SECURITY MARKET 2013

3.1 The 20 Leading Companies in the Cyber Security Market 2013
3.2 Composition of the Cyber Security Market in 2013
3.3 Differing Backgrounds of Companies in the Cyber Security Market
3.4 Geographical Location of Companies in the Cyber Security Market
3.5 Significant Contracts in the Global Cyber Security Market 2010-2013

4. THE 20 LEADING COMPANIES IN CYBER SECURITY 2013

4.1 BAE Systems PLC Overview
  4.1.1 BAE Systems - A Strong UK & US Business
  4.1.2 BAE Systems PLC Competitors
  4.1.3 BAE Expects Continued Growth of Subsidiary Detica
  4.1.4 BAE Systems PLC Mergers & Acquisitions
  4.1.5 BAE Systems PLC Regional Focus
  4.1.6 BAE Systems PLC SWOT Analysis & Historic Revenue
4.2 Boeing Company Overview
  4.2.1 Boeing Cyber Engagement Center Drives Business
  4.2.2 Boeing Company Competitors
  4.2.3 Cost-Cutting Underpins Continued Growth At Boeing
  4.2.4 Boeing Company Mergers & Acquisitions
  4.2.5 Boeing Company Regional Focus
  4.2.6 Boeing Company SWOT Analysis & Historic Revenue
4.3 Booz Allen Hamilton Inc Overview
  4.3.1 Booz Allen Launches New Cyber Products
  4.3.2 Booz Allen Hamilton Inc Competitors
  4.3.3 Booz Allen Hamilton's Impressive Record of Growth
  4.3.4 Booz Allen Hamilton Inc Mergers & Acquisitions
  4.3.5 Booz Allen Hamilton Inc Regional Focus
  4.3.6 Booz Allen Hamilton Inc SWOT Analysis
4. Computer Sciences Corporation (CSC) Overview
  4.4.1 CSC's $600m Cyber Security Division
  4.4.2 Computer Sciences Corporation (CSC) Competitors
  4.4.3 Computer Slight Fall in Revenue at Computer Sciences Corporation (CSC)
  4.4.4 Computer Sciences Corporation (CSC) Mergers & Acquisitions
  4.4.5 Computer Sciences Corporation (CSC) Regional Focus
  4.4.6 Computer Sciences Corporation (CSC) SWOT Analysis & Historic Revenue
4.5 EADS Group Overview
  4.5.1 EADS Group's new specialist subsidiary Cassidian Cybersecurity
  4.5.2 EADS Group Competitors
  4.5.3 EADS Group Regional Focus
  4.5.4 EADS Group Records Strong Growth
  4.5.5 EADS Group Mergers and Acquisitions
  4.5.6 EADS Group SWOT Analysis & Historic Revenue
4.6 Finmeccanica Group Overview
  4.6.1 Selex Reorganisation Unifies Cyber Capabilities
  4.6.2 Finmeccanica Group Competitors
  4.6.3 Selex Cyber Solutions Represent Standout Growth Area
  4.6.4 Finmeccanica Group Mergers and Acquisitions
  4.6.5 Finmeccanica Group Regional Focus
  4.6.6 Finmeccanica Group SWOT Analysis & Historic Revenue
4.7 General Dynamics Corporation Overview
  4.7.1 GD's Government Cyber Security Specialism
  4.7.2 General Dynamics Corporation Competitors
  4.7.3 US Budget Cuts Hit General Dynamics Revenue
  4.7.4 General Dynamics Corporation Mergers and Acquisitions
  4.7.5 General Dynamics Corporation Regional Focus
  4.7.6 General Dynamics Corporation SWOT Analysis & Historic Revenue
4.8 Hewlett Packard Company Overview
  4.8.1 HP Enterprise Security Products Takes Big Share of Cyber Market
  4.8.2 Hewlett Packard Company Competitors
  4.8.3 IT Giant HP Faces Challenging Market
  4.8.4 Hewlett Packard Company Mergers and Acquisitions
  4.8.5 Hewlett Packard Company Regional Focus
  4.8.6 Hewlett Packard SWOT Analysis & Historic Revenue
4.9 International Business Machines Corporation (IBM) Overview
  4.9.1 Cyber Security Focus of IBM M&A Activity
  4.9.2 IBM Competitors
  4.9.3 IBM's Income Rises Despite Falling Revenue
  4.9.4 IBM Mergers & Acquisitions
  4.9.5 IBM Regional Focus
  4.9.6 IBM SWOT Analysis & Historic Revenue
4.10 Intel Corporation Overview
  4.10.1 McAfee Purchase Secures Intel's Leadership
  4.10.2 Intel Corporation Competitors
  4.10.3 McAfee's Reaction to a Changing Threat
  4.10.4 Intel Corporation Mergers and Acquisitions
  4.10.5 Intel Corporation Regional Focus
  4.10.6 Intel Corporation SWOT Analysis & Historic Revenue
4.11 Kaspersky Lab Overview
  4.11.1 Kaspersky Lab's Antivirus Solutions Remain Popular
  4.11.2 Kaspersky Lab Competitors
  4.11.3 Kaspersky's Swift Growth in IT Security
  4.11.4 Kaspersky Lab Regional Focus
  4.11.5 Kaspersky Lab SWOT Analysis & Historic Revenue
4.12 L-3 Communications Holdings Inc Overview
  4.12.1 STRATIS Delivers Strong Market Share for L-3
  4.12.2 L-3 Communications Holdings Inc Competitors
  4.12.3 L-3 Hit by US Spending Restraint
  4.12.4 L-3 Communications Holdings Inc Mergers and Acquisitions
  4.12.5 L-3 Communications Holdings Inc Regional Focus
  4.12.6 L-3 Communications Holdings Inc SWOT Analysis & Historic Revenue
4.13 Lockheed Martin Corporation Overview
  4.13.1 Lockheed Martin Claims Largest Share of Government Cyber Security
  4.13.2 Lockheed Martin Corporation Competitors
  4.13.3 Bright Future for Lockheed's Cyber Solutions
  4.13.4 Lockheed Martin Corporation Regional Focus
  4.13.5 Lockheed Martin Corporation SWOT Analysis
4.14 Northrop Grumman Corporation Overview
  4.14.1 M5 Network Security Purchase Bolsters Northrop's Strong Cyber Capabilities
  4.14.2 Northrop Grumman Corporation Competitors
  4.14.3 Falling Sales but Rising Incomes at Northrop Grumman
  4.14.4 Northrop Grumman Corporation Mergers & Acquisitions
  4.14.5 Northrop Grumman Corporation Regional Focus
  4.14.6 Northrop Grumman Corporation SWOT Analysis & Historic Revenue
4.15 Raytheon Company Overview
  4.15.1 Raytheon makes $2.6bn in Cyber Security Revenues
  4.15.2 Raytheon Company Competitors
  4.15.3 Raytheon Company Historic Performance & Future Outlook
  4.15.4 Raytheon Focuses on Cyber Security Acquisitions
  4.15.5 Raytheon Company Regional Focus
  4.15.6 Raytheon Company SWOT Analysis & Historic Revenue
4.16 Science Applications International Corporation (SAIC) Overview
  4.16.1 CloudShield Technologies provides SAIC with Strong Cyber Revenues
  4.16.2 Science Applications International Corporation (SAIC) Competitors
  4.16.3 SAIC Likely to Target Healthcare Information Security
  4.16.4 Science Applications International Corporation (SAIC) Mergers & Acquisitions
  4.16.5 Science Applications International Corporation (SAIC) Regional Focus
  4.16.6 Science Applications International Corporation (SAIC) SWOT Analysis & Historic Revenue
4.17 Sophos Overview
  4.17.1 Sophos Refocusing on Security as a Service
  4.17.2 Sophos Competitors
  4.17.3 Sophos Historic Performance & Future Outlook
  4.17.4 Sophos Mergers and Acquisitions
  4.17.5 Sophos Regional Focus
  4.17.6 Sophos SWOT Analysis 2013
4.18 Symantec Corporation Overview
  4.18.1 Symantec Takes Largest Share of Cyber Security Market
  4.18.2 Symantec Corporation Competitors
  4.18.3 Challenging Outlook For Market Leader Symantec
  4.18.4 Symantec Corporation Mergers & Acquisitions
  4.18.5 Symantec Corporation Regional Focus
  4.18.6 Symantec Corporation SWOT Analysis & Historic Revenue
4.19 Thales Group Overview
  4.19.1 Thales Leads European Defence Groups in Cyber Security
  4.19.2 Thales Group Competitors
  4.19.3 Slow Growth in Thales Group Revenues
  4.19.4 Thales Group Regional Focus
  4.19.5 Thales Group SWOT Analysis & Historic Revenue
4.20 Trend Micro Inc Overview
  4.20.1 Trend Micro Inc Moves Focus to Cloud Security
  4.20.2 Trend Micro Inc Competitors
  4.20.3 Trend Micro Inc Faces New Challenges in Home Market
  4.20.4 Trend Micro Inc Mergers and Acquisitions
  4.20.5 Trend Micro Inc SWOT Analysis & Historic Revenue
4.21 Other Cyber Security Companies

5. STEP ANALYSIS OF THE CYBER SECURITY MARKET 2013

6. EXPERT OPINION

6.1 Selex ES
  6.1.1 How Has Selex's Merger Affected Business?
  6.1.2 What Cyber Security Experience Does Selex ES Have?
  6.1.3 What Type of Cyber Security Products Does Selex ES Offer?
  6.1.4 Which Of Selex ES's Offerings Are Most Important?
  6.1.5 How Much of a Focus is Cyber Security for Selex ES?
  6.1.6 What Domestic Markets Are Most Important for Selex ES's Cyber Offerings?
  6.1.7 How Does Selex ES Approach the Cyber Security Market?
  6.1.8 Where is Selex ES Looking for New Business?
  6.1.9 What Companies Does Selex ES Compete With in Cyber Security?
  6.1.10 Has Finmeccanica's Involvement in Cyber Security Changed?
  6.1.11 What Trends Are Affecting Selex's Business?
  6.1.12 Are Macroeconomic Problems Slowing Down Spending on Cyber Security?
  6.1.13 Where Does Selex ES See the Cyber Security Market in 10 Years?
  6.1.14 Is Selex ES Pursuing Emerging Cyber Markets?
  6.1.15 How Is Selex ES Dealing with Challenges in the Market?
  6.1.16 How Will New Technology Change the Cyber Security Market?
  6.1.17 Is Diversification Affecting the Cyber Security Market?
6.2 Booz Allen Hamilton
  6.2.1 What Is Booz Allen Hamilton's Background?
  6.2.2 How Important is Cyber Security to Booz Allen's Business?
  6.2.3 What Is Booz Allen's Approach to Cyber Security?
  6.2.4 Does Booz Allen Have a Particular Focus in the Cyber Security Market?
  6.2.5 What Has Made Booz Allen Hamilton Successful in the Cyber Security Market?
  6.2.6 How is Booz Allen Planning to Grow Their Cyber Security Business?
  6.2.7 Who Are Booz Allen's Main Competitors in Cyber Security?
  6.2.8 Has Booz Allen Hamilton Experienced A Change in the Market?
  6.2.9 What Cyber Security Trends are Affecting Booz Allen's Business?
  6.2.10 Will the US Market Remain as Important to Booz Allen Hamilton?
  6.2.11 What Challenges Does Booz Allen Face in Cyber Security?
  6.2.12 How Will The Technology of Cyber Security Change?
  6.2.13 What Market Segments is Booz Allen Hamilton Looking to Expand its Cyber Business Into?
6.3 BAE Systems Detica
  6.3.1What is Detica's Background in Cyber Security?
  6.3.2 How Big a Focus is There on Cyber Security at Detica?
  6.3.3 How Does Detica Organise Its Cyber Security Offerings?
  6.3.4 How Much Revenue Do BAE and Detica Derive From Cyber Security?
  6.3.5 Where is Detica's Cyber Security Business Strongest?
  6.3.6 Is Detica Focused on Commercial or Public Sector Business?
  6.3.7 What Are Detica's Strengths in the Cyber Security Market?
  6.3.8 Which Cyber Security Market Segments Does Detica Prioritise?
  6.3.9 Which Companies Compete with Detica's Cyber Security Offerings?
  6.3.10 What Changes Has Detica Experienced in the Cyber Security Market?
  6.3.11 What Market Trends are Affecting Detica?
  6.3.12 Has Demand for Detica's Services Been Affected by Macroeconomic Issues?
  6.3.13 What Are Detica's Expectations for Market Growth?
  6.3.14 Which of Detica's Business Areas Are Expected to Perform Best in the Future?
  6.3.15 What Challenges Does Detica Expect to Have to Overcome?
  6.3.16 How Will New Technologies Affect Detica's Business?
  6.3.17 Is Detica Affected by Increasing Competition in Cyber Security?
  6.3.18 What Cyber Security Threats Are Detica Currently Tracking?
  6.3.19 Are State-Sponsored Cyber Attacks Becoming A Serious Issue?

7. CONCLUSIONS

7.1 Market Share & Outlook for the 20 Leading Cyber Security Companies

8. GLOSSARY

LIST OF FIGURES

Figure 4.1 BAE Systems PLC Company Structure 2013
Figure 4.2 Boeing Company Structure 2013
Figure 4.3 Computer Sciences Corporation (CSC)Inc Structure 2013
Figure 4.4 EADS Group Structure 2013
Figure 4.5 Finmeccanica Group Structure 2013
Figure 4.6 General Dynamics Corporation Company Structure 2013
Figure 4.7 Hewlett Packard Company Structure 2013
Figure 4.8 International Business Machines Corporation (IBM) Structure 2013
Figure 4.9 Intel Corporation Structure 2013
Figure 4.10 L-3 Communications Holdings Inc Structure 2013
Figure 4.11 Lockheed Martin Corporation Structure 2013
Figure 4.12 Northrop Grumman Corporation Structure 2013
Figure 4.13 Raytheon Company Structure 2013
Figure 4.14 Science Applications International Corporation (SAIC) Structure 2013
Figure 4.15 Symantec Corporation Structure 2013
Figure 4.16 Thales Group Structure 2013
Figure 4.17 Trend Micro Inc Structure 2013

COMPANIES LISTED

3Di Technologies LLC
42Six Solutions LLC
Advanced Micro Devices (AMD)
Aerient LLC
Aeromet International PLC
Affirm Trust
Airbus
Airbus Military
Alion Science & Technology Company
Altan
Apax Partners LLP
Applied Signal Technology Inc
ArcSight Inc
Argon ST
ARINC
Assured Information Security Inc
Astaro
Astrium
AVAST Software AS
AVG Technologies
AXA Matrix Risk Consultants
Aydin CyberSecurity
BAE Australia
BAE Detica
BAE Electronic Systems
BAE Inc
BAE India
BAE Intelligence & Security
BAE Land & Armaments
BAE Saudi Arabia
BAE Systems PLC
BBN Technologies
Boeing Company
Boeing Cyber Engagement Center (CEC)
Boeing Defence, Space & Security
Boeing Information Solutions
Boeing Intelligence Systems Group
Booz & Company
Booz Allen Hamilton Inc
BreakingPoint Systems
Brinqa
Business Computers Management Consulting Group LLC
CACI International Inc
Camber Corporation
Cassidian
Cassidian Cybersecurity
Chemring Group
Cisco Systems Inc
CloudShield Technologies Inc
Computer Sciences Corporation (CSC)
Context IS
Corero Network Security
Creative Computing Solutions (CCSi)
Cubic XD
Defense Systems Engineering & Support
Dell Secureworks
Detica
Dialogs
Digital Receiver Technology Inc
DRS Technologies
EADS Group
Edenwall
eGlobalTech
EMC Corporation
ESET
ETI
Eurocopter
Fidelis Cybersecurity Solutions
Finmeccanica Group
FireEye
Fondation Telecom
Fortify Software
F-Secure Corporation
Fulcrum IT Services, LLC
General Dynamics C4 Systems
General Dynamics Corporation
General Dynamics Electric Boat
General Dynamics European Land Systems
General Dynamics Land Systems
General Dynamics Uk Ltd
Gideon Technologies
Global Infotek Inc
Gnostech Inc
Google
GuardianEdge
Gulfstream Aerospace
Harris Corporation
Henggeler Computer Consultants
Hewlett Packard Company
Hewlett Packard Enterprise Security Products
Honeywell Inc
HP ArcSight
HP Labs
i2
IBM Global Technology Services
Identum
Intel Corporation
International Business Machines Corporation (IBM)
Iron Bow Technologies
ISC8, Inc.
ITT Exelis
Kaspersky Lab
KEYW
KForce Government Solutions
Knowledge Consulting Group
Kratos Defense & Security Solutions, Inc.
L-3 Communications Holdings Inc
L-3 STRATIS
Lacoon Mobile Security
LegalTech Solutions
Leidos
Lockheed Martin Aeronautics
Lockheed Martin Australia
Lockheed Martin Canada
Lockheed Martin Corporation
Lockheed Martin Electronic Systems
Lockheed Martin Global Training & Logistics
Lockheed Martin Information Systems & Global Solutions
Lockheed Martin Missiles & Fire Control
Lockheed Martin MS2
Lockheed Martin Space Systems
Lockheed Martin UK
M5 Network Security
MacAulay-Brown
Mandiant
ManTech International Corporation
McAfee
MEDPROTECT LLC
MEI Technologies
Merlin International
MessageLabs
Mi5 Networks
Microsoft Corporation
Mitsubishi Heavy Industries
Mobile Armor
Narus
NASSCO
Netasq
NetWitness Corporation
New York Times
NICTA
NitroSecurity
Northrop Grumman Aerospace Systems
Northrop Grumman Corporation
Northrop Grumman Corporation M5 Network Security
Northrop Grumman Electronics Systems
Northrop Grumman Information Systems
Northrop Grumman Technical Services
Nukona
Odyssey Software
Panda Security
PGP Corporation
Photonics
Pikewerks Corporation
Q1 Labs
QinetiQ Group Plc
Radiance Technologies
Raytheon Advanced Programs
Raytheon Air & Missile Defence
Raytheon Australia
Raytheon Combat & Sensing Systems
Raytheon Company
Raytheon Cybersecurity Solutions
Raytheon Environmental Solutions
Raytheon Fed IT
Raytheon Homeland Security
Raytheon Integrated Comms Systems
Raytheon Integrated Ground Control
Raytheon Integrated Sensors
Raytheon Intelligence
Raytheon Missile Systems
Raytheon Operations
Raytheon Secure Information Systems
Raytheon Security & Transport Systems
Raytheon UK
Raytheon Vision Systems
Regency IT Consulting
Reveal
Rockwell Collins
RSA
SAIC Defence Solutions
SAIC Health, Energy & Civil Solutions
SAIC Intelligence & Cybersecurity Solutions
SAIC-Frederick Inc
Salient Federal Solutions (SFS)
Sandia Corporation
Saudi Aramco
Science Applications International Corporation (SAIC)
Scientific Research Corporation
Seapower Capabilities
Secure Computing
SecureTech
Selex Elsag
Selex ES
Senetas Systems Inc
Sentrigo
Sodern
SoftScan
Sojitz Corporation
Solutions Made Simple Inc
Sony
Sophos PLC
Sotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. )
Sperry Marine
Spirent Communications
Stratis
stratsec.net
Symantec Corporation
Taia Global, Inc.
Telecommunications Systems Inc (TCS)
Teligy
Thales Communications & Security
Thales Cyber Security
Thales Cybersecurity
Thales Group
Thales Information Systems
Thales Raytheon Systems
Third Brigade
Trend Micro (EMEA) Ltd
Trend Micro Australia Pty Ltd
Trend Micro Inc
Trend Micro Inc (Taiwan)
Varec Inc
VeriSign
Vertica Systems
Vitalize Consulting Solutions
Vodafone
Vulnerability Research Labs

ORGANISATIONS MENTIONED IN THIS REPORT

AMC Air Mobility Command
CBP Customs & Border Protection
CCS USAF Cyber Control Systems
CEC Boeing Cyber Engagement Center
CERDEC US Army Communications, Electronics, Research, Development and Engineering Center
CESG UK Communications-Electronics Security Group
CISP UK Cybersecurity Information Sharing Partnership
CMS Centers for Medicare & Medicaid Services
DARPA Defense Advanced Research Projects Agency
DC3 Department of Defense Cyber Crime Center
DHS Department of Homeland Security
DIA Defense Intelligence Agency
DISA Defense Information Systems Agency
DISA ESD Defense Information Systems Agency Enterprise Services Directorate
ESDO DHS Enterprise System Development Office
FBI Federal Bureau of Investigation
HSIN Homeland Security Information System
NATO North Atlantic Treaty Organisation
NCCIC National Cyber Security & Communications Integration Center
NCPS DHS National Cybersecurity Protection System
NETCOM US Army Network Enterprise Technology Command
NGA National Geospatial Intelligence Agency
NORAD North American Air Defense
NSA US National Security Agency
PEO C3T US Army Program Executive Office Command Control Communications Tactical
Saudi Government
SPAWAR US Space and Naval Warfare Systems Command
UK FCO UK Foreign & Commonwealth Office
UK Ministry of Justice
UK MoD United Kingdom Ministry of Defence
USAF United States Air Force
USAFCENT United States Air Forces Central
USAP United States Antarctic Program
USBICES United States Battlefield Information Collection and Exploitation System
US-CERT United States Computer Emergency Response Team
USCIS United States Citizenship & Immigration Services
USSOUTHCOM United States Southern Command
LIST OF TABLES

Table 2.1 Leading 20 Companies in the Cyber Security Market 2013 (Company Name, Subsidiary)
Table 2.2 Types of Cyber Attack (Type, Description)
Table 2.3 Cyber Attack Techniques (Name, Description)
Table 2.4 Recent High Profile Cyber Attacks (Date, Description)
Table 3.1 Leading 20 Companies in the Cyber Security Market 2013 (Market Ranking, Total Revenue, Revenue in Sector, Market Share % )
Table 3.2 Significant Cyber Security Contracts 2010-2013 (Date, Country, Company, Value ($m), Details)
Table 4.1 BAE Systems PLC Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.2 BAE Systems PLC Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.3 BAE Systems PLC Cyber Security Products/Services (Division, Name, Description)
Table 4.4 BAE Systems PLC SWOT Analysis 2013
Table 4.5 Boeing Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Website)
Table 4.6 Boeing Company Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.7 Boeing Company Cyber Security Products/Services (Division, Name, Description)
Table 4.8 Boeing Company SWOT Analysis 2013
Table 4.9 Booz Allen Hamilton Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share % , HQ, Ticker, Contact, Website)
Table 4.10 Booz Allen Hamilton Inc Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.11 Booz Allen Hamilton Inc Cyber Security Products/Services (Division, Name, Description)
Table 4.12 Booz Allen Hamilton Inc SWOT Analysis 2013
Table 4.13 Computer Sciences Corporation (CSC) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.14 Computer Sciences Corporation (CSC) Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.15 Computer Sciences Corporation (CSC) Cyber Security Products/Services (Division, Name, Description)
Table 4.16 Computer Sciences Corporation (CSC) SWOT Analysis 2013
Table 4.17 EADS Group Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.18 EADS Group Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.19 EADS Group Cyber Security Products/Services (Division, Name, Description)
Table 4.20 EADS Group SWOT Analysis 2013
Table 4.21 Finmeccanica Group Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.22 Finmeccanica Group Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.23 Finmeccanica Group Cyber Security Products/Services (Division, Name, Description)
Table 4.24 Finmeccanica Group SWOT Analysis 2013
Table 4.25 General Dynamics Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.26 General Dynamics Corporation Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.27 General Dynamics Corporation Cyber Security Products/Services (Division, Name, Description)
Table 4.28 General Dynamics Corporation SWOT Analysis 2013
Table 4.29 Hewlett Packard Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share % , HQ, Ticker, Contact, Website)
Table 4.30 Hewlett Packard Company Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.31 Hewlett Packard Company Cyber Security Products/Services (Division, Name, Description)
Table 4.32 Hewlett Packard Company SWOT Analysis 2013
Table 4.33 International Business Machines Corporation (IBM) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.34 International Business Machines Corporation (IBM) Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.35 International Business Machines Corporation (IBM) Cyber Security Products/Services (Division, Name, Description)
Table 4.36 International Business Machines Corporation (IBM) SWOT Analysis 2013
Table 4.37 Intel Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 4.38 Intel Corporation Cyber Security Products/Services (Division, Name, Description)
Table 4.39 Intel Corporation SWOT Analysis 2013
Table 4.40 Kaspersky Lab Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Website)
Table 4.41 Kaspersky Lab Cyber Security Products/Services (Division, Name, Description)
Table 4.42 Kaspersky Lab SWOT Analysis 2013
Table 4.43 L-3 Communications Holdings Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Website)
Table 4.44 L-3 Communications Holdings Inc Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.45 L-3 Communications Holdings Inc Cyber Security Products/Services (Division, Name, Description)
Table 4.46 L-3 Communications Holdings Inc SWOT Analysis 2013
Table 4.47 Lockheed Martin Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.48 Lockheed Martin Corporation Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.49 Lockheed Martin Corporation Cyber Security Products/Services (Division, Name, Description)
Table 4.50 Lockheed Martin Corporation SWOT Analysis 2013
Table 4.51 Northrop Grumman Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.52 Northrop Grumman Corporation Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.53 Northrop Grumman Corporation Cyber Security Products/Services (Division, Name, Description)
Table 4.54 Northrop Grumman Corporation SWOT Analysis 2013
Table 4.55 Raytheon Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.56 Raytheon Company Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.57 Raytheon Company Cyber Security Products/Services (Division, Name, Description)
Table 4.58 Raytheon Company SWOT Analysis 2013
Table 4.59 Science Applications International Corporation (SAIC) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)
Table 4.60 Science Applications International Corporation (SAIC) Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)
Table 4.61 Science Applications International Corporation (SAIC) Cyber Security Products/Services (Division, Name, Description)
Table 4.62 Science Applications International Corporation (SAIC) SWOT Analysis 2013
Table 4.63 Sophos PLC Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Website)
Table 4.64 Sophos Cyber Security Products/Services (Name, Description)
Table 4.65 Sophos SWOT Analysis 2013
Table 4.66 Symantec Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 4.67 Symantec Corporation Cyber Security Products/Services (Name)
Table 4.68 Symantec Corporation SWOT Analysis 2013
Table 4.69 Thales Group Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Website)
Table 4.70 Thales Group Cyber Security Products/Services (Division, Name, Description)
Table 4.71 Thales Group SWOT Analysis 2013
Table 4.72 Trend Micro Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Website)
Table 4.73 Trend Micro Inc Cyber Security Products/Services (Division, Name, Description)
Table 4.74 Trend Micro Inc SWOT Analysis 2013
Table 4.75 Other Companies in the Cyber Security Market 2013 (Company Name)
Table 5.1 STEP Analysis of the Cyber Security Market 2013

LIST OF CHARTS

Chart 3.1 Leading 20 Company Market Share 2013 (% share)
Chart 3.2 Leading 20 Cyber Security Companies by Background (Number)
Chart 3.3 Leading 20 Cyber Security Companies by Background (Revenue, $m)
Chart 3.4 Leading 20 Cyber Security Companies by HQ Location (Region, Number)
Chart 3.5 Leading 20 Cyber Security Companies by HQ Location (Region, Revenue)
Chart 4.1 BAE Systems PLC Cyber Security Market Share 2013 (% market share)
Chart 4.2 BAE Systems Revenue 2008-2012 ($m)
Chart 4.3 Boeing Company Cyber Security Market Share 2013 (% market share)
Chart 4.4 Boeing Company Revenue 2008-2012 ($m)
Chart 4.5 Booz Allen Hamilton Inc Cyber Security Market Share 2013 (% market share)
Chart 4.6 Computer Sciences Corporation (CSC) Cyber Security Market Share 2013 (% market share)
Chart 4.7 Computer Sciences Corporation (CSC) Revenue 2008-2012 ($m)
Chart 4.8 EADS Group Cyber Security Market Share 2013 (% market share)
Chart 4.9 EADS Group Revenue 2008-2012 ($m)
Chart 4.10 Finmeccanica Group Cyber Security Market Share 2013 (% market share)
Chart 4.11 Finmeccanica Group Revenue 2008-2011 ($m)
Chart 4.12 General Dynamics Corporation Cyber Security Market Share 2013 (% market share)
Chart 4.13 General Dynamics Corporation Revenue 2008-2012 ($m)
Chart 4.14 Hewlett Packard Company Cyber Security Market Share 2013 (% market share)
Chart 4.15 Hewlett Packard Company Revenue 2008-2012 ($m)
Chart 4.16 International Business Machines Corporation (IBM) Cyber Security Market Share 2013 (% market share)
Chart 4.17 IBM Revenue 2008-2012 ($m)
Chart 4.18 Intel Corporation Cyber Security Market Share 2013 (% market share)
Chart 4.19 Intel Revenue 2008-2012 ($m)
Chart 4.20 Kaspersky Lab Cyber Security Market Share 2013 (% market share)
Chart 4.21 Kaspersky Lab Revenue 2008-2011 ($m)
Chart 4.22 L-3 Communications Holdings Inc Cyber Security Market Share 2013 (% market share)
Chart 4.23 L-3 Communications Holdings Inc Revenue 2008-2012 ($m)
Chart 4.24 Lockheed Martin Corporation Cyber Security Market Share 2013 (% market share)
Chart 4.25 Northrop Grumman Corporation Cyber Security Market Share 2013 (% market share)
Chart 4.26 Northrop Grumman Corporation Revenue 2008-2012 ($m)
Chart 4.27 Raytheon Company Cyber Security Market Share 2013 (% market share)
Chart 4.28 Raytheon Company Revenue 2008-2012 ($m)
Chart 4.29 Science Applications International Corporation (SAIC) Cyber Security Market Share 2013 (% market share)
Chart 4.30 Science Applications International Corporation (SAIC)Revenue 2008-2012 ($m)
Chart 4.31 Sophos Cyber Security Market Share 2013 (% market share)
Chart 4.32 Symantec Corporation Cyber Security Market Share 2013 (% market share)
Chart 4.33 Symantec Corporation Revenue 2008-2012 ($m)
Chart 4.34 Thales Group Cyber Security Market Share 2013 (% market share)
Chart 4.35 Thales Group Revenue 2008-2012 ($m)
Chart 4.36 Trend Micro Inc Cyber Security Market Share 2013 (% market share)
Chart 4.37 Trend Micro Inc Revenue 2008-2012 ($m)



More Publications