11
GCC Cyber Security Market – Estimation & Forecast, 2016–2022 GCC region has become exposed in a large extent to phishing and Distributed Denial of Service (DDOS) attacks over the past few years. Increased interconnectivity, digitization, and use of social media within the organizations have made the GCC region appear more pregnable to cybercrimes. The GCC Cyber Security market is at $5 billion in 2015 and is expected to grow at a CAGR 10.83% during the forecast period because of increased proliferation of cyber-attacks in the GCC region, as well as governmental support and growing emphasis on Cyber Security in the GCC region. BIS RESEARCH 2016 www.bisresearch.com ©2015|BIS Ÿ What are the key market trends and developments in the GCC Cyber Security market Ÿ Cyber Security technological overview in the GCC region Ÿ What are the benefits of cyber security in the GCC region Ÿ What are the different types of cyber attacks prevalent in the GCC region Ÿ What are the key drivers, challenges and opportunities for the Cyber Security market in the GCC region with their impact analysis Ÿ Which key application verticals is utilizing Cyber Security in the GCC region with their market statistics Ÿ What are the important Cyber Security solutions in the GCC region with their market statistics Ÿ What are the important Cyber Security services in the GCC region with their market statistics Ÿ Which GCC country will lead the Cyber Security market by the end of the forecast period Ÿ Who are the key players in the GCC Cyber Security market The answers to the following key questions can be found in the report: Analysis & Forecast: Base Year: 2015 7 Year Annual Estimated Forecast (2016-2022) Market, By Solutions: Network Security, Endpoint Security, Content Security, Application Security, Industrial Control System Security, Cloud Security Market, By Services: Consulting Services, Risk Assessment Services, Training Services, Design and Integration Services, and Others Market By Application Verticals: BFSI, Aerospace and Defense, Healthcare, Manufacturing, Telecommunications, and Others Market, By Country: Saudi Arabia, UAE, Qatar, Kuwait, Bahrain, and Oman $XX Billion $XX Billion ATTRACTIVE MARKET OPPORTUNITIES § New Technological Advancements: Big Data and Internet of Things (IOT) § Emerging market for smart devices 2015 2022

Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Embed Size (px)

Citation preview

Page 1: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

GCC region has become exposed in a large extent to phishing and Distributed Denial of

Service (DDOS) attacks over the past few years. Increased interconnectivity, digitization, and

use of social media within the organizations have made the GCC region appear more

pregnable to cybercrimes.

The GCC Cyber Security market is at $5 billion in 2015 and is expected to grow at a CAGR

10.83% during the forecast period because of increased proliferation of cyber-attacks in the

GCC region, as well as governmental support and growing emphasis on Cyber Security in the

GCC region.

BIS RESEARCH 2016

www.bisresearch.com ©2015|BIS

Ÿ What are the key market trends and developments in the GCC Cyber Security market

Ÿ Cyber Security technological overview in the GCC region

Ÿ What are the benefits of cyber security in the GCC region

Ÿ What are the different types of cyber attacks prevalent in the GCC region

Ÿ What are the key drivers, challenges and opportunities for the Cyber Security market in the GCC region with their impact analysis

Ÿ Which key application verticals is utilizing Cyber Security in the GCC region with their market statistics

Ÿ What are the important Cyber Security solutions in the GCC region with their market statistics

Ÿ What are the important Cyber Security services in the GCC region with their market statistics

Ÿ Which GCC country will lead the Cyber Security market by the end of the forecast period

Ÿ Who are the key players in the GCC Cyber Security market

The answers to the following key questions can be found in the report:

Analysis & Forecast:

Base Year: 2015

7 Year Annual Estimated Forecast

(2016-2022)

Market, By Solutions: Network Security,

Endpoint Security, Content Security,

Application Security, Industrial Control

System Security, Cloud Security

Market, By Services: Consulting Services,

Risk Assessment Services, Training

Services, Design and Integration Services,

and Others

Market By Application Verticals: BFSI,

Aerospace and Defense, Healthcare,

Manufacturing, Telecommunications, and

Others

Market, By Country: Saudi Arabia, UAE,

Qatar, Kuwait, Bahrain, and Oman

$XXBillion

$XXBillion ATTRACTIVE MARKET OPPORTUNITIES

§ New Technological Advancements: Big Data and

Internet of Things (IOT)

§ Emerging market for smart devices

2015 2022

Page 2: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

Table of Contents

1 EXECUTIVE SUMMARY 4.7.4 MARKET OPPORTUNITIES

4.7.4.1 NEW TECHNOLOGICAL ADVANCEMENTS LIKE BIG DATA AND INTERNET OF THINGS (IOT)2 RESEARCH SCOPE

4.7.4.2 EMERGING MARKET FOR SMART DEVICES2.1 MARKET DEFINITION

2.2 REPORT COVERAGE5 COMPETITIVE OVERVIEW2.2.1 MARKET CLASSIFICATION5.1 INTRODUCTION2.2.1.1 MARKET SEGMENTATION BY CYBER SECURITY

SOLUTIONS 5.2 KEY MARKET DEVELOPMENT TRENDS

2.2.1.2 MARKET SEGMENTATION BY CYBER SECURITY 5.3 PARTNERSHIPS, COLLABORATIONS AND SERVICES AGREEMENTS

2.2.1.3 MARKET SEGMENTATION BY APPLICATION 5.4 PRODUCT LAUNCHVERTICALS 5.5 ACQUISITIONS

2.2.1.4 MARKET SEGMENTATION BY COUNTRIES 5.6 BUSINESS EXPANSION2.3 STAKEHOLDERS 5.7 PORTER’S FIVE FORCES ANALYSIS

5.7.1 THREAT OF NEW ENTRANTS3 RESEARCH METHODOLOGY 5.7.2 BARGAINING POWER OF BUYERS3.1 RESEARCH FLOW 5.7.3 BARGAINING POWER OF SUPPLIERS3.2 FACTOR ANALYSIS 5.7.4 THREAT OF SUBSTITUTE PRODUCTS OR 3.2.1 DEMAND SIDE FACTORS SERVICES

3.2.2 SUPPLY SIDE FACTORS 5.7.5 RIVALRY AMONG EXISTING FIRMS

3.3 RESEARCH DESIGN

3.3.1 PARAMETERS 6 INDUSTRY ANALYSIS

3.3.2 SECONDARY RESEARCH 6.1 INTRODUCTION

3.3.2.1 KEY DATA POINTS FROM SECONDARY 6.2 LAWS /REGULATORY BODIESSOURCES 6.3 PATENTS

3.3.3 PRIMARY RESEARCH 6.4 STANDARDS3.3.3.1 KEY DATA POINTS FROM PRIMARY SOURCES 6.5 VALUE CHAIN ANALYSIS3.3.4 DATA TRIANGULATION 6.5.1 CYBER SECURITY PROBLEM RECOGNITION3.3.4.1 BOTTOM UP APPROACH 6.5.2 CYBER SECURITY SERVICE PROVIDERS3.3.5 TOP DOWN APPROACH 6.5.3 CYBER SECURITY SOLUTION PROVIDERS3.4 ASSUMPTIONS 6.5.4 DISTRIBUTORS3.5 YEARS CONSIDERED

7 GCC CYBER SECURITY MARKET BY 4 MARKET OVERVIEW SOLUTIONS AND SERVICES

4.1 INTRODUCTION 7.1 INTRODUCTION

4.2 HISTORY AND EVOLUTION OF CYBER CRIMES 7.1.1 MARKET STATISTICSGLOBALLY 7.2 GCC CYBER SECURITY MARKET BY

4.3 CYBER CRIMES IMPACT IN THE GCC REGION SOLUTIONS

4.4 CYBER SECURITY BENEFITS IN THE GCC 7.2.1 INTRODUCTIONREGION 7.2.1.1 MARKET STATISTICS

4.5 CYBER ATTACKS CLASSIFICATION 7.2.2 NETWORK SECURITY4.6 CYBER SECURITY TECHNOLOGICAL 7.2.3 INTRODUCTION

OVERVIEW 7.2.3.1 KEY FACTS4.7 MARKET DYNAMICS 7.2.3.2 SIGNIFICANT DEVELOPMENTS AND PLAYERS4.7.1 INTRODUCTION 7.2.4 ENDPOINT SECURITY4.7.2 MARKET DRIVERS 7.2.4.1 INTRODUCTION4.7.2.1 PROLIFERATION OF CYBER ATTACKS 7.2.4.2 KEY FACTS4.7.2.2 INCREASED GOVERNMENT 7.2.4.3 SIGNIFICANT DEVELOPMENTS AND KEY

ACKNOWLEDGMENT FOR CYBER SECURITY PLAYERS4.7.3 MARKET CHALLENGES 7.2.5 CONTENT SECURITY4.7.3.1 UNDER SKILLED WORKFORCE 7.2.5.1 INTRODUCTION

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 3: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

7.2.5.2 KEY FACTS 8.3.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS

7.2.5.3 SIGNIFICANT DEVELOPMENTS AND KEY 8.4 HEALTHCARE SECTORPLAYERS 8.4.1 INTRODUCTION

7.2.6 APPLICATION SECURITY 8.4.2 MARKET STATISTICS7.2.6.1 INTRODUCTION 8.4.3 SIGNIFICANT FACTS7.2.7 KEY FACTS 8.4.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS7.2.7.1 SIGNIFICANT DEVELOPMENTS AND PLAYERS 8.5 TELECOMMUNICATION SECTOR7.2.8 INDUSTRIAL CONTROL SYSTEM SECURITY 8.5.1 INTRODUCTION7.2.8.1 INTRODUCTION 8.5.2 MARKET STATISTICS7.2.8.2 KEY FACTS 8.5.3 KEY FACTS7.2.8.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 8.5.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS7.2.9 CLOUD SECURITY 8.6 MANUFACTURING SECTOR7.2.9.1 INTRODUCTION 8.6.1 INTRODUCTION7.2.9.2 KEY FACTS 8.6.2 MARKET STATISTICS7.2.9.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 8.6.3 KEY FACTS7.3 GCC CYBER SECURITY MARKET BY SERVICES 8.6.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS7.3.1 INTRODUCTION 8.6.5 OTHERS7.3.2 MARKET STATISTICS 8.6.5.1 Market statistics7.3.3 CYBER SECURITY CONSULTING SERVICES

7.3.3.1 INTRODUCTION 9 GCC CYBER SECURITY MARKET BY COUNTRY7.3.3.2 KEY FACTS 9.1 INTRODUCTION7.3.3.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 9.1.1 MARKET STATISTICS7.3.4 CYBER SECURITY RISK ASSESSMENT 9.2 UNITED ARAB EMIRATES (U.A.E)

SERVICES 9.2.1 POTENTIAL FACTS7.3.4.1 INTRODUCTION 9.2.2 MARKET STATISTICS7.3.4.2 KEY FACTS 9.2.3 KEY CYBER ATTACKS7.3.4.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS 9.2.4 KEY REGULATORY BODIES/REGULATION/LAWS7.3.5 CYBER SECURITY DESIGN AND INTEGRATION 9.2.5 KEY DEVELOPMENTS

SERVICES9.2.6 KEY PLAYERS

7.3.5.1 INTRODUCTION9.2.7 KEY FACTORS DRIVING THE MARKET

7.3.5.2 KEY FACT9.3 SAUDI ARABIA

7.3.5.3 SIGNIFICANT DEVELOPMENTS AND PLAYERS9.3.1 POTENTIAL FACTS

7.3.6 TRAINING AND EDUCATION SERVICES9.3.2 MARKET STATISTICS

7.3.6.1 INTRODUCTION9.3.3 KEY CYBER ATTACKS/THREATS

7.3.6.2 KEY FACTS9.3.4 KEY ACTS/LAWS

7.3.6.3 Significant Developments and Players9.3.5 KEY DEVELOPMENTS

7.3.7 OTHERS9.3.6 KEY PLAYERS

9.3.7 KEY FACTORS DRIVING THE MARKET8 GCC CYBER SECURITY MARKET BY

9.4 QATARAPPLICATION VERTICALS9.4.1 POTENTIAL FACTS8.1 INTRODUCTION9.4.2 MARKET STATISTICS8.1.1 MARKET STATISTICS9.4.3 KEY CYBER ATTACKS/THREATS IN QATAR8.2 BANKING, FINANCIAL SERVICES AND 9.4.4 KEY REGULATORY BODY/LAWINSURANCE (BFSI) SECTOR9.4.5 KEY DEVELOPMENTS8.2.1 INTRODUCTION9.4.6 KEY PLAYERS8.2.2 MARKET STATISTICS9.4.7 KEY FACTORS DRIVING THE MARKET8.2.3 KEY FACTS9.5 KUWAIT8.2.4 KEY DEVELOPMENTS AND PLAYERS9.5.1 POTENTIAL FACTS8.3 AEROSPACE AND DEFENCE SECTOR9.5.2 MARKET STATISTICS8.3.1 INTRODUCTION9.5.3 CYBER ATTACKS/THREATS8.3.2 MARKET STATISTICS

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 4: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

9.5.4 KEY LAW 10.1.4 FORTINET INC

9.5.5 KEY DEVELOPMENTS 10.1.4.1 OVERVIEW

9.5.6 KEY PLAYERS 10.1.4.2 FINANCIALS

9.5.7 KEY FACTORS DRIVING THE MARKET 10.1.4.2.1 Overall revenue

9.6 BAHRAIN 10.1.5 TREND MICRO INC

9.6.1 POTENTIAL FACTS 10.1.5.1 OVERVIEW

9.6.2 MARKET STATISTICS 10.1.5.2 FINANCIALS

9.6.3 CYBER ATTACKS/THREATS 10.1.5.2.1 Overall revenue

9.6.4 KEY LAW 10.2 KEY CYBER SECURITY SERVICE PROVIDERS

9.6.5 KEY DEVELOPMENTS 10.2.1 BOOZ ALLEN HAMILTON CORPORATION

9.6.6 KEY PLAYERS 10.2.1.1 OVERVIEW

9.6.7 KEY FACTORS DRIVING THE MARKET 10.2.1.2 FINANCIALS

9.7 OMAN 10.2.1.2.1 Overall Financials

9.7.1 POTENTIAL FACTS 10.2.1.3 KEY DEVELOPMENTS AND STRATEGIES (2012-2014)9.7.2 MARKET STATISTICS10.2.2 COMPUTER SCIENCE CORPORATION (CSC)9.7.3 KEY CYBER ATTACKS/THREATS10.2.2.1 OVERVIEW9.7.4 KEY LAW10.2.2.2 Financials9.7.5 KEY DEVELOPMENTS10.2.2.2.1 Overall Financials9.7.6 KEY PLAYERS10.2.2.3 KEY DEVELOPMENTS AND STRATEGIES (2012-9.7.7 KEY FACTORS DRIVING THE MARKET2014)

10.2.3 FIREEYE INC10 KEY MARKET PLAYERS PROFILE10.2.3.1 OVERVIEW10.1 KEY CYBER SECURITY SOLUTION PROVIDERS10.2.3.2 FINANCIALS10.1.1 CISCO CORPORATION10.2.3.2.1 Overall revenue10.1.1.1 OVERVIEW10.2.4 KASPERSKY LAB10.1.1.2 FINANCIALS10.2.4.1 OVERVIEW10.1.1.2.1 Overall Financials10.2.4.2 FINANCIALS10.1.1.2.2 Net revenue by business segments10.2.5 SYMANTEC CORPORATION10.1.1.3 KEY DEVELOPMENTS AND STRATEGIES (2015)10.2.5.1 OVERVIEW10.1.2 MCAFEE CORPORATION10.2.5.2 FINANCIALS10.1.2.1 OVERVIEW10.2.5.2.1 Overall revenue10.1.2.2 FINANCIALS

10.1.2.2.1 Overall Financials

10.1.2.3 KEY DEVELOPMENTS AND STRATEGIES(2013-2015)

10.1.3 CASSIDIAN CYBERSECURITY COMPANY

10.1.3.1 OVERVIEW

10.1.3.2 KEY DEVELOPMENTS AND STRATEGIES(2012-2014)

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 5: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

List of Tables

TABLE 1 SIGNIFICANT FACTS RELATED TO THE POTENTIAL OF CYBER SECURITY MARKET FOR THE GCC COUNTRIES

TABLE 2 MARKET ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY MARKET: CONSIDERATIONS AND CROSS MAPPING

TABLE 3 ASSUMPTION TABLE

TABLE 4 SIGNIFICANT CYBER THREATS PREVALENT IN THE GCC REGION

TABLE 5 SIGNIFICANT TECHNOLOGICAL SOLUTION AND KEY DEVELOPMENT IN THE GCC REGION

TABLE 6 PARTNERSHIPS, COLLABORATIONS AND AGREEMENTS IN THE GCC CYBER SECURITY MARKET

TABLE 7 PRODUCT LAUNCH IN THE GCC CYBER ECURITY MARKET

TABLE 8 ACQUISITIONS IN THE GCC CYBER SECURITY MARKET

TABLE 9 BUSINESS EXPANSION IN THE GCC CYBER SECURITY MARKET

TABLE 10 BUYERS AND SUPPLIERS IN GCC CYBER SECURITY MARKET

TABLE 11 KEY FACTORS CONSIDERED FOR THREAT FROM NEW ENTRANTS: GCC CYBER SECURITY MARKET

TABLE 12 KEY FACTORS AFFECTING BARGAINING POWER OF BUYERS: GCC CYBER SECURITY MARKET

TABLE 13 KEY FACTORS AFFECTING THE BARGAINING POWER OF SUPPLIERS: GCC CYBER SECURITY MARKET

TABLE 14 KEY FACTORS AFFECTING THREAT OF SUBSTITUTE PRODUCTS OR SERVICES: GCC CYBER SECURITY MARKET

TABLE 15 KEY FACTORS DETERMINING RIVALRY AMONG EXISTING FIRMS: GCC CYBER SECURITY MARKET

TABLE 16 KEY LAWS AND REGULATORY BODY: GCC CYBER SECURITY

TABLE 17 SOME KEY PLAYER’S PATENTS IN THE CYBER SECURITY MARKET

TABLE 18 KEY STANDARDS FOR CYBER SECURITY MARKET IN THE GULF REGION

TABLE 19 GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS AND SERVICES ($BILLION), 2015-2022

TABLE 20 MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SOLUTIONS

TABLE 21 GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($MILLION), 2015-2022

TABLE 22 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE APPLICATION VERTICALS ($MILLION), 2015-2022

TABLE 23 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN GCC COUNTRIES ($MILLION), 2015-2022

TABLE 24 SIGNIFICANT DEVELOPMENTS: NETWORK SECURITY IN GCC REGION

TABLE 25 SIGNIFICANT DEVELOPMENTS: ENDPOINT SECURITY IN THE GCC REGION

TABLE 26 SIGNIFICANT DEVELOPMENTS: CONTENT SECURITY IN THE GCC REGION

TABLE 27 SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION

TABLE 28 SIGNIFICANT DEVELOPMENTS: INDUSTRIAL CONTROL SECURITY IN THE GCC REGION

TABLE 29 SIGNIFICANT DEVELOPMENTS: APPLICATION SECURITY IN THE GCC REGION

TABLE 30 MARKETING ENGINEERING AND ESTIMATION FOR GCC CYBER SECURITY: CONSIDERATIONS AND CROSS MAPPING FOR SERVICES

TABLE 31 GCC CYBER SECURITY MARKET VALUE BY SERVICES ($MILLION), 2015-2022

TABLE 32 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN APPLICATION VERTICALS ($MILLION), 2015-2022

TABLE 33 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN GCC COUNTRIES ($MILLION), 2015-2022

TABLE 34 SIGNIFICANT DEVELOPMENTS: CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION

TABLE 35 SIGNIFICANT DEVELOPMENTS: CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION

TABLE 36 SIGNIFICANT DEVELOPMENTS: CYBER SECURITY INTEGRATION AND DESIGN SERVICES IN THE

GCC REGION

TABLE 37 CYBER SECURITY TRAINING SERVICES IN THE GCC REGION: SIGNIFICANT DEVELOPMENTS

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 6: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

TABLE 38 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS ($MILLION), 2015-2022

TABLE 39 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE BFSI APPLICATION VERTICAL ($MILLION), 2015-2022

TABLE 40 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($ MILLION), 2015-2022

TABLE 41 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE BFSI DOMAIN ($MILLION), 2015-2022

TABLE 42 GCC CYBER SECURITY MARKET VALUE OF BFSI APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022

TABLE 43 GCC CYBER SECURITY BY BANKING AND FINANCIAL SECTOR: SIGNIFICANT DEVELOPMENTS

TABLE 44 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE AEROSPACE AND DEFENCE APPLICATION VERTICAL ($MILLION), 2015-2022

TABLE 45 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE BFSI DOMAIN ($MILLION), 2015-2022

TABLE 46 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE AEROSPACE AND DEFENCE DOMAIN ($MILLION), 2015-2022

TABLE 47 GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022

TABLE 48 GCC CYBER SECURITY BY AEROSPACE AND DEFENCE SECTOR: KEY DEVELOPMENTS

TABLE 49 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE HEALTHCARE

APPLICATION VERTICAL ($MILLION), 2015-2022

TABLE 50 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022

TABLE 51 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE HEALTHCARE DOMAIN ($MILLION), 2015-2022

TABLE 52 GCC CYBER SECURITY MARKET VALUE OF AEROSPACE AND DEFENCE APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022

TABLE 53 GCC CYBER SECURITY BY HEALTHCARE SECTOR: SIGNIFICANT DEVELOPMENTS

TABLE 54 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE TELECOMMUNICATION APPLICATION VERTICAL ($MILLION), 2015-2022

TABLE 55 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE TELECOMMUNICATION DOMAIN

($MILLION), 2015-2022

TABLE 56 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE TELECOMMUNICATION DOMAIN ($MILLION), 2015-2022

TABLE 57 GCC CYBER SECURITY MARKET VALUE OF TELECOMMUNICATION APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022

TABLE 58 GCC CYBER SECURITY BY TELECOMMUNICATION SECTOR: SIGNIFICANT DEVELOPMENTS

TABLE 59 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE MANUFACTURING APPLICATION VERTICAL ($MILLION), 2015-2022

TABLE 60 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022

TABLE 61 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN THE MANUFACTURING DOMAIN ($MILLION), 2015-2022

TABLE 62 GCC CYBER SECURITY MARKET VALUE OF MANUFACTURING APPLICATION VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022

TABLE 63 GCC CYBER SECURITY BY MANUFACTURING SECTOR: KEY DEVELOPMENTS

TABLE 64 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION),

2015-2022

TABLE 65 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICALS ($MILLION), 2015-2022

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 7: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

TABLE 66 GCC CYBER SECURITY MARKET VALUE OF SERVICES IN OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL ($MILLION), 2015-2022

TABLE 67 GCC CYBER SECURITY MARKET VALUE OF OTHER APPLICATION (RETAIL, LOGISTICS, TRANSPORTATION, AMONG OTHERS) VERTICAL BY GCC COUNTRIES ($MILLION), 2015-2022

TABLE 68 GCC CYBER SECURITY MARKET VALUE BY COUNTRIES ($MILLION), 2015-2022

TABLE 69 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN THE U.A.E ($MILLION),

2015-2022

TABLE 70 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN THE U.A.E ($MILLION),2015-2022

TABLE 71 SIGNIFICANT CYBER ATTACKS IN THE U.A.E

TABLE 72 U.A.E CYBER SECURITY REGULATORY BODY AND LAWS ILLUSTRATION

TABLE 73 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN THE UAE

TABLE 74 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN SAUDI ARABIA ($MILLION), 2015-2022

TABLE 75 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN SAUDI ARABIA ($MILLION), 2015-2022

TABLE 76 SIGNIFICANT CYBER ATTACKS/THREATS IN SAUDI ARABIA

TABLE 77 SAUDI ARABIA CYBER SECURITY LAW ILLUSTRATION

TABLE 78 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN SAUDI ARABIA

TABLE 79 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN QATAR ($MILLION),2015-2022

TABLE 80 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN QATAR ($MILLION),2015-2022

TABLE 81 SIGNIFICANT CYBER ATTACKS/THREATS IN QATAR

TABLE 82 QATAR CYBER SECURITY REGULATORY BODY AND LAWS ILLUSTRATION

TABLE 83 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN QATAR

TABLE 84 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN KUWAIT ($MILLION),2015-2022

TABLE 85 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN KUWAIT ($MILLION),2015-2022

TABLE 86 SIGNIFICANT CYBER ATTACKS/THREATS IN KUWAIT

TABLE 87 KUWAIT CYBER SECURITY LAW ILLUSTRATION

TABLE 88 CYBER SECURITY SIGNIFICANT DEVELOPMENTS IN KUWAIT

TABLE 89 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN BAHRAIN ($MILLION),

2015-2022

TABLE 90 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN BAHRAIN ($MILLION),2015-2022

TABLE 91 SIGNIFICANT CYBER ATTACKS/THREATS IN BAHRAIN

TABLE 92 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN BAHRAIN

TABLE 93 GCC CYBER SECURITY MARKET VALUE OF SOLUTIONS AND SERVICES IN OMAN ($MILLION),2015-2022

TABLE 94 GCC CYBER SECURITY MARKET VALUE BY APPLICATION VERTICALS IN OMAN ($MILLION),2015-2022

TABLE 95 SIGNIFICANT CYBER ATTACKS/THREATS IN OMAN

TABLE 96 ILLUSTRATION OF OMAN CYBER SECURITY LAW

TABLE 97 SIGNIFICANT CYBER SECURITY DEVELOPMENTS IN OMAN

TABLE 98 CISCO CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 24, 2015 ($BILLION)

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 8: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

TABLE 99 CISCO CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2015)

TABLE 100 MCAFEE CORPORATION: OVERALL FINANCIALS, TILL OCTOBER 13, 2015 ($MILLION)

TABLE 101 MCAFEE CORPORATION: KEY DEVELOPMENTS AND STRATEGIES (2013-2015)

TABLE 102 CASSIDIAN CYBER SECURITY COMPANY: KEY DEVELOPMENTS AND STRATEGIES (2012-2014)

TABLE 103 BOOZ ALLEN HAMILTON: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION)

TABLE 104 BOOZ ALLEN HAMILTON CORPORTION: KEY DEVELOPMENTS AND STRATEGIES (2012-2014)

TABLE 105 COMPUTER SCIENCE CORPORATION: OVERALL FINANCIALS, TILL SEPTEMBER 30, 2015 ($BILLION)

TABLE 106 COMPUTER SCIENCE CORPORATION (CSC): KEY DEVELOPMENTS AND STRATEGIES (2013-2015)

List of Figures

FIGURE 1 GCC CYBER SECURITY MARKET SIZE SNAPSHOT

FIGURE 2 GCC CYBER SECURITY MARKET SHARE BY SOLUTIONS AND SERVICES 2015 (%)

FIGURE 3 GCC CYBER SECURITY MARKET VALUE BY SOLUTIONS ($BILLION), 2015-2022

FIGURE 4 GCC CYBER SECURITY MARKET SHARE BY SERVICES , 2015-2022

FIGURE 5 GCC CYBER SECURITY MARKET SHARE BY APPLICATION VERTICAL, 2015-2022

FIGURE 6 GCC CYBER SECURITY MARKET BY COUNTRIES, 2015-2022

FIGURE 7 REPORT COVERAGE SNAPSHOT: GCC CYBER SECURITY MARKET

FIGURE 8 MARKET CLASSIFICATION

FIGURE 9 KEY ELEMENTS CONSIDERED FOR DETAILED ANALYSIS OF EACH CLASSIFICATION IN THE GCC CYBER SECURITY MARKET

FIGURE 10 GCC CYBER SECURITY: MARKET SEGMENTATION BY SOLUTIONS

FIGURE 11 GCC CYBER SECURITY: MARKET SEGMENTATION BY SERVICES

FIGURE 12 GCC CYBER SECURITY: MARKET SEGMENTATION BY APPLICATION VERTICALS

FIGURE 13 GCC CYBER SECURITY: MARKET SEGMENTATION BY COUNTRIES

FIGURE 14 KEY STAKEHOLDERS

FIGURE 15 RESEARCH FLOW

FIGURE 16 DEMAND SIDE FACTORS

FIGURE 17 SUPPLY SIDE FACTORS

FIGURE 18 PARAMETERS

FIGURE 19 DATA POINTS FROM SECONDARY SOURCES

FIGURE 20 DATA POINTS FROM PRIMARY SOURCES

FIGURE 21 DATA TRIANGULATION

FIGURE 22 BOTTOM UP APPROACH

FIGURE 23 TOP DOWN APPROACH

FIGURE 24 YEARS CONSIDERED

FIGURE 25 MARKET OVERVIEW: KEY ELEMENTS COVERED

FIGURE 26 HISTORY OF SIGNIFICANT CYBER ATTACKS

FIGURE 27 CYBER SECURITY BENEFITS IN THE GCC REGION

FIGURE 28 MARKET DYNAMICS

FIGURE 29 KEY DRIVERS FOR THE GCC CYBER SECURITY MARKET

FIGURE 30 MARKET DRIVERS: IMPACT ANALYSIS

FIGURE 31 GOVERNMENT INITIATIVES FOR CYBER SECURITY IN THE GCC REGION

FIGURE 32 MARKET CHALLENGE IMPACT ANALYSIS

FIGURE 33 SKILL GAPS

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 9: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

FIGURE 34 GCC CYBER SECURITY MARKET OPPORTUNITIES

FIGURE 35 MARKET OPPORTUNITIES IMPACT ANALYSIS

FIGURE 36 COMPETITIVE OVERVIEW: GCC CYBER SECURITY MARKET

FIGURE 37 KEY MARKET DEVELOPMENT STRATEGIES

FIGURE 38 KEY TRENDS: GCC CYBER SECURITY MARKET

FIGURE 39 KEY PLAYERS IN PARTNERSHIP, COLLABORATION AND AGREEMENTS

FIGURE 40 KEY PLAYERS IN PRODUCT LAUNCH IN THE GCC CYBER SECURITY MARKET

FIGURE 41 KEY PLAYERS IN THE ACQUISITION IN THE GCC CYBER SECURITY MARKET

FIGURE 42 KEY PLAYERS IN THE GCC CYBER SECURITY MARKET

FIGURE 43 PORTER FIVE FORCES ANALYSIS FRAMEWORK

FIGURE 44 IMPACT OF EACH PORTER’S FIVE FORCES ON THE GCC CYBER SECURITY MARKET

FIGURE 45 VALUE CHAIN

FIGURE 46 GCC CYBER SECURITY MARKET BY SOLUTIONS AND SERVICES: SECTION COVERAGE

FIGURE 47 SOLUTIONS AND SERVICES: STATISTICAL COVERAGE

FIGURE 48 GCC CYBER SECURITY MARKET BY SOLUTIONS

FIGURE 49 NETWORK SECURITY COMPONENTS

FIGURE 50 NETWORK SECURITY IN THE GCC REGION: KEY FACTS

FIGURE 51 SOME KEY NETWORK SECURITY VENDORS: GCC REGION

FIGURE 52 ENDPOINT SECURITY: SNAPSHOT

FIGURE 53 KEY ELEMENTS IN THE ENDPOINT SECURITY MANAGEMENT

FIGURE 54 KEY FACTS: ENDPOINT SECURITY IN THE GCC REGION

FIGURE 55 KEY ENDPOINT SECURITY VENDORS: GCC REGION

FIGURE 56 PROCESS OF CROSS SITE SCRIPTING ATTACK

FIGURE 57 CONTENT SECURITY IN THE GCC REGION: KEY FACTS

FIGURE 58 KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION

FIGURE 59 APPLICATION SECURITY IMPLEMENTATION IN SDLC

FIGURE 60 APPLICATION SECURITY: KEY ELEMENTS

FIGURE 61 KEY FACTS: APPLICATION SECURITY IN THE GCC REGION

FIGURE 62 KEY CONTENT SECURITY SOLUTION VENDORS: GCC REGION

FIGURE 63 INDUSTRIAL CONTROL SYSTEM TYPES

FIGURE 64 KEY FACTS: INDUSTRIAL CONTROL SYSTEM SECURITY IN THE GCC REGION

FIGURE 65 KEY INDUSTRIAL CONTROL SECURITY SOLUTION VENDORS: GCC REGION

FIGURE 66 CLOUD SECURITY: KEY ELEMENTS

FIGURE 67 CLOUD SECURITY IN THE GCC REGION: KEY FACTS

FIGURE 68 KEY CLOUD SECURITY SOLUTION VENDORS: GCC REGION

FIGURE 69 GCC CYBER SECURITY MARKET BY SERVICES

FIGURE 70 CYBER SECURITY CONSULTING SERVICES: KEY ELEMENTS

FIGURE 71 CYBER SECURITY CONSULTING SERVICES IN THE GCC REGION: KEY FACTS

FIGURE 72 KEY CYBER SECURITY CONSULTING PROVIDERS: GCC REGION

FIGURE 73 RISK ASSESSMENT IN CYBER SECURITY: KEY STEPS

FIGURE 74 CYBER SECURITY RISK ASSESSMENT PROCESS

FIGURE 75 CYBER SECURITY RISK ASSESSMENT SERVICES IN THE GCC REGION: KEY FACTS

FIGURE 76 KEY CYBER SECURITY RISK ASSESSMENT PROVIDERS: GCC REGION

FIGURE 77 INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORK

FIGURE 78 KEY CYBER SECURITY INTEGRATION AND DESIGN SERVICE PROVIDERS: GCC REGION

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 10: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

FIGURE 79 CYBER SECURITY TRAINING AND EDUCATION SERVICES: KEY ELEMENTS

FIGURE 80 KEY FACTS: CYBER SECURITY TRAINING SERVICES IN THE GULF REGION

FIGURE 81 KEY PLAYERS: CYBER SECURITY TRAIINING AND EDUCATION SERVICE PROVIDER IN THE GCC REGION

FIGURE 82 OTHER CYBER SECURITY SERVICES

FIGURE 83 GCC CYBER SECURITY MARKET SEGMENTATION BY APPLICATION VERTICALS

FIGURE 84 APPLICATION VERTICALS: STATISTICAL COVERAGE

FIGURE 85 BANKING MALWARE: GCC REGION

FIGURE 86 BFSI SECTOR KEY FACTS RELATED TO GCC CYBER SECURITY MARKET

FIGURE 87 CYBER ATTACKS: BANKING AND FINANCIAL SECTOR IN THE GCC REGION

FIGURE 88 KEY CYBER SECURITY PLAYERS IN THE BANKING AND FINANCIAL SECTOR IN THE GCC REGION

FIGURE 89 KEY CYBER SECURITY ELEMENTS: AEROSPACE AND DEFENCE SECTOR

FIGURE 90 KEY CYBER SECURITY PLAYERS IN THE AEROSPACE AND DEFENCE SECTOR IN THE GCC REGION

FIGURE 91 HEALTHCARE SECTOR SIGNIFICANT FACTS FOR THE GCC CYBER SECURITY MARKET

FIGURE 92 KEY CYBER SECURITY PLAYERS IN THE HEALTHCARE SECTOR IN THE GCC REGION

FIGURE 93 KEY FACTS RELATED TO TELECOMMUNICATIONS SECTOR FOR THE GCC CYBER SECURITY MARKET

FIGURE 94 KEY CYBER SECURITY PLAYERS IN THE TELECOMMUNICATION SECTOR IN THE GCC REGION

FIGURE 95 KEY CYBER SECURITY PLAYERS IN THE MANUFACTURING SECTOR IN THE GCC REGION

FIGURE 96 GCC REGION: COUNTRIES

FIGURE 97 GCC CYBER SECURITY MARKET: COUNTRIES SECTION COVERAGE

FIGURE 98 GCC COUNTRY ANALYSIS: STATISTICAL COVERAGE

FIGURE 99 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN THE UAE

FIGURE 100 KEY CYBER SECURITY PLAYERS IN THE U.A.E

FIGURE 101 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN THE U.A.E

FIGURE 102 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN SAUDI ARABIA

FIGURE 103 KEY CYBER SECURITY PLAYERS IN SAUDI ARABIA

FIGURE 104 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN SAUDI ARABIA

FIGURE 105 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN QATAR

FIGURE 106 KEY CYBER SECURITY PLAYERS IN QATAR

FIGURE 107 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN QATAR

FIGURE 108 POTENTIAL FACTS FOR CYBER SECURITY MARKET IN KUWAIT

FIGURE 109 KEY CYBER SECURITY PLAYERS IN KUWAIT

FIGURE 110 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN KUWAIT

FIGURE 111 POTENTIAL FACTS FOR CYBER SECURITY IN BAHRAIN

FIGURE 112 KEY CYBER SECURITY PLAYERS IN BAHRAIN

FIGURE 113 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN BAHRAIN

FIGURE 114 POTENTIAL FACTS FOR CYBER SECURITY IN OMAN

FIGURE 115 KEY CYBER SECURITY PLAYERS IN OMAN

FIGURE 116 KEY FACTORS DRIVING THE CYBER SECURITY MARKET IN OMAN

FIGURE 117 CISCO CORPORATION: OVERALL FINANCIALS, 2013-2015 ($BILLION)

FIGURE 118 NET REVENUE BY PRODUCTS AND SERVICES

FIGURE 119 MCAFEE CORPORATION: OVERALL FINANCIALS, 2012-2014 ($MILLION)

FIGURE 120 FORTINET INC: OVERALL REVENUE, 2012-2014 ($MILLION)

FIGURE 121 FORTINET INC: TOTAL REVENE BY REGION ($MILLION)

GCC Cyber Security Market – Estimation & Forecast, 2016–2022

Page 11: Brochure: GCC Cyber Security Market – Estimation & Forecast, 2016–2022

www.bisresearch.com ©2015|BIS

FIGURE 122 TREND MICRO CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION)

FIGURE 123 BOOZ ALLEN HAMILTON CORPORATION: OVERALL FINANCIALS, 2012-2014 ($BILLION)

FIGURE 124 COMPUTER SCIENCE CORPORATION (CSC): OVERALL FINANCIALS, 2013-2015 ($BILLION)

FIGURE 125 FIREEYE CORPORATION: OVERALL REVENUE, 2012-2014 ($MILLION)

FIGURE 126 SYMANTEC CORPORATION: OVERALL REVENUE, 2013-2015 ($BILLION)

About BIS (www.bisresearch.com)

BIS Research provides valuable market intelligence to an exclusive group of customers in response to orders. The report is licensed for

the customer's internal use only and is subject to restrictions set henceforth. This document and its contents are confidential and may not

be further distributed, published or reproduced, in whole or in part, by any medium or in any form for any purpose, without the express

written consent of BIS Research. Customer will not disclose the contents of the report, whether directly in any media or indirectly through

incorporation in a database, marketing list, report or otherwise, or use or permit the use of Information to generate any statistical or other

information that is or will be provided to third parties; or voluntarily produce Information in legal proceedings.

Market reports are based on expectations, estimates and projections as of the date such information is available. Any recommendation

contained in this report may not be suitable for all investors or businesses. The market conclusions drawn are necessarily based upon a

number of estimates and assumptions that, while considered reasonable by BIS Research as of the date of such statements, are

inherently subject to market fluctuations and business, economic and competitive uncertainties and contingencies

BIS Research

9100 West Bloomington Freeway,

Suite 159 Bloomington,

MN 55431

E-mail : [email protected]

Call Us : +1-650-228-0182

Global Delivery Center

A-21, Kailash Colony,

New Delhi,

India

Tel : +91 11 46120391

For more details regarding permission, please contact us:

GCC Cyber Security Market – Estimation & Forecast, 2016–2022