TABLE OF CONTENTS
1 MARKET INTRODUCTION
1.1 INTRODUCTION
1.2 SCOPE OF STUDY
1.2.1 RESEARCH OBJECTIVE
1.2.2 ASSUMPTIONS
1.2.3 LIMITATIONS
1.3 MARKET STRUCTURE
2 RESEARCH METHODOLOGY
2.1 RESEARCH TYPE
2.2 PRIMARY RESEARCH
2.3 SECONDARY RESEARCH
2.4 FORECAST MODEL
2.4.1 MARKET DATA COLLECTION, ANALYSIS & FORECAST
2.4.2 MARKET SIZE ESTIMATION
3 MARKET DYNAMICS
3.1 INTRODUCTION
3.2 MARKET DRIVERS
3.3 MARKET RESTRAINTS
4 EXECUTIVE SUMMARY
5. MARKET FACTOR ANALYSIS
5.1 PORTERโS FIVE FORCES ANALYSIS
5.2 SUPPLY CHAIN ANALYSIS
6 BYOD SECURITY MARKET, BY SEGMENTS
6.1 INTRODUCTION
6.2 MARKET STATISTICS
6.2.1 BY DEVICE TYPE
6.2.1.1 SMARTPHONE
6.2.1.2 TABLET
6.2.1.1 LAPTOP
6.2.2 BY SOFTWARE
6.2.2.1 MOBILE DATA SECURITY
6.2.2.2 MOBILE DEVICE SECURITY
6.2.2.3 NETWORK SECURITY
6.2.3 BY SOLUTION SECURITY
6.2.3.1 MOBILE DEVICE MANAGEMENT
6.2.3.2 MOBILE SECURITY SOLUTION MANAGEMNT
6.2.3.3 MOBILE CONTENT MANAGEMENT
6.2.3.4 MOBILE IDENTITY MANAGEMENT
6.2.4 BY END USER
6.2.1.1 LARGE ENTERPRISE
6.2.1.2 SMALL & MEDIUM ENTERPRISE
6.2.5 BY GEOGRAPHY
6.2.5.1 NORTH AMERICA
6.2.5.2 EUROPE
6.2.5.3 ASIA-PACIFIC
6.2.5.4 REST OF THE WORLD
7 COMPETITIVE ANALYSIS
7.1 MARKET SHARE ANALYSIS
7.2 COMPANY PROFILES
7.2.1 CITRIX SYSTEMS, INC. (U.S.)
7.2.2 INTERNATIONAL BUSINESS MACHINES (IBM) CORPORATION (U.S.)
7.2.3 VMWARE, INC. (U.S.)
7.2.4 MOBILEIRON INC. (U.S.)
7.2.5 GOOD TECHNOLOGY CORPORATION. (U.S.)
7.2.6 FORTINET INC. (U.S.)
7.2.7 AVAYA INC. (U.S.)
7.2.8 CISCO SYSTEMS (U.S.)
7.2.9 HEWLETT PACKARD ENTERPRISE (U.S.)
7.2.10 SYMANTEC CORPORATION (U.S.)
7.2.11 OTHERS
LIST OF TABLES
TABLE 1 BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 2 BYOD SECURITY MARKET, BY SOFTWARE
TABLE 3 BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 4 BYOD SECURITY MARKET, BY END USER
TABLE 5 BYOD SECURITY MARKET, BY GEOGRAPHY
TABLE 6 NORTH AMERICA BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 7 NORTH AMERICA BYOD SECURITY MARKET, BY SOFTWARE
TABLE 8 NORTH AMERICA BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 9 NORTH AMERICA BYOD SECURITY MARKET, BY END USER
TABLE 10 U.S. BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 11 U.S. BYOD SECURITY MARKET, BY SOFTWARE
TABLE 12 U.S. BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 13 U.S. BYOD SECURITY MARKET, BY END USER
TABLE 14 CANADA BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 15 CANADA BYOD SECURITY MARKET, BY PRODUCT
TABLE 16 CANADA BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 17 CANADA BYOD SECURITY MARKET, BY END UESR
TABLE 18 EUROPE BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 19 EUROPE BYOD SECURITY MARKET, BY SOFTWARE
TABLE 20 EUROPE BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 21 EUROPE BYOD SECURITY MARKET, BY END USER
TABLE 22 GERMANY BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 23 GERMANY BYOD SECURITY MARKET, BY PRODUCT
TABLE 24 GERMANY BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 25 FRANCE BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 26 FRANCE BYOD SECURITY MARKET, BY PRODUCT
TABLE 27 FRANCE BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 28 FRANCE BYOD SECURITY MARKET, BY END USER
TABLE 29 U.K. BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 30 U.K. BYOD SECURITY MARKET, BY PRODUCT
TABLE 31 U.K. BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 32 U.K. BYOD SECURITY MARKET, BY END USER
TABLE 33 REST OF EUROPE BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 34 REST OF EUROPE BYOD SECURITY MARKET, BY PRODUCT
TABLE 35 REST OF EUROPE BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 36 REST OF EUROPE BYOD SECURITY MARKET, BY END USER
TABLE 37 ASIA-PACIFIC BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 38 ASIA-PACIFIC BYOD SECURITY MARKET, BY PRODUCT
TABLE 39 ASIA-PACIFIC BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 40 ASIA-PACIFIC BYOD SECURITY MARKET, BY END USER
TABLE 41 REST OF THE WORLD BYOD SECURITY MARKET, BY DEVICE TYPE
TABLE 42 REST OF THE WORLD BYOD SECURITY MARKET, BY PRODUCT
TABLE 43 REST OF THE WORLD BYOD SECURITY MARKET, BY SECURITY SOLUTION
TABLE 44 REST OF THE WORLD BYOD SECURITY MARKET, BY END USER
LIST OF FIGURES
FIGURE 1 RESEARCH TYPE
FIGURE 2 BYOD SECURITY MARKET: BY DEVICE TYPE (%)
FIGURE 3 BYOD SECURITY MARKET: BY SOFTWARE (%)
FIGURE 4 BYOD SECURITY MARKET: BY SECURITY SOLUTION (%)
FIGURE 5 BYOD SECURITY MARKET: BY END USER (%)
FIGURE 6 BYOD SECURITY MARKET: BY REGION (%)
FIGURE 7 NORTH AMERICA BYOD SECURITY MARKET, BY DEVICE TYPE (%)
FIGURE 8 NORTH AMERICA BYOD SECURITY MARKET, BY SOFTWARE (%)
FIGURE 9 NORTH AMERICA BYOD SECURITY MARKET, BY SECURITY SOLUTION (%)
FIGURE 10 NORTH AMERICA BYOD SECURITY MARKET, BY END USER (%)
FIGURE 11 EUROPE BYOD SECURITY MARKET, BY DEVICE TYPE (%)
FIGURE 12 EUROPE BYOD SECURITY MARKET, BY SOFTWARE (%)
FIGURE 13 EUROPE BYOD SECURITY MARKET, BY SECURITY SOLUTION (%)
FIGURE 14 EUROPE BYOD SECURITY MARKET, BY END USER (%)
FIGURE 15 ASIA-PACIFIC BYOD SECURITY MARKET, BY DEVICE TYPE (%)
FIGURE 16 ASIA-PACIFIC BYOD SECURITY MARKET, BY SOFTWARE (%)
FIGURE 17 ASIA-PACIFIC BYOD SECURITY MARKET, BY SECURITY SOLUTION (%)
FIGURE 18 ASIA-PACIFIC BYOD SECURITY MARKET, BY END USER (%)
FIGURE 19 ROW BYOD SECURITY MARKET, BY DEVICE TYPE (%)
FIGURE 20 ROW BYOD SECURITY MARKET, BY SOFTWARE (%)
FIGURE 21 ROW BYOD SECURITY MARKET, BY SECURITY SOLUTION (%)
FIGURE 22 ROW BYOD SECURITY MARKET, BY END USER (%)