Cover Image
市場調查報告書

漏洞管理(VM)的全球市場分析

Vulnerability Management (VM) - Global Market Analysis

出版商 Frost & Sullivan 商品編碼 422300
出版日期 內容資訊 英文 236 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
漏洞管理(VM)的全球市場分析 Vulnerability Management (VM) - Global Market Analysis
出版日期: 2017年01月11日 內容資訊: 英文 236 Pages
簡介

漏洞評估(VA)是實行對試驗指標的既知漏洞的腳本,漏洞管理(VM)是在掃描後找到的事項進行正式報告與優先排序的東西。2016年,VM供應商在許可證、設備、其他服務獲得7683億美元的收益,與前一年同期比較成長13.4%。

本報告提供VM市場概要和課題,收益預測,出貨數,關於價格趨勢、市場整體及各企業規模分析。

第1章 摘要整理

  • 主要調查結果
  • 摘要整理 - 指標分析
  • 指標分析
  • 摘要整理 - 簡介
  • 摘要整理CEO的觀點
  • 摘要整理 - 本報告明白的事

第2章 市場概要

  • 市場概要
  • 銷路
  • 銷路相關討論

第3章 市場概要 - 漏洞管理的演進

  • 關於VM的演進
  • VM的4x4矩陣
  • VM的展望的歷史觀點(2010年)
  • VM的展望的歷史觀點(2013年)
  • VM的展望的目前觀點(2016年)
  • VM的展望的未來的觀點(2019年)

第4章 市場概要 - 漏洞管理的演進的總覽

  • 網路環境的4x4矩陣
  • VA掃描的4x4矩陣的觀點的試驗指標/終端
  • 產品引進的VM的4x4矩陣的觀點
  • 收益的VM的4x4矩陣的觀點
  • 漏洞管理的演進的總覽

第5章 外部的課題:促進要素與抑制因素 - 市場全體

  • 促進要素與抑制因素
  • 促進要素
  • 抑制因素

第6章 預測與趨勢 - 市場全體

  • 市場預測的前提條件
  • VM市場整體 - 收益預測
  • VM的全收益預測與出貨數
  • VM市場整體 - 價格趨勢與預測
  • 收益預測與出貨數
  • VM市場整體 - 各地區收益預測
  • VM市場整體 - 各地區出貨數預測
  • VM市場整體 - 各地區平均銷售價格
  • 地區的收益預測與出貨數相關討論
  • VM市場整體 - 各產品類型收益預測
  • VM市場整體 - 各產品類型出貨數預測
  • VM市場整體 - 各產品類型平均銷售價格
  • 各產品類型的收益預測與出貨數
  • VM市場整體 - 各產業收益預測
  • VM市場整體 - 各產業出貨數預測
  • VM市場整體 - 各產業武器銷售價格
  • 各產業出貨數和收益預測相關討論
  • VM市場整體 - 各企業規模收益預測
  • VM市場整體 - 各企業規模出貨數預測
  • VM市場整體 - 各企業規模平均銷售價格
  • 各企業規模的收益預測與出貨數相關討論

第7章 市場佔有率和競爭分析 - 市場全體

  • 競爭分析 - 市場佔有率
  • 競爭因素與評估
  • 競爭環境

第8章 競爭差異化的要點

第9章 各企業規模市場分類 - 巨大企業層的明細(試驗指標10,000以上)

  • 巨大企業的VM市場區隔 - 市場指標分析
  • 巨大企業市場市場指標分析
  • 巨大企業的VM收益預測與出貨數
  • 巨大企業的VM市場 - 價格趨勢與預測
  • 巨大企業的價格趨勢與預測的相關討論
  • 巨大企業的競爭環境

第10章 大企業層的明細(試驗指標2,500∼9,999)

  • 大企業的VM市場區隔 - 市場指標分析
  • 大企業市場市場指標分析
  • 大企業的VM收益預測與出貨數
  • 大企業的VM市場 - 價格趨勢與預測
  • 大企業的價格趨勢與預測的相關討論
  • 大企業的競爭環境

第11章 中規模企業層的明細(試驗指標1,000∼2,444)

  • 中規模企業的VM市場區隔 - 市場指標分析
  • 中規模企業市場市場指標分析
  • 中規模企業的VM收益預測與出貨數
  • 中規模企業的VM市場 - 價格趨勢與預測
  • 中規模企業的價格趨勢與預測的相關討論
  • 中規模企業的競爭環境

第12章 小規模/ROBO企業層的明細(試驗指標1∼999)

  • 小規模/ROBO企業的VM市場區隔 - 市場指標分析
  • 小規模/ROBO企業市場市場指標分析
  • 小規模/ROBO企業的VM收益預測與出貨數
  • 小規模/ROBO企業的VM市場 - 價格趨勢與預測
  • 小規模/ROBO企業的價格趨勢與預測的相關討論
  • 小規模/ROBO企業的競爭環境

第13章 結論

  • 預測
  • 建議
  • 法律上的免責聲明

第14章 供應商簡介

  • AlienVault
  • Beyond Security
  • BeyondTrust
  • Digital Defense, Inc.
  • Flexera Software(舊Secunia)
  • Outpost24
  • Promisec
  • Qualys
  • Rapid7
  • Tenable Network Security
  • Tripwire

第15章 附屬資料

目錄
Product Code: K109-74

Adding Actionable Intelligence to Network Scan Technology

A vulnerability assessment (VA) runs a script of known vulnerabilities against an endpoint. Vulnerability management (VM) is the formal reporting and prioritization of what is found after the scan. In 2016, VM vendors achieved $768.3 million in licenses, appliances, and related services; representing an improvement of 13.4% over 2015. VM vendors are challenged because VM scanning/reporting is a static technology, and network defenses require a combination of static and dynamic tools. Additionally, several adjacent network security technologies such as SIEM, NAC, and endpoint detection and response (EDR) also make use of behavioral analytics and machine listening technologies. However, VM has always been designed to protect the enterprise network surface. The enterprise network surface is expanding to include cloud, mobile, and Internet of Things (IoT). As much as any other network security technology, VM vendors are in a prime position to provide detection and protection products for the heterogeneous network.

A vulnerability assessment (VA) runs a script of known vulnerabilities against an endpoint. Vulnerability management (VM) is the formal reporting and prioritization of what is found after the scan. In 2016, VM vendors achieved $768.3 million in licenses, appliances, and related services; representing an improvement of 13.4% over 2015. VM vendors are challenged because VM scanning/reporting is a static technology, and network defenses require a combination of static and dynamic tools. Additionally, several adjacent network security technologies such as SIEM, NAC, and endpoint detection and response (EDR) also make use of behavioral analytics and machine listening technologies. However, VM has always been designed to protect the enterprise network surface. The enterprise network surface is expanding to include cloud, mobile, and Internet of Things (IoT). As much as any other network security technology, VM vendors are in a prime position to provide detection and protection products for the heterogeneous network.

Table of Contents

1. Executive Summary

  • Key Findings
  • Key Findings (continued)
  • Executive Summary-Market Engineering Measurements
  • Executive Summary-Market Engineering Measurements (continued)
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • Executive Summary-Introduction to the Research
  • Executive Summary-CEO's Perspective
  • Executive Summary-Key Questions This Study Will Answer

2. Market Overview

  • Market Overview
  • Market Overview (continued)
  • Market Overview (continued)
  • Market Overview-Distribution Channels
  • Market Overview-Distribution Channel Discussion

3. Market Overview-Evolution of Vulnerability Management

  • Market Overview-About the Evolution of VM
  • Market Overview-Introducing the 4 x 4 VM Matrices
  • Market Overview-Introducing the 4 x 4 VM Matrices (continued)
  • Market Overview-Historical View of VM Landscape 2010
  • Market Overview-Historical View of VM Landscape 2010 Explained
  • Market Overview-Historical View of VM Landscape 2013
  • Market Overview-Historical View of VM Landscape 2013 Explained
  • Market Overview-Current View of VM Landscape 2016
  • Market Overview-Historical View of VM Landscape 2016 Explained
  • Market Overview-Forecast View of VM Landscape 2019
  • Market Overview-Historical View of VM Landscape 2019 Explained

4. Market Overview-Roll-up Tables for the Evolution of Vulnerability Management

  • Market Overview-Roll-up Tables for the Evolution of Vulnerability Management
  • Market Overview-Network Environment 4 x 4 VM Metric View
  • Market Overview-Network Environment Matrix Explained
  • Market Overview-Endpoints/Devices in VA Scans 4 x 4 VM Metric View
  • Market Overview-Endpoints/Devices in VA Scans Explained
  • Market Overview-Product Deployment 4 x 4 VM Metric View
  • Market Overview-Product Deployment Explained
  • Market Overview-Revenues 4 x 4 VM Metric View
  • Market Overview-Revenues Explained
  • Market Overview-Revenues Explained (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)

5. External Challenges: Drivers and Restraints-Total Market

  • Drivers and Restraints
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Restraints Explained
  • Restraints Explained (continued)
  • Restraints Explained (continued)
  • Restraints Explained (continued)
  • Restraints Explained (continued)

6. Forecasts and Trends-Total Market

  • Forecast Assumptions
  • Total VM Market-Revenue Forecast
  • Total VM Revenue Forecast and Unit Shipments
  • Total VM Market-Pricing Trends and Forecast
  • Revenue Forecast and Unit Shipments Discussion
  • Total VM Market-Revenue Forecast by Region
  • Total VM Market-Unit Shipments Forecast by Region
  • Total VM Market-Average Selling Price Forecast by Region
  • Regional Revenue Forecast and Unit Shipments Discussion
  • Total VM Market-Revenue Shipments Forecast by Product Type
  • Total VM Market-Unit Forecast by Product Type
  • Total VM Market-Average Selling Price Forecast by Product Type
  • Product Type Revenue Forecast and Unit Shipments (Product Definitions)
  • Product Type Revenue Forecast and Unit Shipments Discussion
  • Total VM Market-Revenue Forecast by Vertical Market
  • Total VM Market-Unit Shipments Forecast by Vertical Market
  • Total VM Market-Average Selling Price Forecast by Vertical Market
  • Vertical Market Unit Shipments and Revenue Forecast Discussion
  • Total VM Market-Revenue Forecast by Size of Business
  • Total VM Market-Unit Shipments Forecast by Size of Business
  • Total VM Market-Average Selling Price Forecast by Size of Business
  • Size of Business Revenue Forecast and Unit Shipments Discussion

7. Market Share and Competitive Analysis-Total Market

  • Competitive Analysis-Market Share
  • Competitive Analysis-Market Share (LEGACY 2015 VM Report)
  • Competitive Factors and Assessment
  • Competitive Factors and Assessment (continued)
  • Competitive Environment
  • Competitive Environment (continued)

8. Points of Competitive Differentiation

  • Points of Competitive Differentiation
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)

9. Market Segmentation by Size of Business-Enterprise Segment Breakdown (10,000 or More Endpoints)

  • Enterprise VM Segment-Market Engineering Measurements
  • Enterprise Market Engineering Measurements
  • Enterprise VM Revenue Forecast and Unit Shipments
  • Enterprise VM Market-Pricing Trends and Forecast
  • Enterprise VM Pricing Trends and Forecast Discussion
  • Enterprise Competitive Environment
  • Enterprise Competitive Environment (continued)

10. Large Business (2,500-9,999 Endpoints) Segment Breakdown

  • Large Business VM Segment-Market Engineering Measurements
  • Large Business Marketing Engineering Measurements
  • Large Business Marketing Engineering Measurements (continued)
  • Large Business VM Revenue Forecast and Unit Shipments
  • Large Business VM Market-Pricing Trends and Forecast
  • Large Business VM Pricing Trends and Forecast Discussion
  • Large Business Competitive Environment
  • Large Business Competitive Environment (continued)

11. Midsized Business (1,000-2,499 Endpoints) Market Breakdown

  • Midsized Business Segment-Market Engineering Measurements
  • Midsized Business Marketing Engineering Measurements
  • Midsized Business VM Revenue Forecast and Units Shipments
  • Midsized Business VM Market-Pricing Trends and Forecast
  • Midsized Business VM Pricing Trends and Forecast Discussion
  • Midsized Business Competitive Environment
  • Midsized Business Competitive Environment (continued)

12. Small/ROBO Segment Breakdown (1-999 Endpoints)

  • Small/ROBO VM Segment-Market Engineering Measurements
  • Small/ROBO Marketing Engineering Measurements
  • Small/ROBO VM Unit Shipments and Revenue Forecast
  • Small/ROBO VM Market-Pricing Trends and Forecast
  • Small/ROBO VM Pricing Trends and Forecast Discussion
  • Small/ROBO Competitive Environment
  • Small/ROBO Competitive Environment (continued)

13. The Last Word

  • The Last Word-Predictions
  • The Last Word-Recommendations
  • Legal Disclaimer

14. Vendor Profiles

  • Vendor Profile: AlienVault
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: Beyond Security
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: BeyondTrust
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: Digital Defense, Inc.
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Flexera Software (formerly Secunia)
  • Vendor Profile: Flexera Software (formerly Secunia) (continued)
  • Vendor Profile: Flexera Software (formerly Secunia) (continued)
  • Vendor Profile: Flexera Software (formerly Secunia) (continued)
  • Vendor Profile: Outpost24
  • Vendor Profile: Outpost24 (continued)
  • Vendor Profile: Outpost24 (continued)
  • Vendor Profile: Outpost24 (continued)
  • Vendor Profile: Promisec
  • Vendor Profile: Promisec (continued)
  • Vendor Profile: Promisec (continued)
  • Vendor Profile: Promisec (continued)
  • Vendor Profile: Qualys
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Rapid7
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Tenable Network Security
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tripwire
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)

15. Appendix

  • Market Engineering Methodology
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • Market Engineering Measurements (continued)
  • List of Abbreviations and Acronyms Used in the Report
  • List of Abbreviations and Acronyms Used in the Report (continued)
  • Additional Sources of Information on Study Topic Area
  • Partial List of Companies Interviewed
  • List of Companies Included in “Others”
  • Learn More-Next Steps
Back to Top