封面
市场调查报告书
商品编码
1925477

中阶终端保护软体市场(依终端类型、安全技术、部署类型及产业垂直领域划分)-全球预测(2026-2032年)

Mid-Sized Businesses Endpoint Protection Software Market by Endpoint Type, Security Technology, Deployment Mode, Industry Vertical - Global Forecast 2026-2032

出版日期: | 出版商: 360iResearch | 英文 186 Pages | 商品交期: 最快1-2个工作天内

价格

本网页内容可能与最新版本有所差异。详细情况请与我们联繫。

预计到 2025 年,中阶终端保护软体市场规模将达到 77.8 亿美元,到 2026 年将成长至 88.4 亿美元,到 2032 年将达到 198.5 亿美元,年复合成长率为 14.30%。

关键市场统计数据
基准年 2025 77.8亿美元
预计年份:2026年 88.4亿美元
预测年份 2032 198.5亿美元
复合年增长率 (%) 14.30%

策略概述清晰地阐述了为什么现代终端保护对于面临不断演变的威胁和日益复杂的业务的中型企业来说,应该成为一项跨职能的优先事项。

中型企业在终端安全防护方面面临独特且日益严峻的挑战,亟需采取策略应对措施。这些企业日益受到日益复杂的网路威胁和有限的IT预算的双重夹击,一旦遭受攻击,就可能导致业务中断、客户信任度下降以及监管机构的审查。随着远端办公和混合办公模式的普及,攻击面已扩展到传统企业边界之外,终端已成为通往敏感系统和资料的关键入口。

不断变化的工作模式、日益复杂的攻击者策略以及新一代防御创新正在如何重塑中型企业的终端安全防护策略

由于业务模式的改变、攻击者技术的进步以及防御技术的快速创新,端点保护格局正在经历变革性变化。远端和混合办公模式加剧了管理的去中心化以及对云端服务的依赖,迫使供应商重构解决方案,以实现分散式可见性和统一的策略执行。同时,攻击者正在利用自动化、本地资源攻击和供应链攻击等手段,使得传统的基于特征码的控制措施已不足以应对威胁。

分析近期关税政策和供应链重组如何为终端安全防护计画的采购带来复杂性,以及供应商的韧性问题。

2025年推出的关税和贸易措施为依赖国际供应链采购终端硬体和软体组件的企业带来了额外的复杂性。采购团队现在必须应对设备和应用的总到岸成本 (TLC) 可能增加的问题,以及供应商筹资策略的变化,这些变化可能会影响供应和前置作业时间。这些情况迫使安全和采购负责人重新评估采购框架、合约条款和库存缓衝,以维持业务连续性。

透过对部署模式、终端类型、安全技术选择和特定产业趋势的剖析,识别出可操作的、主导细分市场的部署策略和优先顺序。

細項分析揭示了影响采购决策和部署计划的可操作差异。在考虑部署模式时,组织必须仔细权衡以下利弊:- 云端原生管理,实现快速扩展和简化更新;- 混合方法,将本地控制与云端协作相结合,以在过渡期间保持柔软性;- 完全本地部署,以解决主权、延迟和遗留系统整合问题。这些选择直接影响营运成本、更新频率以及集中遥测资料以进行威胁搜寻的能力。

了解区域在法规、威胁行为和供应商生态系统方面的差异,以使端点保护策略与本地营运实际情况和全球目标保持一致。

区域趋势是策略的关键决定因素,威胁环境、法规结构和供应商格局的差异会影响解决方案的选择和部署方式。在美洲,资安管理服务的成熟以及以消费者保护和违规通知为重点的监管环境,正促使各组织优先考虑快速部署创新技术和整合服务模式。这促使采购方寻求具备强大遥测功能、与云端原生平台整合以及快速事件回应能力的解决方案。

深入了解供应商策略、伙伴关係模式和产品整合如何影响终端安全解决方案的采购标准和营运预期

供应商之间的竞争格局持续受到产品整合、通路伙伴关係以及託管/联合託管服务模式兴起的影响。供应商正日益将预防、侦测和回应能力整合到整合平台中,以减少分散并减轻内部团队的营运负担。同时,与身分识别提供者、云端平台和託管服务供应商的策略联盟正在推动更丰富的遥测整合和更自动化的遏制措施编配。

为经营团队提供可操作的、优先考虑的建议,以协调采购、营运和安全团队,部署具有弹性和永续的端点保护架构。

领导者首先应协调来自安全、IT维、采购和法务部门的高阶主管,制定统一的终端安全保护指南,在安全性、易用性和成本之间取得平衡。这种跨部门协作能够简化决策流程,并确保解决方案的选择符合合约条款、服务等级协议 (SLA) 和合规性要求。其次,应优先考虑那些提供灵活部署模式和精细策略控制的解决方案,以适应混合环境和未来的营运变化,同时避免过高的迁移成本。

采用严谨的混合方法研究途径,结合从业者访谈、技术检验和迭代专家评审,确保获得基于实际操作基础的可操作见解。

本报告的研究综合基于混合方法,重点在于检验和实践检验。主要质性研究包括对中型企业的安全负责人、IT维运经理和采购负责人进行结构化访谈,并辅以实践者研讨会,探讨实施挑战和决策标准。这些工作为理解现实世界的限制、整合优先顺序和营运权衡提供了背景资讯。

摘要强调了製定一体化、营运永续的端点保护策略的必要性,该策略应使安全目标与业务敏捷性和采购实际情况相一致。

对中型企业而言,有效的终端安全防护需要技术、流程和管治三者结合,并能适应不断变化的威胁和营运环境。本分析强调,企业需要摒弃零散的解决方案和分散的控制措施,转而采用能够提供可视性、快速回应和永续营运的整合策略。透过优先考虑灵活部署、针对不同终端类型的定向防护以及整合检测和回应能力,企业领导者可以更好地将安全投资与业务风险相匹配。

目录

第一章:序言

第二章调查方法

  • 研究设计
  • 研究框架
  • 市场规模预测
  • 数据三角测量
  • 调查结果
  • 调查前提
  • 调查限制

第三章执行摘要

  • 首席主管观点
  • 市场规模和成长趋势
  • 2025年市占率分析
  • FPNV定位矩阵,2025
  • 新的商机
  • 下一代经营模式
  • 产业蓝图

第四章 市场概览

  • 产业生态系与价值链分析
  • 波特五力分析
  • PESTEL 分析
  • 市场展望
  • 市场进入策略

第五章 市场洞察

  • 消费者洞察与终端用户观点
  • 消费者体验基准
  • 机会地图
  • 分销通路分析
  • 价格趋势分析
  • 监理合规和标准框架
  • ESG与永续性分析
  • 中断和风险情景
  • 投资报酬率和成本效益分析

第六章:美国关税的累积影响,2025年

第七章:人工智慧的累积影响,2025年

8. 按终端类型分類的中型企业终端保护软体市场

  • 桌面
  • 笔记型电脑
  • 行动装置
  • 伺服器

9. 中型企业终端安全防护软体市场(依安全技术划分)

  • 恶意软体防护
  • 防毒软体
  • 资料加密
  • 防火墙
  • 入侵防御

10. 中型企业终端安全防护软体市场依部署模式划分

  • 本地部署

第十一章:中型企业终端安全防护软体市场(依垂直产业划分)

  • BFSI
  • 教育
  • 政府/国防
  • 卫生保健
  • 资讯科技/通讯
  • 製造业
  • 零售

12. 中型企业终端安全保护软体市场(按地区划分)

  • 美洲
    • 北美洲
    • 拉丁美洲
  • 欧洲、中东和非洲
    • 欧洲
    • 中东
    • 非洲
  • 亚太地区

第十三章:中型企业终端安全防护软体市场(依组别划分)

  • ASEAN
  • GCC
  • EU
  • BRICS
  • G7
  • NATO

14. 各国中型企业终端安全防护软体市场

  • 我们
  • 加拿大
  • 墨西哥
  • 巴西
  • 英国
  • 德国
  • 法国
  • 俄罗斯
  • 义大利
  • 西班牙
  • 中国
  • 印度
  • 日本
  • 澳洲
  • 韩国

15. 美国中型企业终端安全保护软体市场

第十六章:中国中型企业终端安全防护软体市场

第十七章 竞争格局

  • 市场集中度分析,2025年
    • 浓度比(CR)
    • 赫芬达尔-赫希曼指数 (HHI)
  • 近期趋势及影响分析,2025 年
  • 2025年产品系列分析
  • 基准分析,2025 年
  • Acronis International GmbH
  • Bitdefender
  • BlackBerry Limited
  • Broadcom Inc
  • Carbon Black Inc
  • Check Point Software Technologies Ltd
  • Cisco Systems Inc
  • CrowdStrike Holdings Inc
  • Cylance Inc
  • ESET spol sro
  • F-Secure Corporation
  • FireEye Inc
  • Kaspersky Lab
  • Malwarebytes Corporation
  • McAfee LLC
  • Microsoft Corporation
  • Palo Alto Networks Inc
  • SentinelOne Inc
  • Tanium Inc
  • Trend Micro Incorporated
  • VMware Inc
  • Webroot Inc
Product Code: MRR-7A380DA7C649

The Mid-Sized Businesses Endpoint Protection Software Market was valued at USD 7.78 billion in 2025 and is projected to grow to USD 8.84 billion in 2026, with a CAGR of 14.30%, reaching USD 19.85 billion by 2032.

KEY MARKET STATISTICS
Base Year [2025] USD 7.78 billion
Estimated Year [2026] USD 8.84 billion
Forecast Year [2032] USD 19.85 billion
CAGR (%) 14.30%

A compelling strategic overview framing why modern endpoint protection must become a cross-functional priority for mid-sized enterprises confronting evolving threats and operational complexity

Mid-sized enterprises face a distinct and escalating set of endpoint protection challenges that demand urgent strategic attention. These organizations increasingly sit at the intersection of sophisticated threat actors and constrained IT budgets, creating a risk landscape where a single successful compromise can disrupt operations, erode customer trust, and trigger regulatory scrutiny. As remote and hybrid work patterns persist, the attack surface has expanded beyond traditional corporate boundaries, and endpoints now act as critical gateways to sensitive systems and data.

In response, IT leaders must reconcile competing priorities: maintaining operational agility, ensuring security hygiene, and delivering user experience that supports productivity. This requires a shift from reactive, signature-based defenses toward a layered approach that integrates behavioral analytics, threat intelligence, and simplified management. Equally important is the need for clear governance and procurement strategies that balance capital and operational expenditures while enabling rapid deployment and centralized visibility.

Transitioning to modern endpoint protection is not solely a technical project; it is an organizational transformation that touches procurement, legal, operations, and security teams. With thoughtful planning and cross-functional alignment, mid-sized organizations can deploy robust endpoint defenses that scale with growth, adapt to evolving threats, and support long-term resilience.

How evolving work models, advanced adversary techniques, and next-generation defensive innovations are reshaping endpoint protection strategies across mid-sized enterprises

The endpoint protection landscape is undergoing transformative shifts driven by changing work patterns, advances in attacker techniques, and rapid innovation in defensive technologies. Remote and hybrid work models have decentralized control and increased reliance on cloud services, prompting vendors to rearchitect solutions for distributed visibility and unified policy enforcement. At the same time, adversaries are leveraging automation, living-off-the-land tactics, and supply chain attacks that render legacy signature controls insufficient.

Emerging defensive capabilities, such as machine learning-driven behavioral analysis and integrated threat intelligence, are enabling earlier detection and more context-rich response. Likewise, consolidation of endpoint protection, detection, and response functions into cohesive platforms is reducing management overhead and improving investigative efficiency. As this convergence continues, interoperability with existing security stacks and identity solutions becomes a key determinant of deployment success.

Regulatory expectations and industry-specific compliance requirements are also reshaping priorities, pushing organizations to adopt stronger controls and demonstrable evidence of monitoring and response. Consequently, strategic buyers are favoring solutions that combine technical efficacy with operational pragmatism, enabling teams to defend proactively while preserving business continuity and user productivity.

Analyzing how recent tariff policies and supply chain reconfigurations create procurement complexity and vendor resilience considerations for endpoint protection programs

The introduction of tariffs and trade measures in 2025 introduces a tangible layer of complexity for organizations that depend on international supply chains for endpoint hardware and software components. Procurement teams must now contend with potential increases in total landed costs for devices and appliances, as well as shifts in vendor sourcing strategies that can affect availability and lead times. These dynamics compel security and procurement leaders to reassess procurement frameworks, contractual terms, and inventory buffers to maintain continuity of operations.

Beyond direct cost considerations, tariffs can spur vendors to reevaluate manufacturing footprints and partnerships, which in turn affects interoperability and support lifecycles. Software vendors that rely on hardware partners or bundled offerings may adjust pricing models, licensing structures, or support arrangements, creating downstream effects for organizations that prefer consolidated solutions. For IT leaders, this means a heightened need to scrutinize supplier resilience, contractual protections, and end-of-life policies.

Mitigation approaches include diversifying supplier ecosystems, prioritizing solutions with flexible deployment options, and negotiating service-level commitments that account for geopolitical disruptions. By proactively incorporating tariff-related risk into procurement and vendor risk-management processes, organizations can reduce friction, preserve deployment timelines, and sustain endpoint security posture despite shifting trade dynamics.

Deconstructing deployment modes, endpoint classes, security technology choices, and industry vertical dynamics to reveal pragmatic segmentation-driven deployment strategies and priorities

Segmentation analysis reveals actionable distinctions that influence procurement decisions and deployment planning. When considering deployment mode, organizations must weigh the trade-offs between cloud-native management for rapid scaling and simplified updates, hybrid approaches that blend on-premises control with cloud orchestration for transitional flexibility, and fully on-premises deployments that address sovereignty, latency, or legacy integration concerns. These choices directly affect operational overhead, update cadence, and the ability to centralize telemetry for threat hunting.

Examining endpoint types clarifies where defensive rigor must be concentrated: desktops remain central to daily productivity workflows, laptops present heightened exposure due to mobility, mobile devices introduce platform diversity and app-store vectors, and servers host critical workloads whose compromise can yield broader enterprise impact. Each endpoint class demands tailored controls, agent footprints, and telemetry collection strategies to balance performance with visibility.

Delving into security technology reveals that anti-malware and antivirus capabilities provide foundational prevention, while data encryption ensures protection of information at rest and in transit. Firewalls and intrusion prevention systems contribute critical network-layer controls that complement endpoint defenses, and increasingly, integrated detection and response capabilities are required to correlate signals and accelerate containment across environments. From an industry vertical perspective, the degree of regulatory scrutiny and operational sensitivity varies across domains such as BFSI, education, government and defense, healthcare, IT and telecom, manufacturing, and retail, shaping control requirements and incident response expectations. These segmentation lenses together inform prioritization, procurement criteria, and phased deployment strategies.

Navigating regional variations in regulation, threat behavior, and vendor ecosystems to align endpoint protection strategy with local operational realities and global objectives

Regional dynamics are a critical determinant of strategy, with differences in threat landscapes, regulatory frameworks, and vendor ecosystems shaping how solutions are selected and implemented. In the Americas, organizations tend to prioritize rapid innovation adoption and integrated service models, influenced by a maturity in managed security services and a regulatory environment that emphasizes consumer protection and breach notification. This encourages buyers to seek solutions that deliver strong telemetry, integration with cloud-native platforms, and rapid incident response capabilities.

Across Europe, the Middle East & Africa, regulatory rigor around data protection and cross-border data flows drives preference for solutions that support data residency, granular policy controls, and strong audit capabilities. Procurement cycles may be elongated due to compliance validations and regional supplier evaluations, while diversity in threat actor motivations across markets necessitates adaptable detection frameworks. By contrast, the Asia-Pacific region exhibits a heterogeneous mix of rapid digital adoption alongside varying regulatory regimes, which fosters demand for highly scalable solutions able to operate in multi-cloud environments and across diverse endpoint ecosystems. Partnerships with local channel and managed service providers often accelerate deployments and contextualize threat intelligence to regional patterns.

Taken together, regional nuances require vendors and buyers to align on deployment architectures, contractual terms, and incident handling protocols that reflect local realities while maintaining a coherent global security posture.

Insights into vendor strategies, partnership models, and product convergence shaping procurement criteria and operational expectations for endpoint protection solutions

Competitive dynamics among vendors continue to be shaped by product convergence, channel partnerships, and the rise of managed and co-managed service models. Vendors are increasingly bundling prevention, detection, and response capabilities into unified platforms to reduce fragmentation and lower the operational burden on internal teams. At the same time, strategic alliances with identity providers, cloud platforms, and managed service providers enable richer telemetry integration and more automated orchestration of containment actions.

From a procurement perspective, buyers now evaluate vendors not only on detection efficacy but also on integration maturity, support responsiveness, and the quality of managed services and professional services offerings. Differentiation is increasingly found in the depth of threat intelligence, the flexibility of deployment options, and the clarity of API-driven integrations that enable orchestration with existing security stacks. Vendor roadmaps that prioritize lightweight agents, low false positive rates, and transparent telemetry are particularly attractive to mid-sized organizations that seek strong security outcomes without excessive operational overhead.

Investment in usability, documentation, and partner enablement has become a competitive lever, as organizations frequently depend on third-party integrators and channel partners to accelerate rollouts. Additionally, vendors that offer robust training, playbooks, and incident response support earn trust from customers looking to raise their internal capabilities while maintaining a pragmatic path to implementation.

Actionable and prioritized recommendations for executives to align procurement, operations, and security teams to deploy resilient and sustainable endpoint protection architectures

Leaders should begin by aligning executive sponsors across security, IT operations, procurement, and legal to create a unified mandate for endpoint protection that balances security, usability, and cost. This cross-functional alignment streamlines decision-making and ensures that contractual terms, SLAs, and compliance needs are factored into solution selection. Next, prioritize solutions that offer flexible deployment models and granular policy controls to accommodate hybrid environments and future operational shifts without prohibitive migration costs.

Adopt a risk-based approach to asset prioritization so that protective controls and monitoring intensity are calibrated to business criticality. Implementing a phased rollout that starts with high-value endpoints and critical servers reduces exposure while proving operational processes. Complement this with rigorous vendor due diligence that assesses supplier resilience, support SLAs, and software supply chain hygiene. Where possible, negotiate contractual protections that address support continuity and clarity on patch and update cadences.

Invest in detection engineering, playbooks, and tabletop exercises to operationalize telemetry and accelerate response. This should be paired with training programs to elevate staff capabilities and with consideration of co-managed or fully managed service arrangements when internal capacity is constrained. Finally, incorporate periodic reviews of architecture and vendor performance to adapt to evolving threats and operational needs, ensuring that the endpoint protection strategy remains sustainably aligned with organizational objectives.

A rigorous mixed-methods research approach combining practitioner interviews, technical validation, and iterative expert review to ensure operationally grounded and actionable insights

The research synthesis underpinning this report relies on a mixed-methods approach that emphasizes triangulation and practical validation. Primary qualitative research consisted of structured interviews with security leaders, IT operations managers, and procurement professionals at mid-sized organizations, complemented by practitioner workshops that explored deployment challenges and decision criteria. These engagements provided context on real-world constraints, integration preferences, and operational trade-offs.

Secondary research involved a systematic review of vendor documentation, technical whitepapers, and publicly available incident analyses to map capability patterns and common failure modes. Technical validation included proofs-of-concept and agent performance assessments in representative environments to evaluate telemetry fidelity, resource utilization, and management console usability. Findings were cross-validated through expert panels and iterative feedback cycles to ensure that recommendations are grounded in operational feasibility.

Limitations include the inherent variability of organization-specific configurations and the pace of vendor innovation, which can alter feature sets between review cycles. To mitigate this, the methodology emphasizes principles and decision frameworks over vendor-specific endorsements, enabling readers to apply insights to their unique contexts while preserving relevance amid product evolution.

Concluding synthesis emphasizing the necessity of integrated, operationally sustainable endpoint protection strategies that reconcile security objectives with business agility and procurement realities

Effective endpoint protection for mid-sized organizations requires a synthesis of technology, process, and governance that adapts to shifting threats and operational realities. Throughout this analysis, the imperative has been clear: organizations must move beyond point solutions and disparate controls toward cohesive strategies that provide visibility, rapid response, and sustainable operations. By prioritizing flexible deployment modes, targeted protection for diverse endpoint types, and integrated detection and response capabilities, leaders can better align security investments with business risk.

Strategic procurement that accounts for supplier resilience, regional regulatory nuance, and evolving cost structures will be essential in maintaining continuity and enabling timely deployments. Equally important is investing in operational readiness through playbooks, training, and potential partnerships with managed service providers to bridge capability gaps. With disciplined governance and cross-functional collaboration, mid-sized enterprises can strengthen their security posture while preserving agility and user productivity.

The path forward emphasizes practical outcomes: resilient architectures, measurable improvements in detection and response times, and a procurement stance that favors adaptability and transparency. These priorities, pursued consistently, will position organizations to confront contemporary threats while supporting ongoing digital transformation.

Table of Contents

1. Preface

  • 1.1. Objectives of the Study
  • 1.2. Market Definition
  • 1.3. Market Segmentation & Coverage
  • 1.4. Years Considered for the Study
  • 1.5. Currency Considered for the Study
  • 1.6. Language Considered for the Study
  • 1.7. Key Stakeholders

2. Research Methodology

  • 2.1. Introduction
  • 2.2. Research Design
    • 2.2.1. Primary Research
    • 2.2.2. Secondary Research
  • 2.3. Research Framework
    • 2.3.1. Qualitative Analysis
    • 2.3.2. Quantitative Analysis
  • 2.4. Market Size Estimation
    • 2.4.1. Top-Down Approach
    • 2.4.2. Bottom-Up Approach
  • 2.5. Data Triangulation
  • 2.6. Research Outcomes
  • 2.7. Research Assumptions
  • 2.8. Research Limitations

3. Executive Summary

  • 3.1. Introduction
  • 3.2. CXO Perspective
  • 3.3. Market Size & Growth Trends
  • 3.4. Market Share Analysis, 2025
  • 3.5. FPNV Positioning Matrix, 2025
  • 3.6. New Revenue Opportunities
  • 3.7. Next-Generation Business Models
  • 3.8. Industry Roadmap

4. Market Overview

  • 4.1. Introduction
  • 4.2. Industry Ecosystem & Value Chain Analysis
    • 4.2.1. Supply-Side Analysis
    • 4.2.2. Demand-Side Analysis
    • 4.2.3. Stakeholder Analysis
  • 4.3. Porter's Five Forces Analysis
  • 4.4. PESTLE Analysis
  • 4.5. Market Outlook
    • 4.5.1. Near-Term Market Outlook (0-2 Years)
    • 4.5.2. Medium-Term Market Outlook (3-5 Years)
    • 4.5.3. Long-Term Market Outlook (5-10 Years)
  • 4.6. Go-to-Market Strategy

5. Market Insights

  • 5.1. Consumer Insights & End-User Perspective
  • 5.2. Consumer Experience Benchmarking
  • 5.3. Opportunity Mapping
  • 5.4. Distribution Channel Analysis
  • 5.5. Pricing Trend Analysis
  • 5.6. Regulatory Compliance & Standards Framework
  • 5.7. ESG & Sustainability Analysis
  • 5.8. Disruption & Risk Scenarios
  • 5.9. Return on Investment & Cost-Benefit Analysis

6. Cumulative Impact of United States Tariffs 2025

7. Cumulative Impact of Artificial Intelligence 2025

8. Mid-Sized Businesses Endpoint Protection Software Market, by Endpoint Type

  • 8.1. Desktop
  • 8.2. Laptop
  • 8.3. Mobile Device
  • 8.4. Server

9. Mid-Sized Businesses Endpoint Protection Software Market, by Security Technology

  • 9.1. Anti Malware
  • 9.2. Antivirus
  • 9.3. Data Encryption
  • 9.4. Firewall
  • 9.5. Intrusion Prevention

10. Mid-Sized Businesses Endpoint Protection Software Market, by Deployment Mode

  • 10.1. Cloud
  • 10.2. On Premises

11. Mid-Sized Businesses Endpoint Protection Software Market, by Industry Vertical

  • 11.1. Bfsi
  • 11.2. Education
  • 11.3. Government & Defense
  • 11.4. Healthcare
  • 11.5. It & Telecom
  • 11.6. Manufacturing
  • 11.7. Retail

12. Mid-Sized Businesses Endpoint Protection Software Market, by Region

  • 12.1. Americas
    • 12.1.1. North America
    • 12.1.2. Latin America
  • 12.2. Europe, Middle East & Africa
    • 12.2.1. Europe
    • 12.2.2. Middle East
    • 12.2.3. Africa
  • 12.3. Asia-Pacific

13. Mid-Sized Businesses Endpoint Protection Software Market, by Group

  • 13.1. ASEAN
  • 13.2. GCC
  • 13.3. European Union
  • 13.4. BRICS
  • 13.5. G7
  • 13.6. NATO

14. Mid-Sized Businesses Endpoint Protection Software Market, by Country

  • 14.1. United States
  • 14.2. Canada
  • 14.3. Mexico
  • 14.4. Brazil
  • 14.5. United Kingdom
  • 14.6. Germany
  • 14.7. France
  • 14.8. Russia
  • 14.9. Italy
  • 14.10. Spain
  • 14.11. China
  • 14.12. India
  • 14.13. Japan
  • 14.14. Australia
  • 14.15. South Korea

15. United States Mid-Sized Businesses Endpoint Protection Software Market

16. China Mid-Sized Businesses Endpoint Protection Software Market

17. Competitive Landscape

  • 17.1. Market Concentration Analysis, 2025
    • 17.1.1. Concentration Ratio (CR)
    • 17.1.2. Herfindahl Hirschman Index (HHI)
  • 17.2. Recent Developments & Impact Analysis, 2025
  • 17.3. Product Portfolio Analysis, 2025
  • 17.4. Benchmarking Analysis, 2025
  • 17.5. Acronis International GmbH
  • 17.6. Bitdefender
  • 17.7. BlackBerry Limited
  • 17.8. Broadcom Inc
  • 17.9. Carbon Black Inc
  • 17.10. Check Point Software Technologies Ltd
  • 17.11. Cisco Systems Inc
  • 17.12. CrowdStrike Holdings Inc
  • 17.13. Cylance Inc
  • 17.14. ESET spol s r o
  • 17.15. F-Secure Corporation
  • 17.16. FireEye Inc
  • 17.17. Kaspersky Lab
  • 17.18. Malwarebytes Corporation
  • 17.19. McAfee LLC
  • 17.20. Microsoft Corporation
  • 17.21. Palo Alto Networks Inc
  • 17.22. SentinelOne Inc
  • 17.23. Tanium Inc
  • 17.24. Trend Micro Incorporated
  • 17.25. VMware Inc
  • 17.26. Webroot Inc

LIST OF FIGURES

  • FIGURE 1. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, 2018-2032 (USD MILLION)
  • FIGURE 2. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SHARE, BY KEY PLAYER, 2025
  • FIGURE 3. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET, FPNV POSITIONING MATRIX, 2025
  • FIGURE 4. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 5. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 6. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 7. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 8. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY REGION, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 9. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY GROUP, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 10. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2025 VS 2026 VS 2032 (USD MILLION)
  • FIGURE 11. UNITED STATES MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, 2018-2032 (USD MILLION)
  • FIGURE 12. CHINA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, 2018-2032 (USD MILLION)

LIST OF TABLES

  • TABLE 1. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, 2018-2032 (USD MILLION)
  • TABLE 2. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 3. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DESKTOP, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 4. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DESKTOP, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 5. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DESKTOP, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 6. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY LAPTOP, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 7. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY LAPTOP, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 8. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY LAPTOP, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 9. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY MOBILE DEVICE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 10. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY MOBILE DEVICE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 11. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY MOBILE DEVICE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 12. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SERVER, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 13. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SERVER, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 14. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SERVER, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 15. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 16. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ANTI MALWARE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 17. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ANTI MALWARE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 18. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ANTI MALWARE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 19. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ANTIVIRUS, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 20. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ANTIVIRUS, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 21. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ANTIVIRUS, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 22. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DATA ENCRYPTION, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 23. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DATA ENCRYPTION, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 24. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DATA ENCRYPTION, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 25. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY FIREWALL, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 26. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY FIREWALL, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 27. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY FIREWALL, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 28. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INTRUSION PREVENTION, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 29. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INTRUSION PREVENTION, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 30. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INTRUSION PREVENTION, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 31. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 32. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY CLOUD, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 33. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY CLOUD, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 34. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY CLOUD, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 35. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ON PREMISES, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 36. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ON PREMISES, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 37. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ON PREMISES, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 38. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 39. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY BFSI, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 40. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY BFSI, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 41. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY BFSI, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 42. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY EDUCATION, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 43. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY EDUCATION, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 44. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY EDUCATION, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 45. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY GOVERNMENT & DEFENSE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 46. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY GOVERNMENT & DEFENSE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 47. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY GOVERNMENT & DEFENSE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 48. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY HEALTHCARE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 49. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY HEALTHCARE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 50. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY HEALTHCARE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 51. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY IT & TELECOM, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 52. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY IT & TELECOM, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 53. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY IT & TELECOM, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 54. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY MANUFACTURING, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 55. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY MANUFACTURING, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 56. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY MANUFACTURING, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 57. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY RETAIL, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 58. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY RETAIL, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 59. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY RETAIL, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 60. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY REGION, 2018-2032 (USD MILLION)
  • TABLE 61. AMERICAS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SUBREGION, 2018-2032 (USD MILLION)
  • TABLE 62. AMERICAS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 63. AMERICAS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 64. AMERICAS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 65. AMERICAS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 66. NORTH AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 67. NORTH AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 68. NORTH AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 69. NORTH AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 70. NORTH AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 71. LATIN AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 72. LATIN AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 73. LATIN AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 74. LATIN AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 75. LATIN AMERICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 76. EUROPE, MIDDLE EAST & AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SUBREGION, 2018-2032 (USD MILLION)
  • TABLE 77. EUROPE, MIDDLE EAST & AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 78. EUROPE, MIDDLE EAST & AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 79. EUROPE, MIDDLE EAST & AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 80. EUROPE, MIDDLE EAST & AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 81. EUROPE MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 82. EUROPE MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 83. EUROPE MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 84. EUROPE MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 85. EUROPE MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 86. MIDDLE EAST MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 87. MIDDLE EAST MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 88. MIDDLE EAST MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 89. MIDDLE EAST MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 90. MIDDLE EAST MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 91. AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 92. AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 93. AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 94. AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 95. AFRICA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 96. ASIA-PACIFIC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 97. ASIA-PACIFIC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 98. ASIA-PACIFIC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 99. ASIA-PACIFIC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 100. ASIA-PACIFIC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 101. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY GROUP, 2018-2032 (USD MILLION)
  • TABLE 102. ASEAN MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 103. ASEAN MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 104. ASEAN MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 105. ASEAN MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 106. ASEAN MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 107. GCC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 108. GCC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 109. GCC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 110. GCC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 111. GCC MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 112. EUROPEAN UNION MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 113. EUROPEAN UNION MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 114. EUROPEAN UNION MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 115. EUROPEAN UNION MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 116. EUROPEAN UNION MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 117. BRICS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 118. BRICS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 119. BRICS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 120. BRICS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 121. BRICS MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 122. G7 MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 123. G7 MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 124. G7 MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 125. G7 MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 126. G7 MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 127. NATO MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 128. NATO MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 129. NATO MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 130. NATO MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 131. NATO MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 132. GLOBAL MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY COUNTRY, 2018-2032 (USD MILLION)
  • TABLE 133. UNITED STATES MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, 2018-2032 (USD MILLION)
  • TABLE 134. UNITED STATES MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 135. UNITED STATES MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 136. UNITED STATES MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 137. UNITED STATES MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)
  • TABLE 138. CHINA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, 2018-2032 (USD MILLION)
  • TABLE 139. CHINA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY ENDPOINT TYPE, 2018-2032 (USD MILLION)
  • TABLE 140. CHINA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY SECURITY TECHNOLOGY, 2018-2032 (USD MILLION)
  • TABLE 141. CHINA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY DEPLOYMENT MODE, 2018-2032 (USD MILLION)
  • TABLE 142. CHINA MID-SIZED BUSINESSES ENDPOINT PROTECTION SOFTWARE MARKET SIZE, BY INDUSTRY VERTICAL, 2018-2032 (USD MILLION)