Cover Image
市場調查報告書

加密軟體的全球市場

Encryption Software

出版商 Global Industry Analysts, Inc. 商品編碼 341989
出版日期 內容資訊 英文 176 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
加密軟體的全球市場 Encryption Software
出版日期: 2015年09月01日 內容資訊: 英文 176 Pages
簡介

本報告提供加密軟體的全球市場,提供您美國,加拿大,日本,歐洲,亞太地區,南美與其他地區之地區別分析,並彙整到2020年前之市場預測,主要業者簡介等相關資料,為您概述為以下內容。

第1章 簡介,調查手法,產品定義

第2章 摘要整理

  • 產業概要
    • 密碼:網際網路時代防止資料洩漏的重要策略
    • 數位資料的重要性
    • 企業內的資料洩漏
    • 防止洩漏的下一代工具所拓展的市場
    • 加密軟體:資料洩漏的潛在工具
    • 市場趨勢與問題點
    • 重要的數位資料價值之認知度提升加速了加密的投資
    • 智慧型手機盜竊的增加促使BYOD的安全方策加密成為焦點
    • 斯諾登的洩密和NSA調查更刺激了加密的需求
    • 試驗指標加密顯示出整合試驗指標安全的熱門
    • 由於IoT的登場IoT架構加密的重要性引人注目
    • BYOD和CYOD資料洩漏的風險增加促進了加密軟體的產業使用案例增加
    • 解決雲端資料洩漏的需求提升了加密軟體的需求
    • 密碼自備促使雲端應用程式加密的使用
    • 拓展虛擬化的加密需求
    • 雲端運算的分割上升促使雲端型密碼成為具有獲利能力的經營模式
    • 已開發國家獨佔市場,開發中國家推動成長
    • 自我加密驅動程式的廣為流行:加密軟體的一大威脅
    • 守法的壓力高漲推動市場成長
    • 競爭
  • 產品概要
  • 新產品/創新
  • 最近的產業的活動
  • 主要全球營運
  • 全世界的市場展望

第3章 市場分析

  • 美國
  • 加拿大
  • 日本
  • 歐洲
    • 法國
    • 德國
    • 義大利
    • 英國
    • 西班牙
    • 俄羅斯
    • 其他歐洲
  • 亞太地區
    • 中國
    • 印度
    • 其他亞太地區
  • 南美
    • 巴西
    • 其他南美
  • 其他地區

第4章 比較展望

目錄
Product Code: MCP-7981

This report analyzes the worldwide markets for Encryption Software in US$ Thousand. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 49 companies including many key and niche players such as -

Bloombase
Check Point Software Technologies Ltd.
Cisco Systems Inc.
Cypherix Encryption Software
Dekart

Table of Contents

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

  • Study Reliability and Reporting Limitations
  • Disclaimers
  • Data Interpretation & Reporting Level
    • Quantitative Techniques & Analytics
  • Product Definitions and Scope of Study
    • Encryption Software

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW

  • Encryption: A Critical Data Leakage Prevention Strategy in the Internet Era
  • Importance of Digital Data...
  • Where in an Enterprise, Data Leaks....
  • Market Opens Up for Next-Gen Tools to Plug Leaks...
    • Table 1: Leaking Faucets in an Enterprise (includes corresponding Graph/Chart)
  • Encryption Software: A Potent Tool to Plug Leaks
  • Market Trends & Issues
  • Growing Awareness Over the Value of Sensitive Digital Data Fuels Investments in Encryption
  • Rise in Smartphone Theft Throws the Spotlight on Encryption as a BYOD Security Measure
  • Snowden Revelations & the Bringing to Light of the Age of NSA Surveillance Spurs the Need for Encryption
  • Growing Focus on Unifying Endpoint Security Augurs Well for Endpoint Encryption s
  • The Rise of IoT Turns the Spotlight on the Importance of Encrypting the IoT Framework
    • Table 2: With Over 387% Growth in Connected Autonomous Things by 2020, the Security Pressure Builds On IoT, Fuelling Opportunities for Encryption Software as a Key Security Component: Breakdown of the Installed Base of IoT Connected Devices (In Million Units) for the Years 2015 & 2020 (includes corresponding Graph/Chart)
    • The IoT Phenomenon Spurs Demand for Lightweight Cryptography
  • BYOD & CYOD Aggravate the Risk of Data Leakage & Fuel the Business Case for Encryption Software
    • Era of "BYOD"....
    • Wearables in an Enterprise: The Next Wave of BYOD Spurring Opportunities for Encryption
    • Surging Security Threats Posed by Moving Data in a BYOD Era...
    • Software Encryption Rides the BYOD Wave Balancing BYOD Risks & Rewards
    • Table 3: With a Projected 11.7% Increase in the Share of Corporate-Owned Tablets by 2018, BYOD Goes Mainstream Spurring Opportunities for Data Encryption in a BYOD Environment: Global Percentage Breakdown of Installed Base of Corporate-Owned and Consumer Owned Tablets for the Years 2011, 2014 & 2017P (includes corresponding Graph/Chart)
    • Table 4: Robust Penetration of BYOD Devices as Measured by the Per Capita Distribution of Connected Devices Per Knowledge Worker in Select Countries for the Year 2012 & 2015 (includes corresponding Graph/Chart)
  • Need to Counter Data Leakage in the Cloud Spurs Demand for Encryption Software
    • The Age of the Clouds...
    • Security Threats in the Cloud Drives the Importance of Encrypting Data in the Cloud
    • Table 5: Robust Spending On Public Cloud Services Drives the Emphasis on Server Side & Client Side Encryption: Global Market for Public Cloud Computing Services (In US$ Million) by Geographic Region for the Years 2015 & 2020 (includes corresponding Graph/Chart)
  • Bring Your Own Encryption Catalyzes the Use of Encryption in Cloud Applications
  • Virtualization Expands the Need for Encryption
    • Table 6: Surging Penetration of Virtualization Brings Encryption into the Spotlight to Prevent Information Leakage from VMs: Penetration (In %) of Virtualization Technology and Average Number of Virtual Servers Per Host (x:1) in Select Countries for the Year 2015 (includes corresponding Graph/Chart)
  • The Disruptive Ascend of Cloud Computing Gives Rise to Encryption as a Service as a Lucrative Business Model
    • The Disruption of Cloud Computing in the New Economy
    • Encryption as a Service (EaaS) Grows in Prominence
  • Developed Countries Dominate the Market, Developing Countries to Lead Growth
  • Surging Popularity of Self-Encrypting Drives: A Key Threat to Encryption Software
  • Growing Pressure of Compliance Fuels Market Growth
    • Regulations Governing Data Leakage
    • A Synoptic Review of Key Data Protection Regulations Penalizing Data Leakages
      • Payment Card Industry Data Security Standard (PCI DSS)
      • Listed below is the high-level overview of the PCI DSS requirements:
      • Gramm-Leach-Bliley Act (GLBA)
      • Sarbanes-Oxley Act (SOX)
      • EURO-SOX
      • Health Insurance Portability & Accountability Act (HIPAA)
      • Data Protection Act (DPA) of 1984 (amended 1998)
      • California Senate Bill 1386
  • Competition

2. PRODUCT OVERVIEW

  • Software-Based Encryption- Defined
  • Types of Encryption Software
  • Software Based Disk Encryption
  • Software Based File/Folder Encryption
  • Software Based Database Encryption
  • Software Based Communication Encryption
  • Cloud Encryption
  • Protecting Data at Rest and Data in Motion
  • Protecting Data at Rest
  • Securing Data in Motion
  • Benefits of Encryption
  • Ensures Customer Loyalty
  • Enables Use of Cloud
  • Helps Comply with Regulations
  • Drawbacks of Encryption Software

3. RECENT INDUSTRY ACTIVITY

  • New Softwares Updates Folder Lock
  • HP Takes Over Voltage Security
  • HP Launches Novel HP Cloud Access Security Protection Platform
  • WowTron Introduces WowTron PDF Encryption
  • Cloudera Acquires Gazzang
  • INSIDE Secure Takes Over Metaforic
  • Sophos Takes Over Mojave
  • CipherPoint Enters into Reseller Partnership with DocPoint
  • Data Locker Rolls Out SkyCrypt
  • CRYPTR 2 Broadband IP Encryption Obtains Certification of National Security Agency
  • Mitsubishi Electric Develops New Encryption Platform Software
  • Penta Security Launches MyDiamo

4. FOCUS ON SELECT GLOBAL PLAYERS

  • Bloombase (US)
  • Check Point Software Technologies Ltd. (Israel)
  • Cisco Systems Inc. (US)
  • Cypherix Encryption Software (US)
  • Dekart (Republic of Moldova)
  • East-Tec (Romania)
  • EMC Corporation (US)
  • Entrust Tech (US)
  • Hewlett-Packard (US)
  • IBM Corporation (US)
  • InterCrypto Ltd. (US)
  • Jetico Inc. (Finland)
  • McAfee Inc. (US)
  • Microsoft Corporation (US)
  • NewSoftwares.Net.Inc. (US)
  • PC Dynamics Inc. (US)
  • ProofPoint (US)
  • Ranquel Data Security (Argentina)
  • Sophos Ltd. (UK)
  • Symantec Corporation (US)
  • Trend Micro (Japan)
  • WebMinds Inc. (US)
  • Winmagic Inc. (US)
  • Zix Corporation (US)

5. GLOBAL MARKET PERSPECTIVE

    • Table 7: World Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 8: World 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

III. MARKET

1. THE UNITED STATES

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
    • Key Players
  • B. Market Analytics
    • Table 9: US Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

2. CANADA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 10: Canadian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

3. JAPAN

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
    • Trend Micro - A Key Player
  • B. Market Analytics
    • Table 11: Japanese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4. EUROPE

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 12: European Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 13: European 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

4a. FRANCE

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 14: French Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4b. GERMANY

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 15: German Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4c. ITALY

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 16: Italian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4d. THE UNITED KINGDOM

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
    • Sophos Ltd. - A Key Player
  • B. Market Analytics
    • Table 17: UK Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4e. SPAIN

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 18: Spanish Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4f. RUSSIA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 19: Russian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4g. REST OF EUROPE

  • A. Market Analysis
    • Outlook
    • Key Players
  • B. Market Analytics
    • Table 20: Rest of Europe Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5. ASIA-PACIFIC

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 21: Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 22: Asia-Pacific 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

5a. CHINA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 23: Chinese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5b. INDIA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 24: Indian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5c. REST OF ASIA-PACIFIC

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
  • B. Market Analytics
    • Table 25: Rest of Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

6. LATIN AMERICA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 26: Latin American Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 27: Latin American 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

6a. BRAZIL

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 28: Brazilian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

6b. REST OF LATIN AMERICA

  • A. Market Analysis
    • Outlook
    • Ranquel Data Security (Argentina) - A Key Player
  • B. Market Analytics
    • Table 29: Rest of Latin America Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

7. REST OF WORLD

  • A. Market Analysis
    • Outlook
    • Check Point Software Technologies Ltd. (Israel) - A Key Player
  • B. Market Analytics
    • Table 30: Rest of World Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

IV. COMPETITIVE LANDSCAPE

Back to Top