+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

AI in Cyber Security Market Research Report: By Offering, Deployment Type, Technology, Security Type, Application, End User - Global Industry Analysis and Growth Forecast to 2030

  • PDF Icon

    Report

  • 242 Pages
  • August 2020
  • Region: Global
  • Prescient & Strategic Intelligence Private Limited
  • ID: 5184623
The number of malicious attacks and cyber frauds have risen considerably across the globe, which can be attributed to the surging penetration on internet and increasing utilization of cloud solutions. Cyber frauds, including payment and identity card thefts, account for more than 55% of all cybercrimes and lead to major losses for organizations, if they are not mitigated. Owing to this, businesses these days are adopting advanced solutions for dealing with cybercrimes in a quick and efficient way.

This is further resulting in the growth of the global AI in cyber security market. AI-based solutions are capable of combating cyber frauds by reducing response time, identifying threats, refining techniques for distinguishing attacks that need immediate attention. The number of cyber-attacks has also been growing because of the surging adoption of the BYOD policy all over the world. It has been observed that the policy aids in increasing productivity and further enhances employee satisfaction.

That being said, it also makes important company information and data vulnerable to cyber-attacks. Devices of employees have wide-ranging capabilities and IT departments are often not able to fully quality, evaluate, and approve each and every devices, which can pose high security threat to confidential data. AI provides advanced protection via the machine learning technology, and hence offers complete endpoint security. The utilization of AI can efficiently aid in mitigating security threats and preventing attacks.

The AI in cyber security market is projected to generate a revenue of $101.8 billion in 2030, increasing from $8.6 billion in 2019, progressing at a 25.7% CAGR during the forecast period (2020–2030). The market is categorized into threat intelligence, fraud detection/anti-fraud, security & vulnerability management, data loss prevention (DLP), identity & access management, intrusion detection/prevention system, antivirus/antimalware, unified threat management, and risk & compliance management, on the basis of application. The DLP category is expected to advance at the fastest pace during the forecast period.

DLP plays a significant role in monitoring, identifying, and protecting the data in storage and in motion over the network. Certain specific data security policies are formulated in each organization and it is mandatory for the IT personnel to strictly follow them. DLP systems are majorly utilized for enforcing data security policies in order to prevent unauthorized usage or access to confidential data. The fraud detection/anti-fraud category accounted for the major share of the market in 2019 and is predicted to dominate the market during the forecast period as well.

Geographically, the AI in cyber security market was led by North America in 2019, as stated by a the publisher report. A large number of companies are deploying cyber security solutions in the region, owing to the surging number of cyber-attacks. Moreover, the presence of established players and high digitization rate are also leading to the growth of regional domain. The Asia-Pacific region is expected to progress at the fastest pace during the forecast period.

In conclusion, the market is growing due to the increasing number of cybercrimes across the globe and rising adoption of the BYOD policy.

Table of Contents

Chapter 1. Research Background
1.1 Research Objectives
1.2 Market Definition
1.3 Research Scope
1.3.1 Market Segmentation by Offering
1.3.2 Market Segmentation by Deployment Type
1.3.3 Market Segmentation by Technology
1.3.4 Market Segmentation by Security Type
1.3.5 Market Segmentation by Application
1.3.6 Market Segmentation by End User
1.3.7 Market Segmentation by Geography
1.3.8 Analysis Period
1.3.9 Market Data Reporting Unit
1.3.9.1 Value
1.4 Key Stakeholders
Chapter 2. Research Methodology
2.1 Secondary Research
2.1.1 Paid
2.1.2 Unpaid
2.2 Primary Research
2.2.1 Breakdown of Primary Research Respondents
2.2.1.1 By Region
2.2.1.2 By industry Participant
2.2.1.3 By company Type
2.3 Market Size Estimation
2.4 Data Triangulation
2.5 Currency Conversion Rates
2.6 Assumptions for the Study
Chapter 3. Executive Summary
3.1 Voice of Industry Experts/KOLs
Chapter 4. Introduction
4.1 Definition of Market Segments
4.1.1 By Deployment Type
4.1.1.1 Cloud
4.1.1.2 On-premises
4.1.2 By Offering
4.1.2.1 Hardware
4.1.2.2 Software
4.1.2.3 Services
4.1.3 By Technology
4.1.3.1 ML
4.1.3.2 NLP
4.1.3.3 Context-aware computing
4.1.4 By Security Type
4.1.4.1 Network security
4.1.4.2 Data security
4.1.4.3 Identity and access security
4.1.4.4 Cloud security
4.1.4.5 Others
4.1.5 By Application
4.1.5.1 IAM
4.1.5.2 Risk & compliance management
4.1.5.3 DLP
4.1.5.4 UTM
4.1.5.5 Security & vulnerability management
4.1.5.6 Antivirus/Antimalware
4.1.5.7 Fraud detection/anti-fraud
4.1.5.8 Intrusion detection/prevention system
4.1.5.9 Threat intelligence
4.1.5.10 Others
4.1.6 By End User
4.1.6.1 BFSI
4.1.6.2 Retail
4.1.6.3 IT & telecom
4.1.6.4 Healthcare
4.1.6.5 Manufacturing
4.1.6.6 Government & defense
4.1.6.7 Automotive & transportation
4.1.6.8 Others
4.2 Value Chain Analysis
4.2.1 Value Chain Analysis of AI in Cyber Security Market
4.3 Market Dynamics
4.3.1 Trends
4.3.1.1 Rising adoption of chatbots to combat cyberattacks
4.3.1.2 Growing usage of cloud in cyber security
4.3.2 Drivers
4.3.2.1 Increasing number of cyber frauds and malicious attacks
4.3.2.2 Adoption of BYOD Policy
4.3.2.3 Growing adoption of IoT and increasing number of connected devices
4.3.2.4 Impact analysis of drivers on market forecast
4.3.3 Restraints
4.3.3.1 Lack of interoperability with existing IoT systems
4.3.3.2 High complexity and lack of skilled personnel
4.3.3.3 Impact analysis of restraints on market forecast
4.3.4 Opportunities
4.3.4.1 Growing Need for Cloud-Based Security Solutions among SMEs
4.3.4.2 Emergence of super intelligent AI in cyber security
4.4 Impact of COVID-19 on Global AI in cyber security market
4.4.1 Impact of COVID-19 on Cyber Security
4.4.1.1 Current Scenario
4.4.1.2 COVID-19 Scenario
4.4.1.3 Factors Affecting Positive Market Growth
4.4.1.4 Future Scenario
4.5 Porter’s Five Forces Analysis
4.5.1 Bargaining Power of Buyers
4.5.2 Bargaining Power of Suppliers
4.5.3 Intensity of Rivalry
4.5.4 Threat of New Entrants
4.5.5 Threat of Substitutes
Chapter 5. Global Market Size and Forecast
5.1 By Offering
5.2 By Deployment Type
5.3 By Technology
5.4 By Security Type
5.5 By Application
5.6 By End User
5.7 By Region
Chapter 6. North America Market Size and Forecast
6.1 By Offering
6.2 By Deployment Type
6.3 By Technology
6.4 By Security Type
6.5 By Application
6.6 By End User
6.7 By Country
Chapter 7. Europe Market Size and Forecast
7.1 By Offering
7.2 By Deployment Type
7.3 By Technology
7.4 By Security Type
7.5 By Application
7.6 By End User
7.7 By Country
Chapter 8. APAC Market Size and Forecast
8.1 By Offering
8.2 By Deployment Type
8.3 By Technology
8.4 By Security Type
8.5 By Application
8.6 By End User
8.7 By Country
Chapter 9. LATAM Market Size and Forecast
9.1 By Offering
9.2 By Deployment Type
9.3 By Technology
9.4 By Security Type
9.5 By Application
9.6 By End User
9.7 By Country
Chapter 10. MEA Market Size and Forecast
10.1 By Offering
10.2 By Deployment Type
10.3 By Technology
10.4 By Security Type
10.5 By Application
10.6 By End User
10.7 By Country
Chapter 11. Major Markets for AI in cyber security
11.1 U.S. AI in Cyber Security Market
11.1.1 By Technology
11.1.2 By End User
11.2 U.K. AI in Cyber Security Market
11.2.1 By Technology
11.2.2 By End User
11.3 Germany AI in Cyber Security Market
11.3.1 By Technology
11.3.2 By End User
11.4 China AI in Cyber Security Market
11.4.1 By Technology
11.4.2 By End User
11.5 Japan AI in Cyber Security Market
11.5.1 By Technology
11.5.2 By End User
11.6 India AI in Cyber Security Market
11.6.1 By Technology
11.6.2 By End User
Chapter 12. Competitive Landscape
12.1 List of Players and Their Offerings
12.2 Competitive Benchmarking of Key Players
12.3 Ranking of Key Market Players
12.4 Strategic Developments in the Market
12.4.1 Mergers and Acquisitions
12.4.2 Product Launches
12.4.3 Partnerships
12.4.4 Client Wins
Chapter 13. Company Profiles
13.1 BAE Systems plc
13.1.1 Business Overview
13.1.2 Product and Service Offerings
13.1.3 Key Financial Summary
13.2 RSA Security LLC
13.2.1 Business Overview
13.2.2 Product and Service Offerings
13.3 IBM Corporation
13.3.1 Business Overview
13.3.2 Product and Service Offerings
13.3.3 Key Financial Summary
13.4 Palo Alto Networks Inc.
13.4.1 Business Overview
13.4.2 Product and Service Offerings
13.4.3 Key Financial Summary
13.5 Fortinet Inc.
13.5.1 Business Overview
13.5.2 Product and Service Offerings
13.5.3 Key Financial Summary
13.6 FireEye Inc.
13.6.1 Business Overview
13.6.2 Product and Service Offerings
13.6.3 Key Financial Summary
13.7 Check Point Software Technologies Ltd.
13.7.1 Business Overview
13.7.2 Product and Service Offerings
13.7.3 Key Financial Summary
13.8 Cisco Systems Inc.
13.8.1 Business Overview
13.8.2 Product and Service Offerings
13.8.3 Key Financial Summary
13.9 Juniper Network Inc.
13.9.1 Business Overview
13.9.2 Product and Service Offerings
13.9.3 Key Financial Summary
13.10 Acalvio Technologies Inc.
13.10.1 Business Overview
13.10.2 Product and Service Offerings
13.11 Darktrace Limited
13.11.1 Business Overview
13.11.2 Product and Service Offerings
13.12 Amazon Web Services Inc.
13.12.1 Business Overview
13.12.2 Product and Service Offerings
13.13 NVIDIA Corporation
13.13.1 Business Overview
13.13.2 Product and Service Offerings
13.13.3 Key Financial Summary
13.14 Cylance Inc.
13.14.1 Business Overview
13.14.2 Product and Service Offerings
13.15 Securonix Inc.
13.15.1 Business Overview
13.15.2 Product and Service Offerings
Chapter 14. Appendix
14.1 Abbreviations
14.2 Sources and References
14.3 Related Reports
List of Tables
TABLE 1 ANALYSIS PERIOD OF THE STUDY
TABLE 2 DRIVERS FOR THE MARKET: IMPACT ANALYSIS
TABLE 3 RESTRAINTS FOR THE MARKET: IMPACT ANALYSIS
TABLE 4 COVID-19 IMPACT ANALYSIS ON DIFFERENT SECTORS
TABLE 5 GLOBAL AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2019)
TABLE 6 GLOBAL AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2020-2030)
TABLE 7 GLOBAL AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2019)
TABLE 8 GLOBAL AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2020-2030)
TABLE 9 GLOBAL AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 10 GLOBAL AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 11 GLOBAL AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
TABLE 12 GLOBAL AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
TABLE 13 GLOBAL AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2019)
TABLE 14 GLOBAL AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2020-2030)
TABLE 15 GLOBAL AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 16 GLOBAL AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 17 GLOBAL AI IN CYBER SECURITY MARKET, BY REGION, $M (2014-2019)
TABLE 18 GLOBAL AI IN CYBER SECURITY MARKET, BY REGION, $M (2020-2030)
TABLE 19 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2019)
TABLE 20 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2020-2030)
TABLE 21 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2019)
TABLE 22 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2020-2030)
TABLE 23 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 24 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 25 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
TABLE 26 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
TABLE 27 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2019)
TABLE 28 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2020-2030)
TABLE 29 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 30 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 31 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
TABLE 32 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
TABLE 33 EUROPE AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2019)
TABLE 34 EUROPE AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2020-2030)
TABLE 35 EUROPE AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2019)
TABLE 36 EUROPE AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2020-2030)
TABLE 37 EUROPE AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 38 EUROPE AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 39 EUROPE AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
TABLE 40 EUROPE AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
TABLE 41 EUROPE AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2019)
TABLE 42 EUROPE AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2020-2030)
TABLE 43 EUROPE AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 44 EUROPE AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 45 EUROPE AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
TABLE 46 EUROPE AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
TABLE 47 APAC AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2019)
TABLE 48 APAC AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2020-2030)
TABLE 49 APAC AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2019)
TABLE 50 APAC AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2020-2030)
TABLE 51 APAC AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 52 APAC AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 53 APAC AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
TABLE 54 APAC AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
TABLE 55 APAC AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2019)
TABLE 56 APAC AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2020-2030)
TABLE 57 APAC AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 58 APAC AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 59 APAC AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
TABLE 60 APAC AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
TABLE 61 LATAM AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2019)
TABLE 62 LATAM AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2020-2030)
TABLE 63 LATAM AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2019)
TABLE 64 LATAM AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2020-2030)
TABLE 65 LATAM AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 66 LATAM AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 67 LATAM AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
TABLE 68 LATAM AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
TABLE 69 LATAM AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2019)
TABLE 70 LATAM AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2020-2030)
TABLE 71 LATAM AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 72 LATAM AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 73 LATAM AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
TABLE 74 LATAM AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
TABLE 75 MEA AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2019)
TABLE 76 MEA AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2020-2030)
TABLE 77 MEA AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2019)
TABLE 78 MEA AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2020-2030)
TABLE 79 MEA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 80 MEA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 81 MEA AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
TABLE 82 MEA AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
TABLE 83 MEA AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2019)
TABLE 84 MEA AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2020-2030)
TABLE 85 MEA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 86 MEA AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 87 MEA AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
TABLE 88 MEA AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
TABLE 89 U.S. AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 90 U.S. AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 91 U.S. AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 92 U.S. AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 93 U.K. AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 94 U.K. AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 95 U.K. AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 96 U.K. AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 97 GERMANY AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 98 GERMANY AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 99 GERMANY AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 100 GERMANY AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 101 CHINA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 102 CHINA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 103 CHINA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 104 CHINA AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 105 JAPAN AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 106 JAPAN AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 107 JAPAN AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 108 JAPAN AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 109 INDIA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2019)
TABLE 110 INDIA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2020-2030)
TABLE 111 INDIA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2019)
TABLE 112 INDIA AI IN CYBER SECURITY MARKET, BY END USER, $M (2020-2030)
TABLE 113 LIST OF PLAYERS AND THEIR OFFERINGS
TABLE 114 COMPETITIVE BENCHMARKING OF KEY PLAYERS
TABLE 115 GLOBAL AI IN CYBER SECURITY MARKET - RANKING OF KEY PLAYERS 2019
TABLE 116 BAE SYSTEMS PLC - AT A GLANCE
TABLE 117 BAE SYSTEMS PLC - KEY FINANCIAL SUMMARY
TABLE 118 RSA SECURITY LLC - AT A GLANCE
TABLE 119 IBM CORPORATION- AT A GLANCE
TABLE 120 IBM CORPORATION - KEY FINANCIAL SUMMARY
TABLE 121 PALO ALTO NETWORKS INC. - AT A GLANCE
TABLE 122 PALO ALTO NETWORK INC. - KEY FINANCIAL SUMMARY
TABLE 123 FORTINET INC. - AT A GLANCE
TABLE 124 FORTINET INC. - KEY FINANCIAL SUMMARY
TABLE 125 FIREEYE INC. - AT A GLANCE
TABLE 126 FIREEYE INC. - KEY FINANCIAL SUMMARY
TABLE 127 CHECK POINT SOFTWARE TECHNOLOGIES LTD. - AT A GLANCE
TABLE 128 CHECK POINT SOFTWARE TECHNOLOGIES LTD. - KEY FINANCIAL SUMMARY
TABLE 129 CISCO SYSTEMS INC. - AT A GLANCE
TABLE 130 CISCO SYSTEMS INC. - KEY FINANCIAL SUMMARY
TABLE 131 JUNIPER NETWORK INC.- AT A GLANCE
TABLE 132 JUNIPER NETWORK INC. - KEY FINANCIAL SUMMARY
TABLE 133 ACALVIO TECHNOLOGIESINC - AT A GLANCE
TABLE 134 DARKTRCAE LIMITED - AT A GLANCE
TABLE 135 AMAZON WEB SERVICES INC. - AT A GLANCE
TABLE 136 NVIDIA CORPORATION - AT A GLANCE
TABLE 137 NVIDIA CORPORATION - KEY FINANCIAL SUMMARY
TABLE 138 CYLANCE INC. - AT A GLANCE
TABLE 139 SECURONIX INC. - AT A GLANCE
List of Figures
FIG 1 RESEARCH SCOPE
FIG 2 RESEARCH METHODOLOGY
FIG 3 BREAKDOWN OF PRIMARY RESEARCH BY REGION
FIG 4 BREAKDOWN OF PRIMARY RESEARCH BY INDUSTRY PARTICIPANT
FIG 5 BREAKDOWN OF PRIMARY RESEARCH BY COMPANY TYPE
FIG 6 DATA TRIANGULATION APPROACH
FIG 7 CURRENCY CONVERSION RATES FOR USD (2019)
FIG 8 GLOBAL AI IN CYBER SECURITY MARKET SUMMARY
FIG 9 STEPS INVOLVED IN NATURAL LANGUAGE UNDERSTANDING
FIG 10 VALUE CHAIN ANALYSIS OF AI IN CYBER SECURITY MARKET
FIG 11 BARGAINING POWER OF BUYERS
FIG 12 BARGAINING POWER OF SUPPLIERS
FIG 13 INTENSITY OF RIVALRY
FIG 14 THREAT OF NEW ENTRANTS
FIG 15 THREAT OF SUBSTITUTES
FIG 16 GLOBAL AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2030)
FIG 17 GLOBAL AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2030)
FIG 18 GLOBAL AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 19 GLOBAL AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
FIG 20 GLOBAL AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2030)
FIG 21 GLOBAL AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 22 WORLDWIDE MAJOR MARKETS FOR AI IN CYBER SECURITY
FIG 23 GLOBAL AI IN CYBER SECURITY MARKET, BY REGION, $M (2014-2030)
FIG 24 NORTH AMERICA AI IN CYBER SECURITY MARKET SNAPSHOT
FIG 25 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2030)
FIG 26 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2030)
FIG 27 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 28 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
FIG 29 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2030)
FIG 30 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 31 NORTH AMERICA AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
FIG 32 EUROPE AI IN CYBER SECURITY MARKET SNAPSHOT
FIG 33 EUROPE AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2030)
FIG 34 EUROPE AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2030)
FIG 35 EUROPE AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 36 EUROPE AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
FIG 37 EUROPE AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2030)
FIG 38 EUROPE AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 39 EUROPE AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
FIG 40 APAC AI IN CYBER SECURITY MARKET SNAPSHOT
FIG 41 APAC AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2030)
FIG 42 APAC AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2030)
FIG 43 APAC AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 44 APAC AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
FIG 45 APAC AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2030)
FIG 46 APAC AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 47 APAC AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
FIG 48 LATAM AI IN CYBER SECURITY MARKET SNAPSHOT
FIG 49 LATAM AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2030)
FIG 50 LATAM AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2030)
FIG 51 LATAM AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 52 LATAM AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
FIG 53 LATAM AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2030)
FIG 54 LATAM AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 55 LATAM AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
FIG 56 MEA AI IN CYBER SECURITY MARKET SNAPSHOT
FIG 57 MEA AI IN CYBER SECURITY MARKET, BY OFFERING, $M (2014-2030)
FIG 58 MEA AI IN CYBER SECURITY MARKET, BY DEPLOYMENT TYPE, $M (2014-2030)
FIG 59 MEA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 60 MEA AI IN CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
FIG 61 MEA AI IN CYBER SECURITY MARKET, BY APPLICATION, $M (2014-2030)
FIG 62 MEA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 63 MEA AI IN CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
FIG 64 U.S. AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 65 U.S. AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 66 U.K. AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 67 U.K. AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 68 GERMANY AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 69 GERMANY AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 70 CHINA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 71 CHINA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 72 JAPAN AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 73 JAPAN AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 74 INDIA AI IN CYBER SECURITY MARKET, BY TECHNOLOGY, $M (2014-2030)
FIG 75 INDIA AI IN CYBER SECURITY MARKET, BY END USER, $M (2014-2030)
FIG 76 BAE SYSTEMS PLC - REVENUE SPLIT BY SEGMENT (2019)
FIG 77 BAE SYSTEMS PLC - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 78 IBM CORPORATION - REVENUE SPLIT BY SEGMENT (2019)
FIG 79 IBM CORPORATION - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 80 PALO ALTO NETWORK INC. - REVENUE SPLIT BY SEGMENT (2019)
FIG 81 PALO ALTO NETWORK INC. - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 82 FORTINET INC. - REVENUE SPLIT BY SEGMENT (2019)
FIG 83 FORTINET INC. - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 84 FIREEYE INC. - REVENUE SPLIT BY SEGMENT (2019)
FIG 85 FIREEYE INC. - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 86 CHECK POINT SOFTWARE TECHNOLGIES LTD. - REVENUE SPLIT BY SEGMENT (2019)
FIG 87 CHECKPOINT SOFTWARE TECHNOLOGIES LTD. - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 88 CISCO SYSTEMS INC. - REVENUE SPLIT BY BUSINESS SEGMENT (2019)
FIG 89 CISCO SYSTEMS INC. - REVENUE SPLIT BY GEOGRAPHY (2019)
FIG 90 JUNIPER NETWORK INC. - REVENUE SPLIT BY SEGMENT (2019)
FIG 91 JUNIPER NETWORK INC. - REVENUE SPLIT BY GEOGRAPHY (2019)

Companies Mentioned

  • BAE Systems plc
  • RSA Security LLC
  • IBM Corporation
  • Palo Alto Networks Inc.
  • Fortinet Inc.
  • FireEye Inc.
  • Check Point Software Technologies Ltd.
  • Cisco Systems Inc.
  • Juniper Network Inc.
  • Acalvio Technologies Inc.
  • Darktrace Limited
  • Amazon Web Services Inc.
  • NVIDIA Corporation
  • Cylance Inc.
  • Securonix Inc.

Methodology

Loading
LOADING...