Cover Image
市場調查報告書

全球網路應用程式防火牆市場

Global Web Application Firewall (WAF) Market 2014-2018

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 235937
出版日期 內容資訊 英文 103 Pages
訂單完成後即時交付
價格
Back to Top
全球網路應用程式防火牆市場 Global Web Application Firewall (WAF) Market 2014-2018
出版日期: 2014年09月03日 內容資訊: 英文 103 Pages
簡介

所謂網路應用程式防火牆(WAF),是指監視、控制支援網路應用程式上的網路通訊的軟體/硬體設備解決方案。WAF熟悉各種電腦網路攻擊(DT、SQLI、XSS、RFI等),對開放系統的互相連接模式的應用層施加必要的Web保護功能。若沒有WAF,將產生資料損失和無法利用的狀態,進一步產生商務流程干預的事態。WAF還縮小暴露於外部的部份,透過徹底驗證修補程式後送信,探測、妨礙打算濫用網路應用程式程式已知漏洞的行為。因此,WAF是為了重要的商務流程適當運作所不可缺少的要素。全球WAF市場在2013∼2018年的年複合成長率(CAGR)推算達到17.92%。

本報告提供全球網路應用程式防火牆(以下WAF)市場調查、該市場趨勢與成長預測(今後5年份)、各終端用戶、各地區的詳細趨勢、推動、阻礙市場要素、主要供應商分析等資訊。

第1章 摘要整理

第2章 簡稱集

第3章 分析範圍

  • 市場概要
  • 主要的產品與服務

第4章 市場分析技術

  • 市場分析的流程
  • 分析方法

第5章 簡介

第6章 市場概要

  • 網路應用程式防火牆(WAF)結構
  • WAF的引進選擇
    • 本地型
    • 雲端型
  • 電腦網路攻擊的種類
    • 目錄遊走(DT)
    • SQL注入(SQLI)
    • 跨站指令碼(XSS)
    • 遠端檔案加入(RFI)
    • 電子郵件提取(EmExt)
    • 本機檔案加入(LFI)
    • 垃圾留言(ComSpm)
  • 攻擊主要的起始國
  • 攻擊主要的目標國家

第7章 市場情形

  • 市場概況
    • WAF的產品生命週期
  • 市場規模與其預測
  • 波特的五力分析

第8章 終端用戶分類

  • 各終端用戶的WAF市場趨勢
  • 銀行、金融服務、保險業(BFSI)市場
  • 電子商務市場
  • 政府機關市場

第9章 地區分類

  • 全球各地區的WAF市場趨勢(今後5年份)

第10章 市場誘因

各終端用戶吸引力 各地區吸引力

第11章 全球主要攻擊起飛國

  • 美國
  • 德國
  • 法國
  • 加拿大
  • 中國
  • 俄羅斯
  • 英國
  • 土耳其

第12章 購買標準

第13章 市場發展要素

第14章 成長要素與其影響

第15章 市場課題

第16章 發展要素與課題的影響

第17章 市場趨勢

第18章 市場趨勢的影響

第19章 供應商情形

  • 競爭方案
  • 競爭分析
  • 其他的著名的供應商

第20章 主要供應商分析

  • Cisco Systems
    • 主要資訊、資料
    • 產業概要
    • 各部門的銷售額
    • 各地區的銷售額
    • 產業策略
    • 近幾年的發展
    • SWOT分析
  • Citrix Systems Inc.
  • F5 Networks
  • Fortinet
  • Imperva
  • Juniper Networks
  • Palo Alto Networks

第21章 本系列相關的其他報告

圖表

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: IRTNTR4061

About Web Application Firewall

A web application firewall (WAF) is a software or hardware solution built for monitoring and controlling network traffic on web-enabled applications. A relatively secure barrier is established between the system and external environments by using a WAF. It understands and provides web protection at the application layer of the open system interconnection model from many attacks types, such as DT, SQLI, XSS, and RFI. The absence of WAF results in loss of data or unavailability of data, which can result in the interruption of business processes. WAF detects and blocks attempts to exploit known web application vulnerabilities by shortening the window of exposure while patches are thoroughly tested and deployed. Therefore, a WAF is an essential requirement for the proper functioning of any critical business processes.

TechNavio's analysts forecast the Global Web Application Firewall market to grow at a CAGR of 17.92 percent over the period 2013-2018.

Covered in this Report

The report covers major end-user segments such as:

  • BFSI Sector
  • E-commerce
  • Government Organizations

TechNavio's report, the Global Web Application Firewall (WAF) Market 2014-2018, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the Americas, and the EMEA and APAC regions; it also covers the Global Web Application Firewall (WAF) market landscape and its growth prospects in the coming years. The report also includes a discussion of the key vendors operating in this market.

Key Regions

  • Americas
  • APAC
  • EMEA

Key Vendors

  • Cisco Systems
  • Citrix Systems
  • F5 Networks
  • Fortinet
  • Imperva
  • Juniper Networks
  • Palo Alto Networks

Other Prominent Vendors

  • Akamai Technologies
  • Applicure Technologies
  • Armorize Technologies
  • Art of Defence
  • Barracuda Networks
  • Bee-Ware
  • Calyptix
  • Check Point Software Technologies
  • Evidian
  • Forum Systems
  • gateProtect
  • IBM
  • McAfee
  • Microsoft
  • Protegrity USA
  • Radware
  • Rapid7
  • Trustwave

Market Driver

  • Rise of E-commerce

For a full, detailed list, view our report

Market Challenge

  • High Implementation Cost s

For a full, detailed list, view our report

Market Trend

  • Increase in Security Investment by End-users

For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2018 and what will the growth rate be
  • What are the key market trends
  • What is driving this market
  • What are the challenges to market growth
  • Who are the key vendors in this market space
  • What are the market opportunities and threats faced by the key vendors
  • What are the strengths and weaknesses of the key vendors

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview
  • 03.2. Product Offerings

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Structure of WAF
  • 06.2. Deployment Options of WAF
    • 06.2.1. On-premises
    • 06.2.2. Cloud-based
  • 06.3. Types of Cyber Attacks
    • 06.3.1. DT
    • 06.3.2. SQLI
    • 06.3.3. XSS
    • 06.3.4. RFI
    • 06.3.5. EmExt
    • 06.3.6. LFI
    • 06.3.7. ComSpm
  • 06.4. Major Countries for Origin of Cyber Attacks
  • 06.5. Major Countries Affected by Cyber Attacks

07. Market Landscape

  • 07.1. Market Overview
    • 07.1.1. Product Lifecycle of WAF
  • 07.2. Market Size and Forecast
  • 07.3. Five Forces Analysis

08. Market Segmentation by End-users

  • 08.1. Global WAF Market by End-user Segmentation 2013
  • 08.2. Global WAF Market by End-user Segmentation 2013-2018
  • 08.3. Global WAF Market in BFSI Sector
    • 08.3.1. Market Size and Forecast
  • 08.4. Global WAF Market in e-commerce Sector
    • 08.4.1. Market Size and Forecast
  • 08.5. Global WAF Market in Government Organizations
    • 08.5.1. Market Size and Forecast

09. Geographical Segmentation

  • 09.1. Global WAF Market by Geographical Segmentation 2013
  • 09.2. Global WAF Market by Geographical Segmentation 2013-2018

10. Market Attractiveness

  • 10.1. Market Attractiveness by End-user Segmentation
  • 10.2. Market Attractiveness by Geographical Segmentation

11. Key Leading Countries by Origin of Attacks

  • 11.1. USA
  • 11.2. Germany
  • 11.3. France
  • 11.4. Canada
  • 11.5. China
  • 11.6. Russian Federation
  • 11.7. UK
  • 11.8. Turkey

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

  • 19.1. Competitive Scenario
  • 19.2. Competitive Analysis 2013
  • 19.3. Other Prominent Vendors

20. Key Vendor Analysis

  • 20.1. Cisco Systems
    • 20.1.1. Key Facts
    • 20.1.2. Key Information
    • 20.1.3. Business Overview
    • 20.1.4. Business Segmentation by Revenue 2013
    • 20.1.5. Business Segmentation by Revenue 2011-2013
    • 20.1.6. Geographical Segmentation by Revenue 2013
    • 20.1.7. Business Strategy
    • 20.1.8. Recent Developments
    • 20.1.9. SWOT Analysis
  • 20.2. Citrix Systems Inc.
    • 20.2.1. Key Facts
    • 20.2.2. Key Information
    • 20.2.3. Business Overview
    • 20.2.4. Business Segmentation by Revenue 2013
    • 20.2.5. Business Segmentation by Revenue 2012 and 2013
    • 20.2.6. Geographical Segmentation by Revenue 2013
    • 20.2.7. Business Strategy
    • 20.2.8. Recent Developments
    • 20.2.9. SWOT Analysis
  • 20.3. F5. Networks
    • 20.3.1. Key Facts
    • 20.3.2. Key Information
    • 20.3.3. Business Overview
    • 20.3.4. Business Segmentation by Revenue 2013
    • 20.3.5. Business Segmentation by Revenue 2012 and 2013
    • 20.3.6. Geographical Segmentation by Revenue 2013
    • 20.3.7. Business Strategy
    • 20.3.8. Recent Developments
    • 20.3.9. SWOT Analysis
  • 20.4. Fortinet
    • 20.4.1. Key Facts
    • 20.4.2. Key Information
    • 20.4.3. Business Overview
    • 20.4.4. Business Segmentation by Revenue 2013
    • 20.4.5. Business Segmentation by Revenue 2012 and 2013
    • 20.4.6. Geographical Segmentation by Revenue 2013
    • 20.4.7. Business Strategy
    • 20.4.8. Recent Developments
    • 20.4.9. SWOT Analysis
  • 20.5. Imperva
    • 20.5.1. Key Facts
    • 20.5.2. Key Information
    • 20.5.3. Business Overview
    • 20.5.4. Business Segmentation by Revenue 2013
    • 20.5.5. Business Segmentation by Revenue 2012 and 2013
    • 20.5.6. Business Strategy
    • 20.5.7. Recent Developments
    • 20.5.8. SWOT Analysis
  • 20.6. Juniper Networks
    • 20.6.1. Key Facts
    • 20.6.2. Key Information
    • 20.6.3. Business Overview
    • 20.6.4. Business Segmentation
    • 20.6.5. Business Segmentation by Revenue 2012 and 2013
    • 20.6.6. Geographical Segmentation by Revenue 2013
    • 20.6.7. Business Strategy
    • 20.6.8. Recent Developments
    • 20.6.9. SWOT Analysis
  • 20.7. Palo Alto Networks
    • 20.7.1. Key Facts
    • 20.7.2. Key Information
    • 20.7.3. Business Overview
    • 20.7.4. Business Segmentation by Revenue 2013
    • 20.7.5. Business Segmentation by Revenue 2012 and 2013
    • 20.7.6. Geographical Segmentation by Revenue 2013
    • 20.7.7. Business Strategy
    • 20.7.8. Recent Developments
    • 20.7.9. SWOT Analysis

21. Other Reports in this Series

List of Exhibits:

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Structure of WAF
  • Exhibit 3: Types of Cyber Attacks 2013
  • Exhibit 4: Major Countries for Origin of Cyber Attacks 2013
  • Exhibit 5: Major Countries Affected by Cyber Attacks 2013
  • Exhibit 6: Product Lifecycle of WAF
  • Exhibit 7: Global WAF Market 2013-2018 (US$ million)
  • Exhibit 8: Global WAF Market by End-user Segmentation 2013
  • Exhibit 9: Global WAF Market by End-user Segmentation 2013-2018 (percentage)
  • Exhibit 10: Global WAF Market in BFSI Sector 2013-2018 (US$ million)
  • Exhibit 11: Global WAF Market in e-commerce Sector 2013-2018 (US$ million)
  • Exhibit 12: Global WAF Market in Government Organizations 2013-2018 (US$ million)
  • Exhibit 13: Global WAF Market by Geographical Segmentation 2013
  • Exhibit 14: Global WAF Market by Geographical Segmentation 2013-2018 (percentage)
  • Exhibit 15: Global WAF Market by Geographical Segmentation 2013-2018 (US$ million)
  • Exhibit 16: Market Attractiveness by End-user Segmentation
  • Exhibit 17: Market Attractiveness by Geographical Segmentation
  • Exhibit 18: Leading Countries for Origins of Attack (units in thousands)
  • Exhibit 19: Global WAF Market by Classification of Vendors
  • Exhibit 20: Cisco Systems: Business Segmentation by Revenue 2013
  • Exhibit 21: Cisco Systems: Business Segmentation by Revenue 2011-2013 (US$ billion)
  • Exhibit 22: Cisco System: Geographical Segmentation by Revenue 2013
  • Exhibit 23: Citrix Systems: Business Segmentation by Revenue 2013
  • Exhibit 24: Citrix Systems: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 25: Citrix Systems: Geographical Segmentation by Revenue 2013
  • Exhibit 26: F5 Networks: Business Segmentation by Revenue 2013
  • Exhibit 27: F5 Networks: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 28: F5 Networks: Geographical Segmentation by Revenue 2013
  • Exhibit 29: Fortinet: Business Segmentation by Revenue 2013
  • Exhibit 30: Fortinet: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 31: Fortinet: Geographical Segmentation by Revenue 2013
  • Exhibit 32: Imperva: Business Segmentation by Revenue 2013
  • Exhibit 33: Imperva: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 34: Juniper Networks: Business Segmentation 2013
  • Exhibit 35: Juniper Networks: Business Segmentation by Revenue 2012 and 2013 (US$ billion)
  • Exhibit 36: Juniper Networks: Geographical Segmentation by Revenue 2013
  • Exhibit 37: Palo Alto Networks: Business Segmentation by Revenue 2013
  • Exhibit 38: Palo Alto Networks: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 39: Palo Alto Networks: Geographical Segmentation by Revenue 2013
Back to Top