Enterprise Endpoint Cyber Security Market Report 2015-2020 : Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response

企業エンドポイント・サイバーセキュリティの世界市場2015-2020

◆タイトル:Enterprise Endpoint Cyber Security Market Report 2015-2020 : Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response
◆商品コード:VGAIN5122103
◆調査・発行会社:visiongain
◆発行日:2015年12月
◆ページ数:286
◆レポート形式:PDF / 英語
◆納品方法:Eメール
◆調査対象地域:グローバル
◆産業分野:IT
◆販売価格オプション(消費税別)
Single UserGBP1,799 ⇒換算¥259,056見積依頼/購入/質問フォーム
Five UserGBP2,999 ⇒換算¥431,856見積依頼/購入/質問フォーム
Site License(全社内共有可)GBP4,999 ⇒換算¥719,856見積依頼/購入/質問フォーム
※Single UserとDept Licence(Five User)の場合、DRM(デジタル著作権管理)付PDFファイルです。認証されたPC上のみでの閲覧と、PDF閲覧期限は購入日より1年となります。Dept Licence(Five User)は印刷できますが、Single Userは印刷できません。Site Licence/Global Site Licenseの場合は、閲覧・印刷制限はありません。
販売価格オプションの説明はこちらでご利用ガイドはこちらでご確認いただけます。
※お支払金額は「換算金額(日本円)+消費税+配送料(Eメール納品は無料)」です。
※Eメールによる納品の場合、通常ご注文当日~2日以内に納品致します。
※商品の納品後、納品日+5日以内に請求書を発行し、お客様宛に郵送いたしますので、請求書発行日より2ヶ月以内に銀行振込にて支払をお願いします。(振込先:三菱東京UFJ銀行/京橋支店/H&Iグローバルリサーチ株式会社)
※上記の日本語題名はH&Iグローバルリサーチが翻訳したものです。英語版原本には日本語表記はありません。
※為替レートは適宜修正・更新しております。リアルタイム更新ではありません。
※弊社H&Iグローバルリサーチ株式会社はvisiongainの日本における正規販売代理店です。

【レポートの概要】

当調査レポートでは、企業エンドポイント・サイバーセキュリティの世界市場について調査・分析し、以下の構成でお届けいたします。

・レポートの概要
・イントロダクション
・企業エンドポイント・サイバーセキュリティの世界市場
 (市場規模予測、市場の成長要因・阻害要因など)
・企業エンドポイント・サイバーセキュリティの世界市場:セグメント別市場分析
・企業エンドポイント・サイバーセキュリティの世界市場:地域別市場分析、市場規模予測
・市場環境分析
・専門家の見解
・主要企業分析
・結論および提言

This new report offers comprehensive analysis of enterprise endpoint cyber security solutions and related companies. Visiongain assesses that the enterprise endpoint cyber security market will reach $4.98bn in 2015.

Visiongain’s report will ensure that you keep informed and ahead of your competitors. Gain that competitive advantage.

The report will answer questions such as:
• How is the Enterprise Endpoint Cyber Security market evolving?
• What is driving and restraining Enterprise Endpoint Cyber Security market dynamics?
• How will each Enterprise Endpoint Cyber Security submarket segment grow over the forecast period and how much revenue will these submarkets account for in 2020?
• How will market shares of each Enterprise Endpoint Cyber Security submarket develop from 2015-2020?
• Which individual technologies will prevail and how will these shifts be responded to?
• Which Enterprise Endpoint Cyber Security submarket will be the main driver of the overall market from 2015-2020?
• How will political and regulatory factors influence regional Enterprise Endpoint Cyber Security markets and submarkets?
• Will leading national Enterprise Endpoint Cyber Security markets broadly follow macroeconomic dynamics, or will individual country sectors outperform the rest of the economy?
• How will market shares of the regional markets change by 2020 and which regions will lead the market in 2020?
• Who are the leading players and what are their prospects over the forecast period?
• How will the sector evolve as alliances form during the period between 2015 and 2020?

5 Reasons why you must order and read this report today:

1) The report provides the market share and detailed profiles of 13 leading companies operating within the Enterprise Endpoint Cyber Security market:
- Cisco
- EMC
- ESET
- FireEye
- Intel
- IBM
- Kaspersky
- Microsoft
- Palo Alto Networks
- Raytheon
- Sophos
- Symantec
- Trend Micro

2) The study reveals where and how companies are investing in the enterprise endpoint security. We show you the prospects for the following regions:
- Asia-Pacific
- Europe
- Latin America
- Middle-East & Africa
- North America

3) The analysis is also underpinned by our exclusive interviews with leading experts
- Raj Samani, Vice President, Chief Technology Officer, Intel Security
- Michael Applebaum, Vice President of Marketing, Invincea
- Todd Weller, Vice President of Corporate Development & Marketing, Hexis Cyber Solutions

4) Our overview and analyses these technologies from 2015-2020
- Endpoint Protection
- Endpoint Detection and Response
- Next-Generation Endpoint Security

Competitive advantage
This independent, 286 pages, report guarantees you will remain better informed than your competitors. With 299 tables, figures and chart examining the enterprise endpoint cyber security market space, the report gives you an immediate, one-stop breakdown of your market, keeping your knowledge that one step ahead of your rivals.

【レポートの目次】

1. Report Overview
1.1 Global Enterprise Endpoint Security Market Overview
1.2 Global Enterprise Endpoint Security Market Segmentation
1.3 Why You Should Read This Report
1.4 How This Report Delivers
1.5 Key Questions Answered by This Analytical Report Include:
1.6 Who is This Report For?
1.7 Methodology
1.7.1 Primary Research
1.7.2 Secondary Research
1.7.3 Market Evaluation & Forecasting Methodology
1.8 Frequently Asked Questions (FAQ)
1.9 Associated Visiongain Reports
1.10 About Visiongain

2. Introduction to the Enterprise Endpoint Security Market
2.1 Global Enterprise Endpoint Security Market Structure
2.2 Enterprise Endpoint Security Market Landscape
2.2.1 Enterprise Endpoint Security Market Definition
2.2.2 The Increasing Importance of Endpoint Security
2.2.3 The Global Cyber Threats to Enterprises
2.2.4 Most Common Methods of Cyber Attacks
2.2.5 Main Objectives of Cyber Attackers
2.2.6 Most Important Mechanisms of Cyber Attacks
2.2.7 Stage of Cyber Attacks

3. Global Enterprise Endpoint Security Market 2015-2020
3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020
3.2 Global Enterprise Endpoint Security Drivers & Restraints 2015
3.2.1 Global Enterprise Endpoint Security Market Drivers 2015
3.2.1.1 The Sophistication of Threats towards Endpoints
3.2.1.2 The Changes in Communicating
3.2.1.3 The Evolution of Business Operating
3.2.1.3.1 Cloudification
3.2.1.3.2 Mobility
3.2.1.3.3 BYOD
3.2.1.4 The Explosion of New Internet-Connected Devices
3.2.2 Global Enterprise Endpoint Security Market Restraints 2015
3.2.2.1 The Costs
3.2.2.2 The Underestimated Threats
3.2.2.3 The Customer Confusion

4. Global Enterprise Endpoint Security Submarket 2015-2025
4.1 Analysis of the Enterprise Endpoint Security Market through its Technologies
4.1.1 Antimalware
4.1.1.1 Signature-Based Detection
4.1.1.2 Heuristics Detection
4.1.1.3 Data Mining Detection
4.1.2 Firewall
4.1.2.1 Packet-Filter firewalls
4.1.2.2 Stateful firewall
4.1.2.3 Application-layer firewalls
4.1.2.4 Proxy Firewalls
4.1.2.5 Next Generation Firewalls
4.1.3 Intrusion Detection System
4.1.3.1 Host-Based Intrusion Detection System
4.1.3.2 Network-Based Intrusion Detection System
4.1.4 Intrusion Prevention System
4.1.5 Encryption
4.1.5.1 Symmetric Encryption
4.1.5.2 Asymmetric Encryption
4.1.6 Configuration Management
4.1.7 Mobile Device Management
4.1.8 Data Loss Prevention
4.1.9 Application Control
4.1.10 Computer Intrusion Detector
4.2 Analysis of the Enterprise Endpoint Security Market through its Solutions
4.2.1 Endpoint Protection Definition
4.2.2 Endpoint Detection and Response Definition
4.2.3 Next Generation Endpoint Security Definition
4.3 Enterprise Endpoint Security Submarket Analysis

5. Regional Enterprise Endpoint Security Market Forecast 2015-2020
5.1 Regional Enterprise Endpoint Security Market Share Forecast 2015-2020
5.2 Asia-Pacific Enterprise Endpoint Security Market Forecast 2015-2020
5.2.1 Asia-Pacific Enterprise Endpoint Security Market Analysis
5.2.1.1 Asia-Pacific Economic Overview
5.2.1.2 Asia-Pacific Digital Penetration Overview
5.2.1.3 Asia-Pacific Cyber Attacks Overview
5.2.1.4 The Enterprise Endpoint Security Market in Asia-Pacific
5.2.2 Asia-Pacific Enterprise Endpoint Security Market Drivers & Restraints
5.3 Europe Enterprise Endpoint Security Market Forecast 2015-2020
5.3.1 European Enterprise Endpoint Security Market Analysis
5.3.1.1 European Economic Overview
5.3.1.2 European Digital Penetration Overview
5.3.1.3 European Cyber Attacks Overview
5.3.1.4 The Enterprise Endpoint Security Market in Europe
5.3.2 European Enterprise Endpoint Security Market Drivers & Restraints
5.4 Latin America Enterprise Endpoint Security Market Forecast 2015-2020
5.4.1 Latin America Enterprise Endpoint Security Market Analysis
5.4.1.1 Latin America Economy Overview
5.4.1.2 Latin America Digital Penetration Overview
5.4.1.3 Latin America Cyber Attacks Overview
5.4.1.4 The Enterprise Endpoint Security Market in Latin America
5.4.2 Latin America Enterprise Endpoint Security Market Drivers & Restraints
5.5 Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020
5.5.1 Middle-East & Africa Enterprise Endpoint Security Market Analysis
5.5.1.1 Middle-East & Africa Economic Overview
5.5.1.2 Middle-East & Africa Digital Penetration Overview
5.5.1.3 Middle-East & Africa Cyber Attacks Overview
5.5.1.4 The Enterprise Endpoint Security Market in the Middle-East and Africa
5.5.2 Middle East & Africa Enterprise Endpoint Security Market Drivers & Restraints
5.6 North America Enterprise Endpoint Security Market Forecast 2015-2020
5.6.1 North America Enterprise Endpoint Security Market Analysis
5.6.1.1 North America Economy Overview
5.6.1.2 North America Digital Penetration Overview
5.6.1.3 North America Cyber Attacks Overview
5.6.1.4 The Enterprise Endpoint Security Market in the North American
5.6.2 North America Enterprise Endpoint Security Market Drivers & Restraints

6. SWOT Analysis of the Enterprise Endpoint Security Market 2015-2020

7. Expert Opinion
7.1 Michael Applebaum, Vice President of Marketing, Invincea
7.1.1 View of Invincea on the Endpoint Security Market
7.2 Todd Weller, Vice President of Corporate Development & Marketing, Hexis Cyber Solutions
7.2.1 Hexis Cyber Solutions’ view on the Endpoint Security Market
7.2.2 Presence of Hexis Cyber Solutions in the Endpoint Security Market
7.3 Raj Samani, Vice President, Chief Technology Officer, Intel Security
7.3.1 Intel Security’s view on the Endpoint Security Market
7.3.2 Presence of Intel Security in the Endpoint Security Market

8. Leading 13 Enterprise Endpoint Security Companies
8.1 Leading 13 Enterprise Endpoint Security Companies Revenue Share Analysis 2015
8.2 Cisco
8.2.1 Cisco Total Company Sales 2008-2015
8.2.2 Cisco Net Profit 2010-2015
8.2.3 Cisco Capital Expenditure 2012-2015
8.2.4 Cisco Cost of Research & Development 2010-2015
8.2.5 Cisco Sales by Segment of Business 2010-2015
8.2.6 Cisco Regional Emphasis / Focus
8.2.7 Cisco Organisational Structure / Subsidiaries / Number of Employees
8.2.8 Cisco Mergers & Acquisitions (M&A) Activity
8.2.9 Cisco’s Role in the Enterprise Endpoint Security Market
8.3 EMC
8.3.1 EMC Total Company Sales 2008-2014
8.3.2 EMC Net Profit 2010-2014
8.3.3 EMC Capital Expenditure 2010-2014
8.3.4 EMC Cost of Research & Development 2010-2014
8.3.5 EMC Sales by Segment of Business 2010-2014
8.3.6 EMC Regional Emphasis / Focus
8.3.7 EMC Organisational Structure / Subsidiaries / Number of Employees
8.3.8 EMC Mergers & Acquisitions (M&A) Activity
8.3.9 EMC’s Role in the Enterprise Endpoint Security Market
8.4 ESET
8.4.1 ESET Total Company Sales 2013-2015
8.4.2 ESET Regional Emphasis / Focus
8.4.3 ESET Mergers & Acquisitions (M&A) Activity
8.4.4 ESET’s Role in the Enterprise Endpoint Security Market
8.5 FireEye, Inc.
8.5.1 FireEye Total Company Sales 2009-2014
8.5.2 FireEye Net Loss 2010-2014
8.5.3 FireEye Cost of Research & Development 2010-2014
8.5.4 FireEye Sales by Segment of Business 2009-2014
8.5.6 FireEye Regional Emphasis / Focus
8.5.7 FireEye Organisational Structure / Subsidiaries / Number of Employees
8.5.8 FireEye Mergers & Acquisitions (M&A) Activity
8.5.9 FireEye’s Role in the Enterprise Endpoint Security Market
8.6 Intel Corporation
8.6.1 Intel Corporation Total Company Sales 2008-2014
8.6.2 Intel Corporation Net Profit 2010-2014
8.6.3 Intel Corporation Capital Expenditure 2009-2013
8.6.4 Intel Corporation Cost of Research & Development 2010-2014
8.6.5 Intel Corporation Sales by Segment of Business 2010-2014
8.6.6 Intel Corporation Regional Emphasis / Focus
8.6.7 Intel Corporation Organisational Structure / Subsidiaries / Number of Employees
8.6.8 Intel Corporation Mergers & Acquisitions (M&A) Activity
8.6.9 Intel Corporation’s Role in the Enterprise Endpoint Security Market
8.7 International Business Machines (IBM) Corporation
8.7.1 IBM Total Company Sales 2008-2014
8.7.2 IBM Net Profit 2010-2014
8.7.3 IBM Capital Expenditure 2008-2014
8.7.4 IBM Cost of Research & Development 2010-2014
8.7.5 IBM Sales by Segment of Business 2010-2014
8.7.6 IBM Regional Emphasis / Focus
8.7.7 IBM Organisational Structure / Subsidiaries / Number of Employees
8.7.8 IBM Mergers & Acquisitions (M&A) Activity
8.7.9 IBM’s Role in the Enterprise Endpoint Security Market
8.8 Kaspersky Lab
8.8.1 Kaspersky Lab Total Company Sales 2008-2014
8.8.2 Kaspersky Lab Regional Emphasis / Focus
8.8.3 Kaspersky Lab Organisational Structure / Subsidiaries
8.8.4 Kaspersky Lab Mergers & Acquisitions (M&A) Activity
8.8.5 Kaspersky‘s Role in the Enterprise Endpoint Security Market
8.9 Microsoft Corporation
8.9.1 Microsoft Total Company Sales 2008-2015
8.9.2 Microsoft Net Profit 2010-2015
8.9.3 Microsoft Cost of Research & Development 2010-2015
8.9.4 Microsoft Sales by Segment of Business 2012-2014
8.9.5 Microsoft Regional Emphasis / Focus
8.9.6 Microsoft Organisational Structure / Subsidiaries / Number of Employees
8.9.7 Microsoft Mergers & Acquisitions (M&A) Activity
8.9.8 Microsoft’s Role in the Enterprise Endpoint Security Market
8.10 Palo Alto Networks
8.10.1 Palo Alto Networks Total Company Sales 2008-2015
8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015
8.10.3 Palo Alto Networks Capital Expenditure 2010-2012
8.10.4 Palo Alto Networks Cost of Research & Development 2010-2015
8.10.5 Palo Alto Networks Sales by Segment of Business 2010-2015
8.10.6 Palo Alto Networks Regional Emphasis / Focus
8.10.7 Palo Alto Networks Organisational Structure / Subsidiaries / Number of Employees
8.10.8 Palo Alto Networks Mergers & Acquisitions (M&A) Activity
8.10.9 Palo Alto Networks’ Role in the Enterprise Endpoint Security Market
8.11 Raytheon
8.11.1 Raytheon Total Company Sales 2005-2014
8.11.2 Raytheon Net Profit 2005-2014
8.11.3 Raytheon Capital Expenditure 2005-2014
8.11.4 Raytheon Cost of Research & Development 2010-2014
8.11.5 Raytheon Sales by Segment of Business 2008-2014
8.11.6 Raytheon Regional Emphasis / Focus
8.11.7 Raytheon Organisational Structure / Subsidiaries / Number of Employees
8.11.8 Raytheon Mergers & Acquisitions (M&A) Activity
8.11.9 Raytheon’s Role in the Enterprise Endpoint Security Market
8.12 Sophos
8.12.1 Sophos Total Company Sales 2013-2015
8.12.2 Sophos Net Loss 2013-2015
8.12.3 Sophos Capital Expenditure 2013-2015
8.12.4 Sophos Cost of Research & Development 2013-2015
8.12.5 Sophos Sales by Segment of Business 2013-2015
8.12.6 Sophos Regional Emphasis / Focus
8.12.7 Sophos Organisational Structure / Subsidiaries / Number of Employees
8.12.8 Sophos Mergers & Acquisitions (M&A) Activity
8.12.9 Sophos’ Role in the Enterprise Endpoint Security Market
8.13 Symantec Corporation
8.13 1 Symantec Total Company Sales 2008-2015
8.13.2 Symantec Net Profit 2010-2015
8.13.3 Symantec Capital Expenditure 2008-2015
8.13.4 Symantec Cost of Research & Development 2010-2015
8.13.5 Symantec Sales by Segment of Business 2014-2015
8.13.6 Symantec Regional Emphasis / Focus
8.13.7 Symantec Organisational Structure / Subsidiaries / Number of Employees
8.13.8 Symantec Mergers & Acquisitions (M&A) Activity
8.13.9 Symantec’s Role in the Enterprise Endpoint Security Market
8.14 Trend Micro
8.14.1 Trend Micro Total Company Sales 2008-2014
8.14.2 Trend Micro Net Profit 2010-2014
8.14.3 Trend Micro Cost of Research & Development 2011-2014
8.14.4 Trend Micro Regional Emphasis / Focus
8.14.5 Trend Micro Organisational Structure / Subsidiaries
8.14.6 Trend Micro Mergers & Acquisitions (M&A) Activity
8.14.7 Trend Micro’s Role in the Enterprise Endpoint Security Market

9. Conclusions and Recommendations
9.1 Enterprise Endpoint Security Conclusion
9.2 Enterprise Endpoint Security Recommendations

10. Glossary

List of Tables
2015-2020 (US$m, AGR%, Cumulative)
Table 1.2 Example of Leading National Enterprise Endpoint Security Market Forecast by Submarket 2015-2020 (US$m, AGR%, Cumulative)
Table 2.1 Methods of Cyber Attacks (Type, Description)
Table 2.2 Objectives of Cyber Attackers (Type, Description)
Table 2.3 Mechanisms of Cyber Attacks (Type, Description)
Table 3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.1 Regional Enterprise Endpoint Security Market Overview (GDP Growth %, Internet Users m, Internet Penetration %, Smartphone Penetration %)
Table 5.2 Regional Enterprise Endpoint Security Market Forecast 2015-2020 (Sales US$m, AGR%, Cumulative)
Table 5.3 Regional Enterprise Endpoint Security Market CAGR Forecast 2015-2020 (CAGR%)
Table 5.4 Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change)
Table 5.5 Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.6 Asia-Pacific Major Cyber Attacks 2006-2015 (Attack, Country, Description)
Table 5.7 Asia-Pacific Enterprise Endpoint Security Market Drivers & Restraints 2015
Table 5.8 Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.9 Europe Major Cyber Attacks 2007-2015 (Attacks Country, Description)
Table 5.10 European Enterprise Endpoint Security Market Drivers & Restraints 2015
Table 5.11 Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.12 Latin America Major Cyber Attacks 2010-2014 (Attack, Country, Description)
Table 5.13 Latin America Enterprise Endpoint Security Market Drivers & Restraints 2015
Table 5.14 Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.15 Middle East and Africa Major Cyber Attacks 2010-2015 (Attack, Country, Description)
Table 5.16 Latin America Enterprise Endpoint Security Market Drivers & Restraints 2015
Table 5.17 North America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR %, CAGR%, Cumulative)
Table 5.18 North America Major Cyber Attacks 2005-2015 (Attack, Country, Description)
Table 5.19 North America Enterprise Endpoint Security Market Drivers & Restraints 2015
Table 6.1 Global Enterprise Endpoint Security Market SWOT Analysis 2015-2020
Table 8.1 Leading 15 Enterprise Endpoint Security Companies Sales Share 2015 (Rank, Company, Total Company Sales US$m, Sales in the Market US$m, Share of Total Company Sales from Sales in the Market %, Share of the Global Market %, Primary Market Specialisation)
Table 8.2 Cisco Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.2.1 Cisco Total Company Sales 2008-2015 ($m, AGR %)
Table 8.2.2 Cisco Net Profit 2010-2015 (US$m, AGR%)
Table 8.2.3 Cisco Capital Expenditure 2012-2015 (US$m, AGR%)
Table 8.2.4 Cisco Cost of Research & Development 2010-2015 (US$m, AGR%)
Table 8.2.5 Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%)
Table 8.2.6 Cisco Sales by Geographical Location 2010-2015 (US$m, AGR%)
Table 8.2.7 Cisco Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.2.8 Cisco Number of Employees 2012-2015 (No. of Employees, AGR%)
Table 8.2.9 Cisco Recent Acquisitions 2013-2015 (Date, Details)
Table 8.3 EMC Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, Submarket Involvement, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.3.1 EMC Total Company Sales 2008-2014 ($m, AGR %)
Table 8.3.2 EMC Net Profit 2010-2014 (US$m, AGR%)
Table 8.3.3 EMC Capital Expenditure 2010-2014 (US$m, AGR%)
Table 8.3.4 EMC Cost of Research & Development 2010-2014 (US$m, AGR%)
Table 8.3.5 EMC Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 8.3.6 EMC Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 8.3.7 EMC Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.3.8 EMC Number of Employees 2010-2014 (No. of Employees, AGR%)
Table 8.3.9 EMC Recent Acquisitions 2004-2015 (Date, Details)
Table 8.3.10 EMC Divestitures 2015 (Date, Details)
Table 8.3.11 EMC Mergers/Partnerships 2015 (Date, Details)
Table 8.4 ESET Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, No. of Employees, Website)
Table 8.4.1 ESET Total Company Sales 2013-2015 ($m, AGR %)
Table 8.4.2 ESET International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.4.3 ESET Acquisition 2015 (Date, Details)
Table 8.5 FireEye Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.5.1 FireEye Total Company Sales 2009-2014 ($m, AGR %)
Table 8.5.2 FireEye Net Loss 2010-2014 (US$m, AGR%)
Table 8.5.3 FireEye Cost of Research & Development 2010-2014 (US$m, AGR%)
Table 8.5.4 FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%)
Table 8.5.5 FireEye Sales by Geographical Location 2011-2014 (US$m, AGR%)
Table 8.5.6 FireEye Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.5.7 FireEye Number of Employees 2011-2014 (No. of Employees, AGR%)
Table 8.5.8 FireEye Recent Acquisitions 2013-2014 (date, Details)
Table 8.6 Intel Corporation Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, Ticker, Website)
Table 8.6.1 Intel Corporation Total Company Sales 2008-2014 ($m, AGR %)
Table 8.6.2 Intel Corporation Net Profit 2010-2014 (US$m, AGR%)
Table 8.6.3 Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%)
Table 8.6.4 Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR%)
Table 8.6.5 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 8.6.6 Intel Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 8.6.7 Intel Corporation Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.6.8 Intel Corporation Number of Employees 2010-2014 (No. of Employees, AGR%)
Table 8.6.9 Intel Corporation Recent Acquisitions 2007-2015 (Date, Details)
Table 8.6.10 Intel Corporation Divestiture 2015 (Date, Details)
Table 8.7 IBM Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.7.1 IBM Total Company Sales 2008-2014 ($m, AGR %)
Table 8.7.2 IBM Net Profit 2010-2014 (US$m, AGR%)
Table 8.7.3 IBM Capital Expenditure 2008-2014 (US$m, AGR%)
Table 8.7.4 IBM Cost of Research & Development 2010-2014 (US$m, AGR%)
Table 8.7.5 IBM Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 8.7.6 IBM Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 8.7.7 IBM Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.7.8 IBM Number of Employees 2010-2014 (No. of Employees, AGR%)
Table 8.7.9 IBM Recent Acquisitions 2013-2015 (Date, Details)
Table 8.7.10 IBM Recent Divestiture 2014 (Date, Details)
Table 8.8 Kaspersky Lab Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, HQ, Founded, Website)
Table 8.8.1 Kaspersky Lab Total Company Sales 2008-2014 ($m, AGR %)
Table 8.8.2 Kaspersky Lab Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.8.3 Kaspersky Lab Acquisitions 2005-2012 (Date, Details)
Table 8.8.4 Kaspersky Lab Divestiture 2011 (Date, Details)
Table 8.9 Microsoft Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.9.1 Microsoft Total Company Sales 2008-2015 ($m, AGR %)
Table 8.9.2 Microsoft Net Profit 2010-2015 (US$m, AGR%)
Table 8.9.3 Microsoft Cost of Research & Development 2010-2015 (US$m, AGR%)
Table 8.9.4 Microsoft Sales by Segment of Business 2012-2014 (US$m, AGR%)
Table 8.9.5 Microsoft Sales by Geographical Location 2008-2015 (US$m, AGR%)
Table 8.9.6 Microsoft Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.9.7 Microsoft Number of Employees 2010-2015 (No. of Employees, AGR%)
Table 8.9.8 Microsoft Acquisitions 2014-2015 (Date, Details)
Table 8.9.9 Microsoft M&A Activity Divestitures 2014-2015 (Date, Details)
Table 8.10 Palo Alto Networks Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.10.1 Palo Alto Networks Total Company Sales 2008-2015 ($m, AGR %)
Table 8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
Table 8.10.3 Palo Alto Networks Capital Expenditure 2010-2012 (US$m, AGR%)
Table 8.10.4 Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR%)
Table 8.10.5 Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%)
Table 8.10.6 Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, AGR%)
Table 8.10.7 Palo Alto Networks Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.10.8 Palo Alto Networks Number of Employees 2012-2015 (No. of Employees, AGR%)
Table 8.10.9 Palo Alto Networks Recent Acquisitions 2014-2015 (Date, Details)
Table 8.11 Raytheon Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.11.1 Raytheon Total Company Sales 2005-2014 ($m, AGR %)
Table 8.11.2 Raytheon Net Profit 2005-2014 (US$m, AGR%)
Table 8.11.3 Raytheon Capital Expenditure 2005-2014 (US$m, AGR%)
Table 8.11.4 Raytheon Cost of Research & Development 2010-2014 (US$m, AGR%)
Table 8.11.5 Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%)
Table 8.11.6 Raytheon Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 8.11.7 Raytheon Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.11.8 Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%)
Table 8.11.9 Raytheon Company Recent Acquisitions 2010-2013 (Date, Details)
Table 8.11.10 Raytheon Company Partnerships 2001-2013 (Date, Details)
Table 8.12 Sophos Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.12.1 Sophos Total Company Sales 2013-2015 ($m, AGR %)
Table 8.12.2 Sophos Net Loss 2013-2015 (US$m, AGR%)
Table 8.12.3 Sophos Capital Expenditure 2013-2015 (US$m, AGR%)
Table 8.12.4 Sophos Cost of Research & Development 2013-2015 (US$m, AGR%)
Table 8.12.5 Sophos Sales by Segment of Business 2013-2015 (US$m, AGR%)
Table 8.12.6 Sophos Sales by Geographical Location 2013-2015 (US$m, AGR%)
Table 8.12.7 Sophos Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.12.8 Sophos Number of Employees 2013-2015 (No. of Employees, AGR%)
Table 8.12.9 Sophos Acquisitions 2007-2014 (Date, Details)
Table 8.12.10 Sophos Divestiture 2006-2010 (Date, Details)
Table 8.13 Symantec Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, Net Capital Expenditure US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 8.13.1 Symantec Total Company Sales 2008-2015 ($m, AGR %)
Table 8.13.2 Symantec Net Profit 2010-2015 (US$m, AGR%)
Table 8.13.3 Symantec Capital Expenditure 2008-2015 (US$m, AGR%)
Table 8.13.4 Symantec Cost of Research & Development 2010-2015 (US$m, AGR%)
Table 8.13.5 Symantec Sales by Segment of Business 2014-2015 (US$m, AGR%)
Table 8.13.6 Symantec Sales by Geographical Location 2008-2015 (US$m, AGR%)
Table 8.13.7 Symantec Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.13.8 Symantec Number of Employees 2010-2015 (No. of Employees, AGR%)
Table 8.13.9 Symantec Recent Acquisitions 2000-2015 (Date, Details)
Table 8.13.10 Symantec Divestitures 2015 (Date, Details)
Table 8.13.11 Symantec Mergers 2004 (Date, Details)
Table 8.14 Trend Micro Profile 2015 (CEO, Total Company Sales US$m, Sales in the Market US$m, Share of Company Sales from Enterprise Endpoint Security Market %, Net Profit US$m, HQ, Founded, IR Contact, Ticker, Website)
Table 8.14.1 Trend Micro Total Company Sales 2008-2014 ($m, AGR %)
Table 8.14.2 Trend Micro Net Profit 2010-2014 (US$m, AGR%)
Table 8.14.3 Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR%)
Table 8.14.4 Trend Micro Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 8.14.5 Trend Micro Primary International Subsidiaries 2015 (Region, Subsidiary, Location)
Table 8.14.6 Trend Micro Recent Acquisitions 2008-2015 (Date, Details)
Table 8.14.7 Trend Micro Divestitures 2015 (Date, Details)

List of Figures
Figure 1.1 Global Enterprise Endpoint Security Market Segmentation Overview
Figure 1.2 Example of Enterprise Endpoint Security Market by Regional Market Share Forecast 2015, 2020 (% Share)
Figure 1.3 Example Regional vs. Global Enterprise Endpoint Security Market CAGR Forecast 2015, 2020, 2015-2020 (CAGR%)
Figure 1.4 Example of Regional Enterprise Endpoint Security Market by Submarket Forecast 2015-2020 (US$m, AGR %)
Figure 2.1 Global Enterprise Endpoint Security Market Segmentation Overview
Figure 2.2 Share of Global Cyber Threats to Enterprises by the Type of Attacker 2014 (%Share)
Figure 2.3 Common Stages of Cyber Attacks
Figure 3.1 Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, AGR%)
Figure 4.1 Functions of Endpoint Security Technologies
Figure 5.1 Enterprise Endpoint Security Regional Coverage
Figure 5.2 Regional Enterprise Endpoint Security Market Share Forecast 2015 (% Share)
Figure 5.3 Regional Enterprise Endpoint Security Market Share Forecast 2020 (% Share)
Figure 5.4 Regional Enterprise Endpoint Security Market Percentage Change in Market Share 2015-2020 (% Change)
Figure 5.5 Regional Enterprise Endpoint Security Market Cumulative Sales 2015-2020 ($US$m)
Figure 5.6 Asia Pacific Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Asia Pacific Market Sales AGR%, Global Market Sales AGR %)
Figure 5.7 Asia Pacific vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
Figure 5.8 Asia Pacific vs. Global Digital Penetration Rate 2015 (%)
Figure 5.9 Europe Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Europe Market Sales AGR%, Global Market Sales AGR %)
Figure 5.10 Europe vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
Figure 5.11 Europe vs. Global Digital Penetration Rate 2015 (%)
Figure 5.12 Latin America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Latin America Market Sales AGR%, Global Market Sales AGR %)
Figure 5.13 Latin America vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
Figure 5.14 Latin America vs. Global Digital Penetration Rate 2015 (%)
Figure 5.15 Middle East & Africa Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Middle-East & Africa Market Sales AGR%, Global Market Sales AGR %)
Figure 5.16 Middle East & Africa vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
Figure 5.17 Middle East & Africa vs. Global Digital Penetration Rate 2015 (%)
Figure 5.18 North America Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, North America Market Sales AGR%, Global Market Sales AGR %)
Figure 5.19 North America vs. Global Enterprise Endpoint Security Market Forecast 2015-2020 (US$m, Global Market Sales AGR %)
Figure 5.20 North America vs. Global Digital Penetration Rate 2015 (%)
Figure 8.1 Leading 13 Enterprise Endpoint Security Companies Total Sales 2014 ($US$m )
Figure 8.2 Leading 13 Enterprise Endpoint Security Companies Share of the Market 2014 (% Share)
Figure 8.2.1 Cisco Total Company Sales 2008-2015 (US$m, AGR%)
Figure 8.2.2 Cisco Net Profit 2010-2015 (US$m, AGR%)
Figure 8.2.3 Cisco Capital Expenditure 2012-2015 (US$m, AGR%)
Figure 8.2.4 Cisco Cost of Research & Development 2010-2015 (US$m, AGR%)
Figure 8.2.5 Cisco Sales by Segment of Business 2011-2015 (US$m, AGR%)
Figure 8.2.6 Cisco Sales by Segment of Business 2010-2015 (US$m, AGR%)
Figure 8.2.7 Cisco Primary International Operations 2015
Figure 8.2.8 Cisco Sales AGR by Geographical Location 2011-2015 (%)
Figure 8.2.9 Cisco Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR%)
Figure 8.2.10 Cisco Organisational Structure 2015
Figure 8.2.11 Cisco Number of Employees 2012-2015 (No. of Employees, AGR%)
Figure 8.3.1 EMC Total Company Sales 2008-2014 (US$m, AGR%)
Figure 8.3.2 EMC Net Profit 2010-2014 (US$m, AGR%)
Figure 8.3.3 EMC Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 8.3.4 EMC Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 8.3.5 EMC Sales AGR by Segment of Business 2011-2014 (AGR%)
Figure 8.3.6 EMC Sales by Segment of Business 2010-2014 (US$m, AGR%)
Figure 8.3.7 EMC Primary International Operations 2015
Figure 8.3.8 EMC Sales AGR by Geographical Location 2009-2014 (AGR%)
Figure 8.3.9 EMC Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
Figure 8.3.10 EMC Organisational Structure 2015
Figure 8.3.11 EMC Number of Employees 2010-2014 (No of Employees, AGR%)
Figure 8.4.1 ESET Total Company Sales 2013-2015 (US$m)
Figure 8.4.2 ESET Primary International Operations 2015
Figure 8.5.1 FireEye Total Company Sales 2009-2014 (US$m, AGR%)
Figure 8.5.2 FireEye Net Loss 2010-2014 (US$m, AGR%)
Figure 8.5.3 FireEye Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 8.5.4 FireEye Sales AGR by Segment of Business 2010-2014 (AGR%)
Figure 8.5.5 FireEye Sales by Segment of Business 2009-2014 (US$m, AGR%)
Figure 8.5.6 FireEye Primary International Operations 2015
Figure 8.5.7 FireEye Sales AGR by Geographical Location 2012-2014 (AGR%)
Figure 8.5.8 FireEye Sales by Geographical Location 2011-2014 (US$m, Total Company Sales AGR%)
Figure 8.5.9 FireEye Organisational Structure 2015
Figure 8.5.10 FireEye Number of Employees 2011-2014 (No of Employees, AGR%)
Figure 8.6.1 Intel Corporation Total Company Sales 2008-2014 (US$m, AGR%)
Figure 8.6.2 Intel Corporation Net Profit 2010-2014 (US$m, AGR%)
Figure 8.6.3 Intel Corporation Capital Expenditure 2009-2013 (US$m, AGR%)
Figure 8.6.4 Intel Corporation Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 8.6.5 Intel Corporation Sales AGR by Segment of Business 2011-2014 (AGR%)
Figure 8.6.6 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Figure 8.6.7 Intel Corporation Primary International Operations 2015
Figure 8.6.8 Intel Corporation Sales AGR by Geographical Location 2011-2014 (AGR%)
Figure 8.6.9 Intel Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 8.6.10 Intel Corporation Organisational Structure 2015
Figure 8.6.11 Intel Corporation Number of Employees 2010-2014 (No of Employees, AGR%)
Figure 8.7.1 IBM Total Company Sales 2008-2014 (US$m, AGR%)
Figure 8.7.2 IBM Net Profit 2010-2014 (US$m, AGR%)
Figure 8.7.3 IBM Capital Expenditure 2008-2014 (US$m, AGR%)
Figure 8.7.4 IBM Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 8.7.5 IBM Sales AGR by Segment of Business 2011-2014 (AGR%)
Figure 8.7.6 IBM Sales by Segment of Business 2010-2014 (AGR%)
Figure 8.7.7 IBM Primary International Operations 2015
Figure 8.7.8 IBM Sales AGR by Geographical Location 2011-2014 (AGR%)
Figure 8.7.9 IBM Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 8.7.10 IBM Organisational Structure 2015
Figure 8.7.11 IBM Number of Employees 2010-2014 (No Of Employees, AGR%)
Figure 8.8.1 Kaspersky Lab Total Company Sales 2008-2014 (US$m, AGR%)
Figure 8.8.2 Kaspersky Lab Primary International Operations 2015
Figure 8.8.3 Kaspersky Lab Organisational Structure 2015
Figure 8.9.1 Microsoft Total Company Sales 2008-2015 (US$m, AGR%)
Figure 8.9.2 Microsoft Net Profit 2010-2015 (US$m, AGR%)
Figure 8.9.3 Microsoft Cost of Research & Development 2010-2015 (US$m, AGR%)
Figure 8.9.4 Microsoft Sales AGR by Segment of Business 2013-2015 (AGR%)
Figure 8.9.5 Microsoft Sales by Segment of Business 2012-2015 (US$m, AGR%)
Figure 8.9.6 Microsoft Primary International Operations 2015
Figure 8.9.7 Microsoft Sales AGR by Geographical Location 2009-2015 (AGR%)
Figure 8.9.8 Microsoft Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR%)
Figure 8.9.9 Microsoft Organisational Structure 2015
Figure 8.9.10 Microsoft Number of Employees 2010-2015 (No of Employees, AGR%)
Figure 8.10.1 Palo Alto Networks Total Company Sales 2008-2015 (US$m, AGR%)
Figure 8.10.2 Palo Alto Networks Net Profit/Loss 2010-2015 (US$m)
Figure 8.10.3 Palo Alto Networks Capital Expenditure 2010-2012 (US$m)
Figure 8.10.4 Palo Alto Networks Cost of Research & Development 2010-2015 (US$m, AGR%)
Figure 8.10.5 Palo Alto Networks Sales AGR by Segment of Business 2010-2015 (AGR%)
Figure 8.10.6 Palo Alto Networks Sales by Segment of Business 2010-2015 (US$m, AGR%)
Figure 8.10.7 Palo Alto Networks Primary International Operations 2015
Figure 8.10.8 Palo Alto Networks Sales AGR by Geographical Location 2011-2015 (AGR%)
Figure 8.10.9 Palo Alto Networks Sales by Geographical Location 2010-2015 (US$m, Total Company Sales AGR%)
Figure 8.10.10 Palo Alto Networks Organisational Structure 2015
Figure 8.10.11 Palo Alto Networks Number of Employees 2012-2015 (No of Employees, AGR%)
Figure 8.11.1 Raytheon Total Company Sales 2005-2014 (US$m, AGR%)
Figure 8.11.2 Raytheon Net Profit 2005-2014 (US$m, AGR%)
Figure 8.11.3 Raytheon Capital Expenditure 2005-2014 (US$m, AGR%)
Figure 8.11.4 Raytheon Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 8.11.5 Raytheon Sales AGR by Segment of Business 2009-2014 (AGR%)
Figure 8.11.6 Raytheon Sales by Segment of Business 2008-2014 (US$m, AGR%)
Figure 8.11.7 Raytheon Primary International Operations 2015
Figure 8.11.8 Raytheon Sales AGR by Geographical Location 2009-2014 (%)
Figure 8.11.9 Raytheon Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
Figure 8.11.10 Raytheon Organisational Structure 2015
Figure 8.11.11 Raytheon Number of Employees 2008-2014 (No. of Employees, AGR%)
Figure 8.12.1 Sophos Total Company Sales 2013-2015 (US$m)
Figure 8.12.2 Sophos Net Loss 2013-2015 (US$m)
Figure 8.12.3 Sophos Capital Expenditure 2013-2015 (US$m)
Figure 8.12.4 Sophos Cost of Research & Development 2013-2015 (US$m)
Figure 8.12.5 Sophos Sales by Segment of Business 2013-2015 (US$m)
Figure 8.12.6 Sophos Primary International Operations 2015
Figure 8.12.7 Sophos Sales by Geographical Location 2013-2015 (US$m, Total Company Sales)
Figure 8.12.8 Sophos Organisational Structure 2015
Figure 8.12.9 Sophos Number of Employees 2013-2015 (No. of Employees)
Figure 8.13.1 Symantec Total Company Sales 2008-2015 (US$m, AGR%)
Figure 8.13.2 Symantec Net Profit 2010-2015 (US$m, AGR%)
Figure 8.13.3 Symantec Capital Expenditure 2008-2015 (US$m, AGR%)
Figure 8.13.4 Symantec Cost of Research & Development 2010-2015 (US$m, AGR%)
Figure 8.13.5 Symantec Sales by Segment of Business 2014-2015 (US$m)
Figure 8.13.6 Symantec Primary International Operations 2015
Figure 8.13.7 Symantec Sales AGR by Geographical Location 2009-2015 (AGR%)
Figure 8.13.8 Symantec Sales by Geographical Location 2008-2015 (US$m, Total Company Sales AGR%)
Figure 8.13.9 Symantec Organisational Structure 2015
Figure 8.13.10 Symantec Number of Employees 2010-2015 (No. of Employees, AGR%)
Figure 8.14.1 Trend Micro Total Company Sales 2010-2014 (US$m, AGR%)
Figure 8.14.2 Trend Micro Net Profit 2010-2014 (US$m, AGR%)
Figure 8.14.3 Trend Micro Cost of Research & Development 2011-2014 (US$m, AGR%)
Figure 8.14.4 Trend Micro Primary International Operations 2015
Figure 8.14.5 Trend Micro Sales AGR by Geographical Location 2009-2014 (AGR%)
Figure 8.14.6 Trend Micro Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
Figure 8.14.7 Trend Micro Organisational Structure 2015

【レポートのキーワード】

サイバーセキュリティ、エンドポイントセキュリティ、企業セキュリティ、データ

★調査レポート[企業エンドポイント・サイバーセキュリティの世界市場2015-2020] ( Enterprise Endpoint Cyber Security Market Report 2015-2020 : Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response / VGAIN5122103) 販売に関する免責事項
[企業エンドポイント・サイバーセキュリティの世界市場2015-2020] ( Enterprise Endpoint Cyber Security Market Report 2015-2020 : Top Companies, Forecasts, Analysis, Technologies & Solutions for Endpoint Protection, Detection & Response / VGAIN5122103) についてEメールでお問い合わせ


◆H&Iグローバルリサーチ株式会社のお客様(例)◆