01. Executive Summary
02. Scope of the Report
02.1 Market Overview
02.2 Product Offerings
03. Market Research Methodology
03.1 Market Research Process
03.2 Research Design
03.3 Research Methodology
04. List of Abbreviations
05. Introduction
06. Market Description
06.1 WAF Architecture
06.2 Features of WAF
06.3 Benefits of WAF
06.4 Types of Attack
06.4.1 SQL Injection
06.4.2 Cross Site Scripting
06.4.3 Remote File Inclusion
06.4.4 Local File Inclusion
06.4.5 Directory Traversal
06.4.6 Business Logic Attacks
06.5 Source Country of Attacks
06.6 Implementation of WAF
06.6.1 Cloud-based
06.6.2 On-premise
07. Market Landscape
07.1 Market Overview
07.1.1 Product Lifecycle of WAF
07.2 Market Size and Forecast
07.3 Types of Web Application Attack
07.4 Five Forces Analysis
08. End-user Segmentation
08.1 Global WAF Market by End-user Segmentation 2012-2016
08.2 Global WAF Market in the BFSI Sector
08.2.1 Market Size and Forecast
08.3 Global WAF Market in the E-commerce Sector
08.3.1 Market Size and Forecast
08.4 Global WAF Market in the Government Sector
08.4.1 Market Size and Forecast
09. Geographical Segmentation
09.1 Global WAF Market by Geographical Segmentation 2012-2016
09.2 WAF Market in the Americas
09.2.1 Market Size and Forecast
09.3 WAF Market in the EMEA Region
09.3.1 Market Size and Forecast
09.4 WAF Market in the APAC Region
09.4.1 Market Size and Forecast
10. Key Leading Countries for Origin of Attacks
10.1 USA
10.2 France
10.3 Germany
10.4 Canada
10.5 Italy
10.6 China
10.7 Russia Federation
10.8 United Kingdom
10.9 Netherlands
11. Buying Criteria
12. Market Growth Drivers
13. Drivers and their Impact
14. Market Challenges
15. Impact of Drivers and Challenges
16. Market Trends
17. Trends and their Impact
18. Vendor Landscape
18.1 Competitive Scenario
18.1.1 Key News
18.2 Market Share Analysis 2012
18.3 Other Prominent Vendors
19. Key Vendor Analysis
19.1 Cisco Systems Inc.
19.1.1 Business Overview
19.1.2 Business Segmentation
19.1.3 SWOT Analysis
19.2 Citrix Systems Inc.
19.2.1 Business Overview
19.2.2 Business Segmentation
19.2.3 SWOT Analysis
19.3 F5 Networks Inc.
19.3.1 Business Overview
19.3.2 Business Segmentation
19.3.3 SWOT Analysis
19.4 Fortinet Inc.
19.4.1 Business Overview
19.4.2 Business Segmentation
19.4.3 SWOT Analysis
19.5 Imperva Inc.
19.5.1 Business Overview
19.5.2 Business Segmentation
19.5.3 SWOT Analysis
19.6 Juniper Networks Inc.
19.6.1 Business Overview
19.6.2 Business Segmentation
19.6.3 SWOT Analysis
19.7 Palo Alto Networks Inc.
19.7.1 Business Overview
19.7.2 Business Segmentation
19.7.3 SWOT Analysis
20. Other Reports in this Series
List of Exhibits
Exhibit 1: Market Research Methodology
Exhibit 2: Web Application Firewall Architecture
Exhibit 3: Source Countries of Attacks
Exhibit 4: Implementation of WAF
Exhibit 5: Product Lifecycle of WAF
Exhibit 6: Global WAF Market 2012-2016 (US$ million)
Exhibit 7: Global WAF Market by Types of Web Application Attacks 2012
Exhibit 8: Global WAF Market by End-user Segmentation 2012
Exhibit 9: Global WAF Market by End-user Segmentation 2012-2016
Exhibit 10: Global WAF Market in the BFSI Sector 2012-2016 (US$ million)
Exhibit 11: Global WAF Market in the E-commerce Sector 2012-2016 (US$ million)
Exhibit 12: Global WAF Market in the Government Sector 2012-2016 (US$ million)
Exhibit 13: Global WAF Market by Geographical Segmentation 2012
Exhibit 14: Global WAF Market by Geographical Segmentation 2012-2016
Exhibit 15: WAF Market in the Americas 2012-2016 (US$ million)
Exhibit 16: WAF Market in the EMEA Region 2012-2016 (US$ million)
Exhibit 18: Web Application Firewall Market in the APAC Region 2012-2016 (US$ million)
Exhibit 19: Leading Countries for the Origin of Attacks (units in thousands)
Exhibit 20: Global Web Application Firewall Market by Classification of Vendors
Exhibit 21: Business Segmentation of Cisco Systems Inc.
Exhibit 22: Business Segmentation of Citrix Systems Inc.
Exhibit 23: Business Segmentation of F5 Networks Inc.
Exhibit 24: Business Segmentation of Fortinet Inc.
Exhibit 25: Business Segmentation of Imperva Inc.
Exhibit 26: Business Segmentation of Juniper Networks Inc.
Exhibit 27: Business Segmentation of Palo Alto Networks Inc.
【掲載企業】
Cisco Systems Inc., Citrix Systems Inc, F5 Networks Inc., Fortinet Inc., Imperva Inc., Juniper Networks Inc., Palo Alto Networks Inc., Applicure Technologies Ltd., Art of defence GmbH, Armorize Technologies Inc., Akamai Technologies Inc., Barracuda Networks Inc., Bee-Ware SA, Check Point Software Technologies Ltd., Radware Ltd., IBM Corp., McAfee Inc., Microsoft Corp., Protegrity USA Inc., Dell SonicWALL, and Trustwave Holdings Inc.
【調査方法】
一次資料による調査(業界専門家、ベンダー、代理店、顧客等を対象にしたデプスインタビュー調査など)及び二次資料による調査(Technavio独自のプラットフォーム、産業書籍、企業報告書、ニュース記事、アナリストレポート、貿易協会、政府機関発行データなど)