Cover Image
市場調查報告書

網路安全的全球市場:至2022年的預測:IAM、加密、DLP、UTM、防毒/惡意程式對策、防火牆、IDS/IPS、災害復原、DDoS緩和、SIEM

Cybersecurity Market by Solution (IAM, Encryption, DLP, UTM, Antivirus/Anti-Malware, Firewall, IDS/IPS, Disaster Recovery, DDOS Mitigation, SIEM), Service, Security Type, Deployment Mode, Organization Size, Vertical, and Region - Global Forecast to 2022

出版商 MarketsandMarkets 商品編碼 245933
出版日期 內容資訊 英文 179 Pages
訂單完成後即時交付
價格
Back to Top
網路安全的全球市場:至2022年的預測:IAM、加密、DLP、UTM、防毒/惡意程式對策、防火牆、IDS/IPS、災害復原、DDoS緩和、SIEM Cybersecurity Market by Solution (IAM, Encryption, DLP, UTM, Antivirus/Anti-Malware, Firewall, IDS/IPS, Disaster Recovery, DDOS Mitigation, SIEM), Service, Security Type, Deployment Mode, Organization Size, Vertical, and Region - Global Forecast to 2022
出版日期: 2017年07月13日 內容資訊: 英文 179 Pages
簡介

全球網路安全市場,預計從2017年的1,378億5000萬美元,到2022年擴大到2,319億4000萬美元。預計市場2017年∼2022年以11.0%的年複合成長率成長。

本報告提供全球網路安全市場相關調查分析,市場概要,產業趨勢,各市場區隔的市場分析,競爭情形,主要企業等相關的系統性資訊。

第1章 簡介

第2章 調查手法

第3章 摘要整理

第4章 重要考察

  • 網路安全市場的富有魅力的市場機會
  • 網路安全市場:各零件
  • 網路安全市場:各解決方案
  • 網路安全市場:各類服務
  • 網路安全市場:各安全類型
  • 網路安全市場:各部署模式
  • 網路安全市場:各組織規模
  • 網路安全市場:各產業領域
  • 生命週期分析:各地區

第5章 市場概要與產業趨勢

  • 法規的影響
  • 技術創新聚光燈
  • 市場動態
    • 推動因素
    • 阻礙因素
    • 機會
    • 課題

第6章 網路安全的全球市場:各零件

  • 簡介
  • 解決方案
  • 服務

第7章 網路安全的全球市場:各解決方案

  • 簡介
  • 身份識別與存取管理 (IAM)
  • 風險、遵守管理
  • 加密
  • 預防資料外洩 (DLP)
  • 整合威脅管理 (UTM)
  • 防火牆
  • 防毒/惡意程式對策
  • 入侵檢測系統/侵入防止系統 (IDS/IPS)
  • 安全、漏洞管理
  • 災害復原
  • 分散式服務干擾 (DDoS) 緩和
  • 安全資訊、活動管理 (SIEM)
  • 其他

第8章 網路安全的全球市場:各類服務

  • 簡介
  • 管理服務
  • 專業服務

第9章 網路安全的全球市場:各安全類型

  • 簡介
  • 網路安全
  • 終端安全
  • 應用安全
  • 雲端安全
  • 無線安全
  • 其他

第10章 網路安全的全球市場:各部署模式

  • 簡介
  • 雲端
  • 內部部署

第11章 網路安全的全球市場:各組織規模

  • 簡介
  • 中小企業
  • 大企業

第12章 網路安全的全球市場:各產業領域

  • 簡介
  • 航太、防衛
  • 政府
  • 銀行、金融服務、保險 (BFSI)
  • IT、通訊
  • 醫療
  • 零售
  • 製造
  • 能源、公共事業
  • 其他

第13章 網路安全的全球市場:各地區

  • 簡介
  • 北美
  • 歐洲
  • 亞太地區
  • 中東、非洲
  • 南美

第14章 競爭情形

  • MIRCROQUADRANT概要
  • 競爭基準

第15章 企業簡介

  • INTERNATIONAL BUSINESS MACHINES (IBM) CORPORATION
  • HEWLETT PACKARD ENTERPRISE
  • MCAFEE LLC
  • TREND MICRO, INC.
  • SYMANTEC CORPORATION
  • CHECK POINT SOFTWARE TECHNOLOGIES
  • CISCO SYSTEMS, INC.
  • PALO ALTO NETWORKS, INC.
  • JUNIPER NETWORKS, INC.
  • FORTINET, INC.
  • FIREEYE, INC.
  • SOPHOS LTD.
  • 主要創新者

第16章 附錄

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: TC 3485

"Rise in security breaches, targeting enterprises, is driving the growth of the cybersecurity market"

MarketsandMarkets expects the global cybersecurity market to grow from USD 137.85 billion in 2017 to USD 231.94 billion by 2022, at a Compound Annual Growth Rate (CAGR) of 11.0%. The cybersecurity market is growing rapidly because of the increase in adoption of cybersecurity solutions, due to the increase in security breaches targeting enterprises.

Strict directives for data privacy driving the growth of the cybersecurity market

The constant development in security threats has given rise to the design and implementation of a large number of directives that needed to be strictly adhered to by all organizations. Regulations underline various guidelines and security features to be strictly followed, such as Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA), European Union Agency for Network and Information Security (ENISA), and Sarbanes-Oxley Act (SOX).

Network security is estimated to have the largest market size in 2017

The network security segment is estimated to have the largest market size in 2017, because of the need for stringent compliance and regulatory requirements. The growth in the network security is associated with the rise in security breaches targeting enterprise networks, where hackers try to gain access to sensitive data.

BFSI vertical is expected to have the highest growth rate during the forecast period

Cybersecurity solutions have been deployed across various verticals, including aerospace and defense; government; Banking, Financial Services, and Insurance (BFSI); IT and telecom; healthcare; retail; manufacturing; energy and utilities; and others (education, media and entertainment, and automotive). The BFSI vertical is expected to witness the highest CAGR during the forecast period because of the increasing adoption of web and mobile applications, which are prone to advanced cyber-attacks.

APAC is expected to have the highest growth rate during the forecast period

Asia Pacific (APAC) includes emerging economies, such as India and China, which are rapidly deploying cybersecurity solutions. This is mainly due to the digitization of businesses and adoption of cloud services by small, medium, and large enterprises in the region.

In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, other innovation and technology directors, and executives from various key organizations operating in the cybersecurity marketplace.

  • By Company Type: Tier 1: 55%, Tier 2: 20%, and Tier 3: 25%
  • By Designation: C-Level: 60%, Director Level: 25%, and Others: 15%
  • By Region: North America: 10%, Europe: 20%, APAC: 40%, and Rest of the World (RoW): 30%

The report includes the study of key players offering cybersecurity solutions and services. IBM Corporation (US), Hewlett Packard Enterprise (US), McAfee LLC (US), Trend Micro, Inc. (Japan), Symantec Corporation (US), Check Point Software Technologies Ltd. (Israel), Cisco Systems, Inc. (US), Palo Alto Networks, Inc. (US), Juniper Networks, Inc. (US), Fortinet, Inc. (US), FireEye, Inc. (US), Sophos Ltd. (UK), Rapid7, Inc. (US), EMC RSA (US), LogRhythm, Inc. (US), Optiv Security Inc. (US), Webroot, Inc. (US), CyberArk Software Ltd. (US), Qualys, Inc. (US), F-Secure (Finland), Trustwave Holdings, Inc. (US), Proofpoint, Inc. (US), Splunk, Inc. (US), Kaspersky Lab (Russia), and Imperva, Inc. (US) are some of the companies profiled in the report. The report includes in-depth competitive analysis of these key players in the cybersecurity market, with their company profiles, recent developments, and business and product offerings.

Research Coverage:

The research covers the cybersecurity market on the basis of different segments, such as solutions, services, security types, deployment modes, organization sizes, and verticals in the regions of North America, Europe, APAC, MEA, and Latin America. Further, it includes the factors that are driving the cybersecurity market along with the growth opportunities in this market. It also includes the restraining factors and challenges in the growth of the market. Moreover, the report includes the detailed company profiles of the key players offering cybersecurity solutions and services.

The report is expected to help the market leaders or new entrants in this market in the following ways:

  • 1. This report segments the market into various subsegments, covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market and the subsegments. The market numbers are further split across different verticals and regions.
  • 2. This report will help in better understanding of the competitors and gaining more insights to better one's position in the market. There is a separate section on competitive landscape, which includes competitor ecosystem, mergers and acquisitions, integrations and expansions, and collaborations of various market vendors. Besides, there are company profiles of 12 players in this market. In this section, market internals are provided that can put one ahead of the competitors.
  • 3. The report also helps in understanding the overall growth of the market. It provides information on key market drivers, restraints, challenges, and opportunities.

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. OBJECTIVES OF THE STUDY
  • 1.2. MARKET DEFINITION
  • 1.3. MARKET SCOPE
  • 1.4. YEARS CONSIDERED FOR THE STUDY
  • 1.5. CURRENCY
  • 1.6. STAKEHOLDERS

2. RESEARCH METHODOLOGY

  • 2.1. RESEARCH DATA
    • 2.1.1. SECONDARY DATA
    • 2.1.2. PRIMARY DATA
      • 2.1.2.1. Breakdown of primary interviews
      • 2.1.2.2. Key industry insights
  • 2.2. MARKET SIZE ESTIMATION
  • 2.3. MICROQUADRANT RESEARCH METHODOLOGY
    • 2.3.1. VENDOR INCLUSION CRITERIA
  • 2.4. RESEARCH ASSUMPTIONS AND LIMITATIONS
    • 2.4.1. LIMITATIONS

3. EXECUTIVE SUMMARY

4. PREMIUM INSIGHTS

  • 4.1. ATTRACTIVE MARKET OPPORTUNITIES IN THE CYBERSECURITY MARKET
  • 4.2. CYBERSECURITY MARKET, BY COMPONENT, 2017-2022
  • 4.3. CYBERSECURITY MARKET, BY SOLUTION, 2017-2022
  • 4.4. CYBERSECURITY MARKET, BY SERVICE, 2017-2022
  • 4.5. CYBERSECURITY MARKET, BY SECURITY TYPE, 2017-2022
  • 4.6. CYBERSECURITY MARKET, BY DEPLOYMENT MODE, 2017-2022
  • 4.7. CYBERSECURITY MARKET, BY ORGANIZATION SIZE, 2017-2022
  • 4.8. CYBERSECURITY MARKET, BY VERTICAL, 2017-2022
  • 4.9. LIFECYCLE ANALYSIS, BY REGION

5. MARKET OVERVIEW AND INDUSTRY TRENDS

  • 5.1. REGULATORY IMPLICATIONS
    • 5.1.1. PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI-DSS)
    • 5.1.2. HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
    • 5.1.3. FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
    • 5.1.4. GRAMM-LEACH-BLILEY ACT (GLB ACT)
    • 5.1.5. SARBANES-OXLEY ACT (SOX)
    • 5.1.6. THE INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO) STANDARD 27001
  • 5.2. INNOVATION SPOTLIGHT
  • 5.3. MARKET DYNAMICS
    • 5.3.1. DRIVERS
      • 5.3.1.1. Strict directives for data privacy
      • 5.3.1.2. Emergence of IoT and BYOD across verticals
      • 5.3.1.3. Increasing threat landscape due to third-party application deployment
      • 5.3.1.4. Constantly increasing cyber terrorism
    • 5.3.2. RESTRAINTS
      • 5.3.2.1. Use of pirated cybersecurity solutions
      • 5.3.2.2. Limited security budgets
    • 5.3.3. OPPORTUNITIES
      • 5.3.3.1. Continuous growth in the adoption of cloud-based applications and services
      • 5.3.3.2. Increased use of social media for business functions
    • 5.3.4. CHALLENGES
      • 5.3.4.1. Rapidly increasing insider cyber threats
      • 5.3.4.2. Lack of competent security professionals

6. CYBERSECURITY MARKET ANALYSIS, BY COMPONENT

  • 6.1. INTRODUCTION
  • 6.2. SOLUTIONS
  • 6.3. SERVICES

7. CYBERSECURITY MARKET ANALYSIS, BY SOLUTION

  • 7.1. INTRODUCTION
  • 7.2. IDENTITY AND ACCESS MANAGEMENT
  • 7.3. RISK AND COMPLIANCE MANAGEMENT
  • 7.4. ENCRYPTION
  • 7.5. DATA LOSS PREVENTION
  • 7.6. UNIFIED THREAT MANAGEMENT
  • 7.7. FIREWALL
  • 7.8. ANTIVIRUS/ANTI-MALWARE
  • 7.9. INTRUSION DETECTION SYSTEM/INTRUSION PREVENTION SYSTEM
  • 7.10. SECURITY AND VULNERABILITY MANAGEMENT
  • 7.11. DISASTER RECOVERY
  • 7.12. DISTRIBUTED DENIAL OF SERVICE MITIGATION
  • 7.13. SECURITY INFORMATION AND EVENT MANAGEMENT
  • 7.14. OTHERS

8. CYBERSECURITY MARKET ANALYSIS, BY SERVICE

  • 8.1. INTRODUCTION
  • 8.2. MANAGED SERVICES
  • 8.3. PROFESSIONAL SERVICES
    • 8.3.1. CONSULTING
    • 8.3.2. TRAINING AND EDUCATION
    • 8.3.3. SUPPORT AND MAINTENANCE
    • 8.3.4. DESIGN AND INTEGRATION
    • 8.3.5. RISK AND THREAT ASSESSMENT

9. CYBERSECURITY MARKET ANALYSIS, BY SECURITY TYPE

  • 9.1. INTRODUCTION
  • 9.2. NETWORK SECURITY
  • 9.3. ENDPOINT SECURITY
  • 9.4. APPLICATION SECURITY
  • 9.5. CLOUD SECURITY
  • 9.6. WIRELESS SECURITY
  • 9.7. OTHERS

10. CYBERSECURITY MARKET ANALYSIS, BY DEPLOYMENT MODE

  • 10.1. INTRODUCTION
  • 10.2. CLOUD
  • 10.3. ON-PREMISES

11. CYBERSECURITY MARKET ANALYSIS, BY ORGANIZATION SIZE

  • 11.1. INTRODUCTION
  • 11.2. SMALL AND MEDIUM-SIZED ENTERPRISES
  • 11.3. LARGE ENTERPRISES

12. CYBERSECURITY MARKET ANALYSIS, BY VERTICAL

  • 12.1. INTRODUCTION
  • 12.2. AEROSPACE AND DEFENSE
  • 12.3. GOVERNMENT
  • 12.4. BANKING, FINANCIAL SERVICES, AND INSURANCE
  • 12.5. IT AND TELECOM
  • 12.6. HEALTHCARE
  • 12.7. RETAIL
  • 12.8. MANUFACTURING
  • 12.9. ENERGY AND UTILITIES
  • 12.10. OTHERS

13. GEOGRAPHIC ANALYSIS

  • 13.1. INTRODUCTION
  • 13.2. NORTH AMERICA
  • 13.3. EUROPE
  • 13.4. ASIA PACIFIC
  • 13.5. MIDDLE EAST AND AFRICA
  • 13.6. LATIN AMERICA

14. COMPETITIVE LANDSCAPE

  • 14.1. MIRCROQUADRANT OVERVIEW
    • 14.1.1. VISIONARY LEADERS
    • 14.1.2. INNOVATORS
    • 14.1.3. DYNAMIC DIFFERENTIATORS
    • 14.1.4. EMERGING COMPANIES
  • 14.2. COMPETITIVE BENCHMARKING
    • 14.2.1. STRENGTH OF PRODUCT PORTFOLIO IN THE CYBERSECURITY MARKET
    • 14.2.2. BUSINESS STRATEGY EXCELLENCE ADOPTED IN THE CYBERSECURITY MARKET

15. COMPANY PROFILES Overview, Strength Of Product Portfolio, Business Strategy Excellence, Recent Developments

  • 15.1. INTERNATIONAL BUSINESS MACHINES (IBM) CORPORATION
  • 15.2. HEWLETT PACKARD ENTERPRISE
  • 15.3. MCAFEE LLC
  • 15.4. TREND MICRO, INC.
  • 15.5. SYMANTEC CORPORATION
  • 15.6. CHECK POINT SOFTWARE TECHNOLOGIES
  • 15.7. CISCO SYSTEMS, INC.
  • 15.8. PALO ALTO NETWORKS, INC.
  • 15.9. JUNIPER NETWORKS, INC.
  • 15.10. FORTINET, INC.
  • 15.11. FIREEYE, INC.
  • 15.12. SOPHOS LTD.
  • 15.13. KEY INNOVATORS
    • 15.13.1. PRADEO SECURITY SYSTEMS
    • 15.13.2. WHITEHAT SECURITY
    • 15.13.3. APPTHORITY INC.
    • 15.13.4. SITELOCK, LLC

*Details on Overview, Strength of product portfolio, Business strategy excellence, Recent developments might not be captured in case of unlisted companies.

16. APPENDIX

  • 16.1. DISCUSSION GUIDE
  • 16.2. KNOWLEDGE STORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL
  • 16.3. INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
  • 16.4. AVAILABLE CUSTOMIZATIONS
  • 16.5. RELATED REPORTS
  • 16.6. AUTHOR DETAILS

LIST OF TABLES

  • TABLE 1: UNITED STATES DOLLAR EXCHANGE RATE, 2014-2016
  • TABLE 2: EVALUATION CRITERIA
  • TABLE 3: CYBERSECURITY MARKET SIZE AND GROWTH RATE, 2015-2022 (USD BILLION, Y-O-Y %)
  • TABLE 4: INNOVATION SPOTLIGHT: LATEST CYBERSECURITY INNOVATIONS
  • TABLE 5: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2015-2022 (USD BILLION)
  • TABLE 6: SOLUTIONS: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 7: SERVICES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 8: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2015-2022 (USD BILLION)
  • TABLE 9: IDENTITY AND ACCESS MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 10: RISK AND COMPLIANCE MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 11: ENCRYPTION: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 12: DATA LOSS PREVENTION: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 13: UNIFIED THREAT MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 14: FIREWALL: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 15: ANTIVIRUS/ANTI-MALWARE: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 16: INTRUSION DETECTION SYSTEM/INTRUSION PREVENTION SYSTEM: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 17: SECURITY AND VULNERABILITY MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 18: DISASTER RECOVERY: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 19: DISTRIBUTED DENIAL OF SERVICE MITIGATION: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 20: SECURITY INFORMATION AND EVENT MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 21: OTHERS: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 22: CYBERSECURITY MARKET SIZE, BY SERVICE, 2015-2022 (USD BILLION)
  • TABLE 23: MANAGED SERVICES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 24: PROFESSIONAL SERVICES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 25: PROFESSIONAL SERVICES: CYBERSECURITY MARKET SIZE, BY TYPE, 2015-2022 (USD BILLION)
  • TABLE 26: CONSULTING: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 27: TRAINING AND EDUCATION: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 28: SUPPORT AND MAINTENANCE: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 29: DESIGN AND INTEGRATION: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 30: RISK AND THREAT ASSESSMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 31: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2015-2022 (USD BILLION)
  • TABLE 32: NETWORK SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 33: ENDPOINT SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 34: APPLICATION SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 35: CLOUD SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 36: WIRELESS SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 37: OTHERS: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 38: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2015-2022 (USD BILLION)
  • TABLE 39: CLOUD: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 40: ON-PREMISES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 41: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2015-2022 (USD BILLION)
  • TABLE 42: SMALL AND MEDIUM-SIZED ENTERPRISES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 43: LARGE ENTERPRISES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 44: CYBERSECURITY MARKET SIZE, BY VERTICAL, 2015-2022 (USD BILLION)
  • TABLE 45: AEROSPACE AND DEFENSE: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 46: GOVERNMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 47: BANKING, FINANCIAL SERVICES, AND INSURANCE: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 48: IT AND TELECOM: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 49: HEALTHCARE: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 50: RETAIL: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 51: MANUFACTURING: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 52: ENERGY AND UTILITIES: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 53: OTHERS: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 54: CYBERSECURITY MARKET SIZE, BY REGION, 2015-2022 (USD BILLION)
  • TABLE 55: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2015-2022 (USD BILLION)
  • TABLE 56: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2015-2022 (USD BILLION)
  • TABLE 57: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY SERVICE, 2015-2022 (USD BILLION)
  • TABLE 58: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2015-2022 (USD BILLION)
  • TABLE 59: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2015-2022 (USD BILLION)
  • TABLE 60: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2015-2022 (USD BILLION)
  • TABLE 61: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2015-2022 (USD BILLION)
  • TABLE 62: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY VERTICAL, 2015-2022 (USD BILLION)
  • TABLE 63: EUROPE: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2015-2022 (USD BILLION)
  • TABLE 64: EUROPE: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2015-2022 (USD BILLION)
  • TABLE 65: EUROPE: CYBERSECURITY MARKET SIZE, BY SERVICE, 2015-2022 (USD BILLION)
  • TABLE 66: EUROPE: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2015-2022 (USD BILLION)
  • TABLE 67: EUROPE: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2015-2022 (USD BILLION)
  • TABLE 68: EUROPE: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2015-2022 (USD BILLION)
  • TABLE 69: EUROPE: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2015-2022 (USD BILLION)
  • TABLE 70: EUROPE: CYBERSECURITY MARKET SIZE, BY VERTICAL, 2015-2022 (USD BILLION)
  • TABLE 71: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2015-2022 (USD BILLION)
  • TABLE 72: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2015-2022 (USD BILLION)
  • TABLE 73: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY SERVICE, 2015-2022 (USD BILLION)
  • TABLE 74: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2015-2022 (USD BILLION)
  • TABLE 75: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2015-2022 (USD BILLION)
  • TABLE 76: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2015-2022 (USD BILLION)
  • TABLE 77: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2015-2022 (USD BILLION)
  • TABLE 78: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY VERTICAL, 2015-2022 (USD BILLION)
  • TABLE 79: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2015-2022 (USD BILLION)
  • TABLE 80: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2015-2022 (USD BILLION)
  • TABLE 81: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SERVICE, 2015-2022 (USD BILLION)
  • TABLE 82: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2015-2022 (USD BILLION)
  • TABLE 83: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2015-2022 (USD BILLION)
  • TABLE 84: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2015-2022 (USD BILLION)
  • TABLE 85: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2015-2022 (USD BILLION)
  • TABLE 86: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY VERTICAL, 2015-2022 (USD BILLION)
  • TABLE 87: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2015-2022 (USD BILLION)
  • TABLE 88: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2015-2022 (USD BILLION)
  • TABLE 89: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY SERVICE, 2015-2022 (USD BILLION)
  • TABLE 90: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2015-2022 (USD BILLION)
  • TABLE 91: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2015-2022 (USD BILLION)
  • TABLE 92: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2015-2022 (USD BILLION)
  • TABLE 93: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2015-2022 (USD BILLION)
  • TABLE 94: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY VERTICAL, 2015-2022 (USD BILLION)

LIST OF FIGURES

  • FIGURE 1: GLOBAL CYBERSECURITY MARKET: MARKET SEGMENTATION
  • FIGURE 2: GLOBAL CYBERSECURITY MARKET: RESEARCH DESIGN
  • FIGURE 3: BREAKDOWN OF PRIMARY INTERVIEWS: BY COMPANY, DESIGNATION, AND REGION
  • FIGURE 4: DATA TRIANGULATION
  • FIGURE 5: MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
  • FIGURE 6: MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
  • FIGURE 7: CYBERSECURITY MARKET: ASSUMPTIONS
  • FIGURE 8: NORTH AMERICA IS ESTIMATED TO HOLD THE LARGEST MARKET SHARE IN 2017
  • FIGURE 9: FASTEST-GROWING SEGMENTS OF THE CYBERSECURITY MARKET
  • FIGURE 10: RISE IN SECURITY INSIDER AND OUTSIDER THREATS TARGETING ENTERPRISES IS EXPECTED TO BOOST THE CYBERSECURITY MARKET
  • FIGURE 11: SERVICES SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 12: ENCRYPTION SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 13: MANAGED SERVICES SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 14: APPLICATION SECURITY SEGMENT IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 15: CLOUD SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 16: SMALL AND MEDIUM-SIZED ENTERPRISES SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 17: BANKING, FINANCIAL SERVICES, AND INSURANCE VERTICAL IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 18: THE CYBERSECURITY MARKET HAS IMMENSE OPPORTUNITIES FOR GROWTH IN ASIA PACIFIC
  • FIGURE 19: CYBERSECURITY MARKET: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES
  • FIGURE 20: MOTIVATIONS BEHIND ATTACKS, 2016
  • FIGURE 21: PERCENTAGE OF SPAMS IN EMAILS, BY VERTICAL, 2016
  • FIGURE 22: TOP VERTICALS FILTERED FOR INCIDENTS CAUSED BY HACKING AND INSIDER THEFT
  • FIGURE 23: SHORTAGE OF SECURITY PROFESSIONALS RESULTS IN INFRASTRUCTURE DAMAGES
  • FIGURE 24: SERVICES SEGMENT TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 25: ENCRYPTION SEGMENT TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 26: MANAGED SERVICES SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 27: APPLICATION SECURITY SEGMENT IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 28: CLOUD-BASED DEPLOYMENT MODE IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 29: SMALL AND MEDIUM ENTERPRISES SEGMENT IS EXPECTED TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 30: BANKING, FINANCIAL SERVICES, AND INSURANCE VERTICAL IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 31: ASIA PACIFIC IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 32: REGIONAL SNAPSHOT: ASIA PACIFIC IS THE EMERGING REGION IN THE CYBERSECURITY MARKET
  • FIGURE 33: NORTH AMERICA MARKET SNAPSHOT
  • FIGURE 34: ASIA PACIFIC MARKET SNAPSHOT
  • FIGURE 35: CYBERSECURITY MARKET COMPETITIVE LEADERSHIP MAPPING, 2017
  • FIGURE 36: INTERNATIONAL BUSINESS MACHINES CORPORATION: COMPANY SNAPSHOT
  • FIGURE 37: HEWLETT PACKARD ENTERPRISE: COMPANY SNAPSHOT
  • FIGURE 38: TREND MICRO, INC.: COMPANY SNAPSHOT
  • FIGURE 39: SYMANTEC CORPORATION: COMPANY SNAPSHOT
  • FIGURE 40: CHECK POINT SOFTWARE TECHNOLOGIES LTD.: COMPANY SNAPSHOT
  • FIGURE 41: CISCO SYSTEMS, INC.: COMPANY SNAPSHOT
  • FIGURE 42: PALO ALTO NETWORKS, INC.: COMPANY SNAPSHOT
  • FIGURE 43: JUNIPER NETWORKS, INC.: COMPANY SNAPSHOT
  • FIGURE 44: FORTINET, INC.: COMPANY SNAPSHOT
  • FIGURE 45: FIREEYE, INC.: COMPANY SNAPSHOT
  • FIGURE 46: SOPHOS LTD.: COMPANY SNAPSHOT
Back to Top