Global Automated Breach and Attack Simulation Market Size, Status and Forecast 2020-2026
Table of Contents1 Report Overview
1.1 Study Scope
1.2 Key Market Segments
1.3 Players Covered: Ranking by Automated Breach and Attack Simulation Revenue
1.4 Market Analysis by Type
1.4.1 Global Automated Breach and Attack Simulation Market Size Growth Rate by Type: 2020 VS 2026
1.4.2 Platforms/Tools
1.4.3 Services
1.5 Market by Application
1.5.1 Global Automated Breach and Attack Simulation Market Share by Application: 2020 VS 2026
1.5.2 Enterprise
1.5.3 Data Centers
1.5.4 Service Providers
1.6 Study Objectives
1.7 Years Considered
2 Global Growth Trends by Regions
2.1 Automated Breach and Attack Simulation Market Perspective (2015-2026)
2.2 Automated Breach and Attack Simulation Growth Trends by Regions
2.2.1 Automated Breach and Attack Simulation Market Size by Regions: 2015 VS 2020 VS 2026
2.2.2 Automated Breach and Attack Simulation Historic Market Share by Regions (2015-2020)
2.2.3 Automated Breach and Attack Simulation Forecasted Market Size by Regions (2021-2026)
2.3 Industry Trends and Growth Strategy
2.3.1 Market Top Trends
2.3.2 Market Drivers
2.3.3 Market Challenges
2.3.4 Porter's Five Forces Analysis
2.3.5 Automated Breach and Attack Simulation Market Growth Strategy
2.3.6 Primary Interviews with Key Automated Breach and Attack Simulation Players (Opinion Leaders)
3 Competition Landscape by Key Players
3.1 Global Top Automated Breach and Attack Simulation Players by Market Size
3.1.1 Global Top Automated Breach and Attack Simulation Players by Revenue (2015-2020)
3.1.2 Global Automated Breach and Attack Simulation Revenue Market Share by Players (2015-2020)
3.1.3 Global Automated Breach and Attack Simulation Market Share by Company Type (Tier 1, Tier 2 and Tier 3)
3.2 Global Automated Breach and Attack Simulation Market Concentration Ratio
3.2.1 Global Automated Breach and Attack Simulation Market Concentration Ratio (CR5 and HHI)
3.2.2 Global Top 10 and Top 5 Companies by Automated Breach and Attack Simulation Revenue in 2019
3.3 Automated Breach and Attack Simulation Key Players Head office and Area Served
3.4 Key Players Automated Breach and Attack Simulation Product Solution and Service
3.5 Date of Enter into Automated Breach and Attack Simulation Market
3.6 Mergers & Acquisitions, Expansion Plans
4 Breakdown Data by Type (2015-2026)
4.1 Global Automated Breach and Attack Simulation Historic Market Size by Type (2015-2020)
4.2 Global Automated Breach and Attack Simulation Forecasted Market Size by Type (2021-2026)
5 Automated Breach and Attack Simulation Breakdown Data by Application (2015-2026)
5.1 Global Automated Breach and Attack Simulation Market Size by Application (2015-2020)
5.2 Global Automated Breach and Attack Simulation Forecasted Market Size by Application (2021-2026)
6 North America
6.1 North America Automated Breach and Attack Simulation Market Size (2015-2020)
6.2 Automated Breach and Attack Simulation Key Players in North America (2019-2020)
6.3 North America Automated Breach and Attack Simulation Market Size by Type (2015-2020)
6.4 North America Automated Breach and Attack Simulation Market Size by Application (2015-2020)
7 Europe
7.1 Europe Automated Breach and Attack Simulation Market Size (2015-2020)
7.2 Automated Breach and Attack Simulation Key Players in Europe (2019-2020)
7.3 Europe Automated Breach and Attack Simulation Market Size by Type (2015-2020)
7.4 Europe Automated Breach and Attack Simulation Market Size by Application (2015-2020)
8 China
8.1 China Automated Breach and Attack Simulation Market Size (2015-2020)
8.2 Automated Breach and Attack Simulation Key Players in China (2019-2020)
8.3 China Automated Breach and Attack Simulation Market Size by Type (2015-2020)
8.4 China Automated Breach and Attack Simulation Market Size by Application (2015-2020)
9 Japan
9.1 Japan Automated Breach and Attack Simulation Market Size (2015-2020)
9.2 Automated Breach and Attack Simulation Key Players in Japan (2019-2020)
9.3 Japan Automated Breach and Attack Simulation Market Size by Type (2015-2020)
9.4 Japan Automated Breach and Attack Simulation Market Size by Application (2015-2020)
10 Southeast Asia
10.1 Southeast Asia Automated Breach and Attack Simulation Market Size (2015-2020)
10.2 Automated Breach and Attack Simulation Key Players in Southeast Asia (2019-2020)
10.3 Southeast Asia Automated Breach and Attack Simulation Market Size by Type (2015-2020)
10.4 Southeast Asia Automated Breach and Attack Simulation Market Size by Application (2015-2020)
11 India
11.1 India Automated Breach and Attack Simulation Market Size (2015-2020)
11.2 Automated Breach and Attack Simulation Key Players in India (2019-2020)
11.3 India Automated Breach and Attack Simulation Market Size by Type (2015-2020)
11.4 India Automated Breach and Attack Simulation Market Size by Application (2015-2020)
12 Central and South America
12.1 Central and South America Automated Breach and Attack Simulation Market Size (2015-2020)
12.2 Automated Breach and Attack Simulation Key Players in Central and South America (2019-2020)
12.3 Central and South America Automated Breach and Attack Simulation Market Size by Type (2015-2020)
12.4 Central and South America Automated Breach and Attack Simulation Market Size by Application (2015-2020)
13Key Players Profiles
13.1 Qualys
13.1.1 Qualys Company Details
13.1.2 Qualys Business Overview and Its Total Revenue
13.1.3 Qualys Automated Breach and Attack Simulation Introduction
13.1.4 Qualys Revenue in Automated Breach and Attack Simulation Business (2015-2020))
13.1.5 Qualys Recent Development
13.2 Rapid7
13.2.1 Rapid7 Company Details
13.2.2 Rapid7 Business Overview and Its Total Revenue
13.2.3 Rapid7 Automated Breach and Attack Simulation Introduction
13.2.4 Rapid7 Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.2.5 Rapid7 Recent Development
13.3 DXC Technology
13.3.1 DXC Technology Company Details
13.3.2 DXC Technology Business Overview and Its Total Revenue
13.3.3 DXC Technology Automated Breach and Attack Simulation Introduction
13.3.4 DXC Technology Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.3.5 DXC Technology Recent Development
13.4 AttackIQ
13.4.1 AttackIQ Company Details
13.4.2 AttackIQ Business Overview and Its Total Revenue
13.4.3 AttackIQ Automated Breach and Attack Simulation Introduction
13.4.4 AttackIQ Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.4.5 AttackIQ Recent Development
13.5 Cymulate
13.5.1 Cymulate Company Details
13.5.2 Cymulate Business Overview and Its Total Revenue
13.5.3 Cymulate Automated Breach and Attack Simulation Introduction
13.5.4 Cymulate Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.5.5 Cymulate Recent Development
13.6 XM Cyber
13.6.1 XM Cyber Company Details
13.6.2 XM Cyber Business Overview and Its Total Revenue
13.6.3 XM Cyber Automated Breach and Attack Simulation Introduction
13.6.4 XM Cyber Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.6.5 XM Cyber Recent Development
13.7 Skybox Security
13.7.1 Skybox Security Company Details
13.7.2 Skybox Security Business Overview and Its Total Revenue
13.7.3 Skybox Security Automated Breach and Attack Simulation Introduction
13.7.4 Skybox Security Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.7.5 Skybox Security Recent Development
13.8 SafeBreach
13.8.1 SafeBreach Company Details
13.8.2 SafeBreach Business Overview and Its Total Revenue
13.8.3 SafeBreach Automated Breach and Attack Simulation Introduction
13.8.4 SafeBreach Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.8.5 SafeBreach Recent Development
13.9 Firemon
13.9.1 Firemon Company Details
13.9.2 Firemon Business Overview and Its Total Revenue
13.9.3 Firemon Automated Breach and Attack Simulation Introduction
13.9.4 Firemon Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.9.5 Firemon Recent Development
13.10 Verdoin (FireEye)
13.10.1 Verdoin (FireEye) Company Details
13.10.2 Verdoin (FireEye) Business Overview and Its Total Revenue
13.10.3 Verdoin (FireEye) Automated Breach and Attack Simulation Introduction
13.10.4 Verdoin (FireEye) Revenue in Automated Breach and Attack Simulation Business (2015-2020)
13.10.5 Verdoin (FireEye) Recent Development
13.11 NopSec
10.11.1 NopSec Company Details
10.11.2 NopSec Business Overview and Its Total Revenue
10.11.3 NopSec Automated Breach and Attack Simulation Introduction
10.11.4 NopSec Revenue in Automated Breach and Attack Simulation Business (2015-2020)
10.11.5 NopSec Recent Development
13.12 Threatcare
10.12.1 Threatcare Company Details
10.12.2 Threatcare Business Overview and Its Total Revenue
10.12.3 Threatcare Automated Breach and Attack Simulation Introduction
10.12.4 Threatcare Revenue in Automated Breach and Attack Simulation Business (2015-2020)
10.12.5 Threatcare Recent Development
13.13 Mazebolt
10.13.1 Mazebolt Company Details
10.13.2 Mazebolt Business Overview and Its Total Revenue
10.13.3 Mazebolt Automated Breach and Attack Simulation Introduction
10.13.4 Mazebolt Revenue in Automated Breach and Attack Simulation Business (2015-2020)
10.13.5 Mazebolt Recent Development
13.14 Scythe
10.14.1 Scythe Company Details
10.14.2 Scythe Business Overview and Its Total Revenue
10.14.3 Scythe Automated Breach and Attack Simulation Introduction
10.14.4 Scythe Revenue in Automated Breach and Attack Simulation Business (2015-2020)
10.14.5 Scythe Recent Development
13.15 Cronus-Cyber Technologies
10.15.1 Cronus-Cyber Technologies Company Details
10.15.2 Cronus-Cyber Technologies Business Overview and Its Total Revenue
10.15.3 Cronus-Cyber Technologies Automated Breach and Attack Simulation Introduction
10.15.4 Cronus-Cyber Technologies Revenue in Automated Breach and Attack Simulation Business (2015-2020)
10.15.5 Cronus-Cyber Technologies Recent Development
14Analyst's Viewpoints/Conclusions
15Appendix
15.1 Research Methodology
15.1.1 Methodology/Research Approach
15.1.2 Data Source
15.2 Disclaimer
15.3 Author Details
List of TablesTable 1. Automated Breach and Attack Simulation Key Market Segments
Table 2. Key Players Covered: Ranking by Automated Breach and Attack Simulation Revenue
Table 3. Ranking of Global Top Automated Breach and Attack Simulation Manufacturers by Revenue (US$ Million) in 2019
Table 4. Global Automated Breach and Attack Simulation Market Size Growth Rate by Type (US$ Million): 2020 VS 2026
Table 5. Key Players of Platforms/Tools
Table 6. Key Players of Services
Table 7. Global Automated Breach and Attack Simulation Market Size Growth by Application (US$ Million): 2020 VS 2026
Table 8. Global Automated Breach and Attack Simulation Market Size by Regions (US$ Million): 2020 VS 2026
Table 9. Global Automated Breach and Attack Simulation Market Size by Regions (2015-2020) (US$ Million)
Table 10. Global Automated Breach and Attack Simulation Market Share by Regions (2015-2020)
Table 11. Global Automated Breach and Attack Simulation Forecasted Market Size by Regions (2021-2026) (US$ Million)
Table 12. Global Automated Breach and Attack Simulation Market Share by Regions (2021-2026)
Table 13. Market Top Trends
Table 14. Key Drivers: Impact Analysis
Table 15. Key Challenges
Table 16. Automated Breach and Attack Simulation Market Growth Strategy
Table 17. Main Points Interviewed from Key Automated Breach and Attack Simulation Players
Table 18. Global Automated Breach and Attack Simulation Revenue by Players (2015-2020) (Million US$)
Table 19. Global Automated Breach and Attack Simulation Market Share by Players (2015-2020)
Table 20. Global Top Automated Breach and Attack Simulation Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Automated Breach and Attack Simulation as of 2019)
Table 21. Global Automated Breach and Attack Simulation by Players Market Concentration Ratio (CR5 and HHI)
Table 22. Key Players Headquarters and Area Served
Table 23. Key Players Automated Breach and Attack Simulation Product Solution and Service
Table 24. Date of Enter into Automated Breach and Attack Simulation Market
Table 25. Mergers & Acquisitions, Expansion Plans
Table 26. Global Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 27. Global Automated Breach and Attack Simulation Market Size Share by Type (2015-2020)
Table 28. Global Automated Breach and Attack Simulation Revenue Market Share by Type (2021-2026)
Table 29. Global Automated Breach and Attack Simulation Market Size Share by Application (2015-2020)
Table 30. Global Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 31. Global Automated Breach and Attack Simulation Market Size Share by Application (2021-2026)
Table 32. North America Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 33. North America Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 34. North America Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 35. North America Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 36. North America Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 37. North America Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 38. Europe Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 39. Europe Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 40. Europe Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 41. Europe Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 42. Europe Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 43. Europe Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 44. China Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 45. China Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 46. China Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 47. China Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 48. China Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 49. China Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 50. Japan Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 51. Japan Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 52. Japan Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 53. Japan Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 54. Japan Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 55. Japan Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 56. Southeast Asia Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 57. Southeast Asia Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 58. Southeast Asia Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 59. Southeast Asia Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 60. Southeast Asia Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 61. Southeast Asia Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 62. India Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 63. India Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 64. India Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 65. India Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 66. India Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 67. India Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 68. Central and South America Key Players Automated Breach and Attack Simulation Revenue (2019-2020) (Million US$)
Table 69. Central and South America Key Players Automated Breach and Attack Simulation Market Share (2019-2020)
Table 70. Central and South America Automated Breach and Attack Simulation Market Size by Type (2015-2020) (Million US$)
Table 71. Central and South America Automated Breach and Attack Simulation Market Share by Type (2015-2020)
Table 72. Central and South America Automated Breach and Attack Simulation Market Size by Application (2015-2020) (Million US$)
Table 73. Central and South America Automated Breach and Attack Simulation Market Share by Application (2015-2020)
Table 74. Qualys Company Details
Table 75. Qualys Business Overview
Table 76. Qualys Product
Table 77. Qualys Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 78. Qualys Recent Development
Table 79. Rapid7 Company Details
Table 80. Rapid7 Business Overview
Table 81. Rapid7 Product
Table 82. Rapid7 Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 83. Rapid7 Recent Development
Table 84. DXC Technology Company Details
Table 85. DXC Technology Business Overview
Table 86. DXC Technology Product
Table 87. DXC Technology Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 88. DXC Technology Recent Development
Table 89. AttackIQ Company Details
Table 90. AttackIQ Business Overview
Table 91. AttackIQ Product
Table 92. AttackIQ Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 93. AttackIQ Recent Development
Table 94. Cymulate Company Details
Table 95. Cymulate Business Overview
Table 96. Cymulate Product
Table 97. Cymulate Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 98. Cymulate Recent Development
Table 99. XM Cyber Company Details
Table 100. XM Cyber Business Overview
Table 101. XM Cyber Product
Table 102. XM Cyber Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 103. XM Cyber Recent Development
Table 104. Skybox Security Company Details
Table 105. Skybox Security Business Overview
Table 106. Skybox Security Product
Table 107. Skybox Security Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 108. Skybox Security Recent Development
Table 109. SafeBreach Business Overview
Table 110. SafeBreach Product
Table 111. SafeBreach Company Details
Table 112. SafeBreach Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 113. SafeBreach Recent Development
Table 114. Firemon Company Details
Table 115. Firemon Business Overview
Table 116. Firemon Product
Table 117. Firemon Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 118. Firemon Recent Development
Table 119. Verdoin (FireEye) Company Details
Table 120. Verdoin (FireEye) Business Overview
Table 121. Verdoin (FireEye) Product
Table 122. Verdoin (FireEye) Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 123. Verdoin (FireEye) Recent Development
Table 124. NopSec Company Details
Table 125. NopSec Business Overview
Table 126. NopSec Product
Table 127. NopSec Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 128. NopSec Recent Development
Table 129. Threatcare Company Details
Table 130. Threatcare Business Overview
Table 131. Threatcare Product
Table 132. Threatcare Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 133. Threatcare Recent Development
Table 134. Mazebolt Company Details
Table 135. Mazebolt Business Overview
Table 136. Mazebolt Product
Table 137. Mazebolt Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 138. Mazebolt Recent Development
Table 139. Scythe Company Details
Table 140. Scythe Business Overview
Table 141. Scythe Product
Table 142. Scythe Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 143. Scythe Recent Development
Table 144. Cronus-Cyber Technologies Company Details
Table 145. Cronus-Cyber Technologies Business Overview
Table 146. Cronus-Cyber Technologies Product
Table 147. Cronus-Cyber Technologies Revenue in Automated Breach and Attack Simulation Business (2015-2020) (Million US$)
Table 148. Cronus-Cyber Technologies Recent Development
Table 149. Research Programs/Design for This Report
Table 150. Key Data Information from Secondary Sources
Table 151. Key Data Information from Primary Sources
List of FiguresFigure 1. Global Automated Breach and Attack Simulation Market Share by Type: 2020 VS 2026
Figure 2. Platforms/Tools Features
Figure 3. Services Features
Figure 4. Global Automated Breach and Attack Simulation Market Share by Application: 2020 VS 2026
Figure 5. Enterprise Case Studies
Figure 6. Data Centers Case Studies
Figure 7. Service Providers Case Studies
Figure 8. Automated Breach and Attack Simulation Report Years Considered
Figure 9. Global Automated Breach and Attack Simulation Market Size YoY Growth 2015-2026 (US$ Million)
Figure 10. Global Automated Breach and Attack Simulation Market Share by Regions: 2020 VS 2026
Figure 11. Global Automated Breach and Attack Simulation Market Share by Regions (2021-2026)
Figure 12. Porter's Five Forces Analysis
Figure 13. Global Automated Breach and Attack Simulation Market Share by Players in 2019
Figure 14. Global Top Automated Breach and Attack Simulation Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Automated Breach and Attack Simulation as of 2019
Figure 15. The Top 10 and 5 Players Market Share by Automated Breach and Attack Simulation Revenue in 2019
Figure 16. North America Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 17. Europe Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 18. China Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 19. Japan Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 20. Southeast Asia Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 21. India Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 22. Central and South America Automated Breach and Attack Simulation Market Size YoY Growth (2015-2020) (Million US$)
Figure 23. Qualys Total Revenue (US$ Million): 2019 Compared with 2018
Figure 24. Qualys Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 25. Rapid7 Total Revenue (US$ Million): 2019 Compared with 2018
Figure 26. Rapid7 Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 27. DXC Technology Total Revenue (US$ Million): 2019 Compared with 2018
Figure 28. DXC Technology Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 29. AttackIQ Total Revenue (US$ Million): 2019 Compared with 2018
Figure 30. AttackIQ Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 31. Cymulate Total Revenue (US$ Million): 2019 Compared with 2018
Figure 32. Cymulate Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 33. XM Cyber Total Revenue (US$ Million): 2019 Compared with 2018
Figure 34. XM Cyber Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 35. Skybox Security Total Revenue (US$ Million): 2019 Compared with 2018
Figure 36. Skybox Security Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 37. SafeBreach Total Revenue (US$ Million): 2019 Compared with 2018
Figure 38. SafeBreach Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 39. Firemon Total Revenue (US$ Million): 2019 Compared with 2018
Figure 40. Firemon Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 41. Verdoin (FireEye) Total Revenue (US$ Million): 2019 Compared with 2018
Figure 42. Verdoin (FireEye) Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 43. NopSec Total Revenue (US$ Million): 2019 Compared with 2018
Figure 44. NopSec Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 45. Threatcare Total Revenue (US$ Million): 2019 Compared with 2018
Figure 46. Threatcare Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 47. Mazebolt Total Revenue (US$ Million): 2019 Compared with 2018
Figure 48. Mazebolt Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 49. Scythe Total Revenue (US$ Million): 2019 Compared with 2018
Figure 50. Scythe Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 51. Cronus-Cyber Technologies Total Revenue (US$ Million): 2019 Compared with 2018
Figure 52. Cronus-Cyber Technologies Revenue Growth Rate in Automated Breach and Attack Simulation Business (2015-2020)
Figure 53. Bottom-up and Top-down Approaches for This Report
Figure 54. Data Triangulation
Figure 55. Key Executives Interviewed