[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Africa Cyber Security Market by Solution (IAM, Risk and Compliance Management, IDS/IPS, Encryption, Antivirus and Antimalware, Firewall, DLP, UTM, Security and Vulnerability management, Disaster Recovery and Business Continuity, DDOS Mitigation, Web Filtering) by Service, by Verticals, by Country - Global forecast to 2020

June 2015 | 140 pages | ID: ACC5153E365EN
MarketsandMarkets

US$ 5,650.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The number of cyber-attacks continues to rise rapidly in the African region. Most of the cyber-attacks that occur in Africa are generally Distributed-Denial-Of-Service (DDoS) attacks and website defacement. With the advancement of such attacks, government and enterprises are collaborating to implement strict laws and regulations to secure their critical networks.

The major force driving this market is the increasing focus on government regulations and compliance. Over the next five years, the market for Africa cyber security market is expected to become highly persistent across its ecosystem, and penetrate the market to a huge extent, covering all geographical territories.

Banking, financial services and insurance (BFSI), and energy and utilities have significantly increased their spending on the solutions and services. This rise in the global spending for solutions and services has boosted the market opportunities for the companies providing cyber security solutions.

The report also analyzes the market drivers, restraints, and opportunities along with a study on the top key players. The report provides key insights into the current trends and best practices in the Africa cyber security market.

The report brings out the potential across various countries such as Kenya, South Africa, Nigeria, Morocco, and others. The Africa cyber security market is further segmented into each country market by sub-segment, solution, vertical, and service.
1 INTRODUCTION

1.1 OBJECTIVES OF THE STUDY
1.2 MARKET DEFINITION
1.3 MARKET SCOPE
  1.3.1 MARKETS COVERED
  1.3.2 YEARS CONSIDERED FOR THE STUDY
1.4 CURRENCY
1.5 STAKEHOLDERS

2 RESEARCH METHODOLOGY

2.1 RESEARCH DATA
  2.1.1 SECONDARY DATA
    2.1.1.1 Key data from secondary sources
  2.1.2 PRIMARY DATA
    2.1.2.1 Key data from primary sources
    2.1.2.2 Key industry insights
    2.1.2.3 Breakdown of primary interviews
2.2 MARKET SIZE ESTIMATION
  2.2.1 BOTTOM-UP APPROACH
  2.2.2 TOP-DOWN APPROACH
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION
2.4 ASSUMPTIONS

3 EXECUTIVE SUMMARY

4 PREMIUM INSIGHTS

4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE AFRICA CYBER SECURITY MARKET
4.2 AFRICA CYBER SECURITY MARKET, BY SUB-SEGMENT
4.3 TOTAL AFRICA CYBER SECURITY MARKET
4.4 AFRICA CYBER SECURITY MARKET POTENTIAL

5 MARKET OVERVIEW

5.1 INTRODUCTION
5.2 EVOLUTION OF CYBER SECURITY MARKET
5.3 MARKET SEGMENTATION
  5.3.1 BY SUB-SEGMENT
  5.3.2 BY SOLUTION
  5.3.3 BY SERVICE
  5.3.4 BY VERTICAL
  5.3.5 BY COUNTRY
5.4 MARKET DYNAMICS
  5.4.1 DRIVERS
    5.4.1.1 Cyber-attacks affecting economic growth
    5.4.1.2 Increasing focus on government regulations and compliance requirements
    5.4.1.3 Increasing penetration of mobile devices and Internet subscriptions
  5.4.2 RESTRAINTS
    5.4.2.1 Limitations in the current ICT infrastructure
    5.4.2.2 Lack of education, resources, and awareness
  5.4.3 OPPORTUNITIES
    5.4.3.1 Increasing cases of insider threats
    5.4.3.2 Demand shift towards managed IT security services
  5.4.4 CHALLENGE
    5.4.4.1 Absence of aligned legal and regulatory framework

6 INDUSTRY TRENDS

6.1 INTRODUCTION
6.2 VALUE CHAIN ANALYSIS
6.3 PORTER’S FIVE FORCES ANALYSIS
  6.3.1 THREAT FROM NEW ENTRANTS
  6.3.2 BARGAINING POWER OF BUYERS
  6.3.3 BARGAINING POWER OF SUPPLIERS
  6.3.4 THREAT FROM SUBSTITUTES
  6.3.5 INTENSITY OF COMPETITVE RIVALRY

7 AFRICA CYBER SECURITY MARKET ANALYSIS, BY SUB-SEGMENT

7.1 INTRODUCTION
7.2 NETWORK SECURITY
7.3 ENDPOINT SECURITY
7.4 CONTENT SECURITY
7.5 APPLICATION SECURITY
7.6 INDUSTRIAL CONTROL SYSTEM SECURITY
7.7 CLOUD SECURITY

8 AFRICA CYBER SECURITY MARKET ANALYSIS, BY SOLUTION

8.1 INTRODUCTION
8.2 IDENTITY AND ACCESS MANAGEMENT (IAM)
8.3 RISK AND COMPLIANCE MANAGEMENT
8.4 IDS/IPS
8.5 ENCRYPTION
8.6 ANTIVIRUS/ANTIMALWARE
8.7 FIREWALL
8.8 DATA LOSS PROTECTION (DLP)
8.9 UTM
8.10 SECURITY AND VULNERABILITY MANAGEMENT
8.11 DISASTER RECOVERY AND BUSINESS CONTINUITY
8.12 DDOS MITIGATION
8.13 WEB FILTERING
8.14 OTHERS

9 AFRICA CYBER SECURITY MARKET ANALYSIS, BY SERVICE

9.1 INTRODUCTION
9.2 CONSULTING
9.3 DESIGN AND INTEGRATION
9.4 RISK AND THREAT ASSESSMENT
9.5 MANAGED SECURITY SERVICES
9.6 TRAINING AND EDUCATION

10 AFRICA CYBER SECURITY MARKET ANALYSIS, BY VERTICAL

10.1 INTRODUCTION
10.2 BFSI
10.3 AEROSPACE, DEFENSE, AND INTELLIGENCE
10.4 GOVERNMENT (EXCLUDING DEFENSE)
10.5 ENERGY AND UTILITIES
10.6 MANUFACTURING
10.7 RETAIL AND WHOLESALE DISTRIBUTION
10.8 TELECOMMUNICATION
10.9 TRANSPORTATION
10.10 OTHER VERTICALS

11 GEOGRAPHIC ANALYSIS

11.1 INTRODUCTION
11.2 KENYA
11.3 SOUTH AFRICA
11.4 NIGERIA
11.5 MOROCCO
11.6 OTHERS

12 COMPETITIVE LANDSCAPE

12.1 OVERVIEW
12.2 COMPETITIVE SITUATION AND TRENDS
  12.2.1 NEW PRODUCT LAUNCHES
  12.2.2 NEW ALLIANCES, CONTRACTS, PARTNERSHIPS, AND AGREEMENTS
  12.2.3 MERGERS AND ACQUISITIONS
  12.2.4 EXPANSIONS

13 COMPANY PROFILES

13.1 INTRODUCTION
13.2 EMC CORPORATION
13.3 FORTINET, INC.
13.4 CISCO SYSTEMS, INC.
13.5 IBM
13.6 SYMANTEC CORPORATION
13.7 CHECK POINT SOFTWARE TECHNOLOGIES LTD.
13.8 MCAFEE, INC.
13.9 HEWLETT-PACKARD
13.10 COMPUTER SCIENCES CORP. (CSC)
13.11 TREND MICRO, INC.

14 APPENDIX

14.1 DISCUSSION GUIDE
14.2 INDUSTRY EXPERTS
14.3 INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
14.4 AVAILABLE CUSTOMIZATIONS
14.5 RELATED REPORTS

LIST OF TABLES

Table 1 AFRICA CYBER SECURITY MARKET: ASSUMPTIONS
Table 2 AFRICA CYBER SECURITY MARKET SIZE AND GROWTH, BY SUB-SEGMENT, 2014–2020 ($BILLION)
Table 3 DRIVERS: IMPACT ANALYSIS
Table 4 RESTRAINTS: IMPACT ANALYSIS
Table 5 OPPORTUNITIES: IMPACT ANALYSIS
Table 6 AFRICA CYBER SECURITY MARKET SIZE, BY SUB-SEGMENT, 2014–2020 ($MILLION)
Table 7 NETWORK SECURITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 8 ENDPOINT SECURITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 9 CONTENT SECURITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 10 APPLICATION SECURITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 11 INDUSTRIAL CONTROL SYSTEM SECURITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 12 CLOUD SECURITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 13 AFRICA CYBER SECURITY MARKET SIZE, BY SOLUTION, 2014–2020 ($MILLION)
Table 14 IAM: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 15 RISK AND COMPLIANCE MANAGEMENT: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 16 IDS/IPS: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 17 ENCRYPTION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 18 ANTIVIRUS/ANTIMALWARE: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 19 FIREWALL: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 20 DLP: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 21 UTM: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 22 SECURITY AND VULNERABILITY MANAGEMENT: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 23 DISASTER RECOVERY AND BUSINESS CONTINUITY: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 24 DDOS MITIGATION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 25 WEB FILTERING: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 26 OTHERS: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 27 AFRICA CYBER SECURITY MARKET SIZE, BY SERVICE, 2014–2020 ($MILLION)
Table 28 CONSULTING: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 29 DESIGN AND INTEGRATION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 30 RISK AND THREAT ASSESSMENT: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 31 MANAGED SECURITY SERVICES: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 32 TRAINING AND EDUCATION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 33 AFRICA CYBER SECURITY MARKET SIZE, BY VERTICAL, 2014–2020 ($MILLION)
Table 34 BFSI: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 35 AEROSPACE, DEFENSE, AND INTELLIGENCE: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 36 GOVERNMENT: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 37 ENERGY AND UTILITIES: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 38 MANUFACTURING: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 39 RETAIL AND WHOLESALE DISTRIBUTION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 40 TELECOMMUNICATION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 41 TRANSPORTATION: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 42 OTHERS VERTICALS: AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 43 AFRICA CYBER SECURITY MARKET SIZE, BY COUNTRY, 2014–2020 ($MILLION)
Table 44 KENYA: AFRICA CYBER SECURITY MARKET SIZE, BY TYPE, 2014–2020 ($MILLION)
Table 45 KENYA: AFRICA CYBER SECURITY MARKET SIZE, BY SOLUTION, 2014–2020 ($MILLION)
Table 46 KENYA: AFRICA CYBER SECURITY MARKET SIZE, BY SERVICE, 2014–2020 ($MILLION)
Table 47 KENYA: AFRICA CYBER SECURITY MARKET SIZE, BY SUB-SEGMENT, 2014–2020 ($MILLION)
Table 48 KENYA: AFRICA CYBER SECURITY MARKET SIZE, BY VERTICAL, 2014–2020 ($MILLION)
Table 49 SOUTH AFRICA: AFRICA CYBER SECURITY MARKET SIZE, BY TYPE, 2014–2020 ($MILLION)
Table 50 SOUTH AFRICA: AFRICA CYBER SECURITY MARKET SIZE, BY SOLUTION, 2014–2020 ($MILLION)
Table 51 SOUTH AFRICA: AFRICA CYBER SECURITY MARKET SIZE, BY SERVICE, 2014–2020 ($MILLION)
Table 52 SOUTH AFRICA: AFRICA CYBER SECURITY MARKET SIZE, BY SUB-SEGMENT, 2014–2020 ($MILLION)
Table 53 SOUTH AFRICA: AFRICA CYBER SECURITY MARKET SIZE, BY VERTICAL, 2014–2020 ($MILLION)
Table 54 NIGERIA: AFRICA CYBER SECURITY MARKET SIZE, BY TYPE, 2014–2020 ($MILLION)
Table 55 NIGERIA: AFRICA CYBER SECURITY MARKET SIZE, BY SOLUTION, 2014–2020 ($MILLION)
Table 56 NIGERIA: AFRICA CYBER SECURITY MARKET SIZE, BY SERVICE, 2014–2020 ($MILLION)
Table 57 NIGERIA: AFRICA CYBER SECURITY MARKET SIZE, BY SUB-SEGMENT, 2014–2020 ($MILLION)
Table 58 NIGERIA: AFRICA CYBER SECURITY MARKET SIZE, BY VERTICAL, 2014–2020 ($MILLION)
Table 59 MOROCCO: AFRICA CYBER SECURITY MARKET SIZE, BY TYPE, 2014–2020 ($MILLION)
Table 60 MOROCCO: AFRICA CYBER SECURITY MARKET SIZE, BY SOLUTION, 2014–2020 ($MILLION)
Table 61 MOROCCO: AFRICA CYBER SECURITY MARKET SIZE, BY SERVICE, 2014–2020 ($MILLION)
Table 62 MOROCCO: AFRICA CYBER SECURITY MARKET SIZE, BY SUB-SEGMENT, 2014–2020 ($MILLION)
Table 63 MOROCCO: AFRICA CYBER SECURITY MARKET SIZE, BY VERTICAL, 2014–2020 ($MILLION)
Table 64 OTHERS: AFRICA CYBER SECURITY MARKET SIZE, BY TYPE, 2014–2020 ($MILLION)
Table 65 OTHERS: AFRICA CYBER SECURITY MARKET SIZE, BY SOLUTION, 2014–2020 ($MILLION)
Table 66 OTHERS: AFRICA CYBER SECURITY MARKET SIZE, BY SERVICE, 2014–2020 ($MILLION)
Table 67 NEW PRODUCT LAUNCHES, 2013–2015
Table 68 NEW ALLIANCES, CONTRACTS, PARTNERSHIPS, AND AGREEMENTS, 2013–2015
Table 69 MERGERS AND ACQUISITIONS, 2013–2015
Table 70 EXPANSIONS, 2013–2014

LIST OF FIGURES

Figure 1 AFRICA CYBER SECURITY MARKET: RESEARCH DESIGN
Figure 2 BREAKDOWN OF PRIMARY INTERVIEWS: BY COMPANY TYPE, DESIGNATION, AND COUNTRY
Figure 3 MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
Figure 4 MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
Figure 5 DATA TRIANGULATION
Figure 6 SOLUTION SEGMENT WOULD COVER THE MAXIMUM SHARE OF AFRICA CYBER SECURITY MARKET
Figure 7 ANTIVIRUS AND ANTIMALWARE SOLUTION IS EXPECTED TO LEAD THE AFRICA CYBER SECURITY MARKET THROUGHOUT THE FORECAST PERIOD
Figure 8 INDUSTRIAL CONTROL SYSTEM SECURITY WOULD CONTINUE TO DOMINATE THE AFRICA CYBER SECURITY MARKET
Figure 9 BFSI VERTICAL IS EXPECTED TO HAVE THE LARGEST MARKET SHARE BY 2020
Figure 10 INCREASE IN IT SPENDING IS DRIVING THE AFRICA CYBER SECURITY MARKET
Figure 11 SERVICE MARKET TO GROW AT THE HIGHEST RATE AMONG THE SEGMENTS OF THE AFRICA CYBER SECURITY MARKET DURING THE FORECAST PERIOD
Figure 12 ANTIVIRUS AND ANTIMALWARE AND ENERGY AND UTILITIES HOLD THE MAXIMUM SHARE IN THE AFRICA CYBER SECURITY MARKET (2015)
Figure 13 MOROCCO WILL GROW WITH THE HIGHEST CAGR BETWEEN 2015 AND 2020
Figure 14 CYBER SECURITY MARKET: EVOLUTION
Figure 15 AFRICA CYBER SECURITY MARKET SEGMENTATION: BY SUB-SEGMENT
Figure 16 AFRICA CYBER SECURITY MARKET SEGMENTATION: BY SOLUTION
Figure 17 AFRICA CYBER SECURITY MARKET SEGMENTATION: BY SERVICE
Figure 18 AFRICA CYBER SECURITY MARKET SEGMENTATION: BY VERTICAL
Figure 19 AFRICA CYBER SECURITY MARKET SEGMENTATION: BY COUNTRY
Figure 20 DRIVERS, RESTRAINS, OPPORTUNITIES AND CHALLENGES: AFRICA CYBER SECURITY MARKET
Figure 21 VALUE CHAIN: CYBER SECURITY MARKET
Figure 22 PORTER’S FIVE FORCES ANALYSIS: AFRICA CYBER SECURITY MARKET
Figure 23 AFRICA CYBER SECURITY MARKET IS EXPECTED TO BE DOMINATED BY INDUSTRIAL CONTROL SYSTEMS SECURITY THROUGHOUT THE FORECAST PERIOD
Figure 24 ANTIVIRUS AND ANTIMALWARE SOLUTION WILL LEAD THE SOLUTION MARKET IN 2020
Figure 25 MANAGED SECURITY SERVICES WOULD ACCOUNT FOR THE MAXIMUM SHARE IN THE SERVICE MARKET IN 2020
Figure 26 CYBER SECURITY WILL WITNESS HIGH RATE OF ADOPTION FROM THE BFSI SECTOR IN THE FORECAST PERIOD
Figure 27 SOUTH AFRICA WOULD HAVE THE MAXIMUM MARKET SIZE IN THE AFRICA CYBER SECURITY MARKET THROUGHOUT THE FORECAST PERIOD
Figure 28 COMPANIES ADOPTED NEW PRODUCT LAUNCHES AS THE KEY GROWTH STRATEGY ( 2013-2015)
Figure 29 MARKET EVALUATION FRAMEWORK: NEW PRODUCT LAUNCHES HAS FUELED GROWTH IN 2013–2015
Figure 30 BATTLE FOR MARKET SHARE: NEW PRODUCT LAUCNHES IS THE KEY STRATEGY
Figure 31 GEOGRAPHIC REVENUE MIX OF TOP 5 MARKET PLAYERS
Figure 32 EMC CORPORATION: COMPANY SNAPSHOT
Figure 33 EMC CORPORATION: SWOT ANALYSIS
Figure 34 FORTINET, INC.: COMPANY SNAPSHOT
Figure 35 FORTINET, INC.: SWOT ANALYSIS
Figure 36 CISCO SYSTEMS, INC.: COMPANY SNAPSHOT
Figure 37 CISCO SYSTEMS: SWOT ANALYSIS
Figure 38 IBM: COMPANY SNAPSHOT
Figure 39 IBM: SWOT ANALYSIS
Figure 40 SYMANTEC CORPORATION: COMPANY SNAPSHOT
Figure 41 SYMANTEC CORPORATION: SWOT ANALYSIS
Figure 42 CHECK POINT SOFTWARE TECHNOLOGIES LTD.: COMPANY SNAPSHOT
Figure 43 HEWLETT-PACKARD: COMPANY SNAPSHOT
Figure 44 COMPUTER SCIENCES CORP. (CSC): COMPANY SNAPSHOT
Figure 45 TREND MICRO INC.: COMPANY SNAPSHOT


More Publications