Information Security Consulting Market Analysis, Segments, Growth and Information Security Electronics | Page 3

Research Methodology (1/2) Systematic Research Approach 1 Market profiling 2 Formulating discussion guide 3 Developing list of respondents 4 In-depth secondary research is used to ascertain overall market size, top industry players, top products, industry associations, etc. PMR formulates a detailed discussion guide to conduct expert and industry interviews PMR develops a list of industry players (manufacturers), distributors, retailers and industry experts Data collection PMR conducts interviews with industry experts, industry players, distributors and retailers Data validation Data is validated by triangulation method, wherein secondary, primary and PMR analysis contribute to the final data 5 6 Data analysis Insights 7 Data is scrutinized using MS-Excel to obtain qualitative and quantitative insights about the industry PMR delivers industry insights and information in the required format (PDF) Data Collection     Research & Intelligence Data Filter & Analysis Identifying key opinion leaders Questionnaire design In-depth interviews Coverage across value chain Actionable Insights A Primary Research       B SOLUTION      Market participants Key strengths Product portfolio Mapping as per value chain Key focus segments Primary Research #     Linkedin Zoominfo Salesforce Avention Business Solution Desk Research C Key industry experts Channel study Developments Market dynamics Products Conclusions Company Analysis Secondary Research #     Company websites Company annual reports White papers Financial reports Paid Publications#     Factiva GBI Genios Meltwater # includes sources of databases ©2015 Future Market Insights, All Rights Reserved 3