[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Worldwide Vulnerability Assessment Market and 13 Companies Analysis

March 2011 | 86 pages | ID: WC4243C225CEN
Renub Research

US$ 900.00

E-mail Delivery (PDF), Online Subscription, Hard Copy Mail Delivery, CD-ROM Mail Delivery, E-mail Delivery (Word)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
Report titled “Worldwide Vulnerability Assessment Market and 13 Companies Analysis” is divided in four parts

First Section describes worldwide IT security spending market and future forecast
Second Section explains worldwide vulnerability assessment market and future forecast
Third Section describes key players’ products analysis with Saas solutions
Fourth Section talks about the key players – 13 Key Players has been analyzed in the report

Key Players section has been analyzed in the report in the following format

Products Analysis – Company product analysis compared to its competitor products
Revenue Analysis – Company Revenue in Vulnerability Assessment Market
Strengths – Company strength in vulnerability assessment market
Weakness – Company weakness in vulnerability assessment market

Data Sources

Information and data in this report has been collected from various printable and non-printable sources like Trade Journals, White papers, Online paid databases, News websites, Government Agencies, Magazines, Newspapers and Trade associations.
1. WORLDWIDE IT SECURITY RISK MANAGEMENT MARKET & FUTURE FORECAST

2. WORLDWIDE VULNERABILITY ASSESSMENT (VA) MARKET SIZE & FUTURE FORECAST

3. IT SECURITY RISK AND COMPLIANCE MANAGEMENT DRIVERS

3.1 The Payment Card Industry Data Security Standard (PCI DSS)
3.2 Role of PCI DSS to Improve Security in the Companies
  3.2.1 Collecting All Logs, All the Time
  3.2.2 Monitoring User Activity
  3.2.3 Prioritizing the Risks
3.3 Return on Investments from IT Security Risk
3.4 Regulations and Acts for PCI Industry
  3.4.1 Gramm-Leach-Bliley Act (GLBA)
  3.4.2 Health Insurance Portability and Accountability Act (HIPAA)
  3.4.3 Sarbanes Oxley Act (SOX)
  3.4.4 European Union Data Protection Directive (EUDPD)
  3.4.5 ISO 27002 Code of Practice for Information Security Management
  3.4.6 COBIT

4. KEY PLAYERS - OFFERING PRODUCTS & SAAS SOLUTIONS

4.1 Key Players - Market Share for 2009

5. WIRELESS NETWORK SECURITY

5.1 Wireless Service Providers - Cisco
  5.1.1 Assessment Services
  5.1.2 Planning and Design Services
  5.1.3 Optimization Service
5.2 Wireless Service Providers - Hewlett Packard Networking
  5.2.1 A Series – For Enterprise Clients with Large and Complex Deployments
  5.2.2 E Series – For Midsize Clients Seeking Affordable, Easy-To-Use Technology
  5.2.3 V Series – Helps Small and Midsize Businesses
  5.2.4 S Series – Offers Clients Needing Increased Network Security

6. ANALYSIS OF THE KEY PLAYERS

6.1 Qualys Incorporation
  6.1.1 Products
  6.1.2 Qualys – Strengths
  6.1.3 Qualys – Weakness
  6.1.4 Qualys – Revenue
6.2 Beyond Security
  6.2.1 Products
  6.2.2 Beyond Security – Strengths
  6.2.3 Beyond Security – Weakness
6.3 Critical Watch, Inc.
  6.3.1 Products
  6.3.2 Critical Watch – Strengths
  6.3.3 Critical Watch – Weakness
6.4 eEye Digital Security
  6.4.1 Products
  6.4.2 eEye Digital Security – Strengths
  6.4.3 eEye Digital Security – Weakness
6.5 IBM Internet Security System
  6.5.1 Products
  6.5.2 IBM (Vulnerability Assessment) – Strengths
  6.5.3 IBM (Vulnerability Assessment) – Weakness
  6.5.4 IBM (Vulnerability Assessment) – Revenue
6.6 Lumension Security Inc.
  6.6.1 Products
  6.6.2 Lumension Security – Strengths
  6.6.3 Lumension Security – Weakness
  6.6.4 Lumension Security – Revenue
6.7 McAfee Inc.
  6.7.1 Products
  6.7.2 McAfee – Strengths
  6.7.3 McAfee – Weakness
6.8 nCircle Network Security Inc.
  6.8.1 Products
  6.8.2 nCircle – Strengths
  6.8.3 nCircle – Weakness
  6.8.4 nCircle – Revenue
6.9 Rapid7 Inc.
  6.9.1 Products
  6.9.2 Rapid7 – Strengths
  6.9.3 Rapid7 – Weakness
  6.9.4 Rapid7 – Revenue
6.10 Saint Corporation
  6.10.1 Products
  6.10.2 Saint Corporation – Strengths
  6.10.3 Saint Corporation – Weakness
  6.10.4 Saint Corporation – Revenue
6.11 StillSecure
  6.11.1 Products
  6.11.2 StillSecure – Strengths
  6.11.3 StillSecure – Weakness
6.12 Tenable Network Security Inc
  6.12.1 Products
  6.12.2 Tenable Network Security – Strengths
  6.12.3 Tenable Network Security – Weakness
  6.12.4 Tenable Network Security – Revenue
6.13 Trustwave
  6.13.1 Products
  6.13.2 Trustwave – Strengths
  6.13.3 Trustwave – Weakness
  6.13.4 Trust Wave – Revenue

LIST OF FIGURES:

Figure 1 1: Worldwide - IT Security Spending Market (Billion US$), 2007 – 2010
Figure 1 2: Worldwide - Forecast for IT Security Spending Market (Billion US$), 2011 – 2014
Figure 2 1: Worldwide - Vulnerability Assessment Market Size (Million US$), 2005 – 2009
Figure 2 2: Worldwide – Forecast for Vulnerability Assessment (VA) Market Size (Million US$), 2010 - 2013
Figure 3 1: Worldwide - Organization Experience in Various Types of Fraud (Percent %), 2010
Figure 3 2: United States - Online Sales Market (Billion US$), 2007 – 2012
Figure 4 1: Worldwide - Key Players Vulnerability Assessment (VA) Market Share Percentage (%), 2009
Figure 5 1: Worldwide - Network Performance Monitoring and Management Solutions Market, (Million US$), 2008 – 2010
Figure 5 2: Worldwide - Network Performance Monitoring and Management Solutions Market, (Million US$), 2011 – 2015
Figure 6 1: Qualys - Revenue (Million US$) 2003 - 2009
Figure 6 2: IBM - Vulnerability Assessment Revenue (Million US$), 2007 & 2008
Figure 6 3: Lumension - Revenue (Million US$), 2004 - 2009
Figure 6 4: nCircle - Revenue (Million US$), 2002 – 2009
Figure 6 5: Rapid7 – Revenue (Million US$), 2005 - 2009
Figure 6 6: Saint Corporation - Revenue (Million, US$), 2008 – 2010
Figure 6 7: Teenable Network Security - Revenue (Million US$), 2006 & 2009
Figure 6 8: Trustwave - Revenue (Million US$), 2008 - 2010

LIST OF TABLES:

Table 2 1: Worldwide - Key Player Offering Products and Saas Solutions


More Publications