表紙
市場調查報告書

電腦網路犯罪 & 網路安全的未來:威脅分析、影響評估、主要供應商 2018-2023年

The Future of Cybercrime & Security: Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024

出版商 Juniper Research Ltd 商品編碼 677119
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
電腦網路犯罪 & 網路安全的未來:威脅分析、影響評估、主要供應商 2018-2023年 The Future of Cybercrime & Security: Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024
出版日期: 2019年08月27日內容資訊: 英文
簡介

本報告提供網路安全的目前市場環境及威脅情勢的相關調查,網路安全法狀況,主要企業的策略,及端點 & 網路安全,雲端安全 & ID & 訪問管理,IoT & 設備安全為焦點,影響市場的整體趨勢等相關資訊彙整。

第1章 電腦網路犯罪 & 網路安全:要點

  • 電腦網路犯罪
  • 網路安全

第2章 電腦網路犯罪趨勢 & 展望

  • 簡介
  • 定義 & 類型
  • 電腦網路犯罪趨勢
  • 電腦網路犯罪威脅的評估
    • 金融的威脅
    • 設備的威脅
  • 電腦網路犯罪漂白的預測

第3章 網路安全趨勢

  • 簡介
  • 網路安全趨勢
  • 網路安全市場預測
  • 法規環境
    • 北美
    • 南美
    • 歐洲
    • 亞太地區

第4章 網路安全部門的展望 & 競爭分析

  • 網路安全市場部門的展望
    • 雲端安全
    • IAM (ID & 訪問管理)
    • 終端安全
    • 威脅情報
  • 網路安全市場部門的競爭分析
    • 供應商評價標準
    • 雲端安全供應商的排行榜
    • ID & 訪問管理的排行榜
    • 終端安全的排行榜
    • 限制事項

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

Overview

‘The Future of Cybercrime & Security’ provides a thorough examination of the current market environment and threat landscape for cybersecurity. The research presents vital information on the state of cybersecurity legislation, in-depth analysis of player strategies and an assessment of the overall trends affecting the market, focusing on the following areas:

  • Endpoint & Network Security
  • Cloud Security & Identity & Access Management
  • IoT & Device Security

The research includes:

  • Market Trends & Opportunities (PDF)
  • 5-Year Market Sizing & Forecast spreadsheet (Excel)

Key Features

  • Threat Landscape: See what are the main cyberthreats for enterprises and consumers in 2019 and beyond, for the following key sectors:
    • Banking & Finance
    • Consumer Devices
    • IoT
  • Market Dynamics: Strategic assessment of the current market landscape, examining future developments across the cybersecurity market, including segment by segment analysis.
  • Regulatory Guide: Examination of the range of cybersecurity legislation in place across 13 territories, and an analysis of their implications and future development.
  • Juniper Leaderboards & Vendor Analysis: Key player capability and capacity assessment for 48 enterprise cybersecurity providers, split by:
    • Endpoint Security Leaderboard
    • Cloud Cybersecurity Leaderboard
    • Identity & Access Management Leaderboard
    • Security Awareness Training Leaderboard
  • Market Sizing: 5-year forecasts for both the cost of cybersecurity data breaches and levels of enterprise cybersecurity spending.

Key Questions

  • 1. How are cyberthreats evolving in an ever-more connected landscape?
  • 2. Where are the biggest vulnerabilities in the current digital environment?
  • 3. How are the key players in cybersecurity players reacting to the latest market developments?
  • 4. What are the strategies of the leading players in key cybersecurity segments?
  • 5. What are governments doing to support greater cybersecurity?

Companies Referenced

  • Included in Juniper Leaderboards: Akamai, Alert Logic, AlienVault, Avast, Avoco Secure, Barkly, Carbon Black, Centrify, CipherCloud, CloudFlare, Cofense, Cyberark, Cylance, DarkTrace, Duo, Everynym, FireEye, Forcepoint, Forgerock, IBM, Illumio, Infosec Institute, KnowB4, Lookout, Minerva, Netskope, Okta, Oracle, Paladion, Palo Alto Networks, Ping, Proofpoint, Qualys, RSA, SailPoint, SANS Institute, SecureWorks, SentinelOne, SentryBay, SonicWall, Sophos, Symantec, Tanium, The Defence Works, Trend Micro, Webroot, Yoti, Zscaler.
  • Mentioned: Apple, AT&T, Australian Notifiable Data Breaches, Blackpoint Cyber, Broadcom, CA Technologies, Citizensafe, Deloitte, ESET, Facebook, FDA (Food and Drug Administration), Federal Trade Commission, FIDO Alliance, First American Mortgage, GB Group, Gemalto/Thales, Google, Harris Interactive, HSBC Bank, IMF, INAI (National Institute for Transparency, Access to Information and Personal Data Protection), Information Commissioner's Office, Iovation, ISO, iWelcome, JanRain, Kaspersky, LightCyber, McAfee, Medtronic, Metro Bank, Microsoft, MVine, National Data Protection Authority, NetIQ, NetScout, NetWatcher, Neustar, NIST (National Institute of Standards and Technology), OECD, OIX, Positive Technologies, ProofPoint, PureSec, Royal Mail, SecureKey, Sift Security, Skyfence, Sovrin Foundation, Tax Investment and Saving Association, The Ponemon Institute, TwistLock, Verified.me, Verizon, WeChat, WhatsApp, WTO (World Trade Organisation).

Data & Interactive Forecast

Juniper's ‘The Future of Cybercrime & Security’ forecast suite includes:

  • Cybersecurity spend forecast splits for 8 key regions and 8 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Data breach volume and value forecast splits for 8 key regions and 8 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Interactive Scenario tool allowing user the ability to manipulate Juniper's data for 10 different metrics.
  • Access to the full set of forecast data of 28 tables and over 3,700 datapoints.

Juniper Research's highly granular IFxls (Interactive Excels) enable clients to manipulate Juniper's forecast data and charts to test their own assumptions using the Interactive Scenario Tool, and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

1. The Outlook for Cybercrime & Financial Services

  • 1.1 Introduction
  • 1.2 Key Takeaways

2. Cybercrime Trends

  • 2.1 Introduction
  • 2.2 Definitions & Typology
    • 2.2.1 Incident Types
    • 2.2.2 Attack Types
      • i. DoS & DDoS
      • ii. Phishing
      • iii. Trojans
      • iv. Keylogging
      • v. MITM Attacks
      • vi. Scrapers & Skimmers
      • vii. Ransomware
      • viii. Botnets
      • ix. Cryptojacking
      • x. Quantum Computing
    • 2.2.3 Motivations
  • 2.3 Cybercrime Trends
    • Figure 2.1: DDoS Attack Trends
    • Case Study: Smarter Botnets Take on Businesses
      • Figure 2.2: Multi-Vector DDoS Attacks
  • 2.4 Juniper Cybercrime Threat Assessments
    • 2.4.1 Financial Threat Assessments
      • i. Banking
        • Figure 2.3: Juniper Research 2019 Banking Cybercrime Threat Landscape Assessment
        • Figure 2.4: Juniper Research Banking Cybercrime Future Threat Landscape .... 18 ii. Payments & Money Transfer
        • Figure 2.12: Forecast
        • Figure 2.5: Juniper Research 2019 Payments & Money Transfer Cybercrime Threat Landscape Assessment
        • Figure 2.6: Juniper Research Payments & Money Transfer Cybercrime Future Threat Landscape
      • iii. Mobile Wallets
        • Figure 2.7: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape Assessment
        • Figure 2.8: Juniper Research Mobile Wallets Cybercrime Future Threat Landscape
    • 2.4.2 Device Threat Assessment
      • i. Smartphones
        • Figure 2.9: Juniper Research 2019 Smartphone Cybercrime Threat Landscape Assessment
        • Figure 2.10: Juniper Research Smartphone Cybercrime Future Threat Landscape
      • ii. IoT Devices
        • Figure 2.11: Juniper Research 2019 IoT Cybercrime Threat Landscape Assessment
        • Figure 2.12: Juniper Research 2019 IoT Cybercrime Threat Landscape
  • 2.5 Cybercrime Breach Forecast
    • 2.5.1 Methodology
      • Figure 2.13: Criminal Data Breach Forecast Methodology
      • i. Forecast Assumptions & Limitations of Analysis
  • 2.6 Cybercrime Breaches Forecasts
    • 2.6.1 Breaches Volume
      • Figure & Table 2.14: Total Number of Criminal Data Breaches per annum, Split by 8 Key Regions, 2019-2024
    • 2.6.2 Data Breaches Value
      • Figure & Table 2.15: Cost of Criminal Data Breaches per annum ($m), Split by 8 Key Regions 2019-2024

3. Cybersecurity Trends

  • 3.1 Introduction
    • 3.1.1 Definitions
  • 3.2 Cybersecurity Trends
    • Figure 3.1: Threats & Alerts Investigation Rate
  • 3.3 Cybersecurity Market Forecasts
    • 3.3.1 Cybersecurity Spend Forecast Methodology
      • Figure 3.2: Cybersecurity Spend Forecast Methodology
    • 3.3.2 Forecast Assumptions & Limitations of Analysis
    • 3.3.3 Cybersecurity Market Spend Forecast
      • Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key Regions 2019-2024
  • 3.4 Regulatory Environment
    • 3.4.1 North America
      • i. US
      • ii. Canada
    • 3.4.2 Latin America
      • i. Argentina
      • ii. Brazil
      • iii. Mexico
    • 3.4.3 Europe
      • i. EU
      • ii. Germany
      • iii. Russia
      • iv. Turkey
      • v. UK
    • 3.4.4 Asia Pacific
      • i. China
      • ii. Japan
      • iii. India

4. Cybersecurity Sector Outlook & Competitive Analysis

  • 4.1 Cybersecurity Market Sectors Outlook
    • 4.1.1 Cloud Security
    • 4.1.2 IAM (Identity & Access Management)
    • 4.1.3 Endpoint Security
    • 4.1.4 Threat Intelligence
    • 4.1.5 Security Awareness Training
  • 4.2 Cybersecurity Market Sectors Competitive Analysis
    • 4.2.1 Vendor Assessment Criteria
      • Table 4.1: Cybersecurity Vendor Assessment Criteria
    • 4.2.2 Cloud Security Providers Leaderboard
      • Figure 4.2: Juniper Research Leaderboard for Cloud Security Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.3 Identity & Access Management Leaderboard
      • Figure 4.3: Juniper Research Leaderboard for IAM Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disrupters & Emulators
    • 4.2.4 Endpoint Security Leaderboard
      • Figure 4.4: Juniper Leaderboard for Endpoint Security Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.5 Security Awareness Training Vendors
      • Figure 4.5: Juniper Leaderboard for Security Awareness Training Vendors
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.6 Limitations & Interpretation