This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here
Stocks Under $10 with 50-100% upside potential - 14 days FREE!

Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis

NEW YORK, May 8, 2013 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue: Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis http://www.reportlinker.com/p01172029/Global-20-Leading-Cyber-Security-Companies-2013-Competitive-Landscape-Analysis.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=NoCategory Report DetailsThe global market for cyber solutions has been a topic of increasing interest in a variety of industries and public sector organisations for several years and for a number of reasons. The first of these is the indisputable rise of cyber crime, malware attack, information theft and hacking which has accompanied the expansion of the internet. Threat of attack via cyberspace has in recent years become a real concern not only of public organisations guarding state secrets, but also of commercial entities seeking to remain profitable.Whether the threat is from loss of valuable data, disruption to financial services, release of intellectual property, the shutting down of critical national infrastructure or simply the reputational damage of being known to have been compromised, the possibility of cyber attack represents both a danger to national security and a potential source of major losses.The stakes are high; visiongain has assessed the cyber security market will reach $68.34bn in 2013. As global defence budgets diminish, defence contractors are increasingly taking an interest in the growing area of cyber security through acquisitions and organic growth, which is posing a challenge to incumbent IT security providers. What makes this report unique? Visiongain consulted widely with industry experts and has included full transcripts from interviews with BAE Systems Detica, Booz Allen Hamilton and Finmeccanica's Selex ES within this report. As such, our reports have a unique blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments, as well as identifying the technological issues. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including company market share, revenue and contract income - all identifying strategic business opportunities. Why you should buy Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis • Stay ahead with this comprehensive analysis of the defence industry prospects- The report comprises 169 pages• Get ahead by studying highly quantitative content that delivers solid conclusions benefiting your research and analysis- 140 tables, charts, and figures quantifying and analysing the company involvement• Read exclusive expert opinion interviews from industry specialists informing the analysis- BAE Systems Detica- Booz Allen Hamilton- Finmeccanica's Selex ES• View global company cyber security market share to find out who your biggest competitors are- The report details the global share of the cyber security market held for the 20 largest companies• See details of the most successful companies' product offerings and strategy- Read analysis of each leading company's performance and outlook.• Understand the competitive landscape with profiles of the 20 leading companies in the cyber security market including details of significant cyber security contracts, product & services, and analysis of their regional emphasis and strategy.- BAE Systems PLC- Boeing Company- Booz Allen Hamilton Inc- Computer Sciences Corporation (CSC)- EADS Group- Finmeccanica Group- General Dynamics Corporation- Hewlett Packard Company- International Business Machines Corporation (IBM)- Intel Corporation- Kaspersky Lab- L-3 Communications Holdings Inc- Lockheed Martin Corporation- Northrop Grumman Corporation- Raytheon Company- Science Applications International Corporation (SAIC)- Sophos PLC- Symantec Corporation- Thales Group- Trend Micro Inc• Discover the qualitative analysis informing the market forecasts- STEP analysis of competitive factors: social, technological, economic and political, factors revealing what drives and restrains companies in the cyber security market How the Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis report can benefit youVisiongain's report is for anyone who requires concise, accurate analysis of the cyber security market. You will discover market and technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are.If you buy our report today your knowledge will stay one step ahead of your competitors. Discover how our report could benefit your research, analyses and strategic decisions, saving you time. To gain an understanding of how to tap into the potential of this market and keep one step ahead of the competition you must order now our report Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis.Visiongain is a trading partner with the US Federal GovernmentCCR Ref number: KD4R6 Table of Contents 1. Executive Summary1.1 Assessing the Cyber Security Market Landscape1.2 Report Benefits and Highlights1.3 Report Structure1.4 Methodology 2. Introduction to the Leading 20 Cyber Security Companies 20132.1 Defining the Cyber Security Market2.2 Types of Cyber Security Threat2.3 Methods of Cyber Attack2.4 Recent High Profile Cyber Attacks 3. Competitor Positioning in the Cyber Security Market 20133.1 The 20 Leading Companies in the Cyber Security Market 20133.2 Composition of the Cyber Security Market in 20133.3 Differing Backgrounds of Companies in the Cyber Security Market3.4 Geographical Location of Companies in the Cyber Security Market3.5 Significant Contracts in the Global Cyber Security Market 2010-2013 4. The 20 Leading Companies in Cyber Security 20134.1 BAE Systems PLC Overview4.1.1 BAE Systems - A Strong UK & US Business4.1.2 BAE Systems PLC Competitors4.1.3 BAE Expects Continued Growth of Subsidiary Detica4.1.4 BAE Systems PLC Mergers & Acquisitions4.1.5 BAE Systems PLC Regional Focus4.1.6 BAE Systems PLC SWOT Analysis & Historic Revenue4.2 Boeing Company Overview4.2.1 Boeing Cyber Engagement Center Drives Business4.2.2 Boeing Company Competitors4.2.3 Cost-Cutting Underpins Continued Growth At Boeing4.2.4 Boeing Company Mergers & Acquisitions4.2.5 Boeing Company Regional Focus4.2.6 Boeing Company SWOT Analysis & Historic Revenue4.3 Booz Allen Hamilton Inc Overview4.3.1 Booz Allen Launches New Cyber Products4.3.2 Booz Allen Hamilton Inc Competitors4.3.3 Booz Allen Hamilton's Impressive Record of Growth4.3.4 Booz Allen Hamilton Inc Mergers & Acquisitions4.3.5 Booz Allen Hamilton Inc Regional Focus4.3.6 Booz Allen Hamilton Inc SWOT Analysis4. Computer Sciences Corporation (CSC) Overview4.4.1 CSC's $600m Cyber Security Division4.4.2 Computer Sciences Corporation (CSC) Competitors4.4.3 Computer Slight Fall in Revenue at Computer Sciences Corporation (CSC)4.4.4 Computer Sciences Corporation (CSC) Mergers & Acquisitions4.4.5 Computer Sciences Corporation (CSC) Regional Focus4.4.6 Computer Sciences Corporation (CSC) SWOT Analysis & Historic Revenue4.5 EADS Group Overview4.5.1 EADS Group's new specialist subsidiary Cassidian Cybersecurity4.5.2 EADS Group Competitors4.5.3 EADS Group Regional Focus4.5.4 EADS Group Records Strong Growth4.5.5 EADS Group Mergers and Acquisitions4.5.6 EADS Group SWOT Analysis & Historic Revenue4.6 Finmeccanica Group Overview4.6.1 Selex Reorganisation Unifies Cyber Capabilities4.6.2 Finmeccanica Group Competitors4.6.3 Selex Cyber Solutions Represent Standout Growth Area4.6.4 Finmeccanica Group Mergers and Acquisitions4.6.5 Finmeccanica Group Regional Focus4.6.6 Finmeccanica Group SWOT Analysis & Historic Revenue4.7 General Dynamics Corporation Overview4.7.1 GD's Government Cyber Security Specialism4.7.2 General Dynamics Corporation Competitors4.7.3 US Budget Cuts Hit General Dynamics Revenue4.7.4 General Dynamics Corporation Mergers and Acquisitions4.7.5 General Dynamics Corporation Regional Focus4.7.6 General Dynamics Corporation SWOT Analysis & Historic Revenue4.8 Hewlett Packard Company Overview4.8.1 HP Enterprise Security Products Takes Big Share of Cyber Market4.8.2 Hewlett Packard Company Competitors4.8.3 IT Giant HP Faces Challenging Market4.8.4 Hewlett Packard Company Mergers and Acquisitions4.8.5 Hewlett Packard Company Regional Focus4.8.6 Hewlett Packard SWOT Analysis & Historic Revenue4.9 International Business Machines Corporation (IBM) Overview4.9.1 Cyber Security Focus of IBM M&A Activity4.9.2 IBM Competitors4.9.3 IBM's Income Rises Despite Falling Revenue4.9.4 IBM Mergers & Acquisitions4.9.5 IBM Regional Focus4.9.6 IBM SWOT Analysis & Historic Revenue4.10 Intel Corporation Overview4.10.1 McAfee Purchase Secures Intel's Leadership4.10.2 Intel Corporation Competitors4.10.3 McAfee's Reaction to a Changing Threat4.10.4 Intel Corporation Mergers and Acquisitions4.10.5 Intel Corporation Regional Focus4.10.6 Intel Corporation SWOT Analysis & Historic Revenue4.11 Kaspersky Lab Overview4.11.1 Kaspersky Lab's Antivirus Solutions Remain Popular4.11.2 Kaspersky Lab Competitors4.11.3 Kaspersky's Swift Growth in IT Security4.11.4 Kaspersky Lab Regional Focus4.11.5 Kaspersky Lab SWOT Analysis & Historic Revenue4.12 L-3 Communications Holdings Inc Overview4.12.1 STRATIS Delivers Strong Market Share for L-34.12.2 L-3 Communications Holdings Inc Competitors4.12.3 L-3 Hit by US Spending Restraint4.12.4 L-3 Communications Holdings Inc Mergers and Acquisitions4.12.5 L-3 Communications Holdings Inc Regional Focus4.12.6 L-3 Communications Holdings Inc SWOT Analysis & Historic Revenue4.13 Lockheed Martin Corporation Overview4.13.1 Lockheed Martin Claims Largest Share of Government Cyber Security4.13.2 Lockheed Martin Corporation Competitors4.13.3 Bright Future for Lockheed's Cyber Solutions4.13.4 Lockheed Martin Corporation Regional Focus4.13.5 Lockheed Martin Corporation SWOT Analysis4.14 Northrop Grumman Corporation Overview4.14.1 M5 Network Security Purchase Bolsters Northrop's Strong Cyber Capabilities4.14.2 Northrop Grumman Corporation Competitors4.14.3 Falling Sales but Rising Incomes at Northrop Grumman4.14.4 Northrop Grumman Corporation Mergers & Acquisitions4.14.5 Northrop Grumman Corporation Regional Focus4.14.6 Northrop Grumman Corporation SWOT Analysis & Historic Revenue4.15 Raytheon Company Overview4.15.1 Raytheon makes $2.6bn in Cyber Security Revenues4.15.2 Raytheon Company Competitors4.15.3 Raytheon Company Historic Performance & Future Outlook4.15.4 Raytheon Focuses on Cyber Security Acquisitions4.15.5 Raytheon Company Regional Focus4.15.6 Raytheon Company SWOT Analysis & Historic Revenue4.16 Science Applications International Corporation (SAIC) Overview4.16.1 CloudShield Technologies provides SAIC with Strong Cyber Revenues4.16.2 Science Applications International Corporation (SAIC) Competitors4.16.3 SAIC Likely to Target Healthcare Information Security4.16.4 Science Applications International Corporation (SAIC) Mergers & Acquisitions4.16.5 Science Applications International Corporation (SAIC) Regional Focus4.16.6 Science Applications International Corporation (SAIC) SWOT Analysis & Historic Revenue4.17 Sophos Overview4.17.1 Sophos Refocusing on Security as a Service4.17.2 Sophos Competitors4.17.3 Sophos Historic Performance & Future Outlook4.17.4 Sophos Mergers and Acquisitions4.17.5 Sophos Regional Focus4.17.6 Sophos SWOT Analysis 20134.18 Symantec Corporation Overview4.18.1 Symantec Takes Largest Share of Cyber Security Market4.18.2 Symantec Corporation Competitors4.18.3 Challenging Outlook For Market Leader Symantec4.18.4 Symantec Corporation Mergers & Acquisitions4.18.5 Symantec Corporation Regional Focus4.18.6 Symantec Corporation SWOT Analysis & Historic Revenue4.19 Thales Group Overview4.19.1 Thales Leads European Defence Groups in Cyber Security4.19.2 Thales Group Competitors4.19.3 Slow Growth in Thales Group Revenues4.19.4 Thales Group Regional Focus4.19.5 Thales Group SWOT Analysis & Historic Revenue4.20 Trend Micro Inc Overview4.20.1 Trend Micro Inc Moves Focus to Cloud Security4.20.2 Trend Micro Inc Competitors4.20.3 Trend Micro Inc Faces New Challenges in Home Market4.20.4 Trend Micro Inc Mergers and Acquisitions4.20.5 Trend Micro Inc SWOT Analysis & Historic Revenue4.21 Other Cyber Security Companies 5. STEP Analysis of the Cyber Security Market 2013 6. Expert Opinion6.1 Selex ES6.1.1 How Has Selex's Merger Affected Business?6.1.2 What Cyber Security Experience Does Selex ES Have?6.1.3 What Type of Cyber Security Products Does Selex ES Offer?6.1.4 Which Of Selex ES's Offerings Are Most Important?6.1.5 How Much of a Focus is Cyber Security for Selex ES?6.1.6 What Domestic Markets Are Most Important for Selex ES's Cyber Offerings?6.1.7 How Does Selex ES Approach the Cyber Security Market?6.1.8 Where is Selex ES Looking for New Business?6.1.9 What Companies Does Selex ES Compete With in Cyber Security? 6.1.10 Has Finmeccanica's Involvement in Cyber Security Changed? 6.1.11 What Trends Are Affecting Selex's Business? 6.1.12 Are Macroeconomic Problems Slowing Down Spending on Cyber Security? 6.1.13 Where Does Selex ES See the Cyber Security Market in 10 Years? 6.1.14 Is Selex ES Pursuing Emerging Cyber Markets? 6.1.15 How Is Selex ES Dealing with Challenges in the Market? 6.1.16 How Will New Technology Change the Cyber Security Market? 6.1.17 Is Diversification Affecting the Cyber Security Market?6.2 Booz Allen Hamilton6.2.1 What Is Booz Allen Hamilton's Background?6.2.2 How Important is Cyber Security to Booz Allen's Business?6.2.3 What Is Booz Allen's Approach to Cyber Security?6.2.4 Does Booz Allen Have a Particular Focus in the Cyber Security Market?6.2.5 What Has Made Booz Allen Hamilton Successful in the Cyber Security Market?6.2.6 How is Booz Allen Planning to Grow Their Cyber Security Business?6.2.7 Who Are Booz Allen's Main Competitors in Cyber Security?6.2.8 Has Booz Allen Hamilton Experienced A Change in the Market?6.2.9 What Cyber Security Trends are Affecting Booz Allen's Business? 6.2.10 Will the US Market Remain as Important to Booz Allen Hamilton? 6.2.11 What Challenges Does Booz Allen Face in Cyber Security? 6.2.12 How Will The Technology of Cyber Security Change? 6.2.13 What Market Segments is Booz Allen Hamilton Looking to Expand its Cyber Business Into?6.3 BAE Systems Detica6.3.1What is Detica's Background in Cyber Security?6.3.2 How Big a Focus is There on Cyber Security at Detica?6.3.3 How Does Detica Organise Its Cyber Security Offerings?6.3.4 How Much Revenue Do BAE and Detica Derive From Cyber Security?6.3.5 Where is Detica's Cyber Security Business Strongest?6.3.6 Is Detica Focused on Commercial or Public Sector Business?6.3.7 What Are Detica's Strengths in the Cyber Security Market?6.3.8 Which Cyber Security Market Segments Does Detica Prioritise?6.3.9 Which Companies Compete with Detica's Cyber Security Offerings? 6.3.10 What Changes Has Detica Experienced in the Cyber Security Market? 6.3.11 What Market Trends are Affecting Detica? 6.3.12 Has Demand for Detica's Services Been Affected by Macroeconomic Issues? 6.3.13 What Are Detica's Expectations for Market Growth? 6.3.14 Which of Detica's Business Areas Are Expected to Perform Best in the Future? 6.3.15 What Challenges Does Detica Expect to Have to Overcome? 6.3.16 How Will New Technologies Affect Detica's Business? 6.3.17 Is Detica Affected by Increasing Competition in Cyber Security? 6.3.18 What Cyber Security Threats Are Detica Currently Tracking? 6.3.19 Are State-Sponsored Cyber Attacks Becoming A Serious Issue? 7. Conclusions7.1 Market Share & Outlook for the 20 Leading Cyber Security Companies 8. Glossary List of TablesTable 2.1 Leading 20 Companies in the Cyber Security Market 2013 (Company Name, Subsidiary)Table 2.2 Types of Cyber Attack (Type, Description)Table 2.3 Cyber Attack Techniques (Name, Description)Table 2.4 Recent High Profile Cyber Attacks (Date, Description)Table 3.1 Leading 20 Companies in the Cyber Security Market 2013 (Market Ranking, Total Revenue, Revenue in Sector, Market Share % )Table 3.2 Significant Cyber Security Contracts 2010-2013 (Date, Country, Company, Value ($m), Details)Table 4.1 BAE Systems PLC Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.2 BAE Systems PLC Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.3 BAE Systems PLC Cyber Security Products/Services (Division, Name, Description)Table 4.4 BAE Systems PLC SWOT Analysis 2013Table 4.5 Boeing Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Website)Table 4.6 Boeing Company Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.7 Boeing Company Cyber Security Products/Services (Division, Name, Description)Table 4.8 Boeing Company SWOT Analysis 2013Table 4.9 Booz Allen Hamilton Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share % , HQ, Ticker, Contact, Website)Table 4.10 Booz Allen Hamilton Inc Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.11 Booz Allen Hamilton Inc Cyber Security Products/Services (Division, Name, Description)Table 4.12 Booz Allen Hamilton Inc SWOT Analysis 2013Table 4.13 Computer Sciences Corporation (CSC) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.14 Computer Sciences Corporation (CSC) Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.15 Computer Sciences Corporation (CSC) Cyber Security Products/Services (Division, Name, Description)Table 4.16 Computer Sciences Corporation (CSC) SWOT Analysis 2013Table 4.17 EADS Group Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.18 EADS Group Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.19 EADS Group Cyber Security Products/Services (Division, Name, Description)Table 4.20 EADS Group SWOT Analysis 2013Table 4.21 Finmeccanica Group Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.22 Finmeccanica Group Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.23 Finmeccanica Group Cyber Security Products/Services (Division, Name, Description)Table 4.24 Finmeccanica Group SWOT Analysis 2013Table 4.25 General Dynamics Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.26 General Dynamics Corporation Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.27 General Dynamics Corporation Cyber Security Products/Services (Division, Name, Description)Table 4.28 General Dynamics Corporation SWOT Analysis 2013Table 4.29 Hewlett Packard Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share % , HQ, Ticker, Contact, Website)Table 4.30 Hewlett Packard Company Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.31 Hewlett Packard Company Cyber Security Products/Services (Division, Name, Description)Table 4.32 Hewlett Packard Company SWOT Analysis 2013Table 4.33 International Business Machines Corporation (IBM) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.34 International Business Machines Corporation (IBM) Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.35 International Business Machines Corporation (IBM) Cyber Security Products/Services (Division, Name, Description)Table 4.36 International Business Machines Corporation (IBM) SWOT Analysis 2013Table 4.37 Intel Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Contact, Website)Table 4.38 Intel Corporation Cyber Security Products/Services (Division, Name, Description)Table 4.39 Intel Corporation SWOT Analysis 2013Table 4.40 Kaspersky Lab Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Website)Table 4.41 Kaspersky Lab Cyber Security Products/Services (Division, Name, Description)Table 4.42 Kaspersky Lab SWOT Analysis 2013Table 4.43 L-3 Communications Holdings Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Website)Table 4.44 L-3 Communications Holdings Inc Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.45 L-3 Communications Holdings Inc Cyber Security Products/Services (Division, Name, Description)Table 4.46 L-3 Communications Holdings Inc SWOT Analysis 2013Table 4.47 Lockheed Martin Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.48 Lockheed Martin Corporation Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.49 Lockheed Martin Corporation Cyber Security Products/Services (Division, Name, Description)Table 4.50 Lockheed Martin Corporation SWOT Analysis 2013Table 4.51 Northrop Grumman Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.52 Northrop Grumman Corporation Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.53 Northrop Grumman Corporation Cyber Security Products/Services (Division, Name, Description)Table 4.54 Northrop Grumman Corporation SWOT Analysis 2013Table 4.55 Raytheon Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.56 Raytheon Company Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.57 Raytheon Company Cyber Security Products/Services (Division, Name, Description)Table 4.58 Raytheon Company SWOT Analysis 2013Table 4.59 Science Applications International Corporation (SAIC) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Contact, Website)Table 4.60 Science Applications International Corporation (SAIC) Major Cyber Security Contracts 2010-2013 (Date, Country, Value, Details)Table 4.61 Science Applications International Corporation (SAIC) Cyber Security Products/Services (Division, Name, Description)Table 4.62 Science Applications International Corporation (SAIC) SWOT Analysis 2013Table 4.63 Sophos PLC Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Website)Table 4.64 Sophos Cyber Security Products/Services (Name, Description)Table 4.65 Sophos SWOT Analysis 2013Table 4.66 Symantec Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Contact, Website)Table 4.67 Symantec Corporation Cyber Security Products/Services (Name)Table 4.68 Symantec Corporation SWOT Analysis 2013Table 4.69 Thales Group Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Website)Table 4.70 Thales Group Cyber Security Products/Services (Division, Name, Description)Table 4.71 Thales Group SWOT Analysis 2013Table 4.72 Trend Micro Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %, HQ, Ticker, Website)Table 4.73 Trend Micro Inc Cyber Security Products/Services (Division, Name, Description)Table 4.74 Trend Micro Inc SWOT Analysis 2013Table 4.75 Other Companies in the Cyber Security Market 2013 (Company Name)Table 5.1 STEP Analysis of the Cyber Security Market 2013 List of ChartsChart 3.1 Leading 20 Company Market Share 2013 (% share)Chart 3.2 Leading 20 Cyber Security Companies by Background (Number)Chart 3.3 Leading 20 Cyber Security Companies by Background (Revenue, $m)Chart 3.4 Leading 20 Cyber Security Companies by HQ Location (Region, Number)Chart 3.5 Leading 20 Cyber Security Companies by HQ Location (Region, Revenue)Chart 4.1 BAE Systems PLC Cyber Security Market Share 2013 (% market share)Chart 4.2 BAE Systems Revenue 2008-2012 ($m)Chart 4.3 Boeing Company Cyber Security Market Share 2013 (% market share)Chart 4.4 Boeing Company Revenue 2008-2012 ($m)Chart 4.5 Booz Allen Hamilton Inc Cyber Security Market Share 2013 (% market share)Chart 4.6 Computer Sciences Corporation (CSC) Cyber Security Market Share 2013 (% market share)Chart 4.7 Computer Sciences Corporation (CSC) Revenue 2008-2012 ($m)Chart 4.8 EADS Group Cyber Security Market Share 2013 (% market share)Chart 4.9 EADS Group Revenue 2008-2012 ($m)Chart 4.10 Finmeccanica Group Cyber Security Market Share 2013 (% market share)Chart 4.11 Finmeccanica Group Revenue 2008-2011 ($m)Chart 4.12 General Dynamics Corporation Cyber Security Market Share 2013 (% market share)Chart 4.13 General Dynamics Corporation Revenue 2008-2012 ($m)Chart 4.14 Hewlett Packard Company Cyber Security Market Share 2013 (% market share)Chart 4.15 Hewlett Packard Company Revenue 2008-2012 ($m)Chart 4.16 International Business Machines Corporation (IBM) Cyber Security Market Share 2013 (% market share)Chart 4.17 IBM Revenue 2008-2012 ($m)Chart 4.18 Intel Corporation Cyber Security Market Share 2013 (% market share)Chart 4.19 Intel Revenue 2008-2012 ($m)Chart 4.20 Kaspersky Lab Cyber Security Market Share 2013 (% market share)Chart 4.21 Kaspersky Lab Revenue 2008-2011 ($m)Chart 4.22 L-3 Communications Holdings Inc Cyber Security Market Share 2013 (% market share)Chart 4.23 L-3 Communications Holdings Inc Revenue 2008-2012 ($m)Chart 4.24 Lockheed Martin Corporation Cyber Security Market Share 2013 (% market share)Chart 4.25 Northrop Grumman Corporation Cyber Security Market Share 2013 (% market share)Chart 4.26 Northrop Grumman Corporation Revenue 2008-2012 ($m)Chart 4.27 Raytheon Company Cyber Security Market Share 2013 (% market share)Chart 4.28 Raytheon Company Revenue 2008-2012 ($m)Chart 4.29 Science Applications International Corporation (SAIC) Cyber Security Market Share 2013 (% market share)Chart 4.30 Science Applications International Corporation (SAIC)Revenue 2008-2012 ($m)Chart 4.31 Sophos Cyber Security Market Share 2013 (% market share)Chart 4.32 Symantec Corporation Cyber Security Market Share 2013 (% market share)Chart 4.33 Symantec Corporation Revenue 2008-2012 ($m)Chart 4.34 Thales Group Cyber Security Market Share 2013 (% market share)Chart 4.35 Thales Group Revenue 2008-2012 ($m)Chart 4.36 Trend Micro Inc Cyber Security Market Share 2013 (% market share)Chart 4.37 Trend Micro Inc Revenue 2008-2012 ($m) List of FiguresFigure 4.1 BAE Systems PLC Company Structure 2013Figure 4.2 Boeing Company Structure 2013Figure 4.3 Computer Sciences Corporation (CSC)Inc Structure 2013Figure 4.4 EADS Group Structure 2013Figure 4.5 Finmeccanica Group Structure 2013Figure 4.6 General Dynamics Corporation Company Structure 2013Figure 4.7 Hewlett Packard Company Structure 2013Figure 4.8 International Business Machines Corporation (IBM) Structure 2013Figure 4.9 Intel Corporation Structure 2013Figure 4.10 L-3 Communications Holdings Inc Structure 2013Figure 4.11 Lockheed Martin Corporation Structure 2013Figure 4.12 Northrop Grumman Corporation Structure 2013Figure 4.13 Raytheon Company Structure 2013Figure 4.14 Science Applications International Corporation (SAIC) Structure 2013Figure 4.15 Symantec Corporation Structure 2013Figure 4.16 Thales Group Structure 2013Figure 4.17 Trend Micro Inc Structure 2013 Companies Listed3Di Technologies LLC42Six Solutions LLCAdvanced Micro Devices (AMD)Aerient LLCAeromet International PLCAffirm TrustAirbusAirbus MilitaryAlion Science & Technology CompanyAltanApax Partners LLPApplied Signal Technology IncArcSight IncArgon STARINCAssured Information Security IncAstaroAstriumAVAST Software ASAVG TechnologiesAXA Matrix Risk ConsultantsAydin CyberSecurityBAE AustraliaBAE DeticaBAE Electronic SystemsBAE IncBAE IndiaBAE Intelligence & SecurityBAE Land & ArmamentsBAE Saudi ArabiaBAE Systems PLCBBN TechnologiesBoeing CompanyBoeing Cyber Engagement Center (CEC)Boeing Defence, Space & SecurityBoeing Information SolutionsBoeing Intelligence Systems GroupBooz & CompanyBooz Allen Hamilton IncBreakingPoint SystemsBrinqaBusiness Computers Management Consulting Group LLCCACI International IncCamber CorporationCassidianCassidian CybersecurityChemring GroupCisco Systems IncCloudShield Technologies IncComputer Sciences Corporation (CSC)Context ISCorero Network SecurityCreative Computing Solutions (CCSi)Cubic XDDefense Systems Engineering & SupportDell SecureworksDeticaDialogsDigital Receiver Technology IncDRS TechnologiesEADS GroupEdenwalleGlobalTechEMC CorporationESETETIEurocopterFidelis Cybersecurity SolutionsFinmeccanica GroupFireEyeFondation TelecomFortify SoftwareF-Secure CorporationFulcrum IT Services, LLCGeneral Dynamics C4 SystemsGeneral Dynamics CorporationGeneral Dynamics Electric BoatGeneral Dynamics European Land SystemsGeneral Dynamics Land SystemsGeneral Dynamics Uk LtdGideon TechnologiesGlobal Infotek IncGnostech IncGoogleGuardianEdgeGulfstream AerospaceHarris CorporationHenggeler Computer ConsultantsHewlett Packard CompanyHewlett Packard Enterprise Security ProductsHoneywell IncHP ArcSightHP Labsi2IBM Global Technology ServicesIdentumIntel CorporationInternational Business Machines Corporation (IBM)Iron Bow TechnologiesISC8, Inc.ITT ExelisKaspersky LabKEYWKForce Government SolutionsKnowledge Consulting GroupKratos Defense & Security Solutions, Inc.L-3 Communications Holdings IncL-3 STRATISLacoon Mobile SecurityLegalTech SolutionsLeidosLockheed Martin AeronauticsLockheed Martin AustraliaLockheed Martin CanadaLockheed Martin CorporationLockheed Martin Electronic SystemsLockheed Martin Global Training & LogisticsLockheed Martin Information Systems & Global SolutionsLockheed Martin Missiles & Fire ControlLockheed Martin MS2Lockheed Martin Space SystemsLockheed Martin UKM5 Network SecurityMacAulay-BrownMandiantManTech International CorporationMcAfeeMEDPROTECT LLCMEI TechnologiesMerlin InternationalMessageLabsMi5 NetworksMicrosoft CorporationMitsubishi Heavy IndustriesMobile ArmorNarusNASSCONetasqNetWitness Corporation New York TimesNICTANitroSecurityNorthrop Grumman Aerospace SystemsNorthrop Grumman CorporationNorthrop Grumman Corporation M5 Network SecurityNorthrop Grumman Electronics SystemsNorthrop Grumman Information SystemsNorthrop Grumman Technical ServicesNukonaOdyssey SoftwarePanda SecurityPGP CorporationPhotonicsPikewerks CorporationQ1 LabsQinetiQ Group PlcRadiance TechnologiesRaytheon Advanced ProgramsRaytheon Air & Missile DefenceRaytheon AustraliaRaytheon Combat & Sensing SystemsRaytheon CompanyRaytheon Cybersecurity SolutionsRaytheon Environmental SolutionsRaytheon Fed ITRaytheon Homeland SecurityRaytheon Integrated Comms SystemsRaytheon Integrated Ground ControlRaytheon Integrated SensorsRaytheon IntelligenceRaytheon Missile SystemsRaytheon OperationsRaytheon Secure Information SystemsRaytheon Security & Transport SystemsRaytheon UKRaytheon Vision SystemsRegency IT ConsultingRevealRockwell CollinsRSASAIC Defence SolutionsSAIC Health, Energy & Civil SolutionsSAIC Intelligence & Cybersecurity SolutionsSAIC-Frederick IncSalient Federal Solutions (SFS)Sandia CorporationSaudi AramcoScience Applications International Corporation (SAIC)Scientific Research CorporationSeapower CapabilitiesSecure ComputingSecureTechSelex ElsagSelex ESSenetas Systems IncSentrigoSodernSoftScanSojitz CorporationSolutions Made Simple IncSonySophos PLCSotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. )Sperry MarineSpirent CommunicationsStratisstratsec.netSymantec CorporationTaia Global, Inc.Telecommunications Systems Inc (TCS)TeligyThales Communications & SecurityThales Cyber SecurityThales CybersecurityThales GroupThales Information SystemsThales Raytheon SystemsThird BrigadeTrend Micro (EMEA) LtdTrend Micro Australia Pty LtdTrend Micro IncTrend Micro Inc ( Taiwan)Varec IncVeriSignVertica SystemsVitalize Consulting SolutionsVodafoneVulnerability Research LabsOrganisations Mentioned in This ReportAMC Air Mobility CommandCBP Customs & Border ProtectionCCS USAF Cyber Control SystemsCEC Boeing Cyber Engagement CenterCERDEC US Army Communications, Electronics, Research, Development and Engineering CenterCESG UK Communications-Electronics Security GroupCISP UK Cybersecurity Information Sharing PartnershipCMS Centers for Medicare & Medicaid ServicesDARPA Defense Advanced Research Projects AgencyDC3 Department of Defense Cyber Crime CenterDHS Department of Homeland SecurityDIA Defense Intelligence AgencyDISA Defense Information Systems AgencyDISA ESD Defense Information Systems Agency Enterprise Services DirectorateESDO DHS Enterprise System Development OfficeFBI Federal Bureau of InvestigationHSIN Homeland Security Information SystemNATO North Atlantic Treaty OrganisationNCCIC National Cyber Security & Communications Integration CenterNCPS DHS National Cybersecurity Protection SystemNETCOM US Army Network Enterprise Technology CommandNGA National Geospatial Intelligence AgencyNORAD North American Air DefenseNSA US National Security AgencyPEO C3T US Army Program Executive Office Command Control Communications TacticalSaudi GovernmentSPAWAR US Space and Naval Warfare Systems CommandUK FCO UK Foreign & Commonwealth OfficeUK Ministry of JusticeUK MoD United Kingdom Ministry of DefenceUSAF United States Air ForceUSAFCENT United States Air Forces CentralUSAP United States Antarctic ProgramUSBICES United States Battlefield Information Collection and Exploitation SystemUS-CERT United States Computer Emergency Response TeamUSCIS United States Citizenship & Immigration ServicesUSSOUTHCOM United States Southern Command To order this report:: Global 20 Leading Cyber Security Companies 2013: Competitive Landscape Analysis__________________________

Contact Clare: clare@reportlinker.comUS:(339) 368 6001Intl:+1 339 368 6001

SOURCE Reportlinker

Copyright 2011 PR Newswire. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Select the service that is right for you!

COMPARE ALL SERVICES
Action Alerts PLUS
Try it NOW

Jim Cramer and Stephanie Link actively manage a real portfolio and reveal their money management tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
  • Weekly roundups
TheStreet Quant Ratings
Try it NOW
Only $49.95/yr

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
  • Upgrade/downgrade alerts
Stocks Under $10
Try it NOW

David Peltier, uncovers low dollar stocks with extraordinary upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
  • Weekly roundups
Dividend Stock Advisor
Try it NOW

Jim Cramer's protege, David Peltier, identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.

Product Features:
  • Diversified model portfolio of dividend stocks
  • Alerts when market news affect the portfolio
  • Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
Real Money Pro
Try it NOW

All of Real Money, plus 15 more of Wall Street's sharpest minds delivering actionable trading ideas, a comprehensive look at the market, and fundamental and technical analysis.

Product Features:
  • Real Money + Doug Kass Plus 15 more Wall Street Pros
  • Intraday commentary & news
  • Ultra-actionable trading ideas
Options Profits
Try it NOW

Our options trading pros provide daily market commentary and over 100 monthly option trading ideas and strategies to help you become a well-seasoned trader.

Product Features:
  • 100+ monthly options trading ideas
  • Actionable options commentary & news
  • Real-time trading community
  • Options TV
To begin commenting right away, you can log in below using your Disqus, Facebook, Twitter, OpenID or Yahoo login credentials. Alternatively, you can post a comment as a "guest" just by entering an email address. Your use of the commenting tool is subject to multiple terms of service/use and privacy policies - see here for more details.
Submit an article to us!
DOW 16,964.20 -18.39 -0.11%
S&P 500 1,977.33 -1.58 -0.08%
NASDAQ 4,451.7450 +6.8360 0.15%

Brokerage Partners

Rates from Bankrate.com

  • Mortgage
  • Credit Cards
  • Auto

Free Newsletters from TheStreet

My Subscriptions:

After the Bell

Before the Bell

Booyah! Newsletter

Midday Bell

TheStreet Top 10 Stories

Winners & Losers

Register for Newsletters
Top Rated Stocks Top Rated Funds Top Rated ETFs