NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

表紙
市場調查報告書

SIEM (安全資訊、活動管理):全球市場的分析與預測 2021年

Security Information and Event Management (SIEM)-Global Market Analysis, Forecast to 2023

出版商 Frost & Sullivan 商品編碼 531681
出版日期 內容資訊 英文 96 Pages
商品交期: 最快1-2個工作天內
價格
SIEM (安全資訊、活動管理):全球市場的分析與預測 2021年 Security Information and Event Management (SIEM)-Global Market Analysis, Forecast to 2023
出版日期: 2019年02月11日內容資訊: 英文 96 Pages
簡介

本報告提供全球SIEM (安全資訊、活動管理) /LM (記錄管理) 市場相關調查,地區,垂直市場,產品類型,及市場各規模的分析,市場佔有率,主要SIEM/LM供應商的策略等相關彙整。

第1章 摘要整理

第2章 市場概要

  • 市場概要
  • 市場概要:流通管道
  • 市場概要:流通管道的議論

第3章 外部環境的相關課題:促進要素、抑制因素 - 市場全體

  • 促進要素、抑制因素
  • 促進要素的說明
  • 抑制因素的說明

第4章 預測、趨勢:市場全體

  • 預測的前提條件
  • 全球SIEM市場整體收益預測
  • 圖表:SIEM/LM出貨量、收益預測
  • 收益預測的議論
  • SIEM市場整體 - 收益預測:各地區
  • 地區的收益預測的議論
  • SIEM市場整體 - 收益預測:各產品類型
  • 產品類型、收益預測的議論
  • SIEM市場整體 - 收益預測:各垂直市場
  • 垂直市場收益預測的議論
  • SIEM市場整體 - 收益預測:各產業規模
  • 產業規模的收益預測的議論

第5章 市場佔有率、競爭分析:市場全體

  • 競爭分析:市場佔有率
  • 競爭要素、評估
  • 競爭環境
  • 主要的競爭企業
  • 關注的M&A,及過渡

第6章 競爭的差異化的點 (POCD)

  • 簡介
  • 發展
  • 資產發現、動態身份的製圖
  • 企業網路容易使用
  • SIEM SMB的方法
  • 搜尋功能
  • 威脅檢測的分析平台
  • Threat Intelligence Exchange
  • 大規模資料流程的處理能力
  • 使用專用平台的SIEM整合
  • 事件回應平台
  • 用戶行為分析
  • 標準化、資料豐富
  • 威脅捕捉流程
  • SIEM即服務:SMB
  • SIEM即服務:大企業、企業
  • MDR (Managed Detection and Response)

第7章 市場區隔:各產業規模 - 企業市場區隔的明細

  • 市場工程檢測
  • 收益預測
  • 收益預測的議論
  • 環境

第8章 大企業市場區隔的明細

第9章 中規模企業市場明細

第10章 小規模企業/ROBO市場區隔的明細

第11章 結論

  • 預測
  • 建議
  • 免責聲明

第12章 供應商簡介

  • AlienVault
  • eSentire
  • FireEye
  • Fortinet
  • HPE ArcSight
  • IBM
  • LogPoint
  • LogRhythm
  • McAfee
  • RSA
  • SolarWinds
  • Splunk

第13章 附錄

目錄
Product Code: K30F-74

Threat Complexity and Improved Usability Drive SIEM 3.0

SIEM supports continuous collection, standardization, correlation, analysis, and reporting of security and operational information. SIEM is a security intelligence platform that has a unique ability to receive logs from other security tools such as Endpoint Detection and Response (EDR), Endpoint Protection Platform (EPP) endpoint solutions, Next generation Firewalls, UTMS, IPS, WAF and in real time provide information for correlation and analysis.

For the SIEM tools to be effective, it needs policies and regulatory processes transforming logs into intelligence and mixed with other forms of information (vulnerabilities assessments, threat intelligence). The most important functions of the modern SIEM solutions are related to threat detection, mitigation and response, compliance and regulation reports, use of advanced analytics and UEBA forensic analysis and SOAR .

Several aspects are positive contributing for the growth of the SIEM market, some to be highlighted are: Improved SIEM usability, To lower the barriers to adoption, providers are attempting to make SIEMs easier to use and also increase its relevance as a cybersecurity tool. The integration with threat intelligence and forensic analysis, compliance regulations such as GDPR, the use of cloud computing as an essential deployment vector for SIEM and the use of machine learning, deep learning and artificial intelligence to improve the effectiveness of SIEM.

Cloud solutions are becoming an important market driver for SIEM, Cloud distribution is likely to be less expensive than SIEM physical appliances or software. For small and midsized businesses, cloud-delivered SIEM services, either managed SIEM or SIEM-as-a-Service, are appealing alternatives. Due to complexity, skill shortages and cost, companies are now opting for the managed service, turning for a third party to manage their SIEM solution. This business model combined with cloud solutions facilitate SMBs to also have the benefit of SIEM solutions.

With the emergence of new types of attacks that use multiple vectors to penetrate a company, the necessity to analyze malwares, produce relevant alerts and block them before they penetrate the company network environment has become crucial. R&D investments are important in terms of customer protection. This is a constant necessity as threats evolve and as innovation becomes a key point for companies to differentiate themselves and create value for customers.

SIEM vendors should equip their channel partners with a sound go-to-market strategy so their partners can transform their sales motion from selling product to solving a business problem. MSSPs have an important participation in the distribution channel, as they are able to provide Service level agreements (SLAs) related to latency, availability, redundancy, support, and performance of technology resources, and provide the skilled resources.

Table of Contents

1. EXECUTIVE SUMMARY

  • Key Findings
  • Key Findings (continued)
  • Key Findings (continued)
  • Key Findings (continued)
  • Key Findings (continued)
  • Key Findings (continued)
  • Market Engineering Measurements
  • CEO's Perspective

2. MARKET OVERVIEW

  • Market Definitions
  • Key Questions This Study Will Answer
  • Market Distribution Channels
  • Market Distribution Channels Discussion

3. DRIVERS AND RESTRAINTS-TOTAL MARKET

  • Market Drivers
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Market Restraints
  • Restraints Explained
  • Restraints Explained (continued)
  • Restraints Explained (continued)
  • A Perennial Shortage in InfoSec Talent
  • Restraints Explained (continued)

4. FORECASTS AND TRENDS-TOTAL MARKET

  • Forecast Assumptions
  • Forecast Assumptions (continued)
  • Forecast Assumptions (continued)
  • Total Global SIEM Market Revenue Forecast
  • Revenue Forecast Discussion
  • Revenue Forecast Discussion (continued)
  • Total SIEM Market-Revenue Forecast by Region
  • Regional Revenue Forecast Discussion
  • Regional Revenue Forecast Discussion (continued)
  • Total SIEM Market-Revenue Forecast by Product Type
  • Product Type and Revenue Forecast Discussion
  • Total SIEM Market-Revenue Forecast by Vertical Market
  • Vertical Market Revenue Forecast Discussion
  • Vertical Market Revenue Forecast Discussion (continued)
  • Vertical Market Revenue Forecast Discussion (continued)
  • Total SIEM Market-Revenue Forecast by Size of Business
  • Size of Business Revenue Forecast Discussion
  • Size of Business Revenue Forecast Discussion (continued)

5. MARKET SHARE AND COMPETITIVE ANALYSIS-TOTAL MARKET

  • Market Share
  • Competitive Factors and Assessment
  • Competitive Factors and Assessment (continued)
  • Competitive Environment
  • Top Competitors
  • Notable Mergers, Acquisitions, and Transactions
  • Notable Mergers, Acquisitions, and Transactions (continued)
  • Notable Mergers, Acquisitions, and Transactions (continued)

6. THE LAST WORD

  • The Last Word-Predictions
  • The Last Word-Recommendations
  • Legal Disclaimer

7. VENDOR PROFILES

  • Vendor Profile-AlienVault
  • Vendor Profile-AlienVault (continued)
  • Vendor Profile-Exabeam
  • Vendor Profile-Exabeam (continued)
  • Vendor Profile-FireEye
  • Vendor Profile-FireEye (continued)
  • Vendor Profile-Fortinet
  • Vendor Profile-Fortinet (continued)
  • Vendor Profile-IBM
  • Vendor Profile-IBM (continued)
  • Vendor Profile-LogPoint
  • Vendor Profile-LogPoint (continued)
  • Vendor Profile-LogRhythm
  • Vendor Profile-LogRhythm (continued)
  • Vendor Profile-McAfee
  • Vendor Profile-McAfee (continued)
  • Vendor Profile-Micro Focus
  • Vendor Profile-Micro Focus (continued)
  • Vendor Profile-RSA
  • Vendor Profile-RSA (continued)
  • Vendor Profile-SolarWinds
  • Vendor Profile-SolarWinds (continued)
  • Vendor Profile-Splunk
  • Vendor Profile-Splunk (continued)

8. APPENDIX

  • Market Engineering Methodology
  • Market Engineering Measurements
  • List of Companies Included in “Others”
  • Learn More-Next Steps
  • List of Exhibits