Cover Image
市場調查報告書

網路安全的北美市場:2015年∼2019年

Cyber Security Market in North America 2015-2019

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 332620
出版日期 內容資訊 英文 128 Pages
訂單完成後即時交付
價格
Back to Top
網路安全的北美市場:2015年∼2019年 Cyber Security Market in North America 2015-2019
出版日期: 2015年06月10日 內容資訊: 英文 128 Pages
簡介

網路安全解決方案,是企業為了保持IT系統的機密性,監視、檢測、報告、反擊電腦網路威脅。北美的網路安全市場,預計2014年∼2019年以7.32%的年複合成長率增加。

本報告提供北美的網路安全市場相關調查分析,市場規模與成長率、市場趨勢、市場的推動要素與課題、市場機會驗證、主要供應商等相關的系統性資訊。

第1章 摘要整理

第2章 簡稱清單

第3章 調查範圍

  • 市場概要
  • 產品和服務

第4章 市場調查手法

  • 市場調查流程
  • 調查手法

第5章 簡介

第6章 市場考察

  • 全球統計
  • 北美的統計
  • 全球電腦網路犯罪
  • 北美的電腦網路犯罪
  • 全球網際網路普及率
  • 北美的網際網路普及率
  • 全球網路用戶
  • 北美的網路用戶:各國
  • 全球網路用戶:各設備
  • 電腦網路威脅的層級
  • 全球網路安全市場:威脅的各類型
  • 電腦網路攻擊的結果
  • 電腦網路威脅對企業的BYOD引進的影響
  • 全球的大規模的資料洩漏
  • 北美的大規模的資料洩漏
  • 釣魚攻擊的犧牲者

第7章 網路安全的必要性

第8章 標的電腦網路攻擊:行動裝置

第9章 北美的電腦網路攻擊

第10章 市場概要

  • 電腦網路威脅的種類
  • 網路安全解決方案的階段
  • 網路安全解決方案的優點
  • 網路安全解決方案的優點

第11章 市場形勢

  • 市場概要
  • 產品生命週期分析
  • 全球網路安全市場
  • 北美的網路安全市場
  • 全球網路安全市場上北美的佔有率
  • 波特的五力分析

第12章 市場區隔:各終端用戶

  • 各終端用戶

第13章 購買標準

第14章 推動市場成長要素

第15章 推動因素與其影響

第16章 市場課題

第17章 推動因素與課題的影響

第18章 市場趨勢

第19章 趨勢與其影響

第20章 業者情勢

  • 競爭模式
  • 供應商新聞和最新資訊
  • 主要供應商的清單
  • 供應商比較
  • 主要供應商概要
  • 其他卓越供應商

第21章 其他卓越供應商概要

  • BAE Systems
  • Brocade Communications Systems
  • Check Point Software Technologies
  • EMC2
  • HP
  • IBM
  • Juniper Networks
  • Kaspersky Lab
  • L-3 Communications
  • Lockheed Martin
  • Palo Alto Networks

第22章 主要供應商分析

  • Booz Allen Hamilton
  • Cisco Systems
  • CSC
  • Fortinet
  • General Dynamics
  • McAfee
  • Northrop Grumman
  • Symantec

第23章 市場要點

第24章 相關報告

圖表

目錄
Product Code: IRTNTR6094

About Cyber Security

Cyber security solutions help organizations monitor, detect, report, and counter cyber threats to maintain the confidentiality of IT systems. Internet penetration in emerging countries and usage of smartphones, tablets, and laptops and mobile apps have given rise to complex cyber-attacks on IT infrastructure. This has become a major concern for countries in North America. Organizations in North America need to adopt cyber security solutions to ensure the security of critical information stored on computer systems or digital memory devices.

Adoption of cloud services, wireless technologies, and accessing social media websites within organizations in North America have brought high level of risk in terms cyber threats. The growing complexities of cyber-attacks are prompting organizations in the government, BFSI, retail, telecom, and manufacturing sectors to adopt cyber security solutions to ensure security of critical information stored on their network servers or data centers. For instance, JPMorgan Chase was affected by data breach in 2014; hackers attempted to access its servers and gained access to the names, addresses, emails, and telephone numbers including savings account information of nearly 83 million customers.

Technavio's analysts forecast the cyber security market in North America to grow at a CAGR of 7.32% over the period 2014-2019.

Covered in this Report

The report covers the present scenario and the growth prospects of the cyber security market in North America for the period 2015-2019. To calculate the market size, the report considers revenue generated from the sales of cyber security solutions in North America. The market is highly fragmented with the presence of several small and large vendors. The report does not include the market share of all vendors; it only presents a list of key vendors and their corresponding detailed analysis.

Technavio's report, Cyber Security Market in North America 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in the market.

Key Vendors

  • Booz Allen Hamilton
  • Cisco Systems
  • CSC
  • Fortinet
  • General Dynamics
  • McAfee
  • Northrop Grumman
  • Symantec

Other Prominent Vendors

  • BAE Systems
  • Brocade Communications Systems
  • Check Point Software Technologies
  • EMC
  • HP
  • IBM
  • Juniper Networks
  • Kaspersky Lab
  • L-3 Communications
  • Lockheed Martin
  • McAfee
  • Palo Alto Networks
  • Raytheon

Market Driver

  • Growing Use of Mobile Devices
  • For a full, detailed list, view our report

Market Challenge

  • High Deployment Cost
  • For a full, detailed list, view our report

Market Trend

  • Demand for Cloud-based Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

1. Executive Summary

2. List of Abbreviations

3. Scope of the Report

  • 3.1. Market Overview

4. Market Research Methodology

  • 4.1. Market Research Process
  • 4.2. Research Methodology

5. Introduction

6. Market Insights

  • 6.1. Global Statistics 2014
  • 6.2. North America Statistics 2014
  • 6.3. Global Cybercrime 2014
  • 6.4. Cybercrime in North America 2014
  • 6.5. Global Internet Penetration
  • 6.6. Internet Penetration in North America
  • 6.7. Worldwide Internet Users
  • 6.8. Internet Users in North America by Country
  • 6.9. Global Internet Users by Devices
  • 6.1. Level of Cyber Threats
  • 6.11. Global Cyber Security Market by Type of Threat 2014
  • 6.12. Consequences of Cyber-attacks
  • 6.13. Impact of Cyber Threats on BYOD Adoption in Enterprises
  • 6.14. Major Global Data Breaches in 2014
  • 6.15. Major Data Breaches in North America in 2014
  • 6.16. Victims of Phishing Attacks 2014

7. Need for Cyber Security

8. Cyber-attacks: Targeting Mobile Devices

9. Cyber-attacks in North America 2014

10. Market Description

  • 10.1. Types of Cyber Threats
  • 10.2. Stages of Cybersecurity Solution
  • 10.3. Advantages of Cyber Security Solutions
  • 10.4. Benefits of Deployment of Cyber Security Solutions

11. Market Landscape

  • 11.1. Market Overview
  • 11.2. Product Life Cycle Analysis
  • 11.3. Global Cyber Security Market
    • 11.3.1. Market Size and Forecast
  • 11.4. Cyber Security Market in North America
    • 11.4.1. Market Size and Forecast
  • 11.5. Share of North America in Global Cyber Security Market in 2014
  • 11.6. Share of North America in Global Cyber Security Market 2014-2019
  • 11.7. Five Forces Analysis

12. Market Segmentation by End-user

  • 12.1. Cyber Security Market in North America by End-user 2014

13. Buying Criteria

14. Market Growth Drivers

15. Drivers and their Impact

16. Market Challenges

17. Impact of Drivers and Challenges

18. Market Trends

19. Trends and their Impact

20. Vendor Landscape

  • 20.1. Competitive Scenario
  • 20.2. Vendor News and Updates
    • 20.2.1. Key News
    • 20.2.2. Mergers and Acquisitions
  • 20.3. List of Key Vendors 2014
  • 20.4. Comparison of Vendors
    • 20.4.1. Comparison of Vendors Based on Geographical Presence
  • 20.5. Description of Key Vendors
    • 20.5.1. Booz Allen Hamilton
    • 20.5.2. Cisco Systems
    • 20.5.3. CSC
    • 20.5.4. Fortinet
    • 20.5.5. General Dynamics
    • 20.5.6. McAfee
    • 20.5.7. Northrop Grumman
    • 20.5.8. Symantec
  • 20.6. Other Prominent Vendors

21. Description of Other Prominent Vendors

  • 21.1. BAE Systems
    • 21.1.1. Strengths
    • 21.1.2. Weaknesses
  • 21.2. Brocade Communications Systems
    • 21.2.1. Strengths
    • 21.2.2. Weaknesses
  • 21.3. Check Point Software Technologies
    • 21.3.1. Strengths
    • 21.3.2. Weaknesses
  • 21.4. EMC²
    • 21.4.1. Strengths
    • 21.4.2. Weaknesses
  • 21.5. HP
    • 21.5.1. Strengths
    • 21.5.2. Weaknesses
  • 21.6. IBM
    • 21.6.1. Strengths
    • 21.6.2. Weaknesses
  • 21.7. Juniper Networks
    • 21.7.1. Strengths
    • 21.7.2. Weaknesses
  • 21.8. Kaspersky Lab
    • 21.8.1. Strengths
    • 21.8.2. Weaknesses
  • 21.9. L-3. Communications
    • 21.9.1. Strengths
    • 21.9.2. Weaknesses
  • 21.1. Lockheed Martin
    • 21.10.1. Strengths
    • 21.10.2. Weaknesses
  • 21.11. Palo Alto Networks
    • 21.11.1. Strengths
    • 21.11.2. Weaknesses

22. Key Vendor Analysis

  • 22.1. Booz Allen Hamilton
    • 22.1.1. Key Facts
    • 22.1.2. Business Overview
    • 22.1.3. Key Financials 2012-2014
    • 22.1.4. Business Strategy
    • 22.1.5. Recent Developments
    • 22.1.6. SWOT Analysis
  • 22.2. Cisco Systems
    • 22.2.1. Key Facts
    • 22.2.2. Business Overview
    • 22.2.3. Business Segmentation by Revenue
    • 22.2.4. Geographical Segmentation by Revenue
    • 22.2.5. Business Strategy
    • 22.2.6. Key Information
    • 22.2.7. SWOT Analysis
  • 22.3. CSC
    • 22.3.1. Key Facts
    • 22.3.2. Business Overview
    • 22.3.3. Business Segmentation by Revenue 2013
    • 22.3.4. Business Segmentation by Revenue 2012 and 2013
    • 22.3.5. Geographical Segmentation by Revenue 2013
    • 22.3.6. Business Strategy
    • 22.3.7. Recent Developments
    • 22.3.8. SWOT Analysis
  • 22.4. Fortinet
    • 22.4.1. Key Facts
    • 22.4.2. Business Overview
    • 22.4.3. Business Segmentation by Revenue
    • 22.4.4. Business Segmentation by Revenue
    • 22.4.5. Geographical Segmentation by Revenue
    • 22.4.6. Business Strategy
    • 22.4.7. Key Information
    • 22.4.8. Recent Developments
    • 22.4.9. SWOT Analysis
  • 22.5. General Dynamics
    • 22.5.1. Key Facts
    • 22.5.2. Business Overview
    • 22.5.3. Business Segmentation by Revenue 2013
    • 22.5.4. Business Segmentation by Revenue 2012 and 2013
    • 22.5.5. Geographical Segmentation by Revenue 2013
    • 22.5.6. Business Strategy
    • 22.5.7. Key Information
    • 22.5.8. SWOT Analysis
  • 22.6. McAfee
    • 22.6.1. Key Facts
    • 22.6.2. Business Overview
    • 22.6.3. Product Segmentation
    • 22.6.4. Key Locations
    • 22.6.5. Business Strategy
    • 22.6.6. Recent Developments
    • 22.6.7. SWOT Analysis
  • 22.7. Northrop Grumman
    • 22.7.1. Key Facts
    • 22.7.2. Business Overview
    • 22.7.3. Business Segmentation by Revenue 2013
    • 22.7.4. Business Segmentation by Revenue 2012 and 2013
    • 22.7.5. Business Strategy
    • 22.7.6. Key Developments
    • 22.7.7. SWOT Analysis
  • 22.8. Symantec
    • 22.8.1. Key Facts
    • 22.8.2. Business Overview
    • 22.8.3. Business Segmentation by Revenue 2013
    • 22.8.4. Business Segmentation by Revenue 2013 and 2014
    • 22.8.5. Geographical Segmentation by Revenue 2013
    • 22.8.6. Business Strategy
    • 22.8.7. Recent Developments
    • 22.8.8. SWOT Analysis

23. Market Takeaways

24. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Global Statistics 2014
  • Exhibit 3: North America Statistics 2014
  • Exhibit 4: Global Cybercrime 2014
  • Exhibit 5: Cybercrime in North America 2014
  • Exhibit 6: Global Internet Penetration
  • Exhibit 7: Internet Penetration in North America
  • Exhibit 8: Worldwide Internet Users 2000-2014 (billions)
  • Exhibit 9: Internet Users in North America by Country (millions of users)
  • Exhibit 10: Global Internet Users by Devices 2009-2014 (millions)
  • Exhibit 11: Level of Cyber Threats
  • Exhibit 12: Global Cyber Security Market by Type of Threat 2014
  • Exhibit 13: Consequences of Cyber-attacks
  • Exhibit 14: Global BYOD Adoption
  • Exhibit 15: Major Global Data Breaches in 2014
  • Exhibit 16: Major Data Breaches in North America in 2014
  • Exhibit 17: Victims of Phishing Attacks 2014
  • Exhibit 18: Stages of Cybersecurity Solution
  • Exhibit 19: Product Life Cycle Analysis
  • Exhibit 20: Global Cyber Security Market 2014-2019 ($ billions)
  • Exhibit 21: Cyber Security Market in North America 2014-2019 ($ billions)
  • Exhibit 22: Share of North America in Global Cyber Security Market in 2014
  • Exhibit 23: Share of North America in Global Cyber Security Market 2014-2019
  • Exhibit 24: Cyber Security Market in North America by End-user 2014-2019
  • Exhibit 25: List of Key Vendors 2014
  • Exhibit 26: Comparison of Vendors Based on Geographical Presence
  • Exhibit 27: Booz Allen Hamilton: Key Financials 2012-2014 ($ billions)
  • Exhibit 28: Business Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2011-2013 ($ billions)
  • Exhibit 30: Geographical Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 31: Computer Sciences: Business Segmentation by Revenue 2013
  • Exhibit 32: Computer Sciences: Business Segmentation by Revenue 2012 and 2013 ($ billions)
  • Exhibit 33: Computer Sciences: Geographical Segmentation by Revenue 2013
  • Exhibit 34: Fortinet: Business Segmentation by Revenue 2013
  • Exhibit 35: Fortinet: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 36: Fortinet: Geographical Segmentation by Revenue 2013
  • Exhibit 37: General Dynamics: Business Segmentation by Revenue 2013
  • Exhibit 38: General Dynamics: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 39: General Dynamics: Geographical Segmentation by Revenue 2013
  • Exhibit 40: McAfee: Product Segmentation 2013
  • Exhibit 41: McAfee: Key Locations
  • Exhibit 42: Northrop Grumman: Business Segmentation by Revenue 2013
  • Exhibit 43: Northrop Grumman: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 44: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 45: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ millions)
  • Exhibit 46: Symantec: Geographical Segmentation by Revenue 2013
Back to Top