Information Security Products And Services - A Global Strategic Business Report

Information Security Products And Services - Global Strategic Business Report

Global Industry Analysts, Date of Publication: Aug 29, 2014, 644 Pages
US$4,950.00
GIA-MCP1410

Information Security Products And Services Business Report

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware, and Information Security Services. The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software. The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances. The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management Services, Education & Training, and Response Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. A seven-year historic analysis is also provided for these markets. Market data and analytics are derived from primary and secondary research. The report profiles 313 companies including many key and niche players such as -

ActivID® IT Security Solutions
Blue Coat Systems Inc.
CA Technologies Inc.
Cisco Systems, Inc.
EMC Corporation

More information can be obtained upon the request of sample pages.

TABLE OF CONTENTS

 I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS
      Study Reliability and Reporting Limitations                       I-1
      Disclaimers                                                       I-2
      Data Interpretation & Reporting Level                             I-2
       Quantitative Techniques & Analytics                              I-2
      Product Definitions and Scope of Study                            I-3
       Information Security Software                                    I-4
        Identity & Access Management (I&AM)                             I-5
         Public Key Infrastructure (PKI)                                I-5
         Web Single Sign-On                                             I-5
         Host Single Sign-On                                            I-5
         User Provisioning                                              I-5
         Directory Services                                             I-5
         Legacy Authorization                                           I-5
         Advanced Authentication                                        I-6
        Secure Content Management (SCM)                                 I-6
         Antivirus Software                                             I-6
         Web/Content Filtering                                          I-6
         Messaging Security (E-mail Scanning)                           I-6
        Intrusion Detection/Prevention (IDP)                            I-6
        Security & Vulnerability Management                             I-6
        Firewall/VPN Software                                           I-7
        Other Security Software                                         I-7
       Information Security Hardware                                    I-7
        Hardware Authentication Products                                I-7
         Tokens                                                         I-7
         Smart Cards                                                    I-7
         Biometrics                                                     I-8
        Threat Management Security Appliances                           I-8
         Firewall/VPN Appliances                                        I-8
         SCM Appliances                                                 I-8
         Intrusion Detection/Prevention Appliances                      I-8
         Unified Threat Management (UTM) Appliances                     I-8
       Information Security Services                                    I-8
        Consulting Services                                             I-9
        Education and Training Services                                 I-9
        Implementation Services                                         I-9
        Management Services                                             I-9
        Response Services                                               I-9


 II. EXECUTIVE SUMMARY

  1. INDUSTRY OVERVIEW                                                  II-1
      Corporate Information Assets - Vulnerable as Ever                 II-1
      Growing Instances of IT Security Breaches - A Serious Cause
       for Concern                                                      II-2
       A Look at Common Security Threats for Enterprise Information
        Assets                                                          II-2
       Damages Caused by Security Breaches                              II-3
        Proprietary Information Destruction                             II-3
        Disruption in Systems Performance                               II-4
        Data/Application Damage or Corruption                           II-4
         Types of Internal IT Security Breaches in Organizations -
          Ranked in the Order of Frequency of Occurrence                II-4
         Types of External Security Breaches in Organizations -
          Ranked in the Order of Frequency of Occurrence                II-4
         Top IT Security Breaches Between 2013 & Early 2014             II-5
      Information Security - High on Priority List for Enterprises      II-5
       Factors Affecting Implementation of Information Security
        Solutions by Enterprises Worldwide - Ranked in Order of
         Influence                                                      II-7
      Increased Use of Internet Drives Focus on Cyber Security          II-7
      Key Statistical Findings                                          II-9
       Table 1: Number of Internet Users (in Million) and
       Penetration Percentage for Years 2001, 2011 & 2013 (includes
       corresponding Graph/Chart)                                       II-9

       Table 2: Global Internet Market (2013): Percentage Share
       Breakdown of Number of Internet Users by Country (includes
       corresponding Graph/Chart)                                       II-10
       Top Priority Malicious Elements Threatening Cyber Security in
        Enterprises: On a Scale 1 - 10 (10 - High Priority; 1 - Low
         Priority)                                                      II-10
       Key Focus Areas for Enterprises in Implementation of Cyber
        Security in their Premises: Ranked in Order of Relative
         Importance                                                     II-10
      Key Focus Areas for Information Security in Enterprises           II-11
       Network Security - Keeping Security Threats at Bay               II-11
        Security of Internal Network Infrastructure - A Key
         Necessity for Any Business                                     II-11
       Enterprise Endpoint Security Gains Prominence                    II-12
        General Trends Underpinning Need for Endpoint Security
         Solutions in Organizations                                     II-13
        Growth in Adoption of Mobile End-Points in Enterprises Make
         Enterprise Endpoint Security a Major Necessity                 II-13
       Content Security - Fast Gaining Prominence                       II-13
       Application Security too Finds Traction                          II-14
       Server Security Concerns Brings Focus on Server Security
        Solutions                                                       II-14
      Periods of Economic Slowdown Increases Information Security
       Risks - Magnifies the Business Case for Efficient Security
        Solutions                                                       II-15
       Impact of Economic Recession on Global Enterprises               II-16
      Market Outlook                                                    II-17
       Developing Regions to Lend Traction to Information Security
        Market                                                          II-17

  2. NOTEWORTHY TRENDS, GROWTH DRIVERS & ISSUES                         II-18
      Rise in Magnitude of Cyber Crime to Drive Adoption of
       Information Security Products & Services                         II-18
       Table 3: Breakdown of Number of Cyber Attacks Reported in
       October 2013 by Source Nation (includes corresponding
       Graph/Chart)                                                     II-20

       Table 4: Percentage Share Breakdown of Number of Cyber
       Attacks by Nature of Attack as of 2013 (includes
       corresponding Graph/Chart)                                       II-20
       Types of External IT Security Breaches in Organizations -
        Ranked in the Order of Frequency of Occurrence                  II-20
       Types of Internal IT Security Breaches in Organizations -
        Ranked in the Order of Frequency of Occurrence                  II-21
      Increasing Prevalence of Malware to Drive Demand for
       Information Security Products & Services                         II-21
       Table 5: World Anti-Malware Market (2014): Percentage Share
       Breakdown of Revenues by Type - Corporate Endpoint Security,
       IDS & IPS, Messaging Security, and Web Security (includes
       corresponding Graph/Chart)                                       II-22
      APTs Emerge as a New Sophisticated Threat - Create Business
       Case for Information Security Solutions                          II-22
      Emergence of Fake QR Codes and TecTiles Drive Demand for
       Security Solutions                                               II-22
      Growing Use of Advanced Digital Platforms Make Enterprises
       Highly Vulnerable to Security Threats                            II-23
       Security Threats from Virtualization & Cloud Infrastructure
        Deployments to Drive Demand for Information Security
         Solutions                                                      II-23
        Table 6: Global IT Market (2013): Percentage Share Breakdown
        of Spending by Segment (includes corresponding Graph/Chart)     II-25

        Table 7: Global Cloud Computing Services Market (2013 &
        2015P): Breakdown of Annual Revenue Figures in US$ Million
        by Region (includes corresponding Graph/Chart)                  II-25

        Table 8: Global Virtualization Software Market (2013):
        Percentage Share Breakdown of Revenue by Geographic Region
        (includes corresponding Graph/Chart)                            II-25
       Growing Use of Internet Enabled Mobile Handsets Lends
        Traction to Information Security Market                         II-26
        Enterprise Mobility Makes Enterprise Information Assets
         Highly Vulnerable to Cyber Attacks                             II-26
         Table 9: Global Smartphones market: Annual Sales Figures
         (in Million Units) for Years 2013, 2016 & 2018 (includes
         corresponding Graph/Chart)                                     II-28

         Table 10: Global Smartphones Market (2013): Penetration for
         Select Countries (as a Percentage of Mobile Phone Users)
         (includes corresponding Graph/Chart)                           II-28

         Table 11: Global Worker Population (2013 & 2017):
         Percentage Share Breakdown of Number of Workers by Nature
         of Work (includes corresponding Graph/Chart)                   II-29

         Table 12: Global Mobile Worker Population (2013 & 2017):
         Percentage Share Breakdown of Number of Mobile Workers by
         Nature of Work (includes corresponding Graph/Chart)            II-29

         Table 13: Global Mobile Workforce (2013): Percentage Share
         Breakdown of Number of Mobile Workers by Region (includes
         corresponding Graph/Chart)                                     II-30
        Growing BYOD Phenomenon Drives Adoption of Information
         Security Solutions                                             II-30
        Industry Still Underprepared to Tackle Mobile Security Concerns II-31
        Information Security Solutions Focusing on Smartphone
         Security Gains Rapid Adoption                                  II-31
       Security for Converged Data and Voice Environments               II-31
       VoIP Security for Expanding VoIP                                 II-31
      Threat from Social Networking Sites Drives Demand for
       Information Security Solutions                                   II-32
      IP4 to IPv6 Transition to Boost Adoption of Information
       Security Solutions and Services                                  II-33
      Regulatory Compliance Requirements Continue to Drive Demand
       for Information Security Solutions                               II-34
       Governments and Regulatory Authorities Continue to Implement
        Strict Privacy Regulations                                      II-34
      Avoiding Unnecessary Costs - Key Rationale for Adoption of IT
       Security Solutions                                               II-35
       Growing Commoditization of Security Products Brings Down
        Prices - Boosts Order Influx Rates                              II-35
      Small and Mid-Sized Businesses - A Lucrative Market Segment       II-35

  3. FOCUS ON SELECT PRODUCT MARKETS                                    II-36
      Information Security Software Market                              II-36
       Secure Content Management Solutions Anchors Information
        Security Software Market                                        II-36
        Antivirus Accounts for Lion’s Share in SCM Market               II-36
         Low Footprint Anti-Virus Grow in Prominence among SMBs         II-37
          Top 10 Anti Virus Software Solutions for 2011                 II-37
        Web Filtering Software Finds Steady Growth Prospects            II-37
         Increasing Web 2.0 & E-Mail Threats Boost Demand for
          Content Filtering Products                                    II-38
        Messaging Security - The Fastest Growing Secure Content
         Management Solution                                            II-39
         E-mail Encryption Gathers Steam                                II-39
          Table 14: Principal Factors Influencing Installation of
          Web/E-mail Monitoring in Organizations (includes
          corresponding Graph/Chart)                                    II-40
       Identity & Access Management Software Solutions                  II-40
        Table 15: Global Identity and Access Management Market
        (2013): Percentage Share Breakdown of Revenues by Operating
        Environment (includes corresponding Graph/Chart)                II-41
        IAM: A Key Security Initiative for Enterprises                  II-42
        An Integral Part of Corporate Strategy                          II-42
        Legacy Authorization - A Declining Market                       II-43
       Compliance Requirements Boost Security & Vulnerability
        Management Market                                               II-43
        Table 16: Global Vulnerability Assessment Market (2013):
        Percentage Share Breakdown of Revenues for Device
        Vulnerability Assessment and Application Scanners (includes
        corresponding Graph/Chart)                                      II-44
        Small and Mid-Sized Businesses - An Under- Penetrated
         Segment for SVM                                                II-44
        Diverse Delivery Systems for SVM Products                       II-44
       Firewall/VPN Software - The Traditional But Mature Market
        Segment                                                         II-44
        Next Generation Firewall (NGFW) - An Emerging Technology        II-45
        SSL VPN - A Nascent Market                                      II-45
       Encryption for Data Protection                                   II-46
        Growing Significance of Data Loss Protection                    II-46
       Key Trends in Information Security Software Market               II-46
        Growing Adoption of SaaS Business Model Drives Strong Growth
         Prospects for Software Vendors                                 II-46
         Growing Prominence of Identity-as-a-Service (IaaS) - A Case
          in Point                                                      II-47
        Increased Use of Open Source Tools - A Key Trend in
         Information Security Software Market                           II-48
      Information Security Hardware                                     II-48
       Threat Management Security Appliances - The Predominant
        Information Security Hardware Category                          II-49
        Unified Threat Management (UTM) Appliances - A Whip on
         Blended Security Threats                                       II-49
         XTMs Emerge as More Potential Tool                             II-50
       Steady Growth in Secure Content Management Appliances Market     II-50
       Intrusion Detection & Prevention Systems - A Review of
        Opportunities                                                   II-50
       Hardware Authentication - A Trivial but Key Revenue
        Contributor for Information Security Hardware Market            II-51
        Market Overview of Authentication Tokens                        II-51
         Trends in Authentication Tokens Market                         II-52
        Smart Cards Market - A Review                                   II-53
         Telecom Sector to Remain Major Driver of Smart Card Demand     II-53
         Need for Tamper-Free System Drives Adoption of Smart Cards
          in the Transportation Sector                                  II-53
         Demand for Banking and Payment Smart Cards Continue to Grow    II-53
        Biometrics - An Emerging Authentication Module                  II-54
         Table 17: World Biometrics Market (2012): Percentage Share
         Breakdown of Revenues by Technology (includes corresponding
         Graph/Chart)                                                   II-55

         Table 18: World Biometrics Market (2012): Percentage Share
         Breakdown of Revenue by End-Use Sector (includes
         corresponding Graph/Chart)                                     II-55
         Rapid Growth of Biometric Surveillance                         II-55
         World Biometrics Market (2011-2015): Analysis of Demand in
          Commercial Sector by Application Areas - Enterprise
           Security, Information Transactions and Financial
            Transactions                                                II-56
      Information Security Services - Primary Revenue Contributor       II-56
       Dearth of Trained Staff and In-House Infrastructure to Boost
        Market Prospects for Information Security Services              II-56
       Managed Security Services Continue to Gain Acceptance            II-57
       Hosted Security Services: Growing in Demand                      II-58

  4. REVIEW OF SELECT END-USE MARKETS                                   II-59
      Financial Services - A Key End Use Market for Information
       Security Solutions                                               II-59
       Major External & Internal Breaches in Financial Services Sector  II-59
        Table 19: Leading Targets of Fraud (2013): Percentage
        Breakdown of Number of Breaches by Type of Asset (includes
        corresponding Graph/Chart)                                      II-59
       Implementation of Information Security Policy - Industries
        Ranked by Level of Implementation                               II-60
       Top Security Initiatives by Sector                               II-60
       Advanced IT Security Solutions Gain Traction in Financial Sector II-60
       Regulatory Compliance: A High Priority for Financial
        Institutions                                                    II-61
       Need to Sustain Customer Trust - A Business Case for
        Informaiton Security Solutions in the Financial Sector          II-61
       Key Barriers in Information Security for Financial Services
        Sector                                                          II-61
      Telecommunication and IT                                          II-62
       DOS Attacks Threaten Mobile Network Security - Drive Demand
        for Cyber Security Solutions in Telecom Industry                II-62
       Overbilling Attack: A Business Case for Cyber Security
        Solutions in Telecom Industry                                   II-62
       VPN to Make Telecommunication Networks More Safer                II-62
       Opportunities for Wireless Network Security in Telecom Industry  II-63
        Table 20: Worldwide Mobile Data Traffic by Device Type
        (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly
        Data Traffic Volume for Laptops, Non-Smartphones,
        Smartphones, Tablets, and Others (includes corresponding
        Graph/Chart)                                                    II-63

        Table 21: Worldwide Mobile Data Traffic by Application
        (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly
        Data Traffic Volume for Data, File Sharing, M2M, and Video
        (includes corresponding Graph/Chart)                            II-64

        Table 22: Worldwide Mobile Networks (2013 & 2018):
        Percentage Share Breakdown of Number of Connections by Type
        of Network Technology (includes corresponding Graph/Chart)      II-64
      Production Systems Also Adopt Information Security Solutions      II-65
      IT Security Solutions Find Increased Demand in Healthcare Sector  II-65

  5. KEY ISSUES/CHALLENGES & THE WAY FORWARD                            II-66
      Major Restraints to Efficient Information Security in
       Enterprises Worldwide                                            II-66
      Inadequate Budget - the Key Constraint                            II-66
       High Cost of Ownership - A Major Drawback for Biometric
        Solutions                                                       II-67
      Lack of Alignment between Business Objectives and Security        II-67
      External Threats More Recognized than Internal Threats            II-67
      Most Organizations Continue to Remain Reactive Rather than
       Proactive                                                        II-67
      Growing Sophistication & Complexity of Security Threats - A
       Challenge to Reckon With for Information Security Solution
        Providers                                                       II-67
       Stealthier Infiltration Methods Pose Challenges for
        Information Security                                            II-68
      Advanced Security Solutions - The Need of the Hour                II-69
      Security Analytics to See Light in the Enterprise Security Sector II-69
      Big Data Analytics Set to Storm the Information Security Market   II-70
      Artificial intelligence Gains Widespread Acceptance               II-70
      Convergence Gains Strength                                        II-70
      Vendors Come Up with Integrated Solutions to Stay Ahead           II-71

  6. COMPETITIVE LANDSCAPE                                              II-72
      Information Security Market - Highly Competitive                  II-72
      Security Software Market Witnesses Consolidation Trend            II-72
      Convergence of Product Portfolio - A Key Competitive Ploy         II-72
      What Does it Take to Survive in the Marketplace?                  II-73
       Key Market Share Findings:                                       II-73
        Table 23: Leading Vendors in the Global Security Software
        Market (2012): Percentage Share Breakdown of Revenues for
        CA, IBM, McAfee, Symantec, Trend Micro, and Others (includes
        corresponding Graph/Chart)                                      II-73

        Table 24: Leading Players in Global Identity and Access
        Management Market (2013): Percentage Share Breakdown of
        Revenues for CA, EMC, IBM, Oracle, SafeNet, Symantec, and
        Others (includes corresponding Graph/Chart)                     II-74

        Table 25: Leading Players in Global Messaging Security
        Market (2013): Percentage Share Breakdown of Revenues for
        Cisco, Google, McAfee, Microsoft, Symantec, TrendMicro, and
        Others (includes corresponding Graph/Chart)                     II-74

        Table 26: Leading Players in Global Security and
        Vulnerability Management Market (2012): Percentage Share
        Breakdown of Revenues for EMC, HP, IBM, McAfee, Rapid and
        Others (includes corresponding Graph/Chart)                     II-74

        Table 27: Leading Players in Global Vulnerability Management
        Market (2012): Percentage Share Breakdown of Revenues for
        HP, IBM, McAfee, Qualys, Rapid and Others (includes
        corresponding Graph/Chart)                                      II-75

        Table 28: Leading Players in Global Content Security Gateway
        Market (2013): Percentage Share Breakdown of Revenues for
        Blue Coat, Cisco, McAfee, Symantec, Trend Micro, Websense,
        and Others (includes corresponding Graph/Chart)                 II-75

        Table 29: Leading Players in Global Web Security Market
        (2013): Percentage Share Breakdown of Revenues for
        Barracuda, Blue Coat, Cisco, Trend Micro, Websense, and
        Others (includes corresponding Graph/Chart)                     II-75

        Table 30: Leading Players in Global Firewall Market (2013):
        Percentage Share Breakdown of Revenues for Checkpoint,
        Cisco, Juniper Networks, Microsoft, and Others (includes
        corresponding Graph/Chart)                                      II-76

        Table 31: Leading Players in Global VPN Market (2013) -
        Percentage Share Breakdown of Revenues for Checkpoint,
        Cisco, Citrix, F5 Networks, Juniper Networks, Microsoft,
        SafeNet, and Others (includes corresponding Graph/Chart)        II-76

        Table 32: Leading Players in Global Intrusion
        Detection/Prevention Market (2013) - Percentage Share
        Breakdown of Revenues for Arbor Networks, Checkpoint, Cisco,
        HP, IBM, McAfee, Sourcefire, and Others (includes
        corresponding Graph/Chart)                                      II-76

        Table 33: Leading Players in Global Unified Threat
        Management Market (2013): Percentage Share Breakdown of
        Revenues for Checkpoint, Cisco, Dell, Fortinet, Juniper
        Networks, Palo Alto Networks, WatchGuard, and Others
        (includes corresponding Graph/Chart)                            II-77

        Table 34: Leading Vendors in Global Antivirus Market (Jan
        2014): Percentage Share Breakdown of Revenues for Avast,
        AVG, Avira, ESET, Kaspersky, Microsoft, Symantec, and Others
        (includes corresponding Graph/Chart)                            II-77

  7. PRODUCT/SERVICE OVERVIEW                                           II-78
      Information Security - An Introduction                            II-78
      Organizational Security Strata                                    II-78
      Managing Information Security                                     II-78
       Measures to Ensure Information Security:                         II-79
        Information Security Projects in Organizations - Ranked in
         the Order of Relative Importance                               II-79
      Key Product Segments                                              II-79
      Information Security Software                                     II-81
       Identity & Access Management (I&AM)                              II-81
        Key Functionalities of Identity & Access Management Solutions   II-81
         Authentication                                                 II-81
         Authorization                                                  II-82
         Administration                                                 II-82
        PKI (Public Key Infrastructure)                                 II-82
         Benefits of PKI                                                II-83
         Glitches with PKI                                              II-83
        Single Sign-On (SSO)                                            II-83
         Web Single Sign-On                                             II-83
         Host Single Sign-On                                            II-83
      User Provisioning                                                 II-84
      Directory Services                                                II-84
      Legacy Authorization                                              II-84
      Advanced Authentication                                           II-84
       Secure Content Management (SCM)                                  II-84
        Antivirus Software                                              II-84
        Web/Content Filtering                                           II-85
        Messaging Security (E-mail Scanning)                            II-85
       Intrusion Detection/Prevention (IDP)                             II-86
       Security & Vulnerability Management                              II-86
       Firewall/VPN                                                     II-87
        Firewalls                                                       II-87
         Major Firewall Types                                           II-87
          Packet Filter Firewall                                        II-87
          Stateful Packet Inspection Firewall                           II-88
          Application Layer Gateways or Proxies                         II-88
         Available Forms of Firewalls                                   II-88
          Software Firewalls                                            II-88
          Hardware Firewalls                                            II-88
       Virtual Private Networks (VPNs)                                  II-88
        Key Components of a VPN                                         II-89
         VPN Gateways                                                   II-89
         Security Servers                                               II-89
         Keys                                                           II-89
         Network                                                        II-89
        Available Forms of VPN                                          II-89
         VPN Software                                                   II-89
         VPN Hardware                                                   II-89
        Types of VPN                                                    II-89
         Remote-access VPN                                              II-89
         Site-to-Site VPN                                               II-89
        Technologies Supporting Delivery of VPN Services                II-90
         Internet Protocol Security (IPSec)                             II-90
         Point-to-Point Tunneling Protocol (PPTP)                       II-90
         Layer 2 Tunneling Protocol (L2TP)                              II-90
         Secure Socket Layer (SSL)                                      II-90
         Multi Protocol Label Switching (MPLS)                          II-90
        Firewall/VPN - The Need for Integration                         II-91
       Encryption                                                       II-91
        Other Security Software                                         II-91
      Information Security Hardware                                     II-91
       Hardware Authentication Products                                 II-91
        Tokens                                                          II-92
        Smart Cards                                                     II-92
        Biometrics                                                      II-92
       Threat Management Security Appliances                            II-92
        Firewall/VPN Appliances                                         II-93
        SCM Appliances                                                  II-93
        Intrusion Detection/Prevention Appliances                       II-93
         Intrusion Detection System (IDS)                               II-93
          Types of IDS                                                  II-93
           Network based and Host based IDS                             II-93
           Misuse Detection and Anomaly Detection                       II-94
           Passive System and Reactive System                           II-94
         Intrusion Prevention System (IPS)                              II-94
          Unified Threat Management (UTM) Appliances - The Viable
           Solution                                                     II-94
         Benefits of UTM Appliances                                     II-94
      Information Security Services                                     II-95
       Information Security Services Life Cycle                         II-95
        Stages of Information Security Life Cycle                       II-95
         Initiation                                                     II-95
         Assessment                                                     II-95
         Solution                                                       II-95
         Implementation                                                 II-96
         Operations                                                     II-96
         Closeout                                                       II-96
        Security Policy                                                 II-96
         Program Policies                                               II-96
         Issue-Specific Policies                                        II-96
         System-Specific Policies                                       II-96
        Security Services Management Tools                              II-96
         Metrics                                                        II-97
         Service Agreements                                             II-97
        Types of Information Security Services                          II-97
         Consulting Services                                            II-97
         Education and Training Services                                II-97
         Implementation Services                                        II-97
         Management Services                                            II-98
         Response Services                                              II-98
      Types of Delivery Models                                          II-98
       Software Licenses                                                II-98
       Appliance Based Devices                                          II-98
       Hosted Services (Security- as- a-Service Solutions)              II-99
       Complete Outsourcing Models                                      II-99
       Hybrid Model                                                     II-99

  8. PRODUCT/SERVICE INNOVATIONS/ INTRODUCTIONS                         II-100
      HP Releases New Security Metrics Services                         II-100
      CA Technologies Launches New Mobility and API Solutions           II-100
      Parsons Launches Enhanced Cybersecurity Product                   II-100
      Watchful Software Introduces New Version of RightsWATCH
       information protection solution                                  II-100
      Brekeke Software Launches New Version of PBX and SIP Server       II-100
      Dell Releases Server Protection Services                          II-100
      Nowell Introduces Advanced Security and Risk Analytics
       Software Platform                                                II-100
      Ping Identity Releases New Generation Identity Gateway            II-100
      CSC Launches New ATD Solution                                     II-101
      Toshiba's Digital Products Division Introduces Smart Client
       Manager 2.0                                                      II-101
      docTrackr Releases New Solution for Gmail                         II-101
      LockPath Introduces New SIEM Solution                             II-101
      SecureAuth Releases New Cloud-Hosted Authentication Solution      II-101
      McAfee Launches New Access and Identity Management Solutions      II-101
      Intego Launches New Range of Mac Security and Antivirus Products  II-101
      BitSight Technologies Releases New Range of Cybersecurity
       Solutions                                                        II-101
      Bkav Launches New Internet Security Products                      II-102
      VanDyke Software Introduces New SecureCRT 7.2 and SecureFX 7.2
       Platforms                                                        II-102
      AVG Releases new AVG AntiVirus for Mac                            II-102
      Kaspersky Introduces New Virtual Networking and Security Solution II-102
      GWAVA Releases New GWAVA messaging security version               II-102
      TeleMate.Net Introduces New Improved NetSpective Web Filter
       Version                                                          II-102
      EdgeWave Releases Advanced Secure Web Gateway                     II-102
      ZyXEL Introduces New new ZyWALL series of ultra-fast gigabit
       firewall / VPN devices                                           II-102
      Tripwire Launches Enhanced Tripwire IP360                         II-102
      Fortinet Launches New Operating System                            II-103
      HP Introduces New Big Data Tools                                  II-103
      Cyberoam Releases Advanced Firewall Appliances                    II-103
      Prolifics Launches New Identity Intelligence-branded solution     II-103
      RSA Launches New VRM Software Solution                            II-103
      AFORE Releases Enhanced Data Encryption Solutions                 II-103
      ForgeRock Launches New IRM Platform                               II-103
      Cisco Releases New Range of IT Security Products                  II-103

  9. RECENT INDUSTRY ACTIVITY                                           II-104
      Sophos Takes Over Cyberoam Technologies                           II-104
      Agio Acquires Secure Enterprise Computing                         II-104
      EMC Takes Over Aveska                                             II-104
      Click Security Acquires VisibleRisk                               II-104
      MDT Takes Over CUsource                                           II-104
      Trustwave Takes Over Application Security                         II-104
      HyTrust Takes Over HighCloud Security                             II-105
      Akamai Technologies to Acquire Prolexic                           II-105
      Openwave Messaging Takes Over Critical Path                       II-105
      Datacard Group to Acquire Entrust                                 II-105
      Vision Computer Solutions Enters into an Agreement with
       Awareness Technologies                                           II-105
      Global Payout and ImageWare Systems Ink a Pact                    II-105

  10. FOCUS ON SELECT PLAYERS                                           II-106
      ActivID® IT Security Solutions (US)                               II-106
      Blue Coat Systems Inc. (US)                                       II-106
      CA Technologies Inc. (USA)                                        II-106
      Check Point Software Technologies Ltd. (Israel)                   II-107
      Cisco Systems, Inc. (USA)                                         II-107
      Clearswift Ltd. (UK)                                              II-108
      EMC Corporation (US)                                              II-108
      Entrust (US)                                                      II-109
      F-Secure Corporation (Finland)                                    II-109
      Fortinet, Inc. (US)                                               II-110
      Fujitsu Ltd. (Japan)                                              II-110
      Hewlett-Packard Development Company, L.P. (US)                    II-111
      IBM Corporation (US)                                              II-111
      Juniper Networks, Inc. (US)                                       II-112
      Lumension Security, Inc. (US)                                     II-112
      McAfee, Inc. (US)                                                 II-112
       Stonesoft Corporation (Finland)                                  II-113
      Nexus (Sweden)                                                    II-113
      Norman ASA (Norway)                                               II-113
      Novell, Inc. (US)                                                 II-114
      Ping Identity Corp. (US)                                          II-114
      Proofpoint, Inc. (US)                                             II-114
      SafeNet, Inc. (US)                                                II-115
      SonicWALL, Inc. (US)                                              II-115
      Sophos Plc (UK)                                                   II-116
      Symantec Corporation (US)                                         II-116
      Thales Group (France)                                             II-117
      Trend Micro Incorporated (Japan)                                  II-117
      Trustwave (US)                                                    II-118
      Verizon Business (US)                                             II-118
      WatchGuard Technologies, Inc. (US)                                II-119
      WebSense, Inc. (US)                                               II-119
      Leading Global Information Security Research Institutes           II-120
       Center for Education and Research in Information Assurance
        and Security (CERIAS) (USA)                                     II-120
       Information Security Group (UK)                                  II-120

  11. GLOBAL MARKET PERSPECTIVE                                         II-121
      Table 35: World Recent Past, Current & Future Analysis for
      Information Security Products & Services by Geographic Region -
      US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
      Latin America, and Rest of World Markets Independently
      Analyzed with Annual Revenues in US$ Million for Years 2013
      through 2020 (includes corresponding Graph/Chart)                 II-121

      Table 36: World Historic Review for Information Security
      Products & Services by Geographic Region - US, Canada, Japan,
      Europe, Asia-Pacific (excluding Japan), Latin America, and
      Rest of World Markets Independently Analyzed with Annual
      Revenues in US$ Million for Years 2006 through 2012 (includes
      corresponding Graph/Chart)                                        II-122

      Table 37: World 15-Year Perspective for Information Security
      Products & Services by Geographic Region - Percentage
      Breakdown of Revenues for US, Canada, Japan, Europe,
      Asia-Pacific (excluding Japan), Latin America, and Rest of
      World Markets for Years 2006, 2014 & 2020 (includes
      corresponding Graph/Chart)                                        II-123
      Information Security Software Market by Product Group/Segment     II-124
       Information Security Software                                    II-124
       Table 38: World Recent Past, Current & Future Analysis for
       Information Security Software by Geographic Region - US,
       Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
       America, and Rest of World Markets Independently Analyzed
       with Annual Revenues in US$ Million for Years 2013 through
       2020 (includes corresponding Graph/Chart)                        II-124

       Table 39: World Historic Review for Information Security
       Software by Geographic Region - US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets Independently Analyzed with Annual Revenues in
       US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-125

       Table 40: World Recent Past, Current & Future Analysis for
       Information Security Software by Product Group/Segment -
       Identity & Access Management, Secure Content Management,
       Intrusion Detection/ Prevention, Security & Vulnerability
       Management, Firewall/VPN and Other Security Software Markets
       Independently Analyzed with Annual Revenues in US$ Million
       for Years 2013 through 2020 (includes corresponding
       Graph/Chart)                                                     II-126

       Table 41: World Historic Review for Information Security
       Software by Product Group/Segment - Identity & Access
       Management, Secure Content Management, Intrusion
       Detection/Prevention, Security & Vulnerability Management,
       Firewall/VPN and Other Security Software Markets
       Independently Analyzed with Annual Revenues in US$ Million
       for Years 2006 through 2012 (includes corresponding
       Graph/Chart)                                                     II-127

       Table 42: World 15-Year Perspective for Information Security
       Software by Geographic Region - Percentage Breakdown of
       Revenues for US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-128

       Table 43: World 15-Year Perspective for Information Security
       Software by Product Group/Segment - Percentage Breakdown of
       Revenues for Identity & Access Management, Secure Content
       Management, Intrusion Detection/Prevention, Security &
       Vulnerability Management, Firewall/VPN and Other Security
       Software Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-129

       Table 44: World Recent Past, Current & Future Analysis for
       Identity & Access Management Software by Geographic Region -
       US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
       Latin America, and Rest of World Markets Independently
       Analyzed with Annual Revenues in US$ Million for Years 2013
       through 2020 (includes corresponding Graph/Chart)                II-130

       Table 45: World Historic Review for Identity & Access
       Management Software by Geographic Region - US, Canada, Japan,
       Europe, Asia-Pacific (excluding Japan), Latin America, and
       Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-131

       Table 46: World Recent Past, Current & Future Analysis for
       Identity & Access Management Software by Product Segment -
       PKI, Web Single Sign-On, Host Single Sign-On, User
       Provisioning, Directory Services, Legacy Authorization, and
       Advanced Authentication Software Markets Independently
       Analyzed with Annual Revenues in US$ Million for Years 2013
       through 2020 (includes corresponding Graph/Chart)                II-132

       Table 47: World Historic Review for Identity & Access
       Management Software by Product Segment - PKI, Web Single
       Sign-On, Host Single Sign-On, User Provisioning, Directory
       Services, Legacy Authorization, and Advanced Authentication
       Software Markets Independently Analyzed with Annual Revenues
       in US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-133

       Table 48: World 15-Year Perspective for Identity & Access
       Management Software by Geographic Region - Percentage
       Breakdown of Revenues for US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-134

       Table 49: World 15-Year Perspective for Identity & Access
       Management Software by Product Segment - Percentage Breakdown
       of Revenues for PKI, Web Single Sign-On, Host Single Sign-On,
       User Provisioning, Directory Services, Legacy Authorization,
       and Advanced Authentication Software Markets for Years 2006,
       2014 & 2020 (includes corresponding Graph/Chart)                 II-135

       Table 50: World Recent Past, Current & Future Analysis for
       Secure Content Management Software by Geographic Region - US,
       Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
       America, and Rest of World Markets Independently Analyzed
       with Annual Revenues in US$ Million for Years 2013 through
       2020 (includes corresponding Graph/Chart)                        II-136

       Table 51: World Historic Review for Secure Content Management
       Software by Geographic Region - US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets Independently Analyzed with Annual Revenues in
       US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-137

       Table 52: World Recent Past, Current & Future Analysis for
       Secure Content Management Software by Product Segment -
       Antivirus, Web Filtering and Messaging Security Software
       Markets Independently Analyzed with Annual Revenues in US$
       Million for Years 2013 through 2020 (includes corresponding
       Graph/Chart)                                                     II-138

       Table 53: World Historic Review for Secure Content Management
       Software by Product Segment - Antivirus, Web Filtering and
       Messaging Security Software Markets Independently Analyzed
       with Annual Revenues in US$ Million for Years 2006 through
       2012 (includes corresponding Graph/Chart)                        II-139

       Table 54: World 15-Year Perspective for Secure Content
       Management Software by Geographic Region - Percentage
       Breakdown of Revenues for US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-140

       Table 55: World 15-Year Perspective for Secure Content
       Management Software by Product Group/Segment - Percentage
       Breakdown of Revenues for Antivirus, Web Filtering and
       Messaging Security Software Markets for Years 2006, 2014 &
       2020 (includes corresponding Graph/Chart)                        II-141

       Table 56: World Recent Past, Current & Future Analysis for
       Intrusion Detection/ Prevention Software by Geographic Region -
       US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
       Latin America, and Rest of World Markets Independently
       Analyzed with Annual Revenues in US$ Million for Years 2013
       through 2020 (includes corresponding Graph/Chart)                II-142

       Table 57: World Historic Review for Intrusion Detection/
       Prevention Software by Geographic Region - US, Canada, Japan,
       Europe, Asia-Pacific (excluding Japan), Latin America, and
       Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-143

       Table 58: World 15-Year Perspective for Intrusion
       Detection/Prevention Software by Geographic Region -
       Percentage Breakdown of Revenues for US, Canada, Japan,
       Europe, Asia-Pacific (excluding Japan), Latin America, and
       Rest of World Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-144

       Table 59: World Recent Past, Current & Future Analysis for
       Security & Vulnerability Management Software by Geographic
       Region - US, Canada, Japan, Europe, Asia-Pacific (excluding
       Japan), Latin America, and Rest of World Markets
       Independently Analyzed with Annual Revenues in US$ Million
       for Years 2013 through 2020 (includes corresponding
       Graph/Chart)                                                     II-145

       Table 60: World Historic Review for Security & Vulnerability
       Management Software by Geographic Region - US, Canada, Japan,
       Europe, Asia-Pacific (excluding Japan), Latin America, and
       Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-146

       Table 61: World 15-Year Perspective for Security &
       Vulnerability Management Software by Geographic Region -
       Percentage Breakdown of Revenues for US, Canada, Japan,
       Europe, Asia-Pacific (excluding Japan), Latin America, and
       Rest of World Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-147

       Table 62: World Recent Past, Current & Future Analysis for
       Firewall/VPN Software by Geographic Region - US, Canada,
       Japan, Europe, Asia-Pacific (excluding Japan), Latin America,
       and Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2013 through 2020 (includes
       corresponding Graph/Chart)                                       II-148

       Table 63: World Historic Review for Firewall/VPN Software by
       Geographic Region - US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       Independently Analyzed with Annual Revenues in US$ Million
       for Years 2006 through 2012 (includes corresponding
       Graph/Chart)                                                     II-149

       Table 64: World 15-Year Perspective for Firewall/ VPN
       Software by Geographic Region - Percentage Breakdown of
       Revenues for US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-150

       Table 65: World Recent Past, Current & Future Analysis for
       Other Security Software by Geographic Region - US, Canada,
       Japan, Europe, Asia-Pacific (excluding Japan), Latin America,
       and Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2013 through 2020 (includes
       corresponding Graph/Chart)                                       II-151

       Table 66: World Historic Review for Other Security Software
       by Geographic Region - US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets Independently Analyzed with Annual Revenues in
       US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-152

       Table 67: World 15-Year Perspective for Other Security
       Software by Geographic Region - Percentage Breakdown of
       Revenues for US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-153
       Information Security Hardware                                    II-154
       Table 68: World Recent Past, Current & Future Analysis for
       Information Security Hardware by Geographic Region - US,
       Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
       America, and Rest of World Markets Independently Analyzed
       with Annual Revenues in US$ Million for Years 2013 through
       2020 (includes corresponding Graph/Chart)                        II-154

       Table 69: World Historic Review for Information Security
       Hardware by Geographic Region - US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets Independently Analyzed with Annual Revenues in
       US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-155

       Table 70: World Recent Past, Current & Future Analysis for
       Information Security Hardware by Product Segment - Hardware
       Authentication and Threat Management Security Appliance
       Markets Independently Analyzed with Annual Revenues in US$
       Million for Years 2013 through 2020 (includes corresponding
       Graph/Chart)                                                     II-156

       Table 71: World Historic Review for Information Security
       Hardware by Product Segment - Hardware Authentication and
       Threat Management Security Appliance Markets Independently
       Analyzed with Annual Revenues in US$ Million for Years 2006
       through 2012 (includes corresponding Graph/Chart)                II-157

       Table 72: World 15-Year Perspective for Information Security
       Hardware by Geographic Region - Percentage Breakdown of
       Revenues for US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-158

       Table 73: World 15-Year Perspective for Information Security
       Hardware by Product Group/Segment - Percentage Breakdown of
       Revenues for Hardware Authentication and Threat Management
       Security Appliance Markets for Years 2006, 2014 & 2020
       (includes corresponding Graph/Chart)                             II-159

       Table 74: World Recent Past, Current & Future Analysis for
       Hardware Authentication by Geographic Region - US, Canada,
       Japan, Europe, Asia-Pacific (excluding Japan), Latin America,
       and Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2013 through 2020 (includes
       corresponding Graph/Chart)                                       II-160

       Table 75: World Historic Review for Hardware Authentication
       by Geographic Region - US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets Independently Analyzed with Annual Revenues in
       US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-161

       Table 76: World Recent Past, Current & Future Analysis for
       Hardware Authentication by Product Segment - Tokens, Smart
       Cards, and Biometrics Markets Independently Analyzed with
       Annual Revenues in US$ Million for Years 2013 through 2020
       (includes corresponding Graph/Chart)                             II-162

       Table 77: World Historic Review for Hardware Authentication
       by Product Segment - Tokens, Smart Cards, and Biometrics
       Markets Independently Analyzed with Annual Revenues in US$
       Million for Years 2006 through 2012 (includes corresponding
       Graph/Chart)                                                     II-163

       Table 78: World 15-Year Perspective for Hardware
       Authentication by Geographic Region - Percentage Breakdown of
       Revenues for US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-164

       Table 79: World 15-Year Perspective for Hardware
       Authentication by Product Group/ Segment - Percentage
       Breakdown of Revenues for Tokens, Smart Cards, and Biometrics
       Markets for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-165

       Table 80: World Recent Past, Current & Future Analysis for
       Threat Management Security Appliances by Geographic Region -
       US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
       Latin America, and Rest of World Markets Independently
       Analyzed with Annual Revenues in US$ Million for Years 2013
       through 2020 (includes corresponding Graph/Chart)                II-166

       Table 81: World Historic Review for Threat Management
       Security Appliances by Geographic Region - US, Canada, Japan,
       Europe, Asia-Pacific (excluding Japan), Latin America, and
       Rest of World Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-167

       Table 82: World Recent Past, Current & Future Analysis for
       Threat Management Security Appliances by Product Segment -
       Firewall/VPN, Secure Content Management, Intrusion
       Detection/Prevention and Unified Threat Management Security
       Appliances Markets Independently Analyzed with Annual
       Revenues in US$ Million for Years 2013 through 2020 (includes
       corresponding Graph/Chart)                                       II-168

       Table 83: World Historic Review for Threat Management
       Security Appliances by Product Segment - Firewall/VPN, Secure
       Content Management, Intrusion Detection/ Prevention and
       Unified Threat Management Security Appliances Markets
       Independently Analyzed with Annual Revenues in US$ Million
       for Years 2006 through 2012 (includes corresponding
       Graph/Chart)                                                     II-169

       Table 84: World 15-Year Perspective for Threat Management
       Security Appliances by Geographic Region - Percentage
       Breakdown of Revenues for US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-170

       Table 85: World 15-Year Perspective for Threat Management
       Security Appliances by Product Group/Segment - Percentage
       Breakdown of Revenues for Firewall/VPN, Secure Content
       Management, Intrusion Detection/Prevention and Unified Threat
       Management Security Appliances Markets for Years 2006, 2014 &
       2020 (includes corresponding Graph/Chart)                        II-171
       Information Security Services                                    II-172
       Table 86: World Recent Past, Current & Future Analysis for
       Information Security Services by Geographic Region - US,
       Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
       America, and Rest of World Markets Independently Analyzed
       with Annual Revenues in US$ Million for Years 2013 through
       2020 (includes corresponding Graph/Chart)                        II-172

       Table 87: World Historic Review for Information Security
       Services by Geographic Region - US, Canada, Japan, Europe,
       Asia-Pacific (excluding Japan), Latin America, and Rest of
       World Markets Independently Analyzed with Annual Revenues in
       US$ Million for Years 2006 through 2012 (includes
       corresponding Graph/Chart)                                       II-173

       Table 88: World Recent Past, Current & Future Analysis for
       Information Security Services by Service Segment -
       Implementation Services, Consulting Services, Management
       Services, Education & Training and Response Services Markets
       Independently Analyzed with Annual Revenues in US$ Million
       for Years 2013 through 2020 (includes corresponding
       Graph/Chart)                                                     II-174

       Table 89: World Historic Review for Information Security
       Services by Service Segment - Implementation Services,
       Consulting Services, Management Services, Education &
       Training and Response Services Markets Independently Analyzed
       with Annual Revenues in US$ Million for Years 2006 through
       2012 (includes corresponding Graph/Chart)                        II-175

       Table 90: World 15-Year Perspective for Information Security
       Services by Geographic Region - Percentage Breakdown of
       Revenues for US, Canada, Japan, Europe, Asia-Pacific
       (excluding Japan), Latin America, and Rest of World Markets
       for Years 2006, 2014 & 2020 (includes corresponding
       Graph/Chart)                                                     II-176

       Table 91: World 15-Year Perspective for Information Security
       Services by Service Segment - Percentage Breakdown of
       Revenues for Implementation Services, Consulting Services,
       Management Services, Education & Training and Response
       Services Markets for Years 2006, 2014 & 2020 (includes
       corresponding Graph/Chart)                                       II-177


 III. MARKET

  1. THE UNITED STATES                                                  III-1
      A.Market Analysis                                                 III-1
        Current & Future Analysis                                       III-1
        An Overview                                                     III-1
        Rising Cyber Security Issues in the US                          III-1
         Table 92: US Cyber Security Market (2013): Percentage Share
         Breakdown of Number of Incidents in Critical Infrastructure
         Sectors (includes corresponding Graph/Chart)                   III-2
        Identity Theft: A Growing Menace in the US                      III-2
        Identity and Access Management Solutions - A Market Laden
         with Immense Potential                                         III-2
        Intrusion Detection - A Growing Market in the US                III-2
        End Use Market Summary                                          III-3
         Table 93: US Information Security Services Market (2013):
         Percentage Share Breakdown of Revenues by End Use
         Industries - Banking, Communications, Healthcare, Financial
         Services, and Insurance (includes corresponding
         Graph/Chart)                                                   III-3
        Banking/Financial Institutions: A Key End Use Industry          III-4
        Regulatory Environment                                          III-4
         Laws Governing the Data Security                               III-5
        Product Launches                                                III-5
        Strategic Corporate Developments                                III-8
        Key Players                                                     III-10
      B.Market Analytics                                                III-20
        Table 94: US Recent Past, Current & Future Analysis for
        Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-20

        Table 95: US Historic Review for Information Security
        Products & Services by Product Group/Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-22

        Table 96: US 15-Year Perspective for Information Security
        Products & Services by Product Group/ Segment - Percentage
        Breakdown of Revenues for Information Security Software
        (Identity & Access Management (PKI, Web Single Sign-On, Host
        Single Sign-On, User Provisioning, Directory Services,
        Legacy Authorization, and Advanced Authentication), Secure
        Content Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets for Years 2006, 2014 & 2020 (includes
        corresponding Graph/Chart)                                      III-24

  2. CANADA                                                             III-25
      A.Market Analysis                                                 III-25
        Current & Future Analysis                                       III-25
        Market Overview                                                 III-25
        Product Launches                                                III-25
      B.Market Analytics                                                III-26
        Table 97: Canadian Recent Past, Current & Future Analysis
        for Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-26

        Table 98: Canadian Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion Detection/
        Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/ Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-28

        Table 99: Canadian 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-30

  3. JAPAN                                                              III-31
      A.Market Analysis                                                 III-31
        Current & Future Analysis                                       III-31
        Information Security Market - A Primer                          III-31
         Highlights                                                     III-31
        Secure Content Threat Management Gains Focus                    III-32
        Growing Popularity of Biometric Technology                      III-32
         Table 100: Biometric Market in Japan (2013): Percentage
         Share Breakdown of Value Sales for Fingerprint Technology,
         Vein Technologies, Facial Recognition and Others (includes
         corresponding Graph/Chart)                                     III-32
        Regulatory Environment                                          III-33
        Rising Emphasis on After Sales Service                          III-33
        Competitive Scenario                                            III-33
        Product Launch                                                  III-33
        Key Players                                                     III-34
      B.Market Analytics                                                III-35
        Table 101: Japanese Recent Past, Current & Future Analysis
        for Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-35

        Table 102: Japanese Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion Detection/
        Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-37

        Table 103: Japanese 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-39

  4. EUROPE                                                             III-40
      A.Market Analysis                                                 III-40
        Current & Future Analysis                                       III-40
        Information Security - High on Enterprise Priority              III-40
        Security Software Market                                        III-41
        Network and Information Security (NIS) Market in EU-27          III-41
         At a Glance                                                    III-41
         Growth Drivers                                                 III-41
         Major Threats                                                  III-41
          Table 104: EU NIS Market for Business Users (2013):
          Percentage Share Breakdown of Spending by Company Size
          (includes corresponding Graph/Chart)                          III-42
         Regulations Influencing NIS Market                             III-42
         Growing Demand for NIS Services                                III-43
        Identity Access Management Market                               III-43
        Strong Uptake in the SME Sector to Fuel European Email
         Security Growth                                                III-43
        Regulatory Environment                                          III-43
      B.Market Analytics                                                III-44
        Table 105: European Recent Past, Current & Future Analysis
        for Information Security Products & Services by Geographic
        Region - France, Germany, Italy, UK, Spain, Russia and Rest
        of Europe Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-44

        Table 106: European Historic Review for Information Security
        Products & Services by Geographic Region - France, Germany,
        Italy, UK, Spain, Russia and Rest of Europe Markets
        Independently Analyzed with Annual Revenues in US$ Million
        for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-45

        Table 107: European Recent Past, Current & Future Analysis
        for Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall / VPN,
        Secure Content Management, Intrusion Detection/Prevention
        and Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-46

        Table 108: European Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion Detection/
        Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-48

        Table 109: European 15-Year Perspective for Information
        Security Products & Services by Geographic Region -
        Percentage Breakdown of Revenues for France, Germany, Italy,
        UK, Spain, Russia and Rest of Europe Markets for Years 2006,
        2014 & 2020 (includes corresponding Graph/Chart)                III-50

        Table 110: European 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-51

  4a. FRANCE                                                            III-52
      A.Market Analysis                                                 III-52
        Current & Future Analysis                                       III-52
        An Overview of Information Security Market                      III-52
        Regulatory Standards                                            III-52
        Competitive Scenario                                            III-52
        Thales Group - A Key Player                                     III-53
      B.Market Analytics                                                III-54
        Table 111: French Recent Past, Current & Future Analysis for
        Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-54

        Table 112: French Historic Review for Information Security
        Products & Services by Product Group/Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-56

        Table 113: French 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-58

  4b. GERMANY                                                           III-59
      A.Market Analysis                                                 III-59
        Current & Future Analysis                                       III-59
        US Vendors Hold Major Share in the Marketplace                  III-59
      B.Market Analytics                                                III-60
        Table 114: German Recent Past, Current & Future Analysis for
        Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-60

        Table 115: German Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-62

        Table 116: German 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/ VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-64

  4c. ITALY                                                             III-65
      A.Market Analysis                                                 III-65
        Current & Future Analysis                                       III-65
        Cyber Security Market - An Overview                             III-65
      B.Market Analytics                                                III-66
        Table 117: Italian Recent Past, Current & Future Analysis
        for Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-66

        Table 118: Italian Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion Detection/
        Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/ VPN, Secure Content Management,
        Intrusion Detection/ Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-68

        Table 119: Italian 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/ VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-70

  4d. THE UNITED KINGDOM                                                III-71
      A.Market Analysis                                                 III-71
        Current & Future Analysis                                       III-71
        Market Overview                                                 III-71
        Key Players                                                     III-71
      B.Market Analytics                                                III-73
        Table 120: UK Recent Past, Current & Future Analysis for
        Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-73

        Table 121: UK Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-75

        Table 122: UK 15-Year Perspective for Information Security
        Products & Services by Product Group/ Segment - Percentage
        Breakdown of Revenues for Information Security Software
        (Identity & Access Management (PKI, Web Single Sign-On, Host
        Single Sign-On, User Provisioning, Directory Services,
        Legacy Authorization, and Advanced Authentication), Secure
        Content Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets for Years 2006, 2014 & 2020 (includes
        corresponding Graph/Chart)                                      III-77

  4e. SPAIN                                                             III-78
      A.Market Analysis                                                 III-78
        Current & Future Analysis                                       III-78
      B.Market Analytics                                                III-79
        Table 123: Spanish Recent Past, Current & Future Analysis
        for Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-79

        Table 124: Spanish Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-81

        Table 125: Spanish 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-83

  4f. RUSSIA                                                            III-84
      A.Market Analysis                                                 III-84
        Current & Future Analysis                                       III-84
      B.Market Analytics                                                III-85
        Table 126: Russian Recent Past, Current & Future Analysis
        for Information Security Products & Services by Product
        Group/Segment - Information Security Software (Identity &
        Access Management (PKI, Web Single Sign-On, Host Single
        Sign-On, User Provisioning, Directory Services, Legacy
        Authorization, and Advanced Authentication), Secure Content
        Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/ VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/ Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-85

        Table 127: Russian Historic Review for Information Security
        Products & Services by Product Group/ Segment - Information
        Security Software (Identity & Access Management (PKI, Web
        Single Sign-On, Host Single Sign-On, User Provisioning,
        Directory Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/ VPN, Secure Content Management,
        Intrusion Detection/ Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-87

        Table 128: Russian 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-89

  4g. REST OF EUROPE                                                    III-90
      A.Market Analysis                                                 III-90
        Current & Future Analysis                                       III-90
        Product Launches                                                III-90
        Key Players                                                     III-90
      B.Market Analytics                                                III-93
        Table 129: Rest of Europe Recent Past, Current & Future
        Analysis for Information Security Products & Services by
        Product Group/Segment - Information Security Software
        (Identity & Access Management (PKI, Web Single Sign-On, Host
        Single Sign-On, User Provisioning, Directory Services,
        Legacy Authorization, and Advanced Authentication), Secure
        Content Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-93

        Table 130: Rest of Europe Historic Review for Information
        Security Products & Services by Product Group/ Segment -
        Information Security Software (Identity & Access Management
        (PKI, Web Single Sign-On, Host Single Sign-On, User
        Provisioning, Directory Services, Legacy Authorization, and
        Advanced Authentication), Secure Content Management
        (Antivirus, Web Filtering and Messaging Security), Intrusion
        Detection/ Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-95

        Table 131: Rest of Europe 15-Year Perspective for
        Information Security Products & Services by Product
        Group/Segment - Percentage Breakdown of Revenues for
        Information Security Software (Identity & Access Management
        (PKI, Web Single Sign-On, Host Single Sign-On, User
        Provisioning, Directory Services, Legacy Authorization, and
        Advanced Authentication), Secure Content Management
        (Antivirus, Web Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-97

  5. ASIA-PACIFIC                                                       III-98
      A.Market Analysis                                                 III-98
        Current & Future Analysis                                       III-98
        Overview                                                        III-98
        Review of Select Product Markets                                III-99
         Secure Content Management Software - The Largest Market
          Segment                                                       III-99
         Web Filtering - Gaining Prominence                             III-99
         Identity Access Management - Fastest Growing Product
          Segment in Asia-Pacific                                       III-99
         Managed Security Services (MSS) Market - Asia-Pacific          III-99
        Increasing Room for Appliances                                  III-100
        SOHO & Consumer Segments - Potential Growth Opportunities       III-100
        Leading Vendors                                                 III-100
        Focus on Select Information Security Markets                    III-100
         China                                                          III-100
          Key Trends                                                    III-101
          Regulatory Overview                                           III-102
         India                                                          III-102
          Factors Driving Growth                                        III-103
          Issues & Challenges                                           III-103
          Growing Demand for Security Software Solutions                III-104
          Indian Anti-Virus Market                                      III-104
         South Korea                                                    III-105
         Singapore                                                      III-105
         Taiwan                                                         III-105
          An Overview of Information Security Market in Taiwan          III-106
        Product Launches                                                III-106
        Strategic Corporate Development                                 III-107
        Secui.Com Co., Ltd. (Korea) - A Key Player                      III-107
      B.Market Analytics                                                III-108
        Table 132: Asia-Pacific Recent Past, Current & Future
        Analysis for Information Security Products & Services by
        Product Group/Segment - Information Security Software
        (Identity & Access Management (PKI, Web Single Sign-On, Host
        Single Sign-On, User Provisioning, Directory Services,
        Legacy Authorization, and Advanced Authentication), Secure
        Content Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-108

        Table 133: Asia-Pacific Historic Review for Information
        Security Products & Services by Product Group/ Segment -
        Information Security Software (Identity & Access Management
        (PKI, Web Single Sign-On, Host Single Sign-On, User
        Provisioning, Directory Services, Legacy Authorization, and
        Advanced Authentication), Secure Content Management
        (Antivirus, Web Filtering and Messaging Security), Intrusion
        Detection/ Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-110

        Table 134: Asia-Pacific 15-Year Perspective for Information
        Security Products & Services by Product Group/ Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-112

  6. LATIN AMERICA                                                      III-113
      A.Market Analysis                                                 III-113
        Current & Future Analysis                                       III-113
        Information Security Market Shows Steady Growth                 III-113
        Brazil Offers Robust Opportunities for Biometrics               III-114
      B.Market Analytics                                                III-115
        Table 135: Latin American Recent Past, Current & Future
        Analysis for Information Security Products & Services by
        Product Group/Segment - Information Security Software
        (Identity & Access Management (PKI, Web Single Sign-On, Host
        Single Sign-On, User Provisioning, Directory Services,
        Legacy Authorization, and Advanced Authentication), Secure
        Content Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/ Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/ Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-115

        Table 136: Latin American Historic Review for Information
        Security Products & Services by Product Group/ Segment -
        Information Security Software (Identity & Access Management
        (PKI, Web Single Sign-On, Host Single Sign-On, User
        Provisioning, Directory Services, Legacy Authorization, and
        Advanced Authentication), Secure Content Management
        (Antivirus, Web Filtering and Messaging Security), Intrusion
        Detection/ Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/ VPN, Secure Content Management,
        Intrusion Detection/ Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-117

        Table 137: Latin American 15-Year Perspective for
        Information Security Products & Services by Product
        Group/Segment - Percentage Breakdown of Revenues for
        Information Security Software (Identity & Access Management
        (PKI, Web Single Sign-On, Host Single Sign-On, User
        Provisioning, Directory Services, Legacy Authorization, and
        Advanced Authentication), Secure Content Management
        (Antivirus, Web Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/ Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-119

  7. REST OF WORLD                                                      III-120
      A.Market Analysis                                                 III-120
        Current & Future Analysis                                       III-120
        Security Software Market in Gulf States on the Rise             III-120
        Demand for Security Software Gains Tration in South Africa      III-120
        Check Point Software Technologies Ltd. (Israel) - A Key Player  III-120
      B.Market Analytics                                                III-122
        Table 138: Rest of World Recent Past, Current & Future
        Analysis for Information Security Products & Services by
        Product Group/Segment - Information Security Software
        (Identity & Access Management (PKI, Web Single Sign-On, Host
        Single Sign-On, User Provisioning, Directory Services,
        Legacy Authorization, and Advanced Authentication), Secure
        Content Management (Antivirus, Web Filtering and Messaging
        Security), Intrusion Detection/Prevention, Security &
        Vulnerability Management, Firewall/VPN and Other Security
        Software)), Information Security Hardware (Hardware
        Authentication (Tokens, Smart Cards and Biometrics) and
        Threat Management Security Appliances (Firewall/VPN, Secure
        Content Management, Intrusion Detection/Prevention and
        Unified Threat Management)) and Information Security
        Services (Implementation Services, Consulting Services,
        Management Services, Education & Training and Response
        Services) Markets Independently Analyzed with Annual
        Revenues in US$ Million for Years 2013 through 2020
        (includes corresponding Graph/Chart)                            III-122

        Table 139: Rest of World Historic Review for Information
        Security Products & Services by Product Group/ Segment -
        Information Security Software (Identity & Access Management
        (PKI, Web Single Sign-On, Host Single Sign-On, User
        Provisioning, Directory Services, Legacy Authorization, and
        Advanced Authentication), Secure Content Management
        (Antivirus, Web Filtering and Messaging Security), Intrusion
        Detection/ Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets Independently Analyzed with Annual Revenues in US$
        Million for Years 2006 through 2012 (includes corresponding
        Graph/Chart)                                                    III-124

        Table 140: Rest of World 15-Year Perspective for Information
        Security Products & Services by Product Group/Segment -
        Percentage Breakdown of Revenues for Information Security
        Software (Identity & Access Management (PKI, Web Single
        Sign-On, Host Single Sign-On, User Provisioning, Directory
        Services, Legacy Authorization, and Advanced
        Authentication), Secure Content Management (Antivirus, Web
        Filtering and Messaging Security), Intrusion
        Detection/Prevention, Security & Vulnerability Management,
        Firewall/VPN and Other Security Software)), Information
        Security Hardware (Hardware Authentication (Tokens, Smart
        Cards and Biometrics) and Threat Management Security
        Appliances (Firewall/VPN, Secure Content Management,
        Intrusion Detection/Prevention and Unified Threat
        Management)) and Information Security Services
        (Implementation Services, Consulting Services, Management
        Services, Education & Training and Response Services)
        Markets for Years 2006, 2014 & 2020 (includes corresponding
        Graph/Chart)                                                    III-126


 IV. COMPETITIVE LANDSCAPE

     Total Companies Profiled: 313 (including Divisions/Subsidiaries - 395)

     The United States (186)
     Canada (9)
     Japan (8)
     Europe (127)
     - France (11)
     - Germany (16)
     - The United Kingdom (40)
     - Italy (3)
     - Spain (5)
     - Rest of Europe (52)
     Asia-Pacific (Excluding Japan) (51)
     Latin America (3)
     Africa (3)
     Middle East (8)
Additional Information:
This report is offered in PDF format via e-mail. Once downloaded, the PDF can’t be copied to another computer. The user is permitted to print one full copy of the report. Extra copies or licenses may be purchased at 10% of the list price.
Date of Publication:
Aug 29, 2014
File Format:
PDF via E-mail
Number of Pages:
644 Pages
Type the characters you see in the picture above.