Key Players in Enterprise Security: Strategies, performance and SWOT analysis

Date: November 1, 2009
Pages: 154
Price:
US$ 2,875.00
Publisher: Business Insights
Report type: Strategic Report
Delivery: E-mail Delivery (PDF)
ID: KA0122A61AEEN
Leaflet:

Download PDF Leaflet

Key Players in Enterprise Security: Strategies, performance and SWOT analysis
This report profiles the leading players in the global enterprise security market. Enterprise security includes firewall and VPN, identity and access management, intrusion detection and prevention, secure content management and security and vulnerability management. This report analyzes the enterprise security industry in terms of market size (based on the global spending on the enterprise security solutions), key drivers and resistors, trends and competitive positioning of major enterprise security vendors in the global enterprise security market. It includes profiles of the major players in the industry and also includes a brief summary of the other major players. The current ranking evaluates the enterprise security vendors based on their performance using the following intelligence metrics:
  • each company’s financial performance in the global enterprise security market;
  • each company’s growth strategies and major acquisitions and divestments in this market;
  • key partnerships and alliances formed by these companies;
  • business-related strengths and weaknesses of these companies, and insights into the opportunities and threats facing them.

Key Features of this report
  • Market dynamics of the global enterprise security market during the period 2006–10.
  • Key market drivers and resistors.
  • Trends of the global enterprise security market.
  • Identification of the major players in the global enterprise security market .

Scope of this report
  • Learn from the strategies of the global enterprise security vendors to target future growth markets effectively, avoid their mistakes, replicate their successes and learn of the threats they face.
  • Benchmark your performance against the leading enterprise security companies by comprehending their strategies.
  • Understand the major issues affecting the global enterprise security market.

Key Market Issues
  • Price sensitive SMBs market: The SMBs market is very price sensitive. Vendors with simple economical and customized solutions will survive in this market.
  • Huge investment: On-premise security applications requires high capital investment and constant vigilance to keep them running, leaving only a miniscule portion of the IT budget for strategic initiatives and innovation.
  • Security concerns: Internet based security applications creates security concerns owing to sharing of data.

Key findings from this report
  • The global enterprise security market was valued at approximately $17,549m in 2008, an increase of 11.0% over 2007. Business Insights anticipates that the value of the global enterprise security market will grow at a CAGR of 10.5% during 2006–10 to reach a total value of $20,901m in 2010.
  • Increasing incidence and sophistication of security attacks from internet worms, viruses and other intrusions have primarily contributed to the growth in the sales of vulnerability management and intrusion detection and prevention products during 2006–08.
  • Stringent regulations across sectors such as financial services, healthcare and utilities have primarily driven mandatory application of security software and solutions to protect and prevent loss of sensitive data.

Key questions answered

1. What was the market size of the global enterprise security market by value in 2008?
2. What was and will be the market size of the global enterprise security industry during 2006–13?
3. What are the trends in the global enterprise security industry?
4. Who are the major players in the market?
5. What are the growth strategies of the major enterprise security vendors?
Key Players in Enterprise Security
Executive summary
Industry overview
Computer Associates (CA)
Check Point
Cisco
Gemalto
IBM
McAfee
EMC (RSA Security)
Symantec
Trend Micro
VeriSign

CHAPTER 1 INTRODUCTION

What is the report about?
Methodology

CHAPTER 2 INDUSTRY OVERVIEW

Summary
Introduction
Market dynamics
Global enterprise security market size by value
Contribution by enterprise security products
Enterprise security spending by industry verticals
Geographic segmentation of the enterprise security market
Drivers and resistors of the global enterprise security industry
Competitive landscape
Major enterprise security vendors
Trends
Consolidation underway in the data-loss prevention arena
Security vendors capitalizing on a security gap in the SMB market
Shift to security-as-a-service

CHAPTER 3 CA

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Enhance penetration of existing customer base to improve business growth rate
Expanding security product portfolio to accelerate business growth
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 4 CHECK POINT

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Penetrating the SMB market through the expansion of existing product lines
Partnership and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 5 CISCO

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Instituting a partner incentive program and broadening the product portfolio to penetrate the SMB market
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 6 GEMALTO

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Strengthening presence in the Asian digital security market
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 7 IBM

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Penetrating the security gap in the SMB market
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 8 MCAFEE

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Deploying web-based security services to reduce IT-related costs
Tapping the security gap in the mid-sized companies market
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 9 EMC (RSA SECURITY)

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Leveraging EMC’s technology to strengthen the security product portfolio
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 10 SYMANTEC

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Expanding market opportunities in the SMB space by developing solutions for under-represented security domains
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 11 TREND MICRO

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Expanding internet-based security services to enhance market share in the secure content management space
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 12 VERISIGN

Summary
Company overview
Recent financial performance
Performance by business segment
Growth strategies
Strengthening global internet infrastructure with security upgrades
Partnerships and alliances
Acquisitions and divestments
SWOT analysis

CHAPTER 13 OTHER MAJOR PLAYERS

Aisino
  Company overview
  Recent financial performance
Hewlett-Packard
  Company overview
  Recent financial performance
Integralis
  Company overview
  Recent financial performance
Intersections
  Company overview
  Recent financial performance
Juniper Networks (Juniper)
  Company overview
  Recent financial performance
Microsoft
  Company overview
  Recent financial performance
Oracle
  Company overview
  Recent financial performance
SonicWALL
  Company overview
  Recent financial performance
Sophos
  Company overview
  Recent financial performance
Websense
  Company overview
  Recent financial performance
Appendix
Glossary
Index

LIST OF FIGURES

Figure 2.1: Global enterprise security market size ($m), 2006–10
Figure 2.2: Contribution by enterprise security products, 2008
Figure 2.3: Enterprise security spending by industry verticals, 2006–08
Figure 2.4: Comparative analysis of the major security vendors
Figure 3.5: CA financial performance ($m), 2004–08
Figure 3.6: CA SWOT analysis
Figure 4.7: Check Point financial performance ($m), 2004–08
Figure 4.8: Check Point SWOT analysis
Figure 5.9: Cisco financial performance ($m), 2004–08
Figure 5.10: Cisco SWOT analysis
Figure 6.11: Gemalto financial performance ($m), 2004–08
Figure 6.12: Gemalto SWOT analysis
Figure 7.13: IBM financial performance ($m), 2004–08
Figure 7.14: IBM SWOT analysis
Figure 8.15: McAfee financial performance ($m), 2004–08
Figure 8.16: McAfee SWOT analysis
Figure 9.17: EMC (RSA Security) financial performance ($m), 2004–08
Figure 9.18: EMC (RSA Security) SWOT analysis
Figure 10.19: Symantec financial performance ($m), 2005–08
Figure 10.20: Symantec SWOT analysis
Figure 11.21: Trend Micro financial performance ($m), 2004–08
Figure 11.22: Trend Micro SWOT analysis
Figure 12.23: VeriSign financial performance ($m), 2006–08
Figure 12.24: VeriSign SWOT analysis
Figure 13.25: Aisino financial performance ($m), 2004–08
Figure 13.26: Hewlett-Packard financial performance ($m), 2004–08
Figure 13.27: Integralis financial performance ($m), 2004–08
Figure 13.28: Intersections financial performance ($m), 2004–08
Figure 13.29: Juniper financial performance ($m), 2004–08
Figure 13.30: Microsoft financial performance ($m), 2005–09
Figure 13.31: Oracle financial performance ($m), 2005–09
Figure 13.32: SonicWALL financial performance ($m), 2004–08
Figure 13.33: Sophos financial performance ($m), 2004–08
Figure 13.34: Websense financial performance ($m), 2004–08

LIST OF TABLES

Table 2.1: Global enterprise security market size ($m), 2006–10
Table 2.2: Contribution by enterprise security products, 2008
Table 2.3: Enterprise security spending by industry verticals, 2006–08
Table 2.4: Geographic segmentation of enterprise security market, 2006–08
Table 2.5: Major enterprise security vendors
Table 2.6: Select M&A in the data-loss prevention market, 2007–09
Table 3.7: CA snapshot
Table 3.8: CA financial performance ($m), 2004–08
Table 3.9: Select new product launches by CA, 2007–09
Table 3.10: CA acquisitions, 2007–09
Table 4.11: Check Point snapshot
Table 4.12: Check Point financial performance ($m), 2004–08
Table 4.13: Check Point acquisitions, 2007–09
Table 5.14: Cisco snapshot
Table 5.15: Cisco financial performance ($m), 2004–08
Table 5.16: Cisco business segment performance ($m), 2008
Table 6.17: Gemalto snapshot
Table 6.18: Gemalto financial performance ($m, €1), 2004–08
Table 6.19: Gemalto business segment performance ($m), 2008
Table 6.20: Select Gemalto partnerships and alliances, 2007–09
Table 6.21: Select Gemalto partnerships and alliances, 2007–09 (continued)
Table 6.22: Gemalto acquisitions, 2007–09
Table 7.23: IBM snapshot
Table 7.24: IBM financial performance ($m), 2004–08
Table 7.25: IBM business segment performance ($m), 2008
Table 7.26: IBM acquisitions, 2007–09
Table 8.27: McAfee snapshot
Table 8.28: McAfee financial performance ($m), 2004–08
Table 8.29: Select McAfee partnerships and alliances, 2007–09
Table 8.30: Select McAfee partnerships and alliances, 2007–09 (continued)
Table 8.31: McAfee’s acquisitions, 2007–09
Table 9.32: EMC (RSA Security) snapshot
Table 9.33: EMC (RSA Security) financial performance ($m), 2004–08
Table 9.34: EMC (RSA Security) business segment performance ($m), 2008
Table 9.35: Select new product launches by EMC (RSA Security), 2007–09
Table 9.36: Select EMC (RSA Security) partnerships and alliances, 2007–09
Table 9.37: EMC (RSA Security) acquisitions, 2007–09
Table 10.38: Symantec snapshot
Table 10.39: Symantec financial performance ($m), 2005–08
Table 10.40: Symantec business segment performance ($m), 2008
Table 10.41: Select Symantec partnerships and alliances, 2007–09
Table 10.42: Symantec acquisitions, 2007–09
Table 11.43: Trend Micro snapshot
Table 11.44: Trend Micro financial performance ($m, JPYm), 2004–08
Table 11.45: Select Trend Micro partnerships and alliances, 2007–09
Table 11.46: Trend Micro acquisitions, 2007–09
Table 12.47: VeriSign snapshot
Table 12.48: VeriSign financial performance ($m), 2006–08
Table 12.49: VeriSign business segment performance ($m), 2008
Table 12.50: Select VeriSign partnerships and alliances, 2007–09
Table 12.51: Select VeriSign partnerships and alliances, 2007–09 (continued)
Table 12.52: VeriSign divestments, 2007–09
Table 13.53: Aisino snapshot
Table 13.54: Aisino financial performance ($m, CNYm), 2004–08
Table 13.55: Hewlett-Packard snapshot
Table 13.56: Hewlett-Packard financial performance ($m), 2004–08
Table 13.57: Integralis snapshot
Table 13.58: Integralis financial performance ($m, €m), 2004–08
Table 13.59: Intersections snapshot
Table 13.60: Intersections financial performance ($m), 2004–08
Table 13.61: Juniper snapshot
Table 13.62: Juniper financial performance ($m), 2004–08
Table 13.63: Microsoft snapshot
Table 13.64: Microsoft financial performance ($m), 2005–09
Table 13.65: Oracle snapshot
Table 13.66: Oracle financial performance ($m), 2005–09
Table 13.67: SonicWALL snapshot
Table 13.68: SonicWALL financial performance ($m), 2004–08
Table 13.69: Sophos snapshot
Table 13.70: Sophos financial performance ($m, ?m), 2004–08
Table 13.71: Websense snapshot
Table 13.72: Websense financial performance ($m), 2004–08
Skip to top


Ask Your Question

Key Players in Enterprise Security: Strategies, performance and SWOT analysis
Company name*:
Contact person*:
Phone/fax*:
Email*:
Request invoice
Your enquiry:
Please click on a Check Box below to confirm you are not a robot: