Chapter 1. Introduction1.1. Research Objective
1.2. Scope of the Study
1.3. Definition
Chapter 2. Research Methodology2.1. Research Approach
2.2. Data Sources
2.3. Assumptions & Limitations
Chapter 3. Executive SummaryChapter 4. Market Outlook4.1. Market Dynamics
4.1.1. Market Drivers
4.1.2. Market Restraints
4.1.3. Market Opportunities
4.2. Porter’s Analysis
4.3. Value Chain Analysis
Chapter 5. Big Data Security Market, By Component5.1. Big Data Security Market, By Component, 2018-2026
5.2. Software
5.3. Services
Chapter 6. Big Data Security Market, By Solution/offerings6.1. Big Data Security Market, By Solution/offerings, 2018-2026
6.2. Identity and Access Management (IAM)
6.3. Infrastructure security
6.4. Governance, risk, & compliance
6.5. Unified vulnerability management service offering
6.6. Data security and Privacy service offering
Chapter 7. Big Data Security Market, By Deployment Type7.1. Big Data Security Market, By Deployment Type, 2018-2026
7.2. Cloud
7.3. On-Premises
Chapter 7. Big Data Security Market, By User Type7.1. Big Data Security Market, By User Type, 2018-2026
7.2. Large enterprises
7.3. Small & medium enterprises
Chapter 8. Big Data Security Market, By Solution/offerings8.1. Big Data Security Market, By Solution/offerings, 2018-2026
8.2. Aerospace and Defense
8.3. BFSI
8.4. Public sector
8.5. Retail
8.6. Healthcare
8.7. IT and Telecom,
8.8. Energy and Utilities
8.9. Manufacturing
8.10.Others
Chapter 10. Big Data Security Market, By Region10.1. Big Data Security Market, by Region, 2018-2026
10.1.1. North America
10.1.1.1. U.S
10.1.1.2. Rest of North America
10.1.2. Europe
10.1.2.1. U.K.
10.1.2.2. Germany
10.1.2.3. France
10.1.2.4. Rest of the Europe
10.1.3. Middle East & Africa (MEA)
10.1.3.1. GCC
10.1.3.2. North Africa
10.1.3.3. South Africa
10.1.3.4. Rest of MEA
10.1.4. Latin America (LATAM)
10.1.4.1. Brazil
10.1.4.2. Rest of LATAM
10.1.5. Asia Pacific (APAC)
10.1.5.1. India
10.1.5.2. China
10.1.5.3. Japan
10.1.5.4. Rest of the APAC
Chapter 11. Competitive Landscape11.1.1. Key Strategies Adopted by Players
11.1.2. Market Share/Positioning Analysis
Chapter 12. Company Profiles12.1. IBM
12.1.1. Company Overview
12.1.2. Product Offerings
12.1.3. Financial Performance
12.1.4. Recent Initiatives
12.2. Hewlett Packard Enterprise AWS
12.2.1. Company Overview
12.2.2. Product Offerings
12.2.3. Financial Performance
12.2.4. Recent Initiatives
12.3. Pivotal Software
12.3.1. Company Overview
12.3.2. Product Offerings
12.3.3. Financial Performance
12.3.4. Recent Initiatives
12.4. Gemalto
12.4.1. Company Overview
12.4.2. Product Offerings
12.4.3. Financial Performance
12.4.4. Recent Initiatives
12.5 Centrify
12.5.1. Company Overview
12.5.2. Product Offerings
12.5.3. Financial Performance
12.5.4. Recent Initiatives
12.6. Cloudera
12.6.1. Company Overview
12.6.2. Product Offerings
12.6.3. Financial Performance
12.6.4. Recent Initiatives
12.7. Hortonworks
12.7.1. Company Overview
12.7.2. Product Offerings
12.7.3. Financial Performance
12.7.4. Recent Initiatives
12.8. Thales E-security
12.8.1. Company Overview
12.8.2. Product Offerings
12.8.3. Financial Performance
12.8.4. Recent Initiatives
12.9. McAfee
12.9.1. Company Overview
12.9.2. Product Offerings
12.9.3. Financial Performance
12.9.4. Recent Initiatives
12.10. Symantec
12.10.1. Company Overview
12.10.2. Product Offerings
12.10.3. Financial Performance
12.10.4. Recent Initiatives
12.11. Check Point Software Technologies
12.11.1. Company Overview
12.11.2. Product Offerings
12.11.3. Financial Performance
12.11.4. Recent Initiatives
12.12. Fortinet
12.12.1. Company Overview
12.12.2. Product Offerings
12.12.3. Financial Performance
12.12.4. Recent Initiatives
12.13. Imperva
12.13.1. Company Overview
12.13.2. Product Offerings
12.13.3. Financial Performance
12.13.4. Recent Initiatives
12.14. List of other companies
12.14.1. Company Overview
12.14.2. Product Offerings
12.14.3. Financial Performance
12.14.4. Recent Initiatives
Chapter 13. Appendix13.1. About Us
13.2. Glossary of Terms