[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Global Cyber Security Market 2013-2023

December 2012 | 353 pages | ID: G95167C33BFEN
Visiongain

US$ 2,400.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The proliferation of cyber attacks over the past decade has meant that many companies and government organisations are now fully aware of the dangers exposed to them through under-protected networks or from individual negligence. The growth of the internet has meant that cyber attacks represent a borderless challenge to security operators, who must now find solutions that are successful within the entire cyber domain rather than a specific tangible location. As a consequence, Visiongain has determined that the value of the global cyber security market in 2013 will reach $68.34bn.

What makes this report unique?

Visiongain consulted widely with industry experts and full transcripts from these exclusive interviews with Lockheed Martin, IBM, QinetiQ, Tempest Security Intelligence, Lacoon Mobile Security and ICS8 are included in the report. As such, our reports have a unique blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments, as well as identifying the technological issues. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global, submarket and regional markets forecasts from 2013-2023 - all identifying strategic business opportunities.

Why you should buy Global Cyber Security Market 2013-2023
  • Stay ahead with this comprehensive analysis of the Global Cyber Security market prospects
    • The report comprises 348 pages
  • Get ahead by studying highly quantitative content that delivers solid conclusions benefiting your research and analysis
    • 222 tables, charts, and graphs quantifying and forecasting the cyber security market
  • Read exclusive expert opinion interviews from 6 industry specialists informing the analysis
    • IBM Corporation - The world's largest business and technology services provider.
    • Lockheed Martin Corporation - The world's largest defence contractor and leading cyber security provider.
    • QinetiQ plc - One of the leading defence and security companies in cyber security.
    • Tempest Security Intelligence - A leading Brazilian cyber security operations provider.
    • Lacoon Mobile Security - A leading Israeli company providing security solutions for mobile computing.
    • ISC8 Inc. - A leading US cyber security solutions proivder
  • View global market forecasts from 2013-2023 to keep your knowledge one step ahead of the competition
    • The report provides an analytical overview with detailed sales projections and analysis of the global cyber security market, the competitors, and the commercial drivers and restraints. It also provides an examination of national cyber security strategies, commercial opportunities, and future disruptive technologies.
  • Keep up to date with developments within each of the cyber security market sectors with individual market forecasts from 2013-2023
    • Military
    • Government
    • Critical Infrastructure
    • Private Sector
  • Keep informed about the potential for each of the cyber security submarkets with separate forecasts from 2013-2023
    • Network Security
    • Security Operations
    • Data Security
    • Identity & Access
    • Endpoint Security
    • Application Security
    • Cloud Security
  • Learn about the opportunities in 13 leading countries with individual national market forecasts between 2013-2023
    • United States
    • China
    • Japan
    • United Kingdom
    • Germany
    • France
    • Russia
    • Italy
    • India
    • Canada
    • Australia
    • South Korea
    • Israel
  • Find out about the market dynamics & opportunities in 13 leading countries
    • Detailed national tables of significant cyber security contracts, projects & programmes
  • Understand the competitive landscape with profiles of 17 leading cyber security companies examining their positioning, products, services, focus, strategies and outlook.
    • BAE Systems
    • Boeing Defense, Space and Security
    • Booz Allen Hamilton, Inc.
    • Computer Science Corporation (CSC)
    • EADS Group
    • General Dynamics Corporation
    • Harris Corporation
    • Hewlett Packard (HP) Company
    • IBM Corporation
    • Intel Corporation
    • L-3 Communications
    • Lockheed Martin Corporation
    • Northrop Grumman Corporation
    • Raytheon Company
    • SAIC, Inc.
    • Symantec Corporation
    • Thales Group
  • Discover the qualitative analysis informing the market forecasts
    • STEP analysis of social, technological, economic and political matters, revealing what drives and restrains the global cyber security industry and the prospects for established companies and new market entrants.
How the Global Cyber Security Market 2013-2023 report can benefit you

Visiongain's report is for anyone requiring analysis of the global cyber security market. You will discover market forecasts, technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are.

If you buy our report today your knowledge will stay one step ahead of your competitors. Discover how our report could benefit your research, analyses and strategic decisions, saving you time. To gain an understanding of how to tap into the potential of this market and keep one step ahead of the competition you must order now our report Global Cyber Security Market 2013-2023.
1. EXECUTIVE SUMMARY

1.1 Cyber Security Market Overview
1.2 Benefits of This Report
1.3 Who is This Report For?
1.4 Methodology
1.5 Global Cyber Security Market Forecast 2013-2023
1.6 Leading National Cyber Security Market Forecasts 2013-2023
1.7 Cyber Security Market Sector Forecasts 2013-2023
1.8 Cyber Security Submarket Forecasts 2013-2023

2. INTRODUCTION TO THE CYBER SECURITY MARKET 2013-2023

2.1 Defining The Cyber Security Market
2.2 The Cyber Security Market Structure Overview
2.3 Cyber Security Attacks, Weapons & Defences
  2.3.1 Mechanisms of Cyber Attack
  2.3.2 Cyber Weaponry
  2.3.3 Methods of Cyber Defence
2.4 List of Major Cyber Attacks
  2.4.1 Estonia
  2.4.2 Operation Orchard
  2.4.3 Georgia
  2.4.4 Conficker
  2.4.5 Pentagon
  2.4.6 Aurora
  2.4.7 Chinese Diversion of Internet Traffic
  2.4.8 Stuxnet
  2.4.9 Duqu
  2.4.10 RSA
  2.4.11 Sony
  2.4.12 Operation Shady RAT
  2.4.13 Mitsubishi Heavy Industries
  2.4.14 Flame / Operation: Olympic Games

3. GLOBAL CYBER SECURITY MARKET FORECAST 2013-2023

3.1 The Global Cyber Security Market Forecast 2013-2023
3.2 The Global Cyber Security Market Analysis 2013-2023
3.3 Global Cyber Security Drivers & Restraints
3.4 The Global Cyber Security Market Forecast 2013-2023
3.5 The Global Cyber Security Market Growth Rates
3.6 Fastest Growing Leading National Cyber Security Markets
  3.6.1 Fastest Growing Leading National Cyber Security Markets 2013-2023
  3.6.2 Fastest Growing Leading National Cyber Security Markets 2013-2018
  3.6.3 Fastest Growing Leading National Cyber Security Markets 2018-2023
3.7 Fastest Growing Cyber Security Market Sectors
  3.7.1 Fastest Growing Cyber Security Market Sectors 2013-2023
  3.7.2 Fastest Growing Cyber Security Market Sectors 2013-2018
  3.7.3 Fastest Growing Cyber Security Market Sectors 2018-2023
3.8 Fastest Growing Cyber Security Submarkets
  3.8.1 Fastest Growing Cyber Security Submarkets 2013-2023
  3.8.2 Fastest Growing Cyber Security Submarkets 2013-2018
  3.8.3 Fastest Growing Cyber Security Submarkets 2018-2023
3.9 Leading National Cyber Security Markets Share Forecast 2013-2023
3.10 Cyber Security Market Sectors Share Forecast 2013-2023
3.11 Cyber Security Submarket Share Forecasts 2013-2023
3.12 Cumulative Value of the Cyber Security Market 2013-2023
  3.12.1 Cumulative Value of the Leading National Cyber Security Markets 2013-2023
  3.12.2 Cyber Security Market Sectors Cumulative Value 2013-2023
  3.12.3 Cumulative Value of the Cyber Security Submarkets 2013-2023

4. LEADING NATIONAL CYBER SECURITY MARKETS 2013-2023

4.1 Leading National Cyber Security Markets Share Forecast 2013-2023
4.2 US Cyber Security Market 2013-2023
  4.2.1 US Cyber Security Market Forecast
  4.2.2 US Cyber Security Market Analysis
  4.2.3 Why all US Cyber Security Market Sectors will Record Impressive Growth
  4.2.4 Mobile & Tablet Technologies to Drive US Private Sector Growth
  4.2.5 US Federal Government Cyber to Boost Growth
  4.2.6 US DHS Budget Request
  4.2.7 The US Cyber Security Act
  4.2.8 Operation: Olympic Games(?)
  4.2.9 US International Strategy for Cyberspace 2011
  4.2.10 US Government and Military Cyber Organisations and Structure
  4.2.11 CNCI
  4.2.12 US CYBERCOM
  4.2.13 ARCYBER
  4.2.14 AFCYBER
  4.2.15 FLTCYBERCOM
  4.2.16 MARFORCYBER
  4.2.17 NSA
  4.2.18 Perfect Citizen
  4.2.19 DISA
  4.2.20 DHS
  4.2.21 National Cyber Security Center
  4.2.22 National Protection and Programs Directorate
  4.2.23 Office of Cyber Security and Communications
  4.2.24 Einstein II
  4.2.25 Cyberstorm III
  4.2.26 DARPA
  4.2.27 CINDER
  4.2.28 780th Military Intelligence Brigade
  4.2.29 Major US Cyber Security Contracts & Programmes
4.3 Japanese Cyber Security Market 2013-2023
  4.3.1 Japanese Cyber Security Market Forecast
  4.3.2 Japanese Cyber Security Market Analysis
  4.3.3 What Cyber Threats Currently Face Japan?
  4.3.4 Why Current Japanese Efforts are Expected to Drive Growth
  4.3.5 Japanese Defence Budget Cyber Allocation
  4.3.6 Major Japanese Cyber Security Contracts & Programmes
4.4 Chinese Cyber Security Market 2013-2023
  4.4.1 Chinese Cyber Security Market Forecast
  4.4.2 Chinese Cyber Security Market Analysis
  4.4.3 What China's Doctrinal Emphasis on Cyberspace Means for Spending
  4.4.4 Has the Chinese Emphasis on Cyberspace been Overstated?
  4.4.5 Shanghai Cooperation Organisation Cyber Security Strategy
  4.4.6 National Computer Network Emergency Response Coordination Centre of China Report
  4.4.7 UN Code of Conduct Proposed
  4.4.8 Huawei / ZTE - Contract Bidding
4.5 UK Cyber Security Market 2013-2023
  4.5.1 UK Cyber Security Market Forecast
  4.5.2 UK Cyber Security Market Analysis
  4.5.3 Is the UK a 'European' Cyber Security Market?
  4.5.4 Where is the UK Spending on Cyber Security?
  4.5.5 Is the UK Policy on Cyber Security Working?
  4.5.6 Cyber Information Sharing Partnership
  4.5.7 Major UK Cyber Security Contracts & Programmes
4.6 German Cyber Security Market 2013-2023
  4.6.1 German Cyber Security Market Forecast
  4.6.2 German Cyber Security Market Analysis
  4.6.3 Why Cyber Security is Still a Major Threat to the German Economy
  4.6.4 Cyber Security Strategy for Germany
  4.6.5 National Cyber Response Centre
  4.6.6 Cyber Security Strategy Criticism
  4.6.7 Other German Organisations involved in Cyber Security
  4.6.8 German International Cyber Security Focus
4.7 French Cyber Security Market 2013-2023
  4.7.1 French Cyber Security Market Forecast
  4.7.2 French Cyber Security Market Analysis
  4.7.3 Why France Still Trails Europe in Cyber Security and How to Overcome the Threat
  4.7.4 French Offensive Cyber Capabilities
  4.7.5 CNIL
  4.7.6 French Efforts to Block Chinese Telecommunications Products
  4.7.7 French Bilateral Efforts: US/EU
4.8 Russian Cyber Security Market 2013-2023
  4.8.1 Russian Cyber Security Market Forecast
  4.8.2 Russian Cyber Security Market Analysis
  4.8.3 Why Russian Cyber Security Strategy will see Growth Decline in the Long-Term
  4.8.4 Is Russia's Reputation as Insecure in Cyber Space Driving Investment Away?
  4.8.5 Russian Cyber Security Strategy
  4.8.6 Russian Military Cyber Security Command
  4.8.7 Russian Bilateral Agreements for Cyber Security
  4.8.8 Major Russian Cyber Security Contracts & Programmes
4.9 Italian Cyber Security Market 2013-2023
  4.9.1 Italian Cyber Security Market Forecast
  4.9.2 Italian Cyber Security Market Analysis
  4.9.3 Why the Italian Cyber Threat Landscape is Still Disruptive, not Destructive
  4.9.4 Can Italian Economic Prospects Improve to Generate Cyber Security Spending Growth?
4.10 Indian Cyber Security Market 2013-2023
  4.10.1 Indian Cyber Security Market Forecast
  4.10.2 Indian Cyber Security Market Analysis
  4.10.3 Why India's Threat Landscape is Evolving in Scale
  4.10.4 How the Indian Power Outage has Concentrated Cyber Awareness
  4.10.5 Why India's Strong IT Sector Cannot Afford Cyber Insecurity
  4.10.6 Indian Bilateral Agreements
  4.10.7 Indian Offensive Cyber Capabilities
  4.10.8 Indian Cyber Security Strategy
  4.10.9 Indian Military Cyber Leadership
  4.10.10 Indian Cyber Security Personnel Expansion
  4.10.11 Indian Government Website Measures
4.11 Canadian Cyber Security Market 2013-2023
  4.11.1 Canadian Cyber Security Market Forecast
  4.11.2 Canadian Cyber Security Market Analysis
  4.11.3 A 'Nine-to-Five' Canadian Cyber Security Policy Cannot Succeed
  4.11.4 Can the Canadian Government Improve its Working Relationship with the Canadian Private Sector?
  4.11.5 Canada's Cyber Security Strategy
  4.11.6 Canada Bans Huawei from Government Contract
  4.11.7 Canadian Cy/US Partnership
  4.11.8 Canadian Cyber Incident Response Centre (CCIRC)
4.12 Australian Cyber Security Market 2013-2023
  4.12.1 Australian Cyber Security Market Forecast
  4.12.2 Australian Cyber Security Market Analysis
  4.12.3 Have Australian Cyber Security Efforts Stalled?
  4.12.4 Australian/US/NATO Bilateral Agreement
  4.12.5 Australian Cyber Security Strategy
  4.12.6 Huawei Ban
  4.12.7 Cyber Security Operations Centre (CSOC)
  4.12.8 Major Australian Cyber Security Contracts & Programmes
4.13 South Korean Cyber Security Market 2013-2023
  4.13.1 South Korean Cyber Security Market Forecast
  4.13.2 South Korean Cyber Security Market Analysis
  4.13.3 South Korea: A Uniquely Threatened Cyber Landscape?
  4.13.4 Is a South Korean Civic Mentality Actually Increasing Tensions in Cyber Space?
  4.13.5 South Korean Government to Place Increased Emphasis on Cyber Security
  4.13.6 Can the South Korean Private Sector Take the Lead on Cyber Security?
  4.13.7 NCSC
  4.13.8 Possible Bilateral Agreement with Japan/US
4.14 Israeli Cyber Security Market 2013-2023
  4.14.1 Israeli Cyber Security Market Forecast
  4.14.2 Israeli Cyber Security Market Analysis
  4.14.3 Why Israel's Security Situation Continues to Drive Growth
  4.14.4 Are Israeli Government Efforts Weakening Cyber Security?
  4.14.5 How Israel is Coordinating its Response to the Threat
  4.14.6 National Cyber Directorate (NCD)
  4.14.7 Police Cyber Crime Unit
  4.14.8 India/Israel partnership
  4.14.9 Major Israeli Cyber Security Contracts & Programmes
4.15 ROW Cyber Security Market 2013-2023
  4.15.1 ROW Cyber Security Market Forecast
  4.15.2 ROW Cyber Security Market Analysis
  4.15.3 South America
  4.15.4 South-East Asia
  4.15.5 Europe
  4.15.6 Africa

5. CYBER SECURITY MARKER SECTORS 2013-2023

5.1 Cyber Security Marker Sector Forecasts 2013-2023
5.2 The Cyber Security Military Market Sector 2013-2023
  5.2.1 The Cyber Security Military Market Sector Forecast
  5.2.2 Cyber Security Market Military Sector Analysis
  5.2.3 Why the Growth of Offensive Cyber Capabilities will see Military Cyber Security Spending More than Double by 2023
  5.2.4 Network-Centric Systems to Enhance Operational Capability; To also Generate Additional Vulnerabilities
  5.2.5 How will the Cyber Security Military Market Sector Respond to Defence Budget Cuts?
5.3 The Cyber Security Government Market Sector 2013-2023
  5.3.1 The Cyber Security Government Market Sector Forecast
  5.3.2 Cyber Security Government Market Sector Analysis
  5.3.3 Increased Government Reliance on Information Sharing to Increase Spending
  5.3.4 Is Government Cyber Security Spending Limited by Previous Outlays?
5.4 The Cyber Security Critical Infrastructure Market Sector 2013-2023
  5.4.1 The Cyber Security Critical Infrastructure Market Sector Forecast
  5.4.2 Cyber Security Critical Infrastructure Market Sector Analysis
  5.4.3 Why the Fragmentation of the Critical Infrastructure Sector will Boost Cyber Security Spending Growth Higher than Any Market Sector
  5.4.4 Why Public-Private Partnerships Represent Major Opportunities
5.5 The Cyber Security Private Sector Market Sector 2013-2023
  5.5.1 The Cyber Security Private Sector Market Sector Forecast
  5.5.2 Cyber Security Private Sector Market Sector Analysis
  5.5.3 Cyber Crime Threat to Boost Investment in Private Sector Spending to $72bn by 2023
  5.5.4 Has the Private Sector Underestimated the Threat to IP Theft?
  5.5.5 Where are the Future Opportunities for Private Sector Companies in the Cyber Security Market?
  5.5.6 Is Media Attention to Cyber Threats Missing the Point?

6. CYBER SECURITY SUBMARKETS 2013-2023

6.1 Cyber Security Submarket Forecasts 2013-2023
6.2 The Cyber Security Network Security (NetSec) Submarket 2013-2023
  6.2.1 The Cyber Security Network Security (NetSec) Submarket Forecast
  6.2.2 Network Security to Remain the Largest Cyber Security Submarket in 2023
6.3 The Cyber Security Operations (SecOps) Submarket 2013-2023
  6.3.1 The Cyber Security Operations (SecOps) Submarket Forecast
  6.3.2 Security Operations to Record Compound Growth of 6.9% as a Result of Demand for Proactive Cyber Threat Defences
6.4 The Cyber Security Data Security (DataSec) Submarket 2013-2023
  6.4.1 The Cyber Security Data Security (DataSec) Submarket Forecast
  6.4.2 Why the Wikileaks Phenomenon Presents Major New Challenges to Data Security Efforts
6.5 The Cyber Security Identity & Access (ID&Acc) Submarket 2013-2023
  6.5.1 The Cyber Security Identity & Access (ID&Acc) Submarket Forecast
  6.5.2 Why Biometric Technologies are Not the Answer to Identity & Access Management in Cyber Security, Yet
6.6 The Cyber Security Endpoint Security (EndSec) Submarket 2013-2023
  6.6.1 The Cyber Security Endpoint Security (EndSec) Submarket Forecast
  6.6.2 'Bring Your Own Device' to Drive Growth in the Endpoint Security Submarket at Rates Above 10%
6.7 The Cyber Security Application Security (AppSec) Submarket 2013-2023
  6.7.1 The Cyber Security Application Security (AppSec) Submarket Forecast
  6.7.2 Find Out Why Growth in the Application Security Submarket is Inherently Unstable
6.8 The Cyber Security Cloud Security (CloudSec) Submarket 2013-2023
  6.8.1 The Cyber Security Cloud Security (CloudSec) Submarket Forecast
  6.8.2 Not a Cloud in the Sky? Spending on Cloud Security Submarket to Quadruple over the Forecast Period

7. STEP ANALYSIS OF THE CYBER SECURITY MARKET 2013-2023

7.1 Social
  7.1.1 Cyber Awareness & Education
  7.1.2 'Hacktivism'
  7.1.3 Privacy Fears
  7.1.4 Low-risk Criminal Option
7.2 Technological
  7.2.1 Rapid Developments in Sector
  7.2.2 Proliferation of Cyber Weapons
  7.2.3 Smartphones, Tablets, and New Devices
  7.2.4 Threats to Modern Weaponry
7.3 Economic
  7.3.1 Market Consolidation Through M&A Activity
  7.3.2 Growth of the Digital Economy
  7.3.3 Increased Internet Accessibility
  7.3.4 Hardware Procurement Concerns
7.4 Political
  7.4.1 Strong Government Commitments
  7.4.2 International Efforts to Regulate Cyberspace
  7.4.3 Increasingly Holistic National Policies
  7.4.4 Cyber Warfare

8. EXPERT OPINION

8.1 IBM Corporation: Martin Borrett
  8.1.1 The IBM Institute for Advanced Security
  8.1.2 IBM Advanced Security Global Operations
  8.1.3 Mobile, Big Data, and the Cloud: Where does the threat lie?
  8.1.4 What are the Emerging trends in the Cyber Security Market?
  8.1.5 Does IBM Consider that we are Becoming More Vulnerable?
  8.1.6 Proactive Security Intelligence: The End of Passive Cyber Security?
  8.1.7 How Analytics will Work to Filter Out the 'Noise' from the 'Truth'
  8.1.8 IBM's Q1 Labs Acquisition & The Current Status of Analytics
  8.1.9 IBM's Opposition to the US Cyber Security Bill - Where now?
  8.1.10 Why Small Businesses are Still Unprepared for the Cyber Threat
  8.1.11 How Small Businesses can Leverage Established Security Providers
  8.1.12 The Growing Threat to Intellectual Property & Cyber Security
  8.1.13 Why a Global Forum is Needed to Address Cyber Security Concerns
  8.1.14 How Information Sharing Restrictions Affect Cyber Security
  8.1.15 IBM v Competitors - Strengths & Specialisms
  8.1.15 Why IBM Continues to Emphasise Integration in Business
  8.1.16 Looking to the Future: What Role will Biometrics, Quantum Computing and Intuitive Computers Have on Cyber Security?
8.2 QinetiQ: Anthony Dyhouse
  8.2.1 Tony Dyhouse: From Engineering to Cyber Intelligence
  8.2.2 How the Cyber Threat Landscape has Evolved
  8.2.3 Why Holistic Efforts will be Necessary for Future UK Cyber Security
  8.2.4 QinetiQ: "Cyber Insight" and the Human Factor
  8.2.5 QinetiQ Cyveillance: How to Monitor the Global Internet
  8.2.6 Is Awareness of the Threat Still Not Enough for Small Business?
  8.2.7 Is the Cyber Threat Overstated?
  8.2.8 How Technology is being Compromised by the Human Factor
  8.2.9 The Evolution of the Future Cyber Threat Landscape - 'We Ain't Seen Nothing Yet'
  8.2.10 What Anonymity Means for the Future of Cyber Security
  8.2.11 How Information Sharing is Continuing to Degrade Effectiveness
  8.2.12 Reverse-Engineering Malware: An Evolved Threat?
  8.2.13 Assessing the Potential of what the Future may Bring
8.3 Tempest Security Intelligence: Christiano Mattos
  8.3.1 Why the Brazilian Cyber Security Market has Taken 'Two Steps Forward, Three Steps Back'
  8.3.2 What Scope does the Brazilian Market have for Private Sector Security Providers?
  8.3.3 Does the Brazilian Cyber Security Market Suffer from a lack of Role Definition?
  8.3.4 Tempest Security and the UK - Regional Factors & Cyber Security
  8.3.5 Cyber Security in a Services Economy & a Commodities Economy
  8.3.6 Brazilian Malware - Multifaceted & Evolving
  8.3.7 Why the Febraban Coordinates a Private Sector Response
  8.3.8 Core Cyber Security Technologies and Adapting to New Markets
  8.3.9 Is the European Cyber Security Market Private or Government-led?
  8.3.10 The Importance of Long-Term Relationships
  8.3.11 How Tempest Overcomes the Cyber Skills Challenge
  8.3.12 How Core Cyber Security Business Interacts with New Opportunities
  8.3.13 Canadian Cyber Security: A Nine-to-Five Service?
  8.3.14 Why Canada's Cyber Centre is Unsustainable
  8.3.15 Hacktivism - Embarrassment or Serious Threat?
  8.3.16 Hacktivists - Politics or Boredom?
  8.3.17 The RUSI Cyber Security Conference - The Importance of Friends
  8.3.18 The Brazilian National Defence Strategy & Cyber Security
  8.3.19 Why are Security Companies Choosing Brazil?
  8.3.20 Is Brazil Suffering from the Global Cyber Skills Shortage?
  8.3.21 Cyber Security Skills and M&A Activity - The Causal Link?
  8.3.22 'Big Data' - How to Hack Director Petraeus
  8.3.23 The US Federal Government Versus the Lone Hacker - A Fearful Asymmetry?
  8.3.24 Cyber Weapons Proliferation - The Expanding Attack Space
8.4 Lockheed Martin Corporation
  8.4.1 The Techniques Behind Lockheed Martin's Success
  8.4.2 Advanced Persistent Threats Versus Lockheed's 'Kill Chain'
  8.4.3 Lockheed Martin M&A Policy - Splendid Isolation?
  8.4.4 How Lockheed's Cyber Security Alliance 'Closes the Seams'
  8.4.5 Lockheed Martin's Take on the Cyber Security Bill
  8.4.6 Are Defence Subcontractors the Vulnerable Link?
  8.4.7 Lockheed and the CRSA - 'Game-Changing Cyber Security Solutions?'
8.5 Lacoon Security: Michael Shaulov
  8.5.1 What does Lacoon Offer in Response to the Mobile Cyber Threat?
  8.5.2 Mobile Devices and BYOD: The Weak Link in the Cyber Security Chain?
  8.5.3 What Type of Risks Exist and What Can They Affect?
  8.5.4 How will Mobile Malware Evolve in the Future?
  8.5.5 Where Should Organisations Invest to Enhance Cyber Security?
  8.5.6 What Challenges Currently Exist for Mobile Security Vendors?
  8.5.7 How has the Cyber Security Market Evolved?
  8.5.8 'Flame' - The Next Step in Sophistication
  8.5.9 Do Media Headlines Represent the True Nature of the Cyber Threat?
  8.5.10 Automated Detection: How to Counter Spy Phone Software
  8.5.11 Will Israel's Opponents Move to Cyberspace as an Attack Vector?
8.6 ISC8 Inc.
  8.6.1 What sets ISC8 Apart from other Security Providers?
  8.6.2 What Trends do you see in the Cyber Security Market?
  8.6.3 How Does ISC8's Acquisitions of 'Big Data' Analytics Companies Help it to Compete?
  8.6.4 How Significant is 'Big Data' in Cyber Security?
  8.6.5 What Challenges are you Facing in the Cyber Security Market?
  8.6.6 How Does ISC8 Face the Challenges of the Human Element in Cyber Security?

9. LEADING COMPANIES IN THE CYBER SECURITY MARKET

9.1 BAE Systems
  9.1.1 BAE Systems Analysis
  9.1.2 BAE Systems Competitors
  9.1.3 BAE Systems Regional Emphasis / Focus
  9.1.4 BAE Systems M&A Activity
  9.1.5 BAE Systems Future Outlook
9.2 Boeing Defense, Space and Security
  9.2.1 Boeing Defense, Space and Security Analysis
  9.2.2 Boeing Defense, Space and Security M&A Activity
9.3 Booz Allen Hamilton, Inc.
  9.3.1 Booz Allen Analysis
  9.3.2 Booz Allen M&A Activity
9.4 Computer Science Corporation (CSC)
  9.4.1 CSC Analysis
9.5 EADS Group
  9.5.1 EADS Analysis
  9.5.2 EADS M&A Activity
9.6 General Dynamics Corporation
  9.6.1 General Dynamics Analysis
9.7 Harris Corporation
  9.7.1 Harris Corporation Analysis
9.8 Hewlett Packard (HP) Company
  9.8.1 HP Analysis
  9.8.2 HP Competitors
  9.8.3 HP Regional Emphasis / Focus
  9.8.4 HP M&A Activity
  9.8.5 HP Future Outlook
9.9 International Business Machines (IBM) Corporation
  9.9.1 IBM Analysis
  9.9.2 IBM Competitors
  9.9.3 IBM Regional Emphasis / Focus
  9.9.4 IBM M&A Activity
  9.9.5 IBM Future Outlook
9.10 Intel Corporation (incl. McAfee, Inc.)
  9.10.1 Intel Analysis
  9.10.2 Intel Competitors
  9.10.3 Intel Regional Emphasis / Focus
  9.10.4 Intel M&A Activity
  9.10.5 Intel Future Outlook
9.11 L-3 Communications
  9.11.1 L-3 Communications Analysis
  9.11.2 L-3 Communications M&A Activity
9.12 Lockheed Martin Corporation
  9.12.1 Lockheed Martin Analysis
  9.12.2 Lockheed Martin Competitors
  9.12.3 Lockheed Martin Regional Emphasis / Focus
  9.12.4 Lockheed Martin M&A Activity
  9.12.5 Lockheed Martin Future Outlook
9.13 Northrop Grumman Corporation
  9.13.1 Northrop Grumman Analysis
  9.13.2 Northrop Grumman M&A Activity
9.14 Raytheon Company
  9.14.1 Raytheon Analysis
  9.14.2 Raytheon M&A Activity
9.15 SAIC, Inc.
  9.15.1 SAIC Analysis
  9.15.2 SAIC Competitors
  9.15.3 SAIC Regional Emphasis / Focus
  9.15.4 SAIC M&A Activity
  9.15.5 SAIC Future Outlook
9.16 Symantec Corporation
  9.16.1 Symantec Analysis
  9.16.2 Symantec Competitors
  9.16.3 Symantec Regional Emphasis / Focus
  9.16.4 Symantec M&A Activity
  9.16.5 Symantec Future Outlook
9.17 Thales Group
  9.17.1 Thales Analysis
  9.17.2 Thales Competitors
  9.17.3 Thales Regional Emphasis / Focus
  9.17.4 Thales Future Outlook
9.18 Other Relevant Companies in the Cyber Security Market

10. CONCLUSIONS

10.1 The Cyber Security Market Outlook 2013-2023
10.2 Cyber Security Market Drivers & Restraints
10.3 Global Cyber Security Market Forecast 2013-2023
10.4 Leading National Cyber Security Market Forecasts 2013-2023
10.5 Cyber Security Market Sector Forecasts 2013-2023
10.6 Cyber Security Submarket Forecasts 2013-2023
10.7 Fastest Growing and Largest Cyber Security Markets 2013-2023

11. GLOSSARY

LIST OF TABLES

Table 1.1 Global Cyber Security Market Forecast Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 1.2 Leading National Cyber Security Market Forecasts Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 1.3 Cyber Security Market Sector Forecasts Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 1.4 Cyber Security Submarket Forecasts Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 2.1 Types of Cyber Attack
Table 2.2 Types of Cyber Weapons
Table 2.3 Types of Cyber Defences
Table 3.1 Global Cyber Security Market Drivers & Restraints
Table 3.2 Global Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 3.3 Global Cyber Security Market; Leading National Markets, Market Sectors & Submarkets Forecast CAGR (%) 2013-2023, 2013-2018, 2018-2023
Table 3.4 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2013-2023
Table 3.5 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2013-2018
Table 3.6 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2013-2023
Table 3.7 Fastest Growing Cyber Security Markets Sectors Forecast CAGR (%) 2013-2023
Table 3.8 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2013-2018
Table 3.9 Fastest Growing Cyber Security Markets Sectors Forecast CAGR (%) 2018-2023
Table 3.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2013-2023
Table 3.11 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2013-2018
Table 3.12 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2018-2023
Table 3.13 Leading National Cyber Security Markets Share Forecast 2013, 2018 & 2023 (% Share, % Change)
Table 3.14 Cyber Security Market Sectors Share Forecast 2013, 2018 & 2023 (% Share, % Change)
Table 3.15 Cyber Security Submarket Share Forecasts 2013, 2018 & 2023 (% Share, % Change)
Table 3.16 Cyber Security Global Market; Leading National Markets, Market Sectors, and Submarkets Cumulative Sales Forecast 2013-2023 ($bn, %)
Table 4.1 Leading National Cyber Security Markets Forecast 2013-2023 ($bn, AGR %)
Table 4.2 US Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.3 US Cyber Security Market Drivers & Restraints
Table 4.4 Major US Cyber Security Contracts & Programmes
Table 4.5 Japanese Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.6 Japanese Cyber Security Market Drivers & Restraints
Table 4.7 Major Japanese Cyber Security Contracts & Programmes
Table 4.8 Chinese Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.9 Chinese Cyber Security Market Drivers & Restraints
Table 4.10 UK Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.11 UK Cyber Security Market Drivers & Restraints
Table 4.12 Major UK Cyber Security Contracts & Programmes
Table 4.13 German Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.14 German Cyber Security Market Drivers & Restraints
Table 4.15 French Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.16 French Cyber Security Market Drivers & Restraints
Table 4.17 Russian Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.18 Russian Cyber Security Market Drivers & Restraints
Table 4.19 List of Russian and US Jointly Defined Cyber Terms
Table 4.20 Major Russian Cyber Security Contracts & Programmes
Table 4.21 Italian Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.22 Italian Cyber Security Market Drivers & Restraints
Table 4.23 Indian Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.24 Indian Cyber Security Market Drivers & Restraints
Table 4.25 Canadian Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.26 Canadian Cyber Security Market Drivers & Restraints
Table 4.27 Australian Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.28 Australian Cyber Security Market Drivers & Restraints
Table 4.29 Major Australian Cyber Security Contracts & Programmes
Table 4.30 South Korean Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.31 South Korean Cyber Security Market Drivers & Restraints
Table 4.32 Israeli Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.33 Israeli Cyber Security Market Drivers & Restraints
Table 4.34 Major Israeli Cyber Security Contracts & Programmes
Table 4.35 ROW Cyber Security Market Forecast 2013-2023 ($bn, AGR %, CAGR%, Cumulative)
Table 4.36 ROW Cyber Security Market Drivers & Restraints
Table 5.1 Cyber Security Market Sector Forecasts 2013-2023 ($bn, AGR %)
Table 5.2 Cyber Security Military Market Sector Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 5.3 Cyber Security Military Market Sector Drivers & Restraints
Table 5.4 Cyber Security Govt Market Sector Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 5.5 Cyber Security Govt Market Sector Drivers & Restraints
Table 5.6 Cyber Security Infrastructure Market Sector Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 5.7 Cyber Security Infrastructure Market Sector Drivers & Restraints
Table 5.8 List of Critical Infrastructures
Table 5.9 Cyber Security Private Market Sector Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 5.10 Cyber Security Private Market Sector Drivers & Restraints
Table 6.1 Cyber Security Submarket Forecasts 2013-2023 ($bn, AGR %)
Table 6.2 Cyber Security NetSec Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.3 Cyber Security NetSec Submarket Market Drivers & Restraints
Table 6.4 Cyber Security SecOps Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.5 Cyber Security SecOps Submarket Market Drivers & Restraints
Table 6.6 Cyber Security DataSec Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.7 Cyber Security DataSec Submarket Market Drivers & Restraints
Table 6.8 Cyber Security ID&Acc Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.9 Cyber Security ID&Acc Submarket Market Drivers & Restraints
Table 6.10 Cyber Security EndSec Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.11 Cyber Security EndSec Submarket Market Drivers & Restraints
Table 6.12 Cyber Security AppSec Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.13 Cyber Security AppSec Submarket Market Drivers & Restraints
Table 6.14 Cyber Security CloudSec Submarket Forecast 2013-2023 ($bn, AGR %, CAGR %, Cumulative)
Table 6.15 Cyber Security CloudSec Submarket Market Drivers & Restraints
Table 7.1 STEP Analysis of the Cyber Security Market 2013-2023
Table 9.1 Leading 8 Cyber Security Companies 2011 (Market Ranking, Total Revenue, Revenue in Sector, Market Share %)
Table 9.2 BAE Systems Overview 2011 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.3 BAE Systems Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.4 BAE Systems Products / Services (Division, Product, Specification)
Table 9.5 Boeing DS Overview 2011 (Total Revenue, Revenue from Defence Market, % Revenue From Defence Market, HQ, Ticker, Contact, Website)
Table 9.6 Boeing DS Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.7 Boeing Products / Services (Division, Product, Specification)
Table 9.8 Booz Allen Hamilton Overview 2011 (Total Revenue, HQ, Ticker, Contact, Website)
Table 9.9 Booz Allen Hamilton Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.10 Booz Allen Hamilton Products / Services (Division, Product, Specification)
Table 9.11 CSC Overview 2011 (Total Revenue, Revenue from Defence Market, % Revenue From Defence Market, HQ, Contact, Website)
Table 9.12 CSC Products / Services (Division, Product, Specification)
Table 9.13 EADS Group Overview 2011 (Total Revenue, HQ, Contact, Website)
Table 9.14 EADS Group Products / Services (Division, Product, Specification)
Table 9.15 General Dynamics Corporation Overview 2012 (Total Revenue, HQ, Contact, Website)
Table 9.16 General Dynamics Corporation Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.17 General Dynamics Corporation Products / Services (Division, Product, Specification)
Table 9.18 Harris Corporation Overview 2011 (Total Revenue, HQ, Ticker, Contact, Website)
Table 9.19 Harris Corporation Products / Services (Division, Product, Specification)
Table 9.20 HP Overview 2011 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.21 HP Products / Services (Division, Product, Specification)
Table 9.22 IBM Overview 2011 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.23 IBM Products / Services (Division, Product, Specification)
Table 9.24 Intel Overview 2011 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.25 Intel Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.26 L-3 Communications Overview 2011 (Total Revenue, HQ, Ticker, Contact, Website)
Table 9.27 L-3 Communications Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.28 L-3 Communications Products / Services (Division, Product, Specification)
Table 9.29 Lockheed Martin Overview 2011 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.30 Lockheed Martin Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.31 Lockheed Martin Products / Services (Division, Product, Specification)
Table 9.32 Northrop Grumman Overview 2011(Total Revenue, HQ, Ticker, Contact, Website)
Table 9.33 Northrop Grumman Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.34 Raytheon Company Overview 2011 (Total Revenue, HQ, Ticker, Contact, Website)
Table 9.35 Raytheon Company Products / Services (Division, Product, Specification)
Table 9.36 SAIC Overview 2012 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.37 SAIC Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.38 SAIC Products / Services (Division, Product, Specification)
Table 9.39 Symantec Overview 2012 (Total Revenue, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.40 Symantec Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.41 Symantec Products / Services (Division, Product, Specification)
Table 9.42 Thales Overview 2011 (Total Revenue, Revenue from Market, % Revenue From Market, Global Market Share %, HQ, Ticker, Contact, Website)
Table 9.43 Thales Contracts / Projects / Programmes 2012 (Date, Subcontractors, Country, Value, Expires, Details)
Table 9.44 Thales Products / Services (Division, Product, Specification)
Table 9.45 Other Major Companies in the Cyber Security Market (Company, Product /Service)
Table 10.1 Global Cyber Security Market Drivers & Restraints
Table 10.2 Global Cyber Security Market Forecast Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 10.3 Leading National Market Forecasts Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 10.4 Cyber Security Market Sector Forecasts Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 10.5 Cyber Security Submarket Forecasts Summary 2013, 2018, 2023 ($bn, CAGR %)
Table 10.6 Fastest Growing National Cyber Security Markets, Cyber Security Market Sectors & Cyber Security Submarkets 2013-2023 (CAGR %); Largest Cumulative National Cyber Security Markets, Cyber Security Market Sectors & Cyber Security Submarkets 2013-2023 ($m)

LIST OF FIGURES

Figure 2.1 Global Cyber Security Market Structure Overview
Figure 2.2 Operation Shady RAT Targets
Figure 3.1 Global Cyber Security Market Forecast 2013-2023 ($bn, AGR %)
Figure 3.2 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2013-2023
Figure 3.3 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2013-2018
Figure 3.4 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2018-2023
Figure 3.5 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2013-2023
Figure 3.6 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2013-2018
Figure 3.7 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2018-2023
Figure 3.8 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2013-2023
Figure 3.9 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2013-2018
Figure 3.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2018-2023
Figure 3.11 Leading National Cyber Security Markets Cumulative Sales Forecast 2013-2023 ($bn)
Figure 3.12 Leading National Cyber Security Markets Cumulative Sales Share 2013-2023 (%)
Figure 3.13 Cyber Security Market Sectors Cumulative Sales Forecast 2013-2023 ($bn)
Figure 3.14 Cyber Security Market Sectors Cumulative Sales Share 2013-2023 (%)
Figure 3.15 Cyber Security Submarkets Cumulative Sales Forecast 2013-2023 ($bn)
Figure 3.16 Cyber Security Submarkets Cumulative Sales Share 2013-2023 (%)
Figure 4.1 Leading National Cyber Security Markets Forecast 2013-2023 ($bn)
Figure 4.2 Leading National Cyber Security Markets Share Forecast 2013 (%)
Figure 4.3 Leading National Cyber Security Markets Share Forecast 2018 (%)
Figure 4.4 Leading National Cyber Security Markets Share Forecast 2023 (%)
Figure 4.5 Leading National Cyber Security Markets Percentage Share Change 2013-2023 (%)
Figure 4.6 US Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.7 US Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.8 US Government and Military Cyber Organisational Structure
Figure 4.8 US CYBERCOM Organisational Structure
Figure 4.9 Japanese Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.10 Japanese Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.11 Chinese Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.12 Chinese Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.13 UK Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.14 UK Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.15 German Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.16 German Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.17 French Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.18 French Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.19 Russian Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.20 Russian Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.21 Italian Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.22 Italian Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.23 Indian Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.24 Indian Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.25 Canadian Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.26 Canadian Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.27 Australian Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.28 Australian Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.29 South Korean Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.30 South Korean Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.31 Israeli Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.32 Israeli Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 4.33 ROW Cyber Security Market Forecast 2013-2023 ($bn, AGR%)
Figure 4.34 ROW Cyber Security Market Share Forecast 2013, 2018 and 2023 (% Share)
Figure 5.1 Cyber Security Market Sector Forecasts 2013-2023 ($bn)
Figure 5.2 Cyber Security Market Sector Share Forecast 2013 (%)
Figure 5.3 Cyber Security Market Sector Share Forecast 2018 (%)
Figure 5.4 Cyber Security Market Sector Share Forecast 2023 (%)
Figure 5.5 Cyber Security Market Sector Shares Percentage Change 2013-2023 (%)
Figure 5.6 Cyber Security Military Market Sector Forecast 2013-2023 ($bn, AGR %)
Figure 5.7 Cyber Security Military Market Sector Share Forecast 2013, 2018 and 2023 (% Share)
Figure 5.8 Cyber Security Govt Market Sector Forecast 2013-2023 ($bn, AGR %)
Figure 5.9 Cyber Security Govt Market Sector Share Forecast 2013, 2018 and 2023 (% Share)
Figure 5.10 Cyber Security Infrastructure Market Sector Forecast 2013-2023 ($bn, AGR %)
Figure 5.11 Cyber Security Infrastructure Market Sector Share Forecast 2013, 2018 and 2023 (% Share)
Figure 5.12 Cyber Security Private Market Sector Forecast 2013-2023 ($bn, AGR %)
Figure 5.13 Cyber Security Private Market Sector Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.1 Cyber Security Submarket Forecasts 2013-2023 ($bn)
Figure 6.2 Cyber Security Submarkets Share Forecast 2013 (%)
Figure 6.3 Cyber Security Submarkets Share Forecast 2018 (%)
Figure 6.4 Cyber Security Submarkets Share Forecast 2023 (%)
Figure 6.5 Cyber Security Submarkets Percentage Share Change 2013-2023 (%)
Figure 6.6 Cyber Security NetSec Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.7 Cyber Security NetSec Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.8 Cyber Security SecOps Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.9 Cyber Security SecOps Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.10 Cyber Security DataSec Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.11 Cyber Security DataSec Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.12 Cyber Security ID&Acc Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.13 Cyber Security ID&Acc Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.14 Cyber Security EndSec Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.15 Cyber Security EndSec Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.16 Cyber Security AppSec Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.17 Cyber Security AppSec Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 6.18 Cyber Security CloudSec Submarket Forecast 2013-2023 ($bn, AGR %)
Figure 6.19 Cyber Security CloudSec Submarket Share Forecast 2013, 2018 and 2023 (% Share)
Figure 8.1 Lacoon Security Distribution of Infected Mobile Devices
Figure 9.1 Leading 8 Companies Market Share 2011 (Approximate Market Share, %)

COMPANIES LISTED

ACS
Advanced C4 Systems Inc.
Advanced Micro Devices
Airbus
ALEX-AS, J.V.
Anagran
Apple
Applied Visions, Inc
ArcSight
ARINC
Assured Information Security, Inc
Astrium
AT&T
ATR
AVAST Software
AVG Technologies
BAE Systems
BAE Systems Australia
BAE Systems Detica
BAE Systems Electronic Systems (ES)
BAE Systems India
BAE Systems Land & Armaments (L&A)
BAE Systems Maritime
BAE Systems Military Air & Information (MA&I)
BAE Systems Regional Aircraft
BAE Systems Saudi Arabia
BAE Systems Shared Services
BAE Systems Support Solutions
Blue Screen IT Ltd
Boeing Defense, Space and Security
Boeing Information Solutions
Boeing Network & Space Systems
Bombardier
Booz Allen Hamilton Inc.
BreakingPoint Systems
British Gas
British Telecom (BT)
Business Computers Management Consulting Group, LLC
Business Integra Technology Solutions, Inc.
CACI, Inc.
Camber Corporation
Cassidian CyberSecurity
China Telecom
Cisco Systems, Inc.
CloudShield Technologies, Inc.
Columbia University
Computer Science Corporation
Corero Network Security
Creative Computing Solutions
CrySyS Lab
Cubic XD
Danaher Corporation
Defense Systems Engineering & Support
Def-Logix
Dell Corporation
Detica Group plc
Detica NetReveal
Dynamic Network Enterprises, Inc.
EADS Cassidian
EADS Group
El Al Israel Airlines Ltd
EMC Corporation
EmeSec Inc.
ETI
Eurocopter
Exelis, Inc.
Experian
Finmeccanica
Foreground Security
Fortify Software
F-Secure Corporation
Fujitsu
Galois
General Dynamics Advanced Information Systems
General Dynamics Corporation
Georgia Tech Research Corp
Global Info Tek, Inc.
Google
Group-IB
Gulfstream
Harris Corporation
Harris Government Communications Systems
Harris Integrated Network Solutions
Henggeler Computer Consultants, Inc.
Hewlett Packard Corporation (HP)
HighAction, LLC
Honeywell, Inc.
HP Enterprise Business
HP Mobility Global Business
HP Software
HRL Laboratories, LLC
Huawei Technologies Ltd
i2
IBM Global Business Services (GBS)
IBM Global Financing
IBM Global Technology Services (GTS)
IBM Integrated Supply Chain (ISC)
IBM Research
IBM Software
ICL
IHI Corporation
Imagine One StraCon Venture, LLC
In-Q-Tel
Intel Corporation
IBM Corporation
International Computer Science Institute
ISC8, Inc.
ISHPI Information Technologies, Inc.
ITT Advanced Engineering & Sciences Division
Ivincea
Jupiter Networks
Kaspersky Labs
Kawasaki Heavy Industries
Kestrel Technology, LLC
KEYW
Kratos Defense & Security Solutions, Inc.
KT Corporation
L-3 Communications
L-3 Services, Inc.
L-3 STRATIS
Lacoon Mobile Security
LETA Group
LGS Innovations
LiveOffice
Lockheed Martin Aeronautics
Lockheed Martin Corporation
Lockheed Martin Electronic Systems (ES)
Lockheed Martin Information Systems & Global Solutions (IS&GS)
Lockheed Martin Space Systems
Lockheed Martin's Information Systems & Global Solutions Division
M5 Network Security Pty Ltd
MacAuley-Brown
ManTech International Corporation
MasterCard
McAfee Inc.
MEI Technologies
Merit Network Inc
MHI
Microsoft Corporation
Mitsubishi Heavy Industries
National Agricultural Cooperatives Federation (Nonghyup)
NetApp, Inc.
Netasq
NetWitness Corporation
Network Security Systems Plus, Inc.
New York Times
Northrop Grumman Corporation
Northrop Grumman Information Systems
Norton
Nukona
Nutrisystem, Inc.
Oculis Labs
Odyssey Software
Pikewerks Corporation
Q1 Labs
Qinetiq Group Plc
QinetiQ North America
Radiance Technologies, Inc.
Raytheon BBN Technologies
Raytheon Company
Raytheon Company Cyber Security Solutions
Raytheon Company Intelligence & Information Systems
RLM Communications, Inc.
Rockwell Collins
RSA
Safenet
SAIC Defense Solutions Group (DSG)
SAIC Health, Energy and Civil Solutions Group (HECSG)
SAIC Intelligence, Surveillance, and Reconnaissance Group (ISRG)
SAIC, Inc.
Salient Federal Solutions (SFS)
Schneider Electric
Sentek Consulting, Inc.
Serco
Skolkovo Foundation
Skype
SMSi
Sojitz Corporation
Sony7
Sotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. )
Sparta Inc.
Spirent Communications
SRA International, Inc.
Stratavia
Strategic Operational Solutions, Inc.
stratsec.net
Sukhoi
Symantec Corporation
Symantec Corporation Consumer Business
Symantec Corporation Enterprise Products and Services
Symantec Corporation Enterprise Security
Symantec Corporation Information Management
Symantec Corporation SMB and Symantec.cloud
Taia Global, Inc.
Telecommunications Systems Inc (TCS)
Teligy
Tempest Security Intelligence
Thales Aerospace
Thales Alenia Space
Thales Communications & Security (C&S)
Thales Defence
Thales Group
The Boeing Company
The Economist
The Guardian
The Washington Post
TISTA Science and Technology Corp
Trustwave
Verizon Communications, Inc.
Vertica Systems
VMWare, Inc.
WIJET, LLC
YouTube
ZTE Corporation

GOVERNMENT AGENCIES AND OTHER ORGANISATIONS MENTIONED IN THIS REPORT

American Civil Liberties Union (ACLU)
Anonymous
Australian Attorney-General's Department
Australian Cyber Security Operations Centre (CSOC)
Australian Defence Force
Australian Defence Intelligence Organisation
Australian Defence Science and Technology Organisation (DSTO)
Australian Defence Signals Directorate (DSD)
Australian Department of Broadband, Communications, and the Digital Economy
Australian Department of Defence
Australian Federal Police
Australian Government
Australian Government Information Management Office (AGIMO)
Australian Secret Intelligence Service (ASIS)
Australian Security Intelligence Organisation
Brazilian Air Force
Brazilian Armed Forces
Brazilian Army
Brazilian Army's Cyber Defence Centre
Brazilian CBCyber
Brazilian Federation of Banks (Febraban)
Brazilian National Computer Emergency Response Team (CERT)
Brazilian Navy
Brazilian Stock Exchange
Bristol Security Centre
Bristol University
British Broadcasting Corporation (BBC)
Canadian Communications Security Establishment
Canadian Cyber Incident Response Centre
Canadian Department of Public Safety and Emergency Preparedness
Chinese People's Liberation Army (PLA)
Columbia University
Cyber Security Research Alliance (CRSA)
Danish Defence Ministry
Danish Forsvarets Efterretningstjeneste
Danish Parliament
Def-Logix
East West Institute
Electronic Frontier Foundation (EFF)
European Commission (EC)
European Council/EU
European Network and Information Security Agency (ENISA)
European Union Committee
EUROPOL
Executive Office US Attorneys (EOUSA)
Foreign Ministry, People's Republic of China
French Agence nationale de la sщcuritщ des systшmes d'information (ANSSI)
French Commission Nationale de l'informatique et des Libertщs (National Data Protection Authority)
French Defense Ministry
French Navy
French Senate Committee on Foreign Affairs, Defence & Armed Forces
G8 (Group of Eight)
George Mason University
German Bundeswehr
German Customs Criminological Office
German Federal commissioner for Date Protection and Freedom of Information
German Federal Criminal Police Office
German Federal Criminal Post Office
German Federal Intelligence Service
German Federal Ministry for Economics and Technology
German Federal Ministry of the Interior
German Federal Network Agency for Gas, Telecommunications, Post and Railway
German Federal Office for Information Security
German Federal Office for Information Technology
German Federal Office for the Protection of the Constitution
German Federal Office of Civil Protection and Disaster Assistance
German Federal Police
German Nationaler Cyber-Sicherheitsrat (NCS, Cyber Security Council)
German Nationales Cyber-Abwehrzentrum (NCAZ, National Cyber Response Centre)
IBM Institute for Advanced Security
ICT KTN
Indian Armed Forces
Indian CERT (Computer Emergency Response Team)
Indian Defence Intelligence Agency (DIA)
Indian Defence Research and Development Organisation (DRDO)
Indian Government
Indian Joint Working Group (JWG) on Cyber Security
Indian Minister of State for Communications and Information Technology
Indian Ministry of Communication and Information Technology (MCIT)
Indian Ministry of Human Resource Development (MHRD)
Indian National Association of Software Services Companies
Indian National Security Council Secretariat (NSCS)
Indian National Technical Research Organisation (NTRO)
Indian Navy (IN)
Indonesian Communications and Information Ministry
Information Security Institute, Moscow State University
International Security Assistance Force (ISAF)
ISA Security Compliance Institute
Israeli Air Force (IAF)
Israeli Cabinet
Israeli Defence Force (IDF)
Israeli Ministry of Defence Directorate for Research and Development
Israeli National Cyber Bureau
Israeli National Cyber Committee
Israeli National Cyber Directorate (NCD)
Israeli Science and Technology Ministry
Israeli Security Agency
Japan Information Security Audit Association (JASA)
Japan Information-Technology Promotion Agency
Japan Network Security Association (JNSA)
Japanese Defence Ministry
Japanese Information Security Policy Council
Japanese Internal Affairs and Communications Ministry
Japanese Ministry of Economy, Trade and Industry (METI)
Japanese SDF Command, Control, Communication, & Computers Systems Command (C4SC)
Japanese Self-Defence Force (JSDF)
Kansas State University (KSU)
Korea Communications Commission (KCC)
Korea Information Security Industry Association (KISIA)
Korean National Cyber Security Centre
Korean National Intelligence Service
Kuwait Ministry of Commerce and Industry
Lancaster University
Queen's University Belfast
LM Cyber Security Alliance
LulzSec
MAHER Center of Iranian National Computer Emergency Response Team
Morgridge Institute for Research
Mossad
National Computer Network Emergency Response Coordination Centre of China
NATO (North Atlantic Treaty Organisation)
Naval Postgraduate School
North Atlantic Treaty Organisation (NATO)
Oak Ridge National Laboratory
OECD (Organisation for Economic Co-operation and Development)
OSCE (Organisation for Security and Co-operation in Europe)
Pacific NW National Laboratory
Purdue University
Royal United Services Institute (RUSI)
Russian - Bulgarian Joint working Group on Information Society and Communication Technologies
Russian Federal Security Service (FSB)
Russian Federal Service for Technical and Export Control (FSTEC)
Russian Security Council
Rutgers University - New Brunswick Campus
Security and Defence Agenda
Security and Defence Agenda Think Tank
Shanghai Cooperation Organisation (SCO)
Singapore Info-communications Technology Security Authority (SITSA)
Singaporean National Cyber Security Centre (NCSC)
South Africa Cabinet
South Africa State Security Agency (SSA)
Tel Aviv Stock Exchange
Thailand National Cyber Security Policy Committee
The Boeing Cyber Engagement Center (CEC)
The Trustees of Princeton University
The University of Alabama at Birmingham
The University of North Carolina at Chapel Hill
Trustees of Dartmouth College
Trustees of Indiana University
UK Cabinet Office
UK Cyber Security Evaluation Centre
UK Defence Industrial Base (DIB)
UK Department for Business, Innovation and Skills (BIS)
UK Engineering and Physical Sciences Research Council (EPSRC)
UK Foreign and Commonwealth Office (FCO)
UK GCHQ (Government Communications Headquarters)
UK Home Office
UK Ministry of Defence (MOD)
UK Ministry of Justice (MOJ)
UK Public Services Network
UK Royal Air Force (RAF)
UN (United Nations)
United Nations (UN)
Universiti Malaya (UM)
University of Arizona
University of California, San Diego
University of Illinois at Urbana-Champaign
University of Lancaster
University of Maryland
University of Minnesota
University of Southern California Information Sciences Institute
University of Texas
US 1st Information Operations Command (Land) (1st IO (Land))
US 780th Military Intelligence Brigade
US 9th Army Signal Command (NETCOM/9th SC)
US Air Force
US Air Force Cyber Command (AFCYBER)
US Air Force Medical Services (AFMS)
US Air Force Office of Special Investigations (AFOSI)
US Air Force Research Laboratory (AFRL)
US Antarctic Program (USAP)
US Army
US Army Forces Cyber Command (ARCYBER)
US Army Intelligence and Security Command (INSCOM)
US Army Network Enterprise Technology Command (NETCOM)
US Army Research Laboratory (ARL)
US Centers for Medicare & Medicaid Services (CMS)
US Central Intelligence Agency (CIA)
US Chamber of Commerce
US Coast Guard
US Commonwealth of Massachusetts' Executive Office of Health and Human Services
US Computer Emergency Readiness Team
US Congress
US CYBERCOM
US Defense Advanced Research Projects Agency (DARPA)
US Defense Industrial Base (DIB)
US Defense Information Systems Agency (DISA)
US Defense Intelligence Agency (DIA)
US Department for Homeland Security (DHS)
US Department of Defense (DOD)
US Department of Homeland Security Science and Technology Directorate (DHS S&T)
US Department of Justice (DOJ)
US Department of Justice's Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)
US Department of State
US Department of State's Bureau of Diplomatic Security
US Department of Transportation's Research and Innovative Technology Administration
US DHS S&T Cyber Security Division (CSD)
US DOD Defense Industrial Base (DIB) Cyber Security Task Force
US DOD Manpower Data Centre (DMDC)
US Federal Bureau of Investigation (FBI)
US Federal Government
US Fleet Cyber Command (FLTCYBERCOM)
US General Accountability Office (GAO)
US House Intelligence Committee
US House of Representatives
US Joint Operations Center of the Integrated Cyber Center
US Marine Corps Cryptologic Support Battalion's (MCSB)
US Marine Corps Cyberspace Command (MARFORCYBER)
US Marine Corps Network Operations Security Center (MCNOSC)
US Marshals Service (USMS)
US National Cyber Response Co-ordination Group (NCRCG)
US National Cyber Security and Communications Integration Center
US National Cyber Security Center
US National Cyber Security Division
US National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC)
US National Protection and Programs Directorate (NPPD)
US National Security Agency (NSA)
US Naval Academy
US Naval Information Operation Commands (NIOC)
US Naval Network Warfare Command (NNWC)
US Naval Supply Systems Command (NAVSUP) Fleet Logistics Center
US Navy Cyber Defense Operations Command (NCDOC)
US NSTIC (National Strategies on Trusted Identities in Cyberspace)
US Office of Cyber Security and Communications (CS&C)
US Office of the Chief Information Officer
US Office of the Chief Information Officer's Information Assurance Division
US Pentagon
US Pentagon's Cyber Crime Center
US Secret Service
US Securities and Exchange Commission (SEC)
US Senate
US Space and Naval Warfare Systems Center (SSC)
US Special Operations Command (SOCOM)
US Transportation Security Administration (TSA)
US-China Economic and Security Review Commission
Wikileaks
World Bank


More Publications