Cover Image
市場調查報告書

高安全風險技術對各企業的IT決策者的影響:美國、歐洲的情況

High Security Risk Technologies Impacting IT Decision Makers - United States and Europe

出版商 Frost & Sullivan 商品編碼 307743
出版日期 內容資訊 英文 64 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
高安全風險技術對各企業的IT決策者的影響:美國、歐洲的情況 High Security Risk Technologies Impacting IT Decision Makers - United States and Europe
出版日期: 2014年07月09日 內容資訊: 英文 64 Pages
簡介

現在,雲端運算在任何產業中都急速普及,還有在每個企業平板電腦都逐漸普及。在每個企業都有使安全風險上升的因素,不過大半調查受訪企業,都回答新技術對達成自家公司目的來說非常有效。當然,大企業盡可能增加高安全風險技術的投資額,還有MSSP(管理安全服務供應商)的利用頻率也變高。今後暫且可以說對網路、安全供應商來說存在著巨大市場機會。

本報告提供美國、歐洲的各種企業的IT決策者的問卷調查、各企業的高安全風險技術的引進情形和今後的引進計劃、預算分配情形等資訊彙整。

第1章 分析的目的、手法

第2章 摘要整理

第3章 高安全風險技術的現在、未來的使用概況

  • 網路安全是對企業來說的成長機器
  • 高安全風險技術:現在、未來的使用概況
  • 目前使用概況 :各地區
  • 目前使用概況 :各產業
  • 目前使用概況 :各企業規模
  • 未來的利用計劃:各地區
  • 未來的利用計劃:各產業
  • 未來的利用計劃:各企業規模
  • 高安全風險技術:對企業來說的效用

第4章 對MSSP(管理安全服務供應商)的外包化

  • 對MSSP的外包化情形:各地區
  • 對MSSP的外包化情形:各產業
  • 對MSSP的外包化情形:各企業規模

第5章 網路安全技術的引進

  • 網路安全技術的引進情形:各地區
  • 網路安全技術的引進情形:各產業
  • 網路安全技術的引進情形:各企業規模

第6章 高安全風險技術的危險率

  • 各地區的危險率
  • 各產業危險率
  • 各企業規模的危險率

第7章 網路安全技術之IT預算的獲得情形

  • 今後的IT預算主要的預測

第8章 IT的人力資源的影響力

  • 各種勞工的分佈情形:各地區、各企業規模
  • 各種勞工的分佈情形:各產業
  • 分析結果的考察:新業務的支援使成本增大

第9章 調查受訪者簡介

  • 企業、調查受訪者的地理分佈情形
  • 調查受訪者的居住國家與IT經驗年數
  • IT決策者所扮演的角色和職位
  • 調查對象的產業、醫療機關的概要
  • 調查對象的醫療機關及各領域的概要
  • 調查對象的產業、政府機關的概要
  • 法律上的免責聲明

第10章 附錄

  • 市場成長率的詳細資訊
  • 行動管理平台的引進
  • 高惡意程式、連續性威脅偵測功能的引進情形
  • 行動、端點安全防護功能的引進情形
  • 分散式DOS攻擊防禦功能的引進情形
  • Web應用、防火牆的引進情形
  • 網路存取控制功能的引進情形
  • 下一代型防火牆的引進情形
  • 下一代型侵入防禦設備的引進情形

第11章 關於FROST & SULLIVAN

目錄
Product Code: MA15-01-00-00-00

Opportunities for Network Security Technologies Providers

The overall research objective of this research was to measure the current use and future decision-making behavior toward information technology (IT), specifically network security technologies. Cloud computing is expected to grow rapidly across verticals and tablet usage is on the rise in the workplace. Both create a greater security risk in the organization, but more than half of the respondents feel that they are highly effective in meeting their organizations' goals. Not surprisingly, large companies invest in high security risk technologies: the larger the company, the greater the value of outsourcing to MSSPs. This study reveals there is much opportunity for network security providers over the next three years.

Table of Contents

1. RESEARCH OBJECTIVES AND METHODOLOGY

Research Objectives and Methodology

  • 1. Research Objectives
  • 2. Methodology
  • 3. Methodology (Continued)

2. EXECUTIVE SUMMARY

Executive Summary

  • 1. Executive Summary

3. CURRENT AND FUTURE USE OF HIGH SECURITY RISK TECHNOLOGIES

Current and Future Use of High Security Risk Technologies

  • 1. Growth Opportunities in the for Network Security Companies
  • 2. High Security Risk Technologies, Current and Future Usage
  • 3. Currently Used High Security Risk Technologies by Region
  • 4. Currently Used High Security Risk Technologies by Industry
  • 5. Currently Used High Security Risk Technologies by Company Size
  • 6. Planning for Future Use of High Security Risk Technologies by Region
  • 7. Planning for Future Use of High Security Risk Technologies by Industry
  • 8. Planning for Future Use of High Security Risk Technologies by Company Size
  • 9. Effectiveness of High Risk Technologies for Organizations

4. OUTSOURCING TO MANAGED SECURITY SERVICE PROVIDERS (MSSPS)

Outsourcing to Managed Security Service Providers (MSSPs)

  • 1. Outsourcing to Managed Security Service Providers by Region
  • 2. Outsourcing to Managed Security Service Providers by Industry
  • 3. Outsourcing to Managed Security Service Providers by Company Size

5. IMPLEMENTATION OF NETWORK SECURITY TECHNOLOGIES

Implementation of Network Security Technologies

  • 1. Implementation of Network Security Technologies by Region
  • 2. Implementation of Network Security Technologies by Industry
  • 3. Implementation of Network Security Technologies by Company Size

6. SECURITY RISK RATES OF HIGH SECURITY RISK TECHNOLOGIES

Security Risk Rates of High Security Risk Technologies

  • 1. High Security Risk Technologies by Region
  • 2. High Security Risk Technologies by Industry
  • 3. High Security Risk Technologies by Company Size

7. AVAILABLE IT BUDGETS FOR NETWORK SECURITY TECHNOLOGIES

Available IT Budgets for Network Security Technologies

  • 1. The Big Picture of IT Budgets
  • 2. The Big Picture of IT Budgets (continued)

8. IMPACT OF THE WORKFORCE ON IT

Impact of the Workforce on IT

  • 1. Distribution of Worker Types by Region and Company Size
  • 2. Distribution of Worker Types by Industry
  • 3. Attitude Profile: Supporting New Business Needs is Driving Up Costs

9. PROFILE

Profile

  • 1. Companies' and Respondents' Geographic Reach
  • 2. Country of Residence and Years in IT
  • 3. IT Decision Making Role and Job Title
  • 4. Industries and Healthcare Segments Addressed
  • 5. Healthcare Segments and Sub-segments Addressed
  • 6. Industries and Government Segments Addressed
  • 7. Legal Disclaimer

10. APPENDIX

Appendix

  • 1. Growth Rate Details
  • 2. Implementation of Mobility Management Platform
  • 3. Implementation of Advanced Malware Detection and Advanced Persistent Threat Detection
  • 4. Implementation of Mobile Endpoint Security
  • 5. Implementation of Distributed Denial of Service Prevention
  • 6. Implementation of Web Application Firewall
  • 7. Implementation of Network Access Control
  • 8. Implementation of Next Generation Firewall
  • 9. Implementation of Next Generation Intrusion Prevention Systems

11. THE FROST & SULLIVAN STORY

The Frost & Sullivan Story

  • 1. The Frost & Sullivan Story
  • 2. Value Proposition: Future of Your Company & Career
  • 3. Global Perspective
  • 4. Industry Convergence
  • 5. 360° Research Perspective
  • 6. Implementation Excellence
  • 7. Our Blue Ocean Strategy
Back to Top