Cover Image
市場調查報告書

全球硬體設備加密市場 - 市場機會、預測:2014-2020年

World Hardware Encryption Market - Opportunities and Forecasts, 2014 -2020

出版商 Allied Market Research 商品編碼 344782
出版日期 內容資訊 英文 125 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
全球硬體設備加密市場 - 市場機會、預測:2014-2020年 World Hardware Encryption Market - Opportunities and Forecasts, 2014 -2020
出版日期: 2015年10月01日 內容資訊: 英文 125 Pages
簡介

硬體設備加密,是為了保護數位資料的硬體設備基礎的技術。在加密中,有硬體設備基礎的加密和軟體基礎的加密2個形式。產生加密密鑰的硬體設備加密上,使用具備隨機數產生器的處理器。硬體設備基礎的解決方案的主要優點,為排除鎖定記憶體內的加密密鑰的攻擊造成性能降低等,軟體基礎解決方案的典型缺點。在硬體設備加密中,強化安全性參數及保護碼的加密能力。硬體設備加密,在效率性地保護資料時又可保持各種應用程式,成本效率佳的手法。

本報告以全球硬體設備加密市場為主題,提供市場概要,市場發展促進與阻礙因素,市場機會,價值鏈分析,各利用對象/各用途/各終端用戶/各地區的市場現況與展望相關調查分析,主要的供應商簡介彙整。

第1章 簡介

  • 關於本報告
  • 調查實施理由
  • 主要的成果
  • 主要的主要讀者
  • 調查手法

第2章 摘要整理

  • CXO的觀點

第3章 市場概要

  • 市場定義和範圍
  • 主要調查結果
    • 最大影響要素
    • 最重要投資處領域
    • 最重要策略
  • 波特的五力分析
  • 價值鏈分析
  • 市場佔有率分析
  • 市場動態
    • 推動市場成長要素
      • 資料侵害議案的數量增加和複雜化
      • 法令遵循的擴大
      • 價格低
    • 阻礙市場成長要素
      • 認識的缺乏
      • 有限制利用加密設備的國家
    • 市場機會
      • 加密晶片的技術發展

第4章 全球硬體設備加密市場,各利用對象

  • 簡介
    • 市場規模、預測
  • 儲存裝置 (硬式磁碟機及USB隨身碟)
    • 主要的市場趨勢
    • 競爭模式
    • 主要的成長要素與市場機會
    • 市場規模、預測
  • 網路
    • 主要的市場趨勢
    • 競爭模式
    • 主要的成長要素與市場機會
    • 市場規模、預測

第5章 全球硬體設備加密市場,各用途

  • 簡介
    • 市場規模、預測
    • 醫療部門
      • 市場規模、預測
    • 軍事、航太部門
      • 市場規模、預測
    • 汽車、運輸部門
      • 市場規模、預測
    • BFSI (銀行、金融服務、保險)
      • 市場規模、預測
    • IT、通訊
      • 市場規模、預測
    • 其他 (零售、教育、個人用戶)
      • 市場規模、預測

第6章 全球硬體設備加密市場,各終端用戶

  • 簡介
    • 市場規模、預測
    • 工業/商用
      • 市場規模、預測
    • 住宅
      • 市場規模、預測
    • 政府機關
      • 市場規模、預測

第7章 全球硬體設備加密市場,各地區

  • 簡介
  • 北美
    • 主要的市場趨勢
    • 競爭模式
    • 主要的成長要素與市場機會
    • 市場規模、預測
  • 歐洲
    • 主要的市場趨勢
    • 競爭模式
    • 主要的成長要素與市場機會
    • 市場規模、預測
  • 亞太地區
    • 主要的市場趨勢
    • 競爭模式
    • 主要的成長要素與市場機會
    • 市場規模、預測
  • LAMEA (南美、中東、非洲)
    • 主要的市場趨勢
    • 競爭模式
    • 主要的成長要素與市場機會
    • 市場規模、預測

第8章 企業簡介 (企業概要、企業概況、業績、策略性趨勢、SWOT分析)

  • Kingston Technology Corporation Inc.
  • Certes Networks Inc.
  • Seagate Technology LLC
  • 東芝
  • NetApp, Inc.
  • Micron Technology, Inc.
  • Samsung Electronics Co. Ltd.
  • Imation Corp.
  • SanDisk Corporation
  • Maxim Integrated Products, Inc.
  • International Business Machines Corporation (IBM)

圖表清單

目錄

Title: World Hardware Encryption Market by Usage (Storage device and Network), Application (Healthcare Sector, Military & Aerospace Sector, Automotive & Transportation Sector, IT & Telecom and Others) and End User (Industrial and commercial, Residential, Government Agencies)- Global Opportunity Analysis and Industry Forecast, 2014 -2020.

Hardware Encryption is a hardware based technique that is used for securing digital data. There are two forms of encryption; hardware based encryption and software based encryption. Hardware encryption uses a processor that contains random number of generators to generate encryption key. The key advantage of hardware-based solutions is that they eliminate the typical drawbacks of software-based solutions such as performance degradation for attacks aimed at the encryption key stored in memory. In hardware encryption, the security parameters and safeguard keys enhance the performance of encryption. These security parameters protect the encryption from cold boots and brute force attacks. Hardware encryption is a cost effective method that holds diverse applications in securing data efficiently.

With the advancements in technology, leading market players are developing various hardware encrypted solutions to cater to the increasing demands in the storage industry. Product launch is identified as a prominent strategy in this market. For instance, in 2015, Toshiba Corporation introduced the Toshiba Encrypted USB Flash Drive that utilizes a hardware based encryption process in order to deliver a secure and affordable solution. This product is targeted at corporate enterprises and government agencies. Increasing regulatory compliances and the declining prices of hardware encryption devices majorly drive the growth of this market. Low awareness and limited adoption are key factors that hamper the market growth. However, integration with SOC (System On-Chip) would create numerous opportunities for the growth of the hardware encryption market.

The market is segmented on the basis of usage, application, end user and geography. The usage segment includes storage device (hard disk drives, USB flash drives) and network. The segment of hard disk drives accounted for the maximum revenue share, in 2014, and would go on to consolidate its position during the forecast period (2015-2020). The application segment is categorized into the healthcare, military & aerospace, automotive & transportation, BFSI, IT & telecom and others (retail, education and individual users). The end user segment is classified into industrial/commercial, residential, government agencies. Based on geography, the world hardware encryption market is segmented across North America, Europe, Asia-Pacific and LAMEA.

The leading players profiled in this report are Kingston Technology Corporation Inc., Seagate Technology LLC, NetApp, Inc., Certes Networks Inc., Micron Technology, Inc., SanDisk Corporation, Toshiba Corporation, Samsung Electronics Co. Ltd, Imation Corp., Maxim Integrated Products Inc. and International Business Machines Corporation (IBM)

POTENTIAL BENEFITS FOR STAKEHOLDERS:

  • The report provides an in-depth analysis of the hardware encryption market and offers current and future trends to identify lucrative investment pockets in the market
  • The report identifies the key drivers, opportunities and restraints that shape the market and provides an impact analysis for the forecast period
  • Porter's five forces analysis highlights the potency of buyers and suppliers participating in this market. This would further offer a competitive advantage to stakeholders in making profitable business decisions; thus, helping them to strengthen their supplier and buyer networks
  • Current and future trends are outlined to determine the overall attractiveness and highlight the profitable trends in order to gain a stronger foothold in the market
  • Market estimation of geographic segments is derived from the current market scenario and expected market trends

HARDWARE ENCRYPTION MARKET SEGMENTATION

The market is segmented on the basis of usage, application, end user and geography.

World Hardware Encryption Market-By Usage

  • Storage device
  • Hard disk drive
  • USB flash drives
  • Network

World Hardware Encryption Market-By Application

  • Healthcare Sector
  • Military & Aerospace Sector
  • Automotive & Transportation Sector
  • BFSI
  • IT & Telecom
  • Others (Retail , Education and Individual users)
  • World Hardware Encryption Market-By End User
  • Industrial/Commercial
  • Residential
  • Government Agencies

World Hardware Encryption Market-By Geography

  • North America
  • Europe
  • Asia-Pacific
  • LAMEA

KEY PLAYERS

  • Kingston Technology Corporation Inc.
  • Seagate Technology LLC
  • NetApp, Inc.
  • Certes Networks Inc.
  • Micron Technology, Inc.
  • SanDisk Corporation
  • Toshiba Corporation
  • Samsung Electronics Co. Ltd
  • Imation Corp.
  • Maxim Integrated Products Inc.
  • International Business Machines Corporation (IBM)

Table of Contents

CHAPTER 1: INTRODUCTION

  • 1.1. Report description
  • 1.2. Reasons for doing the study
  • 1.3. Key benefits
  • 1.4. Key market segmentation
  • 1.5. Key audience
  • 1.6. Research methodology
    • 1.6.1. Secondary research
    • 1.6.2. Primary research
    • 1.6.3. Analyst tools and models

CHAPTER 2: EXECUTIVE SUMMARY

  • 2.1. CXO perspective

CHAPTER 3: MARKET OVERVIEW

  • 3.1. Market definition and scope
  • 3.2. Key findings
    • 3.2.1. Top factors impacting the hardware encryption market
    • 3.2.2. Top winning strategies of hardware encryption market
    • 3.2.3. Top investment pockets of hardware encryption market
  • 3.3. Porters five forces
    • 3.3.1. Bargaining power of the suppliers
    • 3.3.2. Bargaining power of buyer
    • 3.3.3. Threat of substitution
    • 3.3.4. Threat of new entrant
    • 3.3.5. Competitive rivalry in the market
  • 3.4. Value chain analysis
  • 3.6. Market share analysis, 2014
  • 3.7. Market dynamics
    • 3.7.1. Drivers
      • 3.7.1.1. Growing number and complexity of data breaches
      • 3.7.1.2. Increased compliance regulations
      • 3.7.1.3. Reduced prices
    • 3.7.2. Restraints
      • 3.7.2.1. Lack of awareness
      • 3.7.2.2. Limiting the use of encrypted devices in some countries
    • 3.7.3. Opportunities
      • 3.7.3.1. Technological advancement on encryption chip

CHAPTER 4: WORLD HARDWARE ENCRYPTION MARKET BY USAGE

  • 4.1. Introduction
    • 4.1.1. Market size and forecast
  • 4.2. Storage device (hard disk drives and USB flash drives)
    • 4.2.1. Key market trends
    • 4.2.2. Competitive scenario
    • 4.2.3. Key growth factors and opportunities
    • 4.2.4. Market size and forecast
  • 4.3. Network
    • 4.3.1. Key market trends
    • 4.3.2. Competitive scenario
    • 4.3.3. Key growth factors and opportunities
    • 4.3.4. Market size and forecast

CHAPTER 5: WORLD HARDWARE ENCRYPTION MARKET BY APPLICATION

  • 5.1. Introduction
    • 5.1.1. Market size and forecast
    • 5.1.2. Healthcare sector
      • 5.1.2.1. Market size and forecast
    • 5.1.3. Military & aerospace sector
      • 5.1.3.1. Market size and forecast
    • 5.1.4. Automotive & transportation sector
      • 5.1.4.1. Market size and forecast
    • 5.1.5. BFSI
      • 5.1.5.1. Market size and forecast
    • 5.1.6. IT & Telecom
      • 5.1.6.1. Market size and forecast
    • 5.1.7. Others (retail, education and individual users)
      • 5.1.7.1. Market size and forecast

CHAPTER 6: WORLD HARDWARE ENCRYPTION MARKET BY END USER

  • 6.1. Introduction
    • 6.1.1. Market size and forecast
    • 6.1.2. Industrial/commercial
      • 6.1.2.1. Market size and forecast
    • 6.1.3. Residential
      • 6.1.3.1. Market size and forecast
    • 6.1.4. Government agencies
      • 6.1.4.1. Market size and forecast

CHAPTER 7: WORLD HARDWARE ENCRYPTION MARKET BY GEOGRAPHY

  • 7.1. Introduction
  • 7.2. North America
    • 7.2.1. Key market trends
    • 7.2.2. Competitive scenario
    • 7.2.3. Key growth factors and opportunities
    • 7.2.4. Market size and forecast
  • 7.3. Europe
    • 7.3.1. Key market trends
    • 7.3.2. Competitive scenario
    • 7.3.3. Key growth factors and opportunities
    • 7.3.4. Market size and forecast
  • 7.4. Asia-Pacific
    • 7.4.1. Key market trends
    • 7.4.2. Competitive scenario
    • 7.4.3. Key growth factors and opportunities
    • 7.4.4. Market size and forecast
  • 7.5. LAMEA
    • 7.5.1. Key market trends
    • 7.5.2. Competitive scenario
    • 7.5.3. Key growth factors and opportunities
    • 7.5.4. Market size and forecast

CHAPTER 8: COMPANY PROFILES

  • 8.1. Kingston Technology Corporation Inc.
    • 8.1.1. Company overview
    • 8.1.2. Company snapshot
    • 8.1.3. Strategic moves and developments
    • 8.1.4. SWOT analysis & strategic conclusions
  • 8.2. Certes Networks Inc.
    • 8.2.1. Company overview
    • 8.2.2. Company snapshot
    • 8.2.3. Strategic moves and developments
    • 8.2.4. SWOT analysis & strategic conclusions
  • 8.3. Seagate Technology LLC
    • 8.3.1. Company overview
    • 8.3.2. Company snapshot
    • 8.3.3. Business performance
    • 8.3.4. Strategic moves and developments
    • 8.3.5. SWOT analysis & strategic conclusions
  • 8.4. Toshiba Corporation
    • 8.3.1. Company overview
    • 8.3.2. Company snapshot
    • 8.3.3. Business performance
    • 8.3.4. Strategic moves and developments
    • 8.4.5. SWOT analysis & strategic conclusions
  • 8.5. NetApp, Inc.
    • 8.5.1. Company overview
    • 8.5.2. Company snapshot
    • 8.5.3. Business performance
    • 8.5.4. Strategic moves and developments
    • 8.5.5. SWOT analysis and strategic conclusion
  • 8.6. Micron Technology, Inc.
    • 8.6.1. Company overview
    • 8.6.2. Company snapshot
    • 8.6.3. Business performance
    • 8.6.4. Strategic moves and developments
    • 8.6.5. SWOT analysis and strategic conclusion
  • 8.7. Samsung Electronics Co. Ltd.
    • 8.7.1. Company overview
    • 8.7.2. Company snapshot
    • 8.7.3. Business performance
    • 8.7.4. Strategic moves and developments
    • 8.7.5. SWOT analysis and strategic conclusion
  • 8.8. Imation Corp.
    • 8.8.1. Company overview
    • 8.8.2. Company snapshot
    • 8.8.3. Business performance
    • 8.8.4. Strategic moves and developments
    • 8.8.5. SWOT analysis and strategic conclusion
  • 8.9. SanDisk Corporation
    • 8.9.1. Company overview
    • 8.9.2. Company snapshot
    • 8.9.3. Business performance
    • 8.9.4. Strategic moves and developments
    • 8.9.5. SWOT analysis and strategic conclusion
  • 8.10. Maxim Integrated Products, Inc.
    • 8.10.1. Company overview
    • 8.10.2. Company snapshot
    • 8.10.3. Business performance
    • 8.10.4. Strategic moves and developments
    • 8.10.5. SWOT analysis of maxim integrated products, Inc.
  • 8.11. International Business Machines Corporation (IBM)
    • 8.11.1. Company overview
    • 8.11.2. Company snapshot
    • 8.11.3. Business performance
    • 8.11.4. Strategic moves and developments
    • 8.11.5. SWOT Analysis of IBM Corp.

List of Tables

  • TABLE 1: WORLD HARDWARE ENCRYPTION MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 2: WORLD HARDWARE ENCRPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 3: HARD DISK DRIVES SHIPMENT, 2011-2014 ($MILLION)
  • TABLE 4: USB FLASH DRIVES SHIPMENT, 2010-2013 ($MILLION)
  • TABLE 5: WORLD HARDWARE STORAGE DEVICE (HARD DISK DRIVES & USB FLASH DRIVES) ENCRYPTION MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 6: WORLD HARDWARE NETWORK ENCRYPTION MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 7: WORLD HARDWARE ENCRPTION MARKET BY APPLICATION, 2014-2020 ($MILLION)
  • TABLE 8: HEALTHCARE SPENDING BY REGION ($MILLION)
  • TABLE 9: WORLD HARDWARE ENCRYPTION HEALTHCARE MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 10: MILITARY EXPENDITURE BY COUNTRY ($MILLION)
  • TABLE 11: WORLD HARDWARE ENCRYPTION MILITARY & AEROSPACE SECTOR MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 12: WORLD HARDWARE ENCRYPTION AUTOMOTIVE & TRANSPORTATION SECTOR MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 13: WORLD HARDWARE ENCRYPTION IT & TELECOM MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 14: WORLD HARDWARE ENCRYPTION BFSI MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 15: WORLD HARDWARE ENCRYPTION OTHERS (RETAIL, EDUCATION AND INDIVIDUAL USERS) MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 16: WORLD HARDWARE ENCRYPTION END USER MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 17: WORLD HARDWARE ENCYRPTION INDUSTRIAL/COMMERCIAL MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 18: WORLD HARDWARE ENCRYPTION RESIDENTIAL MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 19: WORLD HARDWARE ENCRYPTION GOVERNMENT AGENCIES MARKET BY GEOGRAPHY, 2014-2020 ($MILLION)
  • TABLE 20: NORTH AMERICA HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 21: EUROPE HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 22: ASIA-PACIFIC HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 23: LAMEA HARDWARE ENCRYPTION MARKET BY USAGE, 2014-2020 ($MILLION)
  • TABLE 24: SNAPSHOT OF KINGSTON TECHNOLOGY CORPORATION
  • TABLE 25: SNAPSHOT OF CERTES NETWORKS INC.
  • TABLE 26: SNAPSHOT OF SEAGATE TECHNOLOGY LLC
  • TABLE 27: SNAPSHOT OF TOSHIBA CORPORATION
  • TABLE 28: SNAPSHOT OF NETAPP, INC.
  • TABLE 29: SNAPSHOT OF MICRON TECHNOLOGY, INC.
  • TABLE 30: SNAPSHOT OF SAMSUNG ELECTRONICS CO. LTD.
  • TABLE 31: SNAPSHOT OF IMATION CORP.
  • TABLE 32: SNAPSHOT OF SANDISK CORPORATION
  • TABLE 33: SNAPSHOT OF MAXIM INTEGRATED PRODUCTS, INC.
  • TABLE 34: SNAPSHOT OF IBM CORPORATION

List of Figures

  • FIG. 1: TOP IMPACTING FACTORS
  • FIG. 2: TOP WINNING STRATEGIES IN THE HARDWARE ENCRYPTION MARKET (2013-2015)
  • FIG. 3: TOP WINNING STRATEGIES (PERCENTAGE COMPARISON) (2013-2015)
  • FIG. 4: TOP INVESTMENT POCKETS
  • FIG. 5: PORTERS FIVE FORCES OF HARDWARE ENCRYPTION MARKET
  • FIG. 6: VALUE CHAIN ANALYSIS OF HARDWARE ENCRYPTION MARKET
  • FIG. 7: MARKET SHARE ANALYSIS OF HARDWARE ENCRYPTION MARKET, 2014
  • FIG. 8: GROWTH STAGE OF HARD DISK DIRIVES, USB FLASH DRIVES AND ENCRYPTED NETWORK
  • FIG. 9: HEALTHCARE R&D EXPENDITURE BY REGION (PERCENTAGE COMPARISION)
  • FIG. 10: WORLD VEHICLE PRODUCTION BY REGION (PERCENTAGE COMPARISION)
  • FIG. 11: REVENUE BY GEOGRAPHY (PERCENTAGE COMPARISION), 2014
  • FIG. 12: SWOT ANALYSIS OF KINGSTON TECHNOLOGY CORPORATION INC.
  • FIG. 13: SWOT ANALYSIS OF CERTES NETWORK INC.
  • FIG. 14: REVENUE OF SEAGATE TECHNOLOGY LLC, 2013 2015 ($MILLION)
  • FIG. 15: REVENUE OF SEAGATE TECHNOLOGY LLC BY GEOGRAPHY, 2015 (%)
  • FIG. 16: SWOT ANALYSIS OF SEAGATE TECHNOLOGY LLC
  • FIG. 17: NET SALES OF TOSHIBA CORPORATION, 2012 2014 ($MILLION)
  • FIG. 18: NET SALES OF TOSHIBA CORPORATION, BY OPERATING SEGMENTS, 2014 (%)
  • FIG. 19: NET SALES OF TOSHIBA CORPORATION, BY GEOGRAPHY, 2014 (%)
  • FIG. 20: SWOT ANALYSIS OF TOSHIBA CORPORATION
  • FIG. 21: REVENUE OF NETAPP, INC., 2013-2015 ($MILLION)
  • FIG. 22: REVENUE OF NETAPP, INC., BY GEOGRAPGY, 2015 (%)
  • FIG. 23: SWOT ANALYSIS OF NETAPP, INC.
  • FIG. 24: NET SALES OF MICRON TECHNOLOGY, INC., 2012-2014 ($MILLION)
  • FIG. 25: NET SALES OF MICRON TECHNOLOGY, INC. BY BUSINESS SEGMENT, 2014 (%)
  • FIG. 26: NET SALES E OF MICRON TECHNOLOGY, INC. BY GEOGRAPHY, 2014 (%)
  • FIG. 27: SWOT ANALYSIS OF MICRON TECHNOLOGY, INC.
  • FIG. 28: REVENUE OF SAMSUNG ELECTRONICS CO. LTD., 2012-2014 ($MILLION)
  • FIG. 29: SWOT ANALYSIS OF SAMSUNG ELECTRONICS CO. LTD.
  • FIG. 30: REVENUE OF IMATION CORP., 2012-2014 ($MILLION)
  • FIG. 31: REVENUE OF IMATION CORP. BY BUSINESS SEGMENT, 2014 (%)
  • FIG. 32: SWOT ANALYSIS OF IMATION CORP.
  • FIG. 33: REVENUE OF SANDISK CORPORATION, 2012-2014 ($MILLION)
  • FIG. 34: REVENUE OF SANDISK CORPORATION BY GEOGRAPHY, 2014 (%)
  • FIG. 35: SWOT ANALYSIS OF. SANDISK CORPORATION
  • FIG. 36: REVENUE OF MAXIM INTEGRATED PRODUCTS, INC, 2013-2015 ($MILLION)
  • FIG. 37: REVENUE OF MAXIM INTEGRATED PRODUCTS BY GEOGRAPHY, 2015 (%)
  • FIG. 38: SWOT ANALYSIS OF MAXIM INTEGRATED PRODUCTS, INC.
  • FIG. 39: REVENUE OF IBM CORPORATION, 2012-2014 ($MILLION)
  • FIG. 40: REVENUE OF IBM CORPORATION, BY BUSINESS SEGMENT, 2014 (%)
  • FIG. 41: REVENUE OF IBM CORPORATION, BY GEOGRAPHY, 2014 (%)
  • FIG. 42: SWOT ANALYSIS OF IBM CORPORATION
Back to Top