Global Healthcare IOT Security Market Opportunities and Forecast 2023-2030

  •   DLR2118
  •   September, 2020
  •   Pages: 120
  •  Global
Market Overview

Rising acceptance of the wearable technology, funds for executing digital technologies in the healthcare institutions, and the emergence of associated care are the significant factors improving the industry growth. Industrial advancements and rising geriatric population with the rising prevalence of various chronic conditions are further positively impacting market expansion.
According to research conducted by network provider company in the Aruba, closely 87% of healthcare organizations through the globe will adopt the IoT services by the year 2019. Researchers measured approximately 3,100 IT companies including business and healthcare decision-makers aroound 20 countries. The study concluded that the healthcare institutions have presented IoT for refining patient monitoring, promoting innovations, and decreasing costs.

Segment Overview

Services segment held largest market share in 2019. The segment is supplementary segmented into training, system integration services, and education, consulting, and support and maintenance. Growing demand for the uninterrupted data flows boost efficiency of medical systems, improve security, and enhance knowledgeable decision-making in real-time are the key factor propelling the services segment.
Furthermore, with the emergence of IoT services, dependency on the connected medical devices, including implantable, wearable, and stationary medical devices, for the health monitoring has augmented. Rising need for the connected health services for the critically ill patients, reduced cost of care, improved treatment outcomes, and the real-time disease management are the factors driving the IoT-enabled health devices market.

Regional Overview

North America dominated market in 2019. The growth is accredited to the rising adoption of various healthcare IT solutions, legislative initiatives, presence of key companies, regulations such as HITECH Law, 2009, and the availability of refined healthcare IT infrastructure in the region.
U.S. accounted for largest revenue share and is anticipated to maintain dominance over forecast period. Industrial advancements and numerous government initiatives encouraging the adoption of such digital platforms in the life science industry are main factors contributing to largest revenue share. There are several initiatives being accepted for developing clinical interoperability, and eHealth which is further driving the market.
Asia Pacific is anticipated to emerge as fastest-growing market. Growing health IT infrastructure, increasing initiatives for encouraging connected healthcare, and progressively increasing implementation of advanced technologies, inlcuding smart wearables, are key factors propelling the region’s growth. Rising investment by medical device and the pharmaceutical companies in the region is further expected to drive demand for the IoT technologies
.
Competitor overview

Microsoft Corp.; Cisco Systems, Inc.; Koninklijke Philips N.V.; IBM Corp.; and Cerner Corp. are few of the major players in this market. Investments in R and D, collaborations with the other industry participants, and the service differentiation are important marketing strategies implemented by the companies. For instance, IBM collaborated with the Pfizer Inc., for developing system to develop clinical research process for the Parkinson’s disease in 2016.

Key Players
  1. Medtronic
  2. Koninklijke Philips N.V.
  3. General Electric Company
  4. IBM Corporation
  5. Microsoft
  6. Cerner Corporation
  7. Proteus Digital Health
  8. AdhereTech, Inc.
  9. Google
  10. Cisco System Ltd.

Market Segmentation
By Type
  • Medical Devices
  • Software & System
  • Services
By Application
  • Telemedicine
  • Clinical Operations
  • Inpatient Monitoring
  • Medication Management
  • Connected Imaging
  • Others
By Technology
  • Wi-Fi
  • Near Field Communication (NFC)
  • Bluetooth low energy
  • ZigBee
  • Cellular
  • Satellite
By Geography
  • North America
    • US
    • Canada
  • Europe
    • UK
    • Germany
    • France
    • Italy
    • Spain
    • Rest of Europe
  • Asia-Pacific
    • Japan
    • China
    • India
    • Australia
    • South Korea
    • Rest of Asia-Pacific
  • LAMEA
    • Brazil
    • Saudi Arabia
    • UAE
    • Rest of LAMEA


1 RESEARCH SCOPE 24

  • 1.1 MARKET DEFINITION 24
  • 1.2 REPORT COVERAGE 25
    • 1.2.1 MARKET CLASSIFICATION 27
      • 1.2.1.1 MARKET SEGMENTATION BY SECURITY SOLUTIONS 28
      • 1.2.1.2 MARKET SEGMENTATION BY SECURITY SERVICES 29
      • 1.2.1.3 MARKET SEGMENTATION BY GEOGRAPHY 29
  • 1.3 STAKEHOLDERS 30
  • 1.4 REPORT DESCRIPTION 30
    • 1.4.1 KEY QUESTIONS ANSWERED IN THE REPORT 31
  • 2 RESEARCH METHODOLOGY 33

    • 2.1 RESEARCH FLOW 33
    • 2.2 FACTOR ANALYSIS 34
      • 2.2.1 DEMAND SIDE FACTORS 34
      • 2.2.2 SUPPLY SIDE FACTORS 34
    • 2.3 RESEARCH DESIGN 35
      • 2.3.1 RESEARCH PARAMETERS 35
      • 2.3.2 SECONDARY RESEARCH 35
        • 2.3.2.1 KEY DATA POINTS FROM SECONDARY SOURCES 36
      • 2.3.3 PRIMARY RESEARCH 36
        • 2.3.3.1 KEY DATA POINTS FROM PRIMARY SOURCES 37
      • 2.3.4 DATA TRIANGULATION 38
        • 2.3.4.1 TOP DOWN APPROACH 39
  • 2.4 ASSUMPTIONS AND LIMITATIONS 40
  • 2.5 YEARS CONSIDERED 40
  • 3 EXECUTIVE SUMMARY 42

      4 MARKET OVERVIEW 48

      • 4.1 INTRODUCTION 48
      • 4.2 IOT IN HEALTHCARE: OVERVIEW 49
        • 4.2.1 APPLICATIONS OF IOT IN HEALTHCARE 50
        • 4.2.2 IOT ENABLING TECHNOLOGIES IN HEALTHCARE 52
        • 4.2.3 REASONS TO FOCUS ON HEALTHCARE IOT SECURITY 53
        • 4.2.4 HEALTHCARE IOT SECURITY ARCHITECTURE 54
      • 4.3 MARKET DYNAMICS 56
        • 4.3.1 MARKET DRIVERS 57
          • 4.3.1.1 INTRODUCTION 57
          • 4.3.1.2 INCREASED DATA PRIVACY CONCERNS AMONG CONSUMERS 58
          • 4.3.1.3 INCREASED GOVERNMENT CONCERNS OVER HEALTHCARE IOT SECURITY 59
          • 4.3.1.4 INCREASED USAGE OF SMART DEVICES FOR HEALTH MANAGEMENT 61
          • 4.3.1.5 INCREASED PROLIFERATION OF CYBER CRIMES IN HEALTHCARE 64
        • 4.3.2 MARKET CHALLENGES 65
          • 4.3.2.1 INTRODUCTION 65
          • 4.3.2.2 LACK OF TECHNOLOGICAL AWARENESS ABOUT IOT THREATS AMONG HEALTHCARE ORGANIZATIONS 66
          • 4.3.2.3 MEETING INTER-REGION REGULATION FOR DATA PRIVACY 67
        • 4.3.3 MARKET OPPORTUNITIES 68
          • 4.3.3.1 INTRODUCTION 68
          • 4.3.3.2 MORE CLOUD STORAGE FOR SENSITIVE DATA 69

      5 COMPETITIVE OVERVIEW 70

      • 5.1 KEY MARKET DEVELOPMENT STRATEGIES 71
        • 5.1.1 INTRODUCTION 71
          • 5.1.1.1 KEY MARKET DEVELOPMENT TRENDS 72
        • 5.1.2 PRODUCT LAUNCH/DEVELOPMENT 73
        • 5.1.3 PARTNERSHIPS AND COLLABORATIONS 74
        • 5.1.4 ACQUISITIONS 76
        • 5.1.5 BUSINESS EXPANSION 78
        • 5.1.6 OTHERS 80
      • 5.2 PORTER’S FIVE FORCES ANALYSIS 81
        • 5.2.1 THREAT OF NEW ENTRANTS 83
        • 5.2.2 BARGAINING POWER OF BUYERS 84
        • 5.2.3 BARGAINING POWER OF SUPPLIERS 85
        • 5.2.4 THREAT OF SUBSTITUTE PRODUCTS OR SERVICES 87
        • 5.2.5 RIVALRY AMONG EXISTING FIRMS 88

      6 INDUSTRY ANALYSIS 91

      • 6.1 REGULATIONS/ACTS 91
      • 6.2 PATENTS 92
      • 6.3 CONSORTIUMS 94
      • 6.4 STANDARDS 95
      • 6.5 VALUE CHAIN ANALYSIS 96
        • 6.5.1 PROBLEM RECOGNITION 97
        • 6.5.2 SECURITY SOLUTIONS PROVIDERS 97
        • 6.5.3 SECURITY SERVICES PROVIDERS 98

      7 HEALTHCARE IOT MEDICAL DEVICES 100

      • 7.1 INTRODUCTION 100
      • 7.2 IOT REAL TIME HEALTH MONITORING DEVICES 101
        • 7.2.1 INTRODUCTION 101
        • 7.2.2 HEALTHCARE IOT WEARABLE DEVICES 102
          • 7.2.2.1 INTRODUCTION 102
          • 7.2.2.2 WEARABLE DEVICE USAGE 102
          • 7.2.2.3 KEY FACTS 103
          • 7.2.2.4 WEARABLE DEVICES SECURITY CONCERNS 104
        • 7.2.3 IOT CONNECTED HOME HEALTH MEDICAL DEVICES 104
          • 7.2.3.1 INTRODUCTION 104
          • 7.2.3.2 HOME HEALTH MEDICAL DEVICE USAGE 105
          • 7.2.3.3 KEY FACTS 106
          • 7.2.3.4 HOME HEALTH MEDICAL DEVICES SECURITY CONCERNS 107
    • 7.3 IOT STATIONARY MEDICAL DEVICES 108
      • 7.3.1 INTRODUCTION 108
      • 7.3.2 STATIONARY MEDICAL DEVICE USAGE 108
      • 7.3.3 KEY FACTS 109
      • 7.3.4 STATIONARY MEDICAL DEVICE SECURITY CONCERNS 110
    • 7.4 IOT SMART DEVICES (MHEALTH APPLICATIONS) 111
      • 7.4.1 INTRODUCTION 111
      • 7.4.2 SMART DEVICES APPLICATION USAGE 112
      • 7.4.3 KEY FACTS 113
      • 7.4.4 SMART DEVICE SECURITY CONCERNS 113
    • 7.5 IOT INGESTIBLES DEVICES 114
      • 7.5.1 INTRODUCTION 114
      • 7.5.2 IOT INGESTIBLE DEVICE USAGE 115
    • 8 GLOBAL HEALTHCARE IOT SECURITY MARKET: SOLUTIONS AND SERVICES 116

      • 8.1 INTRODUCTION 116
        • 8.1.1 MARKET STATISTICS 118
      • 8.2 IOT SECURITY MARKET IN HEALTHCARE SECTOR BY SOLUTIONS 119
        • 8.2.1 INTRODUCTION 119
          • 8.2.1.1 MARKET STATISTICS 120
        • 8.2.2 NETWORK SECURITY 121
          • 8.2.2.1 INTRODUCTION 121
            • 8.2.2.1.1 Network Security Market Scope 122
            • 8.2.2.1.2 Key Players 123
            • 8.2.2.1.3 Market Statistics 123
          • 8.2.2.2 WHY IOT NETWORK SECURITY IS CRUCIAL? 125
          • 8.2.2.3 KEY FACTS 126
          • 8.2.2.4 SIGNIFICANT DEVELOPMENTS 126
        • 8.2.3 ENDPOINT SECURITY 128
          • 8.2.3.1 INTRODUCTION 128
            • 8.2.3.1.1 Endpoint Security Market Scope 128
            • 8.2.3.1.2 Key Players 130
            • 8.2.3.1.3 Market Statistics 130
          • 8.2.3.2 WHY IOT END POINT SECURITY IS CRUCIAL? 132
          • 8.2.3.3 KEY FACTS 133
          • 8.2.3.4 SIGNIFICANT DEVELOPMENTS 133
        • 8.2.4 CONTENT SECURITY 134
          • 8.2.4.1 INTRODUCTION 134
            • 8.2.4.1.1 Content Security Market Scope 135
            • 8.2.4.1.2 Key Players 136
            • 8.2.4.1.3 Market Statistics 136
          • 8.2.4.2 WHY IOT CONTENT SECURITY IS CRUCIAL 138
          • 8.2.4.3 KEY FACTS 139
          • 8.2.4.4 SIGNIFICANT DEVELOPMENTS 139
        • 8.2.5 APPLICATION SECURITY 140
          • 8.2.5.1 INTRODUCTION 140
            • 8.2.5.1.1 Application Security Market Scope 141
            • 8.2.5.1.2 Key Players 142
            • 8.2.5.1.3 Market Statistics 143
          • 8.2.5.2 WHY IOT APPLICATION SECURITY IS CRUCIAL? 145
          • 8.2.5.3 KEY FACTS 145
          • 8.2.5.4 SIGNIFICANT DEVELOPMENTS 146
        • 8.2.6 CLOUD SECURITY 146
          • 8.2.6.1 INTRODUCTION 146
            • 8.2.6.1.1 IOT Cloud Security Market Scope 147
            • 8.2.6.1.2 Key Players 148
            • 8.2.6.1.3 Market Statistics 148
          • 8.2.6.2 WHY IOT CLOUD SECURITY IS CRUCIAL 150
          • 8.2.6.3 KEY FACTS 151
          • 8.2.6.4 SIGNIFICANT DEVELOPMENTS 151
    • 8.3 IOT SECURITY MARKET IN HEALTHCARE SECTOR BY SERVICES 153
      • 8.3.1 INTRODUCTION 153
        • 8.3.1.1 MARKET STATISTICS 154
      • 8.3.2 CONSULTING SERVICES 155
        • 8.3.2.1 INTRODUCTION 155
          • 8.3.2.1.1 Security Consulting Services Market Scope 155
          • 8.3.2.1.2 Key Players 156
          • 8.3.2.1.3 Market Statistics 157
        • 8.3.2.2 WHY IOT CONSULTING SERVICES ARE CRUCIAL 158
        • 8.3.2.3 KEY FACTS 159
        • 8.3.2.4 SIGNIFICANT DEVELOPMENTS AND PLAYERS 159
      • 8.3.3 RISK ASSESSMENT SERVICES 160
        • 8.3.3.1 INTRODUCTION 160
          • 8.3.3.1.1 Security Risk Assessment Services Market Cope 162
          • 8.3.3.1.2 Key Players 163
          • 8.3.3.1.3 Market Statistics 163
        • 8.3.3.2 WHY IOT RISK ASSESSMENT SERVICES ARE CRUCIAL 166
        • 8.3.3.3 KEY FACTS 166
        • 8.3.3.4 SIGNIFICANT DEVELOPMENTS 167
      • 8.3.4 DESIGN AND INTEGRATION SERVICES 167
        • 8.3.4.1 INTRODUCTION 167
          • 8.3.4.1.1 Security Design and Integration Services Market Scope 168
          • 8.3.4.1.2 Key Players 169
          • 8.3.4.1.3 Market Statistics 169
        • 8.3.4.2 WHY IOT DESIGN AND INTEGRATION SERVICES ARE CRUCIAL 172
        • 8.3.4.3 KEY FACT 172
        • 8.3.4.4 SIGNIFICANT DEVELOPMENTS 173
      • 8.3.5 MANAGED SECURITY SERVICES 173
        • 8.3.5.1 INTRODUCTION 173
          • 8.3.5.1.1 IoT Managed Security Services Market Scope 173
          • 8.3.5.1.2 Key Players 174
          • 8.3.5.1.3 Market Statistics 175
        • 8.3.5.2 WHY MANAGED SECURITY SERVICES ARE CRUCIAL 177
        • 8.3.5.3 KEY FACT 177
        • 8.3.5.4 SIGNIFICANT DEVELOPMENTS 178
      • 8.3.6 OTHERS (TRAINING AND EDUCATION, EMAIL SECURITY, AMONG OTHERS) 178
        • 8.3.6.1 INTRODUCTION 178
          • 8.3.6.1.1 Other IOT Security Service Market Scope 179
          • 8.3.6.1.2 Key Players 180
          • 8.3.6.1.3 Market Statistics 180

      9 GLOBAL IOT SECURITY IN THE HEALTHCARE SECTOR BY GEOGRAPHY 183

      • 9.1 INTRODUCTION 183
        • 9.1.1 MARKET STATISTICS 186
      • 9.2 NORTH AMERICA 187
        • 9.2.1 INTRODUCTION 187
          • 9.2.1.1 MARKET STATISTICS 188
        • 9.2.2 KEY ACT FOR DATA PRIVACY AND SECURITY IN NORTH AMERICA 191
          • 9.2.2.1 KEY FACTS RAISING HEALTHCARE IOT SECURITY CONCERNS IN NORTH AMERICA 191
          • 9.2.2.2 HEALTH INSURANCE PORTABILITYAND ACCOUNTABILITY ACT (HIPAA) 192
            • 9.2.2.2.1 Criteria for Defining Healthcare Data Covered by HIPAA 192
        • 9.2.3 NORTH AMERICA: KEY DEVELOPMENTS 194
        • 9.2.4 NORTH AMERICA: KEY PLAYERS 196
      • 9.3 EUROPE 196
        • 9.3.1 INTRODUCTION 196
          • 9.3.1.1 MARKET STATISTICS 198
        • 9.3.2 KEY ACT FOR DATA PRIVACY AND SECURITY IN EUROPE 201
          • 9.3.2.1 KEY FACTS RAISING HEALTHCARE IOT SECURITY CONCERNS IN EUROPE 201
          • 9.3.2.2 DATA PROTECTION ACT (DPA) 202
            • 9.3.2.2.1 Applicability of the Existing Data Protection Law to IOT 202
        • 9.3.3 EUROPE: KEY DEVELOPMENTS 203
        • 9.3.4 EUROPE: KEY PLAYERS 204
      • 9.4 ASIA PACIFIC (APAC) 205
        • 9.4.1 INTRODUCTION 205
          • 9.4.1.1 MARKET STATISTICS 207
        • 9.4.2 KEY ACT FOR DATA PRIVACY AND SECURITY IN APAC 210
          • 9.4.2.1 KEY FACTS RAISING HEALTHCARE IOT SECURITY CONCERNS IN APAC 210
          • 9.4.2.2 PERSONAL DATA PROTECTION ACT (PDPA) 210
        • 9.4.3 APAC: KEY DEVELOPMENTS 211
        • 9.4.4 APAC: KEY PLAYERS 212
      • 9.5 REST OF THE WORLD (ROW) 213
        • 9.5.1 INTRODUCTION 213
        • 9.5.2 MARKET STATISTICS 214
        • 9.5.3 KEY ACT FOR DATA PRIVACY AND SECURITY IN ROW 217
          • 9.5.3.1 KEY FACTS RAISING HEALTHCARE IOT SECURITY CONCERNS IN ROW 217
        • 9.5.4 ROW: KEY DEVELOPMENTS 218
        • 9.5.5 ROW: KEY PLAYERS 219

      10 COMPANY PROFILES 220

      • 10.1 INSIDE SECURE SA 220
        • 10.1.1 OVERVIEW 220
        • 10.1.2 FINANCIALS 221
          • 10.1.2.1 Overall Financials 221
          • 10.1.2.2 Net Revenue by Business Segment 222
          • 10.1.2.3 Inside Secure SA: Financial Summary 222
        • 10.1.3 KEY DEVELOPMENTS AND STRATEGIES 223
        • 10.1.4 SWOT ANALYSIS 225
      • 10.2 IBM CORPORATION 226
        • 10.2.1 OVERVIEW 226
        • 10.2.2 FINANCIALS 227
          • 10.2.2.1 Overall Financials 227
          • 10.2.2.2 Net Revenue by Business Segments 228
          • 10.2.2.3 Revenue Across Different Geographies 229
          • 10.2.2.4 Revenue By Different Geographies (2015 quarterly) 230
          • 10.2.2.5 IBM Corporation: Financial Summary 231
        • 10.2.3 KEY DEVELOPMENTS AND STRATEGIES 232
        • 10.2.4 SWOT ANALYSIS 234
      • 10.3 CISCO SYSTEMS INC 235
        • 10.3.1 OVERVIEW 235
        • 10.3.2 FINANCIALS 236
          • 10.3.2.1 Overall Financials 237
          • 10.3.2.2 Net Revenue by Business Segments 237
          • 10.3.2.3 Revenue across different Geographies 239
          • 10.3.2.4 Revenue Generated By Product Across Different Geographies 240
          • 10.3.2.5 Revenue generated by Services Across Different Geographies 241
          • 10.3.2.6 CISCO SYSTEMS: Financial summary 241
        • 10.3.3 KEY DEVELOPMENTS AND STRATEGIES 242
        • 10.3.4 SWOT ANALYSIS 244
      • 10.4 INTEL CORPORATION 245
        • 10.4.1 OVERVIEW 245
        • 10.4.2 FINANCIALS 246
          • 10.4.2.1 Overall Financials 246
          • 10.4.2.2 Revenue by Segments 247
          • 10.4.2.3 Revenue by different geographies 247
          • 10.4.2.4 Intel Corporation: Financial Summary 248
        • 10.4.3 KEY DEVELOPMENTS AND STRATEGIES 249
        • 10.4.4 SWOT ANALYSIS 251
      • 10.5 ORACLE CORPORATION 252
        • 10.5.1 OVERVIEW 252
        • 10.5.2 FINANCIALS 253
          • 10.5.2.1 Overall Financials 253
          • 10.5.2.2 Revenue by Segments 254
          • 10.5.2.3 Revenue Across Different Geographies 255
          • 10.5.2.4 Oracle Corporation: Financial Summary 255
        • 10.5.3 KEY DEVELOPMENTS AND STRATEGIES 256
        • 10.5.4 SWOT ANALYSIS 257
      • 10.6 SOPHOS GROUP PLC 258
        • 10.6.1 OVERVIEW 258
        • 10.6.2 FINANCIALS 259
          • 10.6.2.1 Overall Financials 259
          • 10.6.2.2 Billings by Segments 260
          • 10.6.2.3 Revenue by Different Geographies 261
          • 10.6.2.4 Sophos Group PLC: Financial Summary 261
        • 10.6.3 KEY DEVELOPMENT AND STRATEGIES 262
        • 10.6.4 SWOT ANALYSIS 263
      • 10.7 SYMANTEC CORPORATION 264
        • 10.7.1 OVERVIEW 264
        • 10.7.2 FINANCIALS 265
          • 10.7.2.1 Overall Financials 265
          • 10.7.2.2 Revenue by Operating Segments 266
          • 10.7.2.3 Revenue by Different Products 267
          • 10.7.2.4 Revenue by Different Geographies 268
          • 10.7.2.5 Symantec corporation: Financial summary 268
        • 10.7.3 KEY DEVELOPMENTS AND STRATEGIES 269
        • 10.7.4 SWOT ANALYSIS 271
      • 10.8 TREND MICRO INC. 272
        • 10.8.1 OVERVIEW 272
        • 10.8.2 FINANCIALS 273
          • 10.8.2.1 Overall Financials 273
          • 10.8.2.2 Revenue by geographies 274
          • 10.8.2.3 Trend Micro Inc: Financial Summary 274
        • 10.8.3 KEY DEVELOPMENTS AND STRATEGIES 275
        • 10.8.4 SWOT ANALYSIS 276
      • 10.9 CHECKPOINT SOFTWARE TECHNOLOGY 277
        • 10.9.1 OVERVIEW 277
        • 10.9.2 FINANCIALS 277
          • 10.9.2.1 Overall Financials 278
          • 10.9.2.2 Revenue By Products 279
          • 10.9.2.3 Revenue Across Geographies 280
          • 10.9.2.4 Checkpoint Software Technologies: Financial Summary 280
        • 10.9.3 KEY DEVELOPMENTS AND STRATEGIES 281
        • 10.9.4 SWOT ANALYSIS 283
      • 10.10 KASPERSKY LABS 284
        • 10.10.1 OVERVIEW 284
        • 10.10.2 KEY DEVELOPMENTS AND STRATEGIES 285
        • 10.10.3 SWOT ANALYSIS 287
      • 10.11 FORTINET INC. 288
        • 10.11.1 OVERVIEW 288
      • 10.12 INTELEN INC. 289
        • 10.12.1 OVERVIEW 289
      • 10.13 EUROTECH SPA 290
        • 10.13.1 OVERVIEW 290
      • 10.14 DEUTSCHE TELEKOM AG 291
        • 10.14.1 OVERVIEW 291
      • 10.15 SECUREFLO LLC 292
        • 10.15.1 OVERVIEW 292
      • 10.16 DELL CORPORATION 293
        • 10.16.1 OVERVIEW 293
      • 10.17 ATMEL CORPORATION 294
        • 10.17.1 OVERVIEW 294
      • 10.18 SECURITY MENTOR 295
        • 10.18.1 OVERVIEW 295
      • 10.19 KLYNVELD PEAT MARWICK GOERDELER (KPMG) 296
        • 10.19.1 OVERVIEW 296
      • 10.20 AGILE CYBER SECURITY SOLUTIONS, LLC. 297
        • 10.20.1 OVERVIEW 297
    • Request for List of Figure


      Research Process

      Data Library Research are conducted by industry experts who offer insight on industry structure, market segmentations technology assessment and competitive landscape (CL), and penetration, as well as on emerging trends. Their analysis is based on primary interviews (~ 80%) and secondary research (~ 20%) as well as years of professional expertise in their respective industries. Adding to this, by analysing historical trends and current market positions, our analysts predict where the market will be headed for the next five years. Furthermore, the varying trends of segment & categories geographically presented are also studied and the estimated based on the primary & secondary research.

      In this particular report from the supply side Data Library Research has conducted primary surveys (interviews) with the key level executives (VP, CEO’s, Marketing Director, Business Development Manager and SOFT) of the companies that active & prominent as well as the midsized organization

      FIGURE 1: DLR RESEARH PROCESS

      Primary Research

      Extensive primary research was conducted to gain a deeper insight of the market and industry performance. The analysis is based on both primary and secondary research as well as years of professional expertise in the respective industries.

      In addition to analysing current and historical trends, our analysts predict where the market is headed over the next five years.

      It varies by segment for these categories geographically presented in the list of market tables. Speaking about this particular report we have conducted primary surveys (interviews) with the key level executives (VP, CEO’s, Marketing Director, Business Development Manager and many more) of the major players active in the market.

      Secondary Research

      Secondary research was mainly used to collect and identify information useful for the extensive, technical, market-oriented, and Friend’s study of the Global Extra Neutral Alcohol. It was also used to obtain key information about major players, market classification and segmentation according to the industry trends, geographical markets, and developments related to the market and technology perspectives. For this study, analysts have gathered information from various credible sources, such as annual reports, sec filings, journals, white papers, SOFT presentations, and company web sites.

      Market Size Estimation

      Both, top-down and bottom-up approaches were used to estimate and validate the size of the Global market and to estimate the size of various other dependent submarkets in the overall Extra Neutral Alcohol. The key players in the market were identified through secondary research and their market contributions in the respective geographies were determined through primary and secondary research.

      Forecast Model