網路安全:各主題調查
市場調查報告書
商品編碼
951719

網路安全:各主題調查

Cybersecurity - Thematic Research

出版日期: | 出版商: GlobalData | 英文 71 Pages | 訂單完成後即時交付

價格

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

簡介目錄

各企業現在遭受高級、持續性的網路攻擊的困擾,這些攻擊可能破壞運營和聲譽。儘管COVID-19產生了經濟影響,但對安全的需求以及創新對於應對不斷發展的威脅形勢至關重要的想法將推動網路安全支出。根據GlobalData的資料,預計到2020年,全球範圍內的公司將在安全方面花費1150億美元。到2030年,全球安全產業的價值將達到近2380億美元,在2019年至2030年之間的年複合成長率(CAGR)為6.4%。

本報告提供全球網路安全的市場調查,市場定義和概要,市場成長的影響因素,技術、宏觀經濟、法律規章上趨勢,安全產業的展望,安全相關收益的預測,價值鏈,主要供應商分析等資訊彙整。

目錄

  • 企業
  • 技術概要
  • 趨勢
  • 產業分析
  • 價值鏈
  • 企業
  • 部門計分卡
  • 詞彙表
  • 參考文件
  • 附錄:各主題調查手法
簡介目錄
Product Code: GDTMT-TR-S355

The cybersecurity landscape is complex. Today's always-connected world offers a myriad of opportunities for cyberattackers to disrupt countries, organizations, and individuals. Maintaining the security of IT systems is a constant struggle for organizations of all types. Cyberattacks are frequent and increasingly complex, perpetrated by those furthering a geopolitical cause or attackers intent on making money. State-sponsored attacks are a significant risk. No one-not even security providers themselves-is safe from attack. Companies manage an array of assets, including infrastructure, applications, managed and unmanaged endpoints, mobile devices, and cloud services-all of which are under threat. New vulnerabilities can be uncovered at any time, and there is also the worry of an insider attack.

Key Highlights

  • In 2021, enterprises invested more in cybersecurity and cloud architecture due to employees working remotely during the pandemic. This also sparked an M&A boom in the tech sector. Most cybersecurity M&A deals in 2021 were related to managed security services, network security, endpoint security, identity management, and cloud security. Microsoft, which bought cloud infrastructure company CloudKnox, threat intelligence and attack service management firm RiskIQ, and Internet of Things (IoT) security company ReFirm Labs, was one of the leading acquirers in 2021. Google added to its security capabilities by buying Mandiant (formerly FireEye) for $5.4 billion in March 2022, not long after purchasing threat detection firm Siemplify.
  • Securing hybrid working, coping with ransomware and continuing supply chain threats, and moving to a zero-trust security model as a long-term solution to data breaches will drive strong security growth over the next three years. Innovation will be needed to counter the continuously evolving cyberthreat landscape that includes the fallout from the Ukraine-Russia conflict. According to GlobalData estimates, the global cybersecurity industry will grow from $125.5 billion in 2020 to $198.0 billion in 2025 at a compound annual growth rate (CAGR) of 9.5%.

Scope

  • This report provides an overview of the cybersecurity theme.
  • It identifies the key trends impacting growth of the theme over the next 12 to 24 months, split into three categories: technology trends, macroeconomic trends, and regulatory trends.
  • It includes comprehensive industry analysis, including market size forecasts for cybersecurity and analysis of patents, company filings, hiring, and social media trends.
  • It contains details of M&A deals driven by the cybersecurity theme, and a timeline highlighting milestones in the development of cybersecurity.
  • The detailed value chain is split into three main areas: hardware, software, and services. The hardware segment includes chip-based security. The software segment includes identity management, network security, endpoint security, threat detection and response, cloud security, data security, email security, application security, unified threat management, and vulnerability management. The services segment includes managed security services, post-breach response services, and risk and compliance services.

Reasons to Buy

  • In a little over a decade, according to the World Economic Forum (WEF) Global Risks Report, cybercrime has moved from being a specialist crime to one of the most significant strategic risks facing the world today. This report provides an invaluable guide to this extremely disruptive theme. It includes comprehensive lists of the leading players across all aspects of the cybersecurity value chain, helping companies identify the right partners.
  • The report also includes a guide to the major threat actors and looks at the main types of cyberattack, from un-targeted attacks like phishing to targeted attacks like distributed denial of service (DDoS).

Table of Contents

Table of Contents

Executive summary

  • Players
  • Technology Briefing
  • Trends
  • Industry Analysis
  • Value Chain
  • Companies
  • Sector Scorecards
  • Glossary
  • Further Reading
  • Thematic Research Methodology