資料搜尋諮詢服務
找不到您所需要的資料嗎?
我們能協助您找到最符合您研究需求的資訊
請撥打 +886-2-2799-3110
或透過電子郵件與我們聯絡 mi@hintoninfo.com
IHS_EWBIEEE xploreSTRATEGY ANALYTICSIHS_EWB_GF

Cyber Security Market - Global Forecast to 2020

  • LinkedIn
  • facebook
  • Twitter
出 版 商:MarketsandMarkets
出版日期:2015/06/10
頁  數:174頁
文件格式:PDF
價  格:
USD 5,650 (Single-User License)
USD 6,650 (Multi-User License)
USD 10,000 (Global-User License)
線上訂購或諮詢
With the exponential growth and sophistication of cyber-attacks in the last few years, security solutions and services are in demand to protect the huge confidential data of the government, military, public data, Banking Financial Service and Insurance (BFSI), hospitals, and other business. With regards to this, security solutions such as security intelligence, managed security services, advance threat protection, and incident response are being used for data privacy and for cyber protections. Of all major technologies, antivirus and antimalware solution is expected to acquire the highest market share during the forecast period owing to the increase in adoption of such solutions by organizations of multiple sizes as well as consumers.
The cyber security market is tending towards maturity in developed regions such as North America and Europe. However, emerging regions such as Latin America and APAC are rapidly investing in this security market due to emerging issues of major security breaches. There are numerous drivers to this market and it is considered to be a fast growing market. Latin America and APAC have seen tremendous economic growth, political transformation, and social change. Owing to the sophistication of cyber threats, countries in these regions have all updated or launched new national cyber security policies.
Major drivers of this market are the stringent government cyber laws and increasing risk of security threat to the various sectors. Along with this, cloud computing is also an important driver, which has grabbed the spotlight of the market thereby increasing the threat of data loss and data leakage. However, cyber talent gap and lack of awareness about the dedicated solutions are the biggest challenge faced by the industry.
The global cyber security report is segmented on the basis of type, solution, service, vertical, and region. The cyber security types include network security, endpoint security, application security, content security, and wireless security & cloud security. The services are segmented as consulting, design and integration, risk and threat assessment, managed security services, and training and education. The market is segmented into solutions such as identity and access management, risk and compliance management, encryption, data loss prevention, unified threat management, firewall, antivirus and antimalware, Intrusion Prevention System (IDS)/Intrusion Detection System (IPS), Security Information and Event Management (SIEM), disaster recovery, Distributed Denial of Service (DDoS) mitigation, and whitelisting. In addition, the report classifies the industry verticals as aerospace, defense, and intelligence; government, Banking, Financial Services, and Insurance (BFSI), telecommunication, healthcare, retail, manufacturing, and others. The regions covered are North America, Europe, Asia-Pacific, Middle East and Africa, and Latin America.
The global cyber security market is expected to grow from $106.32 billion in 2015 to $170.21 billion by 2020, at a Compound Annual Growth Rate (CAGR) of 9.8%. The key players in this market include Booz Allen Hamilton, Cisco, CSC, IBM, Lockheed Martin, Intel Security, Microsoft, Northrop Grumman, Symantec, and Trend Micro
MarketsandMarkets expects the aerospace, defense, and Intelligence vertical to account for the largest market share throughout the forecast period. The professional approach of cyber criminals, highly interdependent supply chain management, growing cyber-attacks on critical infrastructure of aviation and defense are the main dangers to a nation’s critical networks and supply chains leading to the theft of proprietary data. Transglobal strategic alliances, proactive measures, substantial investments, technological advancements, along with new legislations are the key factors behind the continual increase in the adoption of cyber security solutions across the aerospace and defense industry. The other revenue pockets that will witness significant growth in this period are healthcare, telecommunication, and manufacturing.

There are various assumptions that have been taken into consideration for the market sizing and forecasting exercise. A few of the global assumptions include political, economic, social, technological, and economic factors. The dollar fluctuations are expected to not seriously affect the forecasts in the emerging regions.
The report will help the market leaders or new entrants in this market in the following ways:
1. This report segments the market into various sub-segments covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market and the sub-segments. The market numbers are further split across the different end users and regions.

2. This report will help in the better understanding of the competitors and gain more insights to better one’s position in business. There is a separate section on competitive landscape, which includes competitor ecosystem, mergers and acquisitions, partnerships, and agreements. Besides, there are company profiles of ten players in this market. In this section, market internals are provided that can put one ahead of the competitors.

3. The report also helps in understanding the overall growth of the market. It provides information on key market drivers, restraints, challenges, and opportunities.
TABLE OF CONTENTS

1 INTRODUCTION 15
1.1 OBJECTIVES OF THE STUDY 15
1.2 MARKET DEFINITION 15
1.3 MARKET SCOPE 15
1.3.1 MARKETS COVERED 16
1.3.2 YEARS CONSIDERED FOR THE STUDY 16
1.4 CURRENCY 17
1.5 LIMITATIONS 17
1.6 STAKEHOLDERS 17
2 RESEARCH METHODOLOGY 18
2.1 RESEARCH DATA 19
2.1.1 SECONDARY DATA 19
2.1.1.1 Key data taken from secondary sources 19
2.1.2 PRIMARY DATA 19
2.1.2.1 Key data from primary sources 20
2.1.2.2 Key industry insights 20
2.1.2.3 Breakdown of primary interviews 21
2.2 MARKET SIZE ESTIMATION 22
2.2.1 BOTTOM-UP APPROACH 22
2.2.2 TOP-DOWN APPROACH 23
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION 24
2.4 MARKET FORECAST ASSUMPTIONS 25
3 EXECUTIVE SUMMARY 26
4 PREMIUM INSIGHTS 30
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE CYBER SECURITY MARKET 30
4.2 GLOBAL CYBER SECURITY MARKET SIZE, BY SERVICE (2015–2020) 30
4.3 GLOBAL CYBER SECURITY MARKET 31
4.4 VERTICAL GROWTH MATRIX 32
4.5 LIFECYCLE ANALYSIS, BY REGION 33
5 MARKET OVERVIEW 34
5.1 INTRODUCTION 35
5.2 EVOLUTION 35
?
5.3 MARKET SEGMENTATION 36
5.3.1 BY SECURITY TYPE 36
5.3.2 BY SOLUTION 37
5.3.3 BY SERVICE 37
5.3.4 BY VERTICAL 38
5.3.5 BY REGION 38
5.4 MARKET DYNAMICS 39
5.4.1 DRIVERS 39
5.4.1.1 Pervasiveness of online and digital data 39
5.4.1.2 Increasing severity of cyber security 40
5.4.1.3 Cloud security opening new growth avenues 40
5.4.1.4 Increasing security need in critical infrastructure and utilities 40
5.4.1.5 Tougher government regulations 40
5.4.1.6 Growth of social media 41
5.4.2 RESTRAINTS 42
5.4.2.1 Lack of security awareness 42
5.4.2.2 Increasing usage of pirated software 42
5.4.2.3 Cyber talent gap 42
5.4.3 OPPORTUNITIES 43
5.4.3.1 Growing market for mobile and web platform 43
5.4.3.2 Need of integrated security solutions 43
5.4.3.3 Evolution of next-generation cyber security solutions 43
5.4.3.4 Increase in adoption of cyber security solutions for protecting energy utilities and critical national infrastructure, SCADA networks or industrial control systems 44
5.4.4 CHALLENGE 45
5.4.4.1 Lack of budget and strategic implications 45
6 INDUSTRY TRENDS 46
6.1 INTRODUCTION 46
6.2 KEY TRENDS 46
6.2.1 INCREASING TREND OF BYOD AT WORKPLACE 46
6.2.2 BIG DATA ANALYTICS AND INTELLIGENCE BASED CYBER SOLUTIONS 46
6.2.3 END USERS PROCUREMENT OF CYBER SECURITY SOLUTIONS 47
6.3 VALUE CHAIN ANALYSIS 47
6.4 PORTER’S FIVE FORCES ANALYSIS 49
6.4.1 THREAT OF NEW ENTRANTS 49
6.4.2 THREAT OF SUBSTITUTES 50
6.4.3 BARGAINING POWER OF SUPPLIERS 50
6.4.4 BARGAINING POWER OF BUYERS 50
6.4.5 INTENSITY OF COMPETITIVE RIVALRY 51
?
7 CYBER SECURITY MARKET ANALYSIS, BY SECURITY TYPE 52
7.1 INTRODUCTION 53
7.2 NETWORK SECURITY 54
7.3 ENDPOINT SECURITY 55
7.4 APPLICATION SECURITY 56
7.5 CONTENT SECURITY 57
7.6 WIRELESS SECURITY 57
7.7 CLOUD SECURITY 58
8 CYBER SECURITY MARKET ANALYSIS, BY SOLUTION 60
8.1 INTRODUCTION 61
8.2 IDENTITY AND ACCESS MANAGEMENT (IAM) 64
8.3 RISK AND COMPLIANCE MANAGEMENT 65
8.4 ENCRYPTION 66
8.5 DATA LOSS PROTECTION (DLP) 67
8.6 UNIFIED THREAT MANAGEMENT (UTM) 68
8.7 FIREWALL 69
8.8 ANTIVIRUS AND ANTIMALWARE 70
8.9 INTRUSION DETECTION SYSTEM/INTRUSION PREVENTION SYSTEM (IDS/IPS) 71
8.10 SECURITY AND VULNERABILITY MANAGEMENT 72
8.11 DISASTER RECOVERY 73
8.12 DISTRIBUTED DENIAL OF SERVICE MITIGATION 74
8.13 WEB FILTERING 75
8.14 OTHERS 76
9 CYBER SECURITY MARKET ANALYSIS, BY SERVICE 77
9.1 INTRODUCTION 78
9.2 CONSULTING 79
9.3 DESIGN AND INTEGRATION 80
9.4 RISK AND THREAT ASSESSMENT 81
9.5 MANAGED SECURITY SERVICES (MSS) 82
9.6 TRAINING AND EDUCATION 83
10 CYBER SECURITY MARKET ANALYSIS, BY VERTICAL 84
10.1 INTRODUCTION 85
10.2 AEROSPACE, DEFENSE AND INTELLIGENCE 86
10.3 GOVERNMENT (EXCLUDING DEFENSE) AND PUBLIC UTILITIES 88
10.4 BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI) 89
10.5 TELECOM AND IT 91
10.6 HEALTHCARE 92
?
10.7 RETAIL 94
10.8 MANUFACTURING 95
10.9 OTHERS 97
11 GEOGRAPHIC ANALYSIS 99
11.1 INTRODUCTION 100
11.2 NORTH AMERICA (NA) 101
11.3 EUROPE 105
11.4 ASIA-PACIFIC (APAC) 107
11.5 MIDDLE EAST AND AFRICA (MEA) 111
11.6 LATIN AMERICA (LA) 113
12 COMPETITIVE LANDSCAPE 116
12.1 OVERVIEW 116
12.2 COMPETITIVE SITUATION AND TRENDS 117
12.2.1 NEW PRODUCT LAUNCHES 119
12.2.2 ACQUISITIONS 121
12.2.3 PARTNERSHIPS AND COLLABORATIONS 123
12.2.4 AGREEMENTS AND EXPANSIONS 124
12.2.5 VENTURE CAPITAL FUNDING 125
12.2.6 MERGERS AND ACQUISITIONS 128
13 COMPANY PROFILES 133
(Overview, Products and Services, Financials, Strategy & Development)*
13.1 INTRODUCTION 133
13.2 IBM CORPORATION 134
13.3 CISCO SYSTEMS, INC. 138
13.4 INTEL CORPORATION 142
13.5 LOCKHEED MARTIN 146
13.6 NORTHROP GRUMMAN 149
13.7 TREND MICRO 153
13.8 SYMANTEC CORPORATION 156
13.9 COMPUTER SCIENCES CORPORATION (CSC) 159
13.10 BOOZ ALLEN HAMILTON 162
13.11 SOPHOS 164
*Details on Overview, Products and Services, Financials, Strategy & Development might not be Captured in case of Unlisted Companies.
?
14 APPENDIX 166
14.1 INSIGHTS OF INDUSTRY EXPERTS 166
14.2 DISCUSSION GUIDE 167
14.3 INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE 169
14.4 AVAILABLE CUSTOMIZATIONS 171
14.5 RELATED REPORTS 172
回上頁