Blueweave
China Phishing Protection Market

China Phishing Protection Market

SPECIAL OFFER : 25% Super Discount For All !

China Phishing Protection Market, By Type (Email based Phishing, Non Email based Phishing), By Application (BFSI, Education, Government, Healthcare, IT, Telecommunication, Transportation, Retail), Trend Analysis, Competitive Market Share & Forecast, 2020-2027

  • Published Date: November 2021
  • Report ID: BWC20250
  • Available Format: PDF
  • Page: 117
  1. Research Framework
    1. Research Objective
    2. Product Overview
    3. Key Market Segments
  2. Research Methodology
    1. Qualitative Research
    2. Methodology
    3. Regional Split of Primary & Secondary Research
    4. Secondary Research
    5. Primary Research
      1. Breakdown of Primary Research Respondents, By Region
      2. Breakdown of Primary Research Respondents, By Industry Participants
    6. Market Size Estimation
    7. Assumptions for the Study
    8. Market Breakdown & Data Triangulation
  3. Executive Summary
  4. Industry Insight and Growth Strategy
    1. Value Chain Analysis
    2. DROC Analysis
      1. Market Drivers
        1. Increasing Cases of Phishing Attacks
        2. Rapid Digitization Across Various Industry Verticals
      2. Market Restraints
        1. Absence of Skilled IT Experts and Understanding of Cyber Threats and Terrorism
      3. Market Challenges
        1. Limited Current IT Infrastructure of the Country
      4. Market Opportunity
        1. Rapid Growth in Chinese Economy
        2. Development in IT Infrastructure
    3. Recent Developments
    4. Porter’s Five Forces Analysis
      1. Bargaining Power of Buyers
      2. Bargaining Power of Suppliers
      3. Intensity of Rivalry
      4. Threat of New Entrants
      5. Threat of Substitutes
  5. China Phishing Protection Market Overview
    1. Market Size & Forecast by Value, 2017-2027
    2. Market Size and Forecast, By Segment
      1. By Type
        1. Email based Phishing
        2. Non-Email based Phishing
      2. By Application
        1. BFSI
        2. Education
        3. Government
        4. Healthcare
        5. IT and Telecom
        6. Transportation
        7. Retail
        8. Others
  6. Competitive Landscape
    1. List of Key Players and Their Offerings
    2. Market Share Analysis (2020)
    3. Competitive Benchmarking by Operating Parameters
  7. Impact of COVID-19 on China Phishing Protection Market
  8. Company Profiles (Company Overview, Financial Matrix, Key Product landscape, Key Personnel, Key Competitors, Contact Address, and Strategic Outlook) *
    1. BAE Systems
    2. Cisco Systems Inc.
    3. FireEye Inc.
    4. GreatHorn Inc.
    5. Intel Corporation
    6. Microsoft Corporation
    7. Mimecast Ltd.
    8. Phishlabs
    9. Proofpoint Inc.
    10. Symantec Corporation
    11. Other Prominent Players
  9. Key Strategic Recommendations

 

List of Figures

 

Figure 1: China Phishing Protection Market Segmentation

 

Figure 2: China Phishing Protection Market Value Chain Analysis,

 

Figure 3: Company Market Share Analysis, 2020

 

Figure 4: China Phishing Protection Market Size, By Value (USD Billion), 2017-2027

 

Figure 5: China Phishing Protection Market Share (%), By Type, By Value, 2017-2027

 

Figure 6: China Phishing Protection Market Share (%), By Application, By Value, 2017-2027

 

List of Tables

 

Table 1: China Phishing Protection Market Size, By Type, By Value, 2017-2027

Table 2: China Phishing Protection Market Size, By Application, By Value (USD Billion), 2017-2027

Table 3: BAE Systems Financial Analysis

Table 4: BAE Systems Business Overview

Table 5: Cisco Systems Inc. Financial Analysis

Table 6: Cisco Systems Inc. Business Overview

Table 7: FireEye Inc. Financial Analysis

Table 8: FireEye Inc. Business Overview

Table 9: GreatHorn Inc. Financial Analysis

Table 10: GreatHorn Inc. Business Overview

Table 11: Intel Corporation Financial Analysis

Table 12: Intel Corporation Business Overview

Table 13: Microsoft Corporation Financial Analysis

Table 14: Microsoft Corporation Business Overview

Table 15: Mimecast Ltd. Financial Analysis

Table 16: Mimecast Ltd. Business Overview

Table 17: Phishlabs Financial Analysis

Table 18: Phishlabs Business Overview

Table 19: Proofpoint Inc. Financial Analysis

Table 20: Proofpoint Inc. Business Overview

Table 21: Symantec Corporation Financial Analysis

Table 22: Symantec Corporation Business Overview