表紙
市場調查報告書
商品編碼
938321

網路安全:技術及全球市場

Cyber Security: Technologies and Global Markets

出版日期: | 出版商: BCC Research | 英文 175 Pages | 訂單完成後即時交付

價格
  • 全貌
  • 簡介
  • 目錄
簡介

全球的網路安全市場將從2019年的1429億美元成長為2024年的2672億美元,2019年到2024年之間的預測期內,年複合成長率為13.3%。北美地區:2019年到2024年的年複合成長率則有10.5%,將從2019年的486億美元成長為2024年的799億美元。亞太地區:2019年到2024年的預測期內,年複合成長率為17.1%,將從2019年的329億美元成長為2024年的724億美元。

此報告研究全球的網路安全市場,並且聚焦於各種解決方案進行分析,包括身份及存取管理(IAM)、加密、資料外洩防護(DLP)、防火牆、病毒對策及惡意軟體對策、災難恢復、風險管理與合規、其他解決方案,提供競爭格局的分析、各地區的分析、以及主要企業的介紹等。

第1章 介紹

  • 網路安全的目標
  • 研究目標與目的
  • 研究理由
  • 報告範圍
  • 研究方法
  • 對像讀者
  • 分析者的經歷
  • BCC客製化研究
  • BCC Research 相關報告

第2章 統整與重點

第3章 市場概述

  • 市場概述
  • 網路威脅
    • 惡意軟體
    • 網路釣魚
    • 密碼攻擊
    • DoS攻擊與DDoS攻擊
    • 中間人攻擊
    • 路過式下載
    • 惡意廣告
    • 流氓安全軟體
  • BYOD
  • 組織的預防對策
    • 行動設備管理(MDM)
    • 行動應用程式管理(MAM)
    • 行動安全管理(MSM)
  • 生命週期分析
    • 運算環境分析
    • 安全要求
    • 硬體及軟體的設計
    • 實施設計
    • 測試與整合
  • 網路安全的里程碑
  • 網路安全的優勢
  • 市場驅動力
    • 市場成長因素
    • 市場阻礙因素
    • 市場機會
    • 市場挑戰
  • COVID-19的影響
    • 經濟面影響
    • 網路威脅的狀況
    • 網路安全解決方案

第4章 市場分析:類型

  • 介紹
  • 網路安全
    • 減輕網路安全威脅的方法
  • 端點安全
    • 端點安全的類型
  • 無線網路安全
    • 無線網路安全的類型
  • 內容安全
  • 雲端安全
    • 雲端安全的類型
  • 應用程式的安全
    • 應用程式安全的類型

第5章 市場分析:解決方案

  • 介紹
  • 身份與存取管理(IAM)
    • 身份與存取管理市場(按組件)
  • 加密
    • 加密市場(按組件)
  • 資料外洩防護
  • 防火牆
    • 防火牆市場(按組件)
  • 病毒對策與惡意軟體對策
  • 災難恢復
  • 風險管理與合規
  • 其他
    • 網頁過濾
    • DDoS緩解
    • 集中式威脅管理 (UTM)

第6章 市場分析:發展模式

  • 介紹
  • 預設
  • 雲端
    • 安全層級

第7章 市場分析:組織規模

  • 介紹
  • 大企業
  • 中小企業

第8章 市場分析:末端使用者

  • 介紹
  • 銀行、金融機關
  • 通訊、IT
  • 國防、智能
  • 零售
  • 醫療
  • 政府
  • 其他
  • 製造
  • 教育
  • 輸送

第9章 市場分析:地區

  • 介紹
  • 北美
  • 歐洲
  • 亞太地區
  • 其他地區

第10章 競爭分析

  • 市佔率分析
  • 關於COVID-19的主要市場趨勢

第11章 企業介紹

  • BAE SYSTEMS INC
  • BARRACUDA NETWORKS INC.
  • BOOZ ALLEN HAMILTON HOLDING CORP.
  • CHECK POINT SOFTWARE TECHNOLOGIES
  • CISCO SYSTEMS INC.
  • COMPUTER SCIENCE CORP.
  • DELL INC. (SONICWALL INC.)
  • FORTINET INC.
  • HEWLETT PACKARD ENTERPRISE CO.
  • INTERNATIONAL BUSINESS MACHINE (IBM) CORP.
  • INTEL CORP.
  • KASPERSKY LAB
  • LOCKHEED MARTIN
  • NORTHROP GRUMMAN CORP.
  • PALO ALTO NETWORKS INC.
  • SOPHOS PLC
  • SYMANTEC CORP. (NORTON LIFELOCK INC.)
  • THALES GROUP
  • TREND MICRO

第12章 附錄:縮寫詞列表

目錄
Product Code: IFT131B

Highlights:

The global cyber security market should reach $267.2 billion by 2024 from $142.9 billion in 2019 at a compound annual growth rate (CAGR) of 13.3% for the forecast period of 2019 to 2024.

North American segment of the global cyber security market is expected to grow from $48.6 billion in 2019 to $79.9 billion in 2024 at a CAGR of 10.5% for the forecast period of 2019 to 2024.

Asia-Pacific segment of the global cyber security market is expected to grow from $32.9 billion in 2019 to $72.4 billion in 2024 at a CAGR of 17.1% for the forecast period of 2019 to 2024.

Report Scope:

The scope of the report encompasses various technologies used in cyber security applications and deployment types. The market is divided on the basis of enterprise size. Applications for the market are segmented into banking and financial services institutions, defense and intelligence, healthcare, retail, IT and telecommunications, government, and others, which includes the education and manufacturing sectors. The present cyber security market offers an opportunity to stakeholders largely because of a surge in cloud-based services and the increased use of the internet for online financial transactions.

This report highlights different solutions in the cyber security market, which includes identity and access management (IAM), encryption, data loss protection (DLP), firewall, antivirus and antimalware, disaster recovery, risk and compliance management, and other solutions. Other types of solutions include unified threat management (UTM), distributed denial of service mitigation and web filtering. In addition, the report also offers major regional analysis of North America, Europe, the Middle East, Africa and the Asia-Pacific. The estimated and forecast market revenue considered in this report is the summation of prices for software, hardware and subscription services.

Report Includes:

  • 75 data tables and 39 additional tables
  • An in-depth analysis of the global market for cyber security technologies within the industry
  • Analyses of the global market trends, with data corresponding to market size from 2018 and 2019, and projections of compound annual growth rates (CAGRs) through 2024
  • Discussion of major market drivers, current trends and opportunities, challenges and restraints, and adoption of managed security service providers
  • Information on value chain analysis providing a systematic study of the key intermediaries involved, which could further assist stakeholders in formulating appropriate strategies
  • Competitive landscape covering leading IT security solution providers; their market share analysis and key strategies adopted by these companies within the global cyber security market
  • Impact of the COVID-19 pandemic outbreak on the global financials, cyber threat, and cyber security solutions
  • Descriptive company profiles of major vendor companies, including BAE Systems Inc., Cisco Systems Inc., Dell Technology, HP, IBM Corp., Lockheed Martin, Northrop Grumman Corp. and Thales Group

Table of Contents

Chapter 1: Introduction

  • Cyber Security Goals
  • Study Goals and Objectives
  • Reasons for Doing This Study
  • Scope of Report
  • Research Methodology
  • Intended Audience
  • Analyst's Credentials
  • BCC Custom Research
  • Related BCC Research Reports

Chapter 2: Summary and Highlights

Chapter 3: Market Overview

  • Market Overview
  • Cyber Threats
    • Malware
    • Phishing
    • Password Attacks
    • Denial-of-Service Attacks and Distributed Denial-Of-Service Attacks
    • Man-In-The-Middle Attack
    • Drive-by Downloads
    • Malvertising
    • Rogue Software
  • Bring Your Own Device
  • Preventive Measures for Organizations
    • Mobile Device Management (MDM)
    • Mobile Application Management (MAM)
    • Mobile Security Management (MSM)
  • Life Cycle Analysis
    • Analysis of Computing Environment
    • Security Requirement
    • Designing Hardware and Software
    • Implementation of Design
    • Testing and Integration
  • Milestones in Cyber Security
  • Benefits of Cyber Security
  • Market Dynamics
    • Market Drivers
    • Market Restraints
    • Market Opportunities
    • Market Challenges
  • Impact of COVID-19
    • Financial Impact
    • Cyber Threat Landscape
    • Cyber Security Solutions

Chapter 4: Market Breakdown by Type

  • Introduction
  • Network Security
    • Ways to Mitigate Network Security Threats
  • Endpoint Security
    • Types of Endpoint Security
  • Wireless Security
    • Types of Wireless Security
  • Content Security
  • Cloud Security
    • Types of Cloud Security
  • Application Security
    • Types of Application Security

Chapter 5: Market Breakdown by Solution

  • Introduction
  • Identity and Access Management (IAM)
    • Identity and Access Management Market by Component
  • Encryption
    • Encryption Market by Component
  • Data Loss Protection
  • Firewall
    • Firewall Market by Component
  • Antivirus and Antimalware
  • Disaster Recovery
  • Risk and Compliance Management
  • Others
    • Web Filtering
    • Distributed Denial of Service Mitigation
    • Unified Threat Management

Chapter 6: Market Breakdown by Deployment Mode

  • Introduction
  • On-premise
  • Cloud
    • Layers of Security

Chapter 7: Market Breakdown by Organization Size

  • Introduction
  • Large Enterprises
  • SMEs

Chapter 8: Market Breakdown by End User

  • Introduction
  • Banking and Financial Institutions
  • Telecom and IT
  • Defense and Intelligence
  • Retail
  • Healthcare
  • Government
  • Others
  • Manufacturing
  • Education
  • Transportation

Chapter 9: Market Breakdown by Region

  • Introduction
  • North America
  • Europe
  • Asia-Pacific
  • Rest of the World

Chapter 10: Competitive Analysis

  • Market Share Analysis
  • Key Market Developments Related to COVID-19

Chapter 11: Company Profiles

  • BAE SYSTEMS INC.
  • BARRACUDA NETWORKS INC.
  • BOOZ ALLEN HAMILTON HOLDING CORP.
  • CHECK POINT SOFTWARE TECHNOLOGIES
  • CISCO SYSTEMS INC.
  • COMPUTER SCIENCE CORP.
  • DELL INC. (SONICWALL INC.)
  • FORTINET INC.
  • HEWLETT PACKARD ENTERPRISE CO.
  • INTERNATIONAL BUSINESS MACHINE (IBM) CORP.
  • INTEL CORP.
  • KASPERSKY LAB
  • LOCKHEED MARTIN
  • NORTHROP GRUMMAN CORP.
  • PALO ALTO NETWORKS INC.
  • SOPHOS PLC
  • SYMANTEC CORP. (NORTON LIFELOCK INC.)
  • THALES GROUP
  • TREND MICRO

Chapter 12: Appendix: List of Acronyms

List of Tables

  • Summary Table: Global Market for Cyber Security, by Region, Through 2024
    • Table 1: Global Market for Cyber Security, by Type, Through 2024
    • Table 2: Global Market for Network Security, by Region, Through 2024
    • Table 3: Global Market for Endpoint Security, by Region, Through 2024
    • Table 4: Global Market for Wireless Security, by Region, Through 2024
    • Table 5: Global Market for Content Security, by Region, Through 2024
    • Table 6: Global Market for Cloud Security, by Region, Through 2024
    • Table 7: Global Market for Application Security, by Region, Through 2024
    • Table 8: Global Market for Cyber Security, by Solution, Through 2024
    • Table 9: Global Market for Identity and Access Management in Cyber Security, by Region, Through 2024
    • Table 10: Global Market for Encryption in Cyber Security, by Region, Through 2024
    • Table 11: Global Market for Data Loss Protection in Cyber Security, by Region, Through 2024
    • Table 12: Global Market for Firewalls in Cyber Security, by Region, Through 2024
    • Table 13: Global Market for Antivirus and Antimalware in Cyber Security, by Region, Through 2024
    • Table 14: Global Market for Disaster Recovery in Cyber Security, by Region, Through 2024
    • Table 15: Global Market for Risk and Compliance in Cyber Security, by Region, Through 2024
    • Table 16: Global Market for Other Applications in Cyber Security, by Region, Through 2024
    • Table 17: Global Market for Cyber Security, by Deployment Mode, Through 2024
    • Table 18: Global Market for On-premise Deployment of Cyber Security, by Region, Through 2024
    • Table 19: Global Market for Cloud Deployment of Cyber Security, by Region, Through 2024
    • Table 20: Global Market for Cyber Security, by Organization Size, Through 2024
    • Table 21: Global Market for Cyber Security for Large Enterprises, by Region, Through 2024
    • Table 22: Global Market for Cyber Security for SMEs, by Region, Through 2024
    • Table 23: Global Market for Cyber Security, by End User, Through 2024
    • Table 24: Global Market for Cyber Security for Banking and Financial Institutions, by Region, Through 2024
    • Table 25: Global Market for Cyber Security for the Telecom and IT industry, by Region, Through 2024
    • Table 26: Global Market for Cyber Security in Defense and Intelligence, by Region, Through 2024
    • Table 27: Global Market for Cyber Security in the Retail Industry, by Region, Through 2024
    • Table 28: Global Market for Cyber Security in the Healthcare Industry, by Region, Through 2024
    • Table 29: Global Market for Cyber Security in Government, by Region, Through 2024
    • Table 30: Global Market for Cyber Security for Other Types of End Users, by Region, Through 2024
    • Table 31: North American Market for Cyber Security, by Type, Through 2024
    • Table 32: North American Market for Cyber Security, by Application, Through 2024
    • Table 33: North American Market for Cyber Security, by Deployment Mode, Through 2024
    • Table 34: North American Market for Cyber Security, by Organization Size, Through 2024
    • Table 35: North American Market for Cyber Security, by End User, Through 2024
    • Table 36: North American Market for Cyber Security, by Country, Through 2024
    • Table 37: European Market for Cyber Security, by Type, Through 2024
    • Table 38: European Market for Cyber Security, by Application, Through 2024
    • Table 39: European Market for Cyber Security, by Deployment Mode, Through 2024
    • Table 40: European Market for Cyber Security, by Organization Size, Through 2024
    • Table 41: European Market for Cyber Security, by End User, Through 2024
    • Table 42: European Market for Cyber Security, by Country/Region, Through 2024
    • Table 43: Asia-Pacific Market for Cyber Security, by Type, Through 2024
    • Table 44: Asia-Pacific Market for Cyber Security, by Application, Through 2024
    • Table 45: Asia-Pacific Market for Cyber Security, by Deployment Mode, Through 2024
    • Table 46: Asia-Pacific Market for Cyber Security, by Organization Size, Through 2024
    • Table 47: Asia-Pacific Market for Cyber Security, by End User, Through 2024
    • Table 48: Asia-Pacific Market for Cyber Security, by Country/Region, Through 2024
    • Table 49: Country Data Breaches Throughout Asia-Pacific, 2018
    • Table 50: Rest of the World Market for Cyber Security, by Type, Through 2024
    • Table 51: Rest of the World Market for Cyber Security, by Application, Through 2024
    • Table 52: Rest of the World Market for Cyber Security, by Deployment Mode, Through 2024
    • Table 53: Rest of the World Market for Cyber Security, by Organization Size, Through 2024
    • Table 54: Rest of the World Market for Cyber Security, by End User, Through 2024
    • Table 55: Rest of the World Market for Cyber Security, by Country/Region, Through 2024
    • Table 56: Key COVID-19 Strategies Used by Companies in the Global Cyber Security Market
    • Table 57: BAE Systems Inc.: Business Snapshot
    • Table 58: BAE Systems Inc.: Net Revenue, 2016-2018
    • Table 59: BAE Systems Inc.: Business Developments
    • Table 60: Barracuda Networks Inc.: Business Snapshot
    • Table 61: Barracuda Networks Inc.: Net Revenue, 2016 and 2017
    • Table 62: Barracuda Networks Inc.: Business Developments
    • Table 63: Booz Allen Hamilton Holding Corp.: Business Snapshot
    • Table 64: Booz Allen Hamilton Holding Corp.: Net Revenue, 2017-2019
    • Table 65: Booz Allen Hamilton Holding Corp.: Business Developments
    • Table 66: Check Point Software Technologies: Business Snapshot
    • Table 67: Check Point Software Technologies: Net Revenue, 2016-2018
    • Table 68: Check Point Software Technologies: Business Developments
    • Table 69: Cisco Systems Inc.: Business Snapshot
    • Table 70: Cisco Systems Inc.: Net Revenue, 2017-2019
    • Table 71: Cisco Systems Inc.: Business Developments
    • Table 72: DXC Technology: Business Snapshot
    • Table 73: DXC Technology: Net Revenue, 2017-2019
    • Table 74: DXC Technology: Business Developments
    • Table 75: Dell Technology: Business Snapshot
    • Table 76: Dell Technology: Net Revenue, 2017-2019
    • Table 77: Dell Technology: Business Developments
    • Table 78: Fortinet Inc.: Business Snapshot
    • Table 79: Fortinet Inc.: Net Revenue, 2017-2019
    • Table 80: Fortinet Inc.: Business Developments
    • Table 81: HP: Business Snapshot
    • Table 82: HP: Net Revenue, 2017-2019
    • Table 83: HP: Business Strategies
    • Table 84: IBM Corp.: Business Snapshot
    • Table 85: IBM Corp.: Net Revenue, 2017-2019
    • Table 86: IBM Corp.: Business Developments
    • Table 87: Intel Corp.: Business Snapshot
    • Table 88: Intel Corp.: Net Revenue, 2017-2019
    • Table 89: Intel Corp.: Business Developments
    • Table 90: Kaspersky Lab: Business Snapshot
    • Table 91: Kaspersky Lab: Net Revenue, 2019
    • Table 92: Kaspersky Lab: Business Developments
    • Table 93: Lockheed Martin: Business Snapshot
    • Table 94: Lockheed Martin: Net Revenue, 2017-2019
    • Table 95: Lockheed Martin: Business Developments
    • Table 96: Northrop Grumman Corp.: Business Snapshot
    • Table 97: Northrop Grumman Corp.: Net Revenue, 2016-2018
    • Table 98: Northrop Grumman Corp.: Business Developments
    • Table 99: Palo Alto Networks Inc.: Business Snapshot
    • Table 100: Palo Alto Networks Inc.: Net Revenue, 2017-2019
    • Table 101: Palo Alto Networks Inc.: Business Developments
    • Table 102: Sophos PLC: Business Snapshot
    • Table 103: Sophos PLC: Net Revenue, 2017-2019
    • Table 104: Sophos PLC: Business Developments
    • Table 105: Symantec Corp.: Business Snapshot
    • Table 106: Symantec Corp.: Net Revenue, 2016-2018
    • Table 107: Symantec Corp.: Business Developments
    • Table 108: Thales Group: Business Snapshot
    • Table 109: Thales Group: Net Revenue, 2017-2019
    • Table 110: Thales Group: Business Developments
    • Table 111: Trend Micro: Business Snapshot
    • Table 112: Trend Micro: Net Revenue, 2017-2019
    • Table 113: List of Acronyms

List of Figures

  • Summary Figure: Global Market for Cyber Security, by Region, 2018-2024
    • Figure 1: Types of Cyber Threats
    • Figure 2: Types of Malware
    • Figure 3: Types of Password Attacks
    • Figure 4: Types of MITM Attacks
    • Figure 5: Life Cycle Analysis for Cyber Security
    • Figure 6: History of Cyber Security
    • Figure 7: Benefits of Cyber Security
    • Figure 8: Market Dynamics of the Cyber Security Market
    • Figure 9: Global Market for Cyber Security, by Type, 2018-2024
    • Figure 10: Global Market for Cyber Security, by Solution, 2018-2024
    • Figure 11: Global Market for Cyber Security, by Deployment Mode, 2018-2024
    • Figure 12: Global Market for Cyber Security, by Organization Size, 2018-2024
    • Figure 13: Global Market for Cyber Security, by End User, 2018-2024
    • Figure 14: Global Market for Cyber Security, by Region
    • Figure 15: Global Market for Cyber Security, by Region, 2018-2024
    • Figure 16: Global Share of the Market for Cyber Security, by Vendor, 2019
    • Figure 17: BAE Systems Inc.: Sales Share, by Business Segment, 2018
    • Figure 18: BAE Systems Inc.: Sales Share, by Region, 2018
    • Figure 19: BAE Systems Inc.: SWOT Analysis
    • Figure 20: Barracuda Networks Inc.: Sales Share, by Business Segment, 2017
    • Figure 21: Barracuda Networks Inc.: SWOT Analysis
    • Figure 22: Booz Allen Hamilton Holding Corp.: Sales Share, by Contract Type, 2019
    • Figure 23: Booz Allen Hamilton Holding Corp.: Sales Share, by Customer Type, 2019
    • Figure 24: Booz Allen Hamilton Corp.: SWOT Analysis
    • Figure 25: Check Point Software Technologies: Sales Share, by Business Segment, 2018
    • Figure 26: Check Point Software Technologies: Sales Share, by Region, 2018
    • Figure 27: Check Point Software Technologies: SWOT Analysis
    • Figure 28: Cisco Systems Inc.: Sales Share, by Business Segment, 2019
    • Figure 29: Cisco Systems Inc.: Sales Share, by Region, 2018
    • Figure 30: Cisco Systems Inc.: SWOT Analysis
    • Figure 31: DXC Technology: Sales Share, by Business Segment, 2019
    • Figure 32: DXC Technology: Sales Share, by Region, 2019
    • Figure 33: Computer Science Corp.: SWOT Analysis
    • Figure 34: Dell Technology: Sales Share, by Business Segment, 2019
    • Figure 35: Dell Technology: Sales Share, by Region, 2019
    • Figure 36: Dell Technology Inc.: SWOT Analysis
    • Figure 37: Fortinet Inc.: Sales Share, by Business Segment, 2019
    • Figure 38: Fortinet Inc.: Sales Share, by Region, 2019
    • Figure 39: Fortinet Inc. SWOT Analysis
    • Figure 40: HP: Sales Share, by Business Segment, 2019
    • Figure 41: HP: Sales Share, by Region, 2019
    • Figure 42: HP: SWOT Analysis
    • Figure 43: IBM Corp.: Sales Share, by Business Segment, 2019
    • Figure 44: IBM Corp.: Sales Share, by Region, 2019
    • Figure 45: IBM SWOT Analysis
    • Figure 46: Intel Corp.: Sales Share, by Business Segment, 2019
    • Figure 47: Intel Corp.: Sales Share, by Region, 2019
    • Figure 48: Intel Corp.: SWOT Analysis
    • Figure 49: Kaspersky Lab: SWOT Analysis
    • Figure 50: Lockheed Martin: Sales Share, by Business Segment, 2019
    • Figure 51: Lockheed Martin: Sales Share, by Region, 2019
    • Figure 52: Lockheed Martin: SWOT Analysis
    • Figure 53: Northrop Grumman Corp.: Sales Share, by Business Segment, 2018
    • Figure 54: Northrop Grumman Corp.: Sales Share, by Region, 2019
    • Figure 55: Northrop Grumman Corp.: SWOT Analysis
    • Figure 56: Palo Alto Networks Inc.: Sales Share, by Business Segment, 2019
    • Figure 57: Palo Alto Networks Inc.: Sales Share, by Region, 2019
    • Figure 58: Palo Alto Networks Inc.: SWOT Analysis
    • Figure 59: Sophos PLC: Sales Share, by Business Segment, 2019
    • Figure 60: Sophos PLC: Sales Share, by Region, 2019
    • Figure 61: Sophos PLC: SWOT Analysis
    • Figure 62: Symantec Corp.: Sales Share, by Business Segment, 2018
    • Figure 63: Symantec Corp.: Sales Share, by Region, 2019
    • Figure 64: Symantec Corp.: SWOT Analysis
    • Figure 65: Thales Group: Sales Share, by Region, 2019
    • Figure 66: Thales Group: SWOT Analysis
    • Figure 67: Trend Micro: Sales Share, by Region, 2019
    • Figure 68: Trend Micro: SWOT Analysis