This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level; it includes the following information:
These company figures are part of the SITSI® Market Research by Pierre Audoin Consultants (PAC) with 400+ Short Vendor Profiles and 120+ Corporate Vendor Profiles. Each file follows the same structure, allowing easy and relevant comparison.
SHARE :
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and ...
Event Date : July 06, 2022
In this report, we will explore the role of ESG ratings in the IT industry and how IT service and software providers can improve their performance in ...
Event Date : April 04, 2023
This short vendor profile provides a quick overview of the local portfolio and performance of Indra in Spain.
Event Date : May 02, 2025
This document provides market volumes, growth rates and forecasts for Smart Vehicles for the 2022-2028 period.
Event Date : February 15, 2024
This report is part 1 of two reports on sovereign cloud in Europe. It presents the major aspects of sovereign cloud solutions and the most common ...
Event Date : June 13, 2024
Data & Application Security – Dependencies, Connections, and Provider Landscape - InBrief Analysis
Market Reports August 11, 2025
Datamart August 11, 2025
Datamart August 11, 2025
Vertical Sectors - Vendor Rankings - Spain
Datamart August 11, 2025
Software & IT Services - Vendor Rankings - Spain
Datamart August 11, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 3: Navigating the Cybersecurity Rulebook: A Business Guide to Key Regulations and Standards
Blog Post August 12, 2025
GenAI Search Is Disrupting Customer Engagement
Blog Post August 11, 2025
Swiss Manufacturing Faces U.S. Tariffs: Implications for the Swiss IT Industry
Blog Post August 08, 2025
Wired for Growth: Network Infrastructure as the Economy’s Nervous System
Blog Post August 05, 2025
Part 2: Decoding GRC: What Governance, Risk, and Compliance Mean in Cybersecurity
Blog Post August 05, 2025