Cover Image
市場調查報告書

全球防禦網路入侵·安全市場未來趨勢

Global Threat Intelligence Security Market 2014-2018

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 312959
出版日期 內容資訊 英文 75 Pages
訂單完成後即時交付
價格
Back to Top
全球防禦網路入侵·安全市場未來趨勢 Global Threat Intelligence Security Market 2014-2018
出版日期: 2014年09月17日 內容資訊: 英文 75 Pages
簡介

所謂防禦網路入侵是為了阻礙APT攻擊和高度惡意程式,以及其他新品種更高度的威脅(其定義仍然不明,或高延遲性·適應性),而由安全·供應商所提供的安全服務。這種新伺服器攻擊由於傳統型安全解決方案無法處理,而需要更高智能的系統。TIS是由各種供應商(ICT供應商,安全供應商,MSSP供應商等)來供給以雲端為主的服務。主要的服務內容為管理·安全服務、資訊發送服務、顧問服務等。由於電腦網路攻擊的種類數持續增加,全球各國企業的認知度也持續上升。而公司內部安全團隊又無法充分處理,這個認知在各企業中不斷擴大,讓更多企業開始尋求不只可察測到攻擊也可防止潛在性攻擊的解決方案供應商之趨勢。全球防禦網路入侵安全市場預測從2013年到2018年將以14.2%CAGR的速度成長。

本報告提供全球的防禦網路入侵·安全(以下簡稱TIS)市場相關分析,提供您市場概要和結構,市場規模趨勢(今後5年的預測值),各地區的詳細趨勢,推動、阻礙市場要素與其影響力,主要企業簡介,今後的市場機會等調查、考察。

第1章 摘要整理

第2章 簡稱集

第3章 分析範圍

  • 市場概要
  • 主要的產品與服務

第4章 市場分析技術

  • 市場分析的流程
  • 分析方法

第5章 簡介

第6章 市場概要

  • 防禦網路入侵·系統

第7章 市場環境

  • 市場概況
  • 主要的前提條件
    • TIS服務的產品生命週期
  • 全球防禦網路入侵·安全(TIS)市場
    • 市場規模與其預測
  • 波特的五力分析

第8章 服務內容別的市場分析

  • 管理·安全服務市場
  • 資訊提供·服務提供市場
  • 諮詢服務市場

第9章 各地區的分析

第10章 購買標準

第11章 促進市場成長的要素

第12章 推動因素與其影響力

第13章 市場課題

第14章 推動因素·課題的影響力

第15章 市場趨勢

第16章 市場趨勢與其影響

第17章 供應商環境

  • 競爭方案
  • 市場佔有率分析
  • 其他的著名供應商

第18章 主要供應商分析

  • IBM
    • 主要資料
    • 產業概要
    • 各部門的銷售額
    • 各地區的銷售額
    • 產業策略
    • 近幾年趨勢
    • SWOT分析
  • McAfee
  • Symantec
  • Trend Micro

第19章 其他相關分析

圖表一覽

目錄
Product Code: IRTNTR4260

About Threat Intelligence

Threat intelligence is a security service given by security vendors to thwart advanced attacks such as APT, advanced malware, and other new breeds of sophisticated threats that have unknown signatures and are slow and adaptive. These new breeds of cyber-attacks are immune to traditional security solutions and hence the need for a proactive, intelligent system to prevent attacks. Threat intelligence service is largely given as a service through cloud by vendors that range from ICT vendors, security vendors, and MSSP providers. The service offerings typically are of three types: TIS Managed Security Services, TIS Information Feeds and Publications, and TIS Consultative Services. As the number of cyber-attacks continue to increase, the level of awareness in organizations across geographies also rises. As organizations realize that in-house security teams are not competent enough, considering the level of sophistication in attacks by hackers, this leads to increased look-up to vendors that give solutions not only just to detect but also prevent any possible attack.

TechNavio's analysts forecast the Global Threat Intelligence Security Market to grow at a CAGR of 14.2 percent over the period 2013-2018.

Covered in this Report

This report covers the present scenario and the growth prospects of the Global Threat Intelligence Security market for the period 2013-2018. To calculate the market size, the report considers revenue generated from the security services provided by TIS vendors. It also presents the vendor landscape and corresponding detailed analysis of the top four vendors in the market. In addition, the report discusses the major drivers that influence the growth of the Global Threat Intelligence Security market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends that are emerging in the market.

Key Regions

  • Americas
  • EMEA
  • APAC

Key Vendors

  • IBM
  • McAfee
  • Symantec
  • Trend Micro

Other Prominent Vendors

  • Accenture
  • Arbor Networks
  • Cyveillance
  • Dell SecureWorks
  • Deloitte
  • Ernest & Young
  • HP
  • Juniper Networks
  • Secunia
  • Webroot

Market Driver

  • Rise in Number of Sophisticated Threats

For a full, detailed list, view our report

Market Challenge

  • Shortage of Security Talent

For a full, detailed list, view our report

Market Trend

  • Enhancements in Threat Intelligence Process

For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2018 and what will the growth rate be
  • What are the key market trends
  • What is driving this market
  • What are the challenges to market growth
  • Who are the key vendors in this market space
  • What are the market opportunities and threats faced by the key vendors
  • What are the strengths and weaknesses of the key vendors

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview
  • 03.2. Service Offerings

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1.1. Threat Intelligence System

07. Market Landscape

  • 07.1. Market Overview
  • 07.2. Key Assumptions
    • 07.2.1. Product Life Cycle of TIS Service Offerings
  • 07.3. Global Threat Intelligence Security Market
    • 07.3.1. Market Size and Forecast
  • 07.4. Five Forces Analysis

08. Market Segmentation by Offerings

  • 08.1. Global TIS Managed Security Services Market
    • 08.1.1. Market Size and forecast
  • 08.2. Global TIS Information Feeds and Publications Market
    • 08.2.1. Market Size and Forecast
  • 08.3. Global TIS Consultative Services Market
    • 08.3.1. Market Size and Forecast

09. Geographical Segmentation

10. Buying Criteria

11. Market Growth Drivers

12. Drivers and their Impact

13. Market Challenges

14. Impact of Drivers and Challenges

15. Market Trends

16. Trends and their Impact

17. Vendor Landscape

  • 17.1. Competitive Scenarios
  • 17.2. Market Share Analysis 2013
  • 17.3. Other Prominent Vendors

18. Key Vendor Analysis

  • 18.1. IBM
    • 18.1.1. Key Facts
    • 18.1.2. Business Overview
    • 18.1.3. Business Segmentation
    • 18.1.4. Business Segmentation by Revenue 2013
    • 18.1.5. Business Segmentation by Operation in 2013
    • 18.1.6. Business Segmentation by Revenue 2012 and 2013
    • 18.1.7. Geographical Segmentation by Revenue 2013
    • 18.1.8. Business Strategy
    • 18.1.9. Recent Developments
    • 18.1.10. SWOT Analysis
  • 18.2. McAfee
    • 18.2.1. Key Facts
    • 18.2.2. Business Overview
    • 18.2.3. Product Segmentation
    • 18.2.4. Key Locations
    • 18.2.5. Business Strategy
    • 18.2.6. Recent Developments
    • 18.2.7. SWOT Analysis
  • 18.3. Symantec
    • 18.3.1. Key Facts
    • 18.3.2. Business Overview
    • 18.3.3. Business Segmentation by Revenue 2013
    • 18.3.4. Business Segmentation by Revenue 2013 and 2014
    • 18.3.5. Geographical Segmentation by Revenue 2013
    • 18.3.6. Business Strategy
    • 18.3.7. Recent Developments
    • 18.3.8. SWOT Analysis
  • 18.4. Trend Micro
    • 18.4.1. Key Facts
    • 18.4.2. Business Overview
    • 18.4.3. Geographical Segmentation by Revenue 2012 and 2013
    • 18.4.4. Geographical Segmentation by Revenue 2013
    • 18.4.5. Business Strategy
    • 18.4.6. Recent Developments
    • 18.4.7. SWOT Analysis

19. Other Reports in this Series

List of Exhibits:

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Threat Intelligence System Framework
  • Exhibit 3: Overview of Global Threat Intelligence Security Market
  • Exhibit 4: Product Life Cycle of TIS Service Offerings
  • Exhibit 5: Global Threat Intelligence Security Market 2013-2018 (US$ million)
  • Exhibit 6: Global Threat Intelligence Security Market by Type of Offerings 2013
  • Exhibit 7: Global Threat Intelligence Security Market by Type of Offerings 2013-2018
  • Exhibit 8: Global TIS Managed Security Services Market 2013-2018 (US$ million)
  • Exhibit 9: Global TIS Information Feeds and Publications Market 2013-2018 (US$ million)
  • Exhibit 10: Global TIS Consultative Services Market 2013-2018 (US$ million)
  • Exhibit 11: Global Threat Intelligence Security Market by Geographical Segmentation 2013
  • Exhibit 12: Global Threat Intelligence Security Market by Geographical Segmentation 2013-2018
  • Exhibit 13: Global Threat Intelligence Security Market by Geographical Segmentation 2013-2018 (US$ million)
  • Exhibit 14: IBM: Business Segmentation
  • Exhibit 15: IBM: Business Segmentation by Revenue 2013
  • Exhibit 16: IBM: Business Segmentation by Operation in 2013
  • Exhibit 17: IBM: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 18: IBM: Geographical Segmentation by Revenue 2013
  • Exhibit 19: McAfee: Product Segmentation 2013
  • Exhibit 20: McAfee: Key Locations
  • Exhibit 21: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 22: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
  • Exhibit 23: Symantec: Geographical Segmentation by Revenue 2013
  • Exhibit 24: Trend Micro: Geographical Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 25: Trend Micro: Geographical Segmentation by Revenue 2013
Back to Top