Encryption Software Market by Usage (Encryption for Data-at-rest, Encryption for Data-in-transit), by verticals (Financial Sector, Healthcare, Public Sector) - Global Opportunity Analysis and Industry Forecast, 2014-2022
Software-based encryption is one of the fast emerging end-point data security solutions. Encryption software are used to maintain confidentiality of the data stored in files/folders & disks and transmitted over the wireless network. Increasing number of organizations worldwide have adopted encryption to address the growing concerns of data safety and data privacy compliance regulations. With data protection and compliance gaining prominence, organizations have adopted encryption services to achieve compliance, data security, and flexibility.
Increasing data privacy and compliance regulations by the government across various geographic regions, owing to the rising number of data breaches is amongst the major factors that has supplemented the growth of the market. Moreover, increasing adoption of cloud & virtualization and increasing data mobility are other key factors that have fueled the overall growth of the market. However, lack of awareness and education of software encryption due to ignorance, cost associated with the encryption and regulatory restrictions are some of the major challenges for the industry.
The market is segmented on the basis of usage, industry vertical, and geography. Based of usage, the market is segmented into encryption for data-at-rest and encryption for data-in-transit. The market by vertical comprises financial sector, healthcare, public sectors, and others. The financial sector is anticipated to account for the largest share of the overall market throughout the forecast period, as this industry has to comply with stringent data-protection regulations. The market has been analyzed on the basis of regions, which include North America, Europe, Asia-Pacific, and LAMEA. North America is projected to be the leading revenue-generating region during the forecast period. However, Asia-Pacific region is projected to witness the fastest growth during the forecast period, due to the growing penetration of cloud computing and increasing workforce mobility.
Owing to the rapidly increasing adoption of cloud services across all sectors, organizations are inclined towards encryption solutions to ensure security of data and ensure compliance with the data privacy regulations in cloud. The key players profiled in this report are Symantec Corporation, Sophos Holdings Ltd., McAfee, Inc., Check Point Software Technologies, Proofpoint, and Trend Micro.
KEY BENEFITS
The market is segmented on the basis of usage, vertical, and geography.
MARKET BY USAGE
Increasing data privacy and compliance regulations by the government across various geographic regions, owing to the rising number of data breaches is amongst the major factors that has supplemented the growth of the market. Moreover, increasing adoption of cloud & virtualization and increasing data mobility are other key factors that have fueled the overall growth of the market. However, lack of awareness and education of software encryption due to ignorance, cost associated with the encryption and regulatory restrictions are some of the major challenges for the industry.
The market is segmented on the basis of usage, industry vertical, and geography. Based of usage, the market is segmented into encryption for data-at-rest and encryption for data-in-transit. The market by vertical comprises financial sector, healthcare, public sectors, and others. The financial sector is anticipated to account for the largest share of the overall market throughout the forecast period, as this industry has to comply with stringent data-protection regulations. The market has been analyzed on the basis of regions, which include North America, Europe, Asia-Pacific, and LAMEA. North America is projected to be the leading revenue-generating region during the forecast period. However, Asia-Pacific region is projected to witness the fastest growth during the forecast period, due to the growing penetration of cloud computing and increasing workforce mobility.
Owing to the rapidly increasing adoption of cloud services across all sectors, organizations are inclined towards encryption solutions to ensure security of data and ensure compliance with the data privacy regulations in cloud. The key players profiled in this report are Symantec Corporation, Sophos Holdings Ltd., McAfee, Inc., Check Point Software Technologies, Proofpoint, and Trend Micro.
KEY BENEFITS
- Extensive research report offers an insight into the current and future tends shaping the prominent investment pockets.
- Comprehensive coverage of information on the key drivers, restraints and opportunities adds value to the overall statics on market share and size.
- Business performance of the key market players across different region such as North America, Europe, Asia -Pacific and LAMEA are thoroughly studied during the research.
- SWOT analysis conducted on the major brands highlights the strengths, weaknesses, opportunities and threat faced by them. The data would enable business owners take smarter decisions and zero in on an effective marketing plan.
- The research further drills down to provide comprehensive data on the market by usage, vertical and geography.
- Assessment of critical imperatives such as adoption rate, consumption volume and customer preference among other factors are also included in the report.
The market is segmented on the basis of usage, vertical, and geography.
MARKET BY USAGE
- Encryption for data-at-rest
- Full Disk Encryption (FDE)
- File Level Encryption (FLE)
- Encryption for data-in-transit
- Financial Sector
- Healthcare
- Public Sector
- Others
- North America
- Europe
- Asia-Pacific
- LAMEA
CHAPTER 1 INTRODUCTION
1.1 Report description
1.2 Key benefits
1.3 Key market segmentation
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.1.1 Encryption overview
3.2 Encryption software
3.2.1 Drivers
3.2.1.1 Increased compliance regulations
3.2.1.2 Growing number and complexity of number of data breaches
3.2.1.3 Snowden Revelations
3.2.1.4 Increased adoption of cloud and virtualization
3.2.1.5 Increased Mobility
3.2.2 Challenges
3.2.2.1 Management of Encryption Keys: Increased Costs and Complexity
3.2.2.2 Lack of awareness and education
3.2.2.3 Regulatory restrictions on crypto-software
3.2.3 Trends
3.2.3.1 Increasing deployment of enterprise wide encryption strategy
3.2.3.2 Increasing demand for Cloud data encryption
3.3 Key findings
3.3.1 Top factors impacting the market
3.3.2 Top winning strategies
3.3.3 Top investment pockets
3.4 Porters five force analysis
3.4.1 Bargaining power of supplier
3.4.2 Bargaining power of buyer
3.4.3 Threat of substitute
3.4.4 Threat of new entrants
3.4.5 Competition within the industry
3.5 Market share analysis, 2014
CHAPTER 4 WORLD ENCRYPTION SOFTWARE MARKET BY USAGE
4.1 Introduction
4.2 Data at rest encryption software market
4.2.1 Market size and forecasts by segments
4.2.2 Full disk/whole disk encryption (FDE)
4.2.2.1 Drivers
4.2.2.2 Challenges
4.2.3 File/folder level encryption (FLE) software
4.2.3.1 Drivers
4.2.3.2 Challenges
4.2.4 Market trends
4.2.5 Market size and forecasts by geography
4.2.5.1 North America
4.2.5.1.1 Drivers
4.2.5.1.2 Challenges
4.2.5.1.3 Trends
4.2.5.2 Europe
4.2.5.2.1 Drivers
4.2.5.2.2 Challenges
4.2.5.2.3 Trends
4.2.5.3 APAC
4.2.5.3.1 Drivers
4.2.5.3.2 Challenges
4.2.5.4 LAMEA
4.2.5.4.1 Drivers
4.2.5.4.2 Challenges
4.2.6 Market size and forecasts by Industry verticals
4.2.6.1 Financial services
4.2.6.1.1 Drivers
4.2.6.2 Healthcare
4.2.6.2.1 Drivers
4.2.6.3 Public sector (Government & other security agencies)
4.2.6.3.1 Drivers
4.2.6.4 Others
4.2.6.4.1 Drivers
4.3 Data in transit encryption software market (Email Encryption)
4.3.1 Drivers
4.3.2 Challenges
4.3.4 Market size and forecasts by Geography
4.3.5 Market size and forecasts by Industry Verticals
4.3.6 Long-term opportunistic Markets for Data in Transit Encryption Software
4.3.3.1 Drivers
4.3.3.2 Challenges
4.3.3.3 Solutions provided for encryption
4.3.3.3.1 VoIP
4.3.3.3.2 Drivers
4.3.3.3.3 Challenges
CHAPTER 5 COMPANY PROFILES AND ANALYSIS
5.1 Symantec Corporation
5.1.1 Company overview
5.1.2 Business performance
5.1.3 Strategic moves and developments
5.1.3.1 Organic growth strategies: organizational restructuring & product launches
5.1.3.2 Inorganic growth strategies: Partnerships and Acquisitions
5.1.4 SWOT analysis & strategic conclusions of Symantec Corporation
5.2 Sophos Holdings Ltd.
5.2.1 Company overview
5.2.2 Business performance
5.2.3 Strategic moves and developments
5.2.3.1 Organic growth strategies: Product Launches
5.2.3.2 Inorganic growth Strategies: Partnerships and acquisitions
5.2.4 SWOT analysis & strategic conclusions of Sophos Ltd.
5.3 McAfee
5.3.1 Company overview
5.3.2 Business performance
5.3.3 Strategic moves and developments
5.3.3.1 Organic growth strategies: Product Launches
5.3.3.2 Inorganic growth strategies: Partnerships and Acquisitions
5.3.4 SWOT analysis & strategic conclusions of McAfee
5.4 Check Point Software Technologies
5.4.1 Company overview
5.4.2 Business performance
5.4.3 Strategic moves and developments
5.4.3.1 Organic growth strategies: Product Launches
5.4.3.2 Inorganic growth strategies: Partnerships and acquisitions
5.4.4 SWOT analysis & strategic conclusions of Checkpoint
5.5 Proofpoint
5.5.1 Company overview
5.5.2 Business performance
5.5.3 Strategic moves and developments
5.5.3.1 Organic growth strategies: product launches
5.5.3.2 Inorganic strategies: partnerships and acquisitions
5.5.4 SWOT analysis & strategic conclusions of Proofpoint
5.6 Trend Micro
5.6.1 Company overview
5.6.2 Business performance
5.6.3 Strategic moves and developments
5.6.3.1 Organic growth strategies: organizational restructuring and product launches
5.6.3.2 Inorganic growth strategies: acquisitions and partnerships
5.6.4 SWOT analysis & strategic conclusions of Trend Micro
1.1 Report description
1.2 Key benefits
1.3 Key market segmentation
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.1.1 Encryption overview
3.2 Encryption software
3.2.1 Drivers
3.2.1.1 Increased compliance regulations
3.2.1.2 Growing number and complexity of number of data breaches
3.2.1.3 Snowden Revelations
3.2.1.4 Increased adoption of cloud and virtualization
3.2.1.5 Increased Mobility
3.2.2 Challenges
3.2.2.1 Management of Encryption Keys: Increased Costs and Complexity
3.2.2.2 Lack of awareness and education
3.2.2.3 Regulatory restrictions on crypto-software
3.2.3 Trends
3.2.3.1 Increasing deployment of enterprise wide encryption strategy
3.2.3.2 Increasing demand for Cloud data encryption
3.3 Key findings
3.3.1 Top factors impacting the market
3.3.2 Top winning strategies
3.3.3 Top investment pockets
3.4 Porters five force analysis
3.4.1 Bargaining power of supplier
3.4.2 Bargaining power of buyer
3.4.3 Threat of substitute
3.4.4 Threat of new entrants
3.4.5 Competition within the industry
3.5 Market share analysis, 2014
CHAPTER 4 WORLD ENCRYPTION SOFTWARE MARKET BY USAGE
4.1 Introduction
4.2 Data at rest encryption software market
4.2.1 Market size and forecasts by segments
4.2.2 Full disk/whole disk encryption (FDE)
4.2.2.1 Drivers
4.2.2.2 Challenges
4.2.3 File/folder level encryption (FLE) software
4.2.3.1 Drivers
4.2.3.2 Challenges
4.2.4 Market trends
4.2.5 Market size and forecasts by geography
4.2.5.1 North America
4.2.5.1.1 Drivers
4.2.5.1.2 Challenges
4.2.5.1.3 Trends
4.2.5.2 Europe
4.2.5.2.1 Drivers
4.2.5.2.2 Challenges
4.2.5.2.3 Trends
4.2.5.3 APAC
4.2.5.3.1 Drivers
4.2.5.3.2 Challenges
4.2.5.4 LAMEA
4.2.5.4.1 Drivers
4.2.5.4.2 Challenges
4.2.6 Market size and forecasts by Industry verticals
4.2.6.1 Financial services
4.2.6.1.1 Drivers
4.2.6.2 Healthcare
4.2.6.2.1 Drivers
4.2.6.3 Public sector (Government & other security agencies)
4.2.6.3.1 Drivers
4.2.6.4 Others
4.2.6.4.1 Drivers
4.3 Data in transit encryption software market (Email Encryption)
4.3.1 Drivers
4.3.2 Challenges
4.3.4 Market size and forecasts by Geography
4.3.5 Market size and forecasts by Industry Verticals
4.3.6 Long-term opportunistic Markets for Data in Transit Encryption Software
4.3.3.1 Drivers
4.3.3.2 Challenges
4.3.3.3 Solutions provided for encryption
4.3.3.3.1 VoIP
4.3.3.3.2 Drivers
4.3.3.3.3 Challenges
CHAPTER 5 COMPANY PROFILES AND ANALYSIS
5.1 Symantec Corporation
5.1.1 Company overview
5.1.2 Business performance
5.1.3 Strategic moves and developments
5.1.3.1 Organic growth strategies: organizational restructuring & product launches
5.1.3.2 Inorganic growth strategies: Partnerships and Acquisitions
5.1.4 SWOT analysis & strategic conclusions of Symantec Corporation
5.2 Sophos Holdings Ltd.
5.2.1 Company overview
5.2.2 Business performance
5.2.3 Strategic moves and developments
5.2.3.1 Organic growth strategies: Product Launches
5.2.3.2 Inorganic growth Strategies: Partnerships and acquisitions
5.2.4 SWOT analysis & strategic conclusions of Sophos Ltd.
5.3 McAfee
5.3.1 Company overview
5.3.2 Business performance
5.3.3 Strategic moves and developments
5.3.3.1 Organic growth strategies: Product Launches
5.3.3.2 Inorganic growth strategies: Partnerships and Acquisitions
5.3.4 SWOT analysis & strategic conclusions of McAfee
5.4 Check Point Software Technologies
5.4.1 Company overview
5.4.2 Business performance
5.4.3 Strategic moves and developments
5.4.3.1 Organic growth strategies: Product Launches
5.4.3.2 Inorganic growth strategies: Partnerships and acquisitions
5.4.4 SWOT analysis & strategic conclusions of Checkpoint
5.5 Proofpoint
5.5.1 Company overview
5.5.2 Business performance
5.5.3 Strategic moves and developments
5.5.3.1 Organic growth strategies: product launches
5.5.3.2 Inorganic strategies: partnerships and acquisitions
5.5.4 SWOT analysis & strategic conclusions of Proofpoint
5.6 Trend Micro
5.6.1 Company overview
5.6.2 Business performance
5.6.3 Strategic moves and developments
5.6.3.1 Organic growth strategies: organizational restructuring and product launches
5.6.3.2 Inorganic growth strategies: acquisitions and partnerships
5.6.4 SWOT analysis & strategic conclusions of Trend Micro
LIST OF TABLES
TABLE 1 KEY COMPLIANCE STANDARDS AND REGULATIONS
TABLE 2 REGULATIONS IN OTHER KEY ASIAN REGIONS
TABLE 3 MOST RECENT AND SIGNIFICANT DATA BREACHES OF 2014
TABLE 4 TABLE OF ACQUISITIONS BY DOMINANT PLAYERS
TABLE 5 WORLD ENCRYPTION SOFTWARE MARKET BY INDUSTRY VERTICALS, 2014 - 2021 ($MILLION)
TABLE 6 WORLD ENCRYPTION SOFTWARE MARKET BY GEOGRAPHY, 2014 - 2021 ($MILLION)
TABLE 7 WORLD DATA-AT-REST ENCRYPTION SOFTWARE MARKET, BY INDUSTRY VERTICAL, 2014 - 2021 ($MILLION)
TABLE 8 WORLD DATA-AT-REST ENCRYPTION SOFTWARE MARKET, BY GEOGRAPHY, 2014 - 2021 ($MILLION)
TABLE 9 WORLD DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 10 NORTH AMERICA DATA-AT-REST ENCRYPTION MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 11 EUROPE DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 12 APAC DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 13 LAMEA DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 14 WORLD FINANCIAL SERVICES DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 15 WORLD HEALTHCARE SECTOR DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 16 WORLD PUBLIC SECTOR DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 17 WORLD OTHER INDUSTRIES DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 18 WORLD DATA-IN-TRANSIT ENCRYPTION SOFTWARE MARKET BY GEOGRAPHY, 2014 - 2021 ($MILLION)
TABLE 19 WORLD DATA-IN-TRANSIT ENCRYPTION SOFTWARE MARKET BY INDUSTRY VERTICAL, 2014 - 2021 ($MILLION)
TABLE 20 SYMANTEC CORPORATION BUSINESS SNAPSHOT
TABLE 21 SOPHOS HOLDING LTD. BUSINESS SNAPSHOT
TABLE 22 MCAFEE BUSINESS SNAPSHOT
TABLE 23 CHECK POINT BUSIESS SNAPSHOT
TABLE 24 PROOFPOINT BUSINESS SNAPSHOT
TABLE 25 TREND MICRO BUSINESS SNAPSHOT
TABLE 1 KEY COMPLIANCE STANDARDS AND REGULATIONS
TABLE 2 REGULATIONS IN OTHER KEY ASIAN REGIONS
TABLE 3 MOST RECENT AND SIGNIFICANT DATA BREACHES OF 2014
TABLE 4 TABLE OF ACQUISITIONS BY DOMINANT PLAYERS
TABLE 5 WORLD ENCRYPTION SOFTWARE MARKET BY INDUSTRY VERTICALS, 2014 - 2021 ($MILLION)
TABLE 6 WORLD ENCRYPTION SOFTWARE MARKET BY GEOGRAPHY, 2014 - 2021 ($MILLION)
TABLE 7 WORLD DATA-AT-REST ENCRYPTION SOFTWARE MARKET, BY INDUSTRY VERTICAL, 2014 - 2021 ($MILLION)
TABLE 8 WORLD DATA-AT-REST ENCRYPTION SOFTWARE MARKET, BY GEOGRAPHY, 2014 - 2021 ($MILLION)
TABLE 9 WORLD DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 10 NORTH AMERICA DATA-AT-REST ENCRYPTION MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 11 EUROPE DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 12 APAC DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 13 LAMEA DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 14 WORLD FINANCIAL SERVICES DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 15 WORLD HEALTHCARE SECTOR DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 16 WORLD PUBLIC SECTOR DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 17 WORLD OTHER INDUSTRIES DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2014 - 2021 ($MILLION)
TABLE 18 WORLD DATA-IN-TRANSIT ENCRYPTION SOFTWARE MARKET BY GEOGRAPHY, 2014 - 2021 ($MILLION)
TABLE 19 WORLD DATA-IN-TRANSIT ENCRYPTION SOFTWARE MARKET BY INDUSTRY VERTICAL, 2014 - 2021 ($MILLION)
TABLE 20 SYMANTEC CORPORATION BUSINESS SNAPSHOT
TABLE 21 SOPHOS HOLDING LTD. BUSINESS SNAPSHOT
TABLE 22 MCAFEE BUSINESS SNAPSHOT
TABLE 23 CHECK POINT BUSIESS SNAPSHOT
TABLE 24 PROOFPOINT BUSINESS SNAPSHOT
TABLE 25 TREND MICRO BUSINESS SNAPSHOT
LIST OF FIGURES
FIG. 1 TOP IMPACTING FACTORS
FIG. 2 TOP WINNING STRATEGIES IN ENCRYPTION SOFTWARE MARKET
FIG. 3 TOP INVESTMENT POCKETS
FIG. 4 PORTERS FIVE FORCE ANALYSIS
FIG. 5 MARKET SHARE ANALYSIS, 2014
FIG. 6 WORLD ENCRYTION SOFTWARE MARKET BY VALUE, 2014 - 2021 ($MILLION)
FIG. 7 MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY INDUSTRY VERTICAL, 2014 & 2021
FIG. 8 MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY INDUSTRY VERTICAL, 2014 & 2021
FIG. 9 MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY USAGE, 2014 & 2021
FIG. 10 WORLD DATA-AT-REST ENCRYTION SOFTWARE MARKET BY VALUE, 2014 & 2021 ($MILLION)
FIG. 11 MARKET SHARE ANALYSIS OF DATA-AT-REST ENCRYPTON SOFTWARE MARKET SIZE BY USAGE, 2014 & 2021
FIG. 12 WORLD FDE ENCRYPTION SOFTWARE MARKET BY VALUE, 2014 - 2021 ($MILLION)
FIG. 13 WORLD FLE ENCRYPTION SOFTWARE MARKET BY VALUE, 2014 - 2021 ($MILLION)
FIG. 14 REVENUE GENERATED BY SYMANTEC CORPORATION, 2013 - 2015 ($MILLION)
FIG. 15 REVENUE GENERATED BY SYMANTEC CORPORATION BY OPERATING SEGMENT, 2014(%)
FIG. 16 REVENUE GENERATED BY SYMANTEC CORPORATION BY GEOGRAPHY, 2014(%)
FIG. 17 SWOT ANALYSIS OF SYMANTEC CORPORATION
FIG. 18 REVENUE GENERATED BY SOPHOS HOLDING LTD., 2012 - 2014 ($MILLION)
FIG. 19 REVENUE GENERATED BY SOPHOS HOLDINGS LTD. BY GEOGRAPHY, 2014(%)
FIG. 20 SWOT ANALYSIS OF SOPHOS LTD.
FIG. 21 REVENUE GENERATED BY INTELS SSG (MCAFEE) SEGMENT, 2012 - 2014 ($MILLION)
FIG. 22 SWOT ANALYSIS OF MCAFEE
FIG. 23 REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES, 2012 2014 ($MILLION)
FIG. 24 REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES BY GEOGRAPHY, 2013(%)
FIG. 25 SWOT ANALYSIS OF CHECK POINT SOFTWARE
FIG. 26 REVENUE GENERATED BY PROOFPOINT, 2012 2014 ($MILLION)
FIG. 27 REVENUE GENERATED BY PROOFPOINT BY BUSINESS SEGMENTS, 2014(%)
FIG. 28 REVENUE GENERATED BY PROOFPOINT BY GEOGRAPHIC AREA, 2013(%)
FIG. 29 SWOT ANALYSIS OF PROOFPOINT
FIG. 30 REVENUE GENERATED BY TREND MICRO, 2012 -2014 ($MILLION)
FIG. 31 SWOT ANALYSIS OF TREND MICRO
FIG. 1 TOP IMPACTING FACTORS
FIG. 2 TOP WINNING STRATEGIES IN ENCRYPTION SOFTWARE MARKET
FIG. 3 TOP INVESTMENT POCKETS
FIG. 4 PORTERS FIVE FORCE ANALYSIS
FIG. 5 MARKET SHARE ANALYSIS, 2014
FIG. 6 WORLD ENCRYTION SOFTWARE MARKET BY VALUE, 2014 - 2021 ($MILLION)
FIG. 7 MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY INDUSTRY VERTICAL, 2014 & 2021
FIG. 8 MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY INDUSTRY VERTICAL, 2014 & 2021
FIG. 9 MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY USAGE, 2014 & 2021
FIG. 10 WORLD DATA-AT-REST ENCRYTION SOFTWARE MARKET BY VALUE, 2014 & 2021 ($MILLION)
FIG. 11 MARKET SHARE ANALYSIS OF DATA-AT-REST ENCRYPTON SOFTWARE MARKET SIZE BY USAGE, 2014 & 2021
FIG. 12 WORLD FDE ENCRYPTION SOFTWARE MARKET BY VALUE, 2014 - 2021 ($MILLION)
FIG. 13 WORLD FLE ENCRYPTION SOFTWARE MARKET BY VALUE, 2014 - 2021 ($MILLION)
FIG. 14 REVENUE GENERATED BY SYMANTEC CORPORATION, 2013 - 2015 ($MILLION)
FIG. 15 REVENUE GENERATED BY SYMANTEC CORPORATION BY OPERATING SEGMENT, 2014(%)
FIG. 16 REVENUE GENERATED BY SYMANTEC CORPORATION BY GEOGRAPHY, 2014(%)
FIG. 17 SWOT ANALYSIS OF SYMANTEC CORPORATION
FIG. 18 REVENUE GENERATED BY SOPHOS HOLDING LTD., 2012 - 2014 ($MILLION)
FIG. 19 REVENUE GENERATED BY SOPHOS HOLDINGS LTD. BY GEOGRAPHY, 2014(%)
FIG. 20 SWOT ANALYSIS OF SOPHOS LTD.
FIG. 21 REVENUE GENERATED BY INTELS SSG (MCAFEE) SEGMENT, 2012 - 2014 ($MILLION)
FIG. 22 SWOT ANALYSIS OF MCAFEE
FIG. 23 REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES, 2012 2014 ($MILLION)
FIG. 24 REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES BY GEOGRAPHY, 2013(%)
FIG. 25 SWOT ANALYSIS OF CHECK POINT SOFTWARE
FIG. 26 REVENUE GENERATED BY PROOFPOINT, 2012 2014 ($MILLION)
FIG. 27 REVENUE GENERATED BY PROOFPOINT BY BUSINESS SEGMENTS, 2014(%)
FIG. 28 REVENUE GENERATED BY PROOFPOINT BY GEOGRAPHIC AREA, 2013(%)
FIG. 29 SWOT ANALYSIS OF PROOFPOINT
FIG. 30 REVENUE GENERATED BY TREND MICRO, 2012 -2014 ($MILLION)
FIG. 31 SWOT ANALYSIS OF TREND MICRO