Cover Image
市場調查報告書

網路安全的非洲市場預測 2020年

Africa Cyber Security Market by Solution by Service, by Verticals, by Country - Global forecast to 2020

出版商 MarketsandMarkets 商品編碼 333255
出版日期 內容資訊 英文 140 Pages
訂單完成後即時交付
價格
Back to Top
網路安全的非洲市場預測 2020年 Africa Cyber Security Market by Solution by Service, by Verticals, by Country - Global forecast to 2020
出版日期: 2015年06月11日 內容資訊: 英文 140 Pages
簡介

非洲地區的電腦網路攻擊數持續劇增。在非洲發生許多的電腦網路攻擊,一般而言是DDoS (分散服務干擾) 攻擊及網站改變。 由於這樣的攻擊進步,政府和企業對於實施嚴格的法律、規定進行配合。該市場的主要推動因素是對政府法規、遵守的關注高漲。

本報告提供非洲的網路安全市場相關調查分析、市場概要、各2次區分、解決方案、服務、垂直產業和各個國家的市場分析與預測、競爭情形分析,及主要企業簡介,為您概述為以下內容。

第1章 簡介

第2章 調查手法

第3章 摘要整理

第4章 重要考察

  • 非洲的網路安全市場上富有魅力的市場機會
  • 非洲的網路安全市場:各2次種類
  • 非洲的網路安全整體市場
  • 非洲的網路安全市場潛力

第5章 市場概要

  • 簡介
  • 網路安全市場發展
  • 市場區隔
    • 各2次種類
    • 各解決方案
    • 各類服務
    • 各垂直產業
    • 各國
  • 市場動態
    • 促進要素
    • 阻礙要素
    • 機會
    • 課題

第6章 產業趨勢

  • 簡介
  • 價值鏈分析
  • 波特的五力分析

第7章 非洲的網路安全市場分析:各2次種類

  • 簡介
  • 網路安全
  • 終端安全
  • 內容安全
  • 應用安全
  • 產業控制系統安全
  • 雲端安全

第8章 非洲的網路安全市場分析:各解決方案

  • 簡介
  • ID & 訪問管理 (IAM)
  • 風險、遵守管理
  • IDS/IPS
  • 加密
  • 防毒軟體/anti惡意程式
  • 防火牆
  • 預防資料外洩 (DLP)
  • UTM
  • 安全、漏洞管理
  • 災害復原、業務永續營運性
  • DDOS緩和
  • 網站過濾
  • 其他

第9章 非洲的網路安全市場分析:各類服務

  • 簡介
  • 諮詢
  • 設計、整合
  • 風險、威脅評估
  • 資安管理服務
  • 訓練、教育

第10章 非洲的網路安全市場分析:各垂直產業

  • 簡介
  • BFSI
  • 航太、國防、情報
  • 政府 (國防除外)
  • 能源、公共事業
  • 製造
  • 零售、批發流通
  • 通訊
  • 運輸
  • 其他垂直產業

第11章 地區分析

  • 簡介
  • 肯亞
  • 南非
  • 奈及利亞
  • 摩洛哥
  • 其他

第12章 競爭情形

  • 概要
  • 競爭情形、趨勢

第13章 企業簡介

  • 簡介
  • EMC CORPORATION
  • FORTINET, INC.
  • CISCO SYSTEMS, INC.
  • IBM
  • SYMANTEC CORPORATION
  • CHECK POINT SOFTWARE TECHNOLOGIES LTD.
  • MCAFEE, INC.
  • HEWLETT-PACKARD
  • COMPUTER SCIENCES CORP. (CSC)
  • TREND MICRO, INC.

第14章 附錄

圖表清單

目錄
Product Code: TC 3457

The number of cyber-attacks continues to rise rapidly in the African region. Most of the cyber-attacks that occur in Africa are generally Distributed-Denial-Of-Service (DDoS) attacks and website defacement. With the advancement of such attacks, government and enterprises are collaborating to implement strict laws and regulations to secure their critical networks.

The major force driving this market is the increasing focus on government regulations and compliance. Over the next five years, the market for Africa cyber security market is expected to become highly persistent across its ecosystem, and penetrate the market to a huge extent, covering all geographical territories.

Banking, financial services and insurance (BFSI), and energy and utilities have significantly increased their spending on the solutions and services. This rise in the global spending for solutions and services has boosted the market opportunities for the companies providing cyber security solutions.

The report also analyzes the market drivers, restraints, and opportunities along with a study on the top key players. The report provides key insights into the current trends and best practices in the Africa cyber security market.

The report brings out the potential across various countries such as Kenya, South Africa, Nigeria, Morocco, and others. The Africa cyber security market is further segmented into each country market by sub-segment, solution, vertical, and service.

Table of Contents

1. INTRODUCTION

  • 1.1. OBJECTIVES OF THE STUDY
  • 1.2. MARKET DEFINITION
  • 1.3. MARKET SCOPE
  • 1.3.1. MARKETS COVERED
  • 1.3.2. YEARS CONSIDERED FOR THE STUDY
  • 1.4. CURRENCY
  • 1.5. STAKEHOLDERS

2. RESEARCH METHODOLOGY

  • 2.1. RESEARCH DATA
    • 2.1.1. SECONDARY DATA
      • 2.1.1.1. Key data from secondary sources
    • 2.1.2. PRIMARY DATA
      • 2.1.2.1. Key data from primary sources
      • 2.1.2.2. Key industry insights
      • 2.1.2.3. Breakdown of primary interviews
  • 2.2. MARKET SIZE ESTIMATION
    • 2.2.1. BOTTOM-UP APPROACH
    • 2.2.2. TOP-DOWN APPROACH
  • 2.3. MARKET BREAKDOWN AND DATA TRIANGULATION
  • 2.4. ASSUMPTIONS

3. EXECUTIVE SUMMARY

4. PREMIUM INSIGHTS

  • 4.1. ATTRACTIVE MARKET OPPORTUNITIES IN THE AFRICA CYBER SECURITY MARKET
  • 4.2. AFRICA CYBER SECURITY MARKET, BY SUB-SEGMENT
  • 4.3. TOTAL AFRICA CYBER SECURITY MARKET
  • 4.4. AFRICA CYBER SECURITY MARKET POTENTIAL

5. MARKET OVERVIEW

  • 5.1. INTRODUCTION
  • 5.2. EVOLUTION OF CYBER SECURITY MARKET
  • 5.3. MARKET SEGMENTATION
    • 5.3.1. BY SUB-SEGMENT
    • 5.3.2. BY SOLUTION
    • 5.3.3. BY SERVICE
    • 5.3.4. BY VERTICAL
    • 5.3.5. BY COUNTRY
  • 5.4. MARKET DYNAMICS
    • 5.4.1. DRIVERS
      • 5.4.1.1. Cyber-attacks affecting economic growth
      • 5.4.1.2. Increasing focus on government regulations and compliance requirements
      • 5.4.1.3. Increasing penetration of mobile devices and Internet subscriptions
    • 5.4.2. RESTRAINTS
      • 5.4.2.1. Limitations in the current ICT infrastructure
      • 5.4.2.2. Lack of education, resources, and awareness
    • 5.4.3. OPPORTUNITIES
      • 5.4.3.1. Increasing cases of insider threats
  • 5.4.3.2. Demand shift towards managed IT security services
    • 5.4.4. CHALLENGE
      • 5.4.4.1. Absence of aligned legal and regulatory framework

6. INDUSTRY TRENDS

  • 6.1. INTRODUCTION
  • 6.2. VALUE CHAIN ANALYSIS
  • 6.3. PORTER'S FIVE FORCES ANALYSIS
    • 6.3.1. THREAT FROM NEW ENTRANTS
    • 6.3.2. BARGAINING POWER OF BUYERS
    • 6.3.3. BARGAINING POWER OF SUPPLIERS
    • 6.3.4. THREAT FROM SUBSTITUTES
    • 6.3.5. INTENSITY OF COMPETITVE RIVALRY

7. AFRICA CYBER SECURITY MARKET ANALYSIS, BY SUB-SEGMENT

  • 7.1. INTRODUCTION
  • 7.2. NETWORK SECURITY
  • 7.3. ENDPOINT SECURITY
  • 7.4. CONTENT SECURITY
  • 7.5. APPLICATION SECURITY
  • 7.6. INDUSTRIAL CONTROL SYSTEM SECURITY
  • 7.7. CLOUD SECURITY

8. AFRICA CYBER SECURITY MARKET ANALYSIS, BY SOLUTION

  • 8.1. INTRODUCTION
  • 8.2. IDENTITY AND ACCESS MANAGEMENT (IAM)
  • 8.3. RISK AND COMPLIANCE MANAGEMENT
  • 8.4. IDS/IPS
  • 8.5. ENCRYPTION
  • 8.6. ANTIVIRUS/ANTIMALWARE
  • 8.7. FIREWALL
  • 8.8. DATA LOSS PROTECTION (DLP)
  • 8.9. UTM
  • 8.10. SECURITY AND VULNERABILITY MANAGEMENT
  • 8.11. DISASTER RECOVERY AND BUSINESS CONTINUITY
  • 8.12. DDOS MITIGATION
  • 8.13. WEB FILTERING
  • 8.14. OTHERS

9. AFRICA CYBER SECURITY MARKET ANALYSIS, BY SERVICE

  • 9.1. INTRODUCTION
  • 9.2. CONSULTING
  • 9.3. DESIGN AND INTEGRATION
  • 9.4. RISK AND THREAT ASSESSMENT
  • 9.5. MANAGED SECURITY SERVICES
  • 9.6. TRAINING AND EDUCATION

10. AFRICA CYBER SECURITY MARKET ANALYSIS, BY VERTICAL

  • 10.1. INTRODUCTION
  • 10.2. BFSI
  • 10.3. AEROSPACE, DEFENSE, AND INTELLIGENCE
  • 10.4. GOVERNMENT (EXCLUDING DEFENSE)
  • 10.5. ENERGY AND UTILITIES
  • 10.6. MANUFACTURING
  • 10.7. RETAIL AND WHOLESALE DISTRIBUTION
  • 10.8. TELECOMMUNICATION
  • 10.9. TRANSPORTATION
  • 10.10. OTHER VERTICALS

11. GEOGRAPHIC ANALYSIS

  • 11.1. INTRODUCTION
  • 11.2. KENYA
  • 11.3. SOUTH AFRICA
  • 11.4. NIGERIA
  • 11.5. MOROCCO
  • 11.6. OTHERS

12. COMPETITIVE LANDSCAPE

  • 12.1. OVERVIEW
  • 12.2. COMPETITIVE SITUATION AND TRENDS
    • 12.2.1. NEW PRODUCT LAUNCHES
    • 12.2.2. NEW ALLIANCES, CONTRACTS, PARTNERSHIPS, AND AGREEMENTS
    • 12.2.3. MERGERS AND ACQUISITIONS
    • 12.2.4. EXPANSIONS

13. COMPANY PROFILES

  • 13.1. INTRODUCTION
  • 13.2. EMC CORPORATION
  • 13.3. FORTINET, INC.
  • 13.4. CISCO SYSTEMS, INC.
  • 13.5. IBM
  • 13.6. SYMANTEC CORPORATION
  • 13.7. CHECK POINT SOFTWARE TECHNOLOGIES LTD.
  • 13.8. MCAFEE, INC.
  • 13.9. HEWLETT-PACKARD
  • 13.10. COMPUTER SCIENCES CORP. (CSC)
  • 13.11. TREND MICRO, INC.

14. APPENDIX

  • 14.1. DISCUSSION GUIDE
  • 14.2. INDUSTRY EXPERTS
  • 14.3. INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
  • 14.4. AVAILABLE CUSTOMIZATIONS
  • 14.5. RELATED REPORTS
Back to Top