NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

表紙
市場調查報告書

資訊技術 (IT) 安全:IoT安全,網路安全及雲端安全

Information Technology (IT) Security: IoT, Cyber and Cloud Securities

出版商 BCC Research 商品編碼 866732
出版日期 內容資訊 英文 136 Pages
訂單完成後即時交付
價格
資訊技術 (IT) 安全:IoT安全,網路安全及雲端安全 Information Technology (IT) Security: IoT, Cyber and Cloud Securities
出版日期: 2019年06月13日內容資訊: 英文 136 Pages
簡介

全球網路安全市場規模預計將從2019年的1,134億美元,到2024年擴大到2,202萬美元的規模,並以14.2%的年複合成長率 (CAGR) 成長。

本報告提供全球網路安全市場相關調查,IT,總括性網路安全,IoT安全,及雲端安全市場上全球安全市場概要,世界市場趨勢分析與預測,主要的機會,IT安全的多樣技術及各技術的市場動態的評估,高成長的預測市場區隔,及企業簡介等相關資訊彙整。

第1章 簡介

第2章 摘要、亮點

第3章 市場、技術背景

  • 網路安全
  • 雲端安全技術
  • IoT安全

第4章 網路安全市場:各類型

  • 簡介
  • 網路安全
  • 無線安全
  • 內容安全
  • 雲端安全
  • 應用安全

第5章 雲端安全、漏洞市場:各技術

  • 簡介
  • 身份識別與存取管理
  • 網路安全
  • 終端安全
  • 通訊安全
  • 網站安全
  • SIEM
  • 漏洞評估

第6章 IoT安全市場:各技術

  • IoT市場
  • IoT安全解決方案市場規模
  • 設備等級安全
  • 網路等級IoT安全
  • IoT應用、雲端安全
  • 威脅檢測、安全管理解決方案
  • IoT安全平台

第7章 企業簡介

目錄
Product Code: IFT184A

Report Highlights:

The global market for cyber security should grow from $113.4 billion in 2019 to $220.2 billion by 2024 with a compound annual growth rate (CAGR) of 14.2% from 2019 to 2024.

The global market for network security should grow from $45.3 billion in 2019 to $71.3 billion by 2024 with a CAGR of 9.5% from 2019 to 2024.

The global market for application security should grow from $8.0 billion in 2019 to $20.1 billion by 2024 with a CAGR of 20.2% from 2019 to 2024.

Report Scope:

The scope of the report includes, a general outlook of securities in IT industry. While most of the information is referenced from reports published by BCC Research during the year 2016, 2017 and 2018, market trends and estimates are updated to latest base year, i.e. 2018. This report covers only cyber security, Internet of Things (IoT) security, and cloud security. The cyber security market covers the following technologies: identity and access management (IAM), encryption, data loss protection (DLP), firewall, antivirus and antimalware, disaster recovery, risk and compliance management, and other solutions.

The IoT security market is only for the commercialized IoT security solutions. It helps readers to understand how the IoT security solutions market will evolve, as well as the trends that will impact its adoption. The report focuses on security solutions that have been developed or customized to meet the unique needs of IoT systems. Services provided for integrating such solutions or managed security services are not included in the scope of this report.

The cloud security and vulnerability technologies market encompass various technologies used in cloud security and vulnerability applications. The cloud security and vulnerability market by application is segmented by identity and access management, security information and event management (SIEM), endpoint security, web security, messaging security, network security and vulnerability assessment.

Estimated values used are based on manufacturers' total revenues. Projected and forecasted revenue values are in constant U.S. dollars, unadjusted for inflation. The scope is limited to the recent studies published by BCC Research and is thus not exhaustive.

Report Includes:

  • 27 tables
  • An overview of the global securities market in information technology (IT), encompassing cyber security, Internet of Things (IoT) security, and cloud security markets
  • Analyses of the global market trends with data from 2018, estimates for 2019, and projections of compound annual growth rates (CAGRs) through 2024
  • Detailed discussion of opportunities and innovation-driven securities market in IT highlights, as well as the major regions involved in such developments
  • An assessment of various technologies of IT security and the market dynamics of each technology
  • Identification of segments with high growth potential, as well as an understanding of future applications of given segments
  • Information on key trends related to technology, industry, and regional factors that shape and influence the overall IT security industry
  • Comprehensive company profiles of major global players in IT securities market, including Alphabet Inc., Cisco Systems Inc., Dell EMC, Lockheed Martin, Kaspersky Lab, McAfee etc.

Table of Contents

Chapter 1: Introduction

  • Study Goals and Objectives
  • Reasons for Doing This Study
  • Scope of the Report
  • Intended Audiences
  • Information Sources
  • Methodology
  • Market Breakdown
  • Analyst's Credentials
  • BCC Custom Research
  • Related BCC Research Reports

Chapter 2: Summary and Highlights

Chapter 3: Market and Technology Overview

  • Cyber Security
    • Introduction
    • Data Breaches
    • Bring Your Own Device
    • Life Cycle Analysis
    • Impacting Factors for the Cyber Security Market
  • Cloud Security Technologies
    • Introduction
    • Cloud Security Market by Industry
    • Cloud Security Market by Region
  • IoT Security
    • Government Regulations
    • Public and Private Partnerships on IoT Standard Development
    • Industry Consortiums and Groups Working on Developing IoT Security Standards
    • Factors Driving the Market Growth
    • Value Chain

Chapter 4: Market for Cyber Security by Type

  • Introduction
  • Network Security
    • Different Ways to Mitigate Network Security Threats
    • Endpoint Security
    • Remote Management System
    • Proactive Malware Detectors
    • Gateway Antivirus Software
    • Gateway Anti-spy Software
    • Gateway Anti-spam Software
    • Web-filtering and Device Management
  • Wireless Security
    • Firewall
    • Intrusion Detection/Prevention System (IDS/IPS)
    • Wireless Encryption
    • Wireless Identity and Access Management
    • Wireless Unified Threat Management
  • Content Security
  • Cloud Security
    • Cloud Identity and Access Management
    • Data Loss Prevention
    • Web Security
    • Cloud IDS/IPS
    • Cloud Security Information and Event Management
    • Cloud Encryption
    • Cloud Database Security
    • Virtualization Security
  • Application Security
    • Antivirus Application Security
    • Anti-theft Application Security
    • Data Backup and Recovery Application Security
    • Identity and Access Management and Authentication Application Security
    • Compliance Management Application Security

Chapter 5: Market for Cloud Security and Vulnerability by Technology

  • Introduction
  • Identity and Access Management
    • IAM Market by Deployment Type
    • IAM Market by Region
  • N
      etwork Security
    • Network Security Market by Deployment Type
    • Network Security Market by Region
  • Endpoint Security
    • Endpoint Security Market by Deployment Type
    • Endpoint Security Market by Region
  • Messaging Security
    • Messaging Security Market by Deployment Type
    • Messaging Security Market by Region
  • Web Security
    • Web Security Market by Deployment Type
    • Web Security Market by Region
  • SIEM
    • SIEM Market by Deployment Type
    • SIEM Market by Region
  • Vulnerability Assessment
    • Vulnerability Assessment Market by Deployment Type
    • Vulnerability Assessment Market by Region

Chapter 6: Market for IoT Security by Technology

  • IoT Market
    • Different Users and Players in the IoT Security Market
  • Market Size for IoT Security Solutions
  • Device Layer Security
    • Technology Overview for Device Layer Security
    • Market Analysis for Device Layer IoT Security Solutions
    • Regional Market Analysis for Device Layer IoT Security Solutions
    • Identity and Authorization Management Solutions
    • Encryption and Authentication Solutions
  • Network Layer IoT Security
    • Introduction
    • Technology Overview for IoT Network Technologies
    • Security Technologies for IoT Network Security
    • Market Analysis for Network Level IoT Security Solutions
    • Regional Market for Network Layer IoT Security Solutions
    • Technology Overview for Firewalls and IoT Gateways
    • IoT Gateways
  • IoT Application and Cloud Security
    • Technology Overview
    • Market Analysis of IoT Device Cloud Security Solutions
    • Market Analysis for IoT Application and Device Cloud Security Solutions
  • Threat Detection and Security Management Solutions
    • Technology Overview
  • IoT Security Platforms
    • Introduction

Chapter 7: Company Profiles

  • AEROHIVE
  • ALERT LOGIC
  • ALPHABET INC. (GOOGLE INC.)
  • AMAZON, INC.
  • ARXAN
  • ARM
  • ATMEL
  • AUTHENTIC8
  • AVIRA
  • BAE SYSTEMS INC.
  • BALABIT
  • BARRACUDA NETWORKS INC.
  • BEYONDTRUST
  • BITGLASS
  • BOOZ ALLEN HAMILTON HOLDING CORP.
  • BROADSTAR INFORMATION TECHNOLOGIES
  • CENTRI TECHNOLOGY
  • CERTIFIED SECURITY SOLUTIONS INC.
  • CHECK POINT SOFTWARE TECHNOLOGIES
  • CISCO SYSTEMS INC.
  • CROWDSTRIKE INC.
  • DELL EMC
  • DELL INC. (SONICWALL INC.)
  • DEVICE AUTHORITY
  • DIGICERT INC.
  • DIGITAL DEFENSE INC.
  • ENTRUST DATACARD
  • ESCRYPT
  • FIREEYE
  • FORESCOUT TECHNOLOGIES INC.
  • FORGEROCK
  • FORTINET INC.
  • GEMALTO
  • GLOBALSIGN INC.
  • GOOD TECHNOLOGY
  • GREAT BAY SOFTWARE INC.
  • HEWLETT PACKARD ENTERPRISE CO.
  • ICON LABS
  • IMAGINATION TECHNOLOGIES
  • IMPERVA INC.
  • INFINEON
  • INSIDE SECURE
  • INTEL CORP.
  • INTERNATIONAL BUSINESS MACHINE (IBM) CORP.
  • INTRINSIC-ID
  • KASPERSKY LAB
  • LOCKHEED MARTIN
  • MCAFEE
  • MDS TECHNOLOGY
  • MICROCHIP TECHNOLOGY INC.
  • MICROSOFT
  • MOCANA
  • NORTHROP GRUMMAN CORP.
  • NXP SEMICONDUCTORS
  • PALO ALTO NETWORKS INC.
  • PROTEGRITY INC.
  • PROVE AND RUN
  • RENESAS
  • RUBICON LABS
  • SECURERF
  • SECURITHINGS LTD.
  • SEQUITUR LABS INC.
  • SOPHOS PLC
  • SUREPASSID
  • SYMANTEC
  • SYNOPSYS
  • TENABLE NETWORK SECURITY
  • THALES E-SECURITY INC.
  • TREND MICRO
  • TRILLIUM
  • TRIPWIRE INC.
  • TRUSTONIC
  • TYFONE
  • UTIMACO
  • WISEKEY SA
  • ZSCALER INC.
  • ZINGBOX INC.

List of Tables

  • Summary Table: Global Market for Cyber Security, by Type, Through 2024
    • Table 1: Key Drivers of Cloud Security, by Industry
    • Table 2: Key Drivers of Cloud Security, by Region
    • Table 3: Key Market Trends in the IoT Security Solutions Segment
    • Table 4: Global Market for Cyber Security, by Type, Through 2024
    • Table 5: Global Market for Cloud Security and Vulnerability, by Technology, Through 2024
    • Table 6: Global Market for IAM, by Deployment Type, Through 2024
    • Table 7: Global Market for IAM, by Region, Through 2024
    • Table 8: Global Market for Network Security, by Deployment Type, Through 2024
    • Table 9: Global Market for Network Security, by Region, Through 2024
    • Table 10: Global Market for Endpoint Security, by Deployment Type, Through 2024
    • Table 11: Global Market for Endpoint Security, by Region, Through 2024
    • Table 12: Global Market for Messaging Security, by Deployment Type, Through 2024
    • Table 13: Global Market for Messaging Security, by Region, Through 2024
    • Table 14: Global Market for Web Security, by Deployment Type, Through 2024
    • Table 15: Global Market for Web Security, by Region, Through 2024
    • Table 16: Global Market for SIEM, by Deployment Type, Through 2024
    • Table 17: Global Market for SIEM, by Region, Through 2024
    • Table 18: Global Market for Vulnerability Assessment of Cloud Security, by Deployment Type, Through 2024
    • Table 19: Global Market for Vulnerability Assessment of Cloud Security, by Region, Through 2024
    • Table 20: Global Market for IoT Security Solutions, by End User, Through 2024
    • Table 21: Global Market for IoT Security Solutions, by Type, Through 2024
    • Table 22: Global Market for Device Layer IoT Security Solutions, by End User, Through 2024
    • Table 23: Global Market for Device Layer IoT Security Solutions, by Region, Through 2024
    • Table 24: Global Market for Network Layer IoT Security Solutions, by End User, Through 2024
    • Table 25: Global Market for Network Layer IoT Security Solutions, by Region, Through 2024
    • Table 26: Global Market for IoT Application and Cloud Layer Security Solutions, by End User, Through 2024

List of Figures

  • Summary Figure: Global Market for Cyber Security, by Type, 2018-2024
    • Figure 1: Life Cycle Analysis for Cyber Security
    • Figure 2: Global Market for Cyber Security, by Type, 2018-2024
    • Figure 3: Global Market for Cloud Security and Vulnerability, by Technology, 2018-2024
    • Figure 4: Global Market for IAM, by Deployment Type, 2018-2024
    • Figure 5: Global Market for IAM, by Region, 2018-2024
    • Figure 6: Global Market for Network Security, by Deployment Type, 2018-2024
    • Figure 7: Global Market for Network Security, by Region, 2018-2024
    • Figure 8: Global Market for Endpoint Security, by Deployment Type, 2018-2024
    • Figure 9: Global Market for Endpoint Security, by Region, 2018-2024
    • Figure 10: Global Market for Messaging Security, by Deployment Type, 2018-2024
    • Figure 11: Global Market for Messaging Security, by Region, 2018-2024
    • Figure 12: Global Market for Web Security, by Deployment Type, 2018-2024
    • Figure 13: Global Market for Web Security, by Region, 2018-2024
    • Figure 14: Global Market for SIEM, by Deployment Type, 2018-2024
    • Figure 15: Global Market for SIEM, by Region, 2018-2024
    • Figure 16: Global Market for Vulnerability Assessment of Cloud Security, by Deployment Type, 2018-2024
    • Figure 17: Global Market for Vulnerability Assessment of Cloud Security, by Region, 2018-2024
    • Figure 18: Global Market for IoT Security Solutions, by End User, 2018-2024
    • Figure 19: Global Market for IoT Security Solutions, by Type, 2018-2024
    • Figure 20: Global Market for Device Layer IoT Security Solutions, by End User, 2018-2024
    • Figure 21: Global Market for Device Layer IoT Security Solutions, by Region, 2018-2024
    • Figure 22: Global Market for Network Layer IoT Security Solutions, by End User, 2018-2024
    • Figure 23: Global Market for Network Layer IoT Security Solutions, by Region, 2018-2024
    • Figure 24: Global Market for IoT Application and Cloud Layer Security Solutions, by End User, 2018-2024