You are here :   Home     Information and Communication Technology     Security     Cyber Security    
Real Time Market Research & Industry Analysis - MicroMarketMonitor

Middle East and Africa Cyber Security Market Research Report

  • Report Code: CY 1001
  • Publish Date: 18 Dec 2014
  • Next Update Date: 18 Mar 2015
  
Description
Table of Contents
Customer Intelligence

The Middle East & Africa (MEA) cyber security market is expected to grow from $7.06 billion in 2014 to $13.43 billion in 2019, at a CAGR of 13.7% for the period 2014 to 2019. The cyber security market is primarily driven by the strict governmental regulations and compliances due to increased security threats in the region.

Cyber security is a broad collection of technologies, solutions, services, compliances, and risk management approaches to protect an organizations’ and users’ personal and professional data from cyber crimes. The government, public utilities, and enterprises are all dependent on the internet, wireless technologies, and cloud-based services. Due to this dependency, cyber attacks have shown exponential increase in the past few years and have generated the need for unified cyber security solutions to support the enhanced enterprise mobility and strict data disclosure laws. Cyber security products are defined by possessing the capability to provide access management, authentication procedures, detection and responses to incidents, security updates or patch management, data recovery, mitigation of impacts, and risk & compliance management. The cyber security market is experiencing a booming phase because of the need for global cyber security capacity establishment built for a secure and resilient cyberspace.

The Middle East & Africa region comprises economies such as Israel, U.A.E, Iran, and South Africa. The government regulations are very stringent in case of internet, media, publications, surveillance and monitoring in the MEA region. Companies operating in this region need to conduct their business in a highly visible manner, which should be totally in adherence to policies and existing regulations. This factor would chiefly drive the cyber security market in the region. The government initiatives as well as investments have increased in countries such as Saudi Arabia, U.A.E, and South Africa, for avoiding data breaches, thus resulting in continual expansion opportunities for cyber security vendors across the region.

The report further provides competitive benchmarking of the leading players in the industry such as Cisco Systems, IBM, Northrop Grumman, CSC, and Symantec, among others, in terms of their product offerings, key strategies, and operational parameters. The report provides market trends, overall adoption scenarios, competitive landscapes, key drivers, restraints, and opportunities in this market. The report aims in estimating the current size and the future growth potential of this market across the different types, verticals, and countries.

 

Report Options:

The market segmentation detailed in the report is as given below:

  • By Types:
    • Network security, endpoint security, application security, content security, wireless security, cloud security

 

  • By Solutions:
    • Identity and access management, risk and compliance, encryption, data loss protection, unified threat management, firewall, anti-virus and anti-malware, IDS/IPS, security and vulnerability management, disaster recovery, DDoS mitigation, and web filtering, among others

 

  • By Services:
    • Consulting, design and integration, risk and threat assessment, managed security service, training and education

 

  • By Verticals:
    • Aerospace, defense and intelligence, government and public utilities, banking and financial service institutes, telecom and IT, healthcare, retail, and manufacturing, among others

 

Customization Options:

Along with the MMM assessment, customize the report in alignment with your company’s specific needs. The following customization options provide a comprehensive summary of the industry standards and a deep dive analysis:

  • Cyber Security Solutions Matrix:
    • A comprehensive analysis and benchmarking of security types, solutions, and services in the cyber security market

 

  • Cyber Security Competitive Benchmarking:
    • Value-chain evaluation using events, developments, market data for vendors in the market ecosystem, across various industrial verticals and market segmentation
    • To discover hidden opportunities by connecting related markets using cascaded value chain analysis

 

  • Cyber Security Technology Watch:
    • Updates on the current technology trends in IDS/IPS, cryptographic techniques, firewall technologies

 

  • Cyber Security Vendor Landscaping:
    • Vendor market watch and predictions, vendor market shares and offerings, analysis of adoption trends and market dominance (leaders, challengers, and followers)
    • SWOT analysis of vendor cyber security lab offerings

 

  • Cyber Security Regional Market Data Tracker:
    • Regional and country-specific cyber security market forecast and analysis
    • The identification of key vertical segments, by country
    • An analysis of cyber security infrastructure, by country

 

  • Cyber Security Vertical Analysis:
    • An analysis of different industrial verticals by types, solutions, and services
    • Industry Verticals: Aerospace, defense and intelligence, government and public utilities, banking and financial service institutes, telecom and IT, healthcare, retail, and manufacturing, among others


1 Introduction
1.1 Objective of the study
1.2 Market Definitions
1.3 Market Segmentation & Aspects Covered
1.4 Research Methodology
1.4.1 Assumptions (Market Size, Forecast, etc)
2 Executive Summary
3 Market Overview
4 Cyber Security-Middle East and Africa, By Segments
4.1 End-Point Security-Middle East and Africa
4.1.1 End-Point Security-Middle East and Africa, By Industries
4.1.1.1 End-Point Security-Middle East and Africa-Government (ICT)
4.1.1.2 End-Point Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.1.1.3 End-Point Security-Middle East and Africa-Manufacturing (ICT)
4.1.1.4 End-Point Security-Middle East and Africa-Telecommunication (ICT)
4.1.1.5 End-Point Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.1.1.6 End-Point Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.2 Application Security-Middle East and Africa
4.2.1 Application Security-Middle East and Africa, By Industries
4.2.1.1 Application Security-Middle East and Africa-Government (ICT)
4.2.1.2 Application Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.2.1.3 Application Security-Middle East and Africa-Manufacturing (ICT)
4.2.1.4 Application Security-Middle East and Africa-Telecommunication (ICT)
4.2.1.5 Application Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.2.1.6 Application Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.3 Content Security-Middle East and Africa
4.3.1 Content Security-Middle East and Africa, By Industries
4.3.1.1 Content Security-Middle East and Africa-Government (ICT)
4.3.1.2 Content Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.3.1.3 Content Security-Middle East and Africa-Manufacturing (ICT)
4.3.1.4 Content Security-Middle East and Africa-Telecommunication (ICT)
4.3.1.5 Content Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.3.1.6 Content Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.4 Wireless Security-Middle East and Africa
4.4.1 Wireless Security-Middle East and Africa, By Industries
4.4.1.1 Wireless Security-Middle East and Africa-Government (ICT)
4.4.1.2 Wireless Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
4.4.1.3 Wireless Security-Middle East and Africa-Manufacturing (ICT)
4.4.1.4 Wireless Security-Middle East and Africa-Telecommunication (ICT)
4.4.1.5 Wireless Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
4.4.1.6 Wireless Security-Middle East and Africa-Healthcare and Life Science (ICT)
4.5 Network Security-Middle East and Africa
4.5.1 Network Security-Middle East and Africa, By Endusers
4.5.1.1 Network Security-Banking Financial Services and Insurance (BFSI) (ICT)-Middle East and Africa
4.5.1.2 Network Security-Manufacturing (ICT)-Middle East and Africa
4.5.1.3 Network Security-IT and Telecommunication (ICT)-Middle East and Africa
4.5.1.4 Network Security-Healthcare and Life Science -Middle East and Africa
5 Cyber Security-Middle East and Africa, By Industries
5.1 Cyber Security-Middle East and Africa-Government (ICT)
5.1.1 Cyber Security-Middle East and Africa-Government (ICT), By Segments
5.1.1.1 Network Security-Middle East and Africa-Government (ICT)
5.1.1.2 Application Security-Middle East and Africa-Government (ICT)
5.1.1.3 Content Security-Middle East and Africa-Government (ICT)
5.1.1.4 End-Point Security-Middle East and Africa-Government (ICT)
5.1.1.5 Wireless Security-Middle East and Africa-Government (ICT)
5.1.2 Cyber Security-Middle East and Africa-Government (ICT), By Solutions
5.1.2.1 Identity Access Management (IAM)-Middle East and Africa-Government (ICT)
5.1.2.2 Web-Filtering-Middle East and Africa-Government (ICT)
5.1.2.3 Data Encryption Solutions-Middle East and Africa-Government (ICT)
5.1.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Government (ICT)
5.1.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Government (ICT)
5.1.2.6 Data Recovery Solutions-Middle East and Africa-Government (ICT)
5.1.2.7 Risk and Compliance Management-Middle East and Africa-Government (ICT)
5.1.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Government (ICT)
5.1.2.9 Firewall-Middle East and Africa-Government (ICT)
5.1.2.10 Vulnerability Mangement-Middle East and Africa-Government (ICT)
5.1.2.11 Other Cyber Security Solutions-Middle East and Africa-Government (ICT)
5.2 Cyber Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1 Cyber Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT), By Segments
5.2.1.1 Network Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.2 Application Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.3 Content Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.4 End-Point Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.1.5 Wireless Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2 Cyber Security-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT), By Solutions
5.2.2.1 Identity Access Management (IAM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.2 Web-Filtering-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.3 Data Encryption Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.6 Data Recovery Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.7 Risk and Compliance Management-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.9 Firewall-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.10 Vulnerability Mangement-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.2.2.11 Other Cyber Security Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
5.3 Cyber Security-Middle East and Africa-Manufacturing (ICT)
5.3.1 Cyber Security-Middle East and Africa-Manufacturing (ICT), By Segments
5.3.1.1 Network Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.2 Application Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.3 Content Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.4 End-Point Security-Middle East and Africa-Manufacturing (ICT)
5.3.1.5 Wireless Security-Middle East and Africa-Manufacturing (ICT)
5.3.2 Cyber Security-Middle East and Africa-Manufacturing (ICT), By Solutions
5.3.2.1 Identity Access Management (IAM)-Middle East and Africa-Manufacturing (ICT)
5.3.2.2 Web-Filtering-Middle East and Africa-Manufacturing (ICT)
5.3.2.3 Data Encryption Solutions-Middle East and Africa-Manufacturing (ICT)
5.3.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Manufacturing (ICT)
5.3.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Manufacturing (ICT)
5.3.2.6 Data Recovery Solutions-Middle East and Africa-Manufacturing (ICT)
5.3.2.7 Risk and Compliance Management-Middle East and Africa-Manufacturing (ICT)
5.3.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Manufacturing (ICT)
5.3.2.9 Firewall-Middle East and Africa-Manufacturing (ICT)
5.3.2.10 Vulnerability Mangement-Middle East and Africa-Manufacturing (ICT)
5.3.2.11 Other Cyber Security Solutions-Middle East and Africa-Manufacturing (ICT)
5.4 Cyber Security-Middle East and Africa-Telecommunication (ICT)
5.4.1 Cyber Security-Middle East and Africa-Telecommunication (ICT), By Segments
5.4.1.1 Network Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.2 Application Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.3 Content Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.4 End-Point Security-Middle East and Africa-Telecommunication (ICT)
5.4.1.5 Wireless Security-Middle East and Africa-Telecommunication (ICT)
5.4.2 Cyber Security-Middle East and Africa-Telecommunication (ICT), By Solutions
5.4.2.1 Identity Access Management (IAM)-Middle East and Africa-Telecommunication (ICT)
5.4.2.2 Web-Filtering-Middle East and Africa-Telecommunication (ICT)
5.4.2.3 Data Encryption Solutions-Middle East and Africa-Telecommunication (ICT)
5.4.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Telecommunication (ICT)
5.4.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Telecommunication (ICT)
5.4.2.6 Data Recovery Solutions-Middle East and Africa-Telecommunication (ICT)
5.4.2.7 Risk and Compliance Management-Middle East and Africa-Telecommunication (ICT)
5.4.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Telecommunication (ICT)
5.4.2.9 Firewall-Middle East and Africa-Telecommunication (ICT)
5.4.2.10 Vulnerability Mangement-Middle East and Africa-Telecommunication (ICT)
5.4.2.11 Other Cyber Security Solutions-Middle East and Africa-Telecommunication (ICT)
5.5 Cyber Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1 Cyber Security-Middle East and Africa-Healthcare and Life Science (ICT), By Segments
5.5.1.1 Network Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.2 Application Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.3 Content Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.4 End-Point Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.1.5 Wireless Security-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2 Cyber Security-Middle East and Africa-Healthcare and Life Science (ICT), By Solutions
5.5.2.1 Identity Access Management (IAM)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.2 Risk and Compliance Management-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.3 Web-Filtering-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.4 Data Encryption Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.5 Data Leakage & Prevention (DLP)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.6 Unified Threat Mangement (UTM)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.7 Data Recovery Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.9 Firewall-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.10 Vulnerability Mangement-Middle East and Africa-Healthcare and Life Science (ICT)
5.5.2.11 Other Cyber Security Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
5.6 Cyber Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1 Cyber Security-Middle East and Africa-Retail and Wholesale Distribution (ICT), By Segments
5.6.1.1 Network Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.2 Application Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.3 Content Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.4 End-Point Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.1.5 Wireless Security-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2 Cyber Security-Middle East and Africa-Retail and Wholesale Distribution (ICT), By Solutions
5.6.2.1 Identity Access Management (IAM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.2 Web-Filtering-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.3 Data Encryption Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.4 Data Leakage & Prevention (DLP)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.5 Unified Threat Mangement (UTM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.6 Data Recovery Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.7 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.8 Firewall-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.9 Vulnerability Mangement-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.10 Risk and Compliance Management-Middle East and Africa-Retail and Wholesale Distribution (ICT)
5.6.2.11 Other Cyber Security Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
6 Cyber Security-Middle East and Africa, By Services
6.1 Cyber Security-Middle East and Africa-Consulting And Design
6.1.1 Cyber Security-Middle East and Africa-Consulting And Design, By Solutions
6.1.1.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Consulting
6.2 Cyber Security-Middle East and Africa-Integration and Design
6.2.1 Cyber Security-Middle East and Africa-Integration and Design, By Solutions
6.2.1.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Integration and Design
6.3 Cyber Security-Middle East and Africa-Managed Security
7 Cyber Security-Middle East and Africa, By Solutions
7.1 IAM (Identity Access Management)-Middle East and Africa
7.1.1 IAM (Identity Access Management)-Middle East and Africa, By Industries
7.1.1.1 Identity Access Management (IAM)-Middle East and Africa-Government (ICT)
7.1.1.2 Identity Access Management (IAM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.1.1.3 Identity Access Management (IAM)-Middle East and Africa-Manufacturing (ICT)
7.1.1.4 Identity Access Management (IAM)-Middle East and Africa-Telecommunication (ICT)
7.1.1.5 Identity Access Management (IAM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.1.1.6 Identity Access Management (IAM)-Middle East and Africa-Healthcare and Life Science (ICT)
7.1.2 IAM (Identity Access Management)-Middle East and Africa, By Companies
7.1.2.1 IAM (Identity Access Management)-CA Technologies-Middle East and Africa
7.1.3 IAM (Identity Access Management)-Middle East and Africa, By Technologies
7.1.3.1 Provisioning-Middle East and Africa
7.1.3.2 Directories-Middle East and Africa
7.1.3.3 Single Sign On-Middle East and Africa
7.1.3.4 Advanced Authentication-Middle East and Africa
7.1.3.5 Password Management-Middle East and Africa
7.1.3.6 Audit and Governance-Middle East and Africa
7.2 Web-Filtering-Middle East and Africa
7.2.1 Web-Filtering-Middle East and Africa, By Industries
7.2.1.1 Web-Filtering-Middle East and Africa-Government (ICT)
7.2.1.2 Web-Filtering-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.2.1.3 Web-Filtering-Middle East and Africa-Manufacturing (ICT)
7.2.1.4 Web-Filtering-Middle East and Africa-Telecommunication (ICT)
7.2.1.5 Web-Filtering-Middle East and Africa-Healthcare and Life Science (ICT)
7.2.1.6 Web-Filtering-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.3 Data Encryption Solutions-Middle East and Africa
7.3.1 Data Encryption Solutions-Middle East and Africa, By Industries
7.3.1.1 Data Encryption Solutions-Middle East and Africa-Government (ICT)
7.3.1.2 Data Encryption Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.3.1.3 Data Encryption Solutions-Middle East and Africa-Manufacturing (ICT)
7.3.1.4 Data Encryption Solutions-Middle East and Africa-Telecommunication (ICT)
7.3.1.5 Data Encryption Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
7.3.1.6 Data Encryption Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.4 Data Leakage & Prevention (DLP)-Middle East and Africa
7.5 Unified Threat Mangement (UTM)-Middle East and Africa
7.5.1 Unified Threat Mangement (UTM)-Middle East and Africa, By Industries
7.5.1.1 Unified Threat Mangement (UTM)-Middle East and Africa-Government (ICT)
7.5.1.2 Unified Threat Mangement (UTM)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.5.1.3 Unified Threat Mangement (UTM)-Middle East and Africa-Manufacturing (ICT)
7.5.1.4 Unified Threat Mangement (UTM)-Middle East and Africa-Telecommunication (ICT)
7.5.1.5 Unified Threat Mangement (UTM)-Middle East and Africa-Healthcare and Life Science (ICT)
7.5.1.6 Unified Threat Mangement (UTM)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.6 Data Recovery Solutions-Middle East and Africa
7.6.1 Data Recovery Solutions-Middle East and Africa, By Industries
7.6.1.1 Data Recovery Solutions-Middle East and Africa-Government (ICT)
7.6.1.2 Data Recovery Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.6.1.3 Data Recovery Solutions-Middle East and Africa-Manufacturing (ICT)
7.6.1.4 Data Recovery Solutions-Middle East and Africa-Telecommunication (ICT)
7.6.1.5 Data Recovery Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.6.1.6 Data Recovery Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
7.7 Risk and Compliance Management-Middle East and Africa
7.7.1 Risk and Compliance Management-Middle East and Africa, By Industries
7.7.1.1 Risk and Compliance Management-Middle East and Africa-Government (ICT)
7.7.1.2 Risk and Compliance Management-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.7.1.3 Risk and Compliance Management-Middle East and Africa-Manufacturing (ICT)
7.7.1.4 Risk and Compliance Management-Middle East and Africa-Telecommunication (ICT)
7.7.1.5 Risk and Compliance Management-Middle East and Africa-Healthcare and Life Science (ICT)
7.7.1.6 Risk and Compliance Management-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa
7.8.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Industries
7.8.1.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.8.1.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Government (ICT)
7.8.1.3 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Telecommunication (ICT)
7.8.1.4 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Healthcare and Life Science (ICT)
7.8.1.5 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.8.1.6 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Aerospace and Defense (ICT)
7.8.1.7 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Transportation and Logistics (ICT)
7.8.1.8 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Others
7.8.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Services
7.8.2.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Consulting
7.8.2.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Integration and Design
7.8.2.3 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-IT Training and Education
7.8.2.4 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Managed Services (ICT)
7.8.3 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Deployments
7.8.3.1 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-On-Premise (ICT)
7.8.3.2 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa-Hosted (ICT)
7.8.4 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Types
7.8.4.1 Network Based IPS/IDS-Middle East and Africa
7.8.4.2 Host Based IPS/IDS-Middle East and Africa
7.8.4.3 Wireless IPS/IDS-Middle East and Africa
7.8.5 Intrusion Prevention System/Intrusion Detection System (IPS/IDS)-Middle East and Africa, By Components
7.8.5.1 IPS/IDS Hardware-Middle East and Africa
7.8.5.2 IPS/IDS Services-Middle East and Africa
7.8.5.3 IPS/IDS Software-Middle East and Africa
7.9 Firewall-Middle East and Africa
7.9.1 Firewall-Middle East and Africa, By Industries
7.9.1.1 Firewall-Middle East and Africa-Government (ICT)
7.9.1.2 Firewall-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.9.1.3 Firewall-Middle East and Africa-Manufacturing (ICT)
7.9.1.4 Firewall-Middle East and Africa-Telecommunication (ICT)
7.9.1.5 Firewall-Middle East and Africa-Healthcare and Life Science (ICT)
7.9.1.6 Firewall-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.10 Vulnerability Mangement-Middle East and Africa
7.10.1 Vulnerability Mangement-Middle East and Africa, By Industries
7.10.1.1 Vulnerability Mangement-Middle East and Africa-Government (ICT)
7.10.1.2 Vulnerability Mangement-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.10.1.3 Vulnerability Mangement-Middle East and Africa-Manufacturing (ICT)
7.10.1.4 Vulnerability Mangement-Middle East and Africa-Telecommunication (ICT)
7.10.1.5 Vulnerability Mangement-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.10.1.6 Vulnerability Mangement-Middle East and Africa-Healthcare and Life Science (ICT)
7.11 Other Cyber Security Solutions-Middle East and Africa
7.11.1 Other Cyber Security Solutions-Middle East and Africa, By Industries
7.11.1.1 Other Cyber Security Solutions-Middle East and Africa-Banking,Financial Services and Insurance (BFSI) (ICT)
7.11.1.2 Other Cyber Security Solutions-Middle East and Africa-Government (ICT)
7.11.1.3 Other Cyber Security Solutions-Middle East and Africa-Manufacturing (ICT)
7.11.1.4 Other Cyber Security Solutions-Middle East and Africa-Telecommunication (ICT)
7.11.1.5 Other Cyber Security Solutions-Middle East and Africa-Healthcare and Life Science (ICT)
7.11.1.6 Other Cyber Security Solutions-Middle East and Africa-Retail and Wholesale Distribution (ICT)
7.11.2 Other Cyber Security Solutions-Middle East and Africa, By Solutions
7.11.2.1 Antivirus-Middle East and Africa
7.12 Security Information & Event Mgt. (SIEM)-Middle East and Africa
7.12.1 Security Information & Event Mgt. (SIEM)-Middle East and Africa, By MacroIndicators
7.12.1.1 Security Information & Event Mgt. (SIEM)-ICT Expenditure-Middle East and Africa
8 Cyber Security-Middle East and Africa, By Companies
8.1 Cyber Security-Middle East and Africa-Northrop Grumman
8.2 Cyber Security-Middle East and Africa-Symantec Corporation
8.3 Cyber Security-Middle East and Africa-Cisco Systems
8.4 Cyber Security-Middle East and Africa-Check Point Software Technologies
8.5 Cyber Security-Middle East and Africa-Fortinet 
8.6 Cyber Security-Middle East and Africa-F-Secure Corporation
8.7 Cyber Security-Middle East and Africa-General Dynamics Corporation
8.8 Cyber Security-CA Technologies-Middle East and Africa
8.8.1 Cyber Security-CA Technologies-Middle East and Africa, By Solutions
8.8.1.1 IAM (Identity Access Management)-CA Technologies-Middle East and Africa
8.9 Cyber Security-International Business Machines Corporation (IBM)-Middle East and Africa
8.9.1 Cyber Security-International Business Machines Corporation (IBM)-Middle East and Africa, By Solutions
8.9.1.1 IAM (Identity Access Management)-International Business Machines Corporation (IBM)-Middle East and Africa
8.10 Cyber Security-Microsoft Corporation-Middle East and Africa
8.10.1 Cyber Security-Microsoft Corporation-Middle East and Africa, By Solutions
8.10.1.1 IAM (Identity Access Management)-Microsoft Corporation-Middle East and Africa
8.11 Cyber Security-Middle East and Africa-Bitdefender