Cover Image
市場調查報告書

北美的管理、安全服務市場

Managed Security Services in North America

出版商 Frost & Sullivan 商品編碼 341252
出版日期 內容資訊 英文 164 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
北美的管理、安全服務市場 Managed Security Services in North America
出版日期: 2015年09月30日 內容資訊: 英文 164 Pages
簡介

本報告提供北美的管理、安全服務市場相關資料,以2013年為基準年的過去3年的市場規模轉變分析以及今後5年的市場預測說明,以及主要企業的市場佔有率、市場現狀及趨勢,以及推動市場成長要素及阻礙因素的詳細分析與預測。

第1章 摘要整理near拳擊場指標

第2章 市場概要

  • 摘要整理 - 該調查相關序論
  • 摘要整理 - 該調查闡明的項目
  • 市場概要
  • 市場概要 - 定義
  • 管理、安全服務企業的提供服務
  • 市場概要 - 定義
  • 市場定義
  • 市場概要 - 定義
  • 為市場概要 - 產業工作的力量
  • 市場概要 - 服務市場生命週期分析
  • 市場概要 - 服務技術藍圖
  • 市場概要 - 流通管道
  • 市場概要 - 流通管道討論

第3章 市場趨勢還有技術趨勢

  • 管理、安全服務全市場 - 市場趨勢還有技術趨勢
  • 管理、安全服務全市場 - 技術合作夥伴分析

第4章 外部的課題:推動市場成長要素及阻礙因素 - 管理、安全服務全市場

  • 推動市場成長要素及阻礙因素
  • 推動市場成長要素說明
  • 阻礙市場成長要素說明

第5章 市場預測及未來趨勢 - 管理、安全服務全市場

  • 市場預測前提條件
  • 管理、安全服務全市場 - 收益額預測
  • 管理、安全服務全市場 - 預測討論
  • 管理、安全服務全市場 - 價格分析
  • 價格趨勢討論
  • 管理、安全服務全市場 - 各商品領域收益額預測
  • 管理、安全服務全市場 - 各商品領域(CPE及託管)預測收益額明細
  • 管理、安全服務全市場 - 各類型產品預測收益額明細
  • 管理、安全服務全市場 - 各類型產品收益額預測討論
  • 管理、安全服務全市場 - 各商務規模的預測收益額明細
  • 管理、安全服務全市場 - 各垂直市場中的預測收益額明細
  • 管理、安全服務全市場 - 垂直市場分析
  • 管理、安全服務全市場 - 各流通管道的預測收益額明細
  • 管理、安全服務全市場 - 供應商的各類型的預測收益額明細
  • 管理、安全服務全市場 - 各供應商類型及安全服務的預測收益額明細

第6章 市場佔有率及競爭力分析 - 管理、安全服務全市場

  • 競爭力分析 - 市場佔有率相關的前提條件
  • 競爭力分析 - 市場佔有率
  • 市場競爭環境
  • 競爭力因素及評估

第7章 結論

  • 結論 - 未來預測
  • 結論 - 建議
  • 免責事項

第8章 主要供應商簡介

第9章 附錄

目錄
Product Code: NFA8-01-00-00-00

Attention Moves from the Perimeter to the Endpoint and the Network

This report provides an analysis of the market for the North American managed security services market. These network security services include some degree of proactive monitoring of the customer's security environment, and may encompass protection against denial of service attacks, email viruses/worms, spam, and other various cyber maladies. This report includes three years of historical market sizing including base year 2013 and five years of market forecast; market shares for the market participants; market description and market trends; and drivers and restraints. Segments of the market to be analyzed include product type, customer type, distribution channel and industry vertical.

Table of Contents

1. EXECUTIVE SUMMARY

Executive Summary

  • 1. Executive Summary
  • 2. Executive Summary-Market Engineering Measurements
  • 3. Executive Summary-CEO's Perspective

2. MARKET OVERVIEW

Market Overview

  • 1. Executive Summary-Introduction to the Research
  • 2. Executive Summary-Key Questions This Study Will Answer
  • 3. Market Overview
  • 4. Market Overview (continued)
  • 5. Market Overview-Definitions (continued)
  • 6. Market Overview-Definitions (continued)
  • 7. Managed Security Service Provider Offerings
  • 8. Market Overview-Definitions (continued)
  • 9. Market Overview-Definitions (continued)
  • 10. Market Definitions (continued)
  • 11. Market Overview-Definitions (continued)
  • 12. Market Overview-Forces at Work
  • 13. Market Overview-Service Market Life Cycle Analysis
  • 14. Market Overview-Service Technology Road Map
  • 15. Market Overview-Distribution Channels
  • 16. Market Overview-Distribution Channel Discussion

3. MARKET AND TECHNOLOGY TRENDS

Market and Technology Trends

  • 1. Total Managed Security Services Market-Market & Technology Trends
  • 2. Total Managed Security Services Market-Market & Technology Trends
  • 3. Total Managed Security Services Market-Market & Technology Trends
  • 4. Total Managed Security Services Market-Market & Technology Trends (continued)
  • 5. Total Managed Security Services Market-Market & Technology Trends (continued)
  • 6. Total Managed Security Services Market-Market & Technology Trends (continued)
  • 7. Total Managed Security Services Market-Market & Technology Trends (continued)
  • 8. Total Managed Security Services Market-Market & Technology Trends (continued)
  • 9. Total Managed Security Services Market-Technology Partner Analysis

4. EXTERNAL CHALLENGES: DRIVERS AND RESTRAINTS-TOTAL MANAGED SECURITY SERVICES MARKET

External Challenges: Drivers and Restraints-Total Managed Security Services Market

  • 1. Drivers and Restraints
  • 2. Drivers Explained
  • 3. Drivers Explained (continued)
  • 4. Drivers Explained (continued)
  • 5. Drivers Explained (continued)
  • 6. Drivers Explained (continued)
  • 7. Drivers Explained (continued)
  • 8. Restraints Explained
  • 9. Restraints Explained (continued)
  • 10. Restraints Explained (continued)

5. FORECASTS AND TRENDS-TOTAL MANAGED SECURITY SERVICES MARKET

Forecasts and Trends-Total Managed Security Services Market

  • 1. Forecast Assumptions
  • 2. Total Managed Security Services Market-Revenue Forecast
  • 3. Total Managed Security Services Market-Forecast Discussion
  • 4. Total Managed Security Services Market-Pricing Analysis
  • 5. Pricing Trends Discussion
  • 6. Pricing Trends Discussion (Continued)
  • 7. Total Managed Security Services Market-Revenue Forecast by Product Segment
  • 8. Total Managed Security Services Market-Percent Revenue Forecast by Product Segment (CPE & Hosted)
  • 9. Total Managed Security Services Market-Percent Revenue Forecast by Product Type
  • 10. Total Managed Security Services Market-Revenue Forecast by Product Type Discussion
  • 11. Total Managed Security Services Market-Percent Revenue Forecast by Size of Business
  • 12. Total Managed Security Services Market-Percent Revenue Forecast by Business Size Discussion
  • 13. Total Managed Security Services Market-Percent Revenue Forecast by Business Size Discussion (continued)
  • 14. Total Managed Security Services Market-Percent Revenue Forecast by Vertical Market
  • 15. Total Managed Security Services Market-Percent Revenue Forecast by Vertical Market Discussion
  • 16. Total Managed Security Services Market-Vertical Market Analysis
  • 17. Total Managed Security Services Market-Percent Revenue Forecast by Distribution Channel
  • 18. Total Managed Security Services Market-Percent Revenue Forecast by Distribution Channel Discussion
  • 19. Total Managed Security Services Market-Percent Revenue Forecast by Provider Type
  • 20. Total Managed Security Services Market-Percent Revenue Forecast by Provider Type Discussion
  • 21. Total Managed Security Services Market-Percent Revenue Forecast by Provider Type and Security Service
  • 22. Total Managed Security Services Market-Percent Revenue Forecast by Provider Type and Security Service

6. MARKET SHARE AND COMPETITIVE ANALYSIS-TOTAL MANAGED SECURITY SERVICES MARKET

Market Share and Competitive Analysis-Total Managed Security Services Market

  • 1. Competitive Analysis-Market Share Assumptions
  • 2. Competitive Analysis-Market Share
  • 3. Competitive Analysis-Market Share (continued)
  • 4. Competitive Environment
  • 5. Competitive Factors and Assessment

7. THE LAST WORD

The Last Word

  • 1. The Last Word-Predictions
  • 2. The Last Word-Recommendations
  • 3. Legal Disclaimer

8. VENDOR PROFILES

Vendor Profiles

  • 1. Vendor Profile: Above Security
  • 2. Vendor Profile: Above Security (continued)
  • 3. Vendor Profile: Alert Logic
  • 4. Vendor Profile: Alert Logic (continued)
  • 5. Vendor Profile: AT&T
  • 6. Vendor Profile: AT&T (continued)
  • 7. Vendor Profile: BAE Systems (SilverSky)
  • 8. Vendor Profile: BAE Systems (SilverSky) (continued)
  • 9. Vendor Profile: Booz, Allen, Hamilton
  • 10. Vendor Profile: Booz, Allen, Hamilton (continued)
  • 11. Vendor Profile: British Telecom
  • 12. Vendor Profile: British Telecom (continued)
  • 13. Vendor Profile: British Telecom (continued)
  • 14. Vendor Profile: CenturyLink
  • 15. Vendor Profile: CenturyLink
  • 16. Vendor Profile: CenturyLink (continued)
  • 17. Vendor Profile: CenturyLink (continued)
  • 18. Vendor Profile: Cisco
  • 19. Vendor Profile: Cisco (continued)
  • 20. Vendor Profile: Cisco (continued)
  • 21. Vendor Profile: Cisco (continued)
  • 22. Vendor Profile: CompuCom
  • 23. Vendor Profile: CSC
  • 24. Vendor Profile: CSC (continued)
  • 25. Vendor Profile: DATASHIELD
  • 26. Vendor Profile: DATASHIELD (continued)
  • 27. Vendor Profile: Dell
  • 28. Vendor Profile: Dell (continued)
  • 29. Vendor Profile: Dell (continued)
  • 30. Vendor Profile: Digital Hands
  • 31. Vendor Profile: Digital Shadows
  • 32. Vendor Profile: Dimension Data
  • 33. Vendor Profile: Dimension Data (continued)
  • 34. Vendor Profile: Earthlink
  • 35. Vendor Profile: eSentire
  • 36. Vendor Profile: Foreground Security
  • 37. Vendor Profile: Hewlett-Packard Enterprise
  • 38. Vendor Profile: Hewlett-Packard Enterprise (continued)
  • 39. Vendor Profile: Hewlett-Packard Enterprise (continued)
  • 40. Vendor Profile: IBM
  • 41. Vendor Profile: IBM (continued)
  • 42. Vendor Profile: IBM (continued)
  • 43. Vendor Profile: IBM (continued)
  • 44. Vendor Profile: Level 3
  • 45. Vendor Profile: Level 3 (continued)
  • 46. Vendor Profile: Leidos
  • 47. Vendor Profile: Lumen21
  • 48. Vendor Profile: Masergy
  • 49. Vendor Profile: Masergy (continued)
  • 50. Vendor Profile: Megapath (Now GTT)
  • 51. Vendor Profile: Mosaic451
  • 52. Vendor Profile: Mosaic451 (continued)
  • 53. Vendor Profile: Network Box
  • 54. Vendor Profile: Nuspire
  • 55. Vendor Profile: Optiv Security
  • 56. Vendor Profile: Optiv Security (continued)
  • 57. Vendor Profile: QTS
  • 58. Vendor Profile: Rook Security
  • 59. Vendor Profile: Savanture
  • 60. Vendor Profile: Savanture (continued)
  • 61. Vendor Profile: Secure Designs
  • 62. Vendor Profile: Solutionary
  • 63. Vendor Profile: Sprint
  • 64. Vendor Profile: Sprint (continued)
  • 65. Vendor Profile: Symantec
  • 66. Vendor Profile: Symantec (continued)
  • 67. Vendor Profile: Symantec (continued)
  • 68. Vendor Profile: TELUS
  • 69. Vendor Profile: Telus (continued)
  • 70. Vendor Profile: Trustwave
  • 71. Vendor Profile: Trustwave (continued)
  • 72. Vendor Profile: Trustwave (continued)
  • 73. Vendor Profile: Unisys
  • 74. Vendor Profile: Unisys (continued)
  • 75. Vendor Profile: Verizon
  • 76. Vendor Profile: Verizon (continued)
  • 77. Vendor Profile: Verizon (continued)
  • 78. Vendor Profile: Windstream

9. APPENDIX

Appendix

  • 1. Methodology
  • 2. Measurements
  • 3. Additional Sources of Information on Study Topic Area
  • 4. Partial List of Companies Interviewed
  • 5. List of Companies Included in “Others”
  • 6. Learn More-Next Steps
Back to Top