Lawful interception activities are inseparable part of telecommunication. Such activities are practiced across the globe from several decades. However, the recent developments in the data based communications have unveiled new channels for lawful interception. The evolvement in networks, and increased telecommunication activities is driving the lawful interception activities. Moreover, the security threats to various nations due to rising terrorism activities and cyber-crimes are key factors that lead to lawful interception activities. Top players are commonly adopting product launch, acquisition, partnerships and collaborations as major developmental strategies to help expand their global reach, strengthen product lines, and improve solutions; hence, enabling them to penetrate the global lawful interception market. For instance, FireEye has launched a threat analytics platform, which would serve Amazon Web Service customers. The service has helped the AWS to offer higher protection to confidential information of customers.
There is a growing tendency among the governments to update the laws pertaining to lawful interception. The selective focus of law enforcement agencies is expected to drive the lawful interception activities by greater extent. Additionally, emerging markets such as China, India and African countries would increase the lawful interception in corresponding regions. The global lawful interception market is anticipated to reach $2,100 million in 2020, at a CAGR of 20.8 % from 2014 to 2020.
Lawful interception is rapidly gaining importance and is expected to grow in the years to come. Supporting the process of lawful interception has become mandatory for the network providers due to the laws drafted by the governments of various nations. The LI market is expected to grow by leaps and bounds due to the rising criminal activities which are accomplished with help of advanced communication devices such as smart phones, tablets, etc. Government bodies and law enforcement agencies across the globe strive day and night to curb unlawful activities and avoid mishaps. In order to achieve this, the law enforcement agencies keep a constant vigil on various communication channels and trace criminals. In the days to come, LI will be seen as a very crucial aspect in the world of communication, thus increasing its demand.
The global market is segmented based on solutions, network technologies, components, communication technologies, end-users and geography. Geographically, the market is segmented into different regions such as North America, Europe, Asia Pacific and LAMEA. Among all, Asia-Pacific region has higher potential to grow, as a result of evolving network technologies and security threats to various nations.
Key Benefits
The study provides an in-depth analysis of the global Lawful Interception market with current and future trends to elucidate the imminent investment pockets in the market
Current and future trends are outlined to determine the overall attractiveness of the market and single out profitable trends to gain a stronger foothold in the market
Quantitative analysis of the current market and estimations through 2013-2020 are provided to showcase the financial caliber of the market
Drivers and opportunities are evaluated to highlight the top factors responsible for market growth. Various segments are carefully evaluated to gauge the potential of the market
Porters Five Forces model and SWOT analysis of the industry illustrates the potency of the buyers & suppliers participating in the market
Key Market Segments
Global Lawful Interception market by Solutions
Devices
Software
Services
Global Lawful Interception market by Components
Mediation devices
Routers
Intercept access point (IAP)
Gateways
Switch
Handover interface
Management server
Global Lawful Interception market by Network Technology
Voice-Over-Internet Protocol (VoIP)
Long Term Evolution (LTE)
Wireless Local Area Network (WLAN)
Worldwide Interoperability For Microwave Access (WiMAX)
Digital Subscriber Line (DSL)
Public Switched Telephone Network (PSTN)
Integrated Services For Digital Network (ISDN)
Mobile voice telephony
Mobile data communication
TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION
1.1 Report Description
1.2 Reason for doing the study
1.3 Key Benefits
1.4 Key Market Segments
1.5 Research Methodology
1.5.1 Primary Research
1.5.2 Secondary Research
1.5.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
2.1 CXO perspective
2.2 Market beyond what to expect by 2025 ($Million)
2.2.1 Moderate growth scenario
2.2.2 Rapid growth scenario
2.2.3 Diminishing growth scenario
CHAPTER 3 MARKET OVERVIEW
3.1 Market Definition and Scope
3.2 Lawful Interception – An Introduction
3.3 Key Findings
3.3.1 Top Factors Impacting on Lawful Interception Market
3.3.2 Top Investment Pockets of Lawful Interception Market
3.3.3 Top winning strategies in Lawful Interception Market
3.4 Lawful Interception in Africa
3.5 Umbrella Systems – A cost effective LI for developing countries
3.6 Globally Recognized LI Regulations and Standards
3.6.1 European Telecommunications Standards Institute (ETSI)
3.6.2 3rd Generation Partnership Project (3GPP)
3.6.3 Communication Assistance for Law Enforcement Act (CALEA)
3.6.4 Alliance for Telecommunications Industry Solutions/ American Standardisation Institution (ANSI/ ATIS)
3.6.5 SORM
3.6.6 CableLabs/ PacketCable
3.7 Porter’s Five force Analysis
3.7.1 Concentrated number of suppliers as compared to end users and high emphasis on maintaining confidentiality of data increases the bargaining power of supplier
3.7.2 High switching cost and mandatory government regulations for implementing LI reduce the bargaining power of the buyer
3.7.3 Lack of superior alternative technology leads to low threat of substitutes
3.7.4 Stringent government regulations and high research & development cost reduce the threat of new entrant
3.7.5 Undifferentiated products and presence of dominant market players increase the rivalry within the industry
3.8 Market Share Analysis- 2013
3.9 Drivers
3.9.1 Rising criminal activities
3.9.2 Dramatic increase in interception warrants
3.9.3 Rising volume of data traffic and security threats
3.9.4 Growing popularity of social media communications
3.10 Restraints
3.10.1 Adherence to rules
3.10.2 Maintaining privacy
3.11 Opportunities
3.11.1 Regulation enforcements
3.11.2 Advancements in network technologies
CHAPTER 4 GLOBAL LAWFUL INTERCEPTION MARKET BY SOLUTIONS
4.1 Market Size and Forecast
4.2 Devices
4.2.1 Key market trends
4.2.2 Competitive Scenario
4.2.3 Key market drivers and opportunities
4.2.4 Market Size and Forecast
4.3 Software
4.3.1 Key market trends
4.3.2 Competitive scenario
4.3.3 Key market drivers and opportunities
4.3.4 Market Size and Forecast
4.4 Services
4.4.1 Key market trends
4.4.2 Competitive scenario
4.4.3 Key market drivers and opportunities
4.4.4 Market Size and Forecast
CHAPTER 5 GLOBAL LAWFUL INTERCEPTION MARKET BY COMPONENTS
5.1 Market Size and Forecast
5.2 Mediation devices
5.2.1 Key market trends
5.2.2 Key Opportunities
5.2.3 Market Size and Forecast
5.3 Routers
5.3.1 Key market trends
5.3.2 Key Opportunities
5.3.3 Market Size and Forecast
5.4 Gateways
5.4.1 Key market trends
5.4.2 Key Opportunities
5.4.3 Market Size and Forecast
5.5 Intercept access point
5.5.1 Key market trends
5.5.2 Key Opportunities
5.5.3 Market Size and Forecast
5.6 Switch
5.6.1 Key market trends
5.6.2 Key Opportunities
5.6.3 Market Size and Forecast
5.7 Management Server
5.7.1 Key market trends
5.7.2 Key Opportunities
5.7.3 Market Size and Forecast
5.8 Handover Interface
5.8.1 Key Market Trends
5.8.2 Key Opportunities
5.8.3 Market Size and Forecast
CHAPTER 6 GLOBAL LAWFUL INTERCEPTION MARKET BY NETWORK TECHNOLOGY
6.1 Market Size and Forecast
6.2 Voice-Over-Internet Protocol (VoIP)
6.2.1 Key market trends
6.2.2 Key growth factors and opportunities
6.2.3 Market size and Forecast
6.3 Wireless local area network (WLAN)
6.3.1 Key market trends
6.3.2 Key growth factors and opportunities
6.3.3 Market size and Forecast
6.4 Worldwide Interoperability for Microwave Access (WiMax)
6.4.1 Key market trends
6.4.2 Restraints
6.4.3 Market size and forecast
6.5 Digital Subscriber Line (DSL)
6.5.1 Key market trends
6.5.2 Key growth factors and opportunities
6.5.3 Market size and Forecast
6.6 Public Switched Telephone Network (PSTN)
6.6.1 Key market trends
6.6.2 Key growth factors and opportunities
6.6.3 Market size and Forecast
6.7 Integrated Services for Digital Network (ISDN)
6.7.1 Key market trends
6.7.2 Key growth factors and opportunities
6.7.3 Market size and Forecast
6.8 Mobile voice telephony
6.8.1 Key market trends
6.8.2 Key growth factors and opportunities
6.8.3 Market size and Forecast
6.9 Mobile data communication
6.9.1 Market Size and Forecast
6.9.2 Key market trends
6.9.3 Market Size and Forecast
6.9.4 Next-Generation Network (NGN)
6.9.4.1 Key market trends
6.9.4.2 Key growth factors and opportunities
6.9.5 Long-Term Evolution (4G/LTE)
6.9.5.1 Key market trends
6.9.5.2 Key growth factors and opportunities
6.9.6 Third generation mobile networks: 3G
6.9.6.1 Key market trends
6.9.7 Second generation mobile generation: 2G
6.9.7.1 GPRS (General Packet Radio Service)
6.9.7.2 EDGE (Enhanced Data Rates for GSM and TDMA Evolution)
6.9.7.3 CDMA2000 1X RTT
CHAPTER 7 GLOBAL LAWFUL INTERCEPTION MARKET BY COMMUNICATION TECHNOLOGY
7.1 Market Size and Forecast
7.2 Voice Communication
7.2.1 Key market trends
7.2.2 Key growth factors and opportunities
7.2.3 Market size and Forecast
7.3 Video
7.3.1 Key market trends
7.3.2 Key growth factors and opportunities
7.3.3 Market size and Forecast
7.4 Text messaging
7.4.1 Key market trends
7.4.2 Key growth factors and opportunities
7.4.3 Market size and Forecast
7.5 Facsimile
7.5.1 Key market trends
7.5.2 Key growth factors and opportunities
7.5.3 Market size and Forecast
7.6 Digital Pictures
7.6.1 Key market trends
7.6.2 Key growth factors and opportunities
7.6.3 Market size and Forecast
7.7 Data downloads
7.7.1 Key market trends
7.7.2 Key growth factors and opportunities
7.7.3 Market size and Forecast
7.8 File transfer
7.8.1 Key market trends
7.8.2 Key growth factors and opportunities
7.8.3 Market size and Forecast
CHAPTER 8 GLOBAL LAWFUL INTERCEPTION MARKET BY END USER
8.1 Market Size and Forecast
8.2 Government
8.2.1 Market size and Forecast
8.2.2 Departments of Governments and other Statutory Authorities
8.2.3 Law Enforcement Agencies (LEAs)
8.3 Enterprises
8.3.1 Market size and Forecast
CHAPTER 9 GLOBAL LAWFUL INTERCEPTION MARKET, BY REGION
9.1 North America
9.1.1 Key Market Trends:
9.1.2 Competitive Scenario
9.1.3 Key growth factors and opportunities
9.1.4 Market Size and Forecast
9.2 Europe
9.2.1 Key market Trends
9.2.2 Competitive Scenario
9.2.3 Key growth factors and opportunities
9.2.4 Market Size and Forecast
9.3 Asia-Pacific
9.3.1 Key Market Trends
9.3.2 Competitive Scenario
9.3.3 Key growth factors and opportunities
9.3.4 Market Size and Forecast
9.4 Latin America, Middle East & Africa (LAMEA)
9.4.1 Key Market Trends
9.4.2 Competitive Scenario
9.4.3 Key growth factors and opportunities
9.4.4 Market Size and Forecast
CHAPTER 10 COMPANY PROFILES
10.1 Verint Systems
10.1.1 Verint Overview
10.1.2 Operating Segment
10.1.3 Business performance
10.1.4 Key strategies and developments
10.1.5 SWOT analysis of Verint business
10.2 RSA NetWitness Corporation (EMC Corporation)
10.2.1 RSA NetWitness Corporation Overview
10.2.2 Operating Segment
10.2.3 Business performance of RSA NetWitness
10.2.4 Key strategies and developments
10.2.4.1 Primary Strategies: partnership
10.2.4.2 Secondary Strategies: product launch
10.2.5 SWOT analysis of RSA NetWitness business
10.3 NICE Systems
10.3.1 NICE Systems Overview
10.3.2 Operating Segment
10.3.3 Business Performance
10.3.4 Key strategies and developments
10.3.5 SWOT Analysis
10.4 BAE Systems
10.4.1 BAE Systems Overview
10.4.2 Operating Segment
10.4.3 Business performance
10.4.4 Key strategies and developments
10.4.5 SWOT analysis of BAE Systems business
10.5 Fire Eye
10.5.1 Fire Eye Overview
10.5.2 Operating Segment
10.5.3 Business Performance
10.5.4 Key Strategies and developments
10.5.5 SWOT Analysis
10.6 ROHDE and SCHWARZ
10.6.1 ROHDE and SCHWARZ Overview
10.6.2 Operating Segment
10.6.3 Business performance
10.6.4 Key strategies and developments
10.6.5 SWOT analysis of ROHDE and SCHWARZ business
10.7 SS8 Incorporation
10.7.1 SS8 Inc. Overview
10.7.2 SWOT analysis of SS8 Incorporation
10.8 JSI Telecom
10.8.1 Company Overview
10.8.2 SWOT Analysis
10.9 Aqsacom
10.9.1 Company overview
10.9.2 Key strategies and developments
10.9.3 SWOT analysis of Aqsacom
10.10 Utimaco (Sophos)
10.10.1 Utimaco Overview
10.10.2 Business performance
10.10.3 SWOT analysis of Utimaco Safeware Inc.
10.11 Incognito Software
10.11.1 Incognito Software Overview
10.11.2 Key strategies and developments
10.11.3 SWOT analysis of Incognito Software
10.12 Net Optics, Inc.
10.12.1 Net Optics Overview
10.12.2 Business performance
10.12.3 Key strategies and developments
10.12.4 SWOT analysis of Net Optics
10.13 Netscout
10.13.1 Netscout Overview
10.13.2 Business performance
10.13.3 Key strategies and developments
10.13.4 SWOT analysis of NetScout Systems
10.14 Cisco Systems, Inc.
10.14.1 Company Overview
10.14.2 Business performance
10.14.3 SWOT analysis & strategic conclusion
10.15 ZTE Corporation
10.15.1 ZTE Corporation Overview
10.15.2 Business performance
10.15.3 Key strategies and developments
10.15.4 SWOT analysis of ZTE Corporation
10.16 Siemens AG
10.16.1 Siemens AG Overview
10.16.2 Business performance
10.16.3 Key strategies and developments
10.16.4 SWOT analysis of Siemens AG
LIST OF TABLES
TABLE 1 GLOBAL LAWFUL INTERCEPTION MARKET, 2013-2020 ($MILLION)
TABLE 2 Global lawful interception market moderate growth scenario, 2020-2025 ($million)
TABLE 3 Global lawful interception market rapid growth scenario, 2020-2025 ($million)
TABLE 4 Global lawful interception market diminishing growth scenario, 2020-2025 ($million)
TABLE 5 Major government agencies and LEAs involved in Lawful Interception
TABLE 6 Key Vendors and other organizations involved in LI
TABLE 7 List of All ETSI Full Members - ETSI Associate Members - Observers – Counsellors (750 members, 63 countries)
TABLE 8 Global lawful interception market by solutions, 2013-2020 ($MILLION)
TABLE 9 Global l lawful interception devices market by region, 2013-2020 ($MILLION)
TABLE 10 Global software lawful interception market by region, 2013-2020 ($MILLION)
TABLE 11 Global lawful interception services market by region, 2013-2020 ($MILLION)
TABLE 12 Global l lawful interception market by components, 2013-2020 ($MILLION)
TABLE 13 Global l mediation devices lawful interception solutions market By region, 2013-2020 ($MILLION)
TABLE 14 Global routers lawful interception market by region, 2013-2020 ($MILLION)
TABLE 15 Global gateways lawful interception market by region, 2013-2020 ($MILLION)
TABLE 16 Global IAP lawful interception market by region, 2013-2020 ($MILLION)
TABLE 17 Global l switches lawful interception market by region, 2013-2020 ($MILLION)
TABLE 18 Global l management servers lawful interception market by region, 2013-2020 ($MILLION)
TABLE 19 Global handover interfaces lawful interception market by region, 2013-2020 ($MILLION)
TABLE 20 Global lawful interception market by network technology, 2013-2020 ($MILLION)
TABLE 21 Global voip lawful interception market by region, 2013-2020 ($MILLION)
TABLE 22 Global voip lawful interception market by region, 2013-2020 ($MILLION)
TABLE 23 Global wimax lawful interception market by region, 2013-2020 ($MILLION)
TABLE 24 Global dsl lawful interception market by region, 2013-2020 ($MILLION)
TABLE 25 Global pstn lawful interception market by region, 2013-2020 ($MILLION)
TABLE 26 Global isdn lawful interception market by region, 2013-2020 ($MILLION)
TABLE 27 Global mobile voice telephony lawful interception market by region, 2013-2020 ($MILLION)
TABLE 28 Global lawful interception Mobile data market by Type, 2013-2020 ($MILLION)
TABLE 29 Global mobile data communication lawful interception market by region, 2013-2020 ($MILLION)
TABLE 30 GLOBAL LAWFUL INTERCEPTION MARKET REVENUE, BY COMMUNICATION TECHNOLOGY, 2013-2020 ($MILLION)
TABLE 31 GLOBAL VOICE COMMUNICATION LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 32 GLOBAL VIDEO LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 33 GLOBAL TEXT MESSAGING LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 34 GLOBAL FACSIMILE LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 35 GLOBAL DIGITAL PICTURES LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 36 GLOBAL DATA DOWNLOAD LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 37 GLOBAL FILE TRANSFER LAWFUL INTERCEPTION MARKET REVENUE, BY REGION, 2013-2020 ($MILLION)
TABLE 38 Global lawful interception market by end-users, 2013-2020 ($MILLION)
TABLE 39 Global l GOVERNMENT USERS lawful interception market by REGION, 2013-2020 ($MILLION)
TABLE 40 Global enterprise users lawful interception market by REGION ($million), 2013-2020
TABLE 41 North american lawful interception market by network technologies, 2013-2020 ($MILLION)
TABLE 42 European lawful interception market by network technologies, 2013-2020 ($MILLION)
TABLE 43 Asian-pacific lawful interception market by network technologies, 2013-2020 ($MILLION)
TABLE 44 Lamea lawful interception market by network technologies, 2013-2020 ($MILLION)
TABLE 45 Verint business SNAPSHOT
TABLE 46 Verint Systems Operating Segment Overview
TABLE 47 RSA NetWitness Corporation business SNAPSHOT
TABLE 48 RSA NetWitness Operating Segment Overview
TABLE 49 NICE Systems Business Snapshot
TABLE 50 Nice Systems Operating Segment overview
TABLE 51 Bae systems business SNAPSHOT
TABLE 52 Bae systems Operating Segment Overview
TABLE 53 Fire Eye Company Snapshot
TABLE 54 Fire Eye Operating Segment Overview
TABLE 55 ROHDE and SCHWARZ business SNAPSHOT
TABLE 56 ROHDE and SCHWARZ Operating Segment Overview
TABLE 57 SS8 Incorporation business SNAPSHOT
TABLE 58 JSI Telecom Company Snapshot
TABLE 59 Aqsacom Company Snapshot
TABLE 60 Utimaco business snapshot
TABLE 61 Incognito Software business snapshot
TABLE 62 Net Optics business SNAPSHOT
TABLE 63 Netscout business snapshot
TABLE 64 Cisco systems business SNAPSHOT
TABLE 65 Swot analysis of cisco corporation
TABLE 66 ZTE Corporation business snapshot
TABLE 67 Siemens business SNAPSHOT
LIST OF FIGURES
FIG. 1 TOP IMPACTING FACTORS, MODERATE GROWTH CASE (2020 - 2025)
FIG. 2 TOP IMPACTING FACTORS, RAPID GROWTH CASE (2020 - 2025)
FIG. 3 TOP IMPACTING FACTORS, RAPID GROWTH CASE (2020 - 2025)
FIG. 4 LAWFUL INTERCEPTION ARCHITECTURE
FIG. 5 TOP IMPACTING FACTORS
FIG. 6 TOP INVESTMENT POCKETS OF LAWFUL INTERCEPTION MARKET
FIG. 7 TOP WINNING STRATEGIES
FIG. 8 TOP WINNING STRATEGIES IN LAWFUL INTERCEPTION MARKET BY LEADING PLAYERS
FIG. 9 PORTER’S FIVE FORCES ANALYSIS
FIG. 10 MARKET SHARE OF GLOBAL LAWFUL INTERCEPTION MARKET
FIG. 11 RISING DATA TRAFFIC (MONTHLY IN EXABYTES)
FIG. 12 VOIP INTERCEPTION MODEL (A GENERAL PROCESS FLOW DIAGRAM)
FIG. 13 GLOBAL TELECOM SUBSCRIBERS BY TECHNOLOGY GENERATION (2000- 2017)
FIG. 14 KEY FINANCIALS OF VERINT BUSINESS BY SALES 2013
FIG. 15 KEY FINANCIALS OF VERINT BUSINESS - REVENUE BY GEOGRAPHY 2013
FIG. 16 SWOT ANALYSIS OF VERINT BUSINESS
FIG. 17 KEY FINANCIAL OF EMC CORPORATION BUSINESS BY SEGMENTS 2013
FIG. 18 KEY FINANCIALS OF EMC BUSINESS - REVENUE BY GEOGRAPHY 2013
FIG. 19 SWOT ANALYSIS OF RSA NETWITNESS BUSINESS
FIG. 20 NICE SYSTEMS REVENUE FROM PRODUCTS AND SERVICES ($MILLION)
FIG. 21 KEY FINANCIALS OF NICE SYSTEMS, SEGMENTAL REVENUE SHARE (2013)
FIG. 22 NICE SYSTEMS REVENUE BY REGION ($MILLION)
FIG. 23 NICE SYSTEMS KEY FINANCIALS BY REGIONS SHARE - 2013
FIG. 24 SWOT ANALYSIS OF NICE SYSTEMS
FIG. 25 KEY FINANCIALS OF BAE SYSTEMS BUSINESS BY SALES 2013
FIG. 26 BAE SYSTEMS PLATFORM & SERVICES GEOGRAPHIC SHARE ANALYSIS 2013
FIG. 27 KEY FINANCIALS OF BAE SYSTEMS BUSINESS REVENUE BY GEOGRAPHY 2013
FIG. 28 SWOT ANALYSIS OF BAE SYSTEMS BUSINESS
FIG. 29 KEY FINANCIALS OF FIREEYE INC 2013 ($MILLION)
FIG. 30 FIRE EYE REVENUE BY REGIONS 2013 ($MILLION)
FIG. 31 SWOT ANALYSIS OF FIRE EYE
FIG. 32 KEY FINANCIALS OF ROHDE AND SCHWARZ BUSINESS - REVENUE BY GEOGRAPHY 2013
FIG. 33 SWOT ANALYSIS OF ROHDE AND SCHWARZ BUSINESS
FIG. 34 SWOT ANALYSIS OF SS8 INCORPORATION
FIG. 35 SWOT ANALYSIS OF JSI TELECOM
FIG. 36 SWOT ANALYSIS OF AQSACOM
FIG. 37 SWOT ANALYSIS OF UTIMACO
FIG. 38 SWOT ANALYSIS OF INCOGNITO SOFTWARE
FIG. 39 KEY FINANCIALS OF NET OPTICS BY SALES 2013
FIG. 40 KEY FINANCIALS OF NET OPTICS - REVENUE BY GEOGRAPHY 2013
FIG. 41 SWOT ANALYSIS OF NET OPTICS
FIG. 42 KEY FINANCIALS OF NETSCOUT BY SALES 2013
FIG. 43 KEY FINANCIALS OF NETSCOUT - REVENUE BY GEOGRAPHY 2013
FIG. 44 SWOT ANALYSIS OF NETSCOUT SYSTEMS
FIG. 45 KEY FINANCIALS OF CISCO BY SEGMENT 2013
FIG. 46 REVENUE OF CISCO BY GEOGRAPHY 2013
FIG. 47 KEY FINANCIALS OF ZTE CORPORATION BY SALES 2013
FIG. 48 KEY FINANCIALS OF ZTE CORPORATION - REVENUE BY GEOGRAPHY 2013
FIG. 49 SWOT ANALYSIS OF ZTE CORPORATION
FIG. 50 KEY FINANCIALS OF SIEMENS AG BY SALES 2013
FIG. 51 KEY FINANCIALS OF SIEMENS AG - REVENUE BY GEOGRAPHY 2013
FIG. 52 SWOT ANALYSIS OF SIEMENS AG
Contact us at the Consulting WP office nearest to you or submit a business inquiry online.
Subscribe to Our Newsletter
Published On : December 2019
$ 3600
Published On : November 2019
$ 3600
Published On : November 2019
$ 3600
Published On : November 2019
$ 3600
$ 3950