Cover Image
市場調查報告書

歐洲的網路安全技術、市場

Cybersecurity Market & Technologies - Focus on Europe 2017-2022

出版商 Homeland Security Research Corp. 商品編碼 484603
出版日期 內容資訊 英文 386 Pages; 24 Tables & Charts
商品交期: 最快1-2個工作天內
價格
Back to Top
歐洲的網路安全技術、市場 Cybersecurity Market & Technologies - Focus on Europe 2017-2022
出版日期: 2017年05月31日 內容資訊: 英文 386 Pages; 24 Tables & Charts
簡介

歐洲的網路安全市場,預計2016年∼2022年以8.5%的年複合成長率成長。

本報告提供歐洲的網路安全系統市場相關調查分析,市場規模與趨勢,推動市場要素與阻礙要素,課題等系統性資訊。

第1章 摘要整理

第2章 歐洲的網路安全市場背景

  • 歐洲的網路安全生態系統
  • 網路安全的規格與法令
  • 對網路安全管理者的建議
  • 歐洲的網路安全的課題
  • 網路安全的風險評估
  • 電腦網路犯罪相關國際條約

第3章 網路安全技術

  • 終端安全
  • 身份識別與存取管理 (IAM)
  • 行動企業管理
  • 行動安全
  • 安全資訊、活動管理 (SIEM)
  • 安全資訊過多
  • 內容安全
  • 惡意程式對策
  • 預防資料外洩 (DLP)
  • 資料中心安全
  • 防火牆
  • 入侵檢測系統/侵入防止系統 (IDS/IPS)
  • 整合威脅管理 (UTM)
  • 雲端基礎服務
  • 漏洞/風險管理、資安管理服務

第4章 網路安全的商務機會

第5章 網路安全:SWOT分析

第6章 波特的五力分析

第7章 網路安全推動市場要素

第8章 網路安全市場阻礙因素

第9章 歐洲的網路安全市場

  • 各國
  • 各收益來源

第10章 各國網路安全市場

  • 英國
  • 法國
  • 比利時
  • 瑞典,挪威,芬蘭,丹麥
  • 德國
  • 奧地利,瑞士
  • 義大利
  • 西班牙
  • 波蘭
  • 匈牙利,捷克
  • 俄羅斯
  • 其他歐洲各國

第11章 附錄A

第12章 附錄B

第13章 附錄C

第14章 附錄D

第15章 調查範圍、手法

第16章 免責聲明、著作權

目錄

Europe Cyber Security 2016-2022 Market CAGR 8.5%

Cybersecurity Technologies & Market - Focus on Europe - 2017-2022

Cyber-attacks against European targets are becoming increasingly more frequent and more sophisticated, pushing existing security capabilities to the limit. New solutions and the rapid expansion of networks and services indicate that this information overload will only worsen.

Considering the economic and business implications of cyber-attacks, it has now become mandatory for the Europeans to significantly increase their investments in state-of-the-art cybersecurity technologies, solutions and outsourced services to detect, prevent, analyze, and resolve the epidemics of cyber-crime and cyber-terror.

The Cyber Security report presents:

A. Market data - analyzed via 2 independent key perspectives:

With a highly-fragmented market, we address the "money trail" (each dollar spent is analyzed and crosschecked via 2 orthogonal viewpoints):

18 national markets:

  • UK
  • France
  • Netherlands
  • Belgium
  • Sweden
  • Norway
  • Finland
  • Denmark
  • Germany
  • Austria
  • Switzerland
  • Italy
  • Spain
  • Poland
  • Hungary
  • Czech Republic
  • Russia
  • Rest of Europe

3 Revenue source markets:

  • Products sales
  • Aftersales revenues (maintenance & upgrades)
  • Other revenues (consulting, planning, training, contracted services and government funded R&D)

B. European cybersecurity market analysis:

  • Business opportunities and challenges
  • Cybersecurity market SWOT analysis
  • Market dynamics
  • Market drivers and inhibitors

C. Dozens of European cybersecurity legislation and standards

D. Current & emerging technologies & services, key facts, sector background and analysis of the following 15 cybersecurity sectors:

  • 1. Endpoint Security
  • 2. Identity and Access Management
  • 3. Mobile Enterprise Management
  • 4. Mobile Security
  • 5. Security Information and Event Management (SIEM)
  • 6. Content Security
  • 7. Malware Mitigation
  • 8. Data Loss Prevention (DLP)
  • 9. Datacenter Security
  • 10. Firewalls
  • 11. Next Generation Firewalls
  • 12. IDS/IPS
  • 13. Unified Threat Management (UTM)
  • 14. Cloud-Based Services
  • 15. Vulnerability/Risk Management & Managed Security Services

E. Vendors Data on 190 cybersecurity companies operating in the market (profiles, contact information & management personnel):

41st Parameter, Accenture, Agiliance, AhnLab, Airbus, AirWatch, Akamai, Alert Logic, AlertEnterprise, AlienVault, Alt-N Technologies, Application Security, AppSense Limited, Arbor Networks, Attachmate, Authentify, AVAST Software, Aveksa, AVG Technologies, Avira, Barracuda Networks, Beyond Security, BeyondTrust, Bit9, Bitdefender, BlackBerry, BlackStratus, Blue Coat Systems, BoxTone, Bromium, BullGuard, Cassidian Communications Inc., Catbird Networks, Centrify, Cenzic, Check Point, CipherCloud, Cisco Systems Inc, Clearswift, Click Security, CloudFlare, CloudLock, Code Green Networks, Commtouch Software, Comodo, CORE Security, Corero Network Security, Courion, Covisint, CrowdStrike Holdings, CSID, Cyber Operations, Cyber-Ark, CyberArk Software, Cyberoam, Cyren, Damballa, DigiCert, Digital Info Security Company, EdgeWave, EiQ Networks, Elbit Systems, Enterasys Networks, Entrust, ESET, Exobox Technologies Corp, Extreme Networks, Faronics Technologies, Fast facts, Fiberlink, Fidelis Security Systems, FireEye, FireMon, ForeScout Technologies, FoxGuard Solutions, F-Secure, Fulcrum IT Services Company. LLC, G2 Web Services, Gemalto, General Dynamics, GFI Software, Good Technology, Guardian Analytics, Guidance Software, Hewlett-Packard Co, HyTrust, ID Analytics, Igloo Security Inc, Imprivata, Intel Security Group, International Business Machines Corp, Intrusion Inc, IOActive, Iovation, Juniper Network, Kaspersky Lab, L-3 Communications, Lacoon Security Ltd, Lancope, LANDesk Software, LogRhythm, Lookingglass Cyber Solutions, Lookout Mobile, Lumension Security, M5 Network Security, Mandiant, Mantech International Corp, Memento, Merlin International, MessageLabs, MetricStream, Mobile Active Defense, Mobile Vault, MobileIron, Mobilityone Ltd, Mocana, MU Dynamics, N-Dimension Solutions, NetCentrics Corporation, Network Security Systems, Nics Tech Co. Ltd., NIKSUN, NSS Labs Inc., Odyssey Technologies, Okta, OpenDNS, Palantir Technologies Inc, Palo Alto Networks Inc, Panda Security, ParetoLogic, Perimeter Internetworking Corp., PerspecSys, Ping Identity, Prolexic Technologies, Proofpoint, Qualys Inc., Quick Heal Technologies (P) Ltd., QUMAS, QuoVadis, Radware Ltd, Rapid7, Raytheon Pikewerks Corporation, Red Lambda Inc., ReD plc, RedSeal Networks Inc., Retail Decisions Plc, RLM Communications Inc., RSA Security LLC, SafeNet Inc., SailPoint Technologies Inc., SAINT Corporation, Salient Federal Solutions Inc., SecurityMetrics, Senetas Corp Ltd, SilverSky, Skybox Security Inc., SolarWinds, Solera Networks Inc., Sophos Ltd., Sotera Defense Solutions Inc., Splunk Inc., Stormshield Network Security (Formerly: NETASQ S.A.), Strikeforce Technologies, Symantec Corporation, Sympli ied Inc., Synectics Plc, Tangoe, TeleSign Corp., Tenable Network Security, Thales, The KEYW Holding Corporation, ThreatMetrix, TIBCO Software, TraceSecurity, Trend Micro Inc, Tripwire, Trusteer, Trustwave, Utimaco Safeware Inc., Vanguard Integrity Professionals Inc., Varonis Systems, VASCO Data Security International, Venafi, Veracode, Verdasys, Verint Systems Inc, WatchGuard Technologies, Webroot, WhiteHat Security, Workshare Technology, Zix Corporation, Zscaler

The Cyber Defense Market report includes the following appendices:

  • Appendix A: European Homeland Security & Public Safety Related Product Standards
  • Appendix B: The European Union Challenges and Outlook
  • Appendix C: Europe Migration Crisis & Border Security
  • Appendix D: Abbreviations

This “Cybersecurity Technologies & Market - Focus on Europe - 2017-2022” report is a valuable resource for executives with interests in the industry. It has been explicitly customized for industry and decision-makers to identify business opportunities, emerging technologies, market trends and risks, as well as to benchmark business plans.

Questions answered in this 386-page report include:

  • What will the European Cybersecurity market size be in 2017-2022?
  • Where and what are the Cybersecurity market opportunities?
  • What are the Cybersecurity market drivers and inhibitors?
  • What are the challenges to the Cybersecurity market?

The “Cybersecurity Technologies & Market - Focus on Europe - 2017-2022” report presents in 386 pages, 24 tables and 32 figures, analysis of current situation in this market. This report, granulated into 36 national and revenue source submarkets, provides for each submarket 2015-2016 data and assessments, and 2017-2022 forecasts and analyses.

Table of Contents

1. Executive Summary

2. European Cybersecurity Market Background

  • 2.1. The European Cybersecurity Eco-System
    • 2.1.1. European Cyberterrorism & Cybercrime
    • 2.1.2. Cyber Warfare
    • 2.1.3. The European Cybersecurity Policy
  • 2.2. Cybersecurity Standards and Regulations
    • 2.2.1. ISO 27001 and 27002 Standards
    • 2.2.2. Standard of Good Practice
    • 2.2.3. NERC Standards
    • 2.2.4. NIST Standards
    • 2.2.5. RFC 2196 Standards
    • 2.2.6. ISA/IEC-62443 Standards
    • 2.2.7. Planned and Published ISA-62443 IACS Security Standards.
      • 2.2.7.1. ISA-62443 Standards
      • 2.2.7.2. General Standards
    • 2.2.8. Policy and Procedure Standards
    • 2.2.9. System Integrator Standards
    • 2.2.10. Component Provider Standards
    • 2.2.11. ISA Security Compliance Institute
    • 2.2.12. The U.K. IASME Standards
    • 2.2.13. Payment Card Industry Security Standard (PCI DSS)
      • 2.2.13.1. PCI DSS of Major Debit, Credit, Prepaid, E-Purse, ATM, and POS Cards
      • 2.2.13.2. PCI DSS Requirements
      • 2.2.13.3. U.S. Mandated Compliance
      • 2.2.13.4. Compliance and Wireless LANs
    • 2.2.14. IT Security Standards
      • 2.2.14.1. ISO 27000 Series of Standards
    • 2.2.15. The EU Banking and Financial Services Cyber-Security Regulations
      • 2.2.15.1. EU financial services Regulations
      • 2.2.15.2. Financial Services Legislation in Force
      • 2.2.15.3. FATF International financial services Standard
      • 2.2.15.4. Cybercrime, Money Laundering & Terrorist Financing Pipeline Legislation
    • 2.2.16. Digital Identity Management Standards
  • 2.3. Recommendations for Cybersecurity Managers
  • 2.4. European Cybersecurity Challenges
  • 2.5. Cybersecurity Risk Assessment
  • 2.6. The International Treaty on Cybercrime

3. Cybersecurity Technologies

  • 3.1. Endpoint Security: Technology & Market Background
  • 3.2. Identity & Access Management: Technology & Market Background
  • 3.3. Mobile Enterprise Management: Technology & Market Background
  • 3.4. Mobile Security: Technology & Market Background
  • 3.5. Security Information & Event Management (SIEM): Technology & Market Background
  • 3.6. Security Information Overload
    • 3.6.1. Overview
    • 3.6.2. Example: IBM QRadar Security Intelligence Platform
  • 3.7. Content Security: Technology & Market Background
  • 3.8. Malware Mitigation: Technology & Market Background
    • 3.8.1. Overview
    • 3.8.2. Market Drivers
  • 3.9. Data Loss Prevention: Technology & Market Background
    • 3.9.1. Overview
    • 3.9.2. Market Drivers
  • 3.1. Datacenter Security: Technology & Market Background
    • 3.10.1. Overview
    • 3.10.2. Market Drivers
  • 3.11. Firewalls: Technologies & Market Background
    • 3.11.1. Overview
    • 3.11.2. Next Generation Firewall: Technology & Market Background
  • 3.12. Intrusion Prevention Systems & Intrusion Detection (IDS/IPS) Technologies & Market Background
    • 3.12.1. Overview
    • 3.12.2. IDS/IPS Market Ecosystem
    • 3.12.3. Market Drivers
  • 3.13. Unified Threat Management (UTM) Technology & Market Background
    • 3.13.1. Overview
    • 3.13.2. UTM Market Drivers
  • 3.14. Cloud-Based Services: Technology & Market Background
    • 3.14.1. Hybrid Cloud
    • 3.14.2. Market Drivers
  • 3.15. Vulnerability/Risk Management & Managed Security Services & Market Background
    • 3.15.1. Denial of Service
    • 3.15.2. Deliberate Manipulation of Information
    • 3.15.3. Detection of Unauthorized Activity
    • 3.15.4. Anti-Malware Cybersecurity
    • 3.15.5. Privacy Enhanced Technologies (PETs)
    • 3.15.6. Digital Identity Management (DIM)
    • 3.15.7. Digital Identity Management Services
    • 3.15.8. Digital Identity Management Identity Federation
    • 3.15.9. Digital Identity Management System Competences
    • 3.15.10. European Digital Identity Management Research

4. Cybersecurity Business Opportunities

5. Cybersecurity: SWOT Analysis

  • 5.1. Strengths
  • 5.2. Weaknesses
  • 5.3. Opportunities
  • 5.4. Threats

6. Barriers to New Entry, Supplier Power, Buyer Power and Barriers to Substitution

7. Cybersecurity Market Drivers

8. Cybersecurity Market Inhibitors

9. European Cybersecurity Market - 2015-2022

  • 9.1. European Cybersecurity Market by Country - 2015-2022
    • 9.1.1. National Markets & Forecast
    • 9.1.2. Market Breakdown by Country - 2015-2022
  • 9.2. Market by Revenue Source - 2015-2022
    • 9.2.1. Market & Forecast
    • 9.2.2. Market Breakdown Revenue Source - 2015-2022

10. National Cybersecurity Markets - 2015-2022

  • 10.1. UK Cybersecurity Market - 2015-2022
  • 10.2. France Cybersecurity Technologies Market - 2015-2022
  • 10.3. Belgium Cybersecurity Technologies Market - 2015-2022
  • 10.4. Sweden, Norway, Finland & Denmark Cybersecurity Technologies Market - 2015-2022
  • 10.5. Germany Cybersecurity Technologies Market - 2015-2022
  • 10.6. Austria & Switzerland: Cybersecurity Technologies Market - 2015-2022
  • 10.7. Italy Cybersecurity Technologies Market - 2015-2022
  • 10.8. Spain Cybersecurity Technologies Market - 2015-2022
  • 10.9. Poland Cybersecurity Technologies Market - 2015-2022
  • 10.1. Hungary & Czech Republic: Cybersecurity Technologies Market - 2015-2022
  • 10.11. Russia Cybersecurity Technologies Market - 2015-2022
  • 10.12. Rest of Europe: Cybersecurity Technologies Market - 2015-2022

11. Appendix A: European Homeland Security & Public Safety Related Product Standards

  • 11.1. European Committee for Standardization (CEN)
  • 11.2. European Homeland Security and Public Safety Standards
  • 11.3. EU Buildings & Perimeter Security Standards & Specifications

12. Appendix B: The European Union Challenges and Outlook

  • 12.1. Summary
  • 12.2. The EU Economy
  • 12.3. Anti-EU Trends
  • 12.4. The EU Frail Leadership and Poor Strategic Vision
  • 12.5. Migration and Refugee Crisis
  • 12.6. European Security Worries
  • 12.7. Terrorism
  • 12.8. EU Future Scenarios

13. Appendix C: Europe Migration Crisis & Border Security

  • 13.1. Introduction
  • 13.2. EU Migration: Background
  • 13.3. The European Borders Security
    • 13.3.1. Introduction
    • 13.3.2. The Schengen Area
    • 13.3.3. The European Integrated Border Management System (IBM)
    • 13.3.4. The EU Smart Borders Initiative
    • 13.3.5. The Schengen Zone: Passenger Name Record (PNR) System Outlook
    • 13.3.6. Temporary Reintroduction of Border Control
  • 13.4. European Smart & Secure Border Market

14. Appendix D: Abbreviations

15. Scope, Methodology & Disclaimer

  • 15.1. Research Scope
  • 15.2. Research Methodology

16. Disclaimer & Copyright

Tables

  • Table 1: European Cybersecurity Security Market [$M] by Country - 2015-2022
  • Table 2: European Cybersecurity Security Market [$M] by Revenue Source (Sales, Aftersale and Other Revenues) - 2015-2022
  • Table 3: Control Objectives vs. PCI DSS Requirements
  • Table 4: ISO 27001 - 27006 Standards
  • Table 5: ISO/IEC Standards
  • Table 6: Cybersecurity Market: Counter-Terror & Crime Business Opportunities
  • Table 7: Cybersecurity Market - Competitive Analysis
  • Table 8: European Cybersecurity Security Market [$M] by Country - 2015-2022
  • Table 9: European Cybersecurity Security Market [$M] by Revenue Source (Sales, Aftersale and Other Revenues) - 2015-2022
  • Table 10: UK Cybersecurity Market [$M] (incl. Sales, Aftersale and Other Revenues) and AGR [%] - 2015-2022
  • Table 11: UK Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 12: France Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 13: Belgium Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 14: Sweden, Norway, Finland & Denmark Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 15: Germany Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 16: Austria & Switzerland: Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 17: Italy Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 18: Spain Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 19: Poland Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 20: Hungary & Czech Republic: Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 21: Russia Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 22: Rest of Europe: Cybersecurity Technologies Market [$M] by Revenue Source - 2015-2022
  • Table 23: European Homeland Security and Public Safety Standards
  • Table 24: Membership in the EU, Eurozone, and Schengen Area

Figures

  • Figure 1: European Cybersecurity Security Market [$M] by Country - 2015-2022
  • Figure 2: European Cybersecurity Security Market Shares [%] by Country - 2015-2022
  • Figure 3: European Cybersecurity Market Share [%] by Revenue Source - 2015-2022
  • Figure 4: Cybersecurity Targets and Related Interests
  • Figure 5: Elements Required for a Premium Cybersecurity Set-up
  • Figure 6: Cyber Risks Roadmap
  • Figure 7: Security Information and Event Management (SIEM) Architecture
  • Figure 8: Security Information and Event Management Solutions
  • Figure 9: IBM QRadar Security Intelligence Platform
  • Figure 10: The European “Computer Emergency Response Teams & Command Centre” (CERTs .CERT/CCs)
  • Figure 11: European Cybersecurity Security Market [$M] by Country - 2015-2022
  • Figure 12: European Cybersecurity Security Market Shares [%] by Country - 2015-2022
  • Figure 13: European Cybersecurity Security Market [$M] by Revenue Source (Sales, Aftersale and Other Revenues) - 2015-2022
  • Figure 14: European Cybersecurity Market Share [%] by Revenue Source - 2015-2022
  • Figure 15: UK Cybersecurity Market [$M] by Revenue Category (Sales, Aftersale and Other Revenues) - 2015-2022
  • Figure 16: UK Cybersecurity Market Share [%] by Revenue Category - 2015-2022
  • Figure 17: The European Union: Member States and Candidate Countries
  • Figure 18: EU Countries Currency Status- 2016
  • Figure 19: European 2015-2016 GDP Growth Forecast [%] By Country
  • Figure 20: Europe GDP per Capita By Country
  • Figure 21: 2015 Refugee Applications to Europe by Month
  • Figure 22: 2015 Migrant Applications to Europe by Country of Origin
  • Figure 23: Main Routes of Migration
  • Figure 24: European Asylum-Seeker Decisions by Country
  • Figure 25: Refugee Acceptance by Country 2015
  • Figure 26: Asylum Claims per 100.000 Local Populations 2015
  • Figure 27: Fragility and Instability in Europe Neighborhood MEA Countries
  • Figure 28: Europe Inflows of Threats
  • Figure 29: European Borders
  • Figure 30: The 2016 Schengen Border Map
  • Figure 31: The Advanced Passenger Analysis (APA) System
  • Figure 32: Migrant Arrivals by Sea and Land Borders in 2015
Back to Top