Cover Image
市場調查報告書

IT安全的中國市場:2015年∼2019年

IT Security Market in China 2015-2019

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 232735
出版日期 內容資訊 英文 98 Pages
訂單完成後即時交付
價格
Back to Top
IT安全的中國市場:2015年∼2019年 IT Security Market in China 2015-2019
出版日期: 2015年04月15日 內容資訊: 英文 98 Pages
簡介

中國的IT安全市場,預計從2014年到2019年,以11.39%的年複合成長率擴大。

本報告提供中國的IT安全市場概要與今後的預測、發展因素、課題,並提供主要企業簡介等資訊。

第1章 摘要整理

第2章 簡稱清單

第3章 調查範圍

  • 市場概要
  • 主要的產品

第4章 市場調查手法

  • 市場調查流程
  • 調查手法

第5章 簡介

第6章 市場說明

  • 威脅的種類
    • 特洛伊木馬
    • 病毒
    • 蠕蟲
    • 廣告程式
    • 鍵盤側錄程式
    • 後門
    • 利用漏洞
    • 病毒植入程式
    • 釣魚
    • 甜餅乾
    • 藍牙漏洞攻擊
    • 滑鼠綁架
    • 瀏覽器綁架
    • 滑鼠陷阱
    • 垃圾郵件
    • 犯罪軟體
  • IT安全的因素
  • IT安全的優點

第7章 市場形勢

  • 市場概要
    • 市場結構
    • 市場規模與預測
  • 亞太地區中國的IT安全市場
  • 波特的五力分析

第8章 BYOD:市場機會

第9章 產品生命週期分析

第10章 各產品的市場分類

  • 中國的各產品IT安全市場
  • 中國的IT安全硬體設備市場
    • 市場規模與預測
    • IT安全硬體設備市場各產品分類
    • 整合防火牆/VPN市場
    • UTM市場
    • IPS市場
    • 內容管理市場
    • VPN市場
    • IDS市場
  • 中國的IT安全服務市場
    • 市場規模與預測
  • 中國的IT安全軟體市場
    • 市場規模與預測

第11章 市場魅力

第12章 購買標準

第13章 市場成長因素

第14章 成長因素與其影響

第15章 市場課題

第16章 成長因素與課題的影響

第17章 市場趨勢

第18章 趨勢與其影響

第19章 業者情勢

  • 競爭模式
  • 供應商分析
    • 供應商比較
    • 主要消息
    • M&A
  • 其他卓越供應商

第20章 主要供應商分析

  • CA Technologies
  • Check Point Software
  • Cisco Systems
  • Emc2
  • IBM
  • Juniper Networks
  • Symantec

第21章 相關報告

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: IRTNTR5643

About IT Security

IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.

TechNavio's analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.

Covered in this Report

The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:

  • Hardware: Integrated Firewall/VPN, UTM, Content Management, IPS, IDS, and VPN
  • Services
  • Software

The major end-users listed in the market are described below:

  • SMEs: This segment includes organizations that have less than 10,000 employees and generate revenue of less than US$100 million
  • Large Enterprises: This segment includes organizations that have more than 10,000 employees and generate revenue of more than US$100 million
  • Government Organizations: This segment includes all government agencies and institutions that are funded and managed by government authorities

TechNavio's report, IT Security Market in China 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Vendors

  • CA Technologies
  • Check Point Software
  • Cisco Systems
  • Emc²
  • IBM
  • Juniper Networks
  • Symantec

Other Prominent Vendors

  • Dell SonicWALL
  • Fortinet
  • F-Secure
  • McAfee
  • Sophos
  • TrendMicro

Market Driver

  • Increased Dependency on Internet
  • For a full, detailed list, view our report

Market Challenge

  • High Implementation Cost
  • For a full, detailed list, view our report

Market Trend

  • Increased Demand for Cloud-based Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview
  • 03.2. Product Offerings

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Types of Threat
    • 06.1.1. Trojan
    • 06.1.2. Virus
    • 06.1.3. Worms
    • 06.1.4. Adware
    • 06.1.5. Keylogger
    • 06.1.6. Backdoor
    • 06.1.7. Exploit
    • 06.1.8. Dropper
    • 06.1.9. Phishing
    • 06.1.10. Cookies
    • 06.1.11. Bluesnarfing
    • 06.1.12. Boot Sector Virus
    • 06.1.13. Browser Hijackers
    • 06.1.14. Mousetrapping
    • 06.1.15. Obfuscated Spam
    • 06.1.16. Crimeware
  • 06.2. Components of IT Security
  • 06.3. Advantages of IT Security

07. Market Landscape

  • 07.1. Market Overview
    • 07.1.1. Market Structure
    • 07.1.2. Market Size and Forecast
  • 07.2. China in IT Security Market in APAC Region
  • 07.3. Five Forces Analysis

08. BYOD Implementation: Market Opportunities

09. Product Lifecycle Analysis

10. Market Segmentation by Product

  • 10.1. Segmentation of IT Security Market in China by Product 2014
  • 10.2. Segmentation of IT Security Market in China by Product 2014-2019
  • 10.3. IT Security Hardware Market in China
    • 10.3.1. Market Size and Forecast
    • 10.3.2. Segmentation of IT Security Hardware Market in China by Product
    • 10.3.3. Segmentation of IT Security Hardware Market in China by Product 2014-2019
    • 10.3.4. Integrated Firewall/VPN Market in China
    • 10.3.5. UTM Market in China
    • 10.3.6. IPS Market in China
    • 10.3.7. Content Management Market in China
    • 10.3.8. VPN Market in China
    • 10.3.9. IDS Market in China
  • 10.4. IT Security Services Market in China
    • 10.4.1. Market Size and Forecast
  • 10.5. IT Security Software Market in China
    • 10.5.1. Market Size and Forecast

11. Market Attractiveness

  • 11.1. Market Attractiveness by Product

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

  • 19.1. Competitive Scenario
  • 19.2. Vendor Analysis 2014
    • 19.2.1. Vendor Comparison based on Application Offered
    • 19.2.2. Key News
    • 19.2.3. Mergers and Acquisitions
  • 19.3. Other Prominent Vendors

20. Key Vendor Analysis

  • 20.1. CA Technologies
    • 20.1.1. Key Facts
    • 20.1.2. Business Overview
    • 20.1.3. Business Segmentation by Revenue 2013
    • 20.1.4. Business Segmentation by Revenue 2012 and 2013
    • 20.1.5. Geographical Segmentation by Revenue 2013
    • 20.1.6. Business Strategy
    • 20.1.7. Recent Developments
    • 20.1.8. SWOT Analysis
  • 20.2. Check Point Software
    • 20.2.1. Key Facts
    • 20.2.2. Business Overview
    • 20.2.3. Business Strategy
    • 20.2.4. Recent Developments
    • 20.2.5. SWOT Analysis
  • 20.3. Cisco Systems
    • 20.3.1. Key Facts
    • 20.3.2. Business Overview
    • 20.3.3. Business Segmentation by Revenue
    • 20.3.4. Geographical Segmentation by Revenue
    • 20.3.5. Business Strategy
    • 20.3.6. Key Information
    • 20.3.7. SWOT Analysis
  • 20.4. Emc²
    • 20.4.1. Key Facts
    • 20.4.2. Business Overview
    • 20.4.3. Business Segmentation by Revenue 2013
    • 20.4.4. Business Segmentation by Revenue 2012 and 2013
    • 20.4.5. Geographical Segmentation by Revenue 2013
    • 20.4.6. Business Strategy
    • 20.4.7. Recent Developments
    • 20.4.8. SWOT Analysis
  • 20.5. IBM
    • 20.5.1. Key Facts
    • 20.5.2. Business Description
    • 20.5.3. Business Segmentation
    • 20.5.4. Revenue Segmentation by Business Segment
    • 20.5.5. Revenue Segmentation by Business Operation
    • 20.5.6. Revenue Comparison of Business Segments 2012 and 2013
    • 20.5.7. Revenue Segmentation by Geography
    • 20.5.8. Business Strategy
    • 20.5.9. Key Developments
    • 20.5.10. SWOT Analysis
  • 20.6. Juniper Networks
    • 20.6.1. Key Facts
    • 20.6.2. Business Overview
    • 20.6.3. Business Segmentation
    • 20.6.4. Business Segmentation by Revenue 2012 and 2013
    • 20.6.5. Sales by Geography 2013
    • 20.6.6. Business Strategy
    • 20.6.7. Recent Developments
    • 20.6.8. SWOT Analysis
  • 20.7. Symantec
    • 20.7.1. Key Facts
    • 20.7.2. Business Overview
    • 20.7.3. Business Segmentation by Revenue 2013
    • 20.7.4. Business Segmentation by Revenue 2013 and 2014
    • 20.7.5. Geographical Segmentation by Revenue 2013
    • 20.7.6. Business Strategy
    • 20.7.7. Recent Developments
    • 20.7.8. SWOT Analysis

21. Other Reports in this Series

List of Exhibits:

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Components of IT Security
  • Exhibit 3: Market Structure
  • Exhibit 4: Segmentation by Hardware
  • Exhibit 5: IT Security Market in China 2014-2019 (US$ billion)
  • Exhibit 6: China in IT Security Market in APAC Region 2014
  • Exhibit 7: Adoption of BYOD Across Countries
  • Exhibit 8: Adoption of BYOD in Enterprises across Countries (million units)
  • Exhibit 9: Average Number of BYOD Devices in Enterprises in China
  • Exhibit 10: Product Lifecycle Analysis
  • Exhibit 11: Segmentation of IT Security Market in China by Product 2014
  • Exhibit 12: Segmentation of IT Security Market in China by Product 2014-2019
  • Exhibit 13: IT Security Hardware Market in China 2014-2019 (US$ billion)
  • Exhibit 14: Segmentation of IT Security Hardware Market in China by Product 2014
  • Exhibit 15: Segmentation of IT Security Hardware Market in China by Product 2014-2019
  • Exhibit 16: Integrated Firewall/VPN Market in China 2014-2019 (US$ billion)
  • Exhibit 17: UTM Market in China 2014-2019 (US$ billion)
  • Exhibit 18: IPS Market in China 2014-2019 (US$ billion)
  • Exhibit 19: Content Management Market in China 2014-2019 (US$ billion)
  • Exhibit 20: VPN Market in China 2014-2019 (US$ billion)
  • Exhibit 21: IDS Market in China 2014-2019 (US$ billion)
  • Exhibit 22: IT Security Services Market in China 2014-2019 (US$ billion)
  • Exhibit 23: IT Security Software Market in China 2014-2019 (US$ billion)
  • Exhibit 24: Market Attractiveness by Product
  • Exhibit 25: Vendor Comparison based on Application Offered
  • Exhibit 26: CA Technologies: Business Segmentation by Revenue 2013
  • Exhibit 27: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 28: CA Technologies: Geographical Segmentation by Revenue 2013
  • Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 30: Business Segmentation of Cisco Systems by Revenue 2011-2013 (US$ billion)
  • Exhibit 31: Geographical Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 32: Emc²: Business Segmentation by Revenue 2013
  • Exhibit 33: Emc²: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 34: EMC² : Geographical Segmentation by Revenue 2013
  • Exhibit 35: IBM: Business Segmentation
  • Exhibit 36: IBM: Revenue Segmentation by Business 2013
  • Exhibit 37: IBM: Revenue Segmentation 2013
  • Exhibit 38: IBM: Revenue Comparison of Business Segments 2012 and 2013 (US$ million)
  • Exhibit 39: IBM: Revenue Segmentation by Geography 2013
  • Exhibit 40: Juniper Networks: Business Segmentation 2013
  • Exhibit 41: Juniper Networks: Business Segmentation by Revenue 2012 and 2013 (US$ billion)
  • Exhibit 42: Juniper Networks: Sales by Geography 2013
  • Exhibit 43: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 44: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
  • Exhibit 45: Symantec: Geographical Segmentation by Revenue 2013
Back to Top