Предпринимательский подход

четверг, 12 ноября 2015 г.

Недоставленное сообщение

Return-Path: <ali.ali-an@yandex.by>
Received: from mxfront3m.mail.yandex.net (mxfront3m.mail.yandex.net [37.140.138.53])
by forward17m.cmail.yandex.net (Yandex) with ESMTP id 1F17B21035
for <bugmenot@asdasd.ru>; Thu, 12 Nov 2015 16:23:24 +0300 (MSK)
Received: from mxfront3m.mail.yandex.net ([127.0.0.1])
by mxfront3m.mail.yandex.net with LMTP id m1n0brSG
for <ali.ali-an@yandex.by>; Thu, 12 Nov 2015 16:22:40 +0300
Received: from smtp.vgtelecomreports.com (smtp.vgtelecomreports.com [202.0.103.20])
by mxfront3m.mail.yandex.net (nwsmtp/Yandex) with ESMTP id tgYv1I8Gs2-MaQmJmed;
Thu, 12 Nov 2015 16:22:36 +0300
Authentication-Results: mxfront3m.mail.yandex.net; spf=pass (mxfront3m.mail.yandex.net: domain of vgtelecomreports.com designates 202.0.103.20 as permitted sender) smtp.mail=dorottya.szalai@vgtelecomreports.com; dkim=pass header.i=@vgtelecomreports.com
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns;
d=vgtelecomreports.com; s=smtp;
h=received:from:to:message-id:subject:date:mime-version:reply-to
:content-type;
b=akqczc7fbX2V8L1oO3tNLLJtY6Kjzh5T+iUJ3iv94uKUM4a/NCP38ObX3gwXTuc62
rFZGmMTDwHsD+BKVwTyMLjSCifIdLB3jLEF3gmAhD45knlKWVMWbJVm0ROQbp1hoW
Y68oWLfGGE4dm0jIal1mM27LE6llD28S7dKnFbiFk=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=vgtelecomreports.com; s=smtp;
h= content-type:reply-to:mime-version:date:subject:message-id:to:from;
bh=lLR37u2XZQmNR7xTiponduwQRwcbH3vVjlDrD58R/xI=;
b=Lwm8cbBPIUgDWFemx6lPzXXtC0fSGfqkX4mdkjGp0pzgIbyckPQ9gy/imdWupSzDq
z890RJENHB3exM1nQ4HI0tMrmXTTn4HC/FJbmBRw49w/92VZ/BuqiBr7OTYfLadVe
Apfowii8GrWoC/oczIHFixZWU6gnBcE/LFry6FXkc=
Received: from WIN-ASQ29B6R1EP (WIN-ASQ29B6R1EP [202.0.103.127]) by smtp.vgtelecomreports.com with SMTP;
Thu, 12 Nov 2015 11:00:35 +0000
From: Dorottya Szalai<dorottya.szalai@vgtelecomreports.com>
To: ali.ali-an@yandex.by
Message-Id: <20151112110035.-1037385882@vgtelecomreports.com>
Subject: Top 20 Cyber Security Companies 2015 Report
Date: Thu, 12 Nov 2015 11:00:35 +0000
MIME-Version: 1.0
Reply-To: dorottya.szalai@vgtelecomreports.com
Content-Type: multipart/alternative; boundary="AlternativeBoundary.22222222.22222222"
X-Yandex-Forward: 4d5f734b4dc5e0eef1298172b29bef18
**********

Это письмо отправлено почтовым сервером yandex.ru.

К сожалению, мы вынуждены сообщить Вам о том, что Ваше письмо не может
быть отправлено одному или нескольким адресатам. Причины указаны ниже.

Пожалуйста, не отвечайте на это сообщение.

**********

This is the mail system at host yandex.ru.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

Please, do not reply to this message.


<bugmenot@asdasd.ru>: host asdasd.ru[188.40.82.28] said: 554 5.7.1
<bugmenot@asdasd.ru>: Relay access denied (in reply to RCPT TO command)

Недоставленное сообщение

Return-Path: <ali.ali-an@yandex.by>
Received: from mxfront3m.mail.yandex.net (mxfront3m.mail.yandex.net [37.140.138.53])
by forward3m.mail.yandex.net (Yandex) with ESMTP id C74C56B60C8F
for <raybpayne@gmail.com>; Thu, 12 Nov 2015 16:23:14 +0300 (MSK)
Received: from mxfront3m.mail.yandex.net ([127.0.0.1])
by mxfront3m.mail.yandex.net with LMTP id m1n0brSG
for <ali.ali-an@yandex.by>; Thu, 12 Nov 2015 16:22:40 +0300
Received: from smtp.vgtelecomreports.com (smtp.vgtelecomreports.com [202.0.103.20])
by mxfront3m.mail.yandex.net (nwsmtp/Yandex) with ESMTP id tgYv1I8Gs2-MaQmJmed;
Thu, 12 Nov 2015 16:22:36 +0300
Authentication-Results: mxfront3m.mail.yandex.net; spf=pass (mxfront3m.mail.yandex.net: domain of vgtelecomreports.com designates 202.0.103.20 as permitted sender) smtp.mail=dorottya.szalai@vgtelecomreports.com; dkim=pass header.i=@vgtelecomreports.com
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns;
d=vgtelecomreports.com; s=smtp;
h=received:from:to:message-id:subject:date:mime-version:reply-to
:content-type;
b=akqczc7fbX2V8L1oO3tNLLJtY6Kjzh5T+iUJ3iv94uKUM4a/NCP38ObX3gwXTuc62
rFZGmMTDwHsD+BKVwTyMLjSCifIdLB3jLEF3gmAhD45knlKWVMWbJVm0ROQbp1hoW
Y68oWLfGGE4dm0jIal1mM27LE6llD28S7dKnFbiFk=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=vgtelecomreports.com; s=smtp;
h= content-type:reply-to:mime-version:date:subject:message-id:to:from;
bh=lLR37u2XZQmNR7xTiponduwQRwcbH3vVjlDrD58R/xI=;
b=Lwm8cbBPIUgDWFemx6lPzXXtC0fSGfqkX4mdkjGp0pzgIbyckPQ9gy/imdWupSzDq
z890RJENHB3exM1nQ4HI0tMrmXTTn4HC/FJbmBRw49w/92VZ/BuqiBr7OTYfLadVe
Apfowii8GrWoC/oczIHFixZWU6gnBcE/LFry6FXkc=
Received: from WIN-ASQ29B6R1EP (WIN-ASQ29B6R1EP [202.0.103.127]) by smtp.vgtelecomreports.com with SMTP;
Thu, 12 Nov 2015 11:00:35 +0000
From: Dorottya Szalai<dorottya.szalai@vgtelecomreports.com>
To: ali.ali-an@yandex.by
Message-Id: <20151112110035.-1037385882@vgtelecomreports.com>
Subject: Top 20 Cyber Security Companies 2015 Report
Date: Thu, 12 Nov 2015 11:00:35 +0000
MIME-Version: 1.0
Reply-To: dorottya.szalai@vgtelecomreports.com
Content-Type: multipart/alternative; boundary="AlternativeBoundary.22222222.22222222"
X-Yandex-Forward: 4d5f734b4dc5e0eef1298172b29bef18
**********

Это письмо отправлено почтовым сервером yandex.ru.

К сожалению, мы вынуждены сообщить Вам о том, что Ваше письмо не может
быть отправлено одному или нескольким адресатам. Причины указаны ниже.

Пожалуйста, не отвечайте на это сообщение.

**********

This is the mail system at host yandex.ru.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

Please, do not reply to this message.


<raybpayne@gmail.com>: host gmail-smtp-in.l.google.com[74.125.205.27] said: 550
5.2.1 The email account that you tried to reach is disabled.
rc9si9010009lbb.6 - gsmtp (in reply to RCPT TO command)

Недоставленное сообщение

Return-Path: <ali.ali-an@yandex.by>
Received: from mxfront3m.mail.yandex.net (mxfront3m.mail.yandex.net [37.140.138.53])
by forward3m.mail.yandex.net (Yandex) with ESMTP id 47F6D6B60C8F
for <virginiahhart@gmail.com>; Thu, 12 Nov 2015 16:23:15 +0300 (MSK)
Received: from mxfront3m.mail.yandex.net ([127.0.0.1])
by mxfront3m.mail.yandex.net with LMTP id m1n0brSG
for <ali.ali-an@yandex.by>; Thu, 12 Nov 2015 16:22:40 +0300
Received: from smtp.vgtelecomreports.com (smtp.vgtelecomreports.com [202.0.103.20])
by mxfront3m.mail.yandex.net (nwsmtp/Yandex) with ESMTP id tgYv1I8Gs2-MaQmJmed;
Thu, 12 Nov 2015 16:22:36 +0300
Authentication-Results: mxfront3m.mail.yandex.net; spf=pass (mxfront3m.mail.yandex.net: domain of vgtelecomreports.com designates 202.0.103.20 as permitted sender) smtp.mail=dorottya.szalai@vgtelecomreports.com; dkim=pass header.i=@vgtelecomreports.com
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns;
d=vgtelecomreports.com; s=smtp;
h=received:from:to:message-id:subject:date:mime-version:reply-to
:content-type;
b=akqczc7fbX2V8L1oO3tNLLJtY6Kjzh5T+iUJ3iv94uKUM4a/NCP38ObX3gwXTuc62
rFZGmMTDwHsD+BKVwTyMLjSCifIdLB3jLEF3gmAhD45knlKWVMWbJVm0ROQbp1hoW
Y68oWLfGGE4dm0jIal1mM27LE6llD28S7dKnFbiFk=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=vgtelecomreports.com; s=smtp;
h= content-type:reply-to:mime-version:date:subject:message-id:to:from;
bh=lLR37u2XZQmNR7xTiponduwQRwcbH3vVjlDrD58R/xI=;
b=Lwm8cbBPIUgDWFemx6lPzXXtC0fSGfqkX4mdkjGp0pzgIbyckPQ9gy/imdWupSzDq
z890RJENHB3exM1nQ4HI0tMrmXTTn4HC/FJbmBRw49w/92VZ/BuqiBr7OTYfLadVe
Apfowii8GrWoC/oczIHFixZWU6gnBcE/LFry6FXkc=
Received: from WIN-ASQ29B6R1EP (WIN-ASQ29B6R1EP [202.0.103.127]) by smtp.vgtelecomreports.com with SMTP;
Thu, 12 Nov 2015 11:00:35 +0000
From: Dorottya Szalai<dorottya.szalai@vgtelecomreports.com>
To: ali.ali-an@yandex.by
Message-Id: <20151112110035.-1037385882@vgtelecomreports.com>
Subject: Top 20 Cyber Security Companies 2015 Report
Date: Thu, 12 Nov 2015 11:00:35 +0000
MIME-Version: 1.0
Reply-To: dorottya.szalai@vgtelecomreports.com
Content-Type: multipart/alternative; boundary="AlternativeBoundary.22222222.22222222"
X-Yandex-Forward: 4d5f734b4dc5e0eef1298172b29bef18
**********

Это письмо отправлено почтовым сервером yandex.ru.

К сожалению, мы вынуждены сообщить Вам о том, что Ваше письмо не может
быть отправлено одному или нескольким адресатам. Причины указаны ниже.

Пожалуйста, не отвечайте на это сообщение.

**********

This is the mail system at host yandex.ru.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

Please, do not reply to this message.


<virginiahhart@gmail.com>: host gmail-smtp-in.l.google.com[74.125.205.27] said:
550-5.1.1 The email account that you tried to reach does not exist. Please
try 550-5.1.1 double-checking the recipient's email address for typos or
550-5.1.1 unnecessary spaces. Learn more at 550 5.1.1
https://support.google.com/mail/answer/6596 cx10si2430722lbb.49 - gsmtp (in
reply to RCPT TO command)

Недоставленное сообщение

Return-Path: <ali.ali-an@yandex.by>
Received: from mxfront3m.mail.yandex.net (mxfront3m.mail.yandex.net [37.140.138.53])
by forward19m.cmail.yandex.net (Yandex) with ESMTP id 34CDD20AA4
for <zhorazhorashvili@mail.ru>; Thu, 12 Nov 2015 16:22:46 +0300 (MSK)
Received: from mxfront3m.mail.yandex.net ([127.0.0.1])
by mxfront3m.mail.yandex.net with LMTP id m1n0brSG
for <ali.ali-an@yandex.by>; Thu, 12 Nov 2015 16:22:40 +0300
Received: from smtp.vgtelecomreports.com (smtp.vgtelecomreports.com [202.0.103.20])
by mxfront3m.mail.yandex.net (nwsmtp/Yandex) with ESMTP id tgYv1I8Gs2-MaQmJmed;
Thu, 12 Nov 2015 16:22:36 +0300
Authentication-Results: mxfront3m.mail.yandex.net; spf=pass (mxfront3m.mail.yandex.net: domain of vgtelecomreports.com designates 202.0.103.20 as permitted sender) smtp.mail=dorottya.szalai@vgtelecomreports.com; dkim=pass header.i=@vgtelecomreports.com
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns;
d=vgtelecomreports.com; s=smtp;
h=received:from:to:message-id:subject:date:mime-version:reply-to
:content-type;
b=akqczc7fbX2V8L1oO3tNLLJtY6Kjzh5T+iUJ3iv94uKUM4a/NCP38ObX3gwXTuc62
rFZGmMTDwHsD+BKVwTyMLjSCifIdLB3jLEF3gmAhD45knlKWVMWbJVm0ROQbp1hoW
Y68oWLfGGE4dm0jIal1mM27LE6llD28S7dKnFbiFk=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=vgtelecomreports.com; s=smtp;
h= content-type:reply-to:mime-version:date:subject:message-id:to:from;
bh=lLR37u2XZQmNR7xTiponduwQRwcbH3vVjlDrD58R/xI=;
b=Lwm8cbBPIUgDWFemx6lPzXXtC0fSGfqkX4mdkjGp0pzgIbyckPQ9gy/imdWupSzDq
z890RJENHB3exM1nQ4HI0tMrmXTTn4HC/FJbmBRw49w/92VZ/BuqiBr7OTYfLadVe
Apfowii8GrWoC/oczIHFixZWU6gnBcE/LFry6FXkc=
Received: from WIN-ASQ29B6R1EP (WIN-ASQ29B6R1EP [202.0.103.127]) by smtp.vgtelecomreports.com with SMTP;
Thu, 12 Nov 2015 11:00:35 +0000
From: Dorottya Szalai<dorottya.szalai@vgtelecomreports.com>
To: ali.ali-an@yandex.by
Message-Id: <20151112110035.-1037385882@vgtelecomreports.com>
Subject: Top 20 Cyber Security Companies 2015 Report
Date: Thu, 12 Nov 2015 11:00:35 +0000
MIME-Version: 1.0
Reply-To: dorottya.szalai@vgtelecomreports.com
Content-Type: multipart/alternative; boundary="AlternativeBoundary.22222222.22222222"
X-Yandex-Forward: 4d5f734b4dc5e0eef1298172b29bef18
**********

Это письмо отправлено почтовым сервером yandex.ru.

К сожалению, мы вынуждены сообщить Вам о том, что Ваше письмо не может
быть отправлено одному или нескольким адресатам. Причины указаны ниже.

Пожалуйста, не отвечайте на это сообщение.

**********

This is the mail system at host yandex.ru.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

Please, do not reply to this message.


<zhorazhorashvili@mail.ru>: host mxs.mail.ru[217.69.139.150] said: 550 Message
was not accepted -- invalid mailbox. Local mailbox
zhorazhorashvili@mail.ru is unavailable: account is disabled (in reply to
end of DATA command)

Top 20 Cyber Security Companies 2015 Report


Top 20 Cyber Security Companies 2015
Analysis of Leading Players, Competitive Positioning & Future Market Opportunities

Publication date: 09 November 2015
Number of Pages: 421

------------------------------------------------------------
The latest announcement that the cyber security pact between the US and China agreed to September 2015 has not prevented Chinese hackers from continuing their efforts to steal intellectual property from US companies, has led visiongain to publish this unique report, which is crucial to your companies improved success. I thought it would be of interest to you.

Did you know?
- The number of cyber criminals targeting private industry is growing?
- Endpoint security and security analytics are gaining a significant share in the cyber security market in addition to global defence contractors and IT providers?
- Cuts to government procurement budgets in defence a nd IT projects are forcing established market leaders to target other government expenditures?

Visiongain assesses that the top 20 cyber security companies will account for a large segment of the $80.7bn cyber security market. This report provides detailed analysis of these leading companies, identifying key activities, opportunities and challenges that are influencing the strategies and decisions of their respective businesses. Visiongain's analysis will provide the reader with detailed information to gain a comprehensive understanding of the competitive landscape of the market allowing them to make informed strategic decisions.

5 Reasons why you must order and read this report:

1. In-depth profiles of the top 20 cyber security companies in 2015 including cyber security market shares and cyber security revenues of each company
2. Financial, contract, M&A, product and services information for each company, providing a comprehensive overview
3. D etailed analysis of each company to support identified trends in the cyber security market and how each company is responding to these in their respective strategies
4. Exclusive interviews from Kapersky Lab, Honeywell International, IBM and Dell Inc
5. Detailed tables of 113 cyber security contracts.

The report provides detailed profiles of the top 20 cyber security companies:
- BAE Systems plc
- Checkpoint Software Technologies Ltd
- Cisco Systems plc
- Deloitte Touche Tohmatsu Ltd
- EMC Corporation
- Ernst & Young Global Ltd
- Fortinet Inc
- General Dynamics Corporation
- Hewlett Packard Company
- IBM Corporation
- Intel Corporation
- Kapersky Lab
- L-3 Communications Corporation
- Leidos Inc
- Lockheed Martin Corporation
- Northrop Grumman Corporation
- PWC
- Raytheon Company
- Symantec Corporation
- Trend Micro Inc

This independent 421 page report guarantees that you will remain better i nformed than your competition. With 472 tables and figures examining the top 20 cyber security companies, the report gives you a visual, one-stop breakdown of your market. PLUS financial information such as sales, capital expenditure, net income, contracts and M&A, as well as analysis, keeps your knowledge that one step ahead that you require to succeed.

This report is essential reading for you or anyone in the cyber security sector with an interest in expanding their cyber security market insight. Purchasing this report today will help you to recognise those important market opportunities and understand the possibilities there. I look forward to receiving your order.

------------------------------------------------------------
T able of Contents

1. Report Overview
1.1 Report Benefits and Highlights
1.2 Global Cyber Security Market Segmentation
1.3 Why You Should Read This Report
1.4 Report Structure
1.5 How This Report Delivers
1.6 Who is This Report For?
1.7 Methodology
1.7.1 Primary Research
1.7.2 Secondary Research
1.7.3 Market Evaluation & Forecasting Methodology
1.8 Frequently Asked Questions (FAQ)
1.9 Associated Visiongain Reports
1.10 About Visiongain

2. Introduction to the Cyber Security Market

2.1 Global Cyber Security Market Structure
2.2 Overview of the Global Cyber Security Market
2.3 Global Cyber Security Market Definition
2.4 Global Cyber Security Submarkets Definition
2.4.1 Network Security (NetSec) Submarket Definition
2.4.2 Data Security (DataSec) Submarket Definition
2.4.3 Security Operations Management (SecOps) Submarket Definition
2.4.4 Identification Management (IdM) Submarket Definition
2.1.5 Endpoint Security (EndSec) Submarket Definition
2.1.6 Application Security (AppSec) Submarket Definition
2.1.7 Cloud Security (CloudSec) Submarket Definition
2.5 Analysis of Cyber Attacks
2.5.1 Recent Notable Cyber Attacks & Incidents
2.6 Analysis of Major Trends in the Cyber Security Market 2015

3. Competitor Positioning in the Cyber Security Market

3.1 Leading 20 Companies in the Cyber Security Market 2015
3.2 Assessing the Cyber Security Market Landscape in 2015
3.3 Composition of the Cyber Security Market in 2015
3.4 Shifting Expertise in the Cyber Security Market
3.5 Regional Breakdown of the 20 Leading Companies in the Cyber Security Market

4. Leading 20 Cyber Security Companies
4.1 BAE Systems plc
4.1.1 BAE Systems plc Cyber Security Selected Recent Contracts / Projects / Programmes
4.1.2 BAE Systems plc Total Company Sales 2010-2014
4.1.3 BAE Systems plc Sales in the Cyber & Intelligence Segment of Business 2010-2014
4.1.4 BAE Systems plc Sales by Segment of Business 2010-2014
4.1.5 BAE Systems plc Net Income 2010-2014
4.1.6 BAE Systems plc Net Capital Expenditure 2010-2014
4.1.7 BAE Systems plc Order Backlog 2011-2014
4.1.8 BAE Systems plc Cost of Research & Development 2010-2014
4.1.9 BAE Systems plc Regional Emphasis / Focus
4.1.10 BAE Systems plc Organisational Structure / Subsidiaries / Number of Employees
4.1.11 BAE Systems plc Cyber Security Products / Services
4.1.12 BAE Systems plc Primary Market Competitors
4.1.13 BAE Systems plc Mergers & Acquisitions (M&A) Activity
4.1.14 BAE Systems plc Analysis
4.1.15 BAE Systems plc SWOT Analysis
4.2 Check Point Software Technologies Ltd
4.2.1 Check Point Software Technologies Ltd Total Company Sales 2005-2014
4.2.2 Check Point Softwa re Technologies Ltd Net Income 2005-2014
4.2.3 Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014
4.2.4 Check Point Software Technologies Ltd Net Cost of Research & Development 2005-2014
4.2.5 Check Point Software Technologies Ltd Regional Emphasis / Focus
4.2.6 Check Point Software Technologies Ltd Organisational Structure / Subsidiaries / Number of Employees
4.2.7 Check Point Software Technologies Ltd Cyber Security Products / Services
4.2.8 Check Point Software Technologies Ltd Primary Market Competitors
4.2.9 Check Point Software Technologies Ltd Mergers & Acquisitions (M&A) Activity
4.2.10 Check Point Software Technologies Ltd Analysis
4.2.11 Check Point Software Technologies Ltd SWOT Analysis
4.3 Cisco Systems Inc
4.3.1 Cisco Systems Inc Cyber Security Selected Recent Contracts / Projects / Programmes
4.3.2 Cisco Systems Inc Total Company Sales 2010-2014
4.3.3 Cisco Systems Inc Net Income 2010-2014
4.3. 4 Cisco Systems Inc Net Capital Expenditure 2010-2014
4.3.5 Cisco Systems Inc Sales by Segment of Business 2010-2014
4.3.6 Cisco Systems Inc Cost of Research & Development 2010-2014
4.3.7 Cisco Systems Inc Regional Emphasis / Focus
4.3.8 Cisco Systems Inc Organisational Structure / Subsidiaries / Number of Employees
4.3.9 Cisco Systems Inc Cyber Security Products / Services
4.3.10 Cisco Systems Inc Primary Market Competitors
4.3.11 Cisco Systems Inc Mergers & Acquisitions (M&A) Activity
4.3.12 Cisco Systems Inc Analysis
4.3.13 Cisco Systems Inc SWOT Analysis
4.4 Deloitte Touche Tohmatsu Ltd (DTTL)
4.4.1 Deloitte Touche Tohmatsu Ltd (DTTL) Total Company Sales 2010-2015
4.4.2 Deloitte Touche Tohmatsu Ltd (DTTL) Sales by Segment of Business 2010-2014
4.4.3 Deloitte Touche Tohmatsu Ltd (DTTL) Regional Emphasis / Focus
4.4.4 Deloitte Touche Tohmatsu Ltd (DTTL) Organisational Structure / Subsidiaries / Number of Employees
4.4.5 Delo itte Touche Tohmatsu Ltd (DTTL) Cyber Security Products / Services
4.4.6 Deloitte Touche Tohmatsu Ltd (DTTL) Primary Market Competitors
4.4.7 Deloitte Touche Tohmatsu Ltd (DTTL) Mergers & Acquisitions (M&A) Activity
4.4.8 Deloitte Touche Tohmatsu Ltd (DTTL) Analysis
4.4.9 Deloitte Touche Tohmatsu Ltd (DTTL) SWOT Analysis
4.5 EMC Corporation
4.5.1 EMC Corporation Total Company Sales 2009-2014
4.5.2 EMC Corporation Net Income 2010-2014
4.5.3 EMC Corporation Net Capital Expenditure 2010-2014
4.5.4 EMC Corporation Sales by Segment of Business 2009-2014
4.5.5 EMC Corporation Regional Emphasis / Focus
4.5.6 EMC Corporation Organisational Structure / Subsidiaries
4.5.7 EMC Corporation Cyber Security Products / Services
4.5.8 EMC Corporation Primary Market Competitors
4.5.9 EMC Corporation Mergers & Acquisitions (M&A) Activity
4.5.10 EMC Corporation Analysis
4.5.11 EMC Corporation SWOT Analysis
4.6 Ernst & Young Global L td (EY)
4.6.1 Ernst & Young Global Ltd (EY) Total Company Sales 2010-2014
4.6.2 Ernst & Young Global Ltd (EY) Sales by Segment of Business 2011-2014
4.6.3 Ernst & Young Global Ltd (EY) Regional Emphasis / Focus
4.6.4 Ernst & Young Global Ltd (EY) Organisational Structure / Subsidiaries / Number of Employees
4.6.5 Ernst & Young Global Ltd (EY) Cyber Security Products / Services
4.6.6 Ernst & Young Global Ltd (EY) Primary Market Competitors
4.6.7 Ernst & Young Global Ltd (EY) Mergers & Acquisitions (M&A) Activity
4.6.8 Ernst & Young Global Ltd (EY) Analysis
4.6.9 Ernst & Young Global Ltd (EY) SWOT Analysis
4.7 Fortinet Inc
4.7.1 Fortinet Inc Cyber Security Selected Recent Contracts / Projects / Programmes
4.7.2 Fortinet Inc Total Company Sales 2009-2014
4.7.3 Fortinet Inc Net Income 2010-2014
4.7.4 Fortinet Inc Net Capital Expenditure 2010-2014
4.7.5 Fortinet Inc Sales by Segment of Business 2009- 2014
4.7.6 Fortinet Inc Regional Emphasis / Focus
4.7.7 Fortinet Inc Organisational Structure / Subsidiaries / Number of Employees
4.7.8 Fortinet Inc Cyber Security Products / Services
4.7.9 Fortinet Inc Primary Market Competitors
4.7.10 Fortinet Inc Mergers & Acquisitions (M&A) Activity
4.7.11 Fortinet Inc Analysis
4.7.12 Fortinet Inc SWOT Analysis
4.8 General Dynamics Corporation
4.8.1 General Dynamics Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.8.2 General Dynamics Corporation Total Company Sales 2010-2014
4.8.3 General Dynamics Corporation Net Income / Loss 2010-2014
4.8.4 General Dynamics Corporation Net Capital Expenditure 2012-2014
4.8.5 General Dynamics Corporation Cost of Research & Development 2012-2014
4.8.6 General Dynamics Corporation Sales by Segment of Business 2012-2014
4.8.7 General Dynamics Corporation Regional Emphasis / Focus
4.8.8 General Dynamics Corporation Organisat ional Structure / Subsidiaries / Number of Employees
4.8.9 General Dynamics Corporation Cyber Security Products / Services
4.8.10 General Dynamics Corporation Primary Market Competitors
4.8.11 General Dynamics Corporation Mergers & Acquisitions (M&A) Activity
4.8.12 General Dynamics Corporation Analysis
4.8.13 General Dynamics Corporation SWOT Analysis
4.9 The Hewlett-Packard Company (HP)
4.9.1 The Hewlett-Packard Company (HP) Cyber Security Selected Recent Contracts / Projects / Programmes
4.9.2 The Hewlett-Packard Company (HP) Total Company Sales 2010-2014
4.9.3 The Hewlett-Packard Company (HP) Net Income / Loss 2010-2014
4.9.4 The Hewlett-Packard Company (HP) Net Capital Expenditure 2011-2014
4.9.5 The Hewlett-Packard Company (HP) Regional Emphasis / Focus
4.9.6 The Hewlett-Packard Company (HP) Organisational Structure / Subsidiaries
4.9.7 The Hewlett-Packard Company (HP) Cyber Security Products / Services
4.9.8 The Hewlett-Packar d Company (HP) Primary Market Competitors
4.9.9 The Hewlett-Packard Company (HP) Mergers & Acquisitions (M&A) Activity
4.9.10 The Hewlett-Packard Company (HP) Analysis
4.9.11 The Hewlett-Packard Company (HP) SWOT Analysis
4.10 International Business Machines (IBM) Corporation
4.10.1 International Business Machines (IBM) Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.10.2 International Business Machines (IBM) Corporation Total Company Sales 2010-2014
4.10.3 International Business Machines (IBM) Corporation Net Income 2010-2014
4.10.4 International Business Machines (IBM) Corporation Net Capital Expenditure 2008-2014
4.10.5 International Business Machines (IBM) Corporation Sales by Segment of Business 2010-2014
4.10.6 International Business Machines (IBM) Corporation Regional Emphasis / Focus
4.10.7 International Business Machines (IBM) Corporation Organisational Structure / Subsidiaries / Number of Employees
4.10.8 International Business Machines (IBM) Corporation Cyber Security Products / Services
4.10.9 International Business Machines (IBM) Corporation Primary Market Competitors
4.10.10 International Business Machines (IBM) Corporation Mergers & Acquisitions (M&A) Activity
4.10.11 International Business Machines (IBM) Corporation Analysis
4.10.12 International Business Machines (IBM) Corporation SWOT Analysis
4.11 Intel Corporation
4.11.1 Intel Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.11.2 Intel Corporation Total Company Sales 2010-2014
4.11.3 Intel Corporation Net Income 2010-2014
4.11.4 Intel Corporation Net Capital Expenditure 2012-2014
4.11.5 Intel Corporation Sales by Segment of Business 2010-2014
4.11.6 Intel Corporation Regional Emphasis / Focus
4.11.7 Intel Corporation Organisational Structure / Subsidiaries / Number of Employees
4.11.8 Intel Corporation Cyber Security Products / Services
4 .11.9 Intel Corporation Primary Market Competitors
4.11.10 Intel Corporation Mergers & Acquisitions (M&A) Activity
4.11.11 Intel Corporation Analysis
4.11.12 Intel Corporation SWOT Analysis
4.12 Kaspersky Lab
4.12.1 Kaspersky Lab Total Company Sales 2010-2014
4.12.2 Kaspersky Lab Regional Emphasis / Focus
4.12.3 Kaspersky Lab Organisational Structure / Subsidiaries
4.12.4 Kaspersky Lab Cyber Security Products / Services
4.12.5 Kaspersky Lab Primary Market Competitors
4.12.6 Kaspersky Lab Mergers & Acquisitions (M&A) Activity
4.12.7 Kaspersky Lab Analysis
4.12.8 Kaspersky Lab SWOT Analysis
4.13 L-3 Communications Corporation
4.13.1 L-3 Communications Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.13.2 L-3 Communications Corporation Total Company Sales 2010-2014
4.13.3 L-3 Communications Corporation Net Income 2010-2014
4.13.4 L-3 Communications Corporation Net Capital Expenditure 2010-2 014
4.13.5 L-3 Communications Corporation Sales by Segment of Business 2012-2014
4.13.6 L-3 Communications Corporation Regional Emphasis / Focus
4.13.7 L-3 Communications Corporation Organisational Structure / Number of Employees
4.13.8 L-3 Communications Corporation Cyber Security Products / Services
4.13.9 L-3 Communications Corporation Primary Market Competitors
4.13.10 L-3 Communications Corporation Mergers & Acquisitions (M&A) Activity
4.13.11 L-3 Communications Corporation Analysis
4.13.12 L-3 Communications Corporation SWOT Analysis
4.14 Leidos Inc
4.14.1 Leidos Inc Cyber Security Selected Recent Contracts / Projects / Programmes
4.14.2 Leidos Inc Total Company Sales 2010-2014
4.14.3 Leidos Inc Net Income / Loss 2011-2014
4.14.4 Leidos Inc Net Capital Expenditure 2012-2014
4.14.5 Leidos Inc Organisational Structure
4.14.6 Leidos Inc Cyber Security Products / Services
4.14.7 Leidos Inc Primary Market Competitors
4.14.8 Leidos Inc Mergers & Acquisitions (M&A) Activity
4.14.9 Leidos Inc Analysis
4.14.10 Leidos Inc SWOT Analysis
4.15 Lockheed Martin Corporation
4.15.1 Lockheed Martin Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.15.2 Lockheed Martin Corporation Total Company Sales 2010-2014
4.15.3 Lockheed Martin Corporation Net Income 2010-2014
4.15.4 Lockheed Martin Corporation Net Capital Expenditure 2010-2014
4.15.5 Lockheed Martin Corporation Sales by Segment of Business 2010-2014
4.15.6 Lockheed Martin Corporation Regional Emphasis / Focus
4.15.7 Lockheed Martin Corporation Organisational Structure / Subsidiaries / Number of Employees
4.15.8 Lockheed Martin Corporation Cyber Security Products / Services
4.15.9 Lockheed Martin Corporation Primary Market Competitors
4.15.10 Lockheed Martin Corporation Mergers & Acquisitions (M&A) Activity
4.15.11 Lockheed Martin Corporation Analysis
4.15.12 Lockheed Mar tin Corporation SWOT Analysis
4.16 Northrop Grumman Corporation
4.16.1 Northrop Grumman Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.16.2 Northrop Grumman Corporation Total Company Sales 2008-2014
4.16.3 Northrop Grumman Corporation Net Income 2008-2014
4.16.4 Northrop Grumman Corporation Net Capital Expenditure 2008-2014
4.16.5 Northrop Grumman Corporation Sales by Segment of Business 2010-2014
4.16.6 Northrop Grumman Corporation Regional Emphasis / Focus
4.16.7 Northrop Grumman Corporation Organisational Structure / Subsidiaries / Number of Employees
4.16.8 Northrop Grumman Corporation Cyber Security Products / Services
4.16.9 Northrop Grumman Corporation Primary Market Competitors
4.16.10 Northrop Grumman Corporation Mergers & Acquisitions (M&A) Activity
4.16.11 Northrop Grumman Corporation Analysis
4.16.12 Northrop Grumman Corporation SWOT Analysis
4.17 PWC
4.17.1 PWC Total Company Sales 2010- 2014
4.17.2 PWC Organisational Structure
4.17.3 PWC Cyber Security Products / Services
4.17.4 PWC Primary Market Competitors
4.17.5 PWC Analysis
4.17.6 PWC SWOT Analysis
4.18 The Raytheon Company
4.18.1 The Raytheon Company Cyber Security Selected Recent Contracts / Projects / Programmes
4.18.2 The Raytheon Company Total Company Sales 2005-2014
4.18.3 The Raytheon Company Net Income 2005-2014
4.18.4 The Raytheon Company Net Capital Expenditure 2005-2014
4.18.6 The Raytheon Company Order Backlog 2005-2014
4.18.7 The Raytheon Company Cost of Research & Development 2005-2014
4.18.5 The Raytheon Company Sales by Segment of Business 2005-2014
4.18.6 The Raytheon Company Regional Emphasis / Focus
4.18.7 The Raytheon Company Organisational Structure / Subsidiaries / Number of Employees
4.18.8 The Raytheon Company Cyber Security Products / Services
4.18.9 The Raytheon Company Primary Market Competitors
4.18.10 The Raytheon Company Me rgers & Acquisitions (M&A) Activity
4.18.11 The Raytheon Company Analysis
4.18.12 The Raytheon Company SWOT Analysis
4.19 Symantec Corporation
4.19.1 Symantec Corporation Cyber Security Selected Recent Contracts / Projects / Programmes
4.19.2 Symantec Corporation Total Company Sales 2008-2015
4.19.3 Symantec Corporation Net Income 2011-2015
4.19.4 Symantec Corporation Net Capital Expenditure 2011-2015
4.19.5 Symantec Corporation Cost of Research & Development 2011-2015
4.19.6 Symantec Corporation Sales by Segment of Business 2010-2015
4.19.7 Symantec Corporation Regional Emphasis / Focus
4.19.8 Symantec Corporation Organisational Structure / Subsidiaries / Number of Employees
4.19.9 Symantec Corporation Cyber Security Products / Services
4.19.10 Symantec Corporation Primary Market Competitors
4.19.11 Symantec Corporation Mergers & Acquisitions (M&A) Activity
4.19.12 Symantec Corporation Analysis
4.19.13 Symantec Cor poration SWOT Analysis
4.20 Trend Micro Inc
4.20.1 Trend Micro Inc Total Company Sales 2010-2014
4.20.2 Trend Micro Inc Net Income 2010-2014
4.20.3 Trend Micro Inc Regional Emphasis / Focus
4.20.4 Trend Micro Inc Organisational Structure
4.20.5 Trend Micro Inc Cyber Security Products / Services
4.20.6 Trend Micro Inc Primary Market Competitors
4.20.7 Trend Micro Inc Mergers & Acquisitions (M&A) Activity
4.20.8 Trend Micro Inc Analysis
4.20.9 Trend Micro Inc SWOT Analysis
 
5. Other Notable Companies Operating in the Cyber Security Market


6. SWOT Analysis of the Cyber Security Market

7. Expert Opinion
7.1 Alexander Erofeev, Chief Marketing Officer, Kaspersky Lab
7.1.1 Kaspersky and the Cyber Security Market
7.1.2 Success of Kaspersky's Product Range Worldwide
7.1.3 Global Expansion – Kaspersky's Secret to Success
7.1.4 The Future of the Global Cyber Security Market
7.2 Jeff Zindel, Global Cyber Security Business Leader, and Erick Knapp, Director of Cyber Security Solutions and Technology, Honeywell International Inc
7.2.1 Honeywell's Cyber Security Business Approach
7.2.2 Increasing Sophistication of Cyber Attacks and Honeywell's Contribution to the Market
7.3 John Burnham, Director of Strategic Communications, IBM Security Systems
7.3.1 Cyber Security – A Board-Level Problem
7.3.2 IBM – Leader in the Security Intelligence Solutions Market
7.3.3 Holistic Approach that Drives the Company's Success
7.4 Julia Pope, Analyst Relations Lead, Dell Inc
7.4.1 Protect, Comply, Enable – Dell's Foundational Imperatives
7.4.2 Dell's Success in the Market

8. Conclusions

9. Glossary


------------------------------------------------------------
List of Tables

Table 1.1 Sample Company Sales by Geographical Area 2010-2014 (US$m, AGR%)
Table 2.1 Cyber Security Divisions / Subsidiaries of the 20 Leading Companies in the Cyber Security Market 2015 (Company Name, Cyber Security Segment of Business)
Table 2.2 Mechanisms of Cyber Attack (Type of Cyber Attack, Description)
Table 2.3 Cyber Attack Techniques (Category of Attack, Type of Attack, Description)
Table 2.4 Cyber Defence Systems (Method of Cyber Defence, Description)
Table 2.5 Recent Notable Cyber Attacks and Incidents (Date, Name of the Attack / Incident, Description)
Table 2.6 Major Trends in the Cyber Security Market 2015 (Major Trend, Characteristic)
Table 3.1 Leading 20 Companies in the Cyber Security Market 2015 (Ranking, Company, Total Company Revenue US$m, Revenue in the Cyber Security Market US$m, Cyber Security Market Share %)
Table 3.2 Submarket Involvement of the Leading 20 Companies in the Cyber Security Market 2015 (Company, Submarket Invol vement)
Table 4.1 BAE Systems plc Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.2 Selected Recent BAE Systems plc Cyber Security Contracts / Projects / Programmes (Date, Country / Company, Value US$m, Product, Details)
Table 4.3 BAE Systems plc Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.4 BAE Systems plc Sales in the Cyber & Intelligence Segment of Business 2010-2014 (US$m, AGR%)
Table 4.5 BAE Systems plc Net Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 4.6 BAE Systems plc Net Income 2010-2014 (US$m, AGR%)
Table 4.7 BAE Systems plc Net Capital Expenditure 2010-2014 (US$m, AGR%)
Table 4.8 BAE Systems plc Sa Order Backlog 2011-2014 (US$m, AGR%)
Table 4.9 BAE Systems plc Cost of Rese arch & Development 2010-2014 (US$m, AGR%)
Table 4.10 BAE Systems plc Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.11 BAE Systems plc Subsidiaries (Subsidiary, Location)
Table 4.12 BAE Systems plc Number of Employees 2010-2014 (Number, AGR%)
Table 4.13 BAE Systems plc Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.14 BAE Systems plc Cost of Mergers & Acquisitions Activity 2010-2014 (US$m)
Table 4.15 BAE Systems plc Acquisitions and Partnerships 2008-2014 (Date, Company Involved, Value US$m, Details)
Table 4.16 BAE Systems plc Divestitures 2011-2015 (Date, Company Involved, Value US$m, Details)
Table 4.17 BAE Systems plc Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.18 Check Point Software Technologies Ltd Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Sales in the Market US$m, Sales in the Market %, Net Income US$m, Net Capit al Expenditure US$m, Strongest Business Region, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.19 Check Point Software Technologies Ltd Total Company Sales 2005-2014 (US$m, AGR%)
Table 4.20 Check Point Software Technologies Ltd Net Income 2005-2014 (US$m, AGR%)
Table 4.21 Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014 (US$m, AGR%)
Table 4.22 Check Point Software Technologies Ltd Net Capital Expenditure 2005-2014 (US$m, AGR%)
Table 4.23 Check Point Software Technologies Ltd Sales by Geographical Location 2009-2014 (US$m, AGR%)
Table 4.24 Check Point Software Technologies Ltd Subsidiaries (Subsidiary, Location)
Table 4.25 Check Point Software Technologies Ltd Number of Employees 2009-2014 (Number, AGR%)
Table 4.26 Check Point Software Technologies Ltd Cyber Security Products / Services (Segment of Business, Product Family, Product, Specification / Features)
Table 4.27 Check Point Software Technologies Ltd Acquisi tions 2011-2015 (Date, Company Involved, Details)
Table 4.28 Check Point Software Technologies Ltd Partnerships 2015 (Date, Company Involved, Details)
Table 4.29 Check Point Software Technologies Ltd Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.30 Cisco Systems Inc Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.31 Selected Recent Cisco Systems Inc Cyber Security Contracts / Projects / Programmes (Date, Customer, Value US$m, Details)
Table 4.32 Cisco Systems Inc Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.33 Cisco Systems Inc Net Income 2010-2014 (US$m, AGR%)
Table 4.34 Cisco Systems Inc Net Capital Expenditure 2010-2014 (US$m, AGR%)
Table 4.35 Cisco Systems Inc Sales by Segm ent of Business 2010-2014 (US$m, AGR%)
Table 4.36 Cisco Systems Inc Cost of Research & Development 2010-2014 (US$m, AGR%)
Table 4.37 Cisco Systems Inc Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.38 Cisco Systems Inc Regional Focus/ Operating Locations
Table 4.39 Cisco Systems Inc Subsidiaries
Table 4.40 Cisco Systems Inc Number of Employees 2010-2014 (Number, AGR%)
Table 4.41 Cisco Systems Inc Number of Employees by Line Item on the Consolidated Statements of Operations 2014
Table 4.42 Cisco Systems Inc Number of Employees by Geographical Location 2014
Table 4.43 List of Cyber-Security Product Families Offered by Cisco Systems Inc
Table 4.44 Cisco Systems Inc Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.45 Cisco Systems Inc Cost of Mergers & Acquisitions Activity 2010-2014 (US$m)
Table 4.46 Cisco Systems Inc Acquisitions (Date, Company Involved, Value US$m, Details)
T able 4.47 Cisco Systems Inc Partnerships (Date, Company Involved, Value US$m, Details)
Table 4.48 Cisco Systems Inc Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.49 Deloitte Touche Tohmatsu Ltd (DTTL) Profile 2015 (Cyber Security Market Ranking, CEO, Directors- Cyber Risk Services, Total Company Sales US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, No. of Countries Worldwide, Founded, No. of Employees, Website)
Table 4.50 Deloitte Touche Tohmatsu Ltd (DTTL) Total Company Sales 2010-2015 (US$m, AGR%)
Table 4.51 Deloitte Touche Tohmatsu Ltd (DTTL) Sales by Segment of Business 2010-2015 (US$m, AGR%)
Table 4.52 Deloitte Touche Tohmatsu Ltd (DTTL) Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.53 Deloitte Touche Tohmatsu Ltd (DTTL) Number of Employees 2010-2015 (Number, AGR%)
Table 4.54 Deloitte Touche Tohmatsu Ltd (DTTL) Cyber Security Products / Servic es (Segment of Business, Product, Specification / Features)
Table 4.55 Deloitte Touche Tohmatsu Ltd (DTTL) Acquisitions (Date, Company Involved, Details)
Table 4.56 Deloitte Touche Tohmatsu Ltd (DTTL) Partnerships (Date, Company Involved, Details)
Table 4.57 Deloitte Touche Tohmatsu Ltd (DTTL) Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.58 EMC Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.59 EMC Corporation Total Company Sales 2009-2014 (US$m, AGR%)
Table 4.60 EMC Corporation Net Income 2010-2014 (US$m, AGR%)
Table 4.61 EMC Corporation Net Capital Expenditure 2010-2014 (US$m, AGR%)
Table 4.62 EMC Corporation Sales by Segment of Business 2009-2014 (US$m, AGR%)
Table 4.63 EMC Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.64 EMC Corporation Subsidiaries (Subsidiary, Location)
Table 4.65 EMC Corporation Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.66 EMC Corporation Partnerships (Date, Company Involved, Details)
Table 4.67 EMC Corporation Mergers and Acquisitions (Date, Company Involved, Value US$m, Details)
Table 4.68 EMC Corporation Divestitures (Date, Company Involved, Details)
Table 4.69 EMC Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.70 Ernst & Young Global Ltd (EY) Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, Website)
Table 4.71 Ernst & Young Global Ltd (EY) Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.72 Ern st & Young Global Ltd (EY) Sales by Segment of Business 2011-2014 (US$m, AGR%)
Table 4.73 Ernst & Young Global Ltd (EY) Sales by Geographical Location 2011-2014 (US$m, AGR%)
Table 4.74 Ernst & Young Global Ltd (EY) Number of Employees 2011-2014 (Number, AGR%)
Table 4.75 Ernst & Young Global Ltd (EY) Cyber Security Products / Services (Product, Specification / Features)
Table 4.76 Ernst & Young Global Ltd (EY) Acquisitions (Date, Company Involved, Details)
Table 4.77 Ernst & Young Global Ltd (EY) Divestitures (Date, Company Involved, Details)
Table 4.78 Ernst & Young Global Ltd (EY) Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.79 Fortinet Inc Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Co ntact, Ticker, Website)
Table 4.80 Selected Recent Fortinet Inc Cyber Security Contracts / Projects / Programmes (Date, Country, Customer, Product, Details)
Table 4.81 Fortinet Inc Total Company Sales 2009-2014 (US$m, AGR%)
Table 4.82 Fortinet Inc Net Income 2010-2014 (US$m, AGR%)
Table 4.83 Fortinet Inc Net Capital Expenditure 2010-2014 (US$m, AGR%)
Table 4.84 Fortinet Inc Net Sales by Segment of Business 2009-2014 (US$m, AGR%)
Table 4.85 Fortinet Inc Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.86 Fortinet Inc Number of Employees 2011-2014 (Number, AGR%)
Table 4.87 Fortinet Inc Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.88 Fortinet Inc Acquisitions (Date, Company Involved, Value US$m, Details)
Table 4.89 Fortinet Inc Partnerships (Date, Company Involved, Details)
Table 4.90 Fortinet Inc Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.91 General Dyn amics Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.92 Selected Recent General Dynamics Corporation Cyber Security Contracts / Projects / Programmes (Date, Country / Region, Value US$m, Details)
Table 4.93 General Dynamics Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.94 General Dynamics Corporation Net Income / Loss 2010-2014 (US$m)
Table 4.95 General Dynamics Corporation Net Capital Expenditure 2012-2014 (US$m, AGR%)
Table 4.96 General Dynamics Corporation Cost of Research & Development 2012-2014 (US$m, AGR%)
Table 4.97 General Dynamics Corporation Sales by Segment of Business 2012-2014 (US$m, AGR%)
Table 4.98 General Dynamics Corporation Sales by Geographical Location 2012-20 14 (US$m, AGR%)
Table 4.99 General Dynamics Corporation Number of Employees 2010-2014 (Number, AGR%)
Table 4.100 General Dynamics Corporation Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.101 General Dynamics Corporation Acquisitions (Date, Company Involved, Details)
Table 4.102 General Dynamics Corporation Divestitures (Date, Company Involved, Details)
Table 4.103 General Dynamics Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.104 The Hewlett-Packard Company (HP) Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.105 Selected Recent The Hewlett-Packard Company (HP) Cyber Security Contracts / Projects / Programmes (Date, Coun try, Subcontractor, Value US$m, Product, Details)
Table 4.106 The Hewlett-Packard Company (HP) Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.107 The Hewlett-Packard Company (HP) Net Income / Loss 2010-2014 (US$m)
Table 4.108 The Hewlett-Packard Company (HP) Net Capital Expenditure 2011-2014 (US$m, AGR%)
Table 4.109 The Hewlett-Packard Company (HP) Cyber Security Products / Services (Product, Specification / Features)
Table 4.110 The Hewlett-Packard Company (HP) Acquisitions 2011-2015 (Date, Company Involved, Value US$m, Details)
Table 4.111 The Hewlett-Packard Company (HP) Joint Venture 2015 (Date, Company Involved, Value US$m, Details)
Table 4.112 The Hewlett-Packard Company (HP) Partnerships 2015 (Date, Company Involved, Details)
Table 4.113 The Hewlett-Packard Company (HP) Divestitures 2015 (Date, Company Involved, Details)
Table 4.114 The Hewlett-Packard Company (HP) Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.115 I nternational Business Machines (IBM) Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.116 Selected Recent International Business Machines (IBM) Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Product, Details)
Table 4.117 International Business Machines (IBM) Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.118 International Business Machines (IBM) Corporation Net Income 2010-2014 (US$m, AGR%)
Table 4.119 International Business Machines (IBM) Corporation Net Capital Expenditure 2008-2014 (US$m, AGR%)
Table 4.120 International Business Machines (IBM) Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 4.121 International Business Mach ines (IBM) Corporation Sales by Geographical Location 2012-2014 (US$m, AGR%)
Table 4.122 International Business Machines (IBM) Corporation Subsidiaries (Region, Subsidiary, Location)
Table 4.123 International Business Machines (IBM) Corporation Number of Employees 2010-2014 (Number, AGR%)
Table 4.124 International Business Machines (IBM) Corporation Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.125 International Business Machines (IBM) Corporation Mergers and Acquisitions 2013-2015 (Date, Company Involved, Details)
Table 4.126 International Business Machines (IBM) Corporation Divestitures 2015 (Date, Company Involved, Value US$m, Details)
Table 4.127 International Business Machines (IBM) Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.128 Intel Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure U S$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.129 Selected Recent Intel Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Subcontractor, Value US$m, Product, Details)
Table 4.130 Intel Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.131 Intel Corporation Net Income 2010-2014 (US$m, AGR%)
Table 4.132 Intel Corporation Net Capital Expenditure 2012-2014 (US$m, AGR%)
Table 4.133 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 4.134 Intel Corporation Sales by Geographical Location 2012-2014 (US$m, AGR%)
Table 4.135 Intel Corporation Subsidiaries (Subsidiary, Location)
Table 4.136 Intel Corporation Number of Employees 2010-2014 (Number, AGR%)
Table 4.137 Intel Corporation Cyber Security Products / Services (Segment of Business, Product Family, Product, Speci fication / Features)
Table 4.138 Intel Corporation Mergers and Acquisitions 2011-2015 (Date, Company Involved, Value US$m, Details)
Table 4.139 Intel Corporation Divestitures 2011 (Date, Company Involved, Details)
Table 4.140 Intel Corporation Joint Ventures 2011 (Date, Company Involved, Value US$m, Details)
Table 4.141 Intel Corporation Partnerships 2014 (Date, Company Involved, Value US$m, Details)
Table 4.142 Intel Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.143 Kaspersky Lab Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Sales in the Market US$m, Sales in the Market % HQ, Founded, No. of Employees, Website)
Table 4.144 Kaspersky Lab Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.145 Kaspersky Lab Subsidiaries (Region, Subsidiary, Location)
Table 4.146 Kaspersky Lab Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.147 Kaspersky Lab Mergers and Acquisitions (Date, Company Involved, Value US$m, Details)
Table 4.148 Kaspersky Lab Divestitures (Date, Company Involved, Value US$m, Details)
Table 4.149 Kaspersky Lab Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.150 L-3 Communications Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.151 Selected Recent L-3 Communications Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Segment of Business, Product, Details)
Table 4.152 L-3 Communications Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.153 L-3 Communications Corporation Net Income 2010-2014 (US$m, AGR%)
Table 4.154 L-3 Communications Corporation Net Ca pital Expenditure 2010-2014 (US$m, AGR%)
Table 4.155 L-3 Communications Corporation Sales by Segment of Business 2012-2014 (US$m, AGR%)
Table 4.156 L-3 Communications Corporation Sales by Geographical Location 2012-2014 (US$m, AGR%)
Table 4.157 L-3 Communications Corporation Number of Employees 2010-2014 (Number, AGR%)
Table 4.158 L-3 Communications Corporation Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.159 L-3 Communications Corporation Mergers and Acquisitions (Date, Details)
Table 4.160 L-3 Communications Corporation Divestitures (Date, Details)
Table 4.161 L-3 Communications Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.162 Leidos Inc Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Loss US$m, Net Capital Expenditure US$m, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Emplo yees, IR Contact, Ticker, Website)
Table 4.163 Selected Recent Leidos Inc Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Details)
Table 4.164 Leidos Inc Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.165 Leidos Inc Net Income / Loss 2011-2014 (US$m)
Table 4.166 Leidos Inc Net Capital Expenditure 2012-2014 (US$m, AGR%)
Table 4.167 Leidos Inc Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.168 Leidos Inc Divestitures (Date, Company Involved, Value US$m, Details)
Table 4.169 Leidos Inc Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.170 Lockheed Martin Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, No. of Countries Present Worldwide, Founded, No. of Empl oyees, IR Contact, Ticker, Website)
Table 4.171 Selected Recent Lockheed Martin Corporation Cyber Security Contracts / Projects / Programmes (Date, Country , Value US$m, Product, Details)
Table 4.172 Lockheed Martin Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.173 Lockheed Martin Corporation Net Income 2010-2014 (US$m, AGR%)
Table 4.174 Lockheed Martin Corporation Net Capital Expenditure 2010-2014 (US$m, AGR%)
Table 4.175 Lockheed Martin Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 4.176 Lockheed Martin Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.177 Lockheed Martin Corporation Subsidiaries (Subsidiary, Location)
Table 4.178 Lockheed Martin Corporation Number of Employees 2010-2014 (Number, AGR%)
Table 4.179 Lockheed Martin Corporation Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.180 Lockheed Martin Corporation Acquisitions (Da te, Company Involved, Value US$m, Details)
Table 4.181 Lockheed Martin Corporation Divestitures (Date, Company Involved, Value US$m, Details)
Table 4.182 Lockheed Martin Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.183 Northrop Grumman Corporation Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.184 Selected Recent Northrop Grumman Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Details)
Table 4.185 Northrop Grumman Corporation Total Company Sales 2008-2014 (US$m, AGR%)
Table 4.186 Northrop Grumman Corporation Net Income 2008-2014 (US$m, AGR%)
Table 4.187 Northrop Grumman Corporation Net Capital Expenditure 2008-2014 (US$m, AGR%)
Table 4.188 Northrop Grumman Corporation Sales by Segment of Business 2010-2014 (US$m, AGR%)
Table 4.189 Northrop Grumman Corporation Sales by Geographical Location 2010-2014 (US$m, AGR%)
Table 4.190 Northrop Grumman Corporation Subsidiaries (Subsidiary, Location)
Table 4.191 Northrop Grumman Corporation Number of Employees 2010-2014 (Number, AGR%)
Table 4.192 Northrop Grumman Corporation Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.193 Northrop Grumman Corporation Mergers and Acquisitions (Date, Company Involved, Details)
Table 4.194 Northrop Grumman Corporation Divestitures (Date, Company Involved, Details)
Table 4.195 Northrop Grumman Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.196 PWC Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, Website)
Tabl e 4.197 PWC Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.198 PWC Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.199 PWC Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.200 The Raytheon Company Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.201 Selected Recent The Raytheon Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Product, Details)
Table 4.202 The Raytheon Company Total Company Sales 2005-2014 (US$m, AGR%)
Table 4.203 The Raytheon Company Net Income 2005-2014 (US$m, AGR%)
Table 4.204 The Raytheon Company Net Capital Expenditure 2005-2014 (US$m, AGR%)
Table 4.205 The Raytheon Company Ne t Capital Expenditure 2005-2014 (US$m, AGR%)
Table 4.206 The Raytheon Company Net Capital Expenditure 2005-2014 (US$m, AGR%)
Table 4.207 The Raytheon Company Sales by Segment of Business 2005-2014 (US$m, AGR%)
Table 4.208 The Raytheon Company Sales by Geographical Location 2005-2014 (US$m, AGR%)
Table 4.209 The Raytheon Company Subsidiaries (Subsidiary, Location)
Table 4.210 The Raytheon Company Number of Employees 2005-2014 (Number, AGR%)
Table 4.211 The Raytheon Company Cyber Security Products / Services (Segment of Business, Product, Specification / Features)
Table 4.212 The Raytheon Company Acquisitions (Date, Company Involved, Value US$m, Details)
Table 4.213 The Raytheon Company Partnerships (Date, Company Involved, Details)
Table 4.214 The Raytheon Company Cost of Merger & Acquisition Activity 2005-2014 (Number, AGR%)
Table 4.215 The Raytheon Company Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.216 Symantec Corp oration Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Segment of Business in the Market, Sales in the Market US$m, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.217 Selected Recent Symantec Corporation Cyber Security Contracts / Projects / Programmes (Date, Country, Value US$m, Details)
Table 4.218 Symantec Corporation Total Company Sales 2008-2015 (US$m, AGR%)
Table 4.219 Symantec Corporation Net Income 2011-2015 (US$m, AGR%)
Table 4.220 Symantec Corporation Net Capital Expenditure 2011-2015 (US$m, AGR%)
Table 4.221 Symantec Corporation Net Capital Expenditure 2011-2015 (US$m, AGR%)
Table 4.222 Symantec Corporation Sales by Segment of Business 2010-2015 (US$m, AGR%)
Table 4.223 Symantec Corporation Sales by Geographical Location 2008-2014 (US$m, AGR%)
Table 4.224 Symantec Corporation Subsidiaries (Subsidiary, Location)
Table 4.225 BAE Systems plc Number of Employees 2010-2015 (Number, AGR%)
Table 4.226 Symantec Corporation Cyber Security Products / Services (Product, Specification / Features)
Table 4.227 Symantec Corporation Acquisitions (Date, Company Involved, Value US$m, Details)
Table 4.228 Symantec Corporation Mergers (Date, Company Involved, Value US$m, Details)
Table 4.229 Symantec Corporation Divestitures (Date, Company Involved, Value US$m, Details)
Table 4.230 Symantec Corporation Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 4.231 Trend Micro Inc Profile 2015 (Cyber Security Market Ranking, CEO, Total Company Sales US$m, Net Income US$m, Net Capital Expenditure US$m, Strongest Business Region, Sales in the Market US$m, Sales in the Market %, HQ, Founded, No. of Employees, IR Contact, Ticker, Website)
Table 4.232 Trend Micro Inc Total Company Sales 2010-2014 (US$m, AGR%)
Table 4.233 Trend Micro Inc Net Income 2010-2014 (US$m, AGR%)
Table 4.234 Tren d Micro Inc Sales by Geographical Location 2014 (US$m)
Table 4.235 Trend Micro Inc Cyber Security Products / Services (Product, Specification / Features)
Table 4.236 Trend Micro Inc Mergers and Acquisitions (Date, Details)
Table 4.237 Trend Micro Inc Strengths, Weaknesses, Opportunities & Threats Analysis 2015
Table 5.1 Other Major Cyber Security Companies Operating in the Market 2015 (Company, Location, Submarket Involvement)
Table 6.1 Global Cyber Security Market Drivers & Restraints 2015


------------------------------------------------------------
List of Figures


F igure 1.1 Global Cyber Security Market Segmentation Overview
Figure 1.2 Sample Map of Company Regional Focus 2015
Figure 1.3 Sample Company Sales by Segment of Business 2006-2013 (US$m, AGR%)
Figure 2.1 Global Cyber Security Market Segmentation Overview
Figure 2.2 Leading 20 Global Cyber Security Companies 2015
Figure 2.3 Primary Applications of Cyber Security Technologies
Figure 3.1 Share of the Global Cyber Security Market 2015 by the 20 Leading Companies (%Share)
Figure 3.2 Share of the Global Cyber Security Market by the Top 1-10 vs. Top 11-20 vs. Other Companies Operating in the Market (%Share)
Figure 3.3 Leading 20 Cyber Security Companies Segmentation by Sector 2015 (Sector, Number of Companies Operating in the Sector)
Figure 3.4 Share of the Cyber Security Market by Leading 20 Cyber Security Companies Segmentation by Sector 2015 (Sector, Market Share %)
Figure 4.1 BAE Systems plc Cyber Security Market Share 2015 (% Market Share)
Figure 4.2 BA E Systems plc Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.3 BAE Systems plc Sales in the Cyber & Intelligence Segment of Business 2010-2014 (US$m, AGR%)
Figure 4.4 BAE Systems plc Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.5 BAE Systems plc Sales AGR by Segment of Business 2011-2014 (%)
Figure 4.6 BAE Systems plc Net Income 2010-2014 (US$m, AGR%)
Figure 4.7 BAE Systems plc Net Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 4.8 BAE Systems plc Order Backlog 2011-2014 (US$m, AGR%)
Figure 4.9 BAE Systems plc Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 4.10 BAE Systems plc Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.11 BAE Systems plc Sales AGR by Geographical Location 2010-2014 (%)
Figure 4.12 BAE Systems plc Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.13 BAE Systems plc Organisational Structure 2015
Figure 4.14 BAE Systems plc Primary Subsidiaries 2015
Figure 4.15 BAE Systems plc Number of Employees 2010-2014 (Number, AGR%)
Figure 4.16 BAE Systems plc Primary Market Competitors
Figure 4.17 BAE Systems plc Cost of Mergers & Acquisitions Activity 2010-2014 (US$m)
Figure 4.18 Check Point Software Technologies Ltd Cyber Security Market Share 2015 (% Market Share)
Figure 4.19 Check Point Software Technologies Ltd Total Company Sales 2005-2014 (US$m, AGR%)
Figure 4.20 Check Point Software Technologies Ltd Net Income 2005-2014 (US$m, AGR%)
Figure 4.21 Check Point Software Technologies Ltd Net Capital Expenditure 2011-2014 (US$m, AGR%)
Figure 4.22 Check Point Software Technologies Ltd Cost of Research & Development 2005-2014 (US$m, AGR%)
Figure 4.23 Check Point Software Technologies Ltd Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.24 Check Point Software Technologies Ltd Sa les by Geographical Location 2009-2014 (US$m, Total Company Sales AGR%)
Figure 4.25 Check Point Software Technologies Ltd Sales AGR by Geographical Location 2010-2014 (AGR%)
Figure 4.26 Check Point Software Technologies Ltd Organisational Structure 2015
Figure 4.27 Check Point Software Technologies Ltd Number of Employees 2010-2014 (Number, AGR%)
Figure 4.28 Check Point Software Technologies Ltd Primary Market Competitors
Figure 4.29 Cisco Systems Inc Cyber Security Market Share 2015 (% Market Share)
Figure 4.30 Cisco Systems Inc Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.31 Cisco Systems Inc Net Income 2010-2014 (US$m, AGR%)
Figure 4.32 Cisco Systems Inc Net Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 4.33 Cisco Systems Inc Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.34 Cisco Systems Inc Sales AGR by Segment of Business 2011-2014 (%)
Figure 4.35 Cisco Systems Inc Share of Total Company Revenue by S egment of Business 2012-2014 (%)
Figure 4.36 Cisco Systems Inc Cost of Research & Development 2010-2014 (US$m, AGR%)
Figure 4.37 Cisco Systems Inc Cost of Research & Development as a Share of Total Company Revenue 2012-2014 (%)
Figure 4.38 Cisco Systems Inc Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.39 Cisco Systems Inc Sales AGR by Geographical Location 2011-2014 (%)
Figure 4.40 Cisco Systems Inc Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.41 Cisco Systems Inc Organisational Structure 2015
Figure 4.42 Cisco Systems Inc Relevant Cyber-Security Departments
Figure 4.43 Cisco Systems Inc Number of Employees 2010-2014 (Number, AGR%)
Figure 4.44 Cisco Systems Inc Distribution of Employees by Line Item on the Consolidated Statements of Operations 2014 (%)
Figure 4.45 Cisco Systems Inc Distribution of Employees by Geographical Location 2014 (%)
Figure 4 .46 Cisco Systems Inc Primary Market Competitors
Figure 4.47 Cisco Systems Inc Systems plc Cost of Mergers & Acquisitions Activity 2010-2014 (US$m, AGR%)
Figure 4.48 Deloitte Touche Tohmatsu Ltd (DTTL) Cyber Security Market Share 2015 (% Market Share)
Figure 4.49 Deloitte Touche Tohmatsu Ltd (DTTL) Total Company Sales 2010-2015 (US$m, AGR%)
Figure 4.50 Deloitte Touche Tohmatsu Ltd (DTTL) Sales by Segment of Business 2010-2015 (US$m, Total Company Sales AGR%)
Figure 4.51 Deloitte Touche Tohmatsu Ltd (DTTL) Sales AGR by Segment of Business 2011-2014 (%)
Figure 4.52 Deloitte Touche Tohmatsu Ltd (DTTL) Primary International Operations 2015 (Headquarters, Primary International Operations)
Figure 4.53 Deloitte Touche Tohmatsu Ltd (DTTL) Sales AGR by Geographical Location 2011-2015 (%)
Figure 4.54 Deloitte Touche Tohmatsu Ltd (DTTL) Sales by Geographical Location 2009-2014 (US$m, Total Company Sales AGR%)
Figure 4.55 Deloitte Touche Tohmatsu Ltd (DTTL) Organi sational Structure 2015
Figure 4.56 Deloitte Touche Tohmatsu Ltd (DTTL) Number of Employees 2010-2015 (Number, AGR%)
Figure 4.57 Deloitte Touche Tohmatsu Ltd (DTTL) Primary Market Competitors
Figure 4.58 EMC Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.59 EMC Corporation Total Company Sales 2009-2014 (US$m, AGR%)
Figure 4.60 EMC Corporation Net Income 2010-2014 (US$m, AGR%)
Figure 4.61 EMC Corporation Net Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 4.62 EMC Corporation Sales by Segment of Business 2009-2014 (US$m, Total Company Sales AGR%)
Figure 4.63 EMC Corporation Sales AGR by Segment of Business 2010-2014 (%)
Figure 4.64 EMC Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.65 EMC Corporation Sales AGR by Geographical Location 2010-2014 (%)
Figure 4.66 EMC Corporation Sales by Geographical Location 2009-2014 (US$m, Total Company Sales AGR%)
Figure 4 .67 EMC Corporation Organisational Structure 2015
Figure 4.68 EMC Corporation Primary Market Competitors
Figure 4.69 Ernst & Young Global Ltd (EY) Cyber Security Market Share 2015 (% Market Share)
Figure 4.70 Ernst & Young Global Ltd (EY) Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.71 Ernst & Young Global Ltd (EY) Sales by Segment of Business 2011-2014 (US$m, Total Company Sales AGR%)
Figure 4.72 Ernst & Young Global Ltd (EY) Sales AGR by Segment of Business 2012-2014 (%)
Figure 4.73 Ernst & Young Global Ltd (EY) Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.74 Ernst & Young Global Ltd (EY) Sales AGR by Geographical Location 2012-2014 (%)
Figure 4.75 Ernst & Young Global Ltd (EY) Sales by Geographical Location 2011-2014 (US$m, Total Company Sales AGR%)
Figure 4.76 Ernst & Young Global Ltd (EY) Organisational Structure 2015
Figure 4.77 Ernst & Young Global Ltd (EY) Number of Employees 2011-2014 (Number, AGR%)
Figure 4.78 Ernst & Young Global Ltd (EY) Primary Market Competitors
Figure 4.79 Fortinet Inc Cyber Security Market Share 2015 (% Market Share)
Figure 4.80 Fortinet Inc Total Company Sales 2009-2014 (US$m, AGR%)
Figure 4.81 Fortinet Inc Net Income 2010-2014 (US$m, AGR%)
Figure 4.82 Fortinet Inc Net Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 4.83 Fortinet Inc Sales by Segment of Business 2009-2014 (US$m, Total Company Sales AGR%)
Figure 4.84 Fortinet Inc Sales AGR by Segment of Business 2010-2014 (%)
Figure 4.85 Fortinet Inc Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.86 Fortinet Inc Sales AGR by Geographical Location 2010-2014 (%)
Figure 4.87 Fortinet Inc Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.88 Fortinet Inc Organisational Structure 2015
Figure 4.89 Fortinet Inc Subsidiaries 2015Figure 4.90 Fortinet Inc Number of Employees 2011-2014 (Number, AGR%)
Figure 4.91 Fortinet Inc Primary Market Competitors
Figure 4.92 General Dynamics Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.93 General Dynamics Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.94 General Dynamics Corporation Net Income / Loss 2010-2014 (US$m)
Figure 4.95 General Dynamics Corporation Net Capital Expenditure 2012-2014 (US$m, AGR%)
Figure 4.96 General Dynamics Corporation Cost of Research & Development 2012-2014 (US$m, AGR%)
Figure 4.97 General Dynamics Corporation Sales by Segment of Business 2012-2014 (US$m, Total Company Sales AGR%)
Figure 4.98 General Dynamics Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.99 General Dynamics Corporation Sales by Geographical Location 2012-2014 (US$m, Total Company Sales AGR%)
Figure 4.100 General Dynamics Corporation O rganisational Structure 2015
Figure 4.101 General Dynamics Corporation Subsidiaries 2015
Figure 4.102 General Dynamics Corporation Number of Employees 2010-2014 (Number, AGR%)
Figure 4.103 General Dynamics Corporation Primary Market Competitors
Figure 4.104 The Hewlett-Packard Company (HP) Cyber Security Market Share 2015 (% Market Share)
Figure 4.105 The Hewlett-Packard Company (HP) Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.106 The Hewlett-Packard Company (HP) Net Income / Loss 2010-2014 (US$m)
Figure 4.107 The Hewlett-Packard Company (HP) Net Capital Expenditure 2011-2014 (US$m, AGR%)
Figure 4.108 The Hewlett-Packard Company (HP) Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.109 The Hewlett-Packard Company (HP) Organisational Structure 2015
Figure 4.110 The Hewlett-Packard Company (HP) Subsidiaries 2015
Figure 4.111 The Hewlett-Packard Company (HP) Primary Market Competitors
Figur e 4.112 International Business Machines (IBM) Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.113 International Business Machines (IBM) Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.114 International Business Machines (IBM) Corporation Net Income 2010-2014 (US$m, AGR%)
Figure 4.115 International Business Machines (IBM) Corporation Net Capital Expenditure 2008-2014 (US$m, AGR%)
Figure 4.116 International Business Machines (IBM) Corporation Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.117 International Business Machines (IBM) Corporation Sales AGR by Segment of Business 2011-2014 (%)
Figure 4.118 International Business Machines (IBM) Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.119 International Business Machines (IBM) Corporation Sales by Geographical Location 2012-2014 (US$m, Total Company Sales AGR%)
Figure 4.120 I nternational Business Machines (IBM) Corporation Organisational Structure 2015
Figure 4.121 International Business Machines (IBM) Corporation Number of Employees 2010-2014 (Number, AGR%)
Figure 4.122 International Business Machines (IBM) Corporation Primary Market Competitors
Figure 4.123 Intel Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.124 Intel Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.125 Intel Corporation Net Income 2010-2014 (US$m, AGR%)
Figure 4.126 Intel Corporation Net Capital Expenditure 2012-2014 (US$m, AGR%)
Figure 4.127 Intel Corporation Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.128 Intel Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.129 Intel Corporation Sales by Geographical Location 2012-2014 (US$m, Total Company Sales AGR%)
Figure 4.130 Intel Corporation Organisational Structure 2015
Figure 4.131 Intel Corporation Number of Employees 2010-2014 (Number, AGR%)
Figure 4.132 Intel Corporation Primary Market Competitors
Figure 4.133 Kaspersky Lab Cyber Security Market Share 2015 (% Market Share)
Figure 4.134 Kaspersky Lab Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.135 Kaspersky Lab Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.136 Kaspersky Lab Organisational Structure 2015
Figure 4.137 Kaspersky Lab Primary Market Competitors
Figure 4.138 L-3 Communications Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.139 L-3 Communications Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.140 L-3 Communications Corporation Net Income 2010-2014 (US$m, AGR%)
Figure 4.141 L-3 Communications Corporation Net Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 4.142 L-3 Communications Corporation Sales by Segment of Business 2012-2014 (US$m, Total Co mpany Sales AGR%)
Figure 4.143 L-3 Communications Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.144 L-3 Communications Corporation Sales by Geographical Location 2012-2014 (US$m, Total Company Sales AGR%)
Figure 4.145 L-3 Communications Corporation Organisational Structure 2015
Figure 4.146 L-3 Communications Corporation Number of Employees 2010-2014 (Number, AGR%)
Figure 4.147 L-3 Communications Corporation Primary Market Competitors
Figure 4.148 Leidos Inc Cyber Security Market Share 2015 (% Market Share)
Figure 4.149 Leidos Inc Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.150 Leidos Inc Net Income / Loss 2011-2014 (US$m)
Figure 4.151 Leidos Inc Net Capital Expenditure 2012-2014 (US$m, AGR%)
Figure 4.152 Leidos Inc Organisational Structure 2015
Figure 4.153 Leidos Inc Primary Market Competitors
Figure 4.154 Lockheed Martin Corporation Cyber Security Market Share 2015 (% M arket Share)
Figure 4.155 Lockheed Martin Corporation Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.156 Lockheed Martin Corporation Net Income 2010-2014 (US$m, AGR%)
Figure 4.157 Lockheed Martin Corporation Net Capital Expenditure 2010-2014 (US$m, AGR%)
Figure 4.158 Lockheed Martin Corporation Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.159 Lockheed Martin Corporation Sales AGR by Segment of Business 2011-2014 (%)
Figure 4.160 Lockheed Martin Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.161 Lockheed Martin Corporation Sales AGR by Geographical Location 2010-2014 (%)
Figure 4.162 Lockheed Martin Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.163 Lockheed Martin Corporation Organisational Structure 2015
Figure 4.164 Lockheed Martin Corporation Number of Employees 2010-2014 (Number, AGR%)
Figure 4.165 Lockheed Martin Corporation Primary Market Competitors
Figure 4.166 Northrop Grumman Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.167 Northrop Grumman Corporation Total Company Sales 2008-2014 (US$m, AGR%)
Figure 4.168 Northrop Grumman Corporation Net Income 2008-2014 (US$m, AGR%)
Figure 4.169 Northrop Grumman Corporation Net Capital Expenditure 2008-2014 (US$m, AGR%)
Figure 4.170 Northrop Grumman Corporation Sales by Segment of Business 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.171 Northrop Grumman Corporation Sales AGR by Segment of Business 2011-2014 (%)
Figure 4.172 Northrop Grumman Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.173 Northrop Grumman Corporation Sales AGR by Geographical Location 2011-2014 (%)
Figure 4.174 Northrop Grumman Corporation Sales by Geographical Location 2010-2014 (US$m, Total Company Sales AGR%)
Figure 4.175 Northr op Grumman Corporation Organisational Structure 2015
Figure 4.176 Northrop Grumman Corporation Number of Employees 2010-2014 (Number, AGR%)
Figure 4.177 Northrop Grumman Corporation Primary Market Competitors
Figure 4.178 PWC Cyber Security Market Share 2015 (% Market Share)
Figure 4.179 PWC Total Company Sales 2010-2014 (US$m, AGR%)
Figure 4.180 PWC Organisational Structure 2015
Figure 4.181 PWC Primary Market Competitors
Figure 4.182 The Raytheon Company Cyber Security Market Share 2015 (% Market Share)
Figure 4.183 The Raytheon Company Total Company Sales 2005-2014 (US$m, AGR%)
Figure 4.184 The Raytheon Company Net Income 2005-2014 (US$m, AGR%)
Figure 4.185 The Raytheon Company Net Capital Expenditure 2005-2014 (US$m, AGR%)
Figure 4.186 The Raytheon Company Order Backlog 2005-2014 (US$m, AGR%)
Figure 4.187 The Raytheon Company Cost of Research & Development 2005-2014 (US$m, AGR%)
Figure 4.188 The Raytheon Company Sales by Segment of Busi ness 2005-2014 (US$m, Total Company Sales AGR%)
Figure 4.189 The Raytheon Company Sales AGR by Segment of Business 2006-2014 (%)
Figure 4.190 The Raytheon Company Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.191 The Raytheon Company Sales AGR by Geographical Location 2006-2014 (%)
Figure 4.192 The Raytheon Company Sales by Geographical Location 2005-2014 (US$m, Total Company Sales AGR%)
Figure 4.193 The Raytheon Company Organisational Structure 2015
Figure 4.194 The Raytheon Company Number of Employees 2010-2014 (Number, AGR%)
Figure 4.195 The Raytheon Company Primary Market Competitors
Figure 4.196 The Raytheon Company Cost of Merger & Acquisition Activity 2005-2014 (Number, AGR%)
Figure 4.197 Symantec Corporation Cyber Security Market Share 2015 (% Market Share)
Figure 4.198 Symantec Corporation Total Company Sales 2008-2015 (US$m, AGR%)
Figure 4.199 Symantec Corporation Net Income 2011-2 015 (US$m, AGR%)
Figure 4.200 Symantec Corporation Net Capital Expenditure 2011-2015 (US$m, AGR%)
Figure 4.201 Symantec Corporation Cost of Research & Development 2011-2015 (US$m, AGR%)
Figure 4.202 Symantec Corporation Sales by Segment of Business 2010-2015 (US$m, Total Company Sales AGR%)
Figure 4.203 Symantec Corporation Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.204 Symantec Corporation Sales AGR by Geographical Location 2009-2014 (%)
Figure 4.205 Symantec Corporation Sales by Geographical Location 2008-2014 (US$m, Total Company Sales AGR%)
Figure 4.206 Symantec Corporation Organisational Structure 2015
Figure 4.207 Symantec Corporation Number of Employees 2010-2015 (Number, AGR%)
Figure 4.208 Symantec Corporation Primary Market Competitors
Figure 4.209 Trend Micro Inc Cyber Security Market Share 2015 (% Market Share)
Figure 4.210 Trend Micro Inc Total Company Sales 2010-2014 (US$m, A GR%)
Figure 4.211 Trend Micro Inc Net Income 2010-2014 (US$m, AGR%)
Figure 4.212 Trend Micro Inc Primary International Operations 2015  (Headquarters, Primary International Operations)
Figure 4.213 Trend Micro Inc Organisational Structure 2015
Figure 4.214 Trend Micro Inc Primary Market Competitors


------------------------------------------------------------
Companies Mentioned in this report

3Com International, Inc.
3Par Inc.
ACCSCO S.A.
Air Command Systems International S.A.S. (ACSI)
Amber Engineering Inc
AMSEC LLC
Anschutz Japan Co. Ltd.
Applied Signal Techn ology Inc
ArcSight, LLC
Arrowpoint Communications
Ateon Ltd
Ateon Ltd.
AxleTech International Inc
AxleTech International Inc.
BAE Systems Applied Intelligence
BAE Systems Controls Inc
BAE Systems Dettica
BAE Systems Information and Electronic Systems Integration Inc
BAE Systems Information Solutions Inc
BAE Systems Land & Armaments LLP
BAE Systems Oman
BAE Systems plc
BAE Systems Saudi Arabia
BAE Systems Surface Ships Limited
BAE Systems, Eurofighter GmbH
BAE Systems, Navistar Defense LLC, Oshkosh Defense
Bath Iron Works
Bath Iron Works
Booz Allen Hamilton Inc
BroadWare Technologies
C4 Advanced Solutions
CACI International
Checkpoint Software Technologies Ltd
Check Point Software Technologies Inc
Check Point Software (Canada) Technologies Inc
Check Point Software Technologies (Japan) Ltd
Check Point Software Technologies (Netherlands) B.V
Check Point Holding (Singapore) PTE Ltd
Check Po int Holding (Singapore) PTE Ltd. (Representative Office)
Check Point Holding (Singapore) PTE Ltd – US Branch
Israel Check Point Software Technologies Ltd. China
Check Point Holding AB
SofaWare Technologies Ltd
Dynasec Ltd
Hyperwise Ltd
Cisco (India) Private Limited
Cisco International Limited
Cisco Media Solutions Inc
Cisco Systems (Thailand) Limited
Cisco Systems (USA) Pte. Ltd.
Cisco Systems Capital Corp
Cisco Systems Finland Oy
Cisco Systems G.K.
Cisco Systems International B.V.
Cisco Systems plc
Cisco Videoscape
Cognio
Compaq Computer (Delaware), LLC
Compaq Latin America Corporation
Compatible Systems
Compucat Research Pty Ltd
Computer Insurance Company
Computer Sciences Corporation
Convair
Data Logic, Inc.
DataShield Consulting
Deloitte Touche Tohmatsu Ltd (DTTL)
dynamicsoft
Eagle Enterprise Inc.
EDS Global Contracts, LLC
EDS World Corporation (Far East) LLC
EDS World Corporation (Netherlands) LLC
Electric Launch Company
Electronica Nayarit, S.A
EMC (Benelux) B.V.
EMC Corporation
EMC Information Systems International
VMware Bermuda Limited
EMC International U.S. Holdings, Inc
VMware, Inc
EMC International Company
Engility
Ernst & Young Global Ltd (EY)
ESY Export Company, Inc
E-Systems Technologies Holding, Inc.
EUREST Raytheon Support Services
EverythingAircraft LLC
EYP Mission Critical Facilities, Inc.
Fibercore
FireMon
First Communications Company
FNSS Savuma Sistemleri AS
Foreground Security
Fortinet BV
Fortinet Federal Inc
Fortinet GmbH
Fortinet Inc
Fortinet Information Technology (Beijing) Co Ltd
Fortinet Information Technology (Tianjin) Co Ltd
Fortinet International Inc
Fortinet Malaysia SDN BHD
Fortinet Mexico
Fortinet SARL
Fortinet Singapore Private Limited
Fortinet Technologies (Canada) Inc
Fortinet Technologies India Private Limited
Fortinet UK Ltd
General Dynamics Advanced Information Systems
General Dynamics Armament Systems Inc.
General Dynamics C4 Systems
General Dynamics Corporation
General Dynamics Electric Boat
General Dynamics Government Systems Corp.
General Dynamics Information Technologies Inc.
General Dynamics Itronix Corporation
General Dynamics Land Systems
General Dynamics Ordnance & Tactical Systems Inc.
General Dynamics OTS Inc.
General Dynamics SATCOM Technologies Inc.
General Dynamics United Kingdom Ltd.
Global Technical Systems
Gulfstream Aerospace
Henggeler Computer Consultants Inc
Hewlett-Packard Administrative Services LLC
Hewlett-Packard Asia Pacific Services Corporation
Hewlett-Packard Bermuda Enterprises, LLC
Hewlett-Packard Brazil Holdings, LLC
Hewlett-Packard Development Company, L.P.
Hewlett-Packard Financial Services Company
Hewlett-Packard Inter-Americas
Hewlett-Packard Luxembourg Enterprises, LLC
Hewlett-Packa rd Products CV 1, LLC
Hewlett-Packard Products CV 2, LLC
Hewlett-Packard Software, LLC
Hewlett-Packard State & Local Enterprise Services, Inc.
Hewlett-Packard World Services Corporation
Hewlett-Packard World Trade, LLC
Honeywell Technology Solutions
HP Enterprise Services, LLC
HP Financial Services International Holdings Company
HPFS Global Holdings I, LLC
HPFS Global Holdings II, LLC
HRL Research Analytics, Inc.
Hughes Airport Development Corporation Sdn Bhd
Hughes Arabia Limited
Hughes Asia Pacific Hong Kong Limited
Hughes Europe N.V.
Hughes Training Italia Srl
Indigo America, Inc.
Indra ATM S.L.
Intel Corporation
International Business Machines Corporation (IBM)
International Electronics Systems, Inc.
Jabber, Inc
Jet Aviation
JouleX
Juniper Networks Inc
Kiss Technology
Komodo Technology
Ktech Corporation
L-3 Link Simulation & Training
L-3 Services Inc
lgoSec
Lightstream
Link sys
ManageEngine
Meraki Networks
Metreos
MOWAG GmbH
MphasiS Corporation
National Steel and Shipbuilding Company
NetSolve
NetSpeed
Newport Systems Solutions
NHIC, Corp.
Okena
Orative
Palm, Inc.
Palo Alto Networks
Parc Technologies
Pari Networks
Patriot Overseas Support Company
P-Cube
Pikewerks Corporation
Poseidon Scientific Instruments Pty Ltd
PostPath
PostX
Procket Networks
Pure Digital Technologies
Pure Networks
Raphael Advanced Defense Systems Ltd
RAYCOM, INC.
Raytheon Advanced Systems Company
Raytheon Air Control Company
Raytheon Aircraft Holdings, Inc.
Raytheon Aircraft Services, Inc.
Raytheon Aircraft Systems International
Raytheon Aircraft Systems International L.P.
Raytheon Appliances Asia, Inc.
Raytheon Australia
Raytheon Australia International PTY Limited
Raytheon Australia Pty Ltd
Raytheon Brasil Sistemas De Integracao Ltda
Raytheon Canada Limited (RCL)
Raytheon Canada Ltd.
Raytheon Company Chile Limitada
Raytheon Company Integrated Defense Systems
Raytheon Company Missile Systems
Raytheon Deutschland GmbH
Raytheon Do Brasil Ltda.
Raytheon Espana, S.A.
Raytheon Europe International Company
Raytheon Integrated Defense Systems
Raytheon International Korea, Inc.
Raytheon Kuwait Enterprises General Trading & Contracting Co. W.L.L
Raytheon Limited
Raytheon Marine G.m.b.H.
Raytheon Microelectronics Espana, S.A.
Raytheon Microelectronics Europa Limited
Raytheon Missile Systems Company
Raytheon Philippines, Inc.
Raytheon Saudi Arabia Limited
Raytheon Southeast Asia Systems Company
Raytheon Space and Airborne Systems
Raytheon Systems Holding Company LLC
Raytheon Systems Israel Company
Raytheon Systems Limited (RSL)
Raytheon Technical Services Ukraine
Raytheon Training International GmbH
Raytheon United Kingdom
Raytheon/Lockheed Martin Javelin Joint Venture
Raytheon-Tag Components Limited
RL3 JV
SafeGuard Services LLC
SafeNet Government Solutions
SAIC
Scientific Atlanta
Scientific Research Corporation
Securenet
Seismograph Service France
Selsius Systems
Serco
Serco Inc
Shanghai Raytheon Professional Services Consulting Company Ltd.
Shoreline Investment Management Company
Skybox Security
Skystone Systems
Sourcefire
Starent Networks
Switchcraft de Mexico S.A. de C.V.
TAG Halbleiter GmbH
Tall Tree Insurance Company
Tasmania Network Systems
Technology Associates Inc
Teligy Inc
Thales Raytheon Systems Arabia L.P.
Thales-Raytheon Systems Co. LLC
Thales-Raytheon Systems Co. Ltd
Thales-Raytheon Systems Company Limited
Thales-Raytheon Systems Company S.A.S.
Thales-Raytheon Systems Company S.A.S. (TRS SAS)
The Gulf Industrial Technology Company (KSC)
The Herjavec Group
The Hewlett-Packard Company (HP)
The Raytheon Company
Tidal Software
Tipp ingPoint Holdings, Inc.
TippingPoint Technologies, Inc.
Trusted Computer Solutions Inc
Tufin
Twingo Systems
Verizon Enterprise Solution
Vertex Antennetechnik GmbH
Vertica Systems, Inc.
Visual Analytics Inc
Vodafone McLaren Mercedes
Vovida Networks
WebEx
Webline Communications
Wendover Financial Services Corporation
WheelGroup
WTAF, LLC

 
Other Organisations Mentioned in This Report
Department of Homeland Security
New Zealand Department of Internal Affairs
UK Foreign & Commonwealth Office
UK Foreign and Commonwealth Office
UK Highways Agency
UK Ministry of Justice
UK Skills Funding Agency
US Defense Intelligence Agency (DIA)
US Department of Defense
US Department of Homeland Security (DHS) Office of the Chief Financial Officer (OCFO)
US Federal Bureau of Investigation (FBI)
US National Security Agency (NSA)
US Navy
US Space and Naval Warfare Systems Command


< span align="left" valign="top" style="font-size: 12px; color: rgb(0, 0, 0);">------------------------------------------------------------
Pricing

Single User License:
Single user copies of this report are available for EUR2249/ USD2699/ GBP1799

Departmental License:
Entitles up to 5 individual users to access this report for EUR3599/ USD4499/ GBP2999 (Not suitable for library usage)

Site License:
Allow your company to have access to this report at one location for EUR5999/ USD7499/ GBP4999 (Suitable for library storage and use)

Global License:
Have your whole company worldwide to access this information for EUR8399/ USD9999/ GBP6999

------------------------------------------------------------
Ordering

All you need to do to order this report is to contact Dorottya Szalai on:
Telephone: +44(0)207 549 9964 or email: dorottya.szalai@vgtelecomreports.com
And provide the following information:


Report Title:
Report License (Single User/Departmental/Site/Global):
Name:
User Email: < br>Job Title:
Company:
Invoice Address:
Telephone and Fax number:
EEC VAT Number (only for E.U.):


Please contact me should you have any questions or wish to receive an executive summary of this report.

I look forward to hearing from you.


Best Regards,

Dorottya Szalai
Telecoms Industry Consultant


Terms and Conditions


By replying to this e-mail submitting your order for this product you have agreed without limitation or qualification to be bound by and to comply with these Terms and Conditions. You agree that you will not fail to complete any transaction after submitting an order to purchase a product or submit any order to purchase a product where you do not intend to complete the transaction. Management Reports will only be sent on receipt of payment.


You are currently subscribed to this list as ali.ali-an@yandex.by . As a valued contact or customer, you are receiving this email with information that we believe will be relevant to you. If however, you wish to stop future messages, please reply to this email typing "REMOVE" in the subject box.



Registered Office: BSG House, 230 City Road, London, EC1V 2QY, U.K.

FeedBurner FeedCount

Архив блога