Cover Image
市場調查報告書

專業化威脅對策 (STAP) 的全球市場:2015年∼2019年

Global Specialized Threat Analysis and Protection (STAP) Market 2015-2019

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 291322
出版日期 內容資訊 英文 99 Pages
訂單完成後即時交付
價格
Back to Top
專業化威脅對策 (STAP) 的全球市場:2015年∼2019年 Global Specialized Threat Analysis and Protection (STAP) Market 2015-2019
出版日期: 2015年07月15日 內容資訊: 英文 99 Pages
簡介

所謂專業化威脅對策 (STAP) ,是查出、阻止惡意程式的攻擊和電腦網路攻擊。全球專業化威脅對策 (STAP) 市場,預計2014年∼2019年以35.93%的年複合成長率成長。

本報告提供全球專業化威脅對策 (STAP) 市場相關調查分析、市場規模與成長率、市場趨勢、市場的推動要素與課題、市場機會驗證、主要供應商等相關的系統性資訊。

第1章 摘要整理

第2章 簡稱清單

第3章 調查範圍

  • 市場範圍

第4章 市場調查手法

  • 市場調查流程
  • 調查手法

第5章 統計摘要

  • 統計摘要:各地區

第6章 市場考察

第7章 簡介

第8章 市場內容

  • 威脅的種類
  • 安全威脅的結果
  • STAP的必要性
  • STAP的檢測技術
  • STAP相關功能
  • STAP的結構要素

第9章 市場形勢

  • 市場概要
  • 產品生命週期分析
  • 全球STAP市場
  • 波特的五力分析

第10章 地區區分

  • 各地區

第11章 購買標準

第12章 推動市場成長要素

第13章 推動因素與其影響

第14章 市場課題

第15章 推動因素與課題的影響

第16章 市場趨勢

第17章 趨勢與其影響

第18章 業者情勢

  • 競爭模式
  • 最新消息
  • 主要供應商清單
  • 主要供應商概要
  • 其他卓越供應商

第19章 主要供應商分析

  • Check Point Software Technologies
  • Cisco Systems
  • EMC
  • Fortinet
  • McAfee
  • Symantec
  • Trend Micro

第20章 相關報告

圖表

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: IRTNTR6504

About Specialized Threat Analysis and Protection

Specialized threat analysis and protection involves detecting and preventing malware-based attacks and cyber-attacks. It includes identity and access management, encryption, intrusion detection, and other advanced security software. They are based on signature-less technology such as sandboxing, emulation, big data analytics, and containerization. These products allow reverse engineering and forensic analysis of detected threats. With the emergence of specialized threats such as financial and intellectual property theft; specialized threat analysis and protection technology is being adopted by enterprises to detect, analyze, and prevent these threats. Organizations in the BFSI and government sectors have also begun to realize that they need protection against targeted attacks, and have begun to deploy specialized threat analysis and protection solutions.

Technavio's analysts forecast the global specialized threat analysis and protection market to grow at a CAGR of 35.93% over the period 2014-2019.

Covered in this Report

In this report, Technavio covers the present scenario and growth prospects of the global specialized threat analysis and protection market for 2015-2019. The market size is calculated based on:

  • Revenue generated from the sales of specialized threat analysis and protection products
  • Revenue generated from the Americas, EMEA, and APAC

We provide market insights and landscapes for the global specialized threat analysis and protection market. This report does not include the market share of all vendors, but it presents a list of key vendors and their detailed analysis.

The major drivers influencing the growth of the market, and the challenges faced by vendors and the market as a whole, are also covered. We also examine key trends emerging in the market and assess their impact on current and future market scenarios.

Technavio's report, Global Specialized Threat Analysis and Protection Market 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the Americas, APAC, and EMEA; it also covers the global specialized threat analysis and protection market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Regions

  • Americas
  • APAC
  • EMEA

Key Vendors

  • Check Point Software Technologies
  • Cisco Systems
  • EMC²
  • Fortinet
  • McAfee
  • Palo Alto Networks
  • Symantec
  • Trend Micro

Other Prominent Vendors

  • AhnLab
  • Bain Capital
  • Bromium
  • CounterTack
  • Cylance
  • Damballa
  • FireEye
  • Invincea
  • Norman ASA
  • Palo Alto Networks
  • ProofPoint
  • Raytheon
  • ThreatTrack Security

Market Driver

  • Need to Enhance Quality of Protection
  • For a full, detailed list, view our report

Market Challenge

  • High Cost of Deployment
  • For a full, detailed list, view our report

Market Trend

  • Popularity of SaaS-based Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Scope

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Summary of Figures

  • 05.1. Summary of Key Figures by Geographical Segmentation

06. Market Insights

07. Introduction

08. Market Description

  • 08.1. Types of Threats
    • 08.1.1. Trojan
    • 08.1.2. Virus
    • 08.1.3. Worms
    • 08.1.4. Adware
    • 08.1.5. Keylogger
    • 08.1.6. Backdoor
    • 08.1.7. Exploit
    • 08.1.8. Dropper
    • 08.1.9. Phishing
    • 08.1.10. Cookies
    • 08.1.11. Bluesnarfing
    • 08.1.12. Boot Sector Virus
    • 08.1.13. Mousetrapping
    • 08.1.14. Browser Hijackers
    • 08.1.15. Obfuscated Spam
    • 08.1.16. Crimeware
  • 08.2. Consequences of Security Threats
  • 08.3. Need for STAP
  • 08.4. Detection Techniques of STAP
    • 08.4.1. Sandboxing
    • 08.4.2. Emulation
    • 08.4.3. Big Data Analysis
    • 08.4.4. Containerization
  • 08.5. Functionalities Involved in STAP
    • 08.5.1. Endpoint Security
    • 08.5.2. Web Security
    • 08.5.3. Messaging Security
    • 08.5.4. Network Security
    • 08.5.5. Security Management
    • 08.5.6. Vulnerability Management
    • 08.5.7. Cloud-based Security
  • 08.6. Components of STAP
    • 08.6.1. Identity and Access Management
    • 08.6.2. Encryption
    • 08.6.3. Intrusion Detection and Prevention
    • 08.6.4. Advanced Security Software

09. Market Landscape

  • 09.1. Market Overview
  • 09.2. Product Life Cycle Analysis
  • 09.3. Global STAP Market
    • 09.3.1. Market Size and Forecast
  • 09.4. Five Forces Analysis

10. Geographical Segmentation

  • 10.1. Global STAP Market by Geography 2014-2019
  • 10.2. Global STAP Market by Geography 2014-2019(Revenue)
    • 10.2.1. STAP Market in Americas
    • 10.2.2. STAP Market in EMEA
    • 10.2.3. STAP Market in APAC

11. Buying Criteria

12. Market Growth Drivers

13. Drivers and their Impact

14. Market Challenges

15. Impact of Drivers and Challenges

16. Market Trends

    • 16.1.1. Mergers and Acquisitions

17. Trends and their Impact

18. Vendor Landscape

  • 18.1. Competitive Scenario
  • 18.2. News Updates
    • 18.2.1. Key News
  • 18.3. List of Key Vendors 2014
  • 18.4. Description of Key Vendors
    • 18.4.1. Check Point Software Technologies
    • 18.4.2. Cisco Systems
    • 18.4.3. EMC²
    • 18.4.4. Fortinet
    • 18.4.5. McAfee
    • 18.4.6. Palo Alto Networks
    • 18.4.7. Symantec
    • 18.4.8. Trend Micro
  • 18.5. Other Prominent Vendors

19. Key Vendor Analysis

  • 19.1. Check Point Software Technologies
    • 19.1.1. Key Facts
    • 19.1.2. Business Overview
    • 19.1.3. Business Strategy
    • 19.1.4. Recent Developments
    • 19.1.5. SWOT Analysis
  • 19.2. Cisco Systems
    • 19.2.1. Key Facts
    • 19.2.2. Business Overview
    • 19.2.3. Business Segmentation by Revenue
    • 19.2.4. Geographical Segmentation by Revenue
    • 19.2.5. Business Strategy
    • 19.2.6. Key Information
    • 19.2.7. SWOT Analysis
  • 19.3. EMC²
    • 19.3.1. Key Facts
    • 19.3.2. Business Overview
    • 19.3.3. Business Segmentation by Revenue 2013
    • 19.3.4. Business Segmentation by Revenue 2012 and 2013
    • 19.3.5. Geographical Segmentation by Revenue 2013
    • 19.3.6. Business Strategy
    • 19.3.7. Recent Developments
    • 19.3.8. SWOT Analysis
  • 19.4. Fortinet
    • 19.4.1. Key Facts
    • 19.4.2. Business Overview
    • 19.4.3. Business Segmentation by Revenue
    • 19.4.4. Business Segmentation by Revenue
    • 19.4.5. Geographical Segmentation by Revenue
    • 19.4.6. Business Strategy
    • 19.4.7. Key Information
    • 19.4.8. Recent Developments
    • 19.4.9. SWOT Analysis
  • 19.5. McAfee
    • 19.5.1. Key Facts
    • 19.5.2. Business Overview
    • 19.5.3. Product Segmentation
    • 19.5.4. Key Locations
    • 19.5.5. Business Strategy
    • 19.5.6. Recent Developments
    • 19.5.7. SWOT Analysis
  • 19.6. Symantec
    • 19.6.1. Key Facts
    • 19.6.2. Business Overview
    • 19.6.3. Business Segmentation by Revenue 2013
    • 19.6.4. Business Segmentation by Revenue 2013 and 2014
    • 19.6.5. Geographical Segmentation by Revenue 2013
    • 19.6.6. Business Strategy
    • 19.6.7. Recent Developments
    • 19.6.8. SWOT Analysis
  • 19.7. Trend Micro
    • 19.7.1. Key Facts
    • 19.7.2. Business Overview
    • 19.7.3. Geographical Segmentation by Revenue 2012 and 2013
    • 19.7.4. Geographical Segmentation by Revenue 2013
    • 19.7.5. Business Strategy
    • 19.7.6. Recent Developments
    • 19.7.7. SWOT Analysis

20. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Summary of Key Figures by Geographical Segmentation 2014-2019
  • Exhibit 3: Consequences of Security Threats
  • Exhibit 4: Detection Techniques of STAP
  • Exhibit 5: Functionalities Involved in STAP
  • Exhibit 6: Components of STAP
  • Exhibit 7: Product Life Cycle Analysis
  • Exhibit 8: Global STAP Market 2014-2019 ($ millions)
  • Exhibit 9: Global STAP Market by Geography 2014-2019
  • Exhibit 10: Global STAP Market by Geography 2014-2019 ($ millions)
  • Exhibit 11: List of Key Vendors 2014
  • Exhibit 12: Business Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 13: Business Segmentation of Cisco Systems by Revenue 2011-2013 ($ billions)
  • Exhibit 14: Geographical Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 15: Emc²: Business Segmentation by Revenue 2013
  • Exhibit 16: Emc²: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 17: Geographical Segmentation by Revenue 2013
  • Exhibit 18: Fortinet: Business Segmentation by Revenue 2013
  • Exhibit 19: Fortinet: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 20: Fortinet: Geographical Segmentation by Revenue 2013
  • Exhibit 21: McAfee: Product Segmentation 2013
  • Exhibit 22: McAfee: Key Locations
  • Exhibit 23: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 24: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ millions)
  • Exhibit 25: Symantec: Geographical Segmentation by Revenue 2013
  • Exhibit 26: Trend Micro: Geographical Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 27: Trend Micro: Geographical Segmentation by Revenue 2013
Back to Top