表紙
市場調查報告書

威脅情報·安全的全球市場:2018年∼2022年

Global Threat Intelligence Security Market 2018-2022

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 312959
出版日期 內容資訊 英文 124 Pages
訂單完成後即時交付
價格
Back to Top
威脅情報·安全的全球市場:2018年∼2022年 Global Threat Intelligence Security Market 2018-2022
出版日期: 2018年12月14日內容資訊: 英文 124 Pages
簡介

全球威脅情報·安全市場到2022年前,預測將以超越19%年複合成長率 (CAGR) 擴大。

本報告依終端用戶產業及地區別提供全球威脅情報·安全市場現狀分析與今後的預測,加上市場成長因素與課題,主要趨勢,主要供應商的簡介等資訊。

第1章 摘要整理

第2章 本報告的調查範圍

第3章 調查手法

第4章 市場形勢

  • 市場生態系統
  • 市場特徵
  • 市場區隔分析
  • 市場定義

第5章 市場規模

  • 市場規模
  • 市場規模與預測

第6章 波特的五力分析

第7章 各終端用戶的市場分類

  • 各終端用戶的分類
  • 各終端用戶比較
  • 銀行·金融服務·保險 - 市場規模與預測
  • IT·通訊 - 市場規模與預測
  • 醫療 - 市場規模與預測
  • 運輸·物流 - 市場規模與預測
  • 其他 - 市場規模與預測
  • 市場機會

第8章 客戶形勢

第9章 地區形勢

  • 地理區分
  • 地區比較
  • 南北美洲 - 市場規模與預測
  • 歐洲·中東·非洲地區 - 市場規模與預測
  • 亞太地區 - 市場規模與預測
  • 市場機會

第10章 決策架構

第11章 市場成長因素與課題

  • 市場成長因素
  • 市場課題

第12章 市場趨勢

第13章 業者情勢

  • 概要
  • 創造性破壞狀況
  • 競爭情形

第14章 供應商分析

  • 交易廠商
  • 供應商分類
  • 供應商的市場定位
  • Symantec
  • Trend Micro
  • Check Point Software Technologies
  • IBM
  • F-Secure

第15章 附錄

  • 簡稱清單

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: IRTNTR23556

About this market

Machine learning providing actionable intelligence threat to gain traction in the market. Threat intelligence is relevant if it can help enterprises to take timely actions. Intelligence comes from data, and in this era of big data and exponential increase in the number of threats, the efficiency of human security analysts cannot scale up to produce actionable threat intelligence. Hence, the sheer diversity and volume of threat data require the use of machine learning to read the data set, analyze it, and help enterprises reinforce their defenses against cyberthreats. Technavio' s analysts have predicted that the threat intelligence security market will register a CAGR of more than 19% by 2022.

Market Overview

Increasing incidences of data breach

Globally, the number of records breached per incident is increasing at an alarming rate. Threat intelligence services and platforms help shield and protect the sensitive information systems. Since the present-day attacks (like ransomware) are extremely immune toward the existing defenses, threat intelligence not only provides the defense shield but also gives pre-intimation of any malicious attack that is yet to happen.

Increasing complexity of IT infrastructure

One of the major challenges faced by the key players is the increased complexity of the network IT infrastructure. The addition of new security products such as software and services by vendors gives rise to integration issues and slows down the systems. This results in customer dissatisfaction and may ultimately lead to customer attrition.

For the detailed list of factors that will drive and challenge the growth of the threat intelligence security market during the 2018-2022, view our report.

Competitive Landscape

The market appears to be fragmented and with the presence of several companies including IBM and F-Secure the competitive environment is quite intense. Factors such as the increasing incidences of data breach and the advent of machine learning providing actionable intelligence, will provide considerable growth opportunities to threat intelligence security manufactures. Symantec, Trend Micro, Check Point Software Technologies, IBM, and F-Secure are some of the major companies covered in this report.

TABLE OF CONTENTS

PART 01: EXECUTIVE SUMMARY

PART 02: SCOPE OF THE REPORT

PART 03: RESEARCH METHODOLOGY

PART 04: MARKET LANDSCAPE

  • Market ecosystem
  • Market characteristics
  • Market segmentation analysis
  • Market definition

PART 05: MARKET SIZING

  • Market sizing 2017
  • Market size and forecast 2017-2022

PART 06: FIVE FORCES ANALYSIS

  • Bargaining power of buyers
  • Bargaining power of suppliers
  • Threat of new entrants
  • Threat of substitutes
  • Threat of rivalry
  • Market condition

PART 07: MARKET SEGMENTATION BY END-USER

  • Segmentation by end-user
  • Comparison by end-user
  • BFSI - Market size and forecast 2017-2022
  • IT and Telecom - Market size and forecast 2017-2022
  • Healthcare - Market size and forecast 2017-2022
  • Transportation and Logistics - Market size and forecast 2017-2022
  • Others - Market size and forecast 2017-2022
  • Market opportunity by end-user

PART 08: CUSTOMER LANDSCAPE

PART 09: REGIONAL LANDSCAPE

  • Geographical segmentation
  • Regional comparison
  • Americas - Market size and forecast 2017-2022
  • EMEA - Market size and forecast 2017-2022
  • APAC - Market size and forecast 2017-2022
  • Market opportunity

PART 10: DECISION FRAMEWORK

PART 11: DRIVERS AND CHALLENGES

  • Market drivers
  • Market challenges

PART 12: MARKET TRENDS

  • Machine learning providing actionable threat intelligence
  • Threat intelligence sharing
  • Big data analytics enhancing cybersecurity

PART 13: VENDOR LANDSCAPE

  • Overview
  • Landscape disruption
  • Competitive landscape

PART 14: VENDOR ANALYSIS

  • Vendors covered
  • Vendor classification
  • Market positioning of vendors
  • Symantec
  • Trend Micro
  • Check Point Software Technologies
  • IBM
  • F-Secure

PART 15: APPENDIX

  • List of abbreviations

List of Exhibits

  • Exhibit 01: Parent market
  • Exhibit 02: Global IT security market
  • Exhibit 03: Market characteristics
  • Exhibit 04: Market segments
  • Exhibit 05: Market definition - Inclusions and exclusions checklist
  • Exhibit 06: Market size 2017
  • Exhibit 07: Validation techniques employed for market sizing 2017
  • Exhibit 08: Global threat intelligence security - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 09: Global threat intelligence security - Year-over-year growth 2018-2022 (%)
  • Exhibit 10: Five forces analysis 2017
  • Exhibit 11: Five forces analysis 2022
  • Exhibit 12: Bargaining power of buyers
  • Exhibit 13: Bargaining power of suppliers
  • Exhibit 14: Threat of new entrants
  • Exhibit 15: Threat of substitutes
  • Exhibit 16: Threat of rivalry
  • Exhibit 17: Market condition - Five forces 2017
  • Exhibit 18: End-user - Market share 2017-2022 (%)
  • Exhibit 19: Comparison by end-user
  • Exhibit 20: BFSI - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 21: BFSI - Year-over-year growth 2018-2022 (%)
  • Exhibit 22: IT and Telecom - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 23: IT and Telecom - Year-over-year growth 2018-2022 (%)
  • Exhibit 24: Healthcare - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 25: Healthcare - Year-over-year growth 2018-2022 (%)
  • Exhibit 26: Transportation and Logistics - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 27: Transportation and Logistics - Year-over-year growth 2018-2022 (%)
  • Exhibit 28: Others - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 29: Others - Year-over-year growth 2018-2022 (%)
  • Exhibit 30: Market opportunity by end-user
  • Exhibit 31: Customer landscape
  • Exhibit 32: Global threat intelligence security - Market share by geography 2017-2022 (%)
  • Exhibit 33: Regional comparison
  • Exhibit 34: Americas - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 35: Americas - Year-over-year growth 2018-2022 (%)
  • Exhibit 36: Top 3 countries in Americas
  • Exhibit 37: EMEA - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 38: EMEA - Year-over-year growth 2018-2022 (%)
  • Exhibit 39: Top 3 countries in EMEA
  • Exhibit 40: APAC - Market size and forecast 2017-2022 ($ mn)
  • Exhibit 41: APAC - Year-over-year growth 2018-2022 (%)
  • Exhibit 42: Top 3 countries in APAC
  • Exhibit 43: Market opportunity
  • Exhibit 44: Vendor landscape
  • Exhibit 45: Landscape disruption
  • Exhibit 46: Vendors covered
  • Exhibit 47: Vendor classification
  • Exhibit 48: Market positioning of vendors
  • Exhibit 49: Symantec - Overview
  • Exhibit 50: Symantec - Business segments
  • Exhibit 51: Symantec - Organizational developments
  • Exhibit 52: Symantec - Geographic focus
  • Exhibit 53: Symantec - Segment focus
  • Exhibit 54: Symantec - Key offerings
  • Exhibit 55: Symantec - Key customers
  • Exhibit 56: Trend Micro - Overview
  • Exhibit 57: Trend Micro - Business segments
  • Exhibit 58: Trend Micro - Organizational developments
  • Exhibit 59: Trend Micro - Geographic focus
  • Exhibit 60: Trend Micro - Segment focus
  • Exhibit 61: Trend Micro - Key offerings
  • Exhibit 62: Trend Micro - Key customers
  • Exhibit 63: Check Point Software Technologies - Overview
  • Exhibit 64: Check Point Software Technologies - Product lines
  • Exhibit 65: Check Point Software Technologies - Organizational developments
  • Exhibit 66: Check Point Software Technologies - Geographic focus
  • Exhibit 67: Check Point Software Technologies - product line focus
  • Exhibit 68: Check Point Software Technologies - Key offerings
  • Exhibit 69: Check Point Software Technologies - Key customers
  • Exhibit 70: IBM - Overview
  • Exhibit 71: IBM - Business segments
  • Exhibit 72: IBM - Organizational developments
  • Exhibit 73: IBM - Geographic focus
  • Exhibit 74: IBM - Segment focus
  • Exhibit 75: IBM - Key offerings
  • Exhibit 76: IBM - Key customers
  • Exhibit 77: F-Secure - Overview
  • Exhibit 78: F-Secure - Sales channels
  • Exhibit 79: F-Secure- Organizational developments
  • Exhibit 80: F-Secure - Geographic focus
  • Exhibit 81: F-Secure - Sales channel focus
  • Exhibit 82: F-Secure - Key offerings
  • Exhibit 83: F-Secure - Key customers
Back to Top