SlideShare a Scribd company logo
1 of 29
Your Search Ends with Our Research
September, 2018
Middle East Cyber Security Market Outlook to 2022 By Region (North, Central, West, East and South) and By
Type of Solution (Firewall, Intrusion Detection System, Antivirus, Identity and Access Management, Encryption,
Data Loss Prevention, Unidentified Threat Management, Disaster Recovery)
2
1. Executive Summary
2. Research
2. 1 Market Definitions
2.2 Abbreviations
2.4 Market Sizing, Limitation and Services– Cyber Security Market
2.5 Variables (Dependent and Independent)
2.6 Middle East Cyber Security Market Correlation Matrix
2.7 Middle East Cyber Security Market Regression Matrix
3. Middle East Cyber Security Market Value Chain
4. Road Map for Implementing Cyber Security in Middle East
5. Middle East Cyber Security Market
5.1 Market Overview
5.2 Recent Developments
5.3 Major Cyber Attacks in Middle East
5.4 Motives of Cyber Attacks in Middle East
5.5 Types of Cyber Attacks in Middle East
5.6 Global Snapshot of Cost Incurred Due to Data Breaches
5.7 Type of Cost Incurred due to Cyber Threats
5.8 Middle East Cyber Security Market- Common Practices
6. Market Size
6.1 Middle East Cyber Security Market Size by Revenue, 2012-17
6.2 Middle East Cyber Security Market Segmentation by Type of Solution, 2017
6.3 Middle East Cyber Security Market Segmentation by End User, 2017
6.4 Middle East Cyber Security Market Segmentation by Type of Security, 2017
6.5 Middle East Cyber Security Market Segmentation by Region, 2017
7. Competition
7.1 Middle East Cyber Security Developers
7.2 Middle East Cyber Security Market- Parameters of Competition for Developers
7.3 Company Profile of Fire Eye
7.4 Company Profile of IBM
7.5 Company Profile of Splunk
7.6 Company Profile of Four Scout
Table of Contents (1/2)
3
7.7 Symantec
7.8 Parameters of Competition for System Integrators
7.9 Etisalat
7.10 ISYX
7.11 BIOS
7.12 DU
7.13 Starlink
8. Industry Analysis
8.1 Technology Used
8.2 Trends
8.3 Security Trend Matrix
8.4 Challenges
8.5 Growth Drivers
8.6 Restraints
8.7 Vendor Selection Process
8.8 Government Regulations
8.9 SWOT Analysis
8.10 Porter Five Forces Analysis
9. Future Outlook, 2017-2022
9.1 Middle East Cyber Security Market Future Outlook, 2017-2022
9.1.1 By Type of Solution, 2017-2022
9.1.2 By Type of Security, 2017-2022
9.1.3 By Type of End User, 2017-2022
9.1.4 By Region, 2017-2022
10. Analyst Recommendations
Disclaimer
Contact Us
Table of Contents (2/2)
© This is a licensed product of Ken Research and should not be copied
List of Figures (1/2)
4
Figure 1.1: Middle East Cyber Security Market by Revenue, 2012-2022
Figure 1.2: Middle East Cyber Security Market by Regions by Revenue, 2017 and 2022
Figure 3.1: Value Chain Of Cyber Security Industry in Middle East
Figure 5.1: Effect of Security Breach on Physical and Virtual Infrastructure
Figure 5-2: Intrusion Triangle Showcasing Key Issues behind a Cyber Attack
Figure 5.3 Global Average Cost Incurred per Cyber Crime, 2013-17
Figure 6.1: Middle East Cyber Market Size by Revenue in USD Billion, 2012-2017
Figure 6.2:Middle East Cyber Security Market Segmentation in Percentage by Type of Solution, 2017
Figure 6.3: Middle East Cyber Security Segmentation by End User, 2017
Figure 6.4: Segmentation of Middle East Security Market by Type of Security
Figure 6.5: Share of Region in Middle East Cyber Security Market, 2017
Figure 7.1: Fire Eye Revenue in USD Million from Global Business, 2013-17
Figure 7.2: Share of Revenue in Fire Eye Revenue, 2017
Figure 7.3: Revenue in USD Million from EMEA Region (Excluding OEM), 2012-17
Figure 7.4: Splunk Global Revenue in USD Million, 2012-17
Figure 7.5: Four Scout Revenue from EMEA, 2015-17
Figure 7.6: Symantec Global Revenue Share of Consumer Security and Enterprise Security
Figure 7.7: Symantec Revenue (in USD billion) from EMEA region, 2012-17
Figure 7.8: Share of Symantec Revenue from Total Revenue from Different Region, 2015-17
Figure 7.9: Du’s Annual Revenue in USD Billions from its Global Operations.
Figure 8.1: Different Technological Trends and Their Effect on Major Sectors in Middle East
Figure 9.1: Middle East Cyber security market by Revenue, 2017-22
Figure 9.2: Middle East Cyber Security market Share, by Solution, 2017-22
Figure 9.3: Middle East Cyber Security Market Share, by Type of End User, 2017-22
Figure 9.4: Share of Cyber Security Market in Middle East by Region, 2017-22
© This is a licensed product of Ken Research and should not be copied
List of Tables (1/3)
5
Table 1.1: Major Cyber security Developers and System Integrators in Middle East, 2017
Table 2.1: Correlation Matrix for Middle East Cyber Security Market
Table 2.2: Regression Coefficient Output for Middle East Cyber Security Market
Table3.1 : Members of Middle East Cyber Security Market Value Chain
Table 5.1: Major Cyber Attacks in Middle East Region
Table 5.2: Types of Cyber Attacks Faced by Organizations, Their Motives and Threats Offered by Them
Table 6.1: Middle East Cyber Security Market Segmentation by Type of Solution in Revenue in USD Million, 2017
Table 6.2: Middle East Cyber Security Market Segmentation by Revenue by End Users, 2017
Table 6.3: Middle East Cyber Security Market Segmentation by Revenue by Type of Security, 2017
Table 6.4: Revenue Generated from Cyber Security in Different Regions, 2017
Table 7.1: Parameters of Competition in Middle East Cyber Security Market
Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy,
Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing,
Global Presence, Technological Partners, Major Projects
Table 7.3: Fire Eye R&D Expense from 2015-2017
Figure 7.4: Revenue Generated in USD Million from EMEA Region, 2015-17
Table 7.5: IBM ‘s Global Presence and Key Sectors Served
Table 7.6: Company Profile of IBM Including Company Overview, Business Strategy, USP, Number of Employees, Marketing,
Product portfolio, Services Offered
Table 7.7: Major Resellers of Spunk in Middle East, 2012-17
Table 7.8: Company Profile of Spunk Including Company Overview, Business Strategy, USP, Number of Employees, Product Portfolio, Services Offered,
Major Projects.
Table 7.9: Four Scout Global Presence and Key Sectors Served
Table 7.10: Company Profile of Four Scout Including Company Overview, Business Strategy,
USP, Product Portfolio, Number of Employees, Major Projects, Solutions Offered
Table 7.11: Company Profile of Symantec including Company Overview, Business Strategy, USP, Product Portfolio
© This is a licensed product of Ken Research and should not be copied
List of Tables (2/3)
6
Table 7.12: Symantec Revenue from Different Segments in USD Billions, 2015-17
Table 7.13: Symantec Global Revenue in USD Million from Different Sectors in USD Million, 2015-17
Table 7.14: Parameters of Competition of Major System Integrators in Middle East Cyber Security Market
Table 7.15: Company Profile including Company Overview, Business Strategy, USP and Product Portfolio
Table 7.16: Company Profile Of ISYX Including Company Overview, Business Strategy, Global Presence, USP, Number Of Employees And Product
Portfolio.
Table 7.17: Company Profile of BIOS including Company Overview, Product Feature, USP, Number Of Employees, Services Offered, Recent Developments
Table 7.18: Future Strategic Priorities of DU, 2018-22
Table 7.19: Company Profile of DU including Company overview, Business Strategy, Key Achievements, Product Portfolio.
Table 7.20: Company Profile of Starlink including Company overview, Business Strategy, Technological Vendors, Number of Employees
Table 8.1: Major Technologies Used in Cyber Security along with Proprietor and Key Features
Table 8.2: List of Major Smart City Projects in Middle East
Table 8.3: Internet Penetration in Percentage in Arab Countries
Table 8.4: Security Requirements, Challenges and Benefit of using Cloud Computing
Table 9.1: Middle East Cyber Security Market CAGR by Type of Solution, 2017-22
Table 9.2: Middle East Cyber Security Market Segmentation by Revenue in USD billion by Solution, 2017-22
Table 9.3: Middle East Cyber Security Market Share, by Type of Security, 2017-22
Table 9.4: Middle East Cyber Security Market Revenue in USD Billion by Type of Security, 2017-22
Table 9.5: Middle East Cyber Security Market, CAGR 2017-22, by Type of Security
Table 9.6: Middle East Cyber Security Market, Revenue in USD Billion, by Type of End User, 2017-22
Table 9.7: Middle East Cyber Security Market, CAGR, by Type of End User, 2017-22
Table 9.8: Market in USD Billion of Cyber Security in Middle East by Region, 2017-22
Table 9.9: Middle East Cyber Security Market CAGR (2017-22) by Region.
© This is a licensed product of Ken Research and should not be copied
Erratic Pricing
OTC drugs allowed
to advertise
7
0.0
5.0
10.0
15.0
20.0
25.0
2012 2017 2022
USDBillion
Figure 1.1: Middle East Cyber Security Market by Revenue, 2012-2022
1
2
3
4
5
CAGR (2012-17): ~%
CAGR (2017-2022): ~%
Market is dominated by ~ big players. Some
regional players enjoy large share in their
respective market.
More than ~ system integrators out of
which ~ provide service in more than one
country.
Technology, Financial backing,
Price, Relationship.
Growing Stage
Cyber threats has risen
considerably prompting
enterprises to take cyber
security seriously.
Developers are integrating
technologies such as cloud, AI
etc in order to make their
products resilience against the
ever evolving landscape.
Figure 1.2: Middle East Cyber Security Market by Regions by
Revenue, 2017 and 2022
1.1 Middle Cyber Security Market Executive Summary
Table 1.1: Major Cyber security Developers and System
Integrators in Middle East, 2017
Developers System Integrators
IBM Etisalat
Fire Eye DU
Trend Micro Starlink
Splunk BIOS
Symantec ISYX
Region 2017 2022
Central Region ~% ~%
Western region ~% ~%
Southern Region ~% ~%
East Region ~% ~%
Northern Region ~% ~%
© This is a licensed product of Ken Research and should not be copied
Erratic Pricing
OTC drugs allowed
to advertise
8
Middle Cyber Security Market: The cyber security market includes revenue from spending on hardware, software and consulting services for installation of
these services for prevention of any kind of cyber threats by various solutions including firewall, intrusion detection system, antivirus, identity & access
management, encryption and others. Only spending on Domestic Commercial, Retail, BFSI, Government, Residential, Energy & power and Healthcare
sector has been accounted while collating the market size. Spending on army and defense has not been considered while cumulating the market revenues.
The Middle East cyber security market is segmented using following criteria:
Type of Solution: Firewall, Intrusion Detection System (IDS/IPS), Antivirus/Antimalware, Identity and Access Management (IAM), Encryption, Data Loss
Prevention (DLP), Unidentified Threat Management (UTM), Disaster Recovery.
Type of Security: Network Security, Wireless Security, End-Point Security, Application Security, Content Security, Cloud Security.
Type of End User: Banking & Finance Government IT & Telecom Energy & Power Healthcare Retail Others
Middle East is segmented into following regions.
Central Region: Saudi Arabia, Iraq, Jordan
Northern Region: Turkey, Syria, Cyprus
Western region: Lebanon, Israel, Egypt, State of Palestine
Southern Region: Oman, UAE, Yemen
Eastern Region: Bahrain, Kuwait, Qatar, Iran
2. 1 Research Methodology - Market Definitions
© This is a licensed product of Ken Research and should not be copied
Erratic Pricing
OTC drugs allowed
to advertise
9
AI: Artificial Intelligence
CAGR: Compounded Annual Growth Rate
CCTV: Closed Circuit Television
COTS: Commercial Off The Shelf
DDOS: Distributed Denial Of Service
FY: Financial Year
GCC: Gulf Cooperation Council
IoT: Internet of things
IP: Internet Protocol
KD: Kuwait Dirham
KSA: Kingdom of Saudi Arabia
LAN: Local area Network
LLC: Limited Liability Company
MoU: Memorandum of Understanding
NVR: Network Video Recorder
OPEC: Oil Producing and Exporting Countries
PoE: Power of Ethernet
PTZ: Pan Tilt Zoom
QNB: Qatar National Bank
R&D: Research and Development
SSS: Specialized Security System
UAE: United Arab Emirates
USD: United States Dollar
USP: Unique Selling Proposition.
WAN: Wide Area Network
2.2 Research Methodology - Abbreviations
© This is a licensed product of Ken Research and should not be copied
Erratic Pricing
OTC drugs allowed
to advertise
10
Hypothesis Creation: The research team has first framed a hypothesis about the market through analysis of existing industry factors obtained from
magazines, journals, broker reports, investor presentations and annual reports of major companies, Ministry of Interiors and Others.
Hypothesis Testing: The research team conducted computer assisted telephonic interview (CATI) with several industry professionals including decision
makers in Developers and System Integrating companies. The industry professionals included several management executives, and other higher level
authorities. Structured interviews were conducted through telecom with several industry veterans including major decision makers from Etisalat, DU, G4S
and other companies. The analyst at Ken Research collated their insights on the market onboard and to seek justification to the hypothesis framed by the
team.
Sanity Checking @ Decision Tree Analysis: Data has been collected and verified through cross-sanity checking the opinion and facts received from
interview with the hypotheses framed from public databases. The team has verified the data by conducting both bottom-to-top and top-to-bottom analysis.
Future Forecasting via Poll Opinions and Statistical Tools: Multi-Factor regression was conducted on the lag variables by identifying the independent and
quantifiable variables directly affecting the market. The forecasting was done by using SPSS statistical tools. The variables were checked for multi-co-
linearity and other bias that could be present in the model. The conclusion from the regression was then double-checked by conducting poll opinions.
Interpretation and Proofreading: The final analysis will then be interpreted in the research report by our expert team well versed with the Cyber Security
Industry.
2.3 Research Methodology - Consolidated Research Approach
© This is a licensed product of Ken Research and should not be copied
Erratic Pricing
OTC drugs allowed
to advertise
11
Market Sizing:
 Initially, we identified all major developers and system integrators operating in the market. We then collated the revenue for current year. This helped us in
sanity checking the current market size provided by industry veterans.
 We also collated the information for entire cyber security industry size including segmentation, type of solution, type of security, type of end user, regions and
then interviewed industry professionals to seek their expert opinion on contribution of these segments to the overall market.
 We have conducted multiple CATIs with industry experts and management of leading developers and system integrators to understand the market size,
relationship building process, customer acquisition, and their views on future development. This helped us in estimating revenue generated for the overall
market and validating the future growth in the market
Limitation:
 The projects required for army and defense work was not included while calculating the market size for cyber security market. Confidentiality of data, due to
national security concerns was the major reason behind lack of access to data.
 Primaries may have been bullish with certain data points but we, Analysts at Ken Research, have verified the data points with other bottom up approach and
through various secondary databases.
Middle East Cyber Security Market :
 Products: Firewall, Intrusion Detection System (IDS/IPS), Antivirus/Antimalware, Identity and Access Management (IAM), Encryption, Data Loss Prevention
(DLP), Unidentified Threat Management (UTM), Disaster Recovery.
 Services: Risk assessment, data centres, consulting, security and threat intelligence, file integrity monitoring. User and Entity analytics.
2.4 Research Methodology - Market Sizing, Limitation and Services– Cyber Security Market
© This is a licensed product of Ken Research and should not be copied
Erratic Pricing
OTC drugs allowed
to advertise
12
Variables Considered:
 Contribution of Financial Sector to the Real GDP (UAE): Financial sector represent the biggest end user of cyber security products and as the financial
sector will grow the investments made in the cyber security market will also increase.
 UAE Industrial Sector Contribution to GDP: Industrial sector contributes 15% of the investments made in cyber security market in Middle East. The
growth in the sector’s contribution to GDP will increase the expenditure made by industrial sector in cyber security.
 UAE IT Industry size: IT industry contributes to one-fifth of the cyber security market. Increase in IT industry size will result in increase in IT
infrastructure in the sector which will require additional cyber security to ensure safety of those infrastructure.
Forecast Modelling:
 The report applies Correlation and Regression analysis methods to forecast the future of the cyber security market. The capabilities of SPSS and
predictive analytics software have been leveraged to determine the relevant indicators used for forecasting this industry.
 In the present case, cyber security market revenue has been taken as the dependent variable and other variables such as contribution of financial sector to
the real GDP, UAE industrial sector contribution to GDP, UAE IT industry size have been taken as independent variables.
2.5 Research Methodology - Variables (Dependent and Independent)
© This is a licensed product of Ken Research and should not be copied 13
Increasing Cyber Threat
oThe number of virus-infected computers in
the Middle East is more than four times the
global average
oCyber crimes in UAE increased by ~%
between 2013 and 2015.
oThe average total organizational cost lost
due to data breaches in Middle East was
USD ~ million in 2017.
oA total of ~ cyber attacks forayed against
government, semi-government and private
sector entities in UAE alone from January to
October 2017. (Source: Telecommunication
Authority of UAE)
oCompanies in Middle East have highest per
capita direct cost globally, these cost involve
direct expense outlay to accomplish a given
activity such as engaging forensic experts,
hiring a law firm or offering victims identity
protection services.
Recurring Events
oIn Middle East, post data breach response
expenditure made by organizations in 2017
was estimated to be USD ~ million. These
activities includes desk activities, inbound
communications, special investigative
activities, remediation, legal expenditures,
product discounts, identity protection
services and regulatory
interventions.(Source: Ponemon Institute,
Research Report)
oAccording to Telecommunication authority,
in January 2017, there were ~ attacks on the
UAE government websites.
oIn 2014 UAE government established its first
cyber security centre in Dubai in order to
protect the government information system
as well as the telecommunication network
from the threat of cyber attacks
oThe UAE region holds ~ spot globally in
terms of region susceptible to cyber attacks.
Formulation of cyber security policies has
made the country ~ most secure region
worldwide.
oCyber attacks on state owned companies
like Saudi Aramco, Qatar National Bank
were aimed at destabilizing the country’s
economy. Hence, after these attacks the
government have taken the issue very
seriously.
Government Focus
5.1 Middle East Cyber Security Market Overview
oThe market is dominated by US based
developers such as IBM, Fire eye etc
although a lot of Israeli companies are
entering the competitive landscape. A
number of startups from Israel have
surfaced after 2012 like Check point,
Imperva, theta ray. In 2017 the Israeli cyber
security sector solidified its position as a
global player, raising USD ~ million in
venture capital and private equity
investment. Israel is an exception in Middle
East , where regional developers are
virtually non existent. Israel wins second-
largest number of cyber security deals
globally after U.S.
Advantage Israel
The system integrators present in the
market are regional players with exception
of a few like Etisalat, Bios etc. Political
tension between various countries prohibit
even the big companies to expand their
business across the Middle East region.
© This is a licensed product of Ken Research and should not be copied
5.3 Major Cyber Attacks in Middle East
Affected Organization Country Year Industry Effects of Attack
Saudi Aramco ~ ~ ~ ~
Qatar National Bank ~ ~ ~ ~
General Authority of
Civil Aviation
~ ~ ~ ~
Etisalat ~ ~ ~ ~
0%
20%
40%
60%
80%
Loss of contracts /
business opportunities
Loss of credibility /
damage to company
reputation
Damage to credit rating Increased insurance
premiums
Temporary loss of ability
to trade
Temporary loss of access
to business critical
information
Percentage
Affects Physical Infrastructure Affects Virtual Infrastructure
Figure 5.1: Effect of Security Breach on Physical and Virtual Infrastructure
Table 5.1: Major Cyber Attacks in Middle East Region
Source: Gulf News
Source: Kaspersky Report
© This is a licensed product of Ken Research and should not be copied
5.5 Types of Cyber Attacks in Middle East
15
Malware
In November 2017, a cyber attack using
“Powershell” malware hit the Saudi
government, aimed to disrupt the
government computers. A new Advanced
Persistent Threat (APT) was detected,
which was targeting Saudi Arabia by
infiltrating computers using email phishing
techniques by the government’s National
Cyber Security Centre.
Skimmers are essentially malicious card readers
that steal data off the ATM card’s magnetic stripe
attached to the real payment terminals so that
they can strip data from every person that swipes
their cards.
Crypto jacking
This is the most recent type of threat in Middle East which
aims at robbing digital wallets. It uses technologies such as
block chain
Attack on Saudi Aramco, by a virus
Shamoon in 2012 was one of the most
destructive cyber attack on private business
ever. In January 2017, Shamoon 2, the
improved version of Shamoon, attacked
many organizations across KSA leaving at
least three government agencies and four
private sector companies offline for 48
hours. The virus disrupts computers by
overwriting the master boot record, making
it impossible for them to start up.
Virus
Ransom Ware
Ransom ware represents one of the most dangerous threat to
organizations and end-users. Ransom ware’s family continue
to increase; authors will be more focused on mobile devices
implementing new evasion techniques making these threats
even more efficient and difficult to eradicate
Skimmers
© This is a licensed product of Ken Research and should not be copied
5.8 Middle East Cyber Security Market- Common Practices
16
Security Orchestration and Analytics
End Point
o End point
patching and
management.
o Malware
Protection.
o End point
detection and
response.
Mobile
o Transaction
Protection.
o Device
management
.
o Content
Security.
Network
o Network
forensics and
threat
Management.
o Firewall
o Network
Visibility and
segmentation.
Advanced
Fraud
o Fraud
protection.
o Criminal
Detection
Identity and
Access
o Privileged
User
Management.
o Mainframe
security.
o Identity
Governance.
Data
o Data
Protection.
o Data Access
Control.
Apps
o Application
Scanning.
o Application
security
Management
Threat
Intelligence
o Indicators of
Compromise.
o Malware
Analysis.
o Threat
Sharing.
© This is a licensed product of Ken Research and should not be copied
6.1 Middle East Cyber Security Market Size by Revenue, 2012-17
0%
5%
10%
15%
20%
25%
0
2
4
6
8
10
2012 2013 2014 2015 2016 2017
Percentage
USDBillion
Market Size YOY growth rate
17
Figure 6.1: Middle East Cyber Market Size by
Revenue in USD Billion, 2012-2017
Source: Interview with Dr. Udai Kumar Uprit, Digital Security Expert,
Middle East
As the company expands its business
not only it requires cyber security
arising out of increasing infrastructure
but it also adds up to the level of
security as the company becomes more
vulnerable to cyber attacks. Various
sectors such as automobile, healthcare
are in their developing phase due to
which demand of cyber security is
rising. Diversification strategies
implemented by OPEC nations have
also resulted in expansion in number of
companies coming in the region.
In 2014, UAE national electronic security authority announced that cyber security one of the
biggest economic and national security challenge that the country faces at present and asked
public and private entities to adopt cyber security measures across their organization. There
were few instances when some unidentified cyber groups attacked various petroleum, gas,
and helium industries in U.A.E, Kingdom of Saudi Arabia and Qatar using a malware called
Trojan.
In 2015, first Middle East based cyber criminal group, with full-scale cyber-espionage
operations, emerged called “Desert Falcons”. The group was started in 2011 but it was not until
beginning of 2015 that the group became active. By February 2015, the group had more than ~
victims in ~ countries, majority of these victims were in Palestine.
© This is a licensed product of Ken Research and should not be copied
6.3 Middle East Cyber Security Market Segmentation by End User, 2017 (1/4)
18
Figure 6.3: Middle East Cyber Security Segmentation by End
User, 2017
Table 6.2: Middle East Cyber Security Market
Segmentation by Revenue by End Users, 2017
Type of End User Expenses in USD Million
Banking & Finance ~
Government ~
IT & Telecom ~
Energy & Power ~
Healthcare ~
Retail ~
Others ~
Total ~
o Saudi Vision 2030 aims to
secure the kingdom from
cyber crime in the near
future. The government
wants to develop a cyber
security industry which
would be technological
leader in Middle East region.
In order to accomplish this
purpose the government has
formed a new regulatory
body, Authority of Cyber
Security, in 2017.
o After a lot of high profile cyber attacks in KSA, Saudi Arabia Monetary Authority (SAMA) framed a regulatory
framework for the organizations coming under its jurisdiction. The framework defined principles and objectives for
initiating, implementing, maintaining, monitoring and improving cyber security controls. The Framework is
applicable to all Member Organizations regulated by SAMA, which include the following:
1. ~
2. ~
3. ~
4. ~
5. ~
o Government sectors
are shifting to
mobile based
service resulting in
demand for cyber
security.
Source: Mr. Anastasios Monachos, Security Resesearcher, Private Cyber Security Company
Type of End User Market Share in
Percentage
Banking & Finance ~
Government ~
IT & Telecom ~
Energy & Power ~
Healthcare ~
Retail ~
Others ~
© This is a licensed product of Ken Research and should not be copied
6.3 Middle East Cyber Security Market Segmentation by End User, 2017 (4/4)
Healthcare is fifth biggest user of cyber security in Middle East countries. The growth in the sector has been due to :
o Increase in number of managed and unmanaged devices on networks like mobile, laptops and others.
o ~
o Data of patients, providers and the organization must be protected from loss and cyber incidents especially data that is subject to breach notification rules.
o ~
o Increase in vendor-owned-and-managed systems on the networks have increased resulting in increase on vulnerability of the entire system.
19
Healthcare Sector
Oil & Gas Sector
In Middle East oil and gas industries have the biggest share in power and energy sector which comprises 15 % of the total demand of cyber security in the region.
The demand is high because of following reasons.
o ~
o Most of the oil and gas refineries in the region are state owned and are of national importance therefore it becomes profitable for foreign state backed hackers to
disrupt their operations.
o ~
© This is a licensed product of Ken Research and should not be copied
7.1 Middle East Cyber Security Developers
20
© This is a licensed product of Ken Research and should not be copied
7.2 Middle East Cyber Security Market- Parameters of Competition for Developers (1/2)
21
Parameters Description
Integration
o ~
Agility
o ~
Financial Resource
o ~
Effectiveness
o ~
After Sales Service
o ~
Table 7.1: Parameters of Competition in Middle East Cyber Security Market
© This is a licensed product of Ken Research and should not be copied
7.3 Company Profile of Fire Eye (1/4)
22
Parameters Description
Company
Overview
o ~
USP
o ~
Business Strategy
o ~
Number of
Employees o ~
Year Expense in millions USD
2015 ~
2016 ~
2017 ~
Figure 7.1: Fire Eye Revenue in USD Million from
Global Business, 2013-17
Table 7.3: Fire Eye R&D Expense from 2015-2017
Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy,
Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing,
Global Presence, Technological Partners, Major Projects
Source: Annual report
0%
20%
40%
60%
80%
100%
120%
140%
160%
180%
0
100
200
300
400
500
600
700
800
2013 2014 2015 2016
Global Revenue YOY growth Rate
© This is a licensed product of Ken Research and should not be copied
7.3 Company Profile of Fire Eye (2/4)
23
Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and
Distribution, Marketing, Global Presence, Technological Partners, Major Projects.
Source: Annual report
Type of Security Product Portfolio Description
Threat Detection
and Prevention
~ o ~
~ o ~
~ o ~
~ o ~
~ o ~
~ o ~
Forensic and
Investigation
~ o ~
~ o ~
Security
management and
operations
~ o ~
~ o ~
~ o ~
© This is a licensed product of Ken Research and should not be copied
8.1 Middle East Cyber Security Market- Technology Used (2/2)
24
There are two major technologies to defend against malware Signature based approach and behavior analysis. Most organizations rely on decade’s old signature-
based methodology, some of the new versions of malicious code are not recognized by signature-based technologies, but hackers have become smarter and try to
evade static signature detection techniques by coding the virus in such a way so that it can change it's signature The more advanced method of detecting malware
via behavior analysis is gaining rapid traction. Although some banks in Middle East have adopted the technology but the technology is still unfamiliar.
Signature-based Technology Behavior-based Technology
Behavior based technology has following advantages from signature based technology:
1. ~
2. ~
3. ~
4. ~
© This is a licensed product of Ken Research and should not be copied
8.3 Security Trend Matrix
25
~
~
~
~
~
~
~
~
IoT
Behavioral
Analytics
Governme
nt
Oil & Gas
Telecomm
unication
Banking
~
~
~
~
~
~
~
~
~
~
~
~
Cloud
Incident
Response
Mobile
Source: Starlink, Ken Research Analysis
Fig 8.1: Different Technological Trends and Their Effect on Major Sectors in Middle East
© This is a licensed product of Ken Research and should not be copied
9.1 Middle East Cyber Security Market Future Outlook, 2017-2022
26
0%
5%
10%
15%
20%
25%
30%
0
5
10
15
20
25
2017 2018 2019 2020 2021 2022
Percent
BillionUSD
Market Size YOY growth rate
Etisalat, Singtel, Soft Bank and Telefonica will sign
an agreement to create the first Global Telco Security
Alliance to offer enterprises a comprehensive
portfolio of cyber security services. The alliance will
be the world’s biggest cyber security provider which
will comprise a customer base of more than ~ billion
customers in over ~ countries. The group has
combined ~ world-class Security Operation Centres
(SOCs) and employ more than ~cyber security
experts globally. The group would look to enhance
the technologies it uses by developing its capabilities
in predictive analytics using machine learning and
advanced cyber security using internet of things.
Source: Interview with Dr. Udai Kumar Uprit, Digital Security Expert, Middle East
Figure 9.1: Middle East Cyber security market by
Revenue, 2017-22
More and more international companies are setting up offices in Middle East as regulations
regarding foreign investments loosens up amid of oil price vulnerabilities. Rapid private-
sector growth offers new investment opportunities in key sectors such as real estate,
construction, tourism and manufacturing, but the sheer scale and pace of change means
new security gaps are appearing at a dramatic rate.
Various government across
the Middle East are trying to
come up with a cyber
security strategy to make the
organisations immune from
growing threat of cyber
attacks. Currently all the
Middle East countries
except Israel lack a
substantial framework
governing cyber security.
This may have an effect on
the market structure as more
and more global players can
be attracted to enter the
market.
© This is a licensed product of Ken Research and should not be copied
9.1.2 Middle East Cyber Security Market Future Outlook by Type of Security, 2017-2022
27
Type of Security 2017 2018 2019 2020 2021 2022
Network Security ~ ~ ~ ~ ~ ~
Wireless Security ~ ~ ~ ~ ~ ~
End-Point Security ~ ~ ~ ~ ~ ~
Application Security ~ ~ ~ ~ ~ ~
Content Security ~ ~ ~ ~ ~ ~
Cloud Security ~ ~ ~ ~ ~ ~
Total ~ ~ ~ ~ ~ ~
Table 9.3: Middle East Cyber Security Market Share by Type of Security in
Percentage, 2017-22
Table 9.4: Middle East Cyber Security Market Revenue in USD Billion by
Type of Security, 2017-22
Type of Security CAGR(%)
Network Security ~
Wireless Security ~
End-Point Security ~
Application Security ~
Content Security ~
Cloud Security ~
Table 9.5: Middle East Cyber Security Market, CAGR 2017-22 by Type of
Security
Key Takeaways:
o Network Security and Wireless Security will be the fastest growing sectors, both
registering a 5 year CAGR of ~% between 2017 to 2022.
o Network security will continue to constitute the lion share of the market as the
demand will increase from ~USD billion in 2017 to ~ USD billion in 2022.
o Cloud security will also cement its position in the market, registering a CAGR of
~ % between 2017-22. As more and more companies are moving to cloud based
infrastructure. Source: Ken Research Analysis
Type of Security 2017 2018 2019 2020 2021 2022
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
© This is a licensed product of Ken Research and should not be copied
Disclaimer
The research reports provided by Ken Research are for the personal information of the authorized recipient and is not for public distribution and should not
be reproduced or redistributed without prior permission. None of this material may be used for any commercial or public use until unless authorized by Ken
Research. The report will only be used as per the license rights authorized by Ken Research.
The information provided in the research documents is from publicly available data and other sources, which are reliable. Efforts are made to try and ensure
accuracy of data. With respect to documents available, neither the company nor any of its employees makes any warranty, express or implied, including the
warranties of merchantability and fitness for a particular purpose, or assumes any legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process disclosed, or represents that its use will not infringe privately owned rights.
The report also includes analysis and views expressed by our research team. The research reports are purely for information purposes. The opinions
expressed are our current opinions as of the date appearing in the material and may be subject to change from time to time without notice. Investors should
not solely rely on the information contained in the research documents and must make investment decisions based on their own investment objectives, risk
profile and financial position. The recipients of this material should take their own professional advice before acting on this information.
Ken Research will not accept return of reports once dispatched due to the confidentiality of information provided in our reports. In case, a report qualify for
return, we will issue a credit, minus shipping charges, of equal value to the original purchase price, toward a future purchase—no refunds. The decision
about whether the product return can be accepted or not is solely at our discretion. Any dispute will be subject to laws of India and exclusive jurisdiction of
Indian Courts.
No part of this manual or any material appearing may be reproduced, stored in or transmitted in any other format without written permission of Ken
Research. This is purely for the reference of the concerned entity.
28
© This is a licensed product of Ken Research and should not be copied 29
Unit 14, Tower B3, Spaze I Tech Business Park, Sohna Road, Sector 49, Gurgaon, Haryana
- 122001
New Delhi, India
Office: +91 9311149880
Web: www.kenresearch.com
Email: namit@kenresearch.com
Contact Us
Contact Us

More Related Content

What's hot

Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseResearchFox
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - GovernmentResearchFox
 
Markntel UAE Managed Security Services Market Analysis, 2020
Markntel UAE Managed Security Services Market Analysis, 2020Markntel UAE Managed Security Services Market Analysis, 2020
Markntel UAE Managed Security Services Market Analysis, 2020ShivaKumar1833
 
Cyber security market 1
Cyber security market 1Cyber security market 1
Cyber security market 1Sidhant Kale
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesResearchFox
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APACResearchFox
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - HealthcareResearchFox
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presentionrodrida1
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017InvestorSymantec
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write UpClaudia Toscano
 
Cyber security industry market
Cyber security industry marketCyber security industry market
Cyber security industry marketameliasimon0
 
Iot security Market PPT 2021: Size, Growth, Demand and Forecast till 2026
Iot security  Market PPT 2021: Size, Growth, Demand and Forecast till 2026Iot security  Market PPT 2021: Size, Growth, Demand and Forecast till 2026
Iot security Market PPT 2021: Size, Growth, Demand and Forecast till 2026IMARC Group
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Martin Finn
 
Mobile security market is expected to grow $7.2 billion by 2024
Mobile security market is expected to grow $7.2 billion by 2024Mobile security market is expected to grow $7.2 billion by 2024
Mobile security market is expected to grow $7.2 billion by 2024DheerajPawar4
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming Black Duck by Synopsys
 

What's hot (15)

Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - Enterprise
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - Government
 
Markntel UAE Managed Security Services Market Analysis, 2020
Markntel UAE Managed Security Services Market Analysis, 2020Markntel UAE Managed Security Services Market Analysis, 2020
Markntel UAE Managed Security Services Market Analysis, 2020
 
Cyber security market 1
Cyber security market 1Cyber security market 1
Cyber security market 1
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - Healthcare
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Cyber security industry market
Cyber security industry marketCyber security industry market
Cyber security industry market
 
Iot security Market PPT 2021: Size, Growth, Demand and Forecast till 2026
Iot security  Market PPT 2021: Size, Growth, Demand and Forecast till 2026Iot security  Market PPT 2021: Size, Growth, Demand and Forecast till 2026
Iot security Market PPT 2021: Size, Growth, Demand and Forecast till 2026
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
Mobile security market is expected to grow $7.2 billion by 2024
Mobile security market is expected to grow $7.2 billion by 2024Mobile security market is expected to grow $7.2 billion by 2024
Mobile security market is expected to grow $7.2 billion by 2024
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 

Similar to Middle East Cyber Security Market Outlook to 2022

Global Industrial Control Systems (ICS) Security Market Analysis, 2020
Global Industrial Control Systems (ICS) Security Market Analysis, 2020Global Industrial Control Systems (ICS) Security Market Analysis, 2020
Global Industrial Control Systems (ICS) Security Market Analysis, 2020AdrenaSharma
 
Video analytics market
Video analytics marketVideo analytics market
Video analytics marketameliasimon0
 
Cyber security market
Cyber security market Cyber security market
Cyber security market poojaAmrale
 
Cyber security market
Cyber security market Cyber security market
Cyber security market Sidhant Kale
 
Data security software market
Data security software marketData security software market
Data security software marketCillianMurphy7
 
Enterprise Firewall Market - Outlook (2017-21)
Enterprise Firewall Market - Outlook (2017-21)Enterprise Firewall Market - Outlook (2017-21)
Enterprise Firewall Market - Outlook (2017-21)ResearchFox
 
Simulation software
Simulation softwareSimulation software
Simulation softwareQYResearch
 
Data Integration Software Market.pdf
Data Integration Software Market.pdfData Integration Software Market.pdf
Data Integration Software Market.pdfSunilShah9161
 
Vietnam cyber security market size, shre & market forecast 2016 2026
Vietnam cyber security market size, shre & market forecast  2016 2026Vietnam cyber security market size, shre & market forecast  2016 2026
Vietnam cyber security market size, shre & market forecast 2016 2026TechSci Research
 
Forecast of Global Semiconductor Inspection Equipment Players Market 2023
Forecast of Global Semiconductor Inspection Equipment Players Market 2023Forecast of Global Semiconductor Inspection Equipment Players Market 2023
Forecast of Global Semiconductor Inspection Equipment Players Market 2023Market Research Reports, Inc.
 
Cloud Infrastructure Services Market.pdf
Cloud Infrastructure Services Market.pdfCloud Infrastructure Services Market.pdf
Cloud Infrastructure Services Market.pdfsagarsingh443888
 
Server Operating System Market by Product Type, Distribution Channel, End Use...
Server Operating System Market by Product Type, Distribution Channel, End Use...Server Operating System Market by Product Type, Distribution Channel, End Use...
Server Operating System Market by Product Type, Distribution Channel, End Use...IMARC Group
 
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci Research
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci ResearchSaudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci Research
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci ResearchTechSci Research
 
Security Software as a Service Market.pdf
Security Software as a Service Market.pdfSecurity Software as a Service Market.pdf
Security Software as a Service Market.pdfMac Watson
 
Global smart sensor market research report 2017
Global smart sensor market research report 2017Global smart sensor market research report 2017
Global smart sensor market research report 2017QYResearch
 
Cyber Security Market 2015-2025
Cyber Security Market 2015-2025Cyber Security Market 2015-2025
Cyber Security Market 2015-2025Visiongain
 
Mobile security market vendors by share & growth strategies 2024 marke...
Mobile security market vendors by share & growth strategies   2024  marke...Mobile security market vendors by share & growth strategies   2024  marke...
Mobile security market vendors by share & growth strategies 2024 marke...DheerajPawar4
 
Mobile security market report by marketsand markets
Mobile security market report by marketsand marketsMobile security market report by marketsand markets
Mobile security market report by marketsand marketsDheerajPawar4
 
Mobile security industry to grow $7.2 billion by 2024
Mobile security industry to grow $7.2 billion by 2024Mobile security industry to grow $7.2 billion by 2024
Mobile security industry to grow $7.2 billion by 2024DheerajPawar4
 
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...IMARC Group
 

Similar to Middle East Cyber Security Market Outlook to 2022 (20)

Global Industrial Control Systems (ICS) Security Market Analysis, 2020
Global Industrial Control Systems (ICS) Security Market Analysis, 2020Global Industrial Control Systems (ICS) Security Market Analysis, 2020
Global Industrial Control Systems (ICS) Security Market Analysis, 2020
 
Video analytics market
Video analytics marketVideo analytics market
Video analytics market
 
Cyber security market
Cyber security market Cyber security market
Cyber security market
 
Cyber security market
Cyber security market Cyber security market
Cyber security market
 
Data security software market
Data security software marketData security software market
Data security software market
 
Enterprise Firewall Market - Outlook (2017-21)
Enterprise Firewall Market - Outlook (2017-21)Enterprise Firewall Market - Outlook (2017-21)
Enterprise Firewall Market - Outlook (2017-21)
 
Simulation software
Simulation softwareSimulation software
Simulation software
 
Data Integration Software Market.pdf
Data Integration Software Market.pdfData Integration Software Market.pdf
Data Integration Software Market.pdf
 
Vietnam cyber security market size, shre & market forecast 2016 2026
Vietnam cyber security market size, shre & market forecast  2016 2026Vietnam cyber security market size, shre & market forecast  2016 2026
Vietnam cyber security market size, shre & market forecast 2016 2026
 
Forecast of Global Semiconductor Inspection Equipment Players Market 2023
Forecast of Global Semiconductor Inspection Equipment Players Market 2023Forecast of Global Semiconductor Inspection Equipment Players Market 2023
Forecast of Global Semiconductor Inspection Equipment Players Market 2023
 
Cloud Infrastructure Services Market.pdf
Cloud Infrastructure Services Market.pdfCloud Infrastructure Services Market.pdf
Cloud Infrastructure Services Market.pdf
 
Server Operating System Market by Product Type, Distribution Channel, End Use...
Server Operating System Market by Product Type, Distribution Channel, End Use...Server Operating System Market by Product Type, Distribution Channel, End Use...
Server Operating System Market by Product Type, Distribution Channel, End Use...
 
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci Research
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci ResearchSaudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci Research
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci Research
 
Security Software as a Service Market.pdf
Security Software as a Service Market.pdfSecurity Software as a Service Market.pdf
Security Software as a Service Market.pdf
 
Global smart sensor market research report 2017
Global smart sensor market research report 2017Global smart sensor market research report 2017
Global smart sensor market research report 2017
 
Cyber Security Market 2015-2025
Cyber Security Market 2015-2025Cyber Security Market 2015-2025
Cyber Security Market 2015-2025
 
Mobile security market vendors by share & growth strategies 2024 marke...
Mobile security market vendors by share & growth strategies   2024  marke...Mobile security market vendors by share & growth strategies   2024  marke...
Mobile security market vendors by share & growth strategies 2024 marke...
 
Mobile security market report by marketsand markets
Mobile security market report by marketsand marketsMobile security market report by marketsand markets
Mobile security market report by marketsand markets
 
Mobile security industry to grow $7.2 billion by 2024
Mobile security industry to grow $7.2 billion by 2024Mobile security industry to grow $7.2 billion by 2024
Mobile security industry to grow $7.2 billion by 2024
 
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
 

More from Ashish Chauhan

India poct market outlook to 2023
India poct market outlook to 2023India poct market outlook to 2023
India poct market outlook to 2023Ashish Chauhan
 
Advanced wound care industry,wound care products market segmentation,market g...
Advanced wound care industry,wound care products market segmentation,market g...Advanced wound care industry,wound care products market segmentation,market g...
Advanced wound care industry,wound care products market segmentation,market g...Ashish Chauhan
 
Wound care market,wound management market share ,advanced wound care market t...
Wound care market,wound management market share ,advanced wound care market t...Wound care market,wound management market share ,advanced wound care market t...
Wound care market,wound management market share ,advanced wound care market t...Ashish Chauhan
 
Facility management services in qatar,facility management opportunities qatar...
Facility management services in qatar,facility management opportunities qatar...Facility management services in qatar,facility management opportunities qatar...
Facility management services in qatar,facility management opportunities qatar...Ashish Chauhan
 
Money transfer agencies philippines,remittance flow philippines,online bill p...
Money transfer agencies philippines,remittance flow philippines,online bill p...Money transfer agencies philippines,remittance flow philippines,online bill p...
Money transfer agencies philippines,remittance flow philippines,online bill p...Ashish Chauhan
 
Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...
Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...
Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...Ashish Chauhan
 
Money remittance business philippines,philippines remittance statistics,inter...
Money remittance business philippines,philippines remittance statistics,inter...Money remittance business philippines,philippines remittance statistics,inter...
Money remittance business philippines,philippines remittance statistics,inter...Ashish Chauhan
 
Overseas filipino remittance philippines,money remittance business philippine...
Overseas filipino remittance philippines,money remittance business philippine...Overseas filipino remittance philippines,money remittance business philippine...
Overseas filipino remittance philippines,money remittance business philippine...Ashish Chauhan
 
Ride sharing apps in indonesia,on demand grocery market,go jek market share i...
Ride sharing apps in indonesia,on demand grocery market,go jek market share i...Ride sharing apps in indonesia,on demand grocery market,go jek market share i...
Ride sharing apps in indonesia,on demand grocery market,go jek market share i...Ashish Chauhan
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...
Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...
Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...Ashish Chauhan
 
Money transfer uae,mobile wallets users uae,exchange house money transfer in ...
Money transfer uae,mobile wallets users uae,exchange house money transfer in ...Money transfer uae,mobile wallets users uae,exchange house money transfer in ...
Money transfer uae,mobile wallets users uae,exchange house money transfer in ...Ashish Chauhan
 
Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...
Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...
Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...Ashish Chauhan
 
India land leveler market,india power weeder industry,india cono weeder marke...
India land leveler market,india power weeder industry,india cono weeder marke...India land leveler market,india power weeder industry,india cono weeder marke...
India land leveler market,india power weeder industry,india cono weeder marke...Ashish Chauhan
 
Private hospitals in the philippines,philippines hospital industry,maternity ...
Private hospitals in the philippines,philippines hospital industry,maternity ...Private hospitals in the philippines,philippines hospital industry,maternity ...
Private hospitals in the philippines,philippines hospital industry,maternity ...Ashish Chauhan
 

More from Ashish Chauhan (15)

India poct market outlook to 2023
India poct market outlook to 2023India poct market outlook to 2023
India poct market outlook to 2023
 
Advanced wound care industry,wound care products market segmentation,market g...
Advanced wound care industry,wound care products market segmentation,market g...Advanced wound care industry,wound care products market segmentation,market g...
Advanced wound care industry,wound care products market segmentation,market g...
 
Wound care market,wound management market share ,advanced wound care market t...
Wound care market,wound management market share ,advanced wound care market t...Wound care market,wound management market share ,advanced wound care market t...
Wound care market,wound management market share ,advanced wound care market t...
 
Facility management services in qatar,facility management opportunities qatar...
Facility management services in qatar,facility management opportunities qatar...Facility management services in qatar,facility management opportunities qatar...
Facility management services in qatar,facility management opportunities qatar...
 
Money transfer agencies philippines,remittance flow philippines,online bill p...
Money transfer agencies philippines,remittance flow philippines,online bill p...Money transfer agencies philippines,remittance flow philippines,online bill p...
Money transfer agencies philippines,remittance flow philippines,online bill p...
 
Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...
Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...
Manufacturers di pipe in india,ductile iron pipe sector,india hdpe pipe manuf...
 
Money remittance business philippines,philippines remittance statistics,inter...
Money remittance business philippines,philippines remittance statistics,inter...Money remittance business philippines,philippines remittance statistics,inter...
Money remittance business philippines,philippines remittance statistics,inter...
 
Overseas filipino remittance philippines,money remittance business philippine...
Overseas filipino remittance philippines,money remittance business philippine...Overseas filipino remittance philippines,money remittance business philippine...
Overseas filipino remittance philippines,money remittance business philippine...
 
Ride sharing apps in indonesia,on demand grocery market,go jek market share i...
Ride sharing apps in indonesia,on demand grocery market,go jek market share i...Ride sharing apps in indonesia,on demand grocery market,go jek market share i...
Ride sharing apps in indonesia,on demand grocery market,go jek market share i...
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...
Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...
Outbound money transfer in uae,sharaf exchange remittance in uae,trriple mone...
 
Money transfer uae,mobile wallets users uae,exchange house money transfer in ...
Money transfer uae,mobile wallets users uae,exchange house money transfer in ...Money transfer uae,mobile wallets users uae,exchange house money transfer in ...
Money transfer uae,mobile wallets users uae,exchange house money transfer in ...
 
Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...
Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...
Money transfer uae,mobile wallets users uae,dubai abu dhabi remittance,outbou...
 
India land leveler market,india power weeder industry,india cono weeder marke...
India land leveler market,india power weeder industry,india cono weeder marke...India land leveler market,india power weeder industry,india cono weeder marke...
India land leveler market,india power weeder industry,india cono weeder marke...
 
Private hospitals in the philippines,philippines hospital industry,maternity ...
Private hospitals in the philippines,philippines hospital industry,maternity ...Private hospitals in the philippines,philippines hospital industry,maternity ...
Private hospitals in the philippines,philippines hospital industry,maternity ...
 

Recently uploaded

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Call Girls In Mukherjee Nagar đŸ“± 9999965857 đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar đŸ“±  9999965857  đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar đŸ“±  9999965857  đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar đŸ“± 9999965857 đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Middle East Cyber Security Market Outlook to 2022

  • 1. Your Search Ends with Our Research September, 2018 Middle East Cyber Security Market Outlook to 2022 By Region (North, Central, West, East and South) and By Type of Solution (Firewall, Intrusion Detection System, Antivirus, Identity and Access Management, Encryption, Data Loss Prevention, Unidentified Threat Management, Disaster Recovery)
  • 2. 2 1. Executive Summary 2. Research 2. 1 Market Definitions 2.2 Abbreviations 2.4 Market Sizing, Limitation and Services– Cyber Security Market 2.5 Variables (Dependent and Independent) 2.6 Middle East Cyber Security Market Correlation Matrix 2.7 Middle East Cyber Security Market Regression Matrix 3. Middle East Cyber Security Market Value Chain 4. Road Map for Implementing Cyber Security in Middle East 5. Middle East Cyber Security Market 5.1 Market Overview 5.2 Recent Developments 5.3 Major Cyber Attacks in Middle East 5.4 Motives of Cyber Attacks in Middle East 5.5 Types of Cyber Attacks in Middle East 5.6 Global Snapshot of Cost Incurred Due to Data Breaches 5.7 Type of Cost Incurred due to Cyber Threats 5.8 Middle East Cyber Security Market- Common Practices 6. Market Size 6.1 Middle East Cyber Security Market Size by Revenue, 2012-17 6.2 Middle East Cyber Security Market Segmentation by Type of Solution, 2017 6.3 Middle East Cyber Security Market Segmentation by End User, 2017 6.4 Middle East Cyber Security Market Segmentation by Type of Security, 2017 6.5 Middle East Cyber Security Market Segmentation by Region, 2017 7. Competition 7.1 Middle East Cyber Security Developers 7.2 Middle East Cyber Security Market- Parameters of Competition for Developers 7.3 Company Profile of Fire Eye 7.4 Company Profile of IBM 7.5 Company Profile of Splunk 7.6 Company Profile of Four Scout Table of Contents (1/2)
  • 3. 3 7.7 Symantec 7.8 Parameters of Competition for System Integrators 7.9 Etisalat 7.10 ISYX 7.11 BIOS 7.12 DU 7.13 Starlink 8. Industry Analysis 8.1 Technology Used 8.2 Trends 8.3 Security Trend Matrix 8.4 Challenges 8.5 Growth Drivers 8.6 Restraints 8.7 Vendor Selection Process 8.8 Government Regulations 8.9 SWOT Analysis 8.10 Porter Five Forces Analysis 9. Future Outlook, 2017-2022 9.1 Middle East Cyber Security Market Future Outlook, 2017-2022 9.1.1 By Type of Solution, 2017-2022 9.1.2 By Type of Security, 2017-2022 9.1.3 By Type of End User, 2017-2022 9.1.4 By Region, 2017-2022 10. Analyst Recommendations Disclaimer Contact Us Table of Contents (2/2)
  • 4. © This is a licensed product of Ken Research and should not be copied List of Figures (1/2) 4 Figure 1.1: Middle East Cyber Security Market by Revenue, 2012-2022 Figure 1.2: Middle East Cyber Security Market by Regions by Revenue, 2017 and 2022 Figure 3.1: Value Chain Of Cyber Security Industry in Middle East Figure 5.1: Effect of Security Breach on Physical and Virtual Infrastructure Figure 5-2: Intrusion Triangle Showcasing Key Issues behind a Cyber Attack Figure 5.3 Global Average Cost Incurred per Cyber Crime, 2013-17 Figure 6.1: Middle East Cyber Market Size by Revenue in USD Billion, 2012-2017 Figure 6.2:Middle East Cyber Security Market Segmentation in Percentage by Type of Solution, 2017 Figure 6.3: Middle East Cyber Security Segmentation by End User, 2017 Figure 6.4: Segmentation of Middle East Security Market by Type of Security Figure 6.5: Share of Region in Middle East Cyber Security Market, 2017 Figure 7.1: Fire Eye Revenue in USD Million from Global Business, 2013-17 Figure 7.2: Share of Revenue in Fire Eye Revenue, 2017 Figure 7.3: Revenue in USD Million from EMEA Region (Excluding OEM), 2012-17 Figure 7.4: Splunk Global Revenue in USD Million, 2012-17 Figure 7.5: Four Scout Revenue from EMEA, 2015-17 Figure 7.6: Symantec Global Revenue Share of Consumer Security and Enterprise Security Figure 7.7: Symantec Revenue (in USD billion) from EMEA region, 2012-17 Figure 7.8: Share of Symantec Revenue from Total Revenue from Different Region, 2015-17 Figure 7.9: Du’s Annual Revenue in USD Billions from its Global Operations. Figure 8.1: Different Technological Trends and Their Effect on Major Sectors in Middle East Figure 9.1: Middle East Cyber security market by Revenue, 2017-22 Figure 9.2: Middle East Cyber Security market Share, by Solution, 2017-22 Figure 9.3: Middle East Cyber Security Market Share, by Type of End User, 2017-22 Figure 9.4: Share of Cyber Security Market in Middle East by Region, 2017-22
  • 5. © This is a licensed product of Ken Research and should not be copied List of Tables (1/3) 5 Table 1.1: Major Cyber security Developers and System Integrators in Middle East, 2017 Table 2.1: Correlation Matrix for Middle East Cyber Security Market Table 2.2: Regression Coefficient Output for Middle East Cyber Security Market Table3.1 : Members of Middle East Cyber Security Market Value Chain Table 5.1: Major Cyber Attacks in Middle East Region Table 5.2: Types of Cyber Attacks Faced by Organizations, Their Motives and Threats Offered by Them Table 6.1: Middle East Cyber Security Market Segmentation by Type of Solution in Revenue in USD Million, 2017 Table 6.2: Middle East Cyber Security Market Segmentation by Revenue by End Users, 2017 Table 6.3: Middle East Cyber Security Market Segmentation by Revenue by Type of Security, 2017 Table 6.4: Revenue Generated from Cyber Security in Different Regions, 2017 Table 7.1: Parameters of Competition in Middle East Cyber Security Market Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing, Global Presence, Technological Partners, Major Projects Table 7.3: Fire Eye R&D Expense from 2015-2017 Figure 7.4: Revenue Generated in USD Million from EMEA Region, 2015-17 Table 7.5: IBM ‘s Global Presence and Key Sectors Served Table 7.6: Company Profile of IBM Including Company Overview, Business Strategy, USP, Number of Employees, Marketing, Product portfolio, Services Offered Table 7.7: Major Resellers of Spunk in Middle East, 2012-17 Table 7.8: Company Profile of Spunk Including Company Overview, Business Strategy, USP, Number of Employees, Product Portfolio, Services Offered, Major Projects. Table 7.9: Four Scout Global Presence and Key Sectors Served Table 7.10: Company Profile of Four Scout Including Company Overview, Business Strategy, USP, Product Portfolio, Number of Employees, Major Projects, Solutions Offered Table 7.11: Company Profile of Symantec including Company Overview, Business Strategy, USP, Product Portfolio
  • 6. © This is a licensed product of Ken Research and should not be copied List of Tables (2/3) 6 Table 7.12: Symantec Revenue from Different Segments in USD Billions, 2015-17 Table 7.13: Symantec Global Revenue in USD Million from Different Sectors in USD Million, 2015-17 Table 7.14: Parameters of Competition of Major System Integrators in Middle East Cyber Security Market Table 7.15: Company Profile including Company Overview, Business Strategy, USP and Product Portfolio Table 7.16: Company Profile Of ISYX Including Company Overview, Business Strategy, Global Presence, USP, Number Of Employees And Product Portfolio. Table 7.17: Company Profile of BIOS including Company Overview, Product Feature, USP, Number Of Employees, Services Offered, Recent Developments Table 7.18: Future Strategic Priorities of DU, 2018-22 Table 7.19: Company Profile of DU including Company overview, Business Strategy, Key Achievements, Product Portfolio. Table 7.20: Company Profile of Starlink including Company overview, Business Strategy, Technological Vendors, Number of Employees Table 8.1: Major Technologies Used in Cyber Security along with Proprietor and Key Features Table 8.2: List of Major Smart City Projects in Middle East Table 8.3: Internet Penetration in Percentage in Arab Countries Table 8.4: Security Requirements, Challenges and Benefit of using Cloud Computing Table 9.1: Middle East Cyber Security Market CAGR by Type of Solution, 2017-22 Table 9.2: Middle East Cyber Security Market Segmentation by Revenue in USD billion by Solution, 2017-22 Table 9.3: Middle East Cyber Security Market Share, by Type of Security, 2017-22 Table 9.4: Middle East Cyber Security Market Revenue in USD Billion by Type of Security, 2017-22 Table 9.5: Middle East Cyber Security Market, CAGR 2017-22, by Type of Security Table 9.6: Middle East Cyber Security Market, Revenue in USD Billion, by Type of End User, 2017-22 Table 9.7: Middle East Cyber Security Market, CAGR, by Type of End User, 2017-22 Table 9.8: Market in USD Billion of Cyber Security in Middle East by Region, 2017-22 Table 9.9: Middle East Cyber Security Market CAGR (2017-22) by Region.
  • 7. © This is a licensed product of Ken Research and should not be copied Erratic Pricing OTC drugs allowed to advertise 7 0.0 5.0 10.0 15.0 20.0 25.0 2012 2017 2022 USDBillion Figure 1.1: Middle East Cyber Security Market by Revenue, 2012-2022 1 2 3 4 5 CAGR (2012-17): ~% CAGR (2017-2022): ~% Market is dominated by ~ big players. Some regional players enjoy large share in their respective market. More than ~ system integrators out of which ~ provide service in more than one country. Technology, Financial backing, Price, Relationship. Growing Stage Cyber threats has risen considerably prompting enterprises to take cyber security seriously. Developers are integrating technologies such as cloud, AI etc in order to make their products resilience against the ever evolving landscape. Figure 1.2: Middle East Cyber Security Market by Regions by Revenue, 2017 and 2022 1.1 Middle Cyber Security Market Executive Summary Table 1.1: Major Cyber security Developers and System Integrators in Middle East, 2017 Developers System Integrators IBM Etisalat Fire Eye DU Trend Micro Starlink Splunk BIOS Symantec ISYX Region 2017 2022 Central Region ~% ~% Western region ~% ~% Southern Region ~% ~% East Region ~% ~% Northern Region ~% ~%
  • 8. © This is a licensed product of Ken Research and should not be copied Erratic Pricing OTC drugs allowed to advertise 8 Middle Cyber Security Market: The cyber security market includes revenue from spending on hardware, software and consulting services for installation of these services for prevention of any kind of cyber threats by various solutions including firewall, intrusion detection system, antivirus, identity & access management, encryption and others. Only spending on Domestic Commercial, Retail, BFSI, Government, Residential, Energy & power and Healthcare sector has been accounted while collating the market size. Spending on army and defense has not been considered while cumulating the market revenues. The Middle East cyber security market is segmented using following criteria: Type of Solution: Firewall, Intrusion Detection System (IDS/IPS), Antivirus/Antimalware, Identity and Access Management (IAM), Encryption, Data Loss Prevention (DLP), Unidentified Threat Management (UTM), Disaster Recovery. Type of Security: Network Security, Wireless Security, End-Point Security, Application Security, Content Security, Cloud Security. Type of End User: Banking & Finance Government IT & Telecom Energy & Power Healthcare Retail Others Middle East is segmented into following regions. Central Region: Saudi Arabia, Iraq, Jordan Northern Region: Turkey, Syria, Cyprus Western region: Lebanon, Israel, Egypt, State of Palestine Southern Region: Oman, UAE, Yemen Eastern Region: Bahrain, Kuwait, Qatar, Iran 2. 1 Research Methodology - Market Definitions
  • 9. © This is a licensed product of Ken Research and should not be copied Erratic Pricing OTC drugs allowed to advertise 9 AI: Artificial Intelligence CAGR: Compounded Annual Growth Rate CCTV: Closed Circuit Television COTS: Commercial Off The Shelf DDOS: Distributed Denial Of Service FY: Financial Year GCC: Gulf Cooperation Council IoT: Internet of things IP: Internet Protocol KD: Kuwait Dirham KSA: Kingdom of Saudi Arabia LAN: Local area Network LLC: Limited Liability Company MoU: Memorandum of Understanding NVR: Network Video Recorder OPEC: Oil Producing and Exporting Countries PoE: Power of Ethernet PTZ: Pan Tilt Zoom QNB: Qatar National Bank R&D: Research and Development SSS: Specialized Security System UAE: United Arab Emirates USD: United States Dollar USP: Unique Selling Proposition. WAN: Wide Area Network 2.2 Research Methodology - Abbreviations
  • 10. © This is a licensed product of Ken Research and should not be copied Erratic Pricing OTC drugs allowed to advertise 10 Hypothesis Creation: The research team has first framed a hypothesis about the market through analysis of existing industry factors obtained from magazines, journals, broker reports, investor presentations and annual reports of major companies, Ministry of Interiors and Others. Hypothesis Testing: The research team conducted computer assisted telephonic interview (CATI) with several industry professionals including decision makers in Developers and System Integrating companies. The industry professionals included several management executives, and other higher level authorities. Structured interviews were conducted through telecom with several industry veterans including major decision makers from Etisalat, DU, G4S and other companies. The analyst at Ken Research collated their insights on the market onboard and to seek justification to the hypothesis framed by the team. Sanity Checking @ Decision Tree Analysis: Data has been collected and verified through cross-sanity checking the opinion and facts received from interview with the hypotheses framed from public databases. The team has verified the data by conducting both bottom-to-top and top-to-bottom analysis. Future Forecasting via Poll Opinions and Statistical Tools: Multi-Factor regression was conducted on the lag variables by identifying the independent and quantifiable variables directly affecting the market. The forecasting was done by using SPSS statistical tools. The variables were checked for multi-co- linearity and other bias that could be present in the model. The conclusion from the regression was then double-checked by conducting poll opinions. Interpretation and Proofreading: The final analysis will then be interpreted in the research report by our expert team well versed with the Cyber Security Industry. 2.3 Research Methodology - Consolidated Research Approach
  • 11. © This is a licensed product of Ken Research and should not be copied Erratic Pricing OTC drugs allowed to advertise 11 Market Sizing:  Initially, we identified all major developers and system integrators operating in the market. We then collated the revenue for current year. This helped us in sanity checking the current market size provided by industry veterans.  We also collated the information for entire cyber security industry size including segmentation, type of solution, type of security, type of end user, regions and then interviewed industry professionals to seek their expert opinion on contribution of these segments to the overall market.  We have conducted multiple CATIs with industry experts and management of leading developers and system integrators to understand the market size, relationship building process, customer acquisition, and their views on future development. This helped us in estimating revenue generated for the overall market and validating the future growth in the market Limitation:  The projects required for army and defense work was not included while calculating the market size for cyber security market. Confidentiality of data, due to national security concerns was the major reason behind lack of access to data.  Primaries may have been bullish with certain data points but we, Analysts at Ken Research, have verified the data points with other bottom up approach and through various secondary databases. Middle East Cyber Security Market :  Products: Firewall, Intrusion Detection System (IDS/IPS), Antivirus/Antimalware, Identity and Access Management (IAM), Encryption, Data Loss Prevention (DLP), Unidentified Threat Management (UTM), Disaster Recovery.  Services: Risk assessment, data centres, consulting, security and threat intelligence, file integrity monitoring. User and Entity analytics. 2.4 Research Methodology - Market Sizing, Limitation and Services– Cyber Security Market
  • 12. © This is a licensed product of Ken Research and should not be copied Erratic Pricing OTC drugs allowed to advertise 12 Variables Considered:  Contribution of Financial Sector to the Real GDP (UAE): Financial sector represent the biggest end user of cyber security products and as the financial sector will grow the investments made in the cyber security market will also increase.  UAE Industrial Sector Contribution to GDP: Industrial sector contributes 15% of the investments made in cyber security market in Middle East. The growth in the sector’s contribution to GDP will increase the expenditure made by industrial sector in cyber security.  UAE IT Industry size: IT industry contributes to one-fifth of the cyber security market. Increase in IT industry size will result in increase in IT infrastructure in the sector which will require additional cyber security to ensure safety of those infrastructure. Forecast Modelling:  The report applies Correlation and Regression analysis methods to forecast the future of the cyber security market. The capabilities of SPSS and predictive analytics software have been leveraged to determine the relevant indicators used for forecasting this industry.  In the present case, cyber security market revenue has been taken as the dependent variable and other variables such as contribution of financial sector to the real GDP, UAE industrial sector contribution to GDP, UAE IT industry size have been taken as independent variables. 2.5 Research Methodology - Variables (Dependent and Independent)
  • 13. © This is a licensed product of Ken Research and should not be copied 13 Increasing Cyber Threat oThe number of virus-infected computers in the Middle East is more than four times the global average oCyber crimes in UAE increased by ~% between 2013 and 2015. oThe average total organizational cost lost due to data breaches in Middle East was USD ~ million in 2017. oA total of ~ cyber attacks forayed against government, semi-government and private sector entities in UAE alone from January to October 2017. (Source: Telecommunication Authority of UAE) oCompanies in Middle East have highest per capita direct cost globally, these cost involve direct expense outlay to accomplish a given activity such as engaging forensic experts, hiring a law firm or offering victims identity protection services. Recurring Events oIn Middle East, post data breach response expenditure made by organizations in 2017 was estimated to be USD ~ million. These activities includes desk activities, inbound communications, special investigative activities, remediation, legal expenditures, product discounts, identity protection services and regulatory interventions.(Source: Ponemon Institute, Research Report) oAccording to Telecommunication authority, in January 2017, there were ~ attacks on the UAE government websites. oIn 2014 UAE government established its first cyber security centre in Dubai in order to protect the government information system as well as the telecommunication network from the threat of cyber attacks oThe UAE region holds ~ spot globally in terms of region susceptible to cyber attacks. Formulation of cyber security policies has made the country ~ most secure region worldwide. oCyber attacks on state owned companies like Saudi Aramco, Qatar National Bank were aimed at destabilizing the country’s economy. Hence, after these attacks the government have taken the issue very seriously. Government Focus 5.1 Middle East Cyber Security Market Overview oThe market is dominated by US based developers such as IBM, Fire eye etc although a lot of Israeli companies are entering the competitive landscape. A number of startups from Israel have surfaced after 2012 like Check point, Imperva, theta ray. In 2017 the Israeli cyber security sector solidified its position as a global player, raising USD ~ million in venture capital and private equity investment. Israel is an exception in Middle East , where regional developers are virtually non existent. Israel wins second- largest number of cyber security deals globally after U.S. Advantage Israel The system integrators present in the market are regional players with exception of a few like Etisalat, Bios etc. Political tension between various countries prohibit even the big companies to expand their business across the Middle East region.
  • 14. © This is a licensed product of Ken Research and should not be copied 5.3 Major Cyber Attacks in Middle East Affected Organization Country Year Industry Effects of Attack Saudi Aramco ~ ~ ~ ~ Qatar National Bank ~ ~ ~ ~ General Authority of Civil Aviation ~ ~ ~ ~ Etisalat ~ ~ ~ ~ 0% 20% 40% 60% 80% Loss of contracts / business opportunities Loss of credibility / damage to company reputation Damage to credit rating Increased insurance premiums Temporary loss of ability to trade Temporary loss of access to business critical information Percentage Affects Physical Infrastructure Affects Virtual Infrastructure Figure 5.1: Effect of Security Breach on Physical and Virtual Infrastructure Table 5.1: Major Cyber Attacks in Middle East Region Source: Gulf News Source: Kaspersky Report
  • 15. © This is a licensed product of Ken Research and should not be copied 5.5 Types of Cyber Attacks in Middle East 15 Malware In November 2017, a cyber attack using “Powershell” malware hit the Saudi government, aimed to disrupt the government computers. A new Advanced Persistent Threat (APT) was detected, which was targeting Saudi Arabia by infiltrating computers using email phishing techniques by the government’s National Cyber Security Centre. Skimmers are essentially malicious card readers that steal data off the ATM card’s magnetic stripe attached to the real payment terminals so that they can strip data from every person that swipes their cards. Crypto jacking This is the most recent type of threat in Middle East which aims at robbing digital wallets. It uses technologies such as block chain Attack on Saudi Aramco, by a virus Shamoon in 2012 was one of the most destructive cyber attack on private business ever. In January 2017, Shamoon 2, the improved version of Shamoon, attacked many organizations across KSA leaving at least three government agencies and four private sector companies offline for 48 hours. The virus disrupts computers by overwriting the master boot record, making it impossible for them to start up. Virus Ransom Ware Ransom ware represents one of the most dangerous threat to organizations and end-users. Ransom ware’s family continue to increase; authors will be more focused on mobile devices implementing new evasion techniques making these threats even more efficient and difficult to eradicate Skimmers
  • 16. © This is a licensed product of Ken Research and should not be copied 5.8 Middle East Cyber Security Market- Common Practices 16 Security Orchestration and Analytics End Point o End point patching and management. o Malware Protection. o End point detection and response. Mobile o Transaction Protection. o Device management . o Content Security. Network o Network forensics and threat Management. o Firewall o Network Visibility and segmentation. Advanced Fraud o Fraud protection. o Criminal Detection Identity and Access o Privileged User Management. o Mainframe security. o Identity Governance. Data o Data Protection. o Data Access Control. Apps o Application Scanning. o Application security Management Threat Intelligence o Indicators of Compromise. o Malware Analysis. o Threat Sharing.
  • 17. © This is a licensed product of Ken Research and should not be copied 6.1 Middle East Cyber Security Market Size by Revenue, 2012-17 0% 5% 10% 15% 20% 25% 0 2 4 6 8 10 2012 2013 2014 2015 2016 2017 Percentage USDBillion Market Size YOY growth rate 17 Figure 6.1: Middle East Cyber Market Size by Revenue in USD Billion, 2012-2017 Source: Interview with Dr. Udai Kumar Uprit, Digital Security Expert, Middle East As the company expands its business not only it requires cyber security arising out of increasing infrastructure but it also adds up to the level of security as the company becomes more vulnerable to cyber attacks. Various sectors such as automobile, healthcare are in their developing phase due to which demand of cyber security is rising. Diversification strategies implemented by OPEC nations have also resulted in expansion in number of companies coming in the region. In 2014, UAE national electronic security authority announced that cyber security one of the biggest economic and national security challenge that the country faces at present and asked public and private entities to adopt cyber security measures across their organization. There were few instances when some unidentified cyber groups attacked various petroleum, gas, and helium industries in U.A.E, Kingdom of Saudi Arabia and Qatar using a malware called Trojan. In 2015, first Middle East based cyber criminal group, with full-scale cyber-espionage operations, emerged called “Desert Falcons”. The group was started in 2011 but it was not until beginning of 2015 that the group became active. By February 2015, the group had more than ~ victims in ~ countries, majority of these victims were in Palestine.
  • 18. © This is a licensed product of Ken Research and should not be copied 6.3 Middle East Cyber Security Market Segmentation by End User, 2017 (1/4) 18 Figure 6.3: Middle East Cyber Security Segmentation by End User, 2017 Table 6.2: Middle East Cyber Security Market Segmentation by Revenue by End Users, 2017 Type of End User Expenses in USD Million Banking & Finance ~ Government ~ IT & Telecom ~ Energy & Power ~ Healthcare ~ Retail ~ Others ~ Total ~ o Saudi Vision 2030 aims to secure the kingdom from cyber crime in the near future. The government wants to develop a cyber security industry which would be technological leader in Middle East region. In order to accomplish this purpose the government has formed a new regulatory body, Authority of Cyber Security, in 2017. o After a lot of high profile cyber attacks in KSA, Saudi Arabia Monetary Authority (SAMA) framed a regulatory framework for the organizations coming under its jurisdiction. The framework defined principles and objectives for initiating, implementing, maintaining, monitoring and improving cyber security controls. The Framework is applicable to all Member Organizations regulated by SAMA, which include the following: 1. ~ 2. ~ 3. ~ 4. ~ 5. ~ o Government sectors are shifting to mobile based service resulting in demand for cyber security. Source: Mr. Anastasios Monachos, Security Resesearcher, Private Cyber Security Company Type of End User Market Share in Percentage Banking & Finance ~ Government ~ IT & Telecom ~ Energy & Power ~ Healthcare ~ Retail ~ Others ~
  • 19. © This is a licensed product of Ken Research and should not be copied 6.3 Middle East Cyber Security Market Segmentation by End User, 2017 (4/4) Healthcare is fifth biggest user of cyber security in Middle East countries. The growth in the sector has been due to : o Increase in number of managed and unmanaged devices on networks like mobile, laptops and others. o ~ o Data of patients, providers and the organization must be protected from loss and cyber incidents especially data that is subject to breach notification rules. o ~ o Increase in vendor-owned-and-managed systems on the networks have increased resulting in increase on vulnerability of the entire system. 19 Healthcare Sector Oil & Gas Sector In Middle East oil and gas industries have the biggest share in power and energy sector which comprises 15 % of the total demand of cyber security in the region. The demand is high because of following reasons. o ~ o Most of the oil and gas refineries in the region are state owned and are of national importance therefore it becomes profitable for foreign state backed hackers to disrupt their operations. o ~
  • 20. © This is a licensed product of Ken Research and should not be copied 7.1 Middle East Cyber Security Developers 20
  • 21. © This is a licensed product of Ken Research and should not be copied 7.2 Middle East Cyber Security Market- Parameters of Competition for Developers (1/2) 21 Parameters Description Integration o ~ Agility o ~ Financial Resource o ~ Effectiveness o ~ After Sales Service o ~ Table 7.1: Parameters of Competition in Middle East Cyber Security Market
  • 22. © This is a licensed product of Ken Research and should not be copied 7.3 Company Profile of Fire Eye (1/4) 22 Parameters Description Company Overview o ~ USP o ~ Business Strategy o ~ Number of Employees o ~ Year Expense in millions USD 2015 ~ 2016 ~ 2017 ~ Figure 7.1: Fire Eye Revenue in USD Million from Global Business, 2013-17 Table 7.3: Fire Eye R&D Expense from 2015-2017 Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing, Global Presence, Technological Partners, Major Projects Source: Annual report 0% 20% 40% 60% 80% 100% 120% 140% 160% 180% 0 100 200 300 400 500 600 700 800 2013 2014 2015 2016 Global Revenue YOY growth Rate
  • 23. © This is a licensed product of Ken Research and should not be copied 7.3 Company Profile of Fire Eye (2/4) 23 Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing, Global Presence, Technological Partners, Major Projects. Source: Annual report Type of Security Product Portfolio Description Threat Detection and Prevention ~ o ~ ~ o ~ ~ o ~ ~ o ~ ~ o ~ ~ o ~ Forensic and Investigation ~ o ~ ~ o ~ Security management and operations ~ o ~ ~ o ~ ~ o ~
  • 24. © This is a licensed product of Ken Research and should not be copied 8.1 Middle East Cyber Security Market- Technology Used (2/2) 24 There are two major technologies to defend against malware Signature based approach and behavior analysis. Most organizations rely on decade’s old signature- based methodology, some of the new versions of malicious code are not recognized by signature-based technologies, but hackers have become smarter and try to evade static signature detection techniques by coding the virus in such a way so that it can change it's signature The more advanced method of detecting malware via behavior analysis is gaining rapid traction. Although some banks in Middle East have adopted the technology but the technology is still unfamiliar. Signature-based Technology Behavior-based Technology Behavior based technology has following advantages from signature based technology: 1. ~ 2. ~ 3. ~ 4. ~
  • 25. © This is a licensed product of Ken Research and should not be copied 8.3 Security Trend Matrix 25 ~ ~ ~ ~ ~ ~ ~ ~ IoT Behavioral Analytics Governme nt Oil & Gas Telecomm unication Banking ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Cloud Incident Response Mobile Source: Starlink, Ken Research Analysis Fig 8.1: Different Technological Trends and Their Effect on Major Sectors in Middle East
  • 26. © This is a licensed product of Ken Research and should not be copied 9.1 Middle East Cyber Security Market Future Outlook, 2017-2022 26 0% 5% 10% 15% 20% 25% 30% 0 5 10 15 20 25 2017 2018 2019 2020 2021 2022 Percent BillionUSD Market Size YOY growth rate Etisalat, Singtel, Soft Bank and Telefonica will sign an agreement to create the first Global Telco Security Alliance to offer enterprises a comprehensive portfolio of cyber security services. The alliance will be the world’s biggest cyber security provider which will comprise a customer base of more than ~ billion customers in over ~ countries. The group has combined ~ world-class Security Operation Centres (SOCs) and employ more than ~cyber security experts globally. The group would look to enhance the technologies it uses by developing its capabilities in predictive analytics using machine learning and advanced cyber security using internet of things. Source: Interview with Dr. Udai Kumar Uprit, Digital Security Expert, Middle East Figure 9.1: Middle East Cyber security market by Revenue, 2017-22 More and more international companies are setting up offices in Middle East as regulations regarding foreign investments loosens up amid of oil price vulnerabilities. Rapid private- sector growth offers new investment opportunities in key sectors such as real estate, construction, tourism and manufacturing, but the sheer scale and pace of change means new security gaps are appearing at a dramatic rate. Various government across the Middle East are trying to come up with a cyber security strategy to make the organisations immune from growing threat of cyber attacks. Currently all the Middle East countries except Israel lack a substantial framework governing cyber security. This may have an effect on the market structure as more and more global players can be attracted to enter the market.
  • 27. © This is a licensed product of Ken Research and should not be copied 9.1.2 Middle East Cyber Security Market Future Outlook by Type of Security, 2017-2022 27 Type of Security 2017 2018 2019 2020 2021 2022 Network Security ~ ~ ~ ~ ~ ~ Wireless Security ~ ~ ~ ~ ~ ~ End-Point Security ~ ~ ~ ~ ~ ~ Application Security ~ ~ ~ ~ ~ ~ Content Security ~ ~ ~ ~ ~ ~ Cloud Security ~ ~ ~ ~ ~ ~ Total ~ ~ ~ ~ ~ ~ Table 9.3: Middle East Cyber Security Market Share by Type of Security in Percentage, 2017-22 Table 9.4: Middle East Cyber Security Market Revenue in USD Billion by Type of Security, 2017-22 Type of Security CAGR(%) Network Security ~ Wireless Security ~ End-Point Security ~ Application Security ~ Content Security ~ Cloud Security ~ Table 9.5: Middle East Cyber Security Market, CAGR 2017-22 by Type of Security Key Takeaways: o Network Security and Wireless Security will be the fastest growing sectors, both registering a 5 year CAGR of ~% between 2017 to 2022. o Network security will continue to constitute the lion share of the market as the demand will increase from ~USD billion in 2017 to ~ USD billion in 2022. o Cloud security will also cement its position in the market, registering a CAGR of ~ % between 2017-22. As more and more companies are moving to cloud based infrastructure. Source: Ken Research Analysis Type of Security 2017 2018 2019 2020 2021 2022 Network Security Wireless Security End-Point Security Application Security Content Security Cloud Security
  • 28. © This is a licensed product of Ken Research and should not be copied Disclaimer The research reports provided by Ken Research are for the personal information of the authorized recipient and is not for public distribution and should not be reproduced or redistributed without prior permission. None of this material may be used for any commercial or public use until unless authorized by Ken Research. The report will only be used as per the license rights authorized by Ken Research. The information provided in the research documents is from publicly available data and other sources, which are reliable. Efforts are made to try and ensure accuracy of data. With respect to documents available, neither the company nor any of its employees makes any warranty, express or implied, including the warranties of merchantability and fitness for a particular purpose, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use will not infringe privately owned rights. The report also includes analysis and views expressed by our research team. The research reports are purely for information purposes. The opinions expressed are our current opinions as of the date appearing in the material and may be subject to change from time to time without notice. Investors should not solely rely on the information contained in the research documents and must make investment decisions based on their own investment objectives, risk profile and financial position. The recipients of this material should take their own professional advice before acting on this information. Ken Research will not accept return of reports once dispatched due to the confidentiality of information provided in our reports. In case, a report qualify for return, we will issue a credit, minus shipping charges, of equal value to the original purchase price, toward a future purchase—no refunds. The decision about whether the product return can be accepted or not is solely at our discretion. Any dispute will be subject to laws of India and exclusive jurisdiction of Indian Courts. No part of this manual or any material appearing may be reproduced, stored in or transmitted in any other format without written permission of Ken Research. This is purely for the reference of the concerned entity. 28
  • 29. © This is a licensed product of Ken Research and should not be copied 29 Unit 14, Tower B3, Spaze I Tech Business Park, Sohna Road, Sector 49, Gurgaon, Haryana - 122001 New Delhi, India Office: +91 9311149880 Web: www.kenresearch.com Email: namit@kenresearch.com Contact Us Contact Us

Editor's Notes

  1. Explain in more detail Explain margin of error in last bullet