Endpoint Detection and Response Market - Growth, Trends, and Forecast (2020 - 2025)

出版商 Mordor Intelligence LLP 商品編碼 704888
出版日期 內容資訊 英文 120 Pages
商品交期: 2-3個工作天內
全球端點威脅檢測、支援(EDR)市場:各引進類型、零組件、解決方案、組織規模、終端用戶、地區(2018年∼2023年) Endpoint Detection and Response Market - Growth, Trends, and Forecast (2020 - 2025)
出版日期: 2020年01月01日內容資訊: 英文 120 Pages




第1章 簡介

  • 調查成果
  • 市場定義
  • 調查的前提條件

第2章 調查方法

第3章 摘要整理

第4章 市場分析

  • 市場概要
  • 波特的五力分析
    • 買方議價能力
    • 供給企業談判力
    • 新加入業者的威脅
    • 替代品的威脅
    • 競爭企業間的敵對關係
  • 產業價值鏈分析
  • 產業政策

第5章 市場動態

  • 市場成長要素
    • IoT及智慧裝置的高集積化
    • IT安全的風險削減的需求高漲
    • 以企業端點為標的之攻擊的增加
  • 市場課題
    • 整合安全解決方案的高需求與EDR解決方案的認知度低
    • 技術人員的不足

第6章 技術概要

第7章 端點威脅檢測、支援(EDR)市場:各市場區隔

  • 各引進類型
    • 雲端
    • 內部部署
  • 各零件
    • 解決方案
    • 服務
  • 各解決方案
    • 工作站
    • 行動裝置
    • 伺服器
    • POS終端機
    • 其他
  • 各企業規模
    • 中小企業
    • 大企業
  • 各終端用戶
    • 銀行、金融服務、保險
    • IT、通訊
    • 製造
    • 醫療
    • 零售
    • 其他
  • 各地區
    • 北美
    • 歐洲
    • 亞太地區
    • 南美
    • 中東、非洲

第8章 企業簡介

  • Carbon Black Inc.
  • Cisco Systems Inc.
  • Crowdstrike Inc.
  • Symantec Corporation
  • Cybereason Inc.
  • Deep Instinct
  • Digital Guardian
  • Fireeye Inc.
  • Guidance Software Inc.
  • Panda Security
  • Sophos Group PLC
  • Gemalto
  • F-Secure
  • Fortinet
  • RSA Security (EMC)

第9章 市場投資分析

第10章 市場未來展望


Product Code: 63627

Market Overview

The endpoint detection and response (EDR) market is expected to reach USD 4,234.64 million by 2025, at a CAGR of 22.97%, during the forecast period (2020 - 2025). Nowadays, AI enabled EDR solutions are on the rise. For instance, Cylance showcased AI-powered EDR solution at the RSA 2018 conference.

  • There have been rising cases of enterprise endpoints attacks globally. Lately, in April 2019, Amnesty International's Hong Kong office has been hit by a years-long cyberattack from hackers with known links to the Chinese government. In the same month, medical billing service provider 'Doctors' Management Service' suffered a ransomware attack compromising patients' data from a number of its clients. These kind of incidents are leading to an emerging demand for incident response services.
  • High proliferation of IoT and smart devices will lead to more data breaches. According to GSMA, total IoT connections in 2017 were 7.5 billion and is expected to be 25.1 billion by the end of 2025. This will cause a rise in demand of EDR tools.
  • According to ESG, more than half of organizations face a shortage of cybersecurity skills and staffing. The cyber analyst has to examine the trends and suggest solutions to the enterprise to mitigate future risks. Sometimes there is a flood of alerts which the analyst is incapable of handling.

Scope of the Report

After the attacker compromises an endpoint, they laterally spread (East-West Movement or Lateral Movement) to other systems and accounts until they reach their primary objective. Protecting against every endpoint threat is impossible: hence, organizations are shifting their focus to fast detection and response through an EDR service. Once a threat is validated, these solutions take immediate action to contain the compromised endpoint(s), resolve the threat, and protect endpoints against future similar attacks.

Key Market Trends

Data Breaches in Healthcare Industry to Drive the Need for EDR Solutions

  • In 2018, the healthcare industry continued to be plagued by data breaches involving sensitive patient information, according to 2019 Breach Barometer Annual Report by Protenus.
  • The largest breach reported in 2018 was the result of hacking of a business associate. It involved a North Carolina-based health system vendor that had its patient information accessed by an unauthorized party. Hackers gained access to patient information over the course of a week, affecting 2.65M patient records.
  • For 2019, the largest data breach incident was reported by Navicent Health in March. It was a phishing attack in which the records of 278,016 patients were potentially accessed and copied by the attackers. A similarly sized data breach was reported by ZOLL Services, which impacted 277,319 individuals.
  • As per HIPAA's Data Breach Report, healthcare data breaches continued to be reported at a rate of one a day in March 2019,

Asia-Pacific to Witness the Highest Growth

  • According to IBEF, India's IT & ITeS industry grew to USD 181 billion in 2018-2019. According to data released by the Department of Industrial Policy and Promotion (DIPP), the computer software and hardware sector in India attracted cumulative Foreign Direct Investment (FDI) inflows worth US$ 35.82 billion between April 2000 to December 2018. This calls for an increased demand for endpoint detection and response tools as the manufacture of hardware is set to increase.
  • Moreover, growing technological innovations in China and Japan results in the growth of EDR market. According to Japan Electronics and Information Technology Industries Association (JEITA), Computers and IT, terminal production in February 2019 was worth 95,371 million yen as compared to 85,564 million yen in January 2019.
  • According to GSMA, the fastest growth of IoT connections is in Asia-Pacific from 2.8 billion in 2017 to 8.1 billion in 2025. Owing to all these factors, Asia-Pacific is expected to witness the fastest CAGR over the forecast period.

Competitive Landscape

The market for endpoint detection and response is becoming fragmented due to the growing data breaches cases globally. For big organizations, storing personal data securely, in this fast-paced world has become the most critical task. Giants like Carbon Black, Cisco Systems and Symantec are developing EDR tools to cater to such organizations.

  • May 2019 - SolarWinds announced that it has expanded its security portfolio with SolarWinds Endpoint Detection and Response through its partnership with SentinelOne, the autonomous endpoint protection company. It is designed to help MSPs prevent, detect, and respond to the latest threats to customer endpoints with patented Behavioral AI.
  • March 2019 - Microsoft launched Microsoft 365 advanced endpoint security solution for macOS. The initial launch involves a limited public preview and a new user interface meant to provide Mac users with the same experience currently available to Windows 10 users.

Reasons to Purchase this report:

  • The market estimate (ME) sheet in Excel format
  • Report customization as per the client's requirements
  • 3 months of analyst support

Table of Contents


  • 1.1 Study Deliverables
  • 1.2 Study Assumptions
  • 1.3 Scope of the Study




  • 4.1 Market Overview
  • 4.2 Introduction to Market Drivers and Restraints
  • 4.3 Market Drivers
    • 4.3.1 Increasing Expansion of Enterprise Mobility
  • 4.4 Market Restraints
    • 4.4.1 Higher Innovation Costs
  • 4.5 Value Chain Analysis
  • 4.6 Industry Attractiveness - Porter's Five Force Analysis
    • 4.6.1 Threat of New Entrants
    • 4.6.2 Bargaining Power of Buyers/Consumers
    • 4.6.3 Bargaining Power of Suppliers
    • 4.6.4 Threat of Substitute Products
    • 4.6.5 Intensity of Competitive Rivalry


  • 5.1 By Component
    • 5.1.1 Solutions
    • 5.1.2 Services
  • 5.2 By Deployment Type
    • 5.2.1 Cloud
    • 5.2.2 On-Premise
  • 5.3 By Solution Type
    • 5.3.1 Workstations
    • 5.3.2 Mobile Devices
    • 5.3.3 Servers
    • 5.3.4 Point of Sale Terminals
  • 5.4 By Organization Size
    • 5.4.1 Small and Medium Enterprises
    • 5.4.2 Large Enterprises
  • 5.5 By End-user Industry
    • 5.5.1 BFSI
    • 5.5.2 IT & Telecom
    • 5.5.3 Manufacturing
    • 5.5.4 Healthcare
    • 5.5.5 Retail
  • 5.6 Geography
    • 5.6.1 North America
      • United States
      • Canada
    • 5.6.2 Europe
      • Germany
      • United Kingdom
      • France
      • Rest of Europe
    • 5.6.3 Asia-Pacific
      • China
      • Japan
      • India
      • Rest of Asia-Pacific
    • 5.6.4 Latin America
    • 5.6.5 Middle East & Africa


  • 6.1 Company Profiles
    • 6.1.1 Carbon Black Inc.
    • 6.1.2 Cisco Systems Inc.
    • 6.1.3 Crowdstrike Inc.
    • 6.1.4 Broadcom Inc. (Symantec Corporation)
    • 6.1.5 Cybereason Inc.
    • 6.1.6 Deep Instinct Ltd.
    • 6.1.7 Digital Guardian
    • 6.1.8 FireEye Inc.
    • 6.1.9 OpenText Corporation
    • 6.1.10 McAfee Inc.
    • 6.1.11 EMC Corporation