Chapter 1. Methodology and Scope
1.1. Market Segmentation & Scope
1.2. Research Methodology
1.3. Research Scope & Assumption
1.4. Information Procurement
1.4.1. Purchased Database
1.4.2. GVR’s Internal Database
1.4.3. Secondary Sources & Third-Party Perspectives
1.4.4. Primary Research
1.5. Information Analysis
1.5.1. Data Analysis Models
1.6. Market Formulation & Data Visualization
1.7. Data Validation & Publishing
Chapter 2. Cyber Security Market Intelligence
2.1. Category Definition
2.2. Category Intelligence
v2.2.1. Market Size
2.2.2. Trends
2.2.3. Drivers
2.2.4. Challenges
2.2.5. Segmental Outlook
2.2.6. Regional Outlook
2.3. Technology
2.3.1. Emerging Technology
2.3.2. Best Practices in the Industry
2.4. Regulatory Landscape
2.5. Porter’s Five Forces Analysis
2.5.1. Bargaining power of suppliers
2.5.2. Bargaining power of buyers
2.5.3. Threat of substitutes
2.5.4. Threat of new entrants
2.5.5. Competitive rivalry
Chapter 3. Cyber Security - Supplier Intelligence
3.1. Identification of top 12 suppliers
3.1.1. BAE Systems Plc
3.1.2. Broadcom, Inc.
3.1.3. Delinea Inc.
3.1.4. Check Point Software Technology Ltd.
3.1.5. Cisco Systems, Inc.
3.1.6. FireEye, Inc.
3.1.7. Fortinet, Inc.
3.1.8. IBM Corporation
3.1.9. Lockheed Martin Corporation
3.1.10. LogRhythm, Inc.
3.1.11. McAfee, LLC.
3.1.12. Palo Alto Networks, Inc
3.2. Cyber Security - Supplier’s Landscape
3.3. Cyber Security - Supplier’s Ranking Methodology
3.3.1. Supplier Operational Capabilities
3.3.1.1. Years in Service
3.3.1.2. Industries Served
3.3.1.3. Geographical Service Provision
3.3.1.4. Employee Strength
3.3.1.5. Revenue
3.3.1.6. Certifications
3.3.1.7. Key Clients
3.3.2. Supplier Functional Capabilities
3.3.2.1. Deployment
3.3.2.1.1. Cloud
3.3.2.1.2. On Premise
3.3.2.2. Type of Threat
3.3.2.2.1. Phishing
3.3.2.2.2. Ransomware
3.3.2.2.3. Malware
3.3.2.3. Security Issues
3.3.2.3.1. Audit and Compliance
3.3.2.3.2. Remote Access
3.3.2.3.3. Privileged Access Management
3.3.2.3.4. Incident Response
3.3.2.4. Cyber Insurance
3.3.2.5. Others
3.4. Cyber Security - Suppliers Scoring Criteria
3.5. Cyber Security - Suppliers Positional Matrix (SPM)
3.5.1. Rulers
v3.5.2. Challengers
3.5.3. Loungers
3.5.4. Niches
3.6. Cyber Security - Supplier Market Concentration
3.6.1. Industry structure
3.7. Recommended Cyber Security Service Providers
3.7.1. Service Provider 1 with detailed profile
3.7.2. Service Provider 2 with detailed profile
3.7.3. Service Provider 3 with detailed profile
Chapter 4. Competitive Landscape
4.1. Recent Supplier Developments with Measured Impact
4.1.1. Joint Ventures
4.1.2. Mergers & Acquisitions
4.1.3. Collaborations or Partnerships
4.1.4. Other major developments
4.2. Supply - Demand Analysis
4.2.1. Supply Analysis
4.2.2. Demand Analysis
Chapter 5. Cyber Security - Pricing and Cost Intelligence
5.1. Cost Structure Overview
5.1.1. Cyber Security Experts Salaries
5.1.2. Software/Application Development
5.1.3. Hardware
5.1.4. Network and Servers
5.1.5. Maintenance and Upgrades
5.1.6. Facilities Costs
5.1.7. Others
5.2. Factors Impacting Cyber Security Service Prices
5.3. Pricing Model Analysis
5.3.1. Licensing based or,
5.3.2. Cloud-only SaaS Model or,
5.3.3. Service based or,
5.3.4. All-Inclusive Models or,
5.3.5. Competitive pricing model or,
5.3.6. Others
5.4. Cyber Security Service Prices - Few Examples
Chapter 6. Sourcing Intelligence
6.1. Engagement Model
6.1.1. Fully Outsourcing Model or,
6.1.2. Partial/Hybrid Outsourcing Model or,
6.1.3. In-house Product Development Model or,
6.1.4. Shared Service Model
6.2. Operating Model
6.2.1. Basic Provider or,
6.2.2. Approved Provider or,
6.2.3. Performance-based Model or,
6.2.4. Others
6.3. KPI/SLA Elements
6.4. Negotiation Strategies
6.5. LCC/BCC Analysis
6.5.1. China
6.5.2. India
6.5.3. Singapore
6.5.4. Vietnam
6.5.5. Sweden
6.5.6. Insights on top 2 LCC/BCC Countries
Component wise cost break down for better negotiation for the client, highlights the key cost drivers in the market with future price fluctuation for different materials (e.g.: steel, aluminum, etc.) used in the production process
Offering cost transparency for different products / services procured by the client. A typical report involves 2-3 case scenarios helping clients to select the best suited engagement with the supplier
Determining and forecasting salaries for specific skill set labor to make decision on outsourcing vs in-house.
A typical newsletter study by capturing latest information for specific suppliers related to: M&As, technological innovations, expansion, litigations, bankruptcy etc.