Table of Contents
1 Introduction
1.1 Objective of the study
1.2 Market Definitions
1.3 Market Segmentation & Aspects Covered
1.4 Research Methodology
1.4.1 Assumptions (Market Size, Forecast, etc)
2 Executive Summary
3 Market Overview
4 Cyber Security-Middle East and Africa, By Segments
4.1 End-Point Security-Middle East and Africa
4.1.1 End-Point Security-Middle East and Africa, By Industries
4.1.1.1 End-Point Security-Middle East and Africa-Government (ICT)
4.1.1.2 End-Point Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.1.1.3 End-Point Security-Middle East and Africa-Manufacturing (ICT)
4.1.1.4 End-Point Security-Middle East and Africa-Telecommunication (ICT)
4.1.1.5 End-Point Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.1.1.6 End-Point Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.2 Application Security-Middle East and Africa
4.2.1 Application Security-Middle East and Africa, By Industries
4.2.1.1 Application Security-Middle East and Africa-Government (ICT)
4.2.1.2 Application Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.2.1.3 Application Security-Middle East and Africa-Manufacturing (ICT)
4.2.1.4 Application Security-Middle East and Africa-Telecommunication (ICT)
4.2.1.5 Application Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.2.1.6 Application Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.3 Content Security-Middle East and Africa
4.3.1 Content Security-Middle East and Africa, By Industries
4.3.1.1 Content Security-Middle East and Africa-Government (ICT)
4.3.1.2 Content Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.3.1.3 Content Security-Middle East and Africa-Manufacturing (ICT)
4.3.1.4 Content Security-Middle East and Africa-Telecommunication (ICT)
4.3.1.5 Content Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.3.1.6 Content Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.4 Wireless Security-Middle East and Africa
4.4.1 Wireless Security-Middle East and Africa, By Industries
4.4.1.1 Wireless Security-Middle East and Africa-Government (ICT)
4.4.1.2 Wireless Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.4.1.3 Wireless Security-Middle East and Africa-Manufacturing (ICT)
4.4.1.4 Wireless Security-Middle East and Africa-Telecommunication (ICT)
4.4.1.5 Wireless Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.4.1.6 Wireless Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.5 Network Security-Middle East and Africa
4.5.1 Network Security-Middle East and Africa, By Endusers
4.5.1.1 Network Security-Banking Financial Services and Insurance (BFSI) (ICT)-Middle East and Africa
4.5.1.2 Network Security-Manufacturing (ICT)-Middle East and Africa
4.5.1.3 Network Security-IT and Telecommunication (ICT)-Middle East and Africa
4.5.1.4 Network Security-Healthcare and Life Science -Middle East and Africa
5 Cyber Security-Middle East and Africa, By Industries
5.1 Cyber Security-Middle East and Africa-Government (ICT)
5.1.1 Cyber Security-Middle East and Africa-Government (ICT), By Segments
5.1.1.1 Network Security-Middle East and Africa-Government (ICT)
5.1.1.2 Application Security-Middle East and Africa-Government (ICT)
5.1.1.3 Content Security-Middle East and Africa-Government (ICT)
5.1.1.4 End-Point Security-Middle East and Africa-Government (ICT)
5.1.1.5 Wireless Security-Middle East and Africa-Government (ICT)
5.1.2 Cyber Security-Middle East and Africa-Government (ICT), By Solutions
5.1.2.1 Identity Access Management (IAM)-Middle East and Africa-Government (ICT)
5.1.2.2 Web-Filtering-Middle East and Africa-Government (ICT)
5.1.2.3 Data Encryption Solutions-Middle East and Africa-Government (ICT)
5.1.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Government (ICT)
5.1.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Government (ICT)
5.1.2.6 Data Recovery Solutions-Middle East and Africa-Government (ICT)
5.1.2.7 Risk and Compliance Management-Middle East and Africa-Government (ICT)
5.1.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Government (ICT)
5.1.2.9 Firewall-Middle East and Africa-Government (ICT)
5.1.2.10 Vulnerability Mangement-Middle East and Africa-Government (ICT)
5.1.2.11 Other Cyber Security Solutions-Middle East and Africa-Government (ICT)
5.2 Cyber Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1 Cyber Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT), By Segments
5.2.1.1 Network Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.2 Application Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.3 Content Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.4 End-Point Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.5 Wireless Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2 Cyber Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT), By Solutions
5.2.2.1 Identity Access Management (IAM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.2 Web-Filtering-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.3 Data Encryption Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.6 Data Recovery Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.7 Risk and Compliance Management-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.9 Firewall-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.10 Vulnerability Mangement-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.11 Other Cyber Security Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.3 Cyber Security-Middle East and Africa-Manufacturing (ICT)
5.3.1 Cyber Security-Middle East and Africa-Manufacturing (ICT), By Segments
5.3.1.1 Network Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.2 Application Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.3 Content Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.4 End-Point Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.5 Wireless Security-Middle East and Africa-Manufacturing (ICT)
5.3.2 Cyber Security-Middle East and Africa-Manufacturing (ICT), By Solutions
5.3.2.1 Identity Access Management (IAM)-Middle East and Africa-Manufacturing (ICT)
5.3.2.2 Web-Filtering-Middle East and Africa-Manufacturing (ICT)
5.3.2.3 Data Encryption Solutions-Middle East and Africa-Manufacturing (ICT)
5.3.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Manufacturing (ICT)
5.3.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Manufacturing (ICT)
5.3.2.6 Data Recovery Solutions-Middle East and Africa-Manufacturing (ICT)
5.3.2.7 Risk and Compliance Management-Middle East and Africa-Manufacturing (ICT)
5.3.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Manufacturing (ICT)
5.3.2.9 Firewall-Middle East and Africa-Manufacturing (ICT)
5.3.2.10 Vulnerability Mangement-Middle East and Africa-Manufacturing (ICT)
5.3.2.11 Other Cyber Security Solutions-Middle East and Africa-Manufacturing (ICT)
5.4 Cyber Security-Middle East and Africa-Telecommunication (ICT)
5.4.1 Cyber Security-Middle East and Africa-Telecommunication (ICT), By Segments
5.4.1.1 Network Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.2 Application Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.3 Content Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.4 End-Point Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.5 Wireless Security-Middle East and Africa-Telecommunication (ICT)
5.4.2 Cyber Security-Middle East and Africa-Telecommunication (ICT), By Solutions
5.4.2.1 Identity Access Management (IAM)-Middle East and Africa-Telecommunication (ICT)
5.4.2.2 Web-Filtering-Middle East and Africa-Telecommunication (ICT)
5.4.2.3 Data Encryption Solutions-Middle East and Africa-Telecommunication (ICT)
5.4.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Telecommunication (ICT)
5.4.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Telecommunication (ICT)
5.4.2.6 Data Recovery Solutions-Middle East and Africa-Telecommunication (ICT)
5.4.2.7 Risk and Compliance Management-Middle East and Africa-Telecommunication (ICT)
5.4.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Telecommunication (ICT)
5.4.2.9 Firewall-Middle East and Africa-Telecommunication (ICT)
5.4.2.10 Vulnerability Mangement-Middle East and Africa-Telecommunication (ICT)
5.4.2.11 Other Cyber Security Solutions-Middle East and Africa-Telecommunication (ICT)
5.5 Cyber Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1 Cyber Security-Middle East and Africa-Healthcare and Life Science (ICT), By Segments
5.5.1.1 Network Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.2 Application Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.3 Content Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.4 End-Point Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.5 Wireless Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2 Cyber Security-Middle East and Africa-Healthcare and Life Science (ICT), By Solutions
5.5.2.1 Identity Access Management (IAM)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.2 Risk and Compliance Management-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.3 Web-Filtering-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.4 Data Encryption Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.5 Data Leakage & Prevention (DLP)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.6 Unified Threat Mangement (UTM)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.7 Data Recovery Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.9 Firewall-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.10 Vulnerability Mangement-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.11 Other Cyber Security Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
5.6 Cyber Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1 Cyber Security-Middle East and Africa-Retail and Wholesale Distribution (ICT), By Segments
5.6.1.1 Network Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.2 Application Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.3 Content Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.4 End-Point Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.5 Wireless Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2 Cyber Security-Middle East and Africa-Retail and Wholesale Distribution (ICT), By Solutions
5.6.2.1 Identity Access Management (IAM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.2 Web-Filtering-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.3 Data Encryption Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.6 Data Recovery Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.7 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.8 Firewall-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.9 Vulnerability Mangement-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.10 Risk and Compliance Management-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.11 Other Cyber Security Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
6 Cyber Security-Middle East and Africa, By Services
6.1 Cyber Security-Middle East and Africa-Consulting And Design
6.1.1 Cyber Security-Middle East and Africa-Consulting And Design, By Solutions
6.1.1.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Consulting
6.2 Cyber Security-Middle East and Africa-Integration and Design
6.2.1 Cyber Security-Middle East and Africa-Integration and Design, By Solutions
6.2.1.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Integration and Design
6.3 Cyber Security-Middle East and Africa-Managed Security
7 Cyber Security-Middle East and Africa, By Solutions
7.1 IAM (Identity Access Management)-Middle East and Africa
7.1.1 IAM (Identity Access Management)-Middle East and Africa, By Industries
7.1.1.1 Identity Access Management (IAM)-Middle East and Africa-Government (ICT)
7.1.1.2 Identity Access Management (IAM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.1.1.3 Identity Access Management (IAM)-Middle East and Africa-Manufacturing (ICT)
7.1.1.4 Identity Access Management (IAM)-Middle East and Africa-Telecommunication (ICT)
7.1.1.5 Identity Access Management (IAM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.1.1.6 Identity Access Management (IAM)-Middle East and Africa-Healthcare and Life Science (ICT)
7.1.2 IAM (Identity Access Management)-Middle East and Africa, By Companies
7.1.2.1 IAM (Identity Access Management)-CA Technologies-Middle East and Africa
7.1.3 IAM (Identity Access Management)-Middle East and Africa, By Technologies
7.1.3.1 Provisioning-Middle East and Africa
7.1.3.2 Directories-Middle East and Africa
7.1.3.3 Single Sign On-Middle East and Africa
7.1.3.4 Advanced Authentication-Middle East and Africa
7.1.3.5 Password Management-Middle East and Africa
7.1.3.6 Audit and Governance-Middle East and Africa
7.2 Web-Filtering-Middle East and Africa
7.2.1 Web-Filtering-Middle East and Africa, By Industries
7.2.1.1 Web-Filtering-Middle East and Africa-Government (ICT)
7.2.1.2 Web-Filtering-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.2.1.3 Web-Filtering-Middle East and Africa-Manufacturing (ICT)
7.2.1.4 Web-Filtering-Middle East and Africa-Telecommunication (ICT)
7.2.1.5 Web-Filtering-Middle East and Africa-Healthcare and Life Science (ICT)
7.2.1.6 Web-Filtering-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.3 Data Encryption Solutions-Middle East and Africa
7.3.1 Data Encryption Solutions-Middle East and Africa, By Industries
7.3.1.1 Data Encryption Solutions-Middle East and Africa-Government (ICT)
7.3.1.2 Data Encryption Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.3.1.3 Data Encryption Solutions-Middle East and Africa-Manufacturing (ICT)
7.3.1.4 Data Encryption Solutions-Middle East and Africa-Telecommunication (ICT)
7.3.1.5 Data Encryption Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
7.3.1.6 Data Encryption Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.4 Data Leakage & Prevention (DLP)-Middle East and Africa
7.5 Unified Threat Mangement (UTM)-Middle East and Africa
7.5.1 Unified Threat Mangement (UTM)-Middle East and Africa, By Industries
7.5.1.1 Unified Threat Mangement (UTM)-Middle East and Africa-Government (ICT)
7.5.1.2 Unified Threat Mangement (UTM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.5.1.3 Unified Threat Mangement (UTM)-Middle East and Africa-Manufacturing (ICT)
7.5.1.4 Unified Threat Mangement (UTM)-Middle East and Africa-Telecommunication (ICT)
7.5.1.5 Unified Threat Mangement (UTM)-Middle East and Africa-Healthcare and Life Science (ICT)
7.5.1.6 Unified Threat Mangement (UTM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.6 Data Recovery Solutions-Middle East and Africa
7.6.1 Data Recovery Solutions-Middle East and Africa, By Industries
7.6.1.1 Data Recovery Solutions-Middle East and Africa-Government (ICT)
7.6.1.2 Data Recovery Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.6.1.3 Data Recovery Solutions-Middle East and Africa-Manufacturing (ICT)
7.6.1.4 Data Recovery Solutions-Middle East and Africa-Telecommunication (ICT)
7.6.1.5 Data Recovery Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.6.1.6 Data Recovery Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
7.7 Risk and Compliance Management-Middle East and Africa
7.7.1 Risk and Compliance Management-Middle East and Africa, By Industries
7.7.1.1 Risk and Compliance Management-Middle East and Africa-Government (ICT)
7.7.1.2 Risk and Compliance Management-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.7.1.3 Risk and Compliance Management-Middle East and Africa-Manufacturing (ICT)
7.7.1.4 Risk and Compliance Management-Middle East and Africa-Telecommunication (ICT)
7.7.1.5 Risk and Compliance Management-Middle East and Africa-Healthcare and Life Science (ICT)
7.7.1.6 Risk and Compliance Management-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa
7.8.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Industries
7.8.1.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.8.1.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Government (ICT)
7.8.1.3 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Telecommunication (ICT)
7.8.1.4 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Healthcare and Life Science (ICT)
7.8.1.5 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.8.1.6 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Aerospace and Defense (ICT)
7.8.1.7 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Transportation and Logistics (ICT)
7.8.1.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Others
7.8.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Services
7.8.2.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Consulting
7.8.2.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Integration and Design
7.8.2.3 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-IT Training and Education
7.8.2.4 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Managed Services (ICT)
7.8.3 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Deployments
7.8.3.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-On-Premise (ICT)
7.8.3.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Hosted (ICT)
7.8.4 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Types
7.8.4.1 Network Based IPS/IDS-Middle East and Africa
7.8.4.2 Host Based IPS/IDS-Middle East and Africa
7.8.4.3 Wireless IPS/IDS-Middle East and Africa
7.8.5 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Components
7.8.5.1 IPS/IDS Hardware-Middle East and Africa
7.8.5.2 IPS/IDS Services-Middle East and Africa
7.8.5.3 IPS/IDS Software-Middle East and Africa
7.9 Firewall-Middle East and Africa
7.9.1 Firewall-Middle East and Africa, By Industries
7.9.1.1 Firewall-Middle East and Africa-Government (ICT)
7.9.1.2 Firewall-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.9.1.3 Firewall-Middle East and Africa-Manufacturing (ICT)
7.9.1.4 Firewall-Middle East and Africa-Telecommunication (ICT)
7.9.1.5 Firewall-Middle East and Africa-Healthcare and Life Science (ICT)
7.9.1.6 Firewall-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.10 Vulnerability Mangement-Middle East and Africa
7.10.1 Vulnerability Mangement-Middle East and Africa, By Industries
7.10.1.1 Vulnerability Mangement-Middle East and Africa-Government (ICT)
7.10.1.2 Vulnerability Mangement-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.10.1.3 Vulnerability Mangement-Middle East and Africa-Manufacturing (ICT)
7.10.1.4 Vulnerability Mangement-Middle East and Africa-Telecommunication (ICT)
7.10.1.5 Vulnerability Mangement-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.10.1.6 Vulnerability Mangement-Middle East and Africa-Healthcare and Life Science (ICT)
7.11 Other Cyber Security Solutions-Middle East and Africa
7.11.1 Other Cyber Security Solutions-Middle East and Africa, By Industries
7.11.1.1 Other Cyber Security Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.11.1.2 Other Cyber Security Solutions-Middle East and Africa-Government (ICT)
7.11.1.3 Other Cyber Security Solutions-Middle East and Africa-Manufacturing (ICT)
7.11.1.4 Other Cyber Security Solutions-Middle East and Africa-Telecommunication (ICT)
7.11.1.5 Other Cyber Security Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
7.11.1.6 Other Cyber Security Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.11.2 Other Cyber Security Solutions-Middle East and Africa, By Solutions
7.11.2.1 Antivirus-Middle East and Africa
7.12 Security Information & Event Mgt. (SIEM)-Middle East and Africa
7.12.1 Security Information & Event Mgt. (SIEM)-Middle East and Africa, By MacroIndicators
7.12.1.1 Security Information & Event Mgt. (SIEM)-ICT Expenditure-Middle East and Africa
8 Cyber Security-Middle East and Africa, By Companies
8.1 Cyber Security-Middle East and Africa-Northrop Grumman
8.2 Cyber Security-Middle East and Africa-Symantec Corporation
8.3 Cyber Security-Middle East and Africa-Cisco Systems
8.4 Cyber Security-Middle East and Africa-Check Point Software Technologies
8.5 Cyber Security-Middle East and Africa-Fortinet
8.6 Cyber Security-Middle East and Africa-F-Secure Corporation
8.7 Cyber Security-Middle East and Africa-General Dynamics Corporation
8.8 Cyber Security-CA Technologies-Middle East and Africa
8.8.1 Cyber Security-CA Technologies-Middle East and Africa, By Solutions
8.8.1.1 IAM (Identity Access Management)-CA Technologies-Middle East and Africa
8.9 Cyber Security-International Business Machines Corporation (IBM)-Middle East and Africa
8.9.1 Cyber Security-International Business Machines Corporation (IBM)-Middle East and Africa, By Solutions
8.9.1.1 IAM (Identity Access Management)-International Business Machines Corporation (IBM)-Middle East and Africa
8.10 Cyber Security-Microsoft Corporation-Middle East and Africa
8.10.1 Cyber Security-Microsoft Corporation-Middle East and Africa, By Solutions
8.10.1.1 IAM (Identity Access Management)-Microsoft Corporation-Middle East and Africa
8.11 Cyber Security-Middle East and Africa-Bitdefender