This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level; it includes the following information:
These company figures are part of the SITSI® Market Research by Pierre Audoin Consultants (PAC) with 400+ Short Vendor Profiles and 120+ Corporate Vendor Profiles. Each file follows the same structure, allowing easy and relevant comparison.
SHARE :
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : May 31, 2022
Cybersecurity is a fast-paced market segment with many interesting start-up companies in Europe. This report will provide an overview of interesting ...
Event Date : December 18, 2024
This Excel document delivers market figures broken down by vertical sectors. Figures cover a seven-year time frame (results from the past two years ...
Event Date : December 06, 2024
As part of the digital transformation of many companies, application modernization projects are pending because the legacy applications do not meet ...
Event Date : February 14, 2023
The Cloud Computing vendor profiles portray leading providers of cloud computing, analyzing their strategies and ...
Event Date : September 07, 2022
Data & Application Security – Dependencies, Connections, and Provider Landscape - InBrief Analysis
Market Reports August 11, 2025
Datamart August 11, 2025
Datamart August 11, 2025
Vertical Sectors - Vendor Rankings - Spain
Datamart August 11, 2025
Software & IT Services - Vendor Rankings - Spain
Datamart August 11, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 3: Navigating the Cybersecurity Rulebook: A Business Guide to Key Regulations and Standards
Blog Post August 12, 2025
GenAI Search Is Disrupting Customer Engagement
Blog Post August 11, 2025
Swiss Manufacturing Faces U.S. Tariffs: Implications for the Swiss IT Industry
Blog Post August 08, 2025
Wired for Growth: Network Infrastructure as the Economy’s Nervous System
Blog Post August 05, 2025
Part 2: Decoding GRC: What Governance, Risk, and Compliance Mean in Cybersecurity
Blog Post August 05, 2025