Automated Breach and Attack Simulation Market by Offering, By Application, By End-User and By Region – Global Opportunities & Forecast, 2020-2027
Automated Breach and Attack Simulation Market by Offering (Services and Platforms/Tools), By Application (Patch Management, Configuration Management, Threat Intelligence, and Others), By End-User (Managed Service Providers and Enterprise and Data Centers) and By Region – Global Opportunities & Forecast, 2020-2027
1. Executive Summary
1.1. Key Market Insights
2. Introduction
2.1. Study Objectives
2.2. Market Definition
2.2.1. Market Covered
2.2.2. Regional Coverage
2.2.3. Study Years & Currency
2.3. Market Stakeholders
2.4. Key Questions this Study will Answer
2.5. GMI Research’s Approach & Methodology
2.5.1. Research Data
2.5.2. Primary Data
2.5.3. Demand Side and Supply Side Analysis
2.5.4. Market Size Estimation
2.5.5. Research Assumptions
3. Global Automated Breach and Attack Simulation Market - Overview
3.1. Introduction
3.2. Market Segmentation
3.3. Value Chain Analysis
3.4. Market Drivers
3.5. Market Restraints
3.6. Market Trends
4. Global Automated Breach and Attack Simulation Market Revenue Forecast till 2027
5. Global Automated Breach and Attack Simulation Market by Offering Revenue Forecast till 2027
5.1. Platforms/Tools
5.2. Services
5.2.1. Training
5.2.2. On-demand analyst
6. Global Automated Breach and Attack Simulation Market by Application Revenue Forecast till 2027
6.1. Patch Management
6.2. Configuration Management
6.3. Threat Intelligence
6.4. Others
7. Global Automated Breach and Attack Simulation Market by End-User Revenue Forecast till 2027
7.1. Managed Service Providers
7.2. Enterprise
7.3. Data Centers
8. Global Automated Breach and Attack Simulation Market by Region Revenue Forecast till 2027
8.1. North America Automated Breach and Attack Simulation Market Revenue Forecast till 2027 (Option 1: As a part of the free 25% Customization)
8.1.1. North America Automated Breach and Attack Simulation Market by Offering
8.1.1.1. Platforms/Tools
8.1.1.2. Services
8.1.1.2.1. Training
8.1.1.2.2. On-demand analyst
8.1.2. North America Automated Breach and Attack Simulation Market by Application
8.1.2.1. Patch Management
8.1.2.2. Configuration Management
8.1.2.3. Threat Intelligence
8.1.2.4. Others
8.1.3. North America Automated Breach and Attack Simulation Market by End-User
8.1.3.1. Managed Service Providers
8.1.3.2. Enterprise
8.1.3.3. Data Centers
8.1.4. United States of America (US) All-Up Automated Breach and Attack Simulation Market
8.1.5. Canada All-Up Automated Breach and Attack Simulation Market
8.2. Europe Automated Breach and Attack Simulation Market Revenue Forecast till 2027 (Option 2: As a part of the free 25% Customization)
8.2.1. Europe Automated Breach and Attack Simulation Market by Offering
8.2.1.1. Platforms/Tools
8.2.1.2. Services
8.2.1.2.1. Training
8.2.1.2.2. On-demand analyst
8.2.2. Europe Automated Breach and Attack Simulation Market by Application
8.2.2.1. Patch Management
8.2.2.2. Configuration Management
8.2.2.3. Threat Intelligence
8.2.2.4. Others
8.2.3. Europe Automated Breach and Attack Simulation Market by End-User
8.2.3.1. Managed Service Providers
8.2.3.2. Enterprise
8.2.3.3. Data Centers
8.2.4. United Kingdom (UK) All-Up Automated Breach and Attack Simulation Market
8.2.5. Germany All-Up Automated Breach and Attack Simulation Market
8.2.6. France All-Up Automated Breach and Attack Simulation Market
8.2.7. Spain All-Up Automated Breach and Attack Simulation Market
8.2.8. Rest of Europe All-Up Automated Breach and Attack Simulation Market
8.3. Asia-Pacific Automated Breach and Attack Simulation Market Revenue Forecast till 2027 (Option 3: As a part of the free 25% Customization)
8.3.1. Asia-Pacific Automated Breach and Attack Simulation Market by Offering
8.3.1.1. Platforms/Tools
8.3.1.2. Services
8.3.1.2.1. Training
8.3.1.2.2. On-demand analyst
8.3.2. Asia-Pacific Automated Breach and Attack Simulation Market by Application
8.3.2.1. Patch Management
8.3.2.2. Configuration Management
8.3.2.3. Threat Intelligence
8.3.2.4. Others
8.3.3. Asia-Pacific Automated Breach and Attack Simulation Market by End-User
8.3.3.1. Managed Service Providers
8.3.3.2. Enterprise
8.3.3.3. Data Centers
8.3.4. China All-Up Automated Breach and Attack Simulation Market
8.3.5. India All-Up Automated Breach and Attack Simulation Market
8.3.6. Japan All-Up Automated Breach and Attack Simulation Market
8.3.7. Rest of APAC All-Up Automated Breach and Attack Simulation Market
8.4. RoW Automated Breach and Attack Simulation Market Revenue Forecast till 2027 (Option 4: As a part of the free 25% Customization)
8.4.1. RoW Automated Breach and Attack Simulation Market by Offering
8.4.1.1. Platforms/Tools
8.4.1.2. Services
8.4.1.2.1. Training
8.4.1.2.2. On-demand analyst
8.4.2. RoW Automated Breach and Attack Simulation Market by Application
8.4.2.1. Patch Management
8.4.2.2. Configuration Management
8.4.2.3. Threat Intelligence
8.4.2.4. Others
8.4.3. RoW Automated Breach and Attack Simulation Market by End-User
8.4.3.1. Managed Service Providers
8.4.3.2. Enterprise
8.4.3.3. Data Centers
8.4.4. Brazil All-Up Automated Breach and Attack Simulation Market
8.4.5. South Africa All-Up Automated Breach and Attack Simulation Market
8.4.6. Saudi Arabia All-Up Automated Breach and Attack Simulation Market
8.4.7. UAE All-Up Automated Breach and Attack Simulation Market
8.4.8. Rest of world (remaining countries of the LAMEA region) All-Up Automated Breach and Attack Simulation Market
9. Competitive Landscape Analysis
9.1. Porter’s Five Forces Analysis
9.2. Industry – Competitive Landscape
9.3. Market Presence (Intensity Mapping)
9.4. Key Strategic Market Developments
10. Company Profiles (Option 5: Free 25% Customization - Profiles of 5 Additional Companies of your Choice)
10.1. DXC Technology
10.1.1. Company Overview
10.1.2. Key Executives
10.1.3. Footprint & Employee Strength
10.1.4. Product Offerings
10.1.5. Financials
10.1.6. Key Company Developments
10.2. Qualys
10.2.1. Company Overview
10.2.2. Key Executives
10.2.3. Footprint & Employee Strength
10.2.4. Product Offerings
10.2.5. Financials
10.2.6. Key Company Developments
10.3. Pcysys
10.3.1. Company Overview
10.3.2. Key Executives
10.3.3. Footprint & Employee Strength
10.3.4. Product Offerings
10.3.5. Financials
10.3.6. Key Company Developments
10.4. Rapid7
10.4.1. Company Overview
10.4.2. Key Executives
10.4.3. Footprint & Employee Strength
10.4.4. Product Offerings
10.4.5. Financials
10.4.6. Key Company Developments
10.5. XM Cyber
10.5.1. Company Overview
10.5.2. Key Executives
10.5.3. Footprint & Employee Strength
10.5.4. Product Offerings
10.5.5. Financials
10.5.6. Key Company Developments
10.6. AttackIQ
10.6.1. Company Overview
10.6.2. Key Executives
10.6.3. Footprint & Employee Strength
10.6.4. Product Offerings
10.6.5. Financials
10.6.6. Key Company Developments
10.7. Cymulate
10.7.1. Company Overview
10.7.2. Key Executives
10.7.3. Footprint & Employee Strength
10.7.4. Product Offerings
10.7.5. Financials
10.7.6. Key Company Developments
10.8. SafeBreach
10.8.1. Company Overview
10.8.2. Key Executives
10.8.3. Footprint & Employee Strength
10.8.4. Product Offerings
10.8.5. Financials
10.8.6. Key Company Developments
10.9. Skybox Security
10.9.1. Company Overview
10.9.2. Key Executives
10.9.3. Footprint & Employee Strength
10.9.4. Product Offerings
10.9.5. Financials
10.9.6. Key Company Developments
10.10. Firemon
10.10.1. Company Overview
10.10.2. Key Executives
10.10.3. Footprint & Employee Strength
10.10.4. Product Offerings
10.10.5. Financials
10.10.6. Key Company Developments
10.11. NopSec
10.11.1. Company Overview
10.11.2. Key Executives
10.11.3. Footprint & Employee Strength
10.11.4. Product Offerings
10.11.5. Financials
10.11.6. Key Company Developments
10.12. Mazebolt
10.12.1. Company Overview
10.12.2. Key Executives
10.12.3. Footprint & Employee Strength
10.12.4. Product Offerings
10.12.5. Financials
10.12.6. Key Company Developments
10.13. Verodin
10.13.1. Company Overview
10.13.2. Key Executives
10.13.3. Footprint & Employee Strength
10.13.4. Product Offerings
10.13.5. Financials
10.13.6. Key Company Developments
10.14. Threatcare
10.14.1. Company Overview
10.14.2. Key Executives
10.14.3. Footprint & Employee Strength
10.14.4. Product Offerings
10.14.5. Financials
10.14.6. Key Company Developments
10.15. Scythe
10.15.1. Company Overview
10.15.2. Key Executives
10.15.3. Footprint & Employee Strength
10.15.4. Product Offerings
10.15.5. Financials
10.15.6. Key Company Developments
11. About GMI Research
*Details on Financials might not be available in case of unlisted/private companies.
- Published Date: Jun-2020
- Report Format: Excel/PPT
- Report Code: UP436A-00-0620
Licensing Options
Single-User License:
The report is used by the purchaser (One Individual) only
Multi-User License:Report is shared with maximum 5 users (employees) including the purchaser of the purchasing corporation only
Corporate License:
Report is shared with unlimited user (employees) of the purchasing corporation only
The report is used by the purchaser (One Individual) only
Multi-User License:Report is shared with maximum 5 users (employees) including the purchaser of the purchasing corporation only
Corporate License:
Report is shared with unlimited user (employees) of the purchasing corporation only
Automated Breach and Attack Simulation Market by Offering, By Application, By End-User and By Region – Global Opportunities & Forecast, 2020-2027
$ 4,499.00 – $ 6,649.00