Cover Image
市場調查報告書

網路安全鑑識的全球市場

Network Security Forensics Global Market

出版商 Frost & Sullivan 商品編碼 345532
出版日期 內容資訊 英文 195 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
網路安全鑑識的全球市場 Network Security Forensics Global Market
出版日期: 2015年09月16日 內容資訊: 英文 195 Pages
簡介

本報告提供全球及各個地區的網路安全鑑識市場相關的總括性調查、技術與費用趨勢、主要的市場成長的促進要素&阻礙要素分析、主要供應商簡介,及流通管道與垂直市場預測等相關資料,彙整。

第1章 摘要整理

第2章 市場概要

  • 市場概要
  • APT防禦中網路安全鑑識所扮演的角色
  • 網路安全鑑識的後防線
  • 安全偶發事件 vs. 違反
  • 定義
  • 非本調查對象的鑑識專題
  • 完整擷取封包的限制
  • 網路安全鑑識市場整體:各流通管道的收益比
  • 流通管道的討論

第3章 外部環境的相關課題:促進要素&阻礙要素 - 市場整體

  • 促進要素&阻礙要素
  • 促進要素的說明
  • 阻礙要素
  • 阻礙要素的說明

第4章 網路安全鑑識的起源:各技術類型

  • 網路安全鑑識的起源:各技術類型

第5章 預測、趨勢 - 市場整體

  • 預測的前提條件
  • 網路安全鑑識市場整體:出貨量、收益預測
  • 出貨量、收益預測的討論
  • 網路安全鑑識市場整體:費用趨勢、預測
  • 費用趨勢、預測的討論
  • 網路安全鑑識市場整體:出貨量預測,各地區
  • 網路安全鑑識市場整體:收益預測,各地區
  • 各地區的出貨量、收益預測的討論
  • 網路安全鑑識市場整體:出貨量預測,各產品類型
  • 網路安全鑑識市場整體:收益預測,各產品類型
  • 各產品類型的出貨量、收益預測的討論
  • 網路安全鑑識市場整體:出貨量預測,各垂直市場
  • 網路安全鑑識市場整體:收益預測,各垂直市場
  • 垂直市場出貨量、收益預測的討論

第6章 市場佔有率、競爭分析 - 市場整體

  • 競爭分析 - 市場佔有率
  • 競爭因素、評估
  • M&A
  • 競爭環境
  • 主要的競爭企業
  • 競爭差異化的要點

第7章 大企業市場區隔分析

  • 大企業網路安全鑑識市場區隔:市場工程檢測
  • 出貨量、收益預測
  • 費用趨勢、預測
  • 費用趨勢、預測的討論
  • 競爭分析:市場佔有率
  • 競爭環境

第8章 SMB (中小企業) ∼企業市場區隔分析

第9章 總論

第10章 供應商簡介

  • Blue Coat Systems, Inc.
  • FireEye
  • IBM
  • Lancope
  • LogRhythm
  • NetFort
  • NIKSUN
  • Novetta
  • PacketSled
  • RSA Security Analytics
  • Savvius
  • Viavi Solutions

第11章 附錄

目錄
Product Code: NF8B-01-00-00-00

How Much Forensics Do You Need?

When a security breach occurs, an investigation needs to be initiated. Network security forensics is the technology used not only to understand the nature of the breach, but also to trigger the beginning of remediation. Traditional network security platforms include event correlation and full packet capture. However, different security approaches include the collection of flow data and the use of packet headers to reduce storage requirements. This comprehensive report about network security forensics includes global & regional market analysis and forecasts for 2015-2019. Technology and pricing trends are detailed and key drivers and restraints identified. The key vendors are profiled and distribution channels and market verticals have been forecasted.

Table of Contents

1. EXECUTIVE SUMMARY

Executive Summary

  • 1. Key Findings
  • 2. Key Findings (continued)
  • 3. Executive Summary-Market Engineering Measurements
  • 4. Executive Summary-Market Engineering Measurements (continued)
  • 5. Executive Summary-CEO's Perspective
  • 6. Executive Summary-Introduction to the Research
  • 7. Executive Summary-Key Questions This Study Will Answer

2. MARKET OVERVIEW

Market Overview

  • 1. Market Overview
  • 2. Market Overview (continued)
  • 3. Network Security Forensics Role in APT Defense
  • 4. Market Overview-Network Security Forensics Post-Breach
  • 5. Market Overview-Security Incidents versus Breaches
  • 6. Market Overview-Security Incidents versus Breaches (continued)
  • 7. Market Overview-Definitions
  • 8. Market Overview-Forensics Topics not Covered in this Report
  • 9. Market Overview-Full Packet Capture Limitations
  • 10. Market Overview-Full Packet Capture Limitations (continued)
  • 11. Total Network Security Forensics Market-Percent Revenue by Distribution Channels
  • 12. Market Overview-Distribution Channels Discussion

3. EXTERNAL CHALLENGES: DRIVERS AND RESTRAINTS-TOTAL MARKET

External Challenges: Drivers and Restraints-Total Market

  • 1. Drivers and Restraints
  • 2. Drivers Explained
  • 3. Drivers Explained (continued)
  • 4. Drivers Explained (continued)
  • 5. Drivers Explained (continued)
  • 6. Drivers Explained (continued)
  • 7. Drivers Explained (continued)
  • 8. Drivers Explained (continued)
  • 9. Restraints Explained
  • 10. Restraints Explained (continued)
  • 11. Restraints Explained (continued)
  • 12. Restraints Explained (continued)

4. NETWORK SECURITY FORENSICS ORIGINS BY TECHNOLOGY TYPES

Network Security Forensics Origins by Technology Types

  • 1. Network Security Forensics Origins by Technology Types
  • 2. Network Security Forensics Origins by Technology Types (continued)
  • 3. Network Security Forensics Origins by Technology Types (continued)
  • 4. Network Security Forensics Origins by Technology Types (continued)
  • 5. Network Security Forensics Origins by Technology Types (continued)
  • 6. Network Security Forensics Origins by Technology Types (continued)
  • 7. Network Security Forensics Origins by Type of Technology (continued)
  • 8. Network Security Forensics Origins by Type of Technology (continued)

5. FORECASTS AND TRENDS-TOTAL MARKET

Forecasts and Trends-Total Market

  • 1. Forecast Assumptions
  • 2. Total Network Security Forensics Market-Unit and Revenue Forecast
  • 3. Unit Shipment and Revenue Forecast Discussion
  • 4. Total Network Security Forensics Market-Pricing Trends and Forecast
  • 5. Pricing Trends and Forecast Discussion
  • 6. Total Network Security Forensics Market-Unit Shipment Forecast by Region
  • 7. Total Network Security Forensics Market-Revenue Forecast by Region
  • 8. Regional Unit Shipment and Revenue Forecast Discussion
  • 9. Total Network Security Forensics Market-Unit Shipments Forecast by Product Type
  • 10. Total Network Security Forensics Market-Revenue Forecast by Product Type
  • 11. Product Type Unit Shipment and Revenue Forecast Discussion
  • 12. Product Type Unit Shipment and Revenue Forecast Discussion
  • 13. Product Type Unit Shipment and Revenue Forecast Discussion (continued)
  • 14. Product Type Unit Shipment and Revenue Forecast Discussion (continued)
  • 15. Total Network Security Forensics Market-Unit Shipments Forecast by Vertical Market
  • 16. Total Network Security Forensics Market-Revenue Forecast by Vertical Market
  • 17. Vertical Market Unit Shipment and Revenue Forecast Discussion

6. MARKET SHARE AND COMPETITIVE ANALYSIS- TOTAL MARKET

Market Share and Competitive Analysis- Total Market

  • 1. Competitive Analysis-Market Share
  • 2. Competitive Factors and Assessment
  • 3. Competitive Factors and Assessment
  • 4. Mergers and Acquisitions
  • 5. Competitive Environment
  • 6. Competitive Environment
  • 7. Top Competitors
  • 8. Points of Competitive Differentiation
  • 9. Points of Competitive Differentiation (continued)
  • 10. Points of Competitive Differentiation (continued)
  • 11. Points of Competitive Differentiation (continued)
  • 12. Points of Competitive Differentiation (continued)
  • 13. Points of Competitive Differentiation (continued)
  • 14. Points of Competitive Differentiation (continued)
  • 15. Points of Competitive Differentiation (continued)
  • 16. Points of Competitive Differentiation (continued)
  • 17. Points of Competitive Differentiation (continued)
  • 18. Points of Competitive Differentiation (continued)
  • 19. Points of Competitive Differentiation (continued)
  • 20. Points of Competitive Differentiation (continued)
  • 21. Points of Competitive Differentiation (continued)
  • 22. Points of Competitive Differentiation (continued)
  • 23. Points of Competitive Differentiation (continued)
  • 24. Points of Competitive Differentiation (continued)
  • 25. Points of Competitive Differentiation (continued)
  • 26. Points of Competitive Differentiation (continued)

7. LARGE ENTERPRISE SEGMENT BREAKDOWN

Large Enterprise Segment Breakdown

  • 1. Large Enterprise Network Security Forensics Segment-Market Engineering Measurements
  • 2. Large Enterprise Marketing Engineering Measurements (continued)
  • 3. Large Enterprise Network Security Forensics Unit Shipment and Revenue Forecast
  • 4. Large Enterprise Network Security Forensics Market-Pricing Trends and Forecast
  • 5. Large Enterprise Network Security Forensics Pricing Trends and Forecast Discussion
  • 6. Large Enterprise Network Security Forensics Competitive Analysis-Market Share
  • 7. Large Enterprise Network Security Forensics Segment-Competitive Environment
  • 8. Competitive Environment

8. SMB THRU ENTERPRISE SEGMENT BREAKDOWN

SMB thru Enterprise Segment Breakdown

  • 1. SMB thru Enterprise Network Security Forensics Segment-Market Engineering Measurements
  • 2. SMB thru Enterprise Marketing Engineering Measurements (continued)
  • 3. SMB thru Enterprise Network Security Forensics Unit Shipment and Revenue Forecast
  • 4. SMB thru Enterprise Network Security Forensics Market-Pricing Trends and Forecast
  • 5. SMB thru Enterprise Network Security Forensics Pricing Trends and Forecast Discussion
  • 6. SMB thru Enterprise Network Security Forensics Competitive Analysis-Market Share
  • 7. SMB Network Security Forensics Segment-Competitive Environment
  • 8. Competitive Environment

9. THE LAST WORD

The Last Word

  • 1. The Last Word-Predictions
  • 2. The Last Word-Recommendations
  • 3. Legal Disclaimer

10. VENDOR PROFILES

Vendor Profiles

  • 1. Vendor Profile: Blue Coat Systems, Inc.
  • 2. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 3. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 4. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 5. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 6. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 7. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 8. Vendor Profile: FireEye
  • 9. Vendor Profile: FireEye (continued)
  • 10. Vendor Profile: FireEye (continued)
  • 11. Vendor Profile: FireEye (continued)
  • 12. Vendor Profile: FireEye (continued)
  • 13. Vendor Profile: IBM
  • 14. Vendor Profile: IBM (continued)
  • 15. Vendor Profile: IBM (continued)
  • 16. Vendor Profile: IBM (continued)
  • 17. Vendor Profile: IBM (continued)
  • 18. Vendor Profile: Lancope
  • 19. Vendor Profile: Lancope (continued)
  • 20. Vendor Profile: Lancope (continued)
  • 21. Vendor Profile: Lancope (continued)
  • 22. Vendor Profile: Lancope (continued)
  • 23. Vendor Profile: LogRhythm
  • 24. Vendor Profile: LogRhythm (continued)
  • 25. Vendor Profile: LogRhythm (continued)
  • 26. Vendor Profile: LogRhythm (continued)
  • 27. Vendor Profile: NetFort
  • 28. Vendor Profile: NetFort (continued)
  • 29. Vendor Profile: NetFort (continued)
  • 30. Vendor Profile: NetFort (continued)
  • 31. Vendor Profile: NetFort (continued)
  • 32. Vendor Profile: NetFort (continued)
  • 33. Vendor Profile: NIKSUN
  • 34. Vendor Profile: NIKSUN (continued)
  • 35. Vendor Profile: NIKSUN (continued)
  • 36. Vendor Profile: NIKSUN (continued)
  • 37. Vendor Profile: NIKSUN (continued)
  • 38. Vendor Profile: NIKSUN (continued)
  • 39. Vendor Profile: Novetta
  • 40. Vendor Profile: Novetta (continued)
  • 41. Vendor Profile: Novetta (continued)
  • 42. Vendor Profile: Novetta (continued)
  • 43. Vendor Profile: Novetta (continued)
  • 44. Vendor Profile: Novetta (continued)
  • 45. Vendor Profile: Novetta (continued)
  • 46. Vendor Profile: PacketSled
  • 47. Vendor Profile: PacketSled (continued)
  • 48. Vendor Profile: PacketSled
  • 49. Vendor Profile: PacketSled - Screenshot (Interactive Dashboard)
  • 50. Vendor Profile: PacketSled - Screenshot (Investigator)
  • 51. Vendor Profile: PacketSled (continued)
  • 52. Vendor Profile: PacketSled (continued)
  • 53. Vendor Profile: PacketSled (continued)
  • 54. Vendor Profile: RSA Security Analytics
  • 55. Vendor Profile: RSA Security Analytics (continued)
  • 56. Vendor Profile: RSA Security Analytics (continued)
  • 57. Vendor Profile: RSA Security Analytics (continued)
  • 58. Vendor Profile: RSA Security Analytics (continued)
  • 59. Vendor Profile: Savvius
  • 60. Vendor Profile: Savvius (continued)
  • 61. Vendor Profile: Savvius (continued)
  • 62. Vendor Profile: Savvius (continued)
  • 63. Vendor Profile: Viavi Solutions
  • 64. Vendor Profile: Viavi Solutions (continued)
  • 65. Vendor Profile: Viavi Solutions (continued)
  • 66. Vendor Profile: Viavi Solutions (continued)
  • 67. Vendor Profile: Viavi Solutions (continued)
  • 68. Vendor Profile: Viavi Solutions (continued)

11. APPENDIX

Appendix

  • 1. Methodology
  • 2. Measurements
  • 3. Measurements (continued)
  • 4. Measurements (continued)
  • 5. Additional Sources of Information on Study Topic Area
  • 6. Partial List of Companies Interviewed
  • 7. List of Companies Included in “Others”
  • 8. Learn More-Next Steps
Back to Top