Cover Image
市場調查報告書

網路安全沙箱市場分析

Network Security Sandbox Market Analysis

出版商 Frost & Sullivan 商品編碼 332896
出版日期 內容資訊 英文 96 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
網路安全沙箱市場分析 Network Security Sandbox Market Analysis
出版日期: 2015年06月15日 內容資訊: 英文 96 Pages
簡介

本報告提供全球網路安全沙箱市場相關調查分析、市場規模 (實際成果、預測) 、主要企業的市場佔有率、市場概要與市場趨勢、推動因素與阻礙因素、主要沙箱解決方案的競爭分析、沙箱市場競爭情形等相關的系統性資訊。

第1章 摘要整理

第2章 市場概要

  • 市場定義
  • APT市場環境與實際成果
  • APT防禦
  • 網路安全沙箱
  • 附加的顧慮事項
  • 價格設定
  • 通路
  • 市場通路的考察

第3章 推動因素與阻礙因素:綜合市場

  • 推動因素
  • 阻礙因素

第4章 預測與趨勢:綜合市場

  • 預測的前提條件
  • 收益預測
  • 收益預測的考察
  • 收益佔有率預測:各地區
  • 收益佔有率預測:各產業規模
  • 收益佔有率預測:各銷售管道
  • 收益佔有率預測:各產業市場
  • 各產業市場收益預測的考察

第5章 市場佔有率和競爭分析:綜合市場

  • 競爭分析:市場佔有率
  • 競爭環境
  • 競爭分析
  • 競爭情形
  • 競爭分析的考察

第6章 彙整

  • 預測
  • 建議
  • 免責聲明

第7章 業者簡介

  • 業者簡介
    • Blue Coat
    • Check Point
    • Cisco
    • FireEye
    • Fortinet
    • Intel Security (McAfee)
    • Lastline
    • Palo Alto Networks
    • Trend Micro
    • Websense

第8章 附錄

目錄
Product Code: NF0F-01-00-00-00

APTs Create a "Must Have" Security Technology

A network security sandbox is a dedicated analysis environment in which a suspicious program is executed and the behavior of the program is observed, noted, and then analyzed in an automated manner. This report provides an analysis of the market for sandboxes including four years of historical market sizing including base year 2014 and five years of market forecast; market shares for the market participants; market description and market trends; drivers and restraints; competitive analysis of the leading sandbox solutions; competitive landscape of the sandbox market; and individual company profiles of the market participants. Segments of the market analyzed include geography, size of business, distribution channel and vertical market.

Table of Contents

1. EXECUTIVE SUMMARY

  • 1. Key Findings
  • 2. Measurements
  • 3. CEO's Perspective
  • 4. Introduction to the Research
  • 5. Key Questions This Study Will Answer

2. MARKET OVERVIEW

  • 1. Market Definitions
  • 2. APT Market Environment and Historical Perspective
  • 3. APT Market Environment and Historical Perspective (continued)
  • 4. APT Market Environment and Historical Perspective (continued)
  • 5. APT Market Environment and Historical PerspectiveTargeted Attribute
  • 6. APT Market Environment and Historical PerspectivePersistent Attribute
  • 7. APT Market Environment and Historical PerspectiveAdvanced Attribute
  • 8. APT Market Environment and Historical Perspective Advanced Attribute (continued)
  • 9. APT Market Environment and Historical Perspective (continued)
  • 10. APT Defense
  • 11. Network Security Sandboxes
  • 12. Network Security Sandboxes (continued)
  • 13. Network Security Sandboxes (continued)
  • 14. Network Security Sandboxes (continued)
  • 15. Network Security Sandboxes Additional Considerations
  • 16. Pricing
  • 17. Distribution Channels
  • 18. Market Distribution Channels Discussion

3. DRIVERS AND RESTRAINTS-TOTAL MARKET

  • 1. Drivers and Restraints
  • 2. Drivers Explained
  • 3. Drivers Explained (continued)
  • 4. Drivers Explained (continued)
  • 5. Drivers Explained (continued)
  • 6. Drivers Explained (continued)
  • 7. Restraints Explained
  • 8. Restraints Explained (continued)
  • 9. Restraints Explained (continued)
  • 10. Restraints Explained (continued)
  • 11. Restraints Explained (continued)

4. FORECASTS AND TRENDS-TOTAL MARKET

  • 1. Forecast Assumptions
  • 2. Revenue Forecast
  • 3. Revenue Forecast Discussion
  • 4. Percent Revenue Forecast by Geography
  • 5. Percent Revenue Forecast by Geography
  • 6. Percent Revenue Forecast by Size of Business
  • 7. Percent Revenue Forecast by Size of Business Discussion
  • 8. Percent Revenue Forecast by Distribution Channel
  • 9. Percent Revenue Forecast by Distribution Channel Discussion
  • 10. Percent Revenue Forecast by Vertical Market
  • 11. Vertical Market Revenue Forecast Discussion

5. MARKET SHARE AND COMPETITIVE ANALYSIS- TOTAL MARKET

  • 1. Competitive Analysis-Market Share
  • 2. Competitive Environment
  • 3. Competitive Analysis
  • 4. Competitive Landscape
  • 5. Competitive Analysis Discussion
  • 6. Competitive Analysis Discussion (continued)
  • 7. Competitive Analysis Discussion (continued)

6. THE LAST WORD

  • 1. Predictions
  • 2. Recommendations
  • 3. Legal Disclaimer

7. VENDOR PROFILES

  • 1. Vendor Profile: Blue Coat
  • 2. Vendor Profile: Blue Coat (continued)
  • 3. Vendor Profile: Check Point
  • 4. Vendor Profile: Check Point (continued)
  • 5. Vendor Profile: Cisco
  • 6. Vendor Profile: Cisco (continued)
  • 7. Vendor Profile: Cisco (continued)
  • 8. Vendor Profile: FireEye
  • 9. Vendor Profile: FireEye (continued)
  • 10. Vendor Profile: FireEye (continued)
  • 11. Vendor Profile: FireEye (continued)
  • 12. Vendor Profile: Fortinet
  • 13. Vendor Profile: Fortinet (continued)
  • 14. Vendor Profile: Intel Security (McAfee)
  • 15. Vendor Profile: Intel Security (McAfee) (continued)
  • 16. Vendor Profile: Lastline
  • 17. Vendor Profile: Lastline (continued)
  • 18. Vendor Profile: Palo Alto Networks
  • 19. Vendor Profile: Palo Alto Networks (continued)
  • 20. Vendor Profile: Trend Micro
  • 21. Vendor Profile: Trend Micro (continued)
  • 22. Vendor Profile: Websense
  • 23. Vendor Profile: Websense (continued)

8. APPENDIX

  • 1. Methodology
  • 2. Measurements
  • 3. Additional Sources of Information on Study Topic Area
  • 4. List of Companies Included in "Others"
  • 5. Partial List of Companies Interviewed
  • 6. Learn More-Next Steps
  • 7. List of Exhibits
Back to Top