+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Global Cyber Security Market (2022 Edition) - Analysis By Security (Wireless, Application, Network, End Point, Infrastructure Protection, Others), Deployment, End User, By Region, By Country Market Insights and Forecast with Impact of COVID-19 (2021-2026)

  • ID: 5532627
  • Report
  • January 2022
  • Region: Global
  • 300 Pages
  • Azoth Analytics

FEATURED COMPANIES

  • Broadcom Inc.
  • Check Point
  • Cisco Systems
  • F5 Inc.
  • FireEye
  • Fortinet Group

The Global Cyber Security Market was valued at USD 171.05 billion in the year 2020. The power and threat of malware, including viruses and Trojans, to infiltrate, manipulate, or damage entire electronic information networks have increased significantly. Cyber attackers often use malware to take control of devices or machines to generate a financial gain. Internet security is also gaining traction due to the increase in cyber-crimes across various industries. Moreover, during the COVID-19 pandemic, the incidence of malware attacks on databases of large organizations has increased, which creates a need to strengthen the security of database, thus boosting the cyber security market growth, globally.


Based on End User, the market is segmented into Government & Defense, IT & Telecom, BFSI, Retail, Healthcare and Others. The BFSI segment is expected to grow at a higher CAGR during the forecast period with Government and Defense being the largest end-user in 2020, representing about 25.70% of the Cyber Security market.


North America holds the maximum share in the global Cyber Security Market in 2020. During the forecast period, APAC is set to be the fastest-growing regional market. Furthermore, APAC is seeing great growth as a result of a variety of factors, including the rise of IoT devices and government programs aimed at advanced technical breakthroughs. Some countries in the region, such as China and Japan are rapidly deploying cyber security technologies.


By 2026, wireless security will be the key to the prevention of unwanted users from accessing a particular wireless network. Wireless security helps in detecting, alerting, and preventing wireless networks and sends an alarm to the network administrator in case of any security breach.


Scope of the Report:


  • The report presents the analysis of Cyber Security Market for the historical period of 2016-2020 and the forecast period of 2021-2026.
  • The report analyses the Cyber Security Market by value (USD Million)
  • The report analyses the Cyber Security Market by End User (Government & Defense, IT & Telecom, BFSI, Retail, Healthcare, Others)
  • The report analyses the Cyber Security Market by Security (Wireless Security, Application Security, Network Security, End Point Security, Infrastructure Protection, Others)
  • The report analyses the Cyber Security Market by Deployment (Cloud Based, On-Premises)
  • The key insights of the report have been presented through the frameworks of SWOT and Porter’s Five Forces Analysis. Also, the attractiveness of the market has been presented by region, by End User, by Security.
  • Also, the major opportunities, trends, drivers and challenges of the industry have been analysed in the report.
  • The report tracks competitive developments, strategies, mergers and acquisitions and new product development. The companies analysed in the report include Cisco Systems NortonLifeLock Inc. Fortinet Group Check Point FireEye Juniper Networks Hewlett Packard Enterprise Palo Alto Networks F5, Inc. Broadcom Inc.

Key Target Audience:


  • Cyber Security Companies/ Distributors
  • Consulting and Advisory Firms
  • Government and Policy Makers
  • Regulatory Authorities
Note: Product cover images may vary from those shown

FEATURED COMPANIES

  • Broadcom Inc.
  • Check Point
  • Cisco Systems
  • F5 Inc.
  • FireEye
  • Fortinet Group

1. Report Scope and Methodology
1.1 Scope of the Report
1.2 Research Methodology
1.3 Executive Summary
2. Strategic Recommendations3. Global Cyber Security Market: Product Overview
4. Global Cyber Security Market: An Analysis
4.1 Market Size, By Value, Year 2016-2026
4.2 Impact of COVID-19 on Cyber Security Market
4.3 Global Cyber Security Market
5. Global Cyber Security Market Segmentation Analysis

5.1 Global Cyber Security Market By End User
5.2 Competitive Scenario of Global Cyber Security Market: By End User (2020 & 2026)
5.3 By Government & Defense-Market Size and Forecast (2016-2026)
5.4 By IT & Telecom-Market Size and Forecast (2016-2026)
5.5 By BFSI-Market Size and Forecast (2016-2026)
5.6 By Retail-Market Size and Forecast (2016-2026)
5.7 By Healthcare-Market Size and Forecast (2016-2026)
5.8 By Others-Market Size and Forecast (2016-2026)
6. Global Cyber Security Market: Analysis By Security
6.1 Competitive Scenario of Global Cyber Security Market: By Security (2020 & 2026)
6.2 By Wireless Security-Market Size and Forecast (2016-2026)
6.3 By Application Security-Market Size and Forecast (2016-2026)
6.4 By Network Security-Market Size and Forecast (2016-2026)
6.5 By End Point Security-Market Size and Forecast (2016-2026)
6.6 By Infrastructure Protection-Market Size and Forecast (2016-2026)
6.7 By Others-Market Size and Forecast (2016-2026)
7. Global Cyber Security Market: Analysis By Deployment
7.1 Competitive Scenario of Global Cyber Security Market: By Deployment (2020 & 2026)
7.2 By Cloud Based-Market Size and Forecast (2016-2026)
7.3 By On-Premises-Market Size and Forecast (2016-2026)
8. Global Cyber Security Market: Regional Analysis
8.1 Competitive Scenario of Global Cyber Security Market: By Region (2020 & 2026)
9. North America Cyber Security Market: An Analysis (2016-2026)
9.1 North America Cyber Security Market by value: Size and Forecast (2016-2026)
9.2 North America Cyber Security Market: Prominent Companies
9.3 Market Segmentation By End User (Government & Defense, IT & Telecom, BFSI, Retail, Healthcare, Others)
9.4 Market Segmentation By Security (Wireless Security, Application Security, Network Security, End Point Security, Infrastructure Protection, Others )
9.5 Market Segmentation By Deployment (Cloud Based, On-Premises)
9.6 North America Cyber Security Market: Country Analysis
9.7 Market Opportunity Chart of North America Cyber Security Market - By Country, By Value (Year-2026)
9.8 Competitive Scenario of North America Cyber Security Market-By Country (2020 & 2026)
9.9 United States Cyber Security Market: Size and Forecast (2016-2026)
9.10 United States Cyber Security Market Segmentation By End User (2016-2026)
9.11 United States Cyber Security Market Segmentation By Security (2016-2026)
9.12 United States Cyber Security Market Segmentation By Deployment (2016-2026)
9.13 Canada Cyber Security Market: Size and Forecast (2016-2026)
9.14 Canada Cyber Security Market Segmentation By End User (2016-2026)
9.15 Canada Cyber Security Market Segmentation By Security (2016-2026)
9.16 Canada Cyber Security Market Segmentation Deployment (2016-2026)
10. Europe Cyber Security Market: An Analysis (2016-2026)
10.1 Europe Cyber Security Market by value: Size and Forecast (2016-2026)
10.2 Europe Cyber Security Market: Prominent Companies
10.3 Market Segmentation By End User (Government & Defense, IT & Telecom, BFSI, Retail, Healthcare, Others)
10.4 Market Segmentation By Security (Wireless Security, Application Security, Network Security, End Point Security, Infrastructure Protection, Others )
10.5 Market Segmentation By Deployment (Cloud Based, On-Premises)
10.6 Europe Cyber Security Market: Country Analysis
10.7 Market Opportunity Chart of Europe Cyber Security Market - By Country, By Value (Year-2026)
10.8 Competitive Scenario of Europe Cyber Security Market-By Country (2020 & 2026)
10.9 United Kingdom Cyber Security Market: Size and Forecast (2016-2026)
10.10 United Kingdom Cyber Security Market Segmentation By End User (2016-2026)
10.11 United Kingdom Cyber Security Market Segmentation By Security (2016-2026)
10.12 United Kingdom Cyber Security Market Segmentation By Deployment (2016-2026)
10.13 Germany Cyber Security Market: Size and Forecast (2016-2026)
10.14 Germany Cyber Security Market Segmentation By End User (2016-2026)
10.15 Germany Cyber Security Market Segmentation By Security (2016-2026)
10.16 Germany Cyber Security Market Segmentation By Deployment (2016-2026)
10.17 France Cyber Security Market: Size and Forecast (2016-2026)
10.18 France Cyber Security Market Segmentation By End User (2016-2026)
10.19 France Cyber Security Market Segmentation By Security (2016-2026)
10.20 France Cyber Security Market Segmentation By Deployment (2016-2026)
10.21 Italy Cyber Security Market: Size and Forecast (2016-2026)
10.22 Italy Cyber Security Market Segmentation By End User (2016-2026)
10.23 Italy Cyber Security Market Segmentation By Security (2016-2026)
10.24 Italy Cyber Security Market Segmentation By Deployment (2016-2026)
11. APAC Cyber Security Market: An Analysis (2016-2026)
11.1 APAC Cyber Security Market by value: Size and Forecast (2016-2026)
11.2 APAC Cyber Security Market: Prominent Companies
11.3 Market Segmentation By End User (Government & Defense, IT & Telecom, BFSI, Retail, Healthcare, Others)
11.4 Market Segmentation By Security (Wireless Security, Application Security, Network Security, End Point Security, Infrastructure Protection, Others )
11.5 Market Segmentation By Deployment (Cloud Based, On-Premises)
11.6 APAC Cyber Security Market: Country Analysis
11.7 Market Opportunity Chart of APAC Cyber Security Market - By Country, By Value (Year-2026)
11.8 Competitive Scenario of Europe Cyber Security Market-By Country (2020 & 2026)
11.9 China Cyber Security Market: Size and Forecast (2016-2026)
11.10 China Cyber Security Market Segmentation By End User (2016-2026)
11.11 China Cyber Security Market Segmentation By Security (2016-2026)
11.12 China Cyber Security Market Segmentation By Deployment (2016-2026)
11.13 Japan Cyber Security Market: Size and Forecast (2016-2026)
11.14 Japan Cyber Security Market Segmentation By End User (2016-2026)
11.15 Japan Cyber Security Market Segmentation By Security (2016-2026)
11.16 Japan Cyber Security Market Segmentation By Deployment (2016-2026)
11.17 India Cyber Security Market: Size and Forecast (2016-2026)
11.18 India Cyber Security Market Segmentation By End User (2016-2026)
11.19 India Cyber Security Market Segmentation By Security (2016-2026)
11.20 India Cyber Security Market Segmentation By Deployment (2016-2026)
11.21 South Korea Cyber Security Market: Size and Forecast (2016-2026)
11.22 South Korea Cyber Security Market Segmentation By End User (2016-2026)
11.23 South Korea Cyber Security Market Segmentation By Security (2016-2026)
11.24 South Korea Cyber Security Market Segmentation By Deployment (2016-2026)
12. Global Cyber Security Market Dynamics
12.1 Global Cyber Security Market Drivers
12.2 Global Cyber Security Market Restraints
12.3 Global Cyber Security Market Trends
13. Market Attractiveness
13.1 Market Attractiveness Chart of Global Cyber Security Market - By End User (Year 2026)
13.2 Market Attractiveness Chart of Global Cyber Security Market - By Security (Year 2026)
13.3 Market Attractiveness Chart of Global Cyber Security Market - By Deployment (Year 2026)
13.4 Market Attractiveness Chart of Global Cyber Security Market - By Region (Year 2026)
14. Competitive Landscape
14.1 Market Share of Leading Global Companies
14.2 SWOT Analysis-Global Cyber Security Market
14.3 Porter Five Force Analysis-Global Cyber Security Market
15. Global Cyber Security Market: Recent Developments, Merger & Acquisition
16. Company Profiles (Business Description, Financial Analysis, Business Strategy)
16.1 Cisco Systems, Inc.
16.2 NortonLifeLock Inc.
16.3 Fortinet
16.4 Check Point
16.5 FireEye
16.6 Juniper Networks
16.7 Hewlett Packard Enterprise
16.8 Palo Alto Networks
16.9 F5, Inc.
16.10 Broadcom Inc.
17. About the Publisher
List of Figures
Figure 1: Cyber Security M&A surges in 2021, (Q1-Q3 activity)
Figure 2: Number of deals in First Three Quarters, YoY Change (%)
Figure 3: Global Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 4: Cybersecurity trends worldwide due to COVID-19, 2020
Figure 5: 2020 Top 5 Most Active M&A & Financing Volume, By Sub Sector (USD Billions)
Figure 6: Estimated number of connected devices, including computers and smartphones globally (in billions)
Figure 7: The total malware infections (USD Million), 2014-2018
Figure 8: Numbers of records breached by industry in 2018 (in %)
Figure 9: The number of breach incidents in 2018, by type (%)
Figure 10: The number of breach incidents in 2018, by type (%)
Figure 11: Global average total cost of a data breach, 2014-2019 (in millions)
Figure 12: Leading IT security threats according to cyber security professionals 2020
Figure 13: Global cybersecurity spending 2017-2021 (COVID-19 adjusted), (in billion USD)
Figure 14: Types of Companies Left by Privacy Actives (2021 study)
Figure 15: Changes to Privacy Laws During Pandemic or National Emergency
Figure 16: Awareness of National or Multi-National Privacy laws, by Country
Figure 17: Ability of Consumers to Protect Their Data
Figure 18: The Reason Of Negative Response Of Consumers To Protect Their Data
Figure 19: Data Misuse Causes Concern And Protective Action
Figure 20: Internet users looking for better ways to protect privacy 2021, by country
Figure 21: Global Cyber Security Market - By End User Market Share, 2020 & 2026
Figure 22: Global Cyber Security Market - By Government & Defense, By Value (USD Million), 2016-2026
Figure 23: Global Cyber Security Market - By IT & Telecom, By Value (USD Million), 2016-2026
Figure 24: Global Cyber Security Market - BFSI, By Value (USD Million), 2016-2026
Figure 25: Global Cyber Security Market - By Retail, By Value (USD Million), 2016-2026
Figure 26: Global Cyber Security Market - By Healthcare, By Value (USD Million), 2016-2026
Figure 27: Global Cyber Security Market - By Others, By Value (USD Million), 2016-2026
Figure 28: Global Cyber Security Market - By Security Market Share, 2020 & 2026
Figure 29: Global Cyber Security Market - By Wireless Security, By Value (USD Million), 2016-2026
Figure 30: Global Cyber Security Market - By Application Security, By Value (USD Million), 2016-2026
Figure 31: Global Cyber Security Market - By Network Security, By Value (USD Million), 2016-2026
Figure 32: Global Cyber Security Market - By End Point Security, By Value (USD Million), 2016-2026
Figure 33: Global Cyber Security Market - By Infrastructure Protection, By Value (USD Million), 2016-2026
Figure 34: Global Cyber Security Market - By Others, By Value (USD Million), 2016-2026
Figure 35: Global Cyber Security Market - By Deployment Market Share, 2020 & 2026
Figure 36: Global Cyber Security Market - By Cloud Based, By Value (USD Million), 2016-2026
Figure 37: Global Cyber Security Market - By On-Premises, By Value (USD Million), 2016-2026
Figure 38: Global Cyber Security Market - By Region Market Share, 2020 & 2026
Figure 39: North America Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 40: Ways in which % internet users who keep track their online passwords
Figure 41: % of tech users who are doubtful in the ability of the institutions
Figure 42: Methods to manage network security remotely in North America 2019
Figure 43: Artificial intelligence (AI) impact on cybersecurity for CX in the U.S. 2019
Figure 44: % of Americans who agree with each statement, by age
Figure 45: North America Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 46: North America Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 47: North America Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 48: Market Opportunity Chart of North America Cyber Security Market - By Country, By Value (Year-2026)
Figure 49: North America Cyber Security Market - By Country Market Share, 2020 & 2026
Figure 50: United States Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 51: The largest employers of information security analysts in 2020
Figure 52: Annual number of data breaches in the United States, 2014-20, (in millions)
Figure 53: Businesses use of cybersecurity products in the United States in 2021
Figure 54: U.S. federal government IT expenditure 2016-2021, (in billion USD)
Figure 55: Cyber security budget share of IT budget in healthcare organizations U.S. 2020
Figure 56: Dark web market price for stolen credentials, 2019 (in U.S. dollars)
Figure 57: United States Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 58: United States Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 59: United States Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 60: Canada Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 61: Most detrimental cyber security threats according to Canadian businesses 2017
Figure 62: Canada cyber crime vs. non-cyber crime victims sharing passwords, 2017
Figure 63: Types of cyber security incident experienced, internet users, Canada, 2018
Figure 64: Total police-reported cybercrime in canada, 2016-2020
Figure 65: Largest Data Breaches Impacting Canadians, by number of records (in millions), 2015-20
Figure 66: Top Frauds In Canada Based On Dollar (In Millions CAD) Loss In 2020
Figure 67: Average Total Cost Of A Data Breach (In CAD Millions), 2016 - 2020
Figure 68: Canada Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 69: Canada Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 70: Canada Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 71: Europe Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 72: Cyber security expenditure of European firms 2020, by country
Figure 73: European firms reporting cyber attacks 2020, by country
Figure 74: ICT Spending in Eastern and central Europe (in %), 2019
Figure 75: AI companies invested, transaction volume, Europe (2014-2017)
Figure 76: Data breaches reported in Europe 2018-2020, by country
Figure 77: Change of habits due to internet security concerns in the EU 2019
Figure 78: Europe Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 79: Europe Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 80: Europe Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 81: Market Opportunity Chart of Europe Cyber Security Market - By Country, By Value (Year-2026)
Figure 82: Europe Cyber Security Market - By Country Market Share, 2020 & 2026
Figure 83: United Kingdom Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 84: Leading cyber security products and services for businesses 2021 in U.K.
Figure 85: Employment in the cyber security sector in the UK in 2020
Figure 86: Share of cyber security breaches businesses experienced in the UK 2019, by type
Figure 87: Percentage of organizations viewing cyber security as a high priority
Figure 88: Number of security industry enterprises in the UK 2021, by region
Figure 89: Average number of cyber security breaches in United Kingdom (UK) businesses 2019
Figure 90: United Kingdom Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 91: United Kingdom Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 92: United Kingdom Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 93: Germany Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 94: Germany Individuals Using Internet, 2014 -2018 (In % of Population)
Figure 95: Germany Use of Cloud Computing Services (% of enterprise) 2018
Figure 96: Types of cyber crime in companies in Germany 2019
Figure 97: Number of online banking phishing cases in Germany in 2015-2018
Figure 98: Number of cyber attacks reported to the Italian CERT 2019, by method
Figure 99: Share of firms experiencing cyberattacks in Italy, 2016-2018
Figure 100: Germany Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 101: Germany Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 102: Germany Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 103: France Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 104: Distribution of the most common cyber crimes in France, 2018
Figure 105: Location of ransomware attacks targeting French businesses, 2018
Figure 106: Digital solutions used by companies against cyber attacks in France 2020
Figure 107: Cybercrime cost development in France, 2016-2018 (million U.S. dollars)
Figure 108: Ransomware attacks targeting French businesses 2018, by type of data
Figure 109: The main challenges for the future of cybersecurity in France 2021
Figure 110: France Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 111: France Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 112: France Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 113: Italy Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 114: The number of data breaches in Italy, 2019-2020
Figure 115: Share of companies detecting cyberattacks in Italy 2016-2018
Figure 116: Number of cyber attacks reported to the Italian CERT 2019, by method
Figure 117: Share of firms experiencing cyberattacks in Italy, 2016-2018
Figure 118: Main types of cyberattacks in Italy in 2018
Figure 119: Italy Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 120: Italy Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 121: Italy Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 122: APAC Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 123: Share of cyber attacks on industries APAC 2018/2019, by industry
Figure 124: Share of cyber attacks on government Asia Pacific 2017-2018 by type
Figure 125: Share of cyber attacks in finance industry Asia Pacific 2017-2018 by source country
Figure 126: Share of cyber attacks in retail Asia Pacific 2016-2017 by source country
Figure 127: Share of cyber attacks in manufacturing industry Asia Pacific 2017-2018 by type
Figure 128: Number of economies with cybercrime laws in Asia Pacific 2017 by status
Figure 129: Average economic loss through cyber attacks APAC 2017, by type of loss (in million USD)
Figure 130: Order and security index APAC 2020 by country or region
Figure 131: APAC Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 132: APAC Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 133: APAC Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 134: Market Opportunity Chart of APAC Cyber Security Market - By Country, By Value (Year-2026)
Figure 135: APAC Cyber Security Market - By Country Market Share, 2020 & 2026
Figure 136: China Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 137: Main internet security problems in China, 2020
Figure 138: AI investment deals in security industry in China, 2014-2019, (in billion yuan)
Figure 139: Share of internet violations reported in China by type 2020
Figure 140: Concerns of CEOs in China on cyber security and data privacy breaches 2016
Figure 141: Opinions on ensures against cyber bullying in China 2018
Figure 142: Views on the likelihood of a personal data breach in China 2019
Figure 143: Identity and digital security software market share in China 2018, by company
Figure 144: Number of internet violations reported in China March 2021
Figure 145: China Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 146: China Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 147: China Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 148: Share of times phishing websites were blocked in China Q1 2021, by province
Figure 149: Japan Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 150: Percentage of businesses using cyber security ensures Japan 2020
Figure 151: Information security tools industry in Japan, (billion Yen), 2017-2020
Figure 152: Most common cyber security ensures among businesses Japan 2020
Figure 153: Most common reasons for people to have worries when using the internet Japan 2020
Figure 154: Percentage of businesses that experienced cyber crime damages Japan 2020
Figure 155: Number of online banking frauds in Japan, 2015-2020
Figure 156: E-mail security products industry in Japan, (billion yen), 2017-2021
Figure 157: Japan Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 158: Japan Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 159: Japan Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 160: Number of phishing cyber attacks in Japan, 2015-2020
Figure 161: Number of cyberbullying incidents among students in Japan, 2014-2019
Figure 162: India Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 163: Cybersecurity spending priorities India 2021
Figure 164: Number of cyber crimes related to data theft across India 2016-2020
Figure 165: Spending on security testing in India (billion INR), 2019-2025E
Figure 166: Number of cyber crimes reported in India 2015-2020
Figure 167: PE-VC investment in cybersecurity sector in India, 2015-20
Figure 168: India Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 169: India Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 170: India Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 171: South Korea Cyber Security Market Size, By Value, 2016-2026 (USD Million)
Figure 172: Cyber information security companies in South Korea, 2015-2020
Figure 173: Importance of information security in South Korea, 2020, by age
Figure 174: Cyber information security companies export value South Korea (in billion south korean won), 2016-2020
Figure 175: Number of workers in the information security industry South Korea (in thousands), 2018-2020
Figure 176: Information security budget of the Ministry of Science and ICT South Korea 2019-2021
Figure 177: Number of cyber crime cases South Korea 2014-2020
Figure 178: Online hacking cases South Korea 2020, by type
Figure 179: South Korea Cyber Security Market - By End User, By Value (USD Million), 2016-2026
Figure 180: South Korea Cyber Security Market - By Security, By Value (USD Million), 2016-2026
Figure 181: South Korea Cyber Security Market - By Deployment, By Value (USD Million), 2016-2026
Figure 182: Number of security assessments on e-government apps South Korea 2015-2020
Figure 183: Number of DDoS attacks and responses South Korea 2015-2020
Figure 184: Market Attractiveness Chart of Global Cyber Security Market - By End User (Year-2026)
Figure 185: Market Attractiveness Chart of Global Cyber Security Market - By Security (Year-2026)
Figure 186: Market Attractiveness Chart of Global Cyber Security Market - By Deployment (Year-2026)
Figure 187: Market Attractiveness Chart of Global Cyber Security Market - By Region (Year-2026)
Figure 188: Global Cyber Security company market share (%), 2020
Figure 189: Cisco Systems, Inc. Annual Sales Revenue, 2016-2020 (USD Million)
Figure 190: Cisco Systems, Inc. Net Income, 2016-2020 (USD Million)
Figure 191: Cisco Systems, Inc. Sales Revenue, By Business Segment (%), FY2020
Figure 192: Cisco Systems, Inc. Sales Revenue, By Geographical Segment (%), FY2020
Figure 193: NortonLifeLock Inc. Annual Sales Revenue, 2016-2020 (USD Million)
Figure 194: NortonLifeLock Inc. Net Income, 2016-2020 (USD Million)
Figure 195: NortonLifeLock Inc. Sales Revenue, By Business Segment (%), FY2020
Figure 196: NortonLifeLock Inc. Sales Revenue, By Geographical Segment (%), FY2020
Figure 197: Fortinet Annual Sales Revenue, 2016-2020 (USD Million)
Figure 198: Fortinet Net Income, 2016-2020 (USD Million)
Figure 199: Fortinet Sales Revenue, By Business Segment (%), FY2020
Figure 200: Fortinet Sales Revenue, By Geographic Segment (%), FY2020
Figure 201: Check Point Annual Sales Revenue, 2016-2020 (USD Million)
Figure 202: Check Point Net Income, 2016-2020 (USD Million)
Figure 203: Check Point Sales Revenue, By Business Segment (%),FY2020
Figure 204: Check Point Sales Revenue, By Geographical Segment (%),FY2020
Figure 205: FireEye Annual Sales Revenue, 2015-2019 (USD Million)
Figure 206: FireEye Net Gross Profit, 2015-2019 (USD Million)
Figure 207: FireEye Sales Revenue, By Business Segment (%), FY2019
Figure 208: FireEye Sales Revenue, By Geographical Segment (%), FY2019
Figure 209: Juniper Networks Annual Sales Revenue, 2016-2020 (USD Million)
Figure 210: Juniper Networks Net Profit, 2016-2020 (USD Million)
Figure 211: Juniper Networks Sales Revenue, By Business Segment (%), FY2020
Figure 212: Juniper Networks Sales Revenue, By Geographical Segment (%), FY2020
Figure 213: Hewlett Packard Enterprise Annual Sales Revenue, 2016-2020 (USD Million)
Figure 214: Hewlett Packard Enterprise Gross Profit, 2016-2020 (USD Million)
Figure 215: Hewlett Packard Enterprise Sales Revenue, By Business Segment (%), FY2020
Figure 216: Hewlett Packard Enterprise Sales Revenue, By Geographical Segment (%), FY2020
Figure 217: Palo Alto Networks Annual Sales Revenue, 2016-2020 (USD Million)
Figure 218: Palo Alto Networks Gross Profit, 2016-2020 (USD Million)
Figure 219: Palo Alto Networks Sales Revenue, By Business Segment (%), FY2020
Figure 220: Palo Alto Networks Sales Revenue, By Geographical Segment (%), FY2020
Figure 221: F5, Inc. Annual Sales Revenue, 2016-2020 (USD Million)
Figure 222: F5, Inc. Gross Profit, 2016-2020 (USD Million)
Figure 223: F5, Inc. Sales Revenue, By Business Segment (%), FY2020
Figure 224: F5, Inc. Sales Revenue, By Geographical Segment (%), FY2020
Figure 225: Broadcom Inc. Annual Sales Revenue, 2016-2020 (USD Million)
Figure 226: Broadcom Inc. Net Income (Loss), 2016-2020 (USD Million)
Figure 227: Broadcom Inc. Sales Revenue, By Business Segment (%), FY2020
Figure 228: Broadcom Inc. Sales Revenue, By Geographical Segment (%), FY2020
List of Tables
Table A: Number of cybersecurity professionals worldwide 2019-2021, by country
Table B: The Biggest Data Breaches Worldwide
Table C: U.S. federal government cyber security funding (In millions of dollars), 2018-2020
Table D: The biggest data breaches in India, 2019-2021

Note: Product cover images may vary from those shown
  • Cisco Systems 
  • NortonLifeLock Inc. 
  • Fortinet Group 
  • Check Point 
  • FireEye 
  • Juniper Networks 
  • Hewlett Packard Enterprise 
  • Palo Alto Networks 
  • F5 Inc. 
  • Broadcom Inc.
Note: Product cover images may vary from those shown

Loading
LOADING...