Report Code: 10263 | Available Format: PDF
Chapter 1. Research Background
1.1. Research Objectives
1.2. Market Definition
1.3. Research Scope
1.3.1. Market Segmentation by Service Type
1.3.2. Market Segmentation by Cloud Type
1.3.3. Market Segmentation by Organization
1.3.4. Market Segmentation by Deployment Type
1.3.5. Market Segmentation by End-User
1.3.6. Market Segmentation by Geography
1.3.7. Analysis Period
1.3.8. Market Data Reporting Unit
1.4. Key Stakeholders
Chapter 2. Research Methodology
2.1. Secondary Research
2.2. Primary Research
2.2.1. Breakdown of Primary Research Respondents
2.2.1.1. By Region
2.2.1.2. By Industry experts
2.3. Market Size Estimation
2.4. Market Breakdown and Data Triangulation
2.5. Assumptions for the Study
Chapter 3. Introduction
3.1. Market Segmentation
3.1.1. Overview by Service Type
3.1.1.1. Back up services
3.1.1.2. Real time replication services
3.1.1.3. Data security services
3.1.1.4. Managed services
3.1.2. Overview by Cloud Type
3.1.2.1. Public cloud
3.1.2.2. Private cloud
3.1.2.3. Hybrid cloud
3.1.3. Overview by Organization
3.1.3.1. Small & medium enterprise s(SMEs)
3.1.3.2. Large enterprises
3.1.4. Overview by Deployment Type
3.1.4.1. To cloud
3.1.4.2. In cloud
3.1.4.3. From cloud
3.1.5. Overview by End-User
3.1.5.1. Banking, financial services & insurance
3.1.5.2. Healthcare
3.1.5.3. IT & telecom
3.1.5.4. Media & entertainment
3.1.5.5. Retail & ecommerce
3.1.5.6. Government
3.1.5.7. Others (include education, and manufacturing)
3.2. Value Chain Analysis
3.3. Market Dynamics
3.3.1. Trends
3.3.2. Drivers
3.3.2.1. Impact analysis of drivers on market forecast
3.3.3. Restraints
3.3.3.1. Impact analysis of restraints on market forecast
3.3.4. Opportunities
3.4. Porter’s Five Forces Analysis
Chapter 4. Market Size and Forecast by Service Type
4.1. Back-up Services
4.2. Real-time Replication Services
4.3. Data Security Services
4.4. Managed Services
Chapter 5. Market Size and Forecast by End-User
5.1. Banking, Financial Services & Insurance
5.2. Healthcare
5.3. IT & Telecom
5.4. Media & Entertainment
5.5. Retail & Ecommerce
5.6. Government
5.7. Others
Chapter 6. Market Size and Forecast by Geography
6.1. North America Disaster Recovery as a Service Market
6.1.1. Market by Service Type
6.1.2. Market by Cloud Type
6.1.3. Market by Organization Type
6.1.4. Market by Deployment Type
6.1.5. Market by End-User
6.1.6. Market by Country (U.S. and Rest of North America)
6.2. Europe Disaster Recovery as a Service Market
6.2.1. Market by Service Type
6.2.2. Market by Cloud Type
6.2.3. Market by Organization Type
6.2.4. Market by Deployment Type
6.2.5. Market by End-User
6.2.6. Market by Country (U.K., France, Germany, and Rest of Europe)
6.3. Asia-Pacific Disaster Recovery as a Service Market
6.3.1. Market by Service Type
6.3.2. Market by Cloud Type
6.3.3. Market by Organization Type
6.3.4. Market by Deployment Type
6.3.5. Market by End-User
6.3.6. Market by Country (China, Japan, and Rest of Asia-Pacific)
6.4. Middle-East & Africa (MEA) Disaster Recovery as a Service Market
6.4.1. Market by Service Type
6.4.2. Market by Cloud Type
6.4.3. Market by Organization Type
6.4.4. Market by Deployment Type
6.4.5. Market by End-User
6.4.6. Market by Country (U.A.E., Saudi Arabia, and Rest of MEA)
6.5. Latin America Disaster Recovery as a Service Market
6.5.1. Market by Service Type
6.5.2. Market by Cloud Type
6.5.3. Market by Organization Type
6.5.4. Market by Deployment Type
6.5.5. Market by End-User
6.5.6. Market by Country (Brazil, and Rest of Latin America)
Chapter 7. Competitive Landscape
7.1. Competitive Analysis of Key Players
7.2. Product Benchmarking of Key Players
7.3. Recent Activity of Key Players
7.4. Global Strategic Developments
Chapter 8. Company Profiles
8.1. IBM Corporation
8.1.1. Business Overview
8.1.2. Product and Service Offerings
8.1.3. Key Financial Summary
8.1.4. Strategic Growth Plans
8.2. Cisco System Inc.
8.2.1. Business Overview
8.2.2. Product and Service Offerings
8.2.3. Key Financial Summary
8.2.4. Strategic Growth Plans
8.3. Amazon Web Services Inc.
8.3.1. Business Overview
8.3.2. Product and Service Offerings
8.3.3. Key Financial Summary
8.3.4. Strategic Growth Plans
8.4. Rackspace Inc.
8.4.1. Business Overview
8.4.2. Product and Service Offerings
8.4.3. Key Financial Summary
8.4.4. Strategic Growth Plans
8.5. Microsoft Corporation
8.5.1. Business Overview
8.5.2. Product and Service Offerings
8.5.3. Key Financial Summary
8.5.4. Strategic Growth Plans
8.6. Oracle Corporation
8.6.1. Business Overview
8.6.2. Product and Service Offerings
8.6.3. Key Financial Summary
8.6.4. Strategic Growth Plans
8.7. Hewlett Packard Enterprises
8.7.1. Business Overview
8.7.2. Product and Service Offerings
8.7.3. Key Financial Summary
8.7.4. Strategic Growth Plans
8.8. Symantec Corporation
8.8.1. Business Overview
8.8.2. Product and Service Offerings
8.8.3. Key Financial Summary
8.8.4. Strategic Growth Plans
8.9. Sungard Availability Services
8.9.1. Business Overview
8.9.2. Product and Service Offerings
8.9.3. Key Financial Summary
8.9.4. Strategic Growth Plans
8.10. Dell EMC
8.10.1. Business Overview
8.10.2. Product and Service Offerings
8.10.3. Key Financial Summary
8.10.4. Strategic Growth Plans
Note: Key financial summary and strategic growth plans would be provided on best effort basis and is subject to availability of information through primary and secondary research
Chapter 9. Appendix
9.1. Abbreviations
Want a report tailored exactly to your business strategy?
Request CustomizationWant an insight-rich discussion with the report author?
Speak to AnalystOur dedication to providing the most-accurate market information has earned us verification by Dun & Bradstreet (D&B). We strive for quality checking of the highest level to enable data-driven decision making for you
Our insights into the minutest levels of the markets, including the latest trends and competitive landscape, give you all the answers you need to take your business to new heights
With 24/7 research support, we ensure that the wheels of your business never stop turning. Don’t let time stand in your way. Get all your queries answered with a simple phone call or email, as and when required
We take a cautious approach to protecting your personal and confidential information. Trust is the strongest bond that connects us and our clients, and trust we build by complying with all international and domestic data protection and privacy laws