[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Information Technology (IT) Security: IoT, Cyber and Cloud Securities

June 2019 | 136 pages | ID: I11B6F5C48AEN
BCC Research

US$ 2,750.00 US$ 5,500.00 -50 %

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
REPORT SCOPE:

The scope of the report includes, a general outlook of securities in IT industry. While most of the information is referenced from reports published by BCC Research during the year 2016, 2017 and 2018, market trends and estimates are updated to latest base year, i.e. 2018. This report covers only cyber security, Internet of Things (IoT) security, and cloud security. The cyber security market covers the following technologies: identity and access management (IAM), encryption, data loss protection (DLP), firewall, antivirus and antimalware, disaster recovery, risk and compliance management, and other solutions.

The IoT security market is only for the commercialized IoT security solutions. It helps readers to understand how the IoT security solutions market will evolve, as well as the trends that will impact its adoption. The report focuses on security solutions that have been developed or customized to meet the unique needs of IoT systems. Services provided for integrating such solutions or managed security services are not included in the scope of this report.

The cloud security and vulnerability technologies market encompass various technologies used in cloud security and vulnerability applications. The cloud security and vulnerability market by application is segmented by identity and access management, security information and event management (SIEM), endpoint security, web security, messaging security, network security and vulnerability assessment.

Estimated values used are based on manufacturers' total revenues. Projected and forecasted revenue values are in constant U.S. dollars, unadjusted for inflation. The scope is limited to the recent studies published by BCC Research and is thus not exhaustive.

REPORT INCLUDES:
  • 27 tables
  • An overview of the global securities market in information technology (IT), encompassing cyber security, Internet of Things (IoT) security, and cloud security markets
  • Analyses of the global market trends with data from 2018, estimates for 2019, and projections of compound annual growth rates (CAGRs) through 2024
  • Detailed discussion of opportunities and innovation-driven securities market in IT highlights, as well as the major regions involved in such developments
  • An assessment of various technologies of IT security and the market dynamics of each technology
  • Identification of segments with high growth potential, as well as an understanding of future applications of given segments
  • Information on key trends related to technology, industry, and regional factors that shape and influence the overall IT security industry
  • Comprehensive company profiles of major global players in IT securities market, including Alphabet Inc., Cisco Systems Inc., Dell EMC, Lockheed Martin, Kaspersky Lab, McAfee etc.
CHAPTER 1 INTRODUCTION

Study Goals and Objectives
Reasons for Doing This Study
Scope of the Report
Intended Audiences
Information Sources
Methodology
Market Breakdown
Analyst's Credentials
BCC Custom Research
Related BCC Research Reports

CHAPTER 2 SUMMARY AND HIGHLIGHTS

CHAPTER 3 MARKET AND TECHNOLOGY OVERVIEW

Cyber Security
Introduction
Data Breaches
Bring Your Own Device
Life Cycle Analysis
Impacting Factors for the Cyber Security Market
Cloud Security Technologies
Introduction
Cloud Security Market by Industry
Cloud Security Market by Region
IoT Security
Government Regulations
Public and Private Partnerships on IoT Standard Development
Industry Consortiums and Groups Working on Developing IoT Security Standards
Factors Driving the Market Growth
Value Chain

CHAPTER 4 MARKET FOR CYBER SECURITY BY TYPE

Introduction
Network Security
Different Ways to Mitigate Network Security Threats
Endpoint Security
Remote Management System
Proactive Malware Detectors
Gateway Antivirus Software
Gateway Anti-spy Software
Gateway Anti-spam Software
Web-filtering and Device Management
Wireless Security
Firewall
Intrusion Detection/Prevention System (IDS/IPS)
Wireless Encryption
Wireless Identity and Access Management
Wireless Unified Threat Management
Content Security
Cloud Security
Cloud Identity and Access Management
Data Loss Prevention
Web Security
Cloud IDS/IPS
Cloud Security Information and Event Management
Cloud Encryption
Cloud Database Security
Virtualization Security
Application Security
Antivirus Application Security
Anti-theft Application Security
Data Backup and Recovery Application Security
Identity and Access Management and Authentication Application Security
Compliance Management Application Security

CHAPTER 5 MARKET FOR CLOUD SECURITY AND VULNERABILITY BY TECHNOLOGY

Introduction
Identity and Access Management
IAM Market by Deployment Type
IAM Market by Region
Network Security
Network Security Market by Deployment Type
Network Security Market by Region
Endpoint Security
Endpoint Security Market by Deployment Type
Endpoint Security Market by Region
Messaging Security
Messaging Security Market by Deployment Type
Messaging Security Market by Region
Web Security
Web Security Market by Deployment Type
Web Security Market by Region
SIEM
SIEM Market by Deployment Type
SIEM Market by Region
Vulnerability Assessment
Vulnerability Assessment Market by Deployment Type
Vulnerability Assessment Market by Region

CHAPTER 6 MARKET FOR IOT SECURITY BY TECHNOLOGY

IoT Market
Different Users and Players in the IoT Security Market
Market Size for IoT Security Solutions
Device Layer Security
Technology Overview for Device Layer Security
Market Analysis for Device Layer IoT Security Solutions
Regional Market Analysis for Device Layer IoT Security Solutions
Identity and Authorization Management Solutions
Encryption and Authentication Solutions
Network Layer IoT Security
Introduction
Technology Overview for IoT Network Technologies
Security Technologies for IoT Network Security
Market Analysis for Network Level IoT Security Solutions
Regional Market for Network Layer IoT Security Solutions
Technology Overview for Firewalls and IoT Gateways
IoT Gateways
IoT Application and Cloud Security
Technology Overview
Market Analysis of IoT Device Cloud Security Solutions
Market Analysis for IoT Application and Device Cloud Security Solutions
Threat Detection and Security Management Solutions
Technology Overview
IoT Security Platforms
Introduction

CHAPTER 7 COMPANY PROFILES

AEROHIVE
ALERT LOGIC
ALPHABET INC. (GOOGLE INC.)
AMAZON, INC.
ARXAN
ARM
ATMEL
AUTHENTIC8
AVIRA
BAE SYSTEMS INC.
BALABIT
BARRACUDA NETWORKS INC.
BEYONDTRUST
BITGLASS
BOOZ ALLEN HAMILTON HOLDING CORP.
BROADSTAR INFORMATION TECHNOLOGIES
CENTRI TECHNOLOGY
CERTIFIED SECURITY SOLUTIONS INC.
CHECK POINT SOFTWARE TECHNOLOGIES
CISCO SYSTEMS INC.
CROWDSTRIKE INC.
DELL EMC
DELL INC. (SONICWALL INC.)
DEVICE AUTHORITY
DIGICERT INC.
DIGITAL DEFENSE INC.
ENTRUST DATACARD
ESCRYPT
FIREEYE
FORESCOUT TECHNOLOGIES INC.
FORGEROCK
FORTINET INC.
GEMALTO
GLOBALSIGN INC.
GOOD TECHNOLOGY
GREAT BAY SOFTWARE INC.
HEWLETT PACKARD ENTERPRISE CO.
ICON LABS
IMAGINATION TECHNOLOGIES
IMPERVA INC.
INFINEON
INSIDE SECURE
INTEL CORP.
INTERNATIONAL BUSINESS MACHINE (IBM) CORP.
INTRINSIC-ID
KASPERSKY LAB
LOCKHEED MARTIN
MCAFEE
MDS TECHNOLOGY
MICROCHIP TECHNOLOGY INC.
MICROSOFT
MOCANA
NORTHROP GRUMMAN CORP.
NXP SEMICONDUCTORS
PALO ALTO NETWORKS INC.
PROTEGRITY INC.
PROVE AND RUN
RENESAS
RUBICON LABS
SECURERF
SECURITHINGS LTD.
SEQUITUR LABS INC.
SOPHOS PLC
SUREPASSID
SYMANTEC
SYNOPSYS
TENABLE NETWORK SECURITY
THALES E-SECURITY INC.
TREND MICRO
TRILLIUM
TRIPWIRE INC.
TRUSTONIC
TYFONE
UTIMACO
WISEKEY SA
ZSCALER INC.
ZINGBOX INC.

LIST OF TABLES

Summary Table: Global Market for Cyber Security, by Type, Through 2024
Table 1: Key Drivers of Cloud Security, by Industry
Table 2: Key Drivers of Cloud Security, by Region
Table 3: Key Market Trends in the IoT Security Solutions Segment
Table 4: Global Market for Cyber Security, by Type, Through 2024
Table 5: Global Market for Cloud Security and Vulnerability, by Technology, Through 2024
Table 6: Global Market for IAM, by Deployment Type, Through 2024
Table 7: Global Market for IAM, by Region, Through 2024
Table 8: Global Market for Network Security, by Deployment Type, Through 2024
Table 9: Global Market for Network Security, by Region, Through 2024
Table 10: Global Market for Endpoint Security, by Deployment Type, Through 2024
Table 11: Global Market for Endpoint Security, by Region, Through 2024
Table 12: Global Market for Messaging Security, by Deployment Type, Through 2024
Table 13: Global Market for Messaging Security, by Region, Through 2024
Table 14: Global Market for Web Security, by Deployment Type, Through 2024
Table 15: Global Market for Web Security, by Region, Through 2024
Table 16: Global Market for SIEM, by Deployment Type, Through 2024
Table 17: Global Market for SIEM, by Region, Through 2024
Table 18: Global Market for Vulnerability Assessment of Cloud Security, by Deployment Type, Through 2024
Table 19: Global Market for Vulnerability Assessment of Cloud Security, by Region, Through 2024
Table 20: Global Market for IoT Security Solutions, by End User, Through 2024
Table 21: Global Market for IoT Security Solutions, by Type, Through 2024
Table 22: Global Market for Device Layer IoT Security Solutions, by End User, Through 2024
Table 23: Global Market for Device Layer IoT Security Solutions, by Region, Through 2024
Table 24: Global Market for Network Layer IoT Security Solutions, by End User, Through 2024
Table 25: Global Market for Network Layer IoT Security Solutions, by Region, Through 2024
Table 26: Global Market for IoT Application and Cloud Layer Security Solutions, by End User, Through 2024

LIST OF FIGURES

Summary Figure: Global Market for Cyber Security, by Type, 2018-2024
Figure 1: Life Cycle Analysis for Cyber Security
Figure 2: Global Market for Cyber Security, by Type, 2018-2024
Figure 3: Global Market for Cloud Security and Vulnerability, by Technology, 2018-2024
Figure 4: Global Market for IAM, by Deployment Type, 2018-2024
Figure 5: Global Market for IAM, by Region, 2018-2024
Figure 6: Global Market for Network Security, by Deployment Type, 2018-2024
Figure 7: Global Market for Network Security, by Region, 2018-2024
Figure 8: Global Market for Endpoint Security, by Deployment Type, 2018-2024
Figure 9: Global Market for Endpoint Security, by Region, 2018-2024
Figure 10: Global Market for Messaging Security, by Deployment Type, 2018-2024
Figure 11: Global Market for Messaging Security, by Region, 2018-2024
Figure 12: Global Market for Web Security, by Deployment Type, 2018-2024
Figure 13: Global Market for Web Security, by Region, 2018-2024
Figure 14: Global Market for SIEM, by Deployment Type, 2018-2024
Figure 15: Global Market for SIEM, by Region, 2018-2024
Figure 16: Global Market for Vulnerability Assessment of Cloud Security, by Deployment Type, 2018-2024
Figure 17: Global Market for Vulnerability Assessment of Cloud Security, by Region, 2018-2024
Figure 18: Global Market for IoT Security Solutions, by End User, 2018-2024
Figure 19: Global Market for IoT Security Solutions, by Type, 2018-2024
Figure 20: Global Market for Device Layer IoT Security Solutions, by End User, 2018-2024
Figure 21: Global Market for Device Layer IoT Security Solutions, by Region, 2018-2024
Figure 22: Global Market for Network Layer IoT Security Solutions, by End User, 2018-2024
Figure 23: Global Market for Network Layer IoT Security Solutions, by Region, 2018-2024
Figure 24: Global Market for IoT Application and Cloud Layer Security Solutions, by End User, 2018-2024


More Publications