Global Data-Centric Security Market Size, Status and Forecast 2020-2026

SKU ID :QYR-15402525 | Published Date: 02-Mar-2020 | No. of pages: 99
Table of Contents 1 Report Overview 1.1 Study Scope 1.2 Key Market Segments 1.3 Players Covered: Ranking by Data-Centric Security Revenue 1.4 Market Analysis by Type 1.4.1 Global Data-Centric Security Market Size Growth Rate by Type: 2020 VS 2026 1.4.2 Professional 1.4.3 Managed 1.5 Market by Application 1.5.1 Global Data-Centric Security Market Share by Application: 2020 VS 2026 1.5.2 BFSI 1.5.3 IT and Telecommunications 1.5.4 Retail 1.5.5 Government and Public Sector 1.5.6 Healthcare 1.5.7 Others 1.6 Study Objectives 1.7 Years Considered 2 Global Growth Trends by Regions 2.1 Data-Centric Security Market Perspective (2015-2026) 2.2 Data-Centric Security Growth Trends by Regions 2.2.1 Data-Centric Security Market Size by Regions: 2015 VS 2020 VS 2026 2.2.2 Data-Centric Security Historic Market Share by Regions (2015-2020) 2.2.3 Data-Centric Security Forecasted Market Size by Regions (2021-2026) 2.3 Industry Trends and Growth Strategy 2.3.1 Market Top Trends 2.3.2 Market Drivers 2.3.3 Market Challenges 2.3.4 Porter’s Five Forces Analysis 2.3.5 Data-Centric Security Market Growth Strategy 2.3.6 Primary Interviews with Key Data-Centric Security Players (Opinion Leaders) 3 Competition Landscape by Key Players 3.1 Global Top Data-Centric Security Players by Market Size 3.1.1 Global Top Data-Centric Security Players by Revenue (2015-2020) 3.1.2 Global Data-Centric Security Revenue Market Share by Players (2015-2020) 3.1.3 Global Data-Centric Security Market Share by Company Type (Tier 1, Tier 2 and Tier 3) 3.2 Global Data-Centric Security Market Concentration Ratio 3.2.1 Global Data-Centric Security Market Concentration Ratio (CR5 and HHI) 3.2.2 Global Top 10 and Top 5 Companies by Data-Centric Security Revenue in 2019 3.3 Data-Centric Security Key Players Head office and Area Served 3.4 Key Players Data-Centric Security Product Solution and Service 3.5 Date of Enter into Data-Centric Security Market 3.6 Mergers & Acquisitions, Expansion Plans 4 Breakdown Data by Type (2015-2026) 4.1 Global Data-Centric Security Historic Market Size by Type (2015-2020) 4.2 Global Data-Centric Security Forecasted Market Size by Type (2021-2026) 5 Data-Centric Security Breakdown Data by Application (2015-2026) 5.1 Global Data-Centric Security Market Size by Application (2015-2020) 5.2 Global Data-Centric Security Forecasted Market Size by Application (2021-2026) 6 North America 6.1 North America Data-Centric Security Market Size (2015-2020) 6.2 Data-Centric Security Key Players in North America (2019-2020) 6.3 North America Data-Centric Security Market Size by Type (2015-2020) 6.4 North America Data-Centric Security Market Size by Application (2015-2020) 7 Europe 7.1 Europe Data-Centric Security Market Size (2015-2020) 7.2 Data-Centric Security Key Players in Europe (2019-2020) 7.3 Europe Data-Centric Security Market Size by Type (2015-2020) 7.4 Europe Data-Centric Security Market Size by Application (2015-2020) 8 China 8.1 China Data-Centric Security Market Size (2015-2020) 8.2 Data-Centric Security Key Players in China (2019-2020) 8.3 China Data-Centric Security Market Size by Type (2015-2020) 8.4 China Data-Centric Security Market Size by Application (2015-2020) 9 Japan 9.1 Japan Data-Centric Security Market Size (2015-2020) 9.2 Data-Centric Security Key Players in Japan (2019-2020) 9.3 Japan Data-Centric Security Market Size by Type (2015-2020) 9.4 Japan Data-Centric Security Market Size by Application (2015-2020) 10 Southeast Asia 10.1 Southeast Asia Data-Centric Security Market Size (2015-2020) 10.2 Data-Centric Security Key Players in Southeast Asia (2019-2020) 10.3 Southeast Asia Data-Centric Security Market Size by Type (2015-2020) 10.4 Southeast Asia Data-Centric Security Market Size by Application (2015-2020) 11 India 11.1 India Data-Centric Security Market Size (2015-2020) 11.2 Data-Centric Security Key Players in India (2019-2020) 11.3 India Data-Centric Security Market Size by Type (2015-2020) 11.4 India Data-Centric Security Market Size by Application (2015-2020) 12 Central & South America 12.1 Central & South America Data-Centric Security Market Size (2015-2020) 12.2 Data-Centric Security Key Players in Central & South America (2019-2020) 12.3 Central & South America Data-Centric Security Market Size by Type (2015-2020) 12.4 Central & South America Data-Centric Security Market Size by Application (2015-2020) 13 Key Players Profiles 13.1 IBM (US) 13.1.1 IBM (US) Company Details 13.1.2 IBM (US) Business Overview and Its Total Revenue 13.1.3 IBM (US) Data-Centric Security Introduction 13.1.4 IBM (US) Revenue in Data-Centric Security Business (2015-2020)) 13.1.5 IBM (US) Recent Development 13.2 Imperva (US) 13.2.1 Imperva (US) Company Details 13.2.2 Imperva (US) Business Overview and Its Total Revenue 13.2.3 Imperva (US) Data-Centric Security Introduction 13.2.4 Imperva (US) Revenue in Data-Centric Security Business (2015-2020) 13.2.5 Imperva (US) Recent Development 13.3 Informatica (US) 13.3.1 Informatica (US) Company Details 13.3.2 Informatica (US) Business Overview and Its Total Revenue 13.3.3 Informatica (US) Data-Centric Security Introduction 13.3.4 Informatica (US) Revenue in Data-Centric Security Business (2015-2020) 13.3.5 Informatica (US) Recent Development 13.4 Oracle (US) 13.4.1 Oracle (US) Company Details 13.4.2 Oracle (US) Business Overview and Its Total Revenue 13.4.3 Oracle (US) Data-Centric Security Introduction 13.4.4 Oracle (US) Revenue in Data-Centric Security Business (2015-2020) 13.4.5 Oracle (US) Recent Development 13.5 Varonis Systems (US) 13.5.1 Varonis Systems (US) Company Details 13.5.2 Varonis Systems (US) Business Overview and Its Total Revenue 13.5.3 Varonis Systems (US) Data-Centric Security Introduction 13.5.4 Varonis Systems (US) Revenue in Data-Centric Security Business (2015-2020) 13.5.5 Varonis Systems (US) Recent Development 13.6 AvePoint (US) 13.6.1 AvePoint (US) Company Details 13.6.2 AvePoint (US) Business Overview and Its Total Revenue 13.6.3 AvePoint (US) Data-Centric Security Introduction 13.6.4 AvePoint (US) Revenue in Data-Centric Security Business (2015-2020) 13.6.5 AvePoint (US) Recent Development 13.7 BlueTalon (US) 13.7.1 BlueTalon (US) Company Details 13.7.2 BlueTalon (US) Business Overview and Its Total Revenue 13.7.3 BlueTalon (US) Data-Centric Security Introduction 13.7.4 BlueTalon (US) Revenue in Data-Centric Security Business (2015-2020) 13.7.5 BlueTalon (US) Recent Development 13.8 Dataguise (US) 13.8.1 Dataguise (US) Company Details 13.8.2 Dataguise (US) Business Overview and Its Total Revenue 13.8.3 Dataguise (US) Data-Centric Security Introduction 13.8.4 Dataguise (US) Revenue in Data-Centric Security Business (2015-2020) 13.8.5 Dataguise (US) Recent Development 13.9 Datiphy (US) 13.9.1 Datiphy (US) Company Details 13.9.2 Datiphy (US) Business Overview and Its Total Revenue 13.9.3 Datiphy (US) Data-Centric Security Introduction 13.9.4 Datiphy (US) Revenue in Data-Centric Security Business (2015-2020) 13.9.5 Datiphy (US) Recent Development 13.10 Micro Focus (UK) 13.10.1 Micro Focus (UK) Company Details 13.10.2 Micro Focus (UK) Business Overview and Its Total Revenue 13.10.3 Micro Focus (UK) Data-Centric Security Introduction 13.10.4 Micro Focus (UK) Revenue in Data-Centric Security Business (2015-2020) 13.10.5 Micro Focus (UK) Recent Development 13.11 NextLabs (US) 10.11.1 NextLabs (US) Company Details 10.11.2 NextLabs (US) Business Overview and Its Total Revenue 10.11.3 NextLabs (US) Data-Centric Security Introduction 10.11.4 NextLabs (US) Revenue in Data-Centric Security Business (2015-2020) 10.11.5 NextLabs (US) Recent Development 13.12 Protegrity (US) 10.12.1 Protegrity (US) Company Details 10.12.2 Protegrity (US) Business Overview and Its Total Revenue 10.12.3 Protegrity (US) Data-Centric Security Introduction 10.12.4 Protegrity (US) Revenue in Data-Centric Security Business (2015-2020) 10.12.5 Protegrity (US) Recent Development 14 Analyst's Viewpoints/Conclusions 15 Appendix 15.1 Research Methodology 15.1.1 Methodology/Research Approach 15.1.2 Data Source 15.2 Disclaimer 15.3 Author Details
List of Tables Table 1. Data-Centric Security Key Market Segments Table 2. Key Players Covered: Ranking by Data-Centric Security Revenue Table 3. Ranking of Global Top Data-Centric Security Manufacturers by Revenue (US$ Million) in 2019 Table 4. Global Data-Centric Security Market Size Growth Rate by Type (US$ Million): 2020 VS 2026 Table 5. Key Players of Professional Table 6. Key Players of Managed Table 7. Global Data-Centric Security Market Size Growth by Application (US$ Million): 2020 VS 2026 Table 8. Global Data-Centric Security Market Size by Regions (US$ Million): 2020 VS 2026 Table 9. Global Data-Centric Security Market Size by Regions (2015-2020) (US$ Million) Table 10. Global Data-Centric Security Market Share by Regions (2015-2020) Table 11. Global Data-Centric Security Forecasted Market Size by Regions (2021-2026) (US$ Million) Table 12. Global Data-Centric Security Market Share by Regions (2021-2026) Table 13. Market Top Trends Table 14. Key Drivers: Impact Analysis Table 15. Key Challenges Table 16. Data-Centric Security Market Growth Strategy Table 17. Main Points Interviewed from Key Data-Centric Security Players Table 18. Global Data-Centric Security Revenue by Players (2015-2020) (Million US$) Table 19. Global Data-Centric Security Market Share by Players (2015-2020) Table 20. Global Top Data-Centric Security Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Data-Centric Security as of 2019) Table 21. Global Data-Centric Security by Players Market Concentration Ratio (CR5 and HHI) Table 22. Key Players Headquarters and Area Served Table 23. Key Players Data-Centric Security Product Solution and Service Table 24. Date of Enter into Data-Centric Security Market Table 25. Mergers & Acquisitions, Expansion Plans Table 26. Global Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 27. Global Data-Centric Security Market Size Share by Type (2015-2020) Table 28. Global Data-Centric Security Revenue Market Share by Type (2021-2026) Table 29. Global Data-Centric Security Market Size Share by Application (2015-2020) Table 30. Global Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 31. Global Data-Centric Security Market Size Share by Application (2021-2026) Table 32. North America Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 33. North America Key Players Data-Centric Security Market Share (2019-2020) Table 34. North America Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 35. North America Data-Centric Security Market Share by Type (2015-2020) Table 36. North America Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 37. North America Data-Centric Security Market Share by Application (2015-2020) Table 38. Europe Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 39. Europe Key Players Data-Centric Security Market Share (2019-2020) Table 40. Europe Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 41. Europe Data-Centric Security Market Share by Type (2015-2020) Table 42. Europe Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 43. Europe Data-Centric Security Market Share by Application (2015-2020) Table 44. China Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 45. China Key Players Data-Centric Security Market Share (2019-2020) Table 46. China Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 47. China Data-Centric Security Market Share by Type (2015-2020) Table 48. China Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 49. China Data-Centric Security Market Share by Application (2015-2020) Table 50. Japan Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 51. Japan Key Players Data-Centric Security Market Share (2019-2020) Table 52. Japan Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 53. Japan Data-Centric Security Market Share by Type (2015-2020) Table 54. Japan Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 55. Japan Data-Centric Security Market Share by Application (2015-2020) Table 56. Southeast Asia Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 57. Southeast Asia Key Players Data-Centric Security Market Share (2019-2020) Table 58. Southeast Asia Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 59. Southeast Asia Data-Centric Security Market Share by Type (2015-2020) Table 60. Southeast Asia Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 61. Southeast Asia Data-Centric Security Market Share by Application (2015-2020) Table 62. India Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 63. India Key Players Data-Centric Security Market Share (2019-2020) Table 64. India Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 65. India Data-Centric Security Market Share by Type (2015-2020) Table 66. India Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 67. India Data-Centric Security Market Share by Application (2015-2020) Table 68. Central & South America Key Players Data-Centric Security Revenue (2019-2020) (Million US$) Table 69. Central & South America Key Players Data-Centric Security Market Share (2019-2020) Table 70. Central & South America Data-Centric Security Market Size by Type (2015-2020) (Million US$) Table 71. Central & South America Data-Centric Security Market Share by Type (2015-2020) Table 72. Central & South America Data-Centric Security Market Size by Application (2015-2020) (Million US$) Table 73. Central & South America Data-Centric Security Market Share by Application (2015-2020) Table 74. IBM (US) Company Details Table 75. IBM (US) Business Overview Table 76. IBM (US) Product Table 77. IBM (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 78. IBM (US) Recent Development Table 79. Imperva (US) Company Details Table 80. Imperva (US) Business Overview Table 81. Imperva (US) Product Table 82. Imperva (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 83. Imperva (US) Recent Development Table 84. Informatica (US) Company Details Table 85. Informatica (US) Business Overview Table 86. Informatica (US) Product Table 87. Informatica (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 88. Informatica (US) Recent Development Table 89. Oracle (US) Company Details Table 90. Oracle (US) Business Overview Table 91. Oracle (US) Product Table 92. Oracle (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 93. Oracle (US) Recent Development Table 94. Varonis Systems (US) Company Details Table 95. Varonis Systems (US) Business Overview Table 96. Varonis Systems (US) Product Table 97. Varonis Systems (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 98. Varonis Systems (US) Recent Development Table 99. AvePoint (US) Company Details Table 100. AvePoint (US) Business Overview Table 101. AvePoint (US) Product Table 102. AvePoint (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 103. AvePoint (US) Recent Development Table 104. BlueTalon (US) Company Details Table 105. BlueTalon (US) Business Overview Table 106. BlueTalon (US) Product Table 107. BlueTalon (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 108. BlueTalon (US) Recent Development Table 109. Dataguise (US) Business Overview Table 110. Dataguise (US) Product Table 111. Dataguise (US) Company Details Table 112. Dataguise (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 113. Dataguise (US) Recent Development Table 114. Datiphy (US) Company Details Table 115. Datiphy (US) Business Overview Table 116. Datiphy (US) Product Table 117. Datiphy (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 118. Datiphy (US) Recent Development Table 119. Micro Focus (UK) Company Details Table 120. Micro Focus (UK) Business Overview Table 121. Micro Focus (UK) Product Table 122. Micro Focus (UK) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 123. Micro Focus (UK) Recent Development Table 124. NextLabs (US) Company Details Table 125. NextLabs (US) Business Overview Table 126. NextLabs (US) Product Table 127. NextLabs (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 128. NextLabs (US) Recent Development Table 129. Protegrity (US) Company Details Table 130. Protegrity (US) Business Overview Table 131. Protegrity (US) Product Table 132. Protegrity (US) Revenue in Data-Centric Security Business (2015-2020) (Million US$) Table 133. Protegrity (US) Recent Development Table 134. Research Programs/Design for This Report Table 135. Key Data Information from Secondary Sources Table 136. Key Data Information from Primary Sources List of Figures Figure 1. Global Data-Centric Security Market Share by Type: 2020 VS 2026 Figure 2. Professional Features Figure 3. Managed Features Figure 4. Global Data-Centric Security Market Share by Application: 2020 VS 2026 Figure 5. BFSI Case Studies Figure 6. IT and Telecommunications Case Studies Figure 7. Retail Case Studies Figure 8. Government and Public Sector Case Studies Figure 9. Healthcare Case Studies Figure 10. Others Case Studies Figure 11. Data-Centric Security Report Years Considered Figure 12. Global Data-Centric Security Market Size YoY Growth 2015-2026 (US$ Million) Figure 13. Global Data-Centric Security Market Share by Regions: 2020 VS 2026 Figure 14. Global Data-Centric Security Market Share by Regions (2021-2026) Figure 15. Porter's Five Forces Analysis Figure 16. Global Data-Centric Security Market Share by Players in 2019 Figure 17. Global Top Data-Centric Security Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Data-Centric Security as of 2019 Figure 18. The Top 10 and 5 Players Market Share by Data-Centric Security Revenue in 2019 Figure 19. North America Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 20. Europe Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 21. China Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 22. Japan Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 23. Southeast Asia Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 24. India Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 25. Central & South America Data-Centric Security Market Size YoY Growth (2015-2020) (Million US$) Figure 26. IBM (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 27. IBM (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 28. Imperva (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 29. Imperva (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 30. Informatica (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 31. Informatica (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 32. Oracle (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 33. Oracle (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 34. Varonis Systems (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 35. Varonis Systems (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 36. AvePoint (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 37. AvePoint (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 38. BlueTalon (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 39. BlueTalon (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 40. Dataguise (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 41. Dataguise (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 42. Datiphy (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 43. Datiphy (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 44. Micro Focus (UK) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 45. Micro Focus (UK) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 46. NextLabs (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 47. NextLabs (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 48. Protegrity (US) Total Revenue (US$ Million): 2019 Compared with 2018 Figure 49. Protegrity (US) Revenue Growth Rate in Data-Centric Security Business (2015-2020) Figure 50. Bottom-up and Top-down Approaches for This Report Figure 51. Data Triangulation Figure 52. Key Executives Interviewed
IBM (US) Imperva (US) Informatica (US) Oracle (US) Varonis Systems (US) AvePoint (US) BlueTalon (US) Dataguise (US) Datiphy (US) Micro Focus (UK) NextLabs (US) Protegrity (US)
  • PRICE
  • $3900
    $7800
    $5850
    Buy Now

Our Clients