Global and China Endpoint Security Market Size, Status and Forecast 2020-2026
Table of Contents1 Report Overview
1.1 Study Scope
1.2 Market Analysis by Type
1.2.1 Global Endpoint Security Market Size Growth Rate by Type: 2020 VS 2026
1.2.2 Anti-virus
1.2.3 Anti-spyware/Anti-malware
1.2.4 Firewall
1.2.5 Endpoint Device Control
1.2.6 Intrusion Prevention
1.2.7 Endpoint Application Control
1.2.8 Others
1.3 Market by Application
1.3.1 Global Endpoint Security Market Share by Application: 2020 VS 2026
1.3.2 Managed Services
1.3.3 Consulting
1.3.4 Training and Support
1.4 Study Objectives
1.5 Years Considered
2 Global Growth Trends
2.1 Global Endpoint Security Market Perspective (2015-2026)
2.2 Global Endpoint Security Growth Trends by Regions
2.2.1 Endpoint Security Market Size by Regions: 2015 VS 2020 VS 2026
2.2.2 Endpoint Security Historic Market Share by Regions (2015-2020)
2.2.3 Endpoint Security Forecasted Market Size by Regions (2021-2026)
2.3 Industry Trends and Growth Strategy
2.3.1 Market Trends
2.3.2 Market Drivers
2.3.3 Market Challenges
2.3.4 Market Restraints
3 Competition Landscape by Key Players
3.1 Global Top Endpoint Security Players by Market Size
3.1.1 Global Top Endpoint Security Players by Revenue (2015-2020)
3.1.2 Global Endpoint Security Revenue Market Share by Players (2015-2020)
3.2 Global Endpoint Security Market Share by Company Type (Tier 1, Tier 2 and Tier 3)
3.3 Players Covered: Ranking by Endpoint Security Revenue
3.4 Global Endpoint Security Market Concentration Ratio
3.4.1 Global Endpoint Security Market Concentration Ratio (CR5 and HHI)
3.4.2 Global Top 10 and Top 5 Companies by Endpoint Security Revenue in 2019
3.5 Key Players Endpoint Security Area Served
3.6 Key Players Endpoint Security Product Solution and Service
3.7 Date of Enter into Endpoint Security Market
3.8 Mergers & Acquisitions, Expansion Plans
4 Endpoint Security Breakdown Data by Type (2015-2026)
4.1 Global Endpoint Security Historic Market Size by Type (2015-2020)
4.2 Global Endpoint Security Forecasted Market Size by Type (2021-2026)
5 Endpoint Security Breakdown Data by Application (2015-2026)
5.1 Global Endpoint Security Historic Market Size by Application (2015-2020)
5.2 Global Endpoint Security Forecasted Market Size by Application (2021-2026)
6 North America
6.1 North America Endpoint Security Market Size (2015-2026)
6.2 North America Endpoint Security Market Size by Type (2015-2020)
6.3 North America Endpoint Security Market Size by Application (2015-2020)
6.4 North America Endpoint Security Market Size by Country (2015-2020)
6.4.1 United States
6.4.2 Canada
7 Europe
7.1 Europe Endpoint Security Market Size (2015-2026)
7.2 Europe Endpoint Security Market Size by Type (2015-2020)
7.3 Europe Endpoint Security Market Size by Application (2015-2020)
7.4 Europe Endpoint Security Market Size by Country (2015-2020)
7.4.1 Germany
7.4.2 France
7.4.3 U.K.
7.4.4 Italy
7.4.5 Russia
7.4.6 Nordic
7.4.7 Rest of Europe
8 China
8.1 China Endpoint Security Market Size (2015-2026)
8.2 China Endpoint Security Market Size by Type (2015-2020)
8.3 China Endpoint Security Market Size by Application (2015-2020)
8.4 China Endpoint Security Market Size by Region (2015-2020)
8.4.1 China
8.4.2 Japan
8.4.3 South Korea
8.4.4 Southeast Asia
8.4.5 India
8.4.6 Australia
8.4.7 Rest of Asia-Pacific
9 Japan
9.1 Japan Endpoint Security Market Size (2015-2026)
9.2 Japan Endpoint Security Market Size by Type (2015-2020)
9.3 Japan Endpoint Security Market Size by Application (2015-2020)
9.4 Japan Endpoint Security Market Size by Country (2015-2020)
9.4.1 Mexico
9.4.2 Brazil
10 Southeast Asia
10.1 Southeast Asia Endpoint Security Market Size (2015-2026)
10.2 Southeast Asia Endpoint Security Market Size by Type (2015-2020)
10.3 Southeast Asia Endpoint Security Market Size by Application (2015-2020)
10.4 Southeast Asia Endpoint Security Market Size by Country (2015-2020)
10.4.1 Turkey
10.4.2 Saudi Arabia
10.4.3 UAE
10.4.4 Rest of Middle East & Africa
11 Key Players Profiles
11.1 Symantec Corporation
11.1.1 Symantec Corporation Company Details
11.1.2 Symantec Corporation Business Overview
11.1.3 Symantec Corporation Endpoint Security Introduction
11.1.4 Symantec Corporation Revenue in Endpoint Security Business (2015-2020))
11.1.5 Symantec Corporation Recent Development
11.2 Intel Security (McAfee)
11.2.1 Intel Security (McAfee) Company Details
11.2.2 Intel Security (McAfee) Business Overview
11.2.3 Intel Security (McAfee) Endpoint Security Introduction
11.2.4 Intel Security (McAfee) Revenue in Endpoint Security Business (2015-2020)
11.2.5 Intel Security (McAfee) Recent Development
11.3 Trend Micro Incorporated
11.3.1 Trend Micro Incorporated Company Details
11.3.2 Trend Micro Incorporated Business Overview
11.3.3 Trend Micro Incorporated Endpoint Security Introduction
11.3.4 Trend Micro Incorporated Revenue in Endpoint Security Business (2015-2020)
11.3.5 Trend Micro Incorporated Recent Development
11.4 AVG Technologies
11.4.1 AVG Technologies Company Details
11.4.2 AVG Technologies Business Overview
11.4.3 AVG Technologies Endpoint Security Introduction
11.4.4 AVG Technologies Revenue in Endpoint Security Business (2015-2020)
11.4.5 AVG Technologies Recent Development
11.5 Sophos
11.5.1 Sophos Company Details
11.5.2 Sophos Business Overview
11.5.3 Sophos Endpoint Security Introduction
11.5.4 Sophos Revenue in Endpoint Security Business (2015-2020)
11.5.5 Sophos Recent Development
11.6 Kaspersky Labs
11.6.1 Kaspersky Labs Company Details
11.6.2 Kaspersky Labs Business Overview
11.6.3 Kaspersky Labs Endpoint Security Introduction
11.6.4 Kaspersky Labs Revenue in Endpoint Security Business (2015-2020)
11.6.5 Kaspersky Labs Recent Development
11.7 F-Secure
11.7.1 F-Secure Company Details
11.7.2 F-Secure Business Overview
11.7.3 F-Secure Endpoint Security Introduction
11.7.4 F-Secure Revenue in Endpoint Security Business (2015-2020)
11.7.5 F-Secure Recent Development
11.8 Eset
11.8.1 Eset Company Details
11.8.2 Eset Business Overview
11.8.3 Eset Endpoint Security Introduction
11.8.4 Eset Revenue in Endpoint Security Business (2015-2020)
11.8.5 Eset Recent Development
11.9 Panda Security
11.9.1 Panda Security Company Details
11.9.2 Panda Security Business Overview
11.9.3 Panda Security Endpoint Security Introduction
11.9.4 Panda Security Revenue in Endpoint Security Business (2015-2020)
11.9.5 Panda Security Recent Development
11.10 Bitdefender
11.10.1 Bitdefender Company Details
11.10.2 Bitdefender Business Overview
11.10.3 Bitdefender Endpoint Security Introduction
11.10.4 Bitdefender Revenue in Endpoint Security Business (2015-2020)
11.10.5 Bitdefender Recent Development
12 Analyst's Viewpoints/Conclusions
13 Appendix
13.1 Research Methodology
13.1.1 Methodology/Research Approach
13.1.2 Data Source
13.2 Disclaimer
13.3 Author Details
List of TablesTable 1. Global Endpoint Security Market Size Growth Rate by Type (US$ Million): 2020 VS 2026
Table 3. Key Players of Anti-virus
Table 4. Key Players of Anti-spyware/Anti-malware
Table 5. Key Players of Firewall
Table 6. Key Players of Endpoint Device Control
Table 7. Key Players of Intrusion Prevention
Table 8. Key Players of Endpoint Application Control
Table 9. Key Players of Others
Table 10. Global Endpoint Security Market Size Growth by Application (US$ Million): 2020 VS 2026
Table 11. Global Endpoint Security Market Size by Regions (US$ Million): 2020 VS 2026
Table 12. Global Endpoint Security Market Size by Regions (2015-2020) (US$ Million)
Table 13. Global Endpoint Security Market Share by Regions (2015-2020)
Table 14. Global Endpoint Security Forecasted Market Size by Regions (2021-2026) (US$ Million)
Table 15. Global Endpoint Security Market Share by Regions (2021-2026)
Table 16. Endpoint Security Market Market Trends
Table 17. Endpoint Security Market Drivers
Table 18. Endpoint Security Market Challenges
Table 19. Endpoint Security Market Restraints
Table 20. Global Endpoint Security Revenue by Players (2015-2020) (US$ Million)
Table 21. Global Endpoint Security Market Share by Players (2015-2020)
Table 22. Global Top Endpoint Security Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Endpoint Security as of 2019)
Table 23. Global Endpoint Security by Players Market Concentration Ratio (CR5 and HHI)
Table 24. Key Players Headquarters and Area Served
Table 25. Key Players Endpoint Security Product Solution and Service
Table 26. Mergers & Acquisitions, Expansion Plans
Table 27. Global Endpoint Security Market Size by Type (2015-2020) (US$ Million)
Table 28. Global Endpoint Security Market Size Share by Type (2015-2020)
Table 29. Global Endpoint Security Revenue Market Share by Type (2021-2026)
Table 30. Global Endpoint Security Market Size Share by Application (2015-2020)
Table 31. Global Endpoint Security Market Size by Application (2015-2020) (US$ Million)
Table 32. Global Endpoint Security Market Size Share by Application (2021-2026)
Table 33. North America Endpoint Security Market Size by Type (2015-2020) (US$ Million)
Table 34. North America Endpoint Security Market Share by Type (2015-2020)
Table 35. North America Endpoint Security Market Size by Application (2015-2020) (US$ Million)
Table 36. North America Endpoint Security Market Share by Application (2015-2020)
Table 37. North America Endpoint Security Market Size by Country (US$ Million) (2015-2020)
Table 38. North America Endpoint Security Market Share by Country (2015-2020)
Table 39. Europe Endpoint Security Market Size by Type (2015-2020) (US$ Million)
Table 40. Europe Endpoint Security Market Share by Type (2015-2020)
Table 41. Europe Endpoint Security Market Size by Application (2015-2020) (US$ Million)
Table 42. Europe Endpoint Security Market Share by Application (2015-2020)
Table 43. Europe Endpoint Security Market Size by Country (US$ Million) (2015-2020)
Table 44. Europe Endpoint Security Market Share by Country (2015-2020)
Table 45. China Endpoint Security Market Size by Type (2015-2020) (US$ Million)
Table 46. China Endpoint Security Market Share by Type (2015-2020)
Table 47. China Endpoint Security Market Size by Application (2015-2020) (US$ Million)
Table 48. China Endpoint Security Market Share by Application (2015-2020)
Table 49. China Endpoint Security Market Size by Region (US$ Million) (2015-2020)
Table 50. China Endpoint Security Market Share by Region (2015-2020)
Table 51. Japan Endpoint Security Market Size by Type (2015-2020) (US$ Million)
Table 52. Japan Endpoint Security Market Share by Type (2015-2020)
Table 53. Japan Endpoint Security Market Size by Application (2015-2020) (US$ Million)
Table 54. Japan Endpoint Security Market Share by Application (2015-2020)
Table 55. Japan Endpoint Security Market Size by Country (US$ Million) (2015-2020)
Table 56. Japan Endpoint Security Market Share by Country (2015-2020)
Table 57. Southeast Asia Endpoint Security Market Size by Type (2015-2020) (US$ Million)
Table 58. Southeast Asia Endpoint Security Market Share by Type (2015-2020)
Table 59. Southeast Asia Endpoint Security Market Size by Application (2015-2020) (US$ Million)
Table 60. Southeast Asia Endpoint Security Market Share by Application (2015-2020)
Table 61. Southeast Asia Endpoint Security Market Size by Country (US$ Million) (2015-2020)
Table 62. Southeast Asia Endpoint Security Market Share by Country (2015-2020)
Table 63. Symantec Corporation Company Details
Table 64. Symantec Corporation Business Overview
Table 65. Symantec Corporation Product
Table 66. Symantec Corporation Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 67. Symantec Corporation Recent Development
Table 68. Intel Security (McAfee) Company Details
Table 69. Intel Security (McAfee) Business Overview
Table 70. Intel Security (McAfee) Product
Table 71. Intel Security (McAfee) Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 72. Intel Security (McAfee) Recent Development
Table 73. Trend Micro Incorporated Company Details
Table 74. Trend Micro Incorporated Business Overview
Table 75. Trend Micro Incorporated Product
Table 76. Trend Micro Incorporated Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 77. Trend Micro Incorporated Recent Development
Table 78. AVG Technologies Company Details
Table 79. AVG Technologies Business Overview
Table 80. AVG Technologies Product
Table 81. AVG Technologies Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 82. AVG Technologies Recent Development
Table 83. Sophos Company Details
Table 84. Sophos Business Overview
Table 85. Sophos Product
Table 86. Sophos Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 87. Sophos Recent Development
Table 88. Kaspersky Labs Company Details
Table 89. Kaspersky Labs Business Overview
Table 90. Kaspersky Labs Product
Table 91. Kaspersky Labs Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 92. Kaspersky Labs Recent Development
Table 93. F-Secure Company Details
Table 94. F-Secure Business Overview
Table 95. F-Secure Product
Table 96. F-Secure Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 97. F-Secure Recent Development
Table 98. Eset Business Overview
Table 99. Eset Product
Table 100. Eset Company Details
Table 101. Eset Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 102. Eset Recent Development
Table 103. Panda Security Company Details
Table 104. Panda Security Business Overview
Table 105. Panda Security Product
Table 106. Panda Security Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 107. Panda Security Recent Development
Table 108. Bitdefender Company Details
Table 109. Bitdefender Business Overview
Table 110. Bitdefender Product
Table 111. Bitdefender Revenue in Endpoint Security Business (2015-2020) (US$ Million)
Table 112. Bitdefender Recent Development
Table 113. Research Programs/Design for This Report
Table 114. Key Data Information from Secondary Sources
Table 115. Key Data Information from Primary Sources
List of FiguresFigure 1. Global Endpoint Security Market Share by Type: 2020 VS 2026
Figure 2. Anti-virus Features
Figure 3. Anti-spyware/Anti-malware Features
Figure 4. Firewall Features
Figure 5. Endpoint Device Control Features
Figure 6. Intrusion Prevention Features
Figure 7. Endpoint Application Control Features
Figure 8. Others Features
Figure 9. Global Endpoint Security Market Share by Application: 2020 VS 2026
Figure 10. Managed Services Case Studies
Figure 11. Consulting Case Studies
Figure 12. Training and Support Case Studies
Figure 13. Endpoint Security Report Years Considered
Figure 14. Global Endpoint Security Market Size (US$ Million), YoY Growth 2015-2026
Figure 15. Global Endpoint Security Market Share by Regions: 2020 VS 2026
Figure 16. Global Endpoint Security Market Share by Regions (2021-2026)
Figure 17. Global Endpoint Security Market Share by Players in 2019
Figure 18. Global Top Endpoint Security Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Endpoint Security as of 2019
Figure 19. The Top 10 and 5 Players Market Share by Endpoint Security Revenue in 2019
Figure 20. North America Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 21. United States Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 22. Canada Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 23. Europe Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 24. Germany Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 25. France Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 26. U.K. Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 27. Italy Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 28. Russia Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 29. Nordic Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 30. Rest of Europe Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 31. Asia-Pacific Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 32. China Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 33. Japan Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 34. South Korea Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 35. Southeast Asia Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 36. India Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 37. Australia Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 38. Rest of Asia-Pacific Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 39. Latin America Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 40. Mexico Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 41. Brazil Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 42. Middle East & Africa Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 43. Turkey Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 44. Saudi Arabia Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 45. UAE Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 46. Rest of Middle East & Africa Endpoint Security Market Size YoY Growth (2015-2026) & (US$ Million)
Figure 47. Symantec Corporation Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 48. Intel Security (McAfee) Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 49. Trend Micro Incorporated Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 50. AVG Technologies Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 51. Sophos Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 52. Kaspersky Labs Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 53. F-Secure Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 54. Eset Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 55. Panda Security Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 56. Bitdefender Revenue Growth Rate in Endpoint Security Business (2015-2020)
Figure 57. Bottom-up and Top-down Approaches for This Report
Figure 58. Data Triangulation
Figure 59. Key Executives Interviewed