1 Introduction
1.1 Objective
1.2 Market definition
1.3 Methodology
1.4 Events based Forecast Scenario
1.5 Who will benefit from this report?
1.1.1 How Vendors, Service Providers & Business Developers Should Use this Report
1.1.2 How Cybersecurity Professionals Should Use this Report
1.1.3 How Policy Makers, Budget Planners and Political Leaders Should Use this Report
1.6 Language
2 Executive Summary
2.1 Cybersecurity Trends and Insights
2.2 Major Findings
2.3 Major Conclusions
2.4 Important Tables and Graphs
3 Current Technologies of Cybersecurity
3.1 Introduction
3.2 Classification by Technology
3.3 Classification by Application
3.4 Classification by Technique
3.5 Classification by Security Type
4 Current Market Overview of Cybersecurity
4.1 Introduction
4.2 Current Markets
4.2.1 North America
4.2.2 Europe
4.2.3 Asia
4.2.4 Middle East
4.2.5 Africa
4.3 Future Markets
5 Market Analysis
5.1 Introduction
5.2 Market Segmentation
5.3 Forecast factors
5.3.1 Drivers
5.3.2 Inhibitors
5.3.3 Opportunities
5.3.4 Challenges
5.1 Porter’s 5 Forces Analysis
5.1.1 Bargaining power of buyers
5.1.2 Bargaining power of suppliers
5.1.3 Threat of new entrants
5.1.4 Threat of substitutes
5.1.5 Rivalry among existing players
5.2 PESTEL Analysis
5.2.1 Political Factors
5.2.2 Economic Factors
5.2.3 Social Factors
5.2.4 Technological Factors
5.2.5 Environmental Factors
5.2.6 Legal Factors
5.3 Marketing and growth lessons post the COVID-19 crisis
5.4 Forecast factors
5.4.1 Scenario 1 - Market Forecast Scenario: COVID-19 outbreak
5.4.2 Scenario 2 - Event Based Scenarios: Post COVID-19 outbreak
6 Forecast Cybersecurity Market by Region to 2030
6.1 Introduction
6.2 Cybersecurity market by region overview
6.2.1 Americas: Cybersecurity market by Technology
6.2.2 Europe: Cybersecurity market by Technology
6.2.3 Asia: Cybersecurity market by Technology
6.2.4 Middle East: Cybersecurity market by Technology
6.2.5 Africa: Cybersecurity market by Technology
7 Forecast Cybersecurity Market by Technique to 2030
7.1 Introduction
7.2 Cybersecurity market by technique overview
7.2.1 Reverse Engineering: Cybersecurity market by Technology
7.2.2 Cryptography: Cybersecurity market by Technology
7.2.3 Forensics: Cybersecurity market by Technology
7.2.4 Binary Exploitation: Cybersecurity market by Technology
7.2.5 Web Exploitation: Cybersecurity market by Technology
8 Forecast Cybersecurity Market by Technology to 2030
8.1 Introduction
8.2 Cybersecurity market by Technology overview
8.2.1 Malware: Cybersecurity market by Technology
8.2.2 Phishing: Cybersecurity market by Technology
8.2.3 Man-in-the-middle-attacks: Cybersecurity market by Technology
8.2.4 Denial of service attack: Cybersecurity market by Technology
8.2.5 SQL Injections: Cybersecurity market by Technology
8.2.6 Zero-day exploits: Cybersecurity market by Technology
8.2.7 Rootkits: Cybersecurity market by Technology
9 Forecast Cybersecurity Market by Application to 2030
9.1 Introduction
9.2 Cybersecurity market by Application overview
9.2.1 Advanced Persistent Threat: Cybersecurity market by Technology
9.2.2 Threat Intelligence: Cybersecurity market by Technology
9.2.3 Security and Information Event Management: Cybersecurity market by Technology
9.2.4 Security and Vulnerability Management: Cybersecurity market by Technology
9.2.5 Network Access Control: Cybersecurity market by Technology
9.2.6 Anti-Virus: Cybersecurity market by Technology
9.2.7 Firewall: Cybersecurity market by Technology
9.2.8 Secure Web Gateway: Cybersecurity market by Technology
9.2.9 Security Orchestration Automation & Response: Cybersecurity market by Technology
9.2.10 Identity & Access Management: Cybersecurity market by Technology
9.2.11 Encryption: Cybersecurity market by Technology
9.2.12 Disaster Recovery: Cybersecurity market by Technology
9.2.13 Intrusion Detection & Prevention: Cybersecurity market by Technology
9.2.14 Risk & Compliance Management: Cybersecurity market by Technology
9.2.15 Others: Cybersecurity market by Technology
10 Forecast Cybersecurity Market by Security Type to 2030
10.1 Introduction
10.2 Cybersecurity market by Security Type overview
10.2.1 Network Security: Cybersecurity market by Security Type
10.2.2 Application Security: Cybersecurity market by Security Type
10.2.3 Cloud Security: Cybersecurity market by Security Type
11 Forecast Cybersecurity Market by End User to 2030
11.1 Introduction
11.2 Cybersecurity market by End User overview
11.2.1 Government: Cybersecurity market by Security Type
11.2.2 Civil: Cybersecurity market by Security Type
11.2.3 Commercial: Cybersecurity market by Security Type
12 Events based forecast for the Cybersecurity Market to 2030
12.1 Introduction
12.2 Events forecast factors
12.3 Event Forecast by Region
12.4 Event Forecast by Technology
12.5 Event Forecast by Application
12.6 Event Forecast by Security Type
12.7 Event Forecast by End User
13 Opportunity Analysis
13.1 Introduction
13.2 Opportunity Analysis Post Coronavirus Outbreak - by Region
13.3 Opportunity Analysis Post Coronavirus Outbreak - by Technology
13.4 Opportunity Analysis Post Coronavirus Outbreak - by Application
13.5 Opportunity Analysis Post Coronavirus Outbreak - by Security Type
13.6 Opportunity Analysis Post Coronavirus Outbreak - by End User
14 Leading Companies in the Cybersecurity Market
14.1 Airbus Defence & Space
14.1.1 Company profile
14.1.2 Products and Services
14.1.3 Segment Revenue
14.1.4 Financial information
14.1.5 Recent contract wins
14.1.6 Recent Projects completed
14.1.7 Strategic Alliances
14.1.8 CyberSecurity: Products & Services
14.1.9 SWOT ANALYSIS
14.2 BAE Systems
14.2.1 Company profile
14.2.2 Products & Services
14.2.3 Segment Revenue
14.2.4 Financial Info
14.2.5 Recent contract wins
14.2.6 Recent Projects completed
14.2.7 Strategic Alliances
14.2.8 Cybersecurity: Products & Services
14.2.9 SWOT ANALYSIS
14.3 Boeing Co.
14.3.1 Company profile
14.3.2 Products & Services
14.3.3 Segment Revenue
14.3.4 Financial Info
14.3.5 Recent contract wins
14.3.6 Recent Projects completed
14.3.7 Strategic Alliances
14.3.8 Cybersecurity: Products & Services
14.3.9 SWOT ANALYSIS
14.4 Israel Aerospace Industries (IAI)
14.4.1 Company profile
14.4.2 Products & Services
14.4.3 Segment Revenue
14.4.4 Financial Info
14.4.5 Recent contract wins
14.4.6 Recent Projects completed
14.4.7 Strategic Alliances
14.4.8 Cybersecurity: Products & Services
14.4.9 SWOT ANALYSIS
14.5 Leonardo
14.5.1 Company profile
14.5.2 Products & Services
14.5.3 Segment Revenue
14.5.4 Financial Info
14.5.5 Recent contract wins
14.5.6 Recent Projects completed
14.5.7 Strategic Alliances
14.5.8 Cybersecurity: Products & Services
14.5.9 SWOT ANALYSIS
14.6 Lockheed Martin
14.6.1 Company profile
14.6.2 Products & Services
14.6.3 Segment Revenue
14.6.4 Financial Info
14.6.5 Recent contract wins
14.6.6 Recent Projects completed
14.6.7 Strategic Alliances
14.6.8 Cybersecurity: Products & Services
14.6.9 SWOT ANALYSIS
14.7 Northrop Grumman Corp.
14.7.1 Company profile
14.7.2 Products & Services
14.7.3 Segment Revenue
14.7.4 Financial Info
14.7.5 Recent contract wins
14.7.6 Recent Projects completed
14.7.7 Strategic Alliances
14.7.8 Cybersecurity: Products & Services
14.7.9 SWOT Analysis
14.8 Raytheon
14.8.1 Company profile
14.8.2 Products & Services
14.8.3 Segment Revenue
14.8.4 Financial Info
14.8.5 Recent contract wins
14.8.6 Recent projects completed
14.8.7 Strategic Alliances
14.8.8 Cybersecurity: Products & Services
14.8.9 SWOT Analysis
14.9 Saab
14.9.1 Company profile
14.9.2 Products & Services
14.9.3 Segment Revenue
14.9.4 Financial Info
14.9.5 Recent contract win
14.9.6 Recent projects completed
14.9.7 Strategic Alliances
14.9.8 Cybersecurity: Products & Services
14.9.9 SWOT Analysis
14.1 THALES
14.10.1 Company profile
14.10.2 Products & Services
14.10.3 Segment Revenue
14.10.4 Financial Info
14.10.5 Recent contract win
14.10.6 Recent projects completed
14.10.7 Strategic Alliances
14.10.8 Cybersecurity: Products & Services
14.10.9 SWOT Analysis
14.11 Other Companies of Interest
14.11.1 AVAST
14.11.2 Clear Water Compliance
14.11.3 CynergisTek
14.11.4 Exodus Intelligence
14.11.5 Fire Eye
14.11.6 MetricStream
14.11.7 Netragard
14.11.8 Nettitude
14.11.9 Telus Security Labs
14.11.10 VSR
14.11.11 Zerodium
15 Conclusions and Recommendations
15.1 Major Conclusions
15.2 Major Recommendations
16 About the Publisher
16.1 General
16.2 Contact the Publisher
16.3 Disclaimer
16.4 License information
16.4.1 1-User PDF License
16.4.2 5-User PDF License
16.4.3 Site PDF License
16.4.4 Enterprise PDF License
17 Appendices
17.1 Companies Mentioned
17.2 Abbreviations
17.3 Related reports
List of Figures
Figure 1: Region Market Forecast [US$ Bn] - 2022 - 2030
Figure 2: Technology Market Forecast [US$ Bn] - 2022 - 2030
Figure 3: Application Market Forecast [US$ Bn] - 2022 - 2030
Figure 4: Security Type Market Forecast [US$ Bn] - 2022 - 2030
Figure 5: End User Market Forecast [US$ Bn] - 2022 - 2030
Figure 6: Script based malware
Figure 7: Attractiveness of Cybersecurity market as per cybersecurity executives - 2020 vs 2021(%)
Figure 8: Americas Market Forecast - Total [US$ Bn] - 2022 - 2030
Figure 9: Europe Market Forecast - Total [US$ Bn] - 2022 - 2030
Figure 10: Command Run By Trojan Bemstour
Figure 11: Asia Market Forecast - Total [US$ Bn] - 2022 - 2030
Figure 12: Middle East Market Forecast - Total [US$ Bn] - 2022 - 2030
Figure 13: Africa Market Forecast - Total [US$ Bn] - 2022 - 2030
Figure 14: U.S.A Americas Market Forecast [US$ Bn] - 2022 - 2030
Figure 15: China Market Forecast [US$ Bn] - 2022 - 2030
Figure 16: Five Forces Model
Figure 17: PESTEL Analysis, Cybersecurity Market-2021-2029
Figure 18: Region Market Forecast [US$ Bn] - 2022 - 2030
Figure 19: Americas Market Forecast [US$ Bn] - 2022 - 2030
Figure 20: Europe Market Forecast [US$ Bn] - 2022 - 2030
Figure 21: Asia Market Forecast [US$ Bn] - 2022 - 2030
Figure 22: Middle East Market Forecast [US$ Bn] - 2022 - 2030
Figure 23: Africa Market Forecast [US$ Bn] - 2022 - 2030
Figure 24: Technique Market Forecast [US$ Bn] - 2022 - 2030
Figure 25: Reverse Engineering Market Forecast [US$ Bn] - 2022 - 2030
Figure 26: Cryptography Market Forecast [US$ Bn] - 2022 - 2030
Figure 27: Forensics Market Forecast [US$ Bn] - 2022 - 2030
Figure 28: Binary Exploitation Market Forecast [US$ Bn] - 2022 - 2030
Figure 29: Web Exploitation Market Forecast [US$ Bn] - 2022 - 2030
Figure 30: Technology Market Forecast [US$ Bn] - 2022 - 2030
Figure 31: Malware Market Forecast [US$ Bn] - 2022 - 2030
Figure 32: Phishing Market Forecast [US$ Bn] - 2022 - 2030
Figure 33: Man in the Middle Market Forecast [US$ Bn] - 2022 - 2030
Figure 34: Denial of service attack Market Forecast [US$ Bn] - 2022 - 2030
Figure 35: SQL Injections Market Forecast [US$ Bn] - 2022 - 2030
Figure 36: Zero day exploit Market Forecast [US$ Bn] - 2022 - 2030
Figure 37: Rootkits Market Forecast [US$ Bn] - 2022 - 2030
Figure 38: Application Market Forecast [US$ Bn] - 2022 - 2030
Figure 39: Advanced Persistent Threat Market Forecast [US$ Bn] - 2022 - 2030
Figure 40: Threat Intelligence Market Forecast [US$ Bn] - 2022 - 2030
Figure 41: Security and Information Event Management Market Forecast [US$ Bn] - 2022 - 2030
Figure 42: Security and Vulnerability Management Market Forecast [US$ Bn] - 2022 - 2030
Figure 43: Network Access Control Market Forecast [US$ Bn] - 2022 - 2030
Figure 44: Anti-Virus Control Market Forecast [US$ Bn] - 2022 - 2030
Figure 45: Firewall Market Forecast [US$ Bn] - 2022 - 2030
Figure 46: Secure Web Gateway Market Forecast [US$ Bn] - 2022 - 2030
Figure 47: Security Orchestration Automation & Response Market Forecast [US$ Bn] - 2022 - 2030
Figure 48: Identity & Access Management Market Forecast [US$ Bn] - 2022 - 2030
Figure 49: Encryption Market Forecast [US$ Bn] - 2022 - 2030
Figure 50: Disaster Recovery Market Forecast [US$ Bn] - 2022 - 2030
Figure 51: Intrusion Detection & Prevention Market Forecast [US$ Bn] - 2022 - 2030
Figure 52: Risk & Compliance Management Market Forecast [US$ Bn] - 2022 - 2030
Figure 53: Others Market Forecast [US$ Bn] - 2022 - 2030
Figure 54: Security Type Market Forecast [US$ Bn] - 2022 - 2030
Figure 55: Network Security Market Forecast [US$ Bn] - 2022 - 2030
Figure 56: Application Security Market Forecast [US$ Bn] - 2022 - 2030
Figure 57: Cloud Security Market Forecast [US$ Bn] - 2022 - 2030
Figure 58: End User Market Forecast [US$ Bn] - 2022 - 2030
Figure 59: Government Market Forecast [US$ Bn] - 2022 - 2030
Figure 60: Civil Market Forecast [US$ Bn] - 2022 - 2030
Figure 61: Commercial Market Forecast [US$ Bn] - 2022 - 2030
Figure 62: Region Event Forecast [US$ Bn] - 2022 - 2030
Figure 63: Technology Event Forecast [US$ Bn] - 2022 - 2030
Figure 64: Application Market Forecast [US$ Bn] - 2022 - 2030
Figure 65: Security Type Event Forecast [US$ Bn] - 2022 - 2030
Figure 66: End User Event Forecast [US$ Bn] - 2022 - 2030
Figure 67: Factors determining success of Opportunity Analysis
Figure 68: Region: CAGR growth 2022 - 2030
Figure 69: Technology: CAGR growth 2022 - 2030
Figure 70: Application: CAGR growth 2022 - 2030
Figure 71: Security Type: CAGR growth 2022 - 2030
Figure 72: End User: CAGR growth 2022 - 2030
Figure 73: Airbus Segment Revenue 2020 (%)
Figure 74: Airbus Revenue 2016-2020 (US$ bn)
Figure 75: Airbus Profit: 2016 - 2020 (US$ bn)
Figure 76: Airbus - Financial Information 2016-2020 (US$ bn)
Figure 77: BAE Segment Revenue in 2020 (%)
Figure 78: BAE Total Revenue: 2016 - 2020 (US$ bn)
Figure 79: BAE Profit: 2016 - 2020 (US$ bn)
Figure 80: BAE Systems - Financial Information 2016 - 2020 (US$ bn)
Figure 81: Boeing Segment Revenue in 2020 (%)
Figure 82: Boeing - Total Revenue 2016-2020 (US$ bn)
Figure 83: Boeing: Profit - 2016-2020 (US$ bn)
Figure 84: The Boeing Company Financial Information 2016-2020 (US$ bn)
Figure 85: Cyber Range
Figure 86: Boeing's Cyber Data Analytics Center
Figure 87: IAI Segment Revenue 2020 (%)
Figure 88: IAI - Total Revenue 2016-2020 (US$ bn)
Figure 89: IAI- Profit 2016-2020 (US$ bn)
Figure 90: IAI - Financial Information 2015-2019 (US$ bn)
Figure 91: Dedicated Cyber Operation Center
Figure 92: Leonardo Segment Revenue 2020 (%)
Figure 93: Leonardo - Total Revenue 2016 - 2020 (US$ bn)
Figure 94: Leonardo - Profit 2016 - 2020 (US$ bn)
Figure 95: Leonardo Financial Information 2016 - 2020 (US$ bn)
Figure 96: Cybersecurity Services
Figure 97: Lockheed Martin Segment Revenue 2020 (%)
Figure 98: Lockheed Martin - Total Revenues 2016 - 2020 (US$ bn)
Figure 99: Lockheed Martin - Profits 2016 - 2020 (US$ bn)
Figure 100: Lockheed Martin: Financial Information 2016 - 2020 (US$ bn)
Figure 101: Available evaluation for cyber impact
Figure 102: Northrop Grumman Segment Revenue 2020 (%)
Figure 103: Northrop Grumman - Total Revenue 2016 - 2020 (US$ bn)
Figure 104: Northrop Grumman - Profit 2016 - 2020 (US$ bn)
Figure 105: Northrop Grumman Financial Information 2016 - 2020 (US$ bn)
Figure 106: Cybersecurity Operation Center
Figure 107: Raytheon Segment Revenue in 2020 (%)
Figure 108: Raytheon Total Revenue 2016-2020 (US$ bn)
Figure 109: Raytheon Profit 2016-2020 (US$ bn)
Figure 110: Raytheon Financial Information 2016-2020 (US$ bn)
Figure 111: Cybersecurity Capabilities
Figure 112: Network, Cloud, Web and Endpoints security
Figure 113: Saab - Sales by Business Segments in 2020 (%)
Figure 114: Saab Total Revenue 2016-2020 (US$ bn)
Figure 115: Saab Profit 2016-2020 (US$ bn)
Figure 116: Saab Financial Information 2016-2020 (US$ bn)
Figure 117: Thales - Sales by Business Segments in 2020 (%)
Figure 118: THALES - Total Revenue- 2016-2020 (US$ bn)
Figure 119: THALES - Profit - 2016-2020 (US$ bn)
Figure 120: THALES Financial Information 2016-2020 (US$ bn)
Figure 121: Secured Communications-Based Train Control
Figure 122: Cybersecurity Services: Revenue Split
List of Tables
Table 1: Region Market Forecast [US$ Bn] - 2022 - 2030
Table 2: Technology Market Forecast [US$ Bn] - 2022 - 2030
Table 3: Application Market Forecast [US$ Bn] - 2022 - 2030
Table 4: Security Type Market Forecast [US$ Bn] - 2022 - 2030
Table 5: End User Market Forecast [US$ Bn] - 2022 - 2030
Table 6: Region Market Forecast [US$ Bn] - 2022 - 2030
Table 7: Americas Market Forecast [US$ Bn] - 2022 - 2030
Table 8: Europe Market Forecast [US$ Bn] - 2022 - 2030
Table 9: Asia Market Forecast [US$ Bn] - 2022 - 2030
Table 10: Middle East Market Forecast [US$ Bn] - 2022 - 2030
Table 11: Africa Market Forecast [US$ Bn] - 2022 - 2030
Table 6: Technique Market Forecast [US$ Bn] - 2022 - 2030
Table 7: Reverse Engineering Market Forecast [US$ Bn] - 2022 - 2030
Table 8: Cryptography Market Forecast [US$ Bn] - 2022 - 2030
Table 9: Forensics Market Forecast [US$ Bn] - 2022 - 2030
Table 10: Binary Exploitation Market Forecast [US$ Bn] - 2022 - 2030
Table 11: Web Exploitation Market Forecast [US$ Bn] - 2022 - 2030
Table 12: Technology Market Forecast [US$ Bn] - 2022 - 2030
Table 13: Malware Market Forecast [US$ Bn] - 2022 - 2030
Table 14: Phishing Market Forecast [US$ Bn] - 2022 - 2030
Table 15: Man in the Middle Market Forecast [US$ Bn] - 2022 - 2030
Table 16: Denial of service attack Market Forecast [US$ Bn] - 2022 - 2030
Table 17: SQL Injections Market Forecast [US$ Bn] - 2022 - 2030
Table 18: Zero day exploit Market Forecast [US$ Bn] - 2022 - 2030
Table 19: Rootkits Market Forecast [US$ Bn] - 2022 - 2030
Table 20: Application Market Forecast [US$ Bn] - 2022 - 2030
Table 21: Advanced Persistent Threat Market Forecast [US$ Bn] - 2022 - 2030
Table 22: Threat Intelligence Market Forecast [US$ Bn] - 2022 - 2030
Table 23: Security and Information Event Management Market Forecast [US$ Bn] - 2022 - 2030
Table 24: Security and Vulnerability Management Market Forecast [US$ Bn] - 2022 - 2030
Table 25: Network Access Control Market Forecast [US$ Bn] - 2022 - 2030
Table 26: Anti-Virus Control Market Forecast [US$ Bn] - 2022 - 2030
Table 27: Firewall Market Forecast [US$ Bn] - 2022 - 2030
Table 28: Secure Web Gateway Market Forecast [US$ Bn] - 2022 - 2030
Table 29: Security Orchestration Automation & Response Market Forecast [US$ Bn] - 2022 - 2030
Table 30: Identity & Access Management Market Forecast [US$ Bn] - 2022 - 2030
Table 31: Encryption Market Forecast [US$ Bn] - 2022 - 2030
Table 32: Disaster Recovery Market Forecast [US$ Bn] - 2022 - 2030
Table 33: Intrusion Detection & Prevention Market Forecast [US$ Bn] - 2022 - 2030
Table 34: Risk & Compliance Management Market Forecast [US$ Bn] - 2022 - 2030
Table 35: Others Market Forecast [US$ Bn] - 2022 - 2030
Table 36: Security Type Market Forecast [US$ Bn] - 2022 - 2030
Table 37: Network Security Market Forecast [US$ Bn] - 2022 - 2030
Table 38: Application Security Market Forecast [US$ Bn] - 2022 - 2030
Table 39: Cloud Security Market Forecast [US$ Bn] - 2022 - 2030
Table 40: End User Market Forecast [US$ Bn] - 2022 - 2030
Table 41: Government Market Forecast [US$ Bn] - 2022 - 2030
Table 42: Civil Market Forecast [US$ Bn] - 2022 - 2030
Table 43: Commercial Market Forecast [US$ Bn] - 2022 - 2030
Table 44: Region Event Forecast [US$ Bn] - 2022 - 2030
Table 45: Technology Event Forecast [US$ Bn] - 2022 - 2030
Table 46: Application Event Forecast [US$ Bn] - 2022 - 2030
Table 47: Security Type Event Forecast [US$ Bn] - 2022 - 2030
Table 48: End User Event Forecast [US$ Bn] - 2022 - 2030
Table 49: Region Market Forecast [US$ Bn] - 2022 - 2030
Table 50: Technology Market Forecast [US$ Bn] - 2022 - 2030
Table 51: Application Market Forecast [US$ Bn] - 2022 - 2030
Table 52: Security type Market Forecast [US$ Bn] - 2022 - 2030
Table 53: End User Market Forecast [US$ Bn] - 2022 - 2030