Cover Image
市場調查報告書

網路安全市場上資本交易的最新趨勢 (2014∼2015年)

Cyber Security Deal Tracker 2014 - 2015

出版商 MarketsandMarkets 商品編碼 359398
出版日期 內容資訊 英文 33 Pages
訂單完成後即時交付
價格
Back to Top
網路安全市場上資本交易的最新趨勢 (2014∼2015年) Cyber Security Deal Tracker 2014 - 2015
出版日期: 2016年04月01日 內容資訊: 英文 33 Pages
簡介

本報告提供全球網路安全市場上,最近2年的資本交易 (總合200件以上) 的趨勢相關分析,整體資本交易的數量、金額、形態趨勢,及各技術 (終端安全、網路安全、雲端安全等)、各類別 (應用管理,系統整合,軟體引進、支援,應用開發、管理 (ADM) 及更新等)、各交易型態、各行業 (政府,BFSI (銀行、金融服務、保險),技術,消費品等)、各地區的詳細趨勢,契約期間的趨勢,大供應商的動靜等相關調查。

簡介

  • 分析目的
  • 分析範圍
    • 分析對象企業
    • 分析的限制
    • 利害關係者 (相關利益者)

摘要整理

技術概要

主要指標

分析方法

  • 各交易類型分析 (上年度)
  • 各交易類型分析 (本年度)
  • 各交易類型分析 (對上年度比較)

主要供應商趨勢分析

交易分析 (內容、形態等)

契約期間分析

各地區的趨勢

附錄

目錄
Product Code: TC 4192

The report provides a thorough analysis of more than 200 deals in the cyber security market for two years, 2014 and 2015.The cyber security deal tracker offers comprehensive database coverage of various deals signed in government, Banking, Financial Services, and Insurance (BFSI), technology, and consumer industries.

The deal tracker provides trends that help clients to plot future activities in various deal types for the global cyber security market. For the same, MarketsandMarkets understanding of cyber security market is leveraged considering client needs and projections that can help to create or categorize practical and actionable business development strategies.

This report also provides an actionable insight into various technologies, broadly classified into endpoint security, network security, and cloud security. The report helps vendors to identify the in-demand technology in the cyber security market and thus provide assistance in planning their future investment and strategic growth.

To provide an analytical view of the deals signed in the two years, we have classified the deals into four categories: application management, system integration engagement, software deploy and support, and Application Development and Maintenance (ADM) and upgrade. Each of these fields is designed to support the business leaders to understand trends, drivers, and growth area in the cyber security market.

Deals are also analyzed from the perspective of regions to show the most active region globally in the cyber security market, with reasons.

The cyber threat landscape is very complex and involves a significant number of cyber security deals, which provide a comprehensive knowledge base on the threat management landscape.

Table of Contents

INTRODUCTION

  • OBJECTIVES OF THE ANALYSIS
  • Scope of the Study
    • Market Covered
    • Limitations
    • Stakeholders

EXECUTIVE SUMMARY

OVERVIEW -TECHNOLOGY

KEY INDICATORS

RESEARCH METHODOLOGY

  • ANALYSIS BY TYPE OF DEALS, 2014
  • ANALYSIS BY TYPE OF DEALS, 2015
  • ANALYSIS BY TYPE OF DEALS: 2014 & 2015

TOP VENDOR TREND ANALYSIS

ANALYSIS OF DEALS

CONTRACT DURATION ANALYSIS

REGIONAL TREND

APPENDIX

Back to Top