Cover Image
市場調查報告書

電腦網路犯罪和安全性的今後:金融機關及企業的威脅與降低 (2015-2020年)

The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022

出版商 Juniper Research 商品編碼 329757
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
Back to Top
電腦網路犯罪和安全性的今後:金融機關及企業的威脅與降低 (2015-2020年) The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022
出版日期: 2017年04月25日 內容資訊: 英文
簡介

本報告提供在電子商務和行動電子商務等之中面臨的電腦網路犯罪的威脅和企業應採取對策的相關調查、目前電腦網路犯罪趨勢、電腦網路犯罪主要的類型和特徵、今後發展的預測和迴避策略、資料洩漏的成本預測和各地區的明細等相關彙整。

第1章 摘要整理

  • 簡介
  • 定義
  • 電腦網路犯罪趨勢
  • 電腦網路金融犯罪趨勢、威脅
  • 設備基礎的電腦網路犯罪趨勢、威脅
  • 電腦網路犯罪的成本
  • 建議

第2章 簡介:電腦網路犯罪

  • 簡介
  • 定義
  • 電腦網路犯罪趨勢
    • 電腦網路犯罪模式的成熟
    • 成為標的零售業
    • 成為全球規模的電腦網路犯罪
    • 變專門的駭客行為
  • 電腦網路犯罪的成本
    • 各產業變化
    • 預測手法
    • 預測的前提條件與法規
    • 資料洩漏的預測
      • 電腦網路犯罪相關的資料洩漏量

第3章 電腦網路金融犯罪趨勢及威脅

  • 簡介
  • 電腦網路犯罪和金融業
    • 社交工程的重要性
    • 電腦網路金融犯罪的類型
    • 金融上的威脅評估
      • 銀行
      • 付款、匯款
      • 行動電子錢包
    • 要點

第4章 設備基礎的電腦網路犯罪趨勢及威脅

  • 簡介
  • 非常小的行動惡意程式
    • 設備電腦網路犯罪的類型
    • 設備上的威脅分析
      • 智慧型手機
      • 穿戴式 & IoT
    • 要點

圖表

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

Overview

The Future of Cybercrime & Security provides a thorough examination of the current market environment and threat landscape for cybersecurity. The research presents need-to-know information on the state of cybersecurity legislation, key player strategies and overall trends affecting the market, focusing on the following areas:

  • Endpoint security
  • Network security
  • Cloud security
  • IoT security

The research includes:

  • Market Trends & Opportunities (PDF)
  • 5 Year Market Sizing & Forecast spreadsheet (Excel)

Key Features

  • Threat Landscape: See what the main cyber threats are facing enterprises and consumers in 2017 and beyond.
  • Market Dynamics: Strategic assessment of the current market landscape, examining future developments and funding opportunities across the cybersecurity market.
  • Juniper Leaderboard & Vendor Analysis: Key player capability and capacity assessment for 20 enterprise cybersecurity providers, split by:
    • Endpoint & Network Security Leaderboard
    • Cloud & IoT Cybersecurity Leaderboard
  • Interviews with leading players, including:
    • Barracuda Networks
    • Cylance
    • Firemon
    • Giesecke & Devrient
    • Herjavec Group
    • SAS
    • Synack
  • Market Sizing: Five-year forecasts for both the cost of cybersecurity data breaches and levels of enterprise cybersecurity spending.

Key Questions

  • 1. How are the key players in cybersecurity players reacting to the latest market developments?
  • 2. What are the main threats cybersecurity must address in future?
  • 3. How much and where will cybersecurity spending increase in the coming years?
  • 4. What are governments doing to support greater cybersecurity?
  • 5. What is the cost of criminal data breaches and how will this change in future?

Companies Referenced

  • Interviewed: Barracuda Networks, Cylance, FireMon, G+D (Giesecke + Devrient), Herjavec Group, Indegy, SAS Cybersecurity, Synack.
  • Profiled: Barracuda Networks, Carbon Black, CipherCloud, Cylance, Darktrace, FireEye, Forcepoint, G+D (Giesecke + Devrient), IBM, Indegy, Netskope, PatternEx, SentryBay, Symantec, Tanium, Webroot.
  • Case Studied: Herjavec Group, SAS Cybersecurity.
  • Mentioned: Accenture, Aeris, Akamai, Amazon, Apple, Aspediens, Avancial, Belden, BH Global, BlackBerry, Bundesdruckerei, Cisco, Citrix, CMS Distribution, Conosco, Dell, Deloitte, Dyn, Ericsson, Fortscale, Hewlett-Packard, Huawei, Infineon, Intel, Intronis, iSight Partners, Juniper Networks, McAfee, Metro Bank, Microsoft, MIT, Netwrix, Otono Networks, Palo Alto Networks, Peugeot, Phireserve, Proofpoint, Prudential, PwC, Qualys, Raytheon, Samsung, SAP, Secunet, SecureWorks, ServiceNow, Siemens, SignNow, Skycure, Splunk, Telefónica, Telstra, Tenable Network Security, The Carlyle Group, The Weather Company, Toyota, Trend Micro, Veridos, Verisign, Veritas, Verizon, Virgin, Visa, Wibu-Systems, Yahoo, ZScaler.

Data & Interactive Forecast

Juniper's The Future of Cybercrime & Security forecast suite includes:

  • Cybersecurity spend forecast splits for 8 key regions
  • Data breach volume and value forecast splits for 8 key regions
  • Interactive Scenario tool allowing user the ability to manipulate Juniper's data for 12 different metrics.
  • Access to the full set of forecast data of more than 31 tables and over 1600 datapoints.

Juniper Research's highly granular interactive excels enable clients to manipulate Juniper's forecast data and charts to test their own assumptions using the Interactive Scenario Tool; and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

1. Cybercrime & Cybersecurity: Key Takeaways

  • 1.1. Cybercrime Key Takeaways
  • 1.2. Cybersecurity Key Takeaways

2. Cybercrime: Introduction & Market Trends

  • 2.1. Introduction
    • Figure 2.1: Total Connected Devices Installed Base (m), Split by Category, 2014-2021
  • 2.2. Definitions & Typology
    • 2.2.1. Attack Types
      • i. DoS & DDoS
      • ii. Phishing
      • iii. Trojans
      • iv. Keylogging
      • v. MITM Attacks
      • vi. Scrapers & Skimmers
      • vii. Ransomware
      • viii. Botnets
    • 2.2.2. Incident Types
    • 2.2.3. Motivations
  • 2.3. Cybercrime Trends
    • 2.3.1. Social Engineering is Still Key
    • 2.3.2. Ransomware Comes of Age
    • 2.3.3. Vintage CVEs Going Strong
      • Figure 2.2: Count of CVEs Exploited in 2015 by CVE Publication Date
    • 2.3.4. Social Media Platforms are a Malicious Actor Toolbox
    • 2.3.5. DoS is a Changing Threat & Distraction
      • i. IoT DDoS
    • 2.3.6. Malware is Transient
    • 2.3.7. Non-Malware Attacks on the Rise
      • i. Case Study: Herjavec Group
      • ii. Case Study: SAS Cybersecurity
        • Figure 2.3: SAS Cybersecurity Platform Layers
    • 2.3.8. Cybersecurity Moral Hazard
      • i. Insurance Liability Shift to Software Providers
  • 2.4. Juniper Cybercrime Threat Assessments
    • 2.4.1. Financial Threat Assessments
      • i. Banking
        • Figure 2.4: Juniper Research Banking Cybercrime Threat Landscape Assessment
        • Figure 2.5: Juniper Banking Cybercrime Threat Landscape Forecast
          • ii. Payments & Money Transfer
        • Figure 2.6: Juniper Payments and Money Transfer Cybercrime Threat Landscape Assessment
        • Figure 2.7: Juniper Payments and Money Transfer Cybercrime Threat Landscape Forecast
        • Figure 2.8: Juniper Mobile Wallets Cybercrime Threat Landscape Assessment
        • Figure 2.9: Juniper Mobile Wallets Cybercrime Threat Landscape Forecast
    • 2.4.2. Device Threat Assessment
      • Figure 2.10: Juniper Device Cybercrime Threat Landscape Assessment
      • Figure 2.11: Juniper Device Cybercrime Threat Landscape Forecast

3. Cyber security Market Trends

  • 3.1. Introduction
  • 3.2. State Funding & Legislative Environments in Key Markets
    • 3.2.1. North America
      • i. us
      • ii. Canada
    • 3.2.2. Europe
      • i. EU
      • ii. Russia
      • iii. The UK
    • 3.2.3. Far East & China
      • i. China
      • ii. Japan
    • 3.2.4. Indian Subcontinent
      • i. India
    • 3.2.5. Rest of Asia Pacific
      • i. Australia
      • ii. Singapore
  • 3.3. Business Environment
    • 3.3.1. Access & Identity Management
    • 3.3.2. Cloud Security
    • 3.3.3. Network & Endpoint Security
    • 3.3.4. Threat Intelligence
    • 3.3.5. Cybersecurity Investment Landscape
      • i. Investments
        • Figure 3.1: Total Disclosed Cybersecurity Investment Value per annum ($m) & Average Investment Value ($m), 2010-2016
      • ii. M&As (Mergers & Acquisitions)
        • Figure 3.2: Number of Cybersecurity Mergers & Acquisitions per annum, 2010-2016
  • 3.4. Cybersecurity Movers & Shakers

4. Cybersecurity Market Forecasts

  • 4.1. Market Sizing & Forecasts: Methodology
    • 4.1.1. Data Breaches
      • Figure 4.1: Criminal Data Breach Forecast Methodology
      • i. Forecast Assumptions & Limitations of Analysis
    • 4.1.2. Cybersecurity Spend Forecast Methodology
      • Figure 4.2: Cybersecurity Spend Forecast Methodology
      • i. Forecast Assumptions & Limitations of Analysis
  • 4.2. Cybercrime Breaches Forecasts
    • 4.2.1. Breaches Volume
      • Figure & Table 4.3: Total Number of Criminal Data Breaches per annum, Split by 8 Key Regions 2017-2022
    • 4.2.2. Breaches Value
      • Figure & Table 4.4: Cost of Criminal Data Breaches per annum ($m), Split by 8 Key Regions 2017-2022
  • 4.3. Cybersecurity Market Forecasts
    • Figure & Table 4.5: Total Cybersecurity Spend per annum ($m), Split by Business Size 201 7-2022

5. Network & Endpoint Cybersecurity: Competitive Landscape & Leaderboard

  • 5.1. Introduction
  • 5.2. Vendor Analysis & Juniper Leaderboard
    • 5.2.1. Network & Endpoint Cybersecurity Vendors
    • 5.2.2. Stakeholder Assessment Criteria
      • Table 5.1: Stakeholder Capability Assessment Criteria
  • 5.3. Juniper Leaderboard for Network & Endpoint Cybersecurity
    • Figure 5.2: Network & Endpoint Cybersecurity Providers Leaderboard
    • Table 5.3: Network & Endpoint Cybersecurity Providers Leaderboard Scoring
    • 5.3.1. Vendor Groupings
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 5.3.2. Limitations & Interpretation
  • 5.4. Vendor Profiles
    • 5.4.1. Barracuda Networks
      • i. Corporate Profile
        • Table 5.4: Barracuda Networks Financial Snapshot ($m) FY2014-2017
        • Table 5.5: Barracuda Networks Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.2. Carbon Black
      • i. Corporate Profile
        • Table 5.6: Carbon Black Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.3. Cylance
      • i. Corporate Profile
        • Table 5.7: Cylance Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.4. DarkTrace
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.5. FireEye
      • i. Corporate Profile
        • Table 5.8: FireEye Financial Snapshot ($m) 2013-2015
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.6. PatternEx
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.7. SentryBay
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
        • Figure 5.11: Selection of SentryBay Partners
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.8. Symantec
      • i. Corporate Profile
        • Table 5.12: Symantec Financial Snapshot ($m) FY2014-2016
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.9. Tanium
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 5.4.10. Webfoot
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Endpoint Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities

6. Cloud & IoT Cybersecurity: Competitive Landscape & Leaderboard

  • 6.1. Introduction
  • 6.2. Vendor Analysis & Juniper Leaderboards
    • 6.2.1. Cloud & IoT Cybersecurity Vendors
    • 6.2.2. Stakeholder Assessment Criteria
      • Table 6.1: Stakeholder Capability Assessment Criteria
  • 6.3. Juniper Leaderboard for Cloud & IoT Cybersecurity
    • Figure 6.2: Cloud & IoT Cybersecurity Providers Leaderboard
    • Table 6.3: Cloud & IoT Cybersecurity Providers Leaderboard Scoring
    • 6.3.1. Vendor Groupings
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 6.3.2. Limitations & Interpretation
  • 6.4. Vendor Profiles
    • 6.4.1. CipherCloud
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.2. Forcepoint
      • i. Corporate Profile
        • Table 6.4: Raytheon & Forcepoint Net Income ($m) 2014-2016
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
        • Figure 6.5: Selection of Forcepoint Security AIliance Partners
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.3. G+D (Giesecke + Devrient)
      • i. Corporate Profile
        • Table 6.6: G+D Financial Snapshot FY 2014-2016(€m)
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of 0fierings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.4. IBM
      • i. Corporate Profile
        • Table 6.7: IBM Financial Snapshot ($m) FY 2014-2016
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.5. Indegy
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of 0rferings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.6. Netskope
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of 0rferings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.7. SentryBay
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
        • Figure 5.11: Selection of SentryBay Partners
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 6.4.8. Symantec
      • i. Corporate Profile
        • Table 5.12: Symantec Financial Snapshot ($m) FY2014-2016
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
Back to Top