[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Encryption Software: Market Research Report

January 2015 | 176 pages | ID: E2A4FE496CFEN
Global Industry Analysts, Inc

US$ 4,500.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
This report analyzes the worldwide markets for Encryption Software in US$ Thousand. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 49 companies including many key and niche players such as -
  • Bloombase
  • Check Point Software Technologies Ltd.
  • Cisco Systems Inc.
  • Cypherix Encryption Software
  • Dekart
I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

Study Reliability and Reporting Limitations
Disclaimers
Data Interpretation & Reporting Level
Quantitative Techniques & Analytics
Product Definitions and Scope of Study
Encryption Software

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW

Encryption: A Critical Data Leakage Prevention Strategy in the Internet Era
Importance of Digital Data…
Where in an Enterprise, Data Leaks.
Market Opens Up for Next-Gen Tools to Plug Leaks…

Table 1. Leaking Faucets in an Enterprise (includes corresponding Graph/Chart)

Encryption Software: A Potent Tool to Plug Leaks
Market Trends & Issues
Growing Awareness Over the Value of Sensitive Digital Data Fuels Investments in Encryption
Rise in Smartphone Theft Throws the Spotlight on Encryption as a BYOD Security Measure
Snowden Revelations & the Bringing to Light of the Age of NSA Surveillance Spurs the Need for Encryption
Growing Focus on Unifying Endpoint Security Augurs Well for Endpoint Encryption s
The Rise of IoT Turns the Spotlight on the Importance of Encrypting the IoT Framework

Table 2. With Over 387% Growth in Connected Autonomous Things by 2020, the Security Pressure Builds On IoT, Fuelling Opportunities for Encryption Software as a Key Security Component: Breakdown of the Installed Base of IoT Connected Devices (In Million Units) for the Years 2015 & 2020 (includes corresponding Graph/Chart)

The IoT Phenomenon Spurs Demand for Lightweight Cryptography
BYOD & CYOD Aggravate the Risk of Data Leakage & Fuel the Business Case for Encryption Software
Era of “BYOD”.
Wearables in an Enterprise: The Next Wave of BYOD Spurring Opportunities for Encryption
Surging Security Threats Posed by Moving Data in a BYOD Era…
Software Encryption Rides the BYOD Wave Balancing BYOD Risks & Rewards

Table 3. With a Projected 11. 7% Increase in the Share of Corporate-Owned Tablets by 2018, BYOD Goes Mainstream Spurring Opportunities for Data Encryption in a BYOD Environment: Global Percentage Breakdown of Installed Base of Corporate-Owned and Consumer Owned Tablets for the Years 2011, 2014 & 2017P (includes corresponding Graph/Chart)
Table 4. Robust Penetration of BYOD Devices as Measured by the Per Capita Distribution of Connected Devices Per Knowledge Worker in Select Countries for the Year 2012 & 2015 (includes corresponding Graph/Chart)

Need to Counter Data Leakage in the Cloud Spurs Demand for Encryption Software
The Age of the Clouds…
Security Threats in the Cloud Drives the Importance of Encrypting Data in the Cloud

Table 5. Robust Spending On Public Cloud Services Drives the Emphasis on Server Side & Client Side Encryption: Global Market for Public Cloud Computing Services (In US$ Million) by Geographic Region for the Years 2015 & 2020 (includes corresponding Graph/Chart)

Bring Your Own Encryption Catalyzes the Use of Encryption in Cloud Applications
Virtualization Expands the Need for Encryption

Table 6. Surging Penetration of Virtualization Brings Encryption into the Spotlight to Prevent Information Leakage from VMs: Penetration (In %) of Virtualization Technology and Average Number of Virtual Servers Per Host (x:1) in Select Countries for the Year 2015 (includes corresponding Graph/Chart)

The Disruptive Ascend of Cloud Computing Gives Rise to Encryption as a Service as a Lucrative Business Model
The Disruption of Cloud Computing in the New Economy
Encryption as a Service (EaaS) Grows in Prominence
Developed Countries Dominate the Market, Developing Countries to Lead Growth
Surging Popularity of Self-Encrypting Drives: A Key Threat to Encryption Software
Growing Pressure of Compliance Fuels Market Growth
Regulations Governing Data Leakage
A Synoptic Review of Key Data Protection Regulations Penalizing Data Leakages
Payment Card Industry Data Security Standard (PCI DSS)
Listed below is the high-level overview of the PCI DSS requirements:
Gramm-Leach-Bliley Act (GLBA)
Sarbanes-Oxley Act (SOX)
EURO-SOX
Health Insurance Portability & Accountability Act (HIPAA)
Data Protection Act (DPA) of 1984 (amended 1998)
California Senate Bill 1386
Competition

2. PRODUCT OVERVIEW

Software-Based Encryption- Defined
Types of Encryption Software
Software Based Disk Encryption
Software Based File/Folder Encryption
Software Based Database Encryption
Software Based Communication Encryption
Cloud Encryption
Protecting Data at Rest and Data in Motion
Protecting Data at Rest
Securing Data in Motion
Benefits of Encryption
Ensures Customer Loyalty
Enables Use of Cloud
Helps Comply with Regulations
Drawbacks of Encryption Software

3. RECENT INDUSTRY ACTIVITY

New Softwares Updates Folder Lock
HP Takes Over Voltage Security
HP Launches Novel HP Cloud Access Security Protection Platform
WowTron Introduces WowTron PDF Encryption
Cloudera Acquires Gazzang
INSIDE Secure Takes Over Metaforic
Sophos Takes Over Mojave
CipherPoint Enters into Reseller Partnership with DocPoint
Data Locker Rolls Out SkyCrypt
CRYPTR 2 Broadband IP Encryption Obtains Certification of National Security Agency
Mitsubishi Electric Develops New Encryption Platform Software
Penta Security Launches MyDiamo

4. FOCUS ON SELECT GLOBAL PLAYERS

Bloombase (US)
Check Point Software Technologies Ltd. (Israel)
Cisco Systems Inc. (US)
Cypherix Encryption Software (US)
Dekart (Republic of Moldova)
East-Tec (Romania)
EMC Corporation (US)
Entrust Tech (US)
Hewlett-Packard (US)
IBM Corporation (US)
InterCrypto Ltd. (US)
Jetico Inc. (Finland)
McAfee Inc. (US)
Microsoft Corporation (US)
NewSoftwares. Net. Inc. (US)
PC Dynamics Inc. (US)
ProofPoint (US)
Ranquel Data Security (Argentina)
Sophos Ltd. (UK)
Symantec Corporation (US)
Trend Micro (Japan)
WebMinds Inc. (US)
Winmagic Inc. (US)
Zix Corporation (US)

5. GLOBAL MARKET PERSPECTIVE

Table 7. World Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 8. World 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

III. MARKET

1. THE UNITED STATES

A. Market Analysis
Outlook
Recent Industry Activity
Key Players
B. Market Analytics

Table 9. US Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

2. CANADA

A. Market Analysis
Outlook
B. Market Analytics

Table 10. Canadian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

3. JAPAN

A. Market Analysis
Outlook
Recent Industry Activity
Trend Micro - A Key Player
B. Market Analytics

Table 11. Japanese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4. EUROPE

A. Market Analysis
Outlook
B. Market Analytics

Table 12. European Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 13. European 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

4A. FRANCE

A. Market Analysis
Outlook
B. Market Analytics

Table 14. French Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4B. GERMANY

A. Market Analysis
Outlook
B. Market Analytics

Table 15. German Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4C. ITALY

A. Market Analysis
Outlook
B. Market Analytics

Table 16. Italian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4D. THE UNITED KINGDOM

A. Market Analysis
Outlook
Recent Industry Activity
Sophos Ltd. - A Key Player
B. Market Analytics

Table 17. UK Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4E. SPAIN

A. Market Analysis
Outlook
B. Market Analytics

Table 18. Spanish Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4F. RUSSIA

A. Market Analysis
Outlook
B. Market Analytics

Table 19. Russian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4G. REST OF EUROPE

A. Market Analysis
Outlook
Key Players
B. Market Analytics

Table 20. Rest of Europe Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5. ASIA-PACIFIC

A. Market Analysis
Outlook
B. Market Analytics

Table 21. Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 22. Asia-Pacific 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

5A. CHINA

A. Market Analysis
Outlook
B. Market Analytics

Table 23. Chinese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5B. INDIA

A. Market Analysis
Outlook
B. Market Analytics

Table 24. Indian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5C. REST OF ASIA-PACIFIC

A. Market Analysis
Outlook
Recent Industry Activity
B. Market Analytics

Table 25. Rest of Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

6. LATIN AMERICA

A. Market Analysis
Outlook
B. Market Analytics

Table 26. Latin American Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 27. Latin American 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

6A. BRAZIL

A. Market Analysis
Outlook
B. Market Analytics

Table 28. Brazilian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

6B. REST OF LATIN AMERICA

A. Market Analysis
Outlook
Ranquel Data Security (Argentina) - A Key Player
B. Market Analytics

Table 29. Rest of Latin America Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

7. REST OF WORLD

A. Market Analysis
Outlook
Check Point Software Technologies Ltd. (Israel) - A Key Player
B. Market Analytics

Table 30. Rest of World Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 49 (including Divisions/Subsidiaries - 50)
The United States (35)
Canada (2)
Japan (2)
Europe (8)
  France (1)
  The United Kingdom (3)
  Rest of Europe (4)
Asia-Pacific (Excluding Japan) (1)
Latin America (1)
Middle East (1)


More Publications