[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Endpoint Protection Platform (EPP) Market Size, Share, Growth Analysis, By Offering (Platforms and Services), Enforcement Point (Mobile Devices, POS Terminals), Deployment Mode, Organization Size, Vertical and Region - Global Industry Forecast to 2029

July 2024 | 324 pages | ID: E958BC16C552EN
MarketsandMarkets

US$ 3,217.50 US$ 4,950.00 -35 %
Offer valid until December 31, 2024!

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The global endpoint protection platform (EPP) market size is projected to grow from USD 17.4 billion in 2024 to USD 29.0 billion by 2029 at a Compound Annual Growth Rate (CAGR) of 10.7% during the forecast period. The proliferation of remote work and BYOD policies has expanded the attack surface, increasing the demand for advanced EPP solutions. As cyberattacks are rising against remote employees and personal devices, organizations realize the need for adaptive endpoint security. EPP solutions offer centralized management, better visibility, and threat-hunting capabilities to keep sensitive data safe and business operational in the changing digital world.

'By vertical, the healthcare segment accounts for the highest CAGR during the forecast period.'

The healthcare vertical is proliferating in the EPP market due to the increasing adoption of technology and the need to safeguard patients' critical information. Healthcare organizations are deploying electronic health records (EHRs) and connected medical devices; however, these organizations are increasingly being targeted by cyber attackers. Hence, the need for robust endpoint protection becomes inevitable. Endpoint protection solutions defend against data breaches such as theft or illegal access to patient information and potential identity thefts or financial scams while complying with HIPAA rules. Some of the leading solutions in the EPP market are SentinelOne Singularity, CrowdStrike Falcon, Sophos Intercept X, and Bitdefender GravityZone. These solutions provides state-of-the-art capabilities for threat detection and response in real time against threats for an enhanced security posture and increased operational efficiency. With increased digitalization in healthcare, endpoint protection is critical to efficiently maintain the patient data security trust base and reduce the associated risks from emerging cyber threats.

'By Enforcement Point, the mobile devices segment accounts for a larger market share.'

Mobile devices are dominating the EPP market since they are part of the integral workforce of today. This general adoption has been accelerated because of remote work and cloud computing. A survey by the US Bureau of Labor Statistics shows that many businesses are dependent on teleworking, which has increased reliance on mobile devices even more. The increased usage has also increased vulnerability gaps, making Apple and Android devices a lucrative target for cybercriminals. According to the 2023 Global Mobile Threat Report, there has been a sudden increase in device compromise, therefore making the implementation of robust EPP solutions critical. EPP platforms provide anti-malware and antivirus with data encryption to protect mobile devices by putting complete security measures in place. They include total security measures with centralized management and real-time monitoring, two critical elements for the effective detection and mitigation of mobile threats within very differing environments. With increasing operations becoming more mobile-centric, sophisticated EPP solutions will turn into crucial mechanisms to protect sensitive organizational and personal data.

Breakdown of primaries

The study contains insights from various industry experts, from component suppliers to Tier 1 companies and OEMs. The break-up of the primaries is as follows:
  • By Company Type: Tier 1 – 35%, Tier 2 – 45%, and Tier 3 – 20%
  • By Designation: C-level – 40% and Managers and Other Levels – 60%
  • By Region: North America – 35%, Europe – 20%, Asia Pacific – 25%, Middle East & Africa – 15%, Latin America – 5%
Major vendors in the global endpoint protection platform market include as Microsoft (US), CrowdStrike (US), Trend Micro (Japan), Palo Alto Networks (US), SentinelOne (US), Check Point (US), Broadcom (US), VMware (US), Fortinet (US), Tanium (US), Cisco (US), BlackBerry (Canada), ESET (Slovak Republic), Sophos (England), Bitdefender (Romania), WithSecure (Finland), Cybereason (US), WatchGuard (US), AhnLab (South Korea), Trellix (US), Absolute (US), CoSoSys (US), Webroot (US), Xcitium (US), ThreatLocker (US), and Deep Instinct (US).

The study includes an in-depth competitive analysis of the key players in the endpoint protection platform market, their company profiles, recent developments, and key market strategies.

Research Coverage

The report segments the endpoint protection platform market and forecasts its size by Offering (Platform and Services (Professional Services and Managed Services), Enforcement Point (Workstations, Mobile Devices, Servers, POS Terminals, and Other Enforcement Points), Deployment Mode (On-Premise, Cloud, and Hybrid), Organization Size (Large Enterprises and SMEs), Vertical (BFSI, Healthcare, Government, IT & ITeS, Telecommunication, Manufacturing, Retail & E-Commerce, Energy & Utilities, Education, and Other Vertical), and Region (North America, Europe, Asia Pacific, Middle East and Africa, and Latin America).

The study also includes an in-depth competitive analysis of the market's key players, their company profiles, key observations related to product and business offerings, recent developments, and key market strategies.

Key Benefits of Buying the Report

The report will help the market leaders/new entrants with information on the closest approximations of the revenue numbers for the overall endpoint protection platform market and the subsegments. This report will help stakeholders understand the competitive landscape and gain more insights to position their businesses better and plan suitable go-to-market strategies. The report also helps stakeholders understand the market pulse and provides information on key market drivers, restraints, challenges, and opportunities.

The report provides insights on the following pointers:
  • Analysis of key drivers (increasing cyber threats to spur demand for robust EPP solutions, surge in remote work, and proliferation of endpoints and BYOD), restraints (high implementation and maintenance cost and complexity and integration issue), opportunities (integration of EPP and EDR, rise in cloud-based EPP solutions, and adoption of advanced technologies like AI and ML in EPP), and challenges (lack of user awareness and training and shortage of cybersecurity skill)
  • Product Development/Innovation: Detailed insights on upcoming technologies, research & development activities, and new product & service launches in the endpoint protection platform market.
  • Market Development: Comprehensive information about lucrative markets – the report analyses the endpoint protection platform market across varied regions.
  • Market Diversification: Exhaustive information about new products & services, untapped geographies, recent developments, and investments in the endpoint protection platform market.
  • Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players Microsoft (US), CrowdStrike (US), Trend Micro (Japan), Palo Alto Networks (US), SentinelOne (US), among others, in the endpoint protection platform market strategies.
1 INTRODUCTION

1.1 STUDY OBJECTIVES
1.2 MARKET DEFINITION
  1.2.1 INCLUSIONS AND EXCLUSIONS
1.3 MARKET SCOPE
  1.3.1 MARKET SEGMENTATION
  1.3.2 YEARS CONSIDERED
1.4 CURRENCY CONSIDERED
1.5 STAKEHOLDERS

2 RESEARCH METHODOLOGY

2.1 RESEARCH DATA
  2.1.1 SECONDARY DATA
  2.1.2 PRIMARY DATA
    2.1.2.1 Breakup of primaries
    2.1.2.2 Key industry insights
2.2 MARKET BREAKUP AND DATA TRIANGULATION
2.3 MARKET SIZE ESTIMATION
  2.3.1 TOP-DOWN APPROACH
  2.3.2 BOTTOM-UP APPROACH
2.4 MARKET FORECAST
2.5 RESEARCH ASSUMPTIONS
2.6 STUDY LIMITATIONS

3 EXECUTIVE SUMMARY

4 PREMIUM INSIGHTS

4.1 ATTRACTIVE OPPORTUNITIES FOR KEY MARKET PLAYERS
4.2 ENDPOINT PROTECTION PLATFORM MARKET, BY OFFERING, 2024
4.3 ENDPOINT PROTECTION PLATFORM MARKET, BY ENFORCEMENT POINT, 2024
4.4 ENDPOINT PROTECTION PLATFORM MARKET, BY DEPLOYMENT MODE, 2024
4.5 ENDPOINT PROTECTION PLATFORM MARKET, BY ORGANIZATION SIZE, 2024
4.6 ENDPOINT PROTECTION PLATFORM MARKET, BY VERTICAL, 2024–2029
4.7 MARKET INVESTMENT SCENARIO

5 MARKET OVERVIEW AND INDUSTRY TRENDS

5.1 INTRODUCTION
5.2 MARKET DYNAMICS
  5.2.1 DRIVERS
    5.2.1.1 Increasing cyberthreats to spur demand for robust EPP solutions
    5.2.1.2 Surge in remote work
    5.2.1.3 Proliferation of endpoint and BYOD
  5.2.2 RESTRAINTS
    5.2.2.1 High implementation and maintenance cost
    5.2.2.2 Complexity and integration issue
  5.2.3 OPPORTUNITIES
    5.2.3.1 Integration of EPP with EDR
    5.2.3.2 Rise of cloud-based EPP solutions
    5.2.3.3 Adoption of advanced technologies like AI and ML in EPP
  5.2.4 CHALLENGES
    5.2.4.1 Lack of user awareness and training
    5.2.4.2 Shortage of cybersecurity skill
5.3 INTRODUCTION TO ARTIFICIAL INTELLIGENCE AND GENERATIVE AI
  5.3.1 INTEGRATING AI IN CYBERSECURITY
  5.3.2 USE CASES OF GENERATIVE AI IN CYBERSECURITY
  5.3.3 BEST PRACTICES TO LEVERAGE AI FOR CYBERSECURITY
  5.3.4 TREND OF GENERATIVE AI IN ENDPOINT SECURITY
    5.3.4.1 Impact of Generative AI on EPP
    5.3.4.2 Future of Generative AI in EPP
5.4 CASE STUDY ANALYSIS
  5.4.1 CASE STUDY 1: WITHSECURE HELPED ZOLTEK ENHANCE GLOBAL ENDPOINT SECURITY AND PRODUCTIVITY
  5.4.2 CASE STUDY 2: THREATSCAPE ENHANCED ITS CYBERSECURITY WITH SYMANTEC ENDPOINT SECURITY COMPLETE
  5.4.3 CASE STUDY 3: CITY OF VENICE STRENGTHENED CYBERSECURITY WITH VMWARE CARBON BLACK CLOUD
  5.4.4 CASE STUDY 4: SANGFOR TECHNOLOGIES BOLSTERED FRIEM'S CYBERSECURITY WITH ADVANCED SOLUTIONS
  5.4.5 CASE STUDY 5: BLACKBERRY HELPED LEIBOLD & AMANN THWART CYBERATTACK WITH CYLANCEPROTECT
  5.4.6 CASE STUDY 6: MICROSOFT AND TANIUM COLLABORATION STREAMLINED CYBERSECURITY FOR JONES LANG LASALLE
5.5 VALUE CHAIN ANALYSIS
  5.5.1 RESEARCH AND DEVELOPMENT
  5.5.2 PLANNING AND DESIGNING
  5.5.3 SOLUTION AND SERVICE PROVIDERS
  5.5.4 SYSTEM INTEGRATORS
  5.5.5 RETAIL/DISTRIBUTION/VARS
  5.5.6 END USERS
5.6 ECOSYSTEM
5.7 PORTER’S FIVE FORCES ANALYSIS
  5.7.1 THREAT OF NEW ENTRANTS
  5.7.2 THREAT OF SUBSTITUTES
  5.7.3 BARGAINING POWER OF SUPPLIERS
  5.7.4 BARGAINING POWER OF BUYERS
  5.7.5 INTENSITY OF COMPETITIVE RIVALRY
5.8 PRICING ANALYSIS
  5.8.1 AVERAGE SELLING PRICE TREND OF KEY PLAYERS, BY SOLUTION
  5.8.2 INDICATIVE PRICING ANALYSIS, BY OFFERING
5.9 TECHNOLOGY ANALYSIS
  5.9.1 KEY TECHNOLOGIES
    5.9.1.1 Endpoint Detection and Response (EDR)
    5.9.1.2 Artificial Intelligence and Machine Learning
  5.9.2 COMPLEMENTARY TECHNOLOGIES
    5.9.2.1 Sandboxing
    5.9.2.2 Patch Management
  5.9.3 ADJACENT TECHNOLOGIES
    5.9.3.1 Unified Threat Management (UTM)
    5.9.3.2 Zero Trust Network Access (ZTNA)
5.10 PATENT ANALYSIS
  5.10.1 LIST OF TOP PATENTS IN ENDPOINT PROTECTION PLATFORM MARKET, 2022–2024
5.11 TRENDS AND DISRUPTIONS IMPACTING CUSTOMERS’ BUSINESSES
5.12 KEY STAKEHOLDERS & BUYING CRITERIA
  5.12.1 KEY STAKEHOLDERS IN BUYING PROCESS
  5.12.2 BUYING CRITERIA
5.13 REGULATORY LANDSCAPE
  5.13.1 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD
  5.13.2 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT
  5.13.3 GENERAL DATA PROTECTION REGULATION
  5.13.4 ISO 27001
  5.13.5 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS
5.14 KEY CONFERENCES & EVENTS IN 2024–2025
5.15 BUSINESS MODEL ANALYSIS
5.16 INVESTMENT AND FUNDING SCENARIO

6 ENDPOINT PROTECTION PLATFORM MARKET, BY OFFERING

6.1 INTRODUCTION
  6.1.1 OFFERING: MARKET DRIVERS
6.2 PLATFORMS
  6.2.1 COMPREHENSIVE SECURITY SOLUTIONS TO MITIGATE CYBER THREATS
  6.2.2 NEXT-GENERATION ANTIVIRUS (NGAV)/ANTI-MALWARE
  6.2.3 APPLICATION CONTROL/DEVICE CONTROL
  6.2.4 WEB CONTENT FILTERING
  6.2.5 FIREWALLS
  6.2.6 INTRUSION DETECTION/PREVENTION SYSTEMS (IDPS)
  6.2.7 INTEGRATED EDR FUNCTIONALITY
  6.2.8 OTHERS
6.3 SERVICES
  6.3.1 UTILIZING EPP SERVICES FOR ENDPOINT DEFENSE TO DRIVE MARKET GROWTH
  6.3.2 PROFESSIONAL SERVICES
  6.3.3 MANAGED SERVICES

7 ENDPOINT PROTECTION PLATFORM MARKET, BY ENFORCEMENT POINT

7.1 INTRODUCTION
  7.1.1 ENFORCEMENT POINT: MARKET DRIVERS
7.2 WORKSTATIONS
  7.2.1 ENHANCING WORKSTATION SECURITY: LEVERAGING BEHAVIORAL ANALYTICS AND MACHINE LEARNING
7.3 MOBILE DEVICES
  7.3.1 COMPREHENSIVE EPPS FOR IOS AND ANDROID DEVICES TO DRIVE MARKET GROWTH
7.4 SERVERS
  7.4.1 ADDRESSING SERVER THREATS WITH ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
7.5 POINT OF SALE TERMINALS
  7.5.1 EMPOWERING POS SECURITY WITH EPP INNOVATIONS TO DRIVE MARKET GROWTH
7.6 OTHER ENFORCEMENT POINTS

8 ENDPOINT PROTECTION PLATFORM MARKET, BY DEPLOYMENT MODE

8.1 INTRODUCTION
  8.1.1 DEPLOYMENT MODE: MARKET DRIVERS
8.2 ON-PREMISES
  8.2.1 ENSURING COMPLIANCE AND CONTROL WITH ON-PREMISES ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
8.3 CLOUD
  8.3.1 SCALABILITY AND EFFICIENCY TO DRIVE CLOUD-BASED EPP ADOPTION
8.4 HYBRID
  8.4.1 BALANCING SECURITY AND SCALABILITY WITH HYBRID ENDPOINT PROTECTION TO DRIVE MARKET GROWTH

9 ENDPOINT PROTECTION PLATFORM MARKET, BY ORGANIZATION SIZE

9.1 INTRODUCTION
  9.1.1 ORGANIZATION SIZE: MARKET DRIVERS
9.2 LARGE ENTERPRISES
  9.2.1 NEED TO MAINTAIN OPERATIONAL INTEGRITY AND REGULATORY COMPLIANCE TO DRIVE EPP GROWTH IN LARGE ENTERPRISES
9.3 SMES
  9.3.1 INITIATIVES TAKEN BY GOVERNMENTS TO DRIVE EPP GROWTH IN SMES

10 ENDPOINT PROTECTION PLATFORM MARKET, BY VERTICAL

10.1 INTRODUCTION
  10.1.1 VERTICAL: MARKET DRIVERS
10.2 BFSI
  10.2.1 INCREASING CYBERATTACKS TO DRIVE NEED FOR INTEGRATED SOLUTIONS
10.3 HEALTHCARE
  10.3.1 NEED TO SAFEGUARD SENSITIVE PATIENT DATA TO DRIVE SURGE IN HEALTHCARE ENDPOINT PROTECTION
10.4 GOVERNMENT
  10.4.1 NEED TO FORTIFY GOVERNMENT NETWORKS TO DRIVE SURGE IN EPP
10.5 IT & ITES
  10.5.1 DEMAND TO MAINTAIN OPERATIONAL CONTINUITY TO SPUR EPP GROWTH
10.6 TELECOMMUNICATIONS
  10.6.1 LEVERAGING EPP SOLUTIONS TO ENSURE UNINTERRUPTED SERVICE WILL DRIVE MARKET GROWTH
10.7 MANUFACTURING
  10.7.1 ENHANCING MANUFACTURING SECURITY WITH ADVANCED ENDPOINT PROTECTION TO DRIVE MARKET GROWTH
10.8 RETAIL & E-COMMERCE
  10.8.1 PROLIFERATION OF ONLINE TRANSACTIONS PLATFORM TO SPUR DEMAND FOR EPPS
10.9 ENERGY & UTILITIES
  10.9.1 ADOPTION OF ADVANCED TECHNOLOGIES AND MEETING REGULATORY COMPLIANCE TO DRIVE DEMAND FOR EPPS
10.10 EDUCATION
  10.10.1 EPPS TO SAFEGUARD EDUCATIONAL INSTITUTIONS WITH ADVANCED ENDPOINT PROTECTION
10.11 OTHER VERTICALS

11 ENDPOINT PROTECTION PLATFORM MARKET, BY REGION

11.1 INTRODUCTION
11.2 NORTH AMERICA
  11.2.1 NORTH AMERICA: MARKET DRIVERS
  11.2.2 US
    11.2.2.1 Investments and partnerships in US to propel EPP advancements
  11.2.3 CANADA
    11.2.3.1 University of Toronto to enhance security with next-gen EPP deployment
11.3 EUROPE
  11.3.1 EUROPE: MARKET DRIVERS
  11.3.2 UK
    11.3.2.1 Increase in cyberattacks to drive need for endpoint protection platforms
  11.3.3 GERMANY
    11.3.3.1 Cybersecurity innovations in Germany to boost EPP growth
  11.3.4 FRANCE
    11.3.4.1 Digital expansion to strengthen endpoint protection in France
  11.3.5 ITALY
    11.3.5.1 Strategic initiatives by companies to enhance endpoint protection in Italy
  11.3.6 REST OF EUROPE
11.4 ASIA PACIFIC
  11.4.1 ASIA PACIFIC: MARKET DRIVERS
  11.4.2 CHINA
    11.4.2.1 Increasing internet penetration in China to drive demand for endpoint protection platforms
  11.4.3 JAPAN
    11.4.3.1 Strategic collaborations by companies in Japan to drive EPP market growth
  11.4.4 INDIA
    11.4.4.1 Rapid digitalization transformation in India to spur demand for EPP
  11.4.5 SINGAPORE
    11.4.5.1 Remote work trends boosting EPP adoption in Singapore
  11.4.6 REST OF ASIA PACIFIC
11.5 MIDDLE EAST & AFRICA
  11.5.1 MIDDLE EAST & AFRICA: MARKET DRIVERS
  11.5.2 GULF COOPERATION COUNCIL (GCC)
    11.5.2.1 KSA
      11.5.2.1.1 Transformative cybersecurity initiatives in KSA to drive EPP growth
    11.5.2.2 UAE
      11.5.2.2.1 Cybersecurity initiatives to propel UAE's endpoint protection platform market growth
    11.5.2.3 Rest of GCC countries
  11.5.3 SOUTH AFRICA
    11.5.3.1 Local expertise and comprehensive solutions to drive EPP market growth in South Africa
  11.5.4 REST OF MIDDLE EAST & AFRICA
11.6 LATIN AMERICA
  11.6.1 LATIN AMERICA: MARKET DRIVERS
  11.6.2 BRAZIL
    11.6.2.1 Acronis and Xcitium to fortify EPP landscape in Brazil
  11.6.3 MEXICO
    11.6.3.1 AWS's strategic investment to create opportunity for EPP advancements in Mexico
  11.6.4 REST OF LATIN AMERICA

12 COMPETITIVE LANDSCAPE

12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN
12.2 REVENUE ANALYSIS
12.3 MARKET SHARE ANALYSIS
12.4 BRAND COMPARISON
12.5 COMPANY VALUATION AND FINANCIAL METRICS
  12.5.1 COMPANY VALUATION
  12.5.2 FINANCIAL METRICS USING EV/EBITDA
12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023
  12.6.1 STARS
  12.6.2 EMERGING LEADERS
  12.6.3 PERVASIVE PLAYERS
  12.6.4 PARTICIPANTS
  12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2024
    12.6.5.1 Company footprint
    12.6.5.2 Regional footprint
    12.6.5.3 Offering footprint
    12.6.5.4 Deployment mode footprint
    12.6.5.5 Vertical footprint
12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023
  12.7.1 PROGRESSIVE COMPANIES
  12.7.2 RESPONSIVE COMPANIES
  12.7.3 DYNAMIC COMPANIES
  12.7.4 STARTING BLOCKS
  12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023
    12.7.5.1 Detailed list of key startups/SMEs
    12.7.5.2 Competitive benchmarking of key startups/SMEs
12.8 COMPETITIVE SCENARIO
  12.8.1 PRODUCT LAUNCHES
  12.8.2 DEALS

13 COMPANY PROFILES

13.1 KEY PLAYERS
  13.1.1 MICROSOFT
    13.1.1.1 Business overview
    13.1.1.2 Products/Solutions/Services offered
    13.1.1.3 MnM view
      13.1.1.3.1 Key strengths
      13.1.1.3.2 Strategic choices
      13.1.1.3.3 Weaknesses and competitive threats
  13.1.2 CROWDSTRIKE
    13.1.2.1 Business overview
    13.1.2.2 Products/Solutions/Services offered
    13.1.2.3 Recent developments
    13.1.2.4 MnM view
      13.1.2.4.1 Key strengths
      13.1.2.4.2 Strategic choices
      13.1.2.4.3 Weaknesses and competitive threats
  13.1.3 TREND MICRO
    13.1.3.1 Business overview
    13.1.3.2 Products/Solutions/Services offered
    13.1.3.3 Recent developments
    13.1.3.4 MnM view
      13.1.3.4.1 Key strengths
      13.1.3.4.2 Strategic choices
      13.1.3.4.3 Weaknesses and competitive threats
  13.1.4 PALO ALTO NETWORKS
    13.1.4.1 Business overview
    13.1.4.2 Products/Solutions/Services offered
    13.1.4.3 Recent developments
    13.1.4.4 MnM view
      13.1.4.4.1 Key strengths
      13.1.4.4.2 Strategic choices
      13.1.4.4.3 Weaknesses and competitive threats
  13.1.5 SENTINELONE
    13.1.5.1 Business overview
    13.1.5.2 Products/Solutions/Services offered
    13.1.5.3 Recent developments
    13.1.5.4 MnM view
      13.1.5.4.1 Key strengths
      13.1.5.4.2 Strategic choices
      13.1.5.4.3 Weaknesses and competitive threats
  13.1.6 CHECK POINT
    13.1.6.1 Business overview
    13.1.6.2 Products/Solutions/Services offered
    13.1.6.3 Recent developments
  13.1.7 BROADCOM
    13.1.7.1 Business overview
    13.1.7.2 Products/Solutions/Services offered
  13.1.8 VMWARE
    13.1.8.1 Business overview
    13.1.8.2 Products/Solutions/Services offered
  13.1.9 FORTINET
    13.1.9.1 Business overview
    13.1.9.2 Products/Solutions/Services offered
  13.1.10 TANIUM
    13.1.10.1 Business overview
    13.1.10.2 Products/Solutions/Services offered
    13.1.10.3 Recent developments
  13.1.11 CISCO
    13.1.11.1 Business overview
    13.1.11.2 Products/Solutions/Services offered
    13.1.11.3 Recent developments
  13.1.12 BLACKBERRY
    13.1.12.1 Business overview
    13.1.12.2 Products/Solutions/Services offered
    13.1.12.3 Recent developments
  13.1.13 ESET
    13.1.13.1 Business overview
    13.1.13.2 Products/Solutions/Services offered
    13.1.13.3 Recent developments
  13.1.14 SOPHOS
    13.1.14.1 Business overview
    13.1.14.2 Products/Solutions/Services offered
    13.1.14.3 Recent developments
  13.1.15 BITDEFENDER
    13.1.15.1 Business overview
    13.1.15.2 Products/Solutions/Services offered
    13.1.15.3 Recent developments
  13.1.16 WITHSECURE
  13.1.17 CYBEREASON
  13.1.18 WATCHGUARD
  13.1.19 AHNLAB
  13.1.20 TRELLIX
13.2 OTHER PLAYERS
  13.2.1 ABSOLUTE
  13.2.2 COSOSYS
  13.2.3 WEBROOT
  13.2.4 XCITIUM
  13.2.5 THREATLOCKER
  13.2.6 DEEP INSTINCT

14 ADJACENT AND APPENDIX

14.1 INTRODUCTION
14.2 LIMITATIONS
  14.2.1 CYBERSECURITY MARKET
  14.2.2 IOT SECURITY MARKET
14.3 DISCUSSION GUIDE
14.4 KNOWLEDGESTORE: MARKETSANDMARKETS’ SUBSCRIPTION PORTAL
14.5 CUSTOMIZATION OPTIONS
14.6 RELATED REPORTS
14.7 AUTHOR DETAILS


More Publications