This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level; it includes the following information:
These company figures are part of the SITSI® Market Research by Pierre Audoin Consultants (PAC) with 400+ Short Vendor Profiles and 120+ Corporate Vendor Profiles. Each file follows the same structure, allowing easy and relevant comparison.
SHARE :
This document provides market volumes, growth rates and forecasts for the IT security market in Australia for the 2023-2029 period.
Event Date : May 22, 2025
The impact of generative AI (GenAI) on email security has the potential to be substantive, reshaping the threat landscape and compelling ...
Event Date : March 27, 2025
This document provides market volumes, growth rates and forecasts for the AI market in China for the 2021-2027 period.
Event Date : February 08, 2023
This vendor profile gives a comprehensive overview of the Worldwide positioning, performance and strategy of DXC Technology.
Event Date : March 18, 2024
PAC has done an in-depth analysis of 24 leading providers of SAP-related services in Europe and Germany, evaluating them in 16 different RADAR ...
Event Date : March 06, 2024
Workday - Figures - Worldwide - FY 31-Jan-2025
Datamart August 15, 2025
Workday - Vendor Profile - Worldwide
Vendor Profile August 15, 2025
DXC Technology - Figures - Switzerland - FY 31-Mar-2025
Datamart August 15, 2025
DXC Technology – Vendor Profile – Switzerland
Vendor Profile August 15, 2025
SAP - Figures - Germany - FY 31-Dec-2024
Datamart August 14, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 3: Navigating the Cybersecurity Rulebook: A Business Guide to Key Regulations and Standards
Blog Post August 12, 2025
GenAI Search Is Disrupting Customer Engagement
Blog Post August 11, 2025
Swiss Manufacturing Faces U.S. Tariffs: Implications for the Swiss IT Industry
Blog Post August 08, 2025
Wired for Growth: Network Infrastructure as the Economy’s Nervous System
Blog Post August 05, 2025
Part 2: Decoding GRC: What Governance, Risk, and Compliance Mean in Cybersecurity
Blog Post August 05, 2025