0 CHECKOUT

PRODUCT FILTERS

REGION

432
69
54
53
49

COUNTRY

44
11
10
8
7

CATEGORIES

  • 158
  • 95
  • 79
  • 56
  • 51
  • 34
  • 25
  • 24
  • 22
  • 21
  • 20
  • 19
  • 13
  • 12
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • 9
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
SHOW ALL

PRICE

138
183
269
776

PUBLISHED

15
60
276
776

PRODUCT TYPE

640
89
19
10
7
6
3
1
1

Search for: "Microsoft's security strategy"

776 Products

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

Published:  March 2015
Price:  From

Global Mobile Security Market 2014-2018

About Mobile Security The protection of smartphones, tablets, laptops, and the networks they connect to from threats and vulnerabilities associated with wireless computing is known as mobile security....

Published:  January 2015
Price:  From

Global Internet Security Market (Products & Services, Technology, Application and Geography) - Size, Share, Global Trends, Company Profiles, Analysis, Segmentation and Forecast, 2013 - 2020

The internet, in its essence has come a long way and has been constantly evolving in its approach to the consumers. The world, today, is inevitably attached to the internet with online networking. Organizations...

Published:  November 2014
Price:  From

Global Mobile Security Market (Solution, Types, OS, End Users and Geography) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2014 - 2020

Advancement in the mobile device (smartphone, tablet and laptops) market have been occurring at a rapid pace–whether in storage, performance, application, capability or internet connectivity. However...

Published:  February 2015
Price:  From

Global Security Software Market 2015-2019

About Security Software Security software comprise a suite of security products. Their scope encompasses several areas such as data protection, compliance, architecture, email security, web security,...

Published:  March 2015
Price:  From

Global Enterprise IT Security Market 2015-2019

Enterprise IT security focuses on the security of key parameters such as data protection, compliance, architecture, email and web security, governance, data loss prevention, and identity and access....

Published:  May 2015
Price:  From

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Mobile networks around the globe generate more than 86 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  April 2014
Price:  From

Microsoft Operating System, Application, And Transaction System Strategies, Forecasts 1998-2003

Microsoft stands at the center of the convergence of voice and data communications. Microsoft’s success has been achieved by hiding complexity from the user and permitting users to solve issues intuitively....

Published:  January 1998
Price:  From

Global Endpoint Security Market 2015-2019

About Endpoint Security Endpoint security is a methodology that helps protect corporate networks when they are accessed remotely through laptops, tablets, and smartphones. Endpoint security solutions...

Published:  February 2015
Price:  From

Cyber Security - Global Strategic Business Report

This report analyzes the worldwide markets for Cyber Security in US$ Million by the following Product Segments: Application Security, Content Security, Endpoint Security, Network Security, Services,...

Published:  June 2014
Price:  From

Global Content Security Gateway Market 2015-2019

About Content Security Gateway Content security gateway prevents unwanted network traffic before it enters an organization's network and prevents unauthorised personnel from gaining access. They provide...

Published:  July 2015
Price:  From

IT Security Software Markets in China

China's demand for IT Security Software has grown at a fast pace in the past decade. In the next decade, both production and demand will continue to grow. The Chinese economy maintains a high speed...

Published:  August 2015
Price:  From

The Mobile Device & Network Security Bible: 2013 - 2020

Mobile networks around the globe generate more than 50 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  September 2013
Price:  From
The Mobile Device & Network Security Bible: 2013 - 2020 The Mobile Device & Network Security Bible: 2013 - 2020 - Product Thumbnail Image

Endpoint Security Market (Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption) - Global Advancements, Forecasts & Analysis (2014 - 2019)

'Endpoint Security Market [Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption] - Global Advancements,...

Published:  March 2014
Price:  From

WebCams, Market Shares, Strategies, and Forecasts, Worldwide, 2015 to 2021

Next generation webcams multifunction webcams are very sophisticated, they can do facial recognition, they are used in security systems, and for on line education. They are used for 3D mapping, commercial...

Published:  August 2015
Price:  From

Global Security Services Market 2015-2019

About Security Services Security services focus on the security of key parameters such as data protection, compliance, architecture, email and web security, governance, data loss prevention, and identity...

Published:  May 2015
Price:  From

Global Email Security Market 2015-2019

About Email Security Email security refers to the collective measures taken by organizations for securing access to one or more email accounts. Different techniques are used to detect, monitor, report,...

Published:  April 2015
Price:  From

Global Security Testing Market 2015-2019

About Security Testing Companies around the world are witnessing unprecedented dependence on technology to run their business and drive revenue growth. With more and more business functions being...

Published:  April 2015
Price:  From

Information Security Products and Services - Global Strategic Business Report

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware,...

Published:  July 2014
Price:  From

Client Based Office Utility Market Shares, Strategies, and Forecasts, Worldwide, 2010 to 2016

Client Office Productivity Software Market Shares and Forecasts, Worldwide, 2010-2016 Office software is useful as a way to implement automated process for any task relating to writing, calculating,...

Published:  July 2010
Price:  From
Loading Indicator

Our Clients

  • Intel Corporation
  • Autodesk, Inc.
  • Hewlett-Packard Company
  • Ahlstrom Corporation
  • SAP SE
  • 3M Company
  • Samsung Group Ltd.