Cover Image
市場調查報告書

先進惡意程式沙箱市場分析

Advanced Malware Sandbox Market Analysis

出版商 Frost & Sullivan 商品編碼 371838
出版日期 內容資訊 英文 198 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
先進惡意程式沙箱市場分析 Advanced Malware Sandbox Market Analysis
出版日期: 2016年09月06日 內容資訊: 英文 198 Pages
簡介

先進惡意程式沙箱市場,近幾年急劇擴大。今後幾年,將面臨大量課題。

本報告提供先進惡意程式沙箱市場相關調查分析,市場概要,推動因素、阻礙因素,預測與趨勢,市場佔有率和競爭分析等系統性資訊。

第1章 摘要整理

第2章 市場定義

第3章 市場概要

  • 市場概要
  • 解決方案的主要特徵
  • 防禦先進威脅
  • APT的先進惡意程式
  • 預備APT攻擊的先進惡意程式
  • 客戶的顧慮事項

第4章 推動因素、阻礙因素:綜合市場

  • 推動因素
  • 阻礙因素

第5章 預測與趨勢:綜合市場

  • 預測的前提條件
  • 收益預測
  • 收益、出貨數量預測
  • 價格預測
  • 價格預測:各市場區隔
  • 收益佔有率預測:各市場區隔
  • 收益佔有率預測:各地區
  • 收益預測:各地區等

第6章 市場佔有率和競爭分析:綜合市場

  • 競爭環境
  • 競爭情形手法
  • 競爭分析

第7章 家電市場分析

第8章 軟體市場分析

第9章 雲端市場分析

第10章 彙整

第11章 業者簡介

  • 業者簡介:Blue Coat
  • 業者簡介:Check Point
  • 業者簡介:Cisco
  • 業者簡介:Cyphort
  • 業者簡介:Dell SonicWALL
  • 業者簡介:FireEye
  • 業者簡介:Forcepoint
  • 業者簡介:Fortinet
  • 業者簡介:Intel Security
  • 業者簡介:Juniper Networks
  • 業者簡介:Lastline
  • 業者簡介:Palo Alto Networks
  • 業者簡介:Trend Micro
  • 業者簡介:Zscaler

第12章 彙整

目錄
Product Code: K083-01

“Must Have” Security Technology Reaches Mass Adoption

Malware has evolved to evade traditional security tools that rely on simple signature-matching for detection. Many of the largest companies in the world have been breached by advanced malware and the problem is only becoming more widespread. In response, sandbox analysis technologies have proven to be a more reliable and accurate approach to detect and block new and advanced (elusive and evasive) malware. As a result, the advanced malware sandbox market has grown precipitously in recent years. While demand for the new technology remains sky high, the market faces a number of challenges in coming years.

Table of Contents

1. Executive Summary

  • Key Findings
  • Market Engineering Measurements
  • CEO's Perspective
  • Introduction to the Research
  • Key Questions This Study Will Answer

2. Market Definitions

  • Advanced Malware Sandbox-Market Definitions
  • Advanced Malware Sandbox-Market Definitions (continued)
  • Advanced Malware Sandbox-Market Definitions (continued)
  • Advanced Malware Sandbox-Market Definitions (continued)

3. Market Overview

  • Advanced Malware Sandbox-Market Overview
  • Advanced Malware Sandbox-Market Overview (continued)
  • Advanced Malware Sandbox-Market Overview (continued)
  • Advanced Malware Sandbox-Market Overview (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Key Characteristics of an Advanced Malware Sandbox Solution (continued)
  • Advanced Malware Sandbox in the Context of Advanced Threat Protection
  • Advanced Malware in the Context of Advanced Persistent Threats
  • Advanced Malware in the Context of Advanced Persistent Threats (continued)
  • Advanced Malware in the Context of Advanced Persistent Threats (continued)
  • Advanced Malware in the Context of Advanced Persistent Threats (continued)
  • Advanced Malware in the Context of Advanced Persistent Threats (continued)
  • Advanced Malware in the Context of Advanced Persistent Threats (continued)
  • Focus on Advanced Malware to Defend Against Advanced Persistent Threats
  • Focus on Advanced Malware to Defend Against Advanced Persistent Threats (continued)
  • Customer Considerations
  • Customer Considerations (continued)

4. Drivers and Restraints-Total Market

  • Drivers and Restraints
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Restraints Explained
  • Restraints Explained (continued)
  • Restraints Explained (continued)
  • Restraints Explained (continued)

5. Forecasts and Trends-Total Market

  • Forecast Assumptions
  • Revenue Forecast
  • Revenue and Units Forecast
  • Revenue and Units Forecast Discussion
  • Pricing Forecast
  • Pricing Forecast by Segment
  • Pricing Forecast Discussion
  • Percent Revenue Forecast by Segment
  • Percent Revenue Forecast by Segment Discussion
  • Percent Revenue Forecast by Segment Discussion (continued)
  • Percent Revenue Forecast by Region
  • Revenue Forecast by Region
  • Percent Revenue Forecast by Region Discussion
  • Percent Revenue Forecast by Size of Business
  • Revenue Forecast by Size of Business
  • Percent Revenue Forecast by Size of Business Discussion
  • Percent Revenue Forecast by Size of Business Discussion (continued)
  • Percent Revenue Forecast by Vertical
  • Revenue Forecast by Vertical
  • Vertical Market Revenue Forecast Discussion
  • Percent Revenue Forecast by Distribution Channel
  • Revenue Forecast by Distribution Channel
  • Percent Revenue Forecast by Distribution Channel Discussion

6. Market Share and Competitive Analysis- Total Market

  • Competitive Environment
  • Competitive Landscape
  • Competitive Landscape Methodology
  • Competitive Analysis-Market Share
  • Competitive Analysis-Market Share (continued)
  • Competitive Analysis-Solution Capabilities Methodology
  • Competitive Analysis-Solution Capabilities
  • Competitive Analysis-Solution Capabilities Competitive Factors
  • Competitive Analysis-Solution Capabilities Competitive Factors Explained
  • Competitive Analysis-Solution Capabilities Competitive Factors Explained (continued)
  • Competitive Analysis-Solution Capabilities Competitive Factors Explained (continued)
  • Competitive Analysis-Solution Capabilities Competitive Factors Explained (continued)

7. Appliance Market Segment Breakdown

  • Appliance Market Segment-Revenue and Units Forecast Discussion
  • Appliance Market Segment-Revenue and Units Forecast
  • Appliance Market Segment-Revenue and Units Forecast Discussion
  • Appliance Market Segment-Pricing
  • Appliance Market Segment-Pricing Discussion
  • Appliance Market Segment-Percent Revenue Forecast by Size of Business
  • Appliance Market Segment-Percent Revenue Forecast by Size of Business Discussion
  • Appliance Market Segment-Competitive Environment
  • Appliance Market Segment-Market Share

8. Software Market Segment Breakdown

  • Software Market Segment-Revenue and Units Forecast Discussion
  • Software Market Segment-Revenue and Units Forecast
  • Software Market Segment-Revenue and Units Forecast Discussion
  • Software Market Segment-Pricing
  • Software Market Segment-Pricing Discussion
  • Software Market Segment-Percent Revenue Forecast by Size of Business
  • Software Market Segment-Percent Revenue Forecast by Size of Business Discussion
  • Software Market Segment-Competitive Environment
  • Software Market Segment-Market Share

9. Cloud Market Segment Breakdown

  • Cloud Market Segment-Revenue and Units Forecast Discussion
  • Cloud Market Segment-Revenue and Units Forecast
  • Cloud Market Segment-Revenue and Units Forecast Discussion
  • Cloud Market Segment-Pricing
  • Cloud Market Segment-Pricing Discussion
  • Cloud Market Segment-Percent Revenue Forecast by Size of Business
  • Cloud Market Segment-Percent Revenue Forecast by Size of Business Discussion
  • Cloud Market Segment-Competitive Environment
  • Cloud Market Segment-Market Share

10. The Last Word

  • Predictions
  • Recommendations
  • Legal Disclaimer

11. Vendor Profiles

  • Vendor Profile: Blue Coat
  • Vendor Profile: Blue Coat (continued)
  • Vendor Profile: Blue Coat (continued)
  • Vendor Profile: Blue Coat (continued)
  • Vendor Profile: Blue Coat (continued)
  • Vendor Profile: Blue Coat (continued)
  • Vendor Profile: Check Point
  • Vendor Profile: Check Point (continued)
  • Vendor Profile: Check Point (continued)
  • Vendor Profile: Check Point (continued)
  • Vendor Profile: Check Point (continued)
  • Vendor Profile: Cisco
  • Vendor Profile: Cisco (continued)
  • Vendor Profile: Cisco (continued)
  • Vendor Profile: Cisco (continued)
  • Vendor Profile: Cisco (continued)
  • Vendor Profile: Cyphort
  • Vendor Profile: Cyphort (continued)
  • Vendor Profile: Cyphort (continued)
  • Vendor Profile: Cyphort (continued)
  • Vendor Profile: Dell SonicWALL
  • Vendor Profile: Dell SonicWALL (continued)
  • Vendor Profile: Dell SonicWALL (continued)
  • Vendor Profile: Dell SonicWALL (continued)
  • Vendor Profile: FireEye
  • Vendor Profile: FireEye (continued)
  • Vendor Profile: FireEye (continued)
  • Vendor Profile: FireEye (continued)
  • Vendor Profile: FireEye (continued)
  • Vendor Profile: FireEye (continued)
  • Vendor Profile: FireEye (continued)
  • Vendor Profile: Forcepoint
  • Vendor Profile: Forcepoint (continued)
  • Vendor Profile: Forcepoint (continued)
  • Vendor Profile: Fortinet
  • Vendor Profile: Fortinet (continued)
  • Vendor Profile: Fortinet (continued)
  • Vendor Profile: Fortinet (continued)
  • Vendor Profile: Fortinet (continued)
  • Vendor Profile: Intel Security
  • Vendor Profile: Intel Security (continued)
  • Vendor Profile: Intel Security (continued)
  • Vendor Profile: Intel Security (continued)
  • Vendor Profile: Juniper Networks
  • Vendor Profile: Juniper Networks (continued)
  • Vendor Profile: Juniper Networks (continued)
  • Vendor Profile: Juniper Networks (continued)
  • Vendor Profile: Lastline
  • Vendor Profile: Lastline (continued)
  • Vendor Profile: Lastline (continued)
  • Vendor Profile: Lastline (continued)
  • Vendor Profile: Lastline (continued)
  • Vendor Profile: Palo Alto Networks
  • Vendor Profile: Palo Alto Networks (continued)
  • Vendor Profile: Palo Alto Networks (continued)
  • Vendor Profile: Trend Micro
  • Vendor Profile: Trend Micro (continued)
  • Vendor Profile: Trend Micro (continued)
  • Vendor Profile: Trend Micro (continued)
  • Vendor Profile: Zscaler
  • Vendor Profile: Zscaler (continued)
  • Vendor Profile: Zscaler (continued)
  • Vendor Profile: Zscaler (continued)

12. Appendix

  • Market Engineering Methodology
  • Market Engineering Measurements
  • Additional Sources of Information on Study Topic Area
  • List of Companies Included in “Others”
  • Partial List of Companies Interviewed
  • Learn More-Next Steps
  • List of Exhibits
  • List of Exhibits (continued)
  • List of Exhibits (continued)
Back to Top