LONDON, March 31, 2015 /PRNewswire/ --
Leading Companies in Network, Data, Endpoint, Application & Cloud Security, Identity Management & Security Operations
The cyber security market is currently undergoing unprecedented growth and development due to a wide variety of internal and external factors. Almost every month a major cyber event occurs which forces security to the top of the news agenda, encouraging governments to pass new legislation and expand their defences and capabilities. Although for the most part limited to the disruption of web services or the theft of data, enough has happened for many leaders to consider cyber issues a national concern, relevant enough to feature into all future strategic military and security planning.
This is driving growth in the most demanding cyber security sectors, and providing large defence contractors with more reason to acquire smaller companies that have been operating for many years, particularly in the area of critical infrastructure protection. Complementing this is a massive amount of private-sector interest in effective security, in addition to purchases made by worried consumers. The financial services industry especially is one vertical which has not been slow to seek outside expertise, and with more and more individuals purchasing smart-devices and using cloud services, the demand for protections is only likely to increase. As a consequence, visiongain has assessed that the value of the global cyber security market in 2015 will reach $75.4bn.
This new report from visiongain is a completely fresh market assessment of the cyber security sector based upon the latest information. This brand new report contains completely new company interviews. updated forecasts, original analysis, expanded company profiles and, most crucially, fresh conclusions.
Why you should buyCyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations
What are the prospects for the cyber security market? Visiongain's comprehensive analysis contains highly quantitative content delivering solid conclusions benefiting your analysis and illustrates new opportunities and potential revenue streams helping you to remain competitive. This definitive report will benefit your decision making and help to direct your future business strategy.
At over 100,000 words, this report is one of visiongain's most comprehensive reports, and would be of essential use to those actively involved in defence, security, or technology markets, or those generally looking for an understanding of the components and processes that make the cyber security market as prominent as it is.
To see a report overview please email Sara Peerun on firstname.lastname@example.org
In this 590 page report, we guarantee that you will receive key information:
• View global cyber security market forecasts and analysis from 2015-2025 to keep your knowledge ahead of your competition and ensure you exploit key business opportunities
- The report provides detailed sales projections of the market, the competitors, and the commercial drivers and restraints allowing you to more effectively compete in the market. In addition to market forecasts from 2015-2025, our new study shows current market data, market shares, original critical analysis, and revealing insight into commercial developments
• Our report provides 492 tables, charts, and graphs analysing the cyber security market
- Let our analysts present you with a thorough assessment of the current and future cyber security market prospects. This analysis will achieve quicker, easier understanding.
• See details of 163 significant cyber security contracts and programmes
- You will gain from our industry knowledge allowing you to demonstrate your authority on the cyber security sector
• See 7 exclusive interview transcripts from leading companies involved with cyber security
- By reading the full transcripts of the exclusive expert opinion interviews contained in the report you will keep up to speed with what is really happening in the cyber security sector Don't' fall behind. You will gain a thorough knowledge on the cyber security sector finding strategic advantages for your work and will learn how your organisation can benefit - allowing you to assess prospects for investments and sales
- DataSoft Corporation
- Bayshore Networks, Inc.
- CA Technologies, Inc.
- Sentar, Inc.
- N-Dimension Solutions, Inc.
- Corero Network Security, Inc.
- Intego, Inc.
• Discover sales predictions for the cyber security submarkets from 2015-2025
- What are the dynamics of the cyber security submarkets? Which submarkets will generate the most revenue? Use our forecasts and expert insight to grow your business and give you more industry influence. Find where you can gain and how your organisation can succeed. Avoid falling behind. Stay informed about the potential for each of these cyber security submarkets with individual forecasts and analysis from 2015-2025. The 7 submarket forecasts are revealed at the global level, regional level and also individually for each of the 21 leading national markets, providing unprecedented detail.
- Network Security forecast 2015-2025
- Security Operations forecast 2015-2025
- Data Security forecast 2015-2025
- Endpoint Security forecast 2015-2025
- Identity Management forecast 2015-2025
- Application Security forecast 2015-2025
- Cloud Security forecast 2015-2025
• Understand the prospects for the leading national cyber security markets - where will the highest revenues and opportunities occur?
- Learn about the market potential for cyber security companies in the developed and developing countries, from 2013.onwards. You will see where and how opportunities exist with revealing individual market forecasts and analysis from 2015-2025 for 6 regions and 20 leading national cyber security markets. Each of the forecasts are further split into each of the 7 submarkets providing unrivalled detail.
- North America Cyber Security Market & Submarket Forecasts 2015-2025
- Central & South America Cyber Security Market & Submarket Forecasts 2015-2025
- Europe Cyber Security Market & Submarket Forecasts 2015-2025
- Asia Pacific Cyber Security Market & Submarket Forecasts 2015-2025
- Middle East Cyber Security Market & Submarket Forecasts 2015-2025
- Africa Cyber Security Market & Submarket Forecasts 2015-2025
- U.S. Cyber Security Market & Submarket Forecasts 2015-2025
- Chinese Cyber Security Market & Submarket Forecasts 2015-2025
- Japanese Cyber Security Market & Submarket Forecasts 2015-2025
- Russian Cyber Security Market & Submarket Forecasts 2015-2025
- Republic of Korea Cyber Security Market & Submarket Forecasts 2015-2025
- Saudi Arabian Cyber Security Market & Submarket Forecasts 2015-2025
- Indian Cyber Security Market & Submarket Forecasts 2015-2025
- French Cyber Security Market & Submarket Forecasts 2015-2025
- U.K. Cyber Security Market & Submarket Forecasts 2015-2025
- German Cyber Security Market & Submarket Forecasts 2015-2025
- Israeli Cyber Security Market & Submarket Forecasts 2015-2025
- Canadian Cyber Security Market & Submarket Forecasts 2015-2025
- Australian Cyber Security Market & Submarket Forecasts 2015-2025
- Italian Cyber Security Market & Submarket Forecasts 2015-2025
- Spanish Cyber Security Market & Submarket Forecasts 2015-2025
- Brazilian Cyber Security Market & Submarket Forecasts 2015-2025
- Turkish Cyber Security Market & Submarket Forecasts 2015-2025
- UAE Cyber Security Market & Submarket Forecasts 2015-2025
- Taiwanese Cyber Security Market & Submarket Forecasts 2015-2025
- Iranian Cyber Security Market & Submarket Forecasts 2015-2025
- Nigerian Cyber Security Market & Submarket Forecasts 2015-2025
- Rest of the World Cyber Security Market & Submarket Forecasts 2015-2025
• Explore the factors affecting product developers, and everyone within the value chain. Learn about the forces influencing market dynamics.
- Explore the political, economic, social, and technological (PEST) issues assessing product advances. Discover what the present and future outlook for business will be. Learn about the following business critical issues -
- Research and development (R&D) strategy
- Technological issues and constraints.
- Supply and demand dynamics
- Competition from new product types
- Increasing specialisation by leading players
- Increasing industry consolidation.
- Advances in product quality
- Analysis of barriers to entry
To see a report overview please email Sara Peerun on email@example.com
• Identify who the leading companies are in the cyber security industry
- Our report reveals the companies which hold the greatest potential. In particular, exploring and analyzing the activities of these companies: See where the expected gains will be. View visiongain's assessment of the prospects for established cyber security competitors, rising companies, and new market entrants. Our work explains that potential, helping you stay ahead. Gain a thorough understanding of the competitive landscape with profiles of 20 leading cyber security companies examining their positioning, capabilities, product portfolios, R&D activity, services, focus, strategies, M&A activity, and future outlook.
- Airbus Group
- BAE Systems plc
- Boeing Company
- Booz Allen Hamilton, Inc.
- Cisco Systems, Inc
- Computer Sciences Corporation (CSC)
- Finmeccanica S.p.A.
- General Dynamics Corporation
- Hewlett Packard Company
- Intel Corporation
- Kaspersky Lab
- L-3 Communications Holdings, Inc
- Leidos Inc
- Lockheed Martin Corporation
- Northrop Grumman Corporation
- Raytheon Company
- Symantec Corporation
- Thales Group
- Trend Micro, Inc.
- Ultra Electronics plc
Discover Information found nowhere else in this independent assessment of the cyber security market
The Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations report provides impartial cyber security sector analysis. With the independent business intelligence found only in our work, you will discover where the prospects are for profit. In particular, our new research provides you with key strategic advantages: Our informed forecasts, independent and objective analysis, exclusive interviews and revealing company profiles will provide you with that necessary edge, allowing you to gain ground over your competitors.
With this report you are less likely to fall behind in knowledge or miss crucial business opportunities. You will save time and receive recognition for your market insight. See how you this report could benefit and enhance your research, analysis, company presentations and ultimately your individual business decisions and your company's prospects.
What makes this report unique?
Visiongain consulted widely with leading industry experts and 7 full transcripts from these exclusive interviews are included in the report. Visiongain's research methodology involves an exclusive blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global, submarket and regional markets forecasts from 2015-2025
Why choose visiongain business intelligence?
Visiongain's; increasingly diverse sector coverage strengthens our research portfolio. The growing cross-sector convergence of key verticals and the interplay of game changing technologies across hitherto unrelated industries are creating new synergies, resulting in new business opportunities for you to leverage.
As such, visiongain's team of London based in-house analysts offer a wealth of knowledge and experience to inform your strategic business decisions. Let visiongain guide you.
How the Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations report can benefit you
Visiongain's report is for anyone requiring analysis of the cyber security market. You will discover market forecasts, technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are. Don't miss this key opportunity to gain a competitive advantage.
Avoid falling behind your competitors, overlooking critical business opportunities or losing industry influence. In our new report you will discover forecasts from 2015-2025 at the global, submarket, and national level. The report also assesses technologies, competitive forces and expected product pipeline developments. Read on to discover the prospects for the cyber security sector and find out what its future market prospects are.
If you buy our report today your knowledge will stay one step ahead of your competitors. Discover how our report could benefit your research, analyses and strategic decisions, saving you time. To gain an understanding of how to tap into the potential of this market and stay one step ahead of the competition you must order now our report the Cyber Security Market 2015-2025: Leading Companies in Network, Data, Endpoint, Application, Cloud Security, Identity Management & Security Operations. Avoid missing out -order our report now.
To request an exec summary of this report please email Sara Peerun at firstname.lastname@example.org or call Tel: +44(0)20-7336-6100
3 Phoenix Inc.
3001 International Inc.
3Di Technologies LLC
42Six Solutions LLC
Abu Dhabi National Oil Company (ADNOC)
ADI Technologies, Inc
Advanced C4 Solutions, Inc.
Advizex Technologies LLC
Airborne Technologies Inc. (ATI)
Airbus Defence & Space
ALKU Government Solutions
Allied Associates International, Inc
AllSource Global Management, LLC.
Alteon Training LLC
Applied Communication Sciences
Applied Fundamentals Consulting, LLC
Applied Physical Science Corporation
Applied Visions, Inc
Arkoon Network Security
Assured Information Security, Inc
AT Solutions Group LLC
A-T Solutions, Inc.
AUSGAR Technologies, Inc.
Aveos Fleet Performance
Aviall Services Inc
Avira Operations GmbH & Co. KG
AxleTech International Inc.
BAE Systems Australia
BAE Systems Inc
BAE Systems Integrated Systems Technologies
BAE Systems Marine
BAE Systems Maritime - Naval Ships
BAE Systems Maritime - Submarines
BAE Systems Military Air & Information
BAE Systems Plc.
BAE Systems Surface Fleet Solutions
Bahrain Petroleum Company
Bath Iron Works
Bayshore Networks, Inc.
Bechtel National Inc.
Big-D Construction Corp.
Boeing Aircraft Holding Company
Boeing Commercial Airplanes
Boeing Commercial Space Company
Boeing Cyber Engagement centre (CEC)
Boeing Defence UK
Boeing Defense, Space & Security
Boeing International Corporation India Private Limited
Boeing Inventory Locator Service
Boeing Middle East Ltd.
Boeing Phantom Works
Boeing Realty Corporation
Boeing Rotorcraft Systems
Boeing Satellite Systems International, Inc.
Boeing Service Co, Boeing Aerospace Operations Inc.
Boeing Travel Management Company
Booz & Company
Booz Allen Hamilton Corporation
Brandon Technology Consulting, Inc.
Braxton Technologies, LLC.
British Telecom (BT)
Business Computers Management Consulting Group, LLC
Business Integra Technology Solutions, Inc.
Byres Security Inc.
CA Technologies, Inc.
Canadian Broadcasting Corporation
Centrex Ethical Lab
Checkpoint Software Technologies Ltd.
China Information Technology Inc.
Chugach Government Solutions, Inc.
Cisco (India) Private Limited
Cisco International Limited
Cisco Media Solutions Inc.
Cisco Systems (Thailand) Limited
Cisco Systems (USA) Pte. Ltd.
Cisco Systems Capital Corp.
Cisco Systems Finland Oy
Cisco Systems G.K.
Cisco Systems Inc.
Cisco Systems International B.V.
CM Equity Partners Inc.
Comodo Group, Inc.
Computer Science Corporation (CSC)
Computer Sciences Canada Inc.
Concurrent Technologies Corporation
Continental DataGraphics Ltd.
Corero Network Security, Inc.
CSC Applied Technologies LLC.
CSC Arabia Ltd.
CSC Bulgaria E.O.O.D.
CSC Computer Sciences B.V.
CSC Computer Sciences Consulting Austria
CSC Computer Sciences International Inc.
CSC Computer Sciences Pte Ltd.
CSC Consulting Inc.
CSC Convansys Corporation
CSC Credit Services, Inc.
CSC Cybertek Corp.
Cubic Defense Applications
Cybernet Systems Corporation
CyberSpace Operations Consulting Inc.
Defence Systems, Engineering & Support
Dell Services Federal Government, Inc.
Deloitte Consulting LLP.
Digital Receiver Technology
Digitial Bond Inc.
Dynamic Network Enterprises, Inc.
DynPort Vaccine Company LLC
Eagle Enterprise Inc.
Eagle Research Group, Inc.
Elbit Systems Ltd
Electric Data Systems, Inc.
Electric Launch Company
Electronic Data Systems
Electronic Warfare Associates, Inc.
Energetics Technology Center
Energy Sector Security Consortium Inc
Engineering Services Network, Inc.
Enterprise Information Services
ESET Middle East
Federal Management Systems Inc.
First Consulting Group Inc.
Fleet Support Limited
Florida Institute of Technology
Forensic Technology WAI Inc.
Frontier Systems Inc.
Fulcrum IT Services, LLC
G Data Software, Inc.
General Dynamics Advanced Information Systems
General Dynamics Armament Systems Inc.
General Dynamics C4 Systems
General Dynamics Corporation
General Dynamics Electric Boat
General Dynamics Government Systems Corp.
General Dynamics Information Technologies Inc.
General Dynamics Itronix Corporation
General Dynamics Land Systems
General Dynamics Ordnance & Tactical Systems Inc.
General Dynamics OTS Inc.
General Dynamics SATCOM Technologies Inc.
General Dynamics United Kingdom Ltd.
General Electric (GE)
Georgia Tech Applied Research
Georgia Tech Research Corporation
Global Info Tek, Inc.
Global Technical Systems
Goodwill Industries International
Grumman Aircraft Corporation
Honeywell International Inc.
HP Australia Pty Ltd.
HP Enterprise Services, LLC
HP France S.A.S
HP Japan Ltd.
HP Peru S.R.L
HP Taiwan Ltd.
HP Vietnam Ltd.
HRL Laboratories, LLC
Huawei Technologies Co. Ltd.
IBM Global Services
Imagine One StraCon Venture, LLC
Industrial Defender, Inc.
Infinion Technologies AG
Infrax Systems Inc.
Innominate Security Technologies AG
Innovative Banking Solutions AG
Insight Technology Inc.
Intel Corporation Hillsboro
Intel Electronics Ltd.
Intel Massachusetts Inc.
Intel Semiconductor Ltd.
INTELLIGENT AUTOMATION INC
International Resources Group
Interstate Electronics Corp
ISHPI Information Technologies, Inc.
Israel Electric Company
Israel National Gas Lines Ltd.
ITT Advanced Engineering & Sciences Division
Jacobs Technology Inc.
Jeppesen DataPlan Inc.
John Hopkins University Applied Physics Laboratory LLC
JP Morgan Chase & Co.
Juniper Networks Inc.
K7 Computing Pvt. Ltd.
Kawasaki Heavy Industries
KDI Precision Products Inc.
Kestrel Enterprises Inc.
Kestrel Technology, LLC
Kobe Shipyard & Machinery Works
Kratos Defense & Security Solutions
KRATOS Defense and Security Solutions, Inc.
KT Mobile Networks
Kuwait Oil Company
L-3 Communications Canada Inc.
L-3 Communications Corp
L-3 Communications Holdings Inc.
L-3 Communications Integrated Systems L.P.
L-3 Communications MAPPS Inc.
L-3 Communications MariPro, Inc.
L-3 Communications Singapore Pte Ltd.
L-3 Communications Vertex Aerospace LLC
L-3 Communications Westwood Corp
L-3 Services, Inc.
Leidos Biomedical Research, Inc.
Leidos Engineering, LLC
Lockheed Martin Aeronautics
Lockheed Martin Canada
Lockheed Martin Corporation
Lockheed Martin Global Training and Logistics
Lockheed Martin Information Technology
Lockheed Martin Missiles and Fire Control
Lockheed Martin Mission Systems and Sensors
Lockheed Martin Orincon
Lockheed Martin Space Systems
Lockheed Martin Systems Integration - Owego
Lockheed Martin Transportation & Security Services
Lockheed Martin UK
Lookingglass Cyber Solutions
M5 Network Security Pty Ltd.
ManTech International Corporation
Measurement Systems Inc.
Merit Network Inc
Michigan Institute of Technology
Microdyne Outsourcing Inc
Mitsubishi Heavy Industries
Montana Aviation Research Co.
Morgan Advanced Materials PLC.
Morgridge Institute for Research
Mynd International, Ltd.
NACON Consulting, LLC
Nagasaki Shipyard & Machinery Works
Nagoya Guidance & Propulsion System Works
National Steel and Shipbuilding Company
Naval Postgraduate School
N-Dimension Solutions, Inc.
Network Security Systems Plus, Inc.
Newport Systems Solutions
Northrop Grumman Corporation
Northrop Grumman Electronic Systems
Northrop Grumman Information Systems
Northrop Grumman Information Technology, Inc.
Northrop Grumman Shipbuilding
Northrop Grumman Space & Mission Systems Corporation
Northrop Grumman Systems Corporation
Northumbrian Water Limited (NWL)
Oak Ridge National Laboratory
Open Kernel labs
Pacific NW National Laboratory
Panda Security SL
Perimeter Internetworking Corporation
Petroleum Development Oman
Piocon Technologies Inc.
Power Paragon Inc.
Preston Aviation Solutions Pty, Ltd
Pure Digital Technologies
Qantas Defence Services
Qihoo 360 Technology Co. Ltd.
QinetiQ Group plc
QinetiQ North America
Quanterion Solutions, Inc.
Radiance Technologies, Inc.
RAM Laboratories, Inc.
Raytheon BBN Technologies
Raytheon Ebasco Overseas Ltd.
Raytheon ELCAN Optical Technologies
Raytheon Engineers & Constructors
Raytheon Integrated Defense Systems
Raytheon Intelligence and Information Systems
Raytheon Missile Systems
Raytheon Technical Services Company
Research in Motion (RIM)
RLM Communications, Inc.
Rolta International Inc.
Salient Federal Solutions, Inc.
Sandia National Laboratories
SAS Institute, Inc.
SCALABLE Network Technologies, Inc.
Schweitzer Engineering Laboratories
Science Applications International Corporation (SAIC)
SeKON Enterprises Incorporated
SelectTech Services Corporation
Selex Sistemi Integrati
Sentek Consulting, Inc.
Servicentro TMLA S.A. de C.V.
Sierra Nevada Corporation
Signal Innovation Group (SIG)
SNA Software, LLC
Software Engineering Institute - Carnegie Mellon
Solutions Made Simple Inc.
Sony Pictures Entertainment
Sotera Defense Solutions, Inc.
Southwest Research Institute
SPD Electrical Systems Inc.
SRA International, Inc.
Strategic Operational Solutions, Inc.
Sumaria Systems, Inc.
Sun News Network
SURVICE Engineering Company
Syzygy Technologies, Inc.
Tapestry Solutions Inc.
Tasmania Network Systems
TeleCommunication Systems, Inc. (TCS)
Tetra Tech, Inc.
Thales Air Defence
Thales Alenia Space
Thales Optronics Ltd.
Thales Rail Signalling Solutions
Thales Training & Simulation
Thales Underwater Systems
The Daily Telegraph
The Electric Power Research Institute
The Grid Protection Alliance
The Indian Express
The London Evening Standard
The New York Times
The Washington Post
The Washington Times
TISTA Science and Technology Corp
Torres Advanced Enterprise Solutions LLC
Trend Micro Australia Pty. Ltd.
Trend Micro China Incorporated
Trend Micro Deutschland GmbH
Trend Micro do Brasil Ltda.
Trend Micro EMEA Ltd.
Trend Micro France
Trend Micro Hong Kong Limited
Trend Micro Inc.
Trend Micro India Private Limited.
Trend Micro Italy S.r.L.
Trend Micro Korea, Inc.
Trend Micro Latinamerica S.A.de C.V.
Trend Micro Malaysia Sdn.Bhd.
Trend Micro New Zealand Limited
Trend Micro Singapore Private Limited.
Trend Micro Taiwan Incorporated
Trend Micro Thailand Limited
Trend Micro U.S., Inc.
Trend Micro UK Ltd.
Trustwave Holdings, Inc.
TSG-2 Joint Venture
TT Government Solutions
Ultra Electronics Advanced Tactical Systems
Ultra Electronics Airport Systems
Ultra Electronics Command & Control Systems
Ultra Electronics Communication & Integrated Systems
Ultra Electronics Flightline Systems
Ultra Electronics Holdings plc.
Ultra Electronics ID
Ultra Electronics Maritime Systems
Ultra Electronics Nuclear Control Systems
Ultra Electronics Ocean Systems
Ultra Electronics Precision Air & Land Systems
Ultra Electronics Sensors & Process Instrumentation
Ultra Electronics Sonar Systems
Ultra Electronics Surveillance & Security Systems
United Space Alliance
URS Federal Services
Vangent Holding Corporation
Veris Group, LLC
Vertex Antennetechnik GmbH
Vulnerability Research Labs
W&D Holdings Limited
Washington Headquarters Services
Waterfall Security Solutions Ltd.
Welkin Associates Ltd.
Wind River Systems
Wurldtech Security Technologies Inc
Government Agencies and Other Organisation Mentioned in This Report
Abu Dhabi Police
American Institute of Aeronautics and Astronautics (AIAA)
American National Hockey League
Australian Defence Force Academy (AFDA)
Australian Department of Broadband, Communications and the Digital Economy
Australian Federal Police (AFP)
Australian Labour Party
Australian Liberal Party
Australian Ministry of Defence
Australian Secret Intelligence Services (ASIS)
Bank of Montreal
Belgian Foreign Ministry
Bharatiya Janata Party (BJP)
Brazilian Department of Justice and Consumer Citizenship
Brazilian Ministry of External Relations
Bundesamt für Sicherheit in der Informationstechnik (BIS)
Canadian Air Transport Security Authority (CATSA)
Canadian Communications Security Establishment (CSE)
Canadian Cyber Incident Response Centre (CCIRC)
Canadian Department of National Defence (DND)
Canadian Department of Public Safety and Emergency Prepardness
Canadian Finance Department
Canadian Supreme Court
Canadian Treasury Board
Carnegie Mellon University
China Computer Emergency Response Team (CERT)
Chinese Anti-Smuggling Police
Chinese Civil Aviation Administration
Chinese Cyberspace Administration
Chinese General Office of the CPC
Chinese Ministry of Agriculture
Chinese Ministry of Justice
Chinese Ministry of Public Safety
Chinese Ministry of Transport
Chinese Office of the State Council
Chinese People's Liberation Army (PLA)
Chinese State Internet Information Office
Chinese State Oceanic Administration
Chinese Supreme People's Procuratorate
Communist Party of China (CPC)
Cyber Security Information Sharing Partnership Japan (J-CSIP)
Czech Technical University
Defence Research and Development Canada
European Central Bank
European Network for Cyber Security (ENCS)
French General Directorate of Armament
French Network and Information Security Agency (FNISA)
French Prime Minister's Office
French State Committee on Foreign Affairs Defence and Armed Forces
George Mason University
Georgia Tech Research Institute
Georgia Tech School of Electrical and Computer Engineering's National Electric Energy Testing, Research and Applications Center
German Cyber Security Council (NCS)
German Federal Intelligence Service
German Federal Ministry of Interior
German Federal Office for Information Security
German Federal Office for the Protection of the Constitution
German Federal Office of Civil Protection and Disaster Assistance
German Foreign Ministry
German National Cyber Response Centre (NCAZ)
Indian Computer Emergency Response Team (CERT-In)
Indian Cyber Command
Indian Defence Metallurgical Research Laboratory (DMRL)
Indian Defence Research and Development Organisation (DRDO)
Indian Eastern Naval Command
Indian Joint Working Group (JWG)
Indian Ministry of Communication and Information Technology (MCIT)
Indian Ministry of Human Resource Development
Indian National Association of Software Services Companies
Indian National Critical Information Infrastructure Protection Centre
Indian National Cyber Coordination Centre (NCCC)
Indian National Security Council Secretariat (NSCS)
International Computer Science Institute
Iranian National Computer Emergency Response Team
ISA Security Compliance Institute
Islamic State (IS)
Israeli Cyber Directorate
Israeli Defence Forces (IDF)
Istanbul Directorate of Security
Istanbul's Governor's Office
Japan Information-Technology Promotion Agency
Japanese Combined Cyber Defence Unit (CDU)
Japanese Control System Security Centre (CSSC)
Japanese Cyber Defence Council
Japanese House of Councillors
Japanese Ministry of Defence
Japanese Ministry of Economy, Trade and Industry (METI)
Japanese Ministry of Internal Affairs and Communications (MIAC)
Japanese National Information Security Centre (NISC)
Japanese National Police Agency (NPA)
Japanese SDF C4 Systems Command
Japanese Self-Defence Forces (JSDF)
Justice and Development Party (AKP)
Kansas State University
Korea Communications Commission (KCC)
Kurdish Democratic Union Party (PYD)
Kurdish National Council of Syria (KNC)
Kurdish Workers Party (PKK)
Maryland Procurement Office
Missouri University of Science and Technology
Movement for the Emancipation of the Niger Delta (MEND)
National Aeronautics and Space Administration (NASA)
National Bank of Canada
National Defence Industry Association (NDIA)
National Research Council of Canada (NRC)
NATO Computer Incident Response Capability (NCIRC)
Nigerian Computer Emergency Response Team (CERT)
Nigerian Economical and Financial Crimes Commission (EFCC)
Nigerian Federal Government
Nigerian Ministry of Defence
Nigerian Ministry of Foreign Affairs
Nigerian Ministry of Science & Technology
Nigerian National Malaria Control Programme
Nigerian National Research Institute for Chemical Technology
North Atlantic Treaty Organisation (NATO)
Norwegian National Security Authority
Oak Ridge National Laboratory
Pennsylvania State University,
People's Protection Units (YPG)
People's Bank of China (PBOC)
PLA Unit 61398
Public Safety Canada
Royal Australian Air Force (RAAF)
Royal Bank of Canada
Russian Central Bank
Russian Cyber Command (Rucyborg)
Russian Federal Security Service (FSB)
Russian Security Council
Rutgers University - New Brunswick Campus
Saudi Arabian Joint Commission on Critical Infrastructure and Border Security (JCCIP)
South Korean Financial Supervisory Service
South Korean Ministry of Science and Technology
South Korean National Cyber Security Center
Spanish Ministry of Defence
Spanish Ministry of Foreign Affairs
Spanish Ministry of Interior
Spanish Ministry of the Presidency
Spanish National Cyber Security Council
Spanish National Intelligence Centre (NIC)
Spanish National Police
Spanish National Security Council
Strategic Energy Institute
Syrian Electronic Army
Taiwanese Democratic Progressive Party
Taiwanese Ministry of National Defence
Taiwanese Ministry of Science & Technology
TeaM Hckers of Iraq
The Ajax Security Team
The Bank of Brazil
The Chaos Computer Club
The Conservative Party of Canada
The Cutting Sword of Justice
The Guardians of Peace
The Kurdish Democratic Union Party (PYD)
The Military Police of São Paulo
The National Rural Electric Cooperative Association
The Pirate Bay
The Russian Cyber Command (Rucyborg)
The Trustees of Princeton University
The University of Alabama at Birmingham
The University of North Carolina at Chapel Hill
Trustees of Dartmouth College
Trustees of Indiana University
Turkish National Intelligence Organisation (MIT)
Turkish Telecommunications Directorate
U.K. Cyber Security Evaluation Centre (HCSEC)
U.K. Department for Business Innovation & Skills (BIS)
U.K. Environment Agency
U.K. Highways Agency
U.S .Missile Defence Agency
U.S. 1st Information Operations Command
U.S. 67th Network Warfare Wing
U.S. 688th Information Operations Wing
U.S. 689th Combat Communications Wing
U.S. 780th Military Intelligence Brigade
U.S. 9th Army Signal Command
U.S. Air Force (USAF)
U.S. Air Force Cyber Command (AFCYBER)
U.S. Air Force Medical Services (AFMS)
U.S. Air Force Office of Special Investigations (AFOSI)
U.S. Air Force Research Laboratory (AFRL)
U.S. Army Aviation and Missile Life Cycle Management Command (AMCOM)
U.S. Army Corps of Engineers
U.S. Army Forces Cyber Command (ARCYBER)
U.S. Army Information Systems Engineering Command (USAISEC)
U.S. Army Intelligence and Security Command (INSCOM)
U.S. Army Medical Research and Materiel Command (USAMRMC)
U.S. Army Research Laboratory (ARL)
U.S. Central Command (CENTCOM)
U.S. Central Intelligence Agency (CIA)
U.S. Citizenship and Immigration Services (UCIS)
U.S. Coast Guard Cyber Command
U.S. Computer Emergency Readiness Team (US-CERT)
U.S. Cyber Command (Cybercom)
U.S. Defense Advanced Research Projects Agency (DARPA)
U.S. Defense Information Systems Agency (DISA)
U.S. Defense Intelligence Agency (DIA)
U.S. Defense Threat Reduction Agency (DTRA)
U.S. Department of Agriculture
U.S. Department of Alcohol, Tobacco, Firearms and Explosives (ATF)
U.S. Department of Commerce
U.S. Department of Defense (DoD)
U.S. Department of Education
U.S. Department of Energy (DoE)
U.S. Department of Health & Human Services
U.S. Department of Homeland Security (DHS)
U.S. Department of Justice (DoJ)
U.S. Department of Labor
U.S. Department of State
U.S. Department of the Interior
U.S. Department of the Treasury
U.S. Department of Transportation
U.S. Department of Veterans Affairs
U.S. DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
U.S. DHS Science and Technology Directorate (DHS S&T)
U.S. Environmental Protection Agency (EPA)
U.S. Federal Aviation Authority (FAA)
U.S. Federal Bureau of Investigation (FBI)
U.S. Federal Communications Commission
U.S. Federal Transit Administration (FTA)
U.S. Fleet Cyber Command (FLTCYBERCOM)
U.S. General Services Administration
U.S. Internal Revenue Service (IRS)
U.S. Marine Corp (USMC)
U.S. Marine Corps Cyberspace Command (MARFORCYBER)
U.S. Marshals Service (USMS)
U.S. National Counter-Intelligence Executive
U.S. National Cyber Response Coordination Group (NCRCG)
U.S. National Cyber Security Center
U.S. National Cyber Security Division
U.S. National Cyber Security Center of Excellence (NCCoE)
U.S. National Geospatial-Intelligence Agency
U.S. National Institute of Standards and Technology (NIST)
U.S. National Oceanic and Atmospheric Administration (NOAA)
U.S. National Protection and Programs Directorate (NPPD)
U.S. National Protections and Programs Directorate (NPPD)
U.S. National Reconnaissance Office (NRO)
U.S. National Security Agency (NSA)
U.S. Naval Academy
U.S. Naval Information Operations Command (NIOC)
U.S. Naval Network Warfare Command (NNWC)
U.S. Naval Supply Systems Command (NAVSUP)
U.S. Navy (USN)
U.S. Navy Command
U.S. Navy Cyber Defense Operations Command (NCDOC)
U.S. Network Enterprise Technology Command (NETCOM)
U.S. NOAA Computer Incident Response Team (N-CIRT)
U.S. NOAA Enterprise Security Services
U.S. NOAA Security Operations Center
U.S. Office of Cyber Security & Communication
U.S. Office of Management and Budget
U.S. Office of Naval Research
U.S. Office of Personnel Management
U.S. Office of the Chief Information Officer (OCIO)
U.S. Office of the Director of Administration and Management
U.S. Office of the Secretary of Defense (SECDEF)
U.S. Postal Service
U.S. Secret Service
U.S. Securities & Exchange Commission
U.S. SOUTHCOM's Joint Task Force-Bravo (JTF-B)
U.S. Southern Command (SOUTHCOM)
U.S. Space and Naval Warfare Systems Center Pacific (SSC Pacific)
U.S. SSC Pacific Training Development Support Center
U.S. Strategic Command (USSTRATCOM)
U.S. Transport Security Administration (TSA)
U.S. VA Office of Information & Technology
UAE Computer Emergency Response Team (CERT)
UAE Ministry of Interior
UAE Telecommunications Regulatory Authority
University of Arizona
University of California at Davies
University of California Riverside
University of California, San Diego
University of Illinois at Urbana-Champaign
University of Maryland
University of Minnesota
University of New South Wales
University of Southern California Information Sciences Institute
University of Washington
US Navy & Space & Naval Warfare Systems Center Atlantic
USMC Cryptological Support Battalion
William and Flora Hewlett Foundation
Xian Jiaotong University
To see a report overview please email Sara Peerun on email@example.com