Cyber Security: Market Research Report

Date: January 6, 2014
Pages: 457
Price:
US$ 4,950.00
Publisher: Global Industry Analysts, Inc
Report type: Strategic Report
Delivery: E-mail Delivery (PDF)
ID: C4B238469F6EN
Leaflet:

Download PDF Leaflet

Cyber Security: Market Research Report
This report analyzes the worldwide markets for Cyber Security in US$ Million by the following Product Segments: Application Security, Content Security, Endpoint Security, Network Security, Services, and Others. The market is also analyzed by the following End-Use sectors: Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector, and Others. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. Also, a seven-year historic analysis is provided for these markets. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 244 companies including many key and niche players such as -
  • AVG Technologies
  • Booz Allen Hamilton
  • CA Technologies, Inc.
  • Cisco Systems, Inc.
  • Deloitte LLP
I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

Study Reliability and Reporting Limitations
Disclaimers
Data Interpretation & Reporting Level
Quantitative Techniques & Analytics
Product Definitions and Scope of Study

1. APPLICATION SECURITY

2. CONTENT SECURITY

3. ENDPOINT SECURITY

4. NETWORK SECURITY

5. SERVICES

6. OTHERS

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW

Internet & the Modern Digital Infrastructure
Key Statistical Findings

Table 1. Number of Internet Users (in Million) and Penetration Percentage for Years 2001, 2011 & 2013 (includes corresponding Graph/Chart)
Table 2. Global Internet Market (2013): Percentage Share Breakdown of Number of Internet Users by Country (includes corresponding Graph/Chart)

Internet Opens Up a Range of Online Security Issues, Brings Importance of ‘Cyber Security’ to the Forefront
Avoiding Unnecessary Costs – Key Rationale for Adoption of Cyber Security Solutions
Periods of Economic Slowdown Increases Cyber Crime Attacks - Magnifies the Business Case for Cyber Security
Outlook
Developing Regions to Lend Traction to Cyber Security Market

Table 3. Global Internet Market (2013): Percentage Share Breakdown of Number of Internet Users by Region (includes corresponding Graph/Chart)

2. NOTEWORTHY TRENDS, GROWTH DRIVERS, ISSUES & CHALLENGES

Major Trends & Growth Drivers
Rise in Magnitude of Cyber Crime to Drive Increased Adoption of Cyber Security Solutions & Services

Table 4. Breakdown of Number of Cyber Attacks Reported in October 2013 by Source Nation (includes corresponding Graph/Chart)
Table 5. Percentage Share Breakdown of Number of Cyber Attacks by Nature of Attack as of 2013 (includes corresponding Graph/Chart)

Types of External IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence
Types of Internal IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence
Increasing Prevalence of Malware to Drive Robust Demand for Cyber Security Solutions & Services
Trojan: Fastest Growing Data-Stealing Malware

Table 6. World Malware on the Web (2013): Percentage Share Breakdown of Leading Countries Hosting Malware on the Web (includes corresponding Graph/Chart)
Table 7. World Spam on the Web (2013): Percentage Share Breakdown of Leading Spam Relaying Countries (includes corresponding Graph/Chart)

Hactivism on the Prowl – Creates Need for Efficient Cyber Security Solutions
APTs Emerge as a New Sophisticated Threat
Instances of Cyberterrorism to Strengthen Demand for Cyber Security Solutions & Services
Security Threats from Virtualization & Cloud Infrastructure Deployments to Drive Demand for Cyber Security Solutions in Government & Private Organizations

Table 8. Global IT Market (2013): Percentage Share Breakdown of Spending by Segment (includes corresponding Graph/Chart)
Table 9. Global Cloud Computing Services Market (2013 & 2015P): Breakdown of Annual Revenue Figures in US$ Million by Region (includes corresponding Graph/Chart)
Table 10. Global Virtualization Software Market (2013): Percentage Share Breakdown of Revenue by Geographic Region (includes corresponding Graph/Chart)

Increasing Use of Internet Enabled Mobile Handsets Lends Traction to Cyber Security Market

Table 11. Global Smartphones market: Annual Sales Figures (in Million Units) for Years 2013, 2016 & 2018 (includes corresponding Graph/Chart)
Table 12. Global Smartphones Market (2013): Penetration for Select Countries (as a Percentage of Mobile Phone Users) (includes corresponding Graph/Chart)
Table 13. Global Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Workers by Nature of Work (includes corresponding Graph/Chart)
Table 14. Global Mobile Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Mobile Workers by Nature of Work (includes corresponding Graph/Chart)
Table 15. Global Mobile Workforce (2013): Percentage Share Breakdown of Number of Mobile Workers by Region (includes corresponding Graph/Chart)

BYOD Driven-Mobile Malware Enhances Need for Mobile Cyber Security in Private & Government Organizations
Mobile Banking Keeps Cyber Security Busy
Mobile Banking Services: At a Glance
Phenomenal Rise of Social Networking Sites Drives Usage Case for Cyber Security Solutions

Table 16. Major Social Networking Sites Worldwide (2011): Breakdown of Number of Registered Users in Millions (includes corresponding Graph/Chart)

IPv6 Boosts Adoption of Cyber Security Solutions and Services
Regulatory Compliance Requirements Continues to Drive Demand for Cyber Security
Government Sector – A Major Revenue Contributor
Priority for Cyber Threat Listed by Country
Growing Use of Cyber Security Solutions in Public Utilities for Securing Smart Grid Infrastructure
Cyber Security Seeks New Opportunities in Defense Applications
Opportunity Indicators

Table 17. Military Spending in Select Countries (2011 & 2012): Breakdown of Amount Spent (in US$ Billion) and Rate of Growth (%) (includes corresponding Graph/Chart)

Private Organizations Lend Traction to Growth in Cyber Security Market
High Usage of Digital Platforms Makes Private Establishments Highly Vulnerable to Cyber Security Threats
Cyber Security Turns into a Top Investment Priority for Businesses
Top Priority Malicious Elements Threatening Cyber Security in Enterprises: On a Scale 1 - 10 (10 - High Priority; 1 - Low Priority)
Factors Affecting Implementation of Cyber Security Solutions by Enterprises Worldwide - Ranked in Order of Influence
Key Focus Areas for Enterprises in Implementation of Cyber Security in their Premises: Ranked in Order of Relative Importance
Cyber Security – A Critical Necessity in Banking and Finance Sector
Major External & Internal Breaches in Financial Services Sector
Top Security Initiatives by Industry Segment
Regulatory Compliance: A High Priority for Financial Institutions
Advanced Solutions Gain Traction in Financial Services Sector
Key Barriers in Cyber Security for Financial Services Sector
Telecommunication and IT
DOS Attacks Threaten Mobile Network Security – Drive Demand for Cyber Security Solutions in Telecom Industry
Overbilling Attack: A Business Case for Cyber Security Solutions in Telecom Industry
VPN to Make Telecommunication Networks More Safer
Opportunities for Wireless Network Security in Telecom Industry

Table 18. Worldwide Mobile Data Traffic by Device Type (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly Data Traffic Volume for Laptops, Non-Smartphones, Smartphones, Tablets, and Others (includes corresponding Graph/Chart)
Table 19. Worldwide Mobile Data Traffic by Application (2013, 2015 & 2018) - Percentage Share Breakdown of Monthly Data Traffic Volume for Data, File Sharing , M2M, and Video (includes corresponding Graph/Chart)
Table 20. Worldwide Mobile Networks (2013 & 2018): Percentage Share Breakdown of Number of Connections by Type of Network Technology (includes corresponding Graph/Chart)

Production Systems Also Seek Cyber Security
Small and Mid-Sized Businesses – A Lucrative Market Segment
Growing Demand in Healthcare Sector
Gamers too Not Spared
Key Issues
Inadequate Budget – The Key Constraint
Lack of Comprehensive Security Solutions
Lack of Alignment between Business Objectives and Security
External Threats More Recognized than Internal Threats
Most Organizations Continue to Remain Reactive Rather than Proactive
Availability of ‘Freemium’ and Free Products Niggles the Market
Growing Sophistication & Complexity of Security Threats - A Challenge to Reckon With for Cyber Security Solution Providers
Stealthier Infiltration Methods Pose Challenges for Cyber Security
Advanced Security Solutions - The Need of the Hour
Security Analytics to See Light in the Enterprise Sector
Big Data Analytics Set to Storm the Cyber Security Market
Convergence Gains Strength
Vendors Come Up with Integrated Solutions to Stay Ahead

3. A REVIEW OF KEY PRODUCT & SEGMENTS

Network Security Solutions Market – The Largest Market Segment
Security of Internal Network Infrastructure – A Key Necessity for Any Business

Table 21. Global Network Security Market (2013 & 2015): Percentage Share Breakdown of Revenues by Product Segment (includes corresponding Graph/Chart)

Content Security – A Prominent Market Segment
Secure Content Management Grows in Prominence
Endpoint Security Maintains Steady Demand
General Trends Underpinning the Endpoint Security Solutions Market
Tremendous Adoption of Mobile End-Points in Enterprises Make Enterprise Endpoint Security A Lucrative Market
Application Security Market
Dearth of Trained Staff and In-House Infrastructure to Boost Market Prospects for Security Services
A Look into Key Opportunities for Select Categories of Cyber Security Solutions
Identity & Access Management Solutions

Table 22. Global Identity and Access Management Market (2013): Percentage Share Breakdown of Revenues by Operating Environment (includes corresponding Graph/Chart)

IAM: A Key Security Initiative for Enterprises
An Integral Part of Corporate Strategy
Risk & Compliance Management
Data Encryption Solutions Continue to Find Robust Demand
E-mail Encryption Gathers Steam
Demand for Messaging Security (E-mail Scanning) Will Continue to Rise
Growing Significance of Data Loss Protection
Unified Threat Management (UTM)
XTMs Emerge as More Potential Tool
VPN Market on an Upswing
Advanced Firewall Solutions to Boost Market Prospects
Antivirus Software Continues to Call Shots
Compliance Requirements Boost Security & Vulnerability Management Market
Diverse Delivery Systems for SVM Products
Disaster Recovery Solutions Poised to Gain
Internet Filtering Solutions: Protection at the Gateway
Rise in Deployments of SSL-Encrypted Application

4. COMPETITIVE LANDSCAPE

Consolidation Wave in Cyber Security Market
Key Market Share Findings

Table 23. Leading Players in the Global Network Security Market (2013): Percentage Share Breakdown of Revenues by Leading Players (includes corresponding Graph/Chart)
Table 24. Leading Players in the Global Firewall Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)
Table 25. Leading Players in the Global Corporate Endpoint Security Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)
Table 26. Leading Players in the Global Anti-Virus Software Market (2013): Percentage Share Breakdown of Revenues for by Leading Players (includes corresponding Graph/Chart)
Table 27. Leading Players in the Global Intrusion Detection and Prevention (IDP) Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)
Table 28. Leading Players in the Global UTM Market (2013): Percentage Share Breakdown of Value Sales by Leading Players (includes corresponding Graph/Chart)

5. PRODUCT OVERVIEW

Cyber Crime: An Introduction
Cyber Crimes Against Individuals
Cyber Crimes against Property
Cyber Crimes against Government
Types of Cyber Crimes
Harassment through e-mails
Cyber-stalking
Cyber Defamation
Indecent Exposure or Pornography
Phishing
E-mail Spoofing
Intellectual Property Crime
Computer Vandalism
Online Cheating and Fraud
Electronic Money Laundering and Tax Evasion
Cyber Trafficking
Cyber Terrorism
Social Networking Site Scams
Bot Networks
Methods of Committing Cyber Crime
Theft of Electronically Stored Information
Illegal Access of Computer System
Email Bombing
Salami Attack
Data Diddling
Denial of Service Attack
Logic Bombs
Worm and Virus Attacks
Trojan Attack
Web Jacking
Internet Time Theft
Damages Caused by Security Breaches
Proprietary Information Destruction
Disruption in Systems Performance
Data/Application Damage or Corruption
Types of Cyber Security Strategies
Network Security Solutions & Services
Endpoint Security Solutions & Services
Application Security Solutions & Services
Content Security Solutions & Services
Other Security Solutions & Services
Different Categories of Cyber Security Solutions
Identity & Access Management Solutions
Risk & Compliance Management Solutions
Encryption Solutions
Data Loss Protection (DLP) Solutions
Types of DLP Systems
Network DLP
Endpoint DLP
Unified Threat Management (UTM)
Firewall
Major Firewall Types
Packet Filter Firewall
Stateful Packet Inspection Firewall
Application Layer Gateways or Proxies
Available Forms of Firewalls
Software Firewalls
Hardware Firewalls
Firewall/VPN Appliances
Anti-Virus/Anti-Malware Solutions
Intrusion Detection System/ Intrusion Prevention System (IDS/IPS)
Intrusion Detection/Prevention Appliances
Intrusion Detection System (IDS)
Types of IDS
Intrusion Prevention System (IPS)
Security & Vulnerability Management
Disaster Recovery
Distributed Denial of Service (DDoS) Mitigation
Web/ Filtering
Different Categories of Cyber Security Services
Consulting Services
Implementation Services
Risk and Threat Assessment Services
Managed Services
Education and Training Services

6. PRODUCT & SERVICE LAUNCHES

Parsons Launches Cran™
Skybox Security Rolls Out Skybox Risk Control 7. 0
CSG International Launches CSG Invotas
ESET Launches Improved ESET CyberSecurity and ESET CyberSecurity Pro
DRDO Launches DHRUVA-3 High Performance Computing System
Shape Security Rolls Out ShapeShifter Appliance
Validian Unveils Update on Roll Out of Validian- Enabled Enterprise Applications
Buchanan Ingersoll & Rooney Launches Cybersecurity and Data Protection Service
Salamanca Group Launches New Cybersecurity Division
Willis Group Holdings Unveils Cyber ATLAS
ESET Unveils Updated ESET CyberSecurity and ESET CyberSecurity Pro
AnubisNetworks Unveils StreamForce
Globecomm Systems Launches Cytelics Cybersecurity Solutions Service
BAE Systems Detica Launches CyberReveal

7. RECENT INDUSTRY ACTIVITY

Lockheed Martin Takes Over Industrial Defender
Akamai Technologies Takes Over Prolexic Technologies
Blackstone to Takeover Majority Stake in Accuvant
Palo Alto Networks Takes Over Morta Security
L-3 Communications Takes Over Data Tactics
Google Takes Over Impermium
FIS Teams Up with Microsoft to Fight Cybercrime
Kaspersky Lab Unveils Interactive Cyberthreat Map
Palo Alto Networks to Acquire Cyvera
Cisco Acquires Sourcefire
IBM Takes Over Trusteer
PowerSecure International Takes Over Assets of Encari
Experian to Takeover 41st Parameter
Invizeon Takes Over Slipstream Resources
Deloitte Acquires Assets of Vigilant
Premier Alliance Group Takes Over root9B
NEC to Acquire Stake in Infosec
NEC Takes Over Cyber Defense Institute
Cassidian CyberSecurity to Acquire Stake in Arkoon Network Security
BAE Teams Up with Vodafone
Magal Security Systems Acquires WebSilicon
Infinite Group Inks Agreement with Webroot
KEYW Takes Over Rsignia
Google Takes Over VirusTotal
General Dynamics to Acquire Fidelis Security Systems
Ultra Electronics Holdings to Acquire Barron McCann Payments and Barron McCann Technology
PA Consulting Acquires 7Safe
Northrop Grumman to Acquire M5 Network Security

8. FOCUS ON SELECT PLAYERS

AVG Technologies (Czech Republic)
Booz Allen Hamilton (US)
CA Technologies, Inc. (US)
Check Point Software Technologies Ltd. (Israel)
Cisco Systems, Inc. (US)

CSC (US)

Deloitte LLP (US)
F-Secure Corporation (Finland)
IBM Corporation (US)
Juniper Networks, Inc. (US)
Kaspersky Lab (Russia)
Lockheed Martin Corporation (US)
McAfee, Inc. (US)
Microsoft Corporation (US)
Northrop Grumman Corp. (US)
Panda Security (Spain)
SafeNet, Inc (US)
Sophos PLC (UK)
Symantec Corporation (US)
Trend Micro Incorporated (US)
Utimaco Safeware AG (Germany)
WebSense, Inc. (US)

9. GLOBAL MARKET PERSPECTIVE

Table 29. World Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 30. World Historic Review for Cyber Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 31. World 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 32. World Recent Past, Current & Future Analysis for Application Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 33. World Historic Review for Application Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 34. World 15-Year Perspective for Application Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 35. World Recent Past, Current & Future Analysis for Content Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 36. World Historic Review for Content Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 37. World 15-Year Perspective for Content Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 38. World Recent Past, Current & Future Analysis for Endpoint Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 39. World Historic Review for Endpoint Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 40. World 15-Year Perspective for Endpoint Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 41. World Recent Past, Current & Future Analysis for Network Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 42. World Historic Review for Network Security by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 43. World 15-Year Perspective for Network Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 44. World Recent Past, Current & Future Analysis for Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 45. World Historic Review for Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 46. World 15-Year Perspective for Services by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 47. World Recent Past, Current & Future Analysis for Others by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 48. World Historic Review for Others by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 49. World 15-Year Perspective for Others by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 50. World Recent Past, Current & Future Analysis for Cyber Security by Sector - Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 51. World Historic Review for Cyber Security by Sector - Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 52. World 15-Year Perspective for Cyber Security by Sector - Percentage Breakdown of Revenues for Banking & Financial Sector, Public Sector & Aerospace, Medical care Sector, Manufacturing Sector, IT & Telecom Sector and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

III. MARKET

1. THE UNITED STATES

A. Market Analysis
Current & Future Analysis
Rising Cyber Security Issues in the US

Table 53. US Cyber Security Market (2013): Percentage Share Breakdown of Number of Incidents in Critical Infrastructure Sectors (includes corresponding Graph/Chart)
Table 54. US Cyber Security Market (2013): Percentage Share Breakdown of Number of Breaches by User Group (includes corresponding Graph/Chart)

Identity Theft: A Growing Menace in the US
Opportunities for Cyber Security Solutions & Services in Private Sector – A Review

Table 55. US Information Security Services Market in Private Sector (2011): Percentage Share Breakdown of Revenues by Key End-Use Industries (includes corresponding Graph/Chart)

Banking/Financial Institutions: A Key End Use Industry
Government Entities Continue to Invest Heavily in Cyber Security

Table 56. US Government Cyber Security Market (2013): Percentage Share Breakdown of Spending by Entity (includes corresponding Graph/Chart)

The US Military Seeks Next-Generation Cyber Security Solutions for Telecom Networks
Regulatory Environment
Laws Governing the Data Security
Demand for Cyber Security Experts Soars
Product Launches
Strategic Corporate Developments
Key Players
B. Market Analytics

Table 57. US Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 58. US Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 59. US 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

2. CANADA

A. Market Analysis
Current & Future Analysis
Market Overview
B. Market Analytics

Table 60. Canadian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 61. Canadian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 62. Canadian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

3. JAPAN

A. Market Analysis
Current & Future Analysis
Cyber Security Market – A Primer
Highlights
Growing Demand for Cloud Infrastructure to Boost Market for Security Solutions
Regulatory Environment
Competitive Scenario
Strategic Corporate Developments
B. Market Analytics

Table 63. Japanese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 64. Japanese Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 65. Japanese 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4. EUROPE

A. Market Analysis
Current & Future Analysis
Market Overview
Cyber Security – High on Enterprise Priority
Regulatory Environment
B. Market Analytics

Table 66. European Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 67. European Historic Review for Cyber Security by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 68. European Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 69. European Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 70. European 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 71. European 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4A. FRANCE

A. Market Analysis
Current & Future Analysis
Market Overview
Strategic Corporate Development
B. Market Analytics

Table 72. French Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 73. French Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 74. French 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4B. GERMANY

A. Market Analysis
Current & Future Analysis
Market Overview
Utimaco Safeware AG – A Key German Player
B. Market Analytics

Table 75. German Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 76. German Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 77. German 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4C. ITALY

A. Market Analysis
Current & Future Analysis
Market Overview
B. Market Analytics

Table 78. Italian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 79. Italian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 80. Italian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4D. THE UNITED KINGDOM

A. Market Analysis
Current & Future Analysis
Market Overview
M&A Activity Heats Up
Select M&A Deals in the UK in 2012 & 2013
Product Launch
Strategic Corporate Development
Sophos PLC – A Key UK Player
B. Market Analytics

Table 81. UK Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 82. UK Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 83. UK 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4E. SPAIN

A. Market Analysis
Current & Future Analysis
Panda Security – A Key Spanish Player
B. Market Analytics

Table 84. Spanish Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 85. Spanish Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 86. Spanish 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4F. RUSSIA

A. Market Analysis
Current & Future Analysis
Market Overview
Strategic Corporate Development
Kaspersky Lab – A Key Russian Player
B. Market Analytics

Table 87. Russian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 88. Russian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 89. Russian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4G. REST OF EUROPE

A. Market Analysis
Current & Future Analysis
Product Launches
Key Players
B. Market Analytics

Table 90. Rest of Europe Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 91. Rest of Europe Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 92. Rest of Europe 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5. ASIA-PACIFIC

A. Market Analysis
Current & Future Analysis
Market Overview
Web Security Gains Prominence
Large Enterprises Dominate Web Security Market with High Investments
Competitive Scenario

Table 93. Asia-Pacific Web Security Market (2012): Percentage Share Breakdown of Revenues by Leading Players (includes corresponding Graph/Chart)

B. Market Analytics

Table 94. Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 95. Asia-Pacific Historic Review for Cyber Security by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 96. Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 97. Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 98. Asia-Pacific 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 99. Asia-Pacific 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5A. CHINA

A. Market Analysis
Current & Future Analysis
Market Overview
Regulatory Overview
B. Market Analytics

Table 100. Chinese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 101. Chinese Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 102. Chinese 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5B. INDIA

A. Market Analysis
Current & Future Analysis
Market Overview
Impact of Cyber Crimes on Indian Companies
The Indian Security Market
Indian Anti-Virus Market
Product Launch
Quick Heal Technologies (P) Ltd – A Key Indian Player
B. Market Analytics

Table 103. Indian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 104. Indian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 105. Indian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5C. REST OF ASIA-PACIFIC

A. Market Analysis
Current & Future Analysis
Strategic Corporate Development
B. Market Analytics

Table 106. Rest of Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 107. Rest of Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 108. Rest of Asia-Pacific 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6. LATIN AMERICA

A. Market Analysis
Current & Future Analysis
Network Security Market Shows Steady Growth
Banking & Finance: The Major End-Use Segment for Network Security

Table 109. Latin American Network Security Market (2013): Percentage Breakdown of Value Sales by End-Use Segment (includes corresponding Graph/Chart)

Competitive Landscape

Table 110. Leading Players in the Latin American Network Security Market (2013): Percentage Breakdown of Value Sales for Check Point, Cisco, IBM ISS, Juniper, McAfee, and Others (includes corresponding Graph/Chart)
Table 111. Leading Players in the Latin American IDS/IPS Market (2013): Percentage Breakdown of Value Sales for Check Point, Cisco, IBM ISS, McAfee, and Others (includes corresponding Graph/Chart)

B. Market Analytics

Table 112. Latin American Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 113. Latin American Historic Review for Cyber Security by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 114. Latin American Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 115. Latin American Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 116. Latin American 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 117. Latin American 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6A. BRAZIL

Market Analysis

Table 118. Brazilian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 119. Brazilian Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 120. Brazilian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6B. REST OF LATIN AMERICA

Market Analysis

Table 121. Rest of Latin America Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 122. Rest of Latin America Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 123. Rest of Latin America 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

7. REST OF WORLD

A. Market Analysis
Current & Future Analysis
Security Software Market in Gulf States on the Rise
Strategic Corporate Development
Check Point Software Technologies Ltd. – A Key Israeli Player
B. Market Analytics

Table 124. Rest of World Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 125. Rest of World Historic Review for Cyber Security by Segment - Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 126. Rest of World 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Endpoint Security, Network Security, Services, and Others Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 244 (including Divisions/Subsidiaries - 268)
The United States (140)
Canada (6)
Japan (10)
Europe (65)
  France (4)
  Germany (11)
  The United Kingdom (27)
  Italy (1)
  Spain (1)
  Rest of Europe (21)
Asia-Pacific (Excluding Japan) (39)
Middle East (6)
Africa (2)
Skip to top


Global Smart Grid Cyber Security Market 2016-2020 US$ 2,500.00 Aug, 2016 · 69 pages

Ask Your Question

Cyber Security: Market Research Report
Company name*:
Contact person*:
Phone/fax*:
Email*:
Request invoice
Your enquiry:
Please click on a Check Box below to confirm you are not a robot: