表纸
市场调查报告书

网路安全的全球市场 (~2023年):各解决方案 (身份识别与存取管理,加密,整合威胁管理,防毒/恶意程式对策,防火墙,IDS/IPS,灾害复原,DDoS缓和)、服务、安全的种类、部署模式、企业规模、产业、地区

Cybersecurity Market by Solution (IAM, Encryption, UTM, Antivirus/Antimalware, Firewall, IDS/IPS, Disaster Recovery, and DDOS Mitigation), Service, Security Type, Deployment Mode, Organization Size, Industry Vertical, Region - Global Forecast to 2023

出版商 MarketsandMarkets 商品编码 245933
出版日期 内容资讯 英文 245 Pages
订单完成后即时交付
价格
Back to Top
网路安全的全球市场 (~2023年):各解决方案 (身份识别与存取管理,加密,整合威胁管理,防毒/恶意程式对策,防火墙,IDS/IPS,灾害复原,DDoS缓和)、服务、安全的种类、部署模式、企业规模、产业、地区 Cybersecurity Market by Solution (IAM, Encryption, UTM, Antivirus/Antimalware, Firewall, IDS/IPS, Disaster Recovery, and DDOS Mitigation), Service, Security Type, Deployment Mode, Organization Size, Industry Vertical, Region - Global Forecast to 2023
出版日期: 2018年09月21日内容资讯: 英文 245 Pages
简介

全球网路安全市场,预计2018年达1527亿1000万美元,2023年达2482亿6000万美元,以10.2%的年复合成长率成长。市场成长的主要原因,是遵守、规定强化的动向,及IoT、AI、巨量资料分析等创新技术的普及,电脑网路攻击的频繁发生化和高度化等。

本报告提供全球网路安全市场相关调查分析,市场概要,产业趋势,各市场区隔的市场分析,竞争情形,主要企业等相关的系统性资讯。

第1章 简介

第2章 调查手法

第3章 摘要整理

第4章 重要考察

第5章 市场概要

  • 简介
  • 市场动态
    • 促进因素
      • 电脑网路威胁的频繁发生化、高度化
      • 所有产业领域中,破坏性的数位技术的登场 (IoT等)
      • 为了资讯安全的严格资料保护条例
      • 随著经由供应链的攻击数量增加,对软体供应链的不良影响
    • 阻碍因素
      • 中小企业的安全预算限制
      • 非法拷贝/开放原始码的网路安全解决方案的利用
    • 机会
      • 在各个产业领域的电子商务普及率的上升
      • 人工智能 (AI) 和机器学习,在区块链技术的电脑网路防卫的有效利用
      • 在中小企业的云端系解决方案的需求扩大
    • 课题
      • 在防卫策略筹划时,网路安全专家不足
      • 缺乏跟现有的资讯系统的互通性
  • 各种法规、法规的影响
  • 利用案例
    • 零售企业为防止内部威胁,引进用户行为分析
    • 大IT、通讯企业的依赖防止、缓和DDoS攻击
    • 石油、天然气企业依赖防止勒索软体解决方案
    • 电力、燃气公司,引进异常探测解决方案
    • 金融机关大规模引进电子邮件加密功能
  • 技术创新的代表案例
    • SPLUNK,CYBERBIT,CARBON BLACK,BALBIX

第6章 网路安全市场:各零件

  • 简介
  • 解决方案
  • 服务

第7章 网路安全市场:各解决方案

  • 简介
  • 身份识别与存取管理 (IAM)
  • 风险、遵守管理
  • 加密
  • 预防资料外泄 (DLP)
  • 整合威胁管理 (UTM)
  • 防火墙
  • 防毒/恶意程式对策
  • 入侵检测系统/侵入防止系统 (IDS/IPS)
  • 安全、漏洞管理
  • 灾害复原
  • 缓和DDoS (分散式服务干扰) 攻击
  • Web过滤
  • 其他

第8章 网路安全市场:各类服务

  • 简介
  • 专门服务
    • 设计、引进
    • 风险、威胁评估
    • 咨询
    • 训练、教育
    • 支援、整备
  • 管理服务

第9章 网路安全市场:安全的各类型

  • 简介
  • 网路安全
  • 终端安全
  • 应用安全
  • 云端安全
  • 其他

第10章 网路安全市场:各部署模式

  • 简介
  • 内部部署
  • 云端

第11章 网路安全市场:各企业规模

  • 简介
  • 中小企业
  • 大企业

第12章 网路安全市场:各产业

  • 简介
  • 航太、防卫
  • 政府机关
  • 银行、金融服务、保险 (BFSI)
  • IT、通讯
  • 医疗
  • 零售业
  • 制造业
  • 能源、公共事业
  • 其他

第13章 网路安全市场:各地区

  • 简介
  • 北美 (美国,加拿大)
  • 欧洲 (英国,德国,法国等)
  • 亚太地区 (中国,日本,印度,澳洲、纽西兰等)
  • 中东、非洲
  • 南美 (巴西,墨西哥等)

第14章 竞争情形

  • 概要
  • 竞争方案
    • 新产品的销售,产品改良
    • 事业联盟、合作,协定
    • 企业合并、收购 (M&A)
    • 事业扩张

第15章 企业简介

  • IBM
    • 产业概要,主要解决方案、产品、服务,主要的考察,近几年趋势,SWOT分析,MnM的见解
  • SYMANTEC
  • FIREEYE
  • CHECK POINT
  • CISCO
  • TREND MICRO
  • SOPHOS
  • RAPID7
  • MCAFEE
  • MICRO FOCUS
  • MICROSOFT
  • IMPERVA
  • SPLUNK
  • F5 NETWORKS
  • PROOFPOINT
  • RSA SECURITY
  • AWS
  • JUNIPER NETWORKS
  • ORACLE
  • FORTINET
  • PALO ALTO NETWORKS
  • CYBERARK
  • FORCEPOINT
  • F-SECURE
  • QUALYS

第16章 附录

本网页内容可能与最新版本有所差异。详细情况请与我们联系。

目录
Product Code: TC 3485

"Increasing government compliances and stringent data protection regulations are expected to drive the growth of the cybersecurity market"

MarketsandMarkets forecasts the cybersecurity market size to grow from USD 152.71 billion in 2018 to USD 248.26 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 10.2% during the forecast period. The market growth is expected to be driven by the increasing government compliances and regulatory requirements; the emergence of disruptive digital technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and big data analytics; and the growing sophistication level of cyber-attacks. However, limited security budget among Small and Medium-sized Enterprises (SMEs) and the easy availability of free and pirated cybersecurity solutions may restrain the growth of the cybersecurity market.

Under solutions, the Identity and Access Management (IAM) segment is expected to hold the largest market size during the forecast period

The IAM solutions segment is estimated to hold the largest market share in 2018. IAM solutions play a critical role in managing enterprises' electronic and digital identities. These solutions help businesses improve their security posture by offering centralized visibility and control of users' access. IAM solutions have registered tremendous adoption in recent years, as they can be quickly and cost-effectively integrated with IAM policies across on-premises and cloud environments.

Under security types, the network security segment is expected to hold the largest market size during the forecast period

The network security segment is expected to hold the largest market size during the forecast period, and this growth can be attributed to the rising number of network security breaches wherein hackers try to illegally gain access to sensitive data. As vulnerabilities have become more complex and sophisticated, the demand for network security products is expected to increase for countering threats.

North America is expected to hold the largest market share, whereas Asia Pacific (APAC) to grow at the highest CAGR during the forecast period

North America is estimated to hold the largest market size and dominate the global cybersecurity market in 2018, due to the presence of a large number of cybersecurity vendors. Increasing information security challenges, due to network complexities, along with the need to meet the strict compliance regulations and enhance employees' productivity, are pushing organizations in North America to adopt cybersecurity solutions. APAC is expected to offer significant growth opportunities to vendors in the cybersecurity market, as countries in this region are investing heavily in deploying cybersecurity and compliance management solutions. APAC offers potential growth opportunities due to the rising demand for cybersecurity solutions across SMEs, and the growth in mobile and web-based applications for business-critical operations.

In the process of determining and verifying the market size for several segments and subsegments gathered through secondary research, extensive primary interviews were conducted with key people. The breakup of the profiles of the primary participants is as follows:

  • By Company: Tier 1 - 55%, Tier 2 - 20%, and Tier 3 - 25%
  • By Designation: C-level - 60%, D-Level- 25%, and Others - 15%
  • By Region: North America - 35%, Europe - 25%, APAC - 20%, MEA - 10%, and Latin America - 10%

The key cybersecurity solution and service vendors include: IBM (US), Check Point (US), Cisco (US), CyberArk (Israel), F5 Networks (US), FireEye (US), Forcepoint (US), Fortinet (US), Amazon Web Services (US), Oracle (US), Palo Alto Networks (US), Imperva (US), Qualys (US), RSA Security (US), F-Secure (Finland), McAfee (US), Micro Focus (UK), Microsoft (US), Proofpoint (US), Rapid7 (US), Sophos (UK), Splunk (US), Symantec (US), Trend Micro (Japan), and Juniper Networks (US).

Research Coverage:

The research study segments the cybersecurity market by component, security type, deployment mode, organization size, industry vertical, and region. It includes the factors expected to drive the growth of the global cybersecurity market along with the growth opportunities in this market. It also explains the restraining factors and challenges for the growth of the cybersecurity market. Moreover, it consists of detailed company profiles of the key players offering cybersecurity solutions and services.

The report would help market leaders/new entrants in the market in the following ways:

  • 1. The report comprehensively segments the cybersecurity market and provides the closest approximations of the revenue numbers for the overall market and its segments and subsegments across regions.
  • 2. It helps stakeholders understand the pulse of the market and provides them with information about key market drivers, restraints, challenges, and opportunities.
  • 3. It helps stakeholders better understand their competitors and gain more insights for improving their position in their businesses. The competitive landscape section includes competitor ecosystems, new product developments, partnerships, and mergers and acquisitions.

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. OBJECTIVES OF THE STUDY
  • 1.2. MARKET DEFINITION
  • 1.3. MARKET SCOPE
  • 1.4. YEARS CONSIDERED FOR THE STUDY
  • 1.5. CURRENCY
  • 1.6. STAKEHOLDERS

2. RESEARCH METHODOLOGY

  • 2.1. RESEARCH DATA
    • 2.1.1. SECONDARY DATA
    • 2.1.2. PRIMARY DATA
      • 2.1.2.1. Breakdown of primaries
      • 2.1.2.2. Key industry insights
  • 2.2. MARKET SIZE ESTIMATION
  • 2.3. RESEARCH ASSUMPTIONS AND LIMITATIONS
    • 2.3.1. RESEARCH ASSUMPTIONS
    • 2.3.2. RESEARCH LIMITATIONS

3. EXECUTIVE SUMMARY

4. PREMIUM INSIGHTS

  • 4.1. ATTRACTIVE MARKET OPPORTUNITIES IN THE CYBERSECURITY MARKET
  • 4.2. CYBERSECURITY MARKET, MARKET SHARE OF TOP 3 SECURITY TYPES AND REGIONS, 2018
  • 4.3. CYBERSECURITY MARKET, TOP 3 SOLUTIONS, 2018-2023
  • 4.4. CYBERSECURITY MARKET, BY SERVICE, 2018-2023
  • 4.5. CYBERSECURITY MARKET, BY PROFESSIONAL SERVICE, 2018
  • 4.6. CYBERSECURITY MARKET, BY DEPLOYMENT MODE, 2018
  • 4.7. CYBERSECURITY MARKET, BY ORGANIZATION SIZE, 2018
  • 4.8. CYBERSECURITY MARKET, TOP 3 INDUSTRY VERTICALS, 2018
  • 4.9. MARKET INVESTMENT SCENARIO

5. MARKET OVERVIEW

  • 5.1. INTRODUCTION
  • 5.2. MARKET DYNAMICS
    • 5.2.1. DRIVERS
      • 5.2.1.1. Increase in the frequency and sophistication of cyber threats
      • 5.2.1.2. Emergence of disruptive digital technologies, such as IoT, across industry verticals
      • 5.2.1.3. Stringent data protection regulations for information security
      • 5.2.1.4. Increase in the number of supply chain-based attacks exploiting the software supply chain
    • 5.2.2. RESTRAINTS
      • 5.2.2.1. Limited security budget among SMEs
      • 5.2.2.2. Use of pirated and open source cybersecurity solutions
    • 5.2.3. OPPORTUNITIES
      • 5.2.3.1. Increase in the eCommerce penetration across industry verticals
      • 5.2.3.2. Leveraging AI, machine learning and blockchain technologies for cyber defense
      • 5.2.3.3. Growing need of cloud-based security solutions among SMEs
    • 5.2.4. CHALLENGES
      • 5.2.4.1. Dearth of cybersecurity expertise for proactive strategic planning
      • 5.2.4.2. Lack of interoperability with the existing information systems
  • 5.3. REGULATORY IMPLICATIONS
    • 5.3.1. GENERAL DATA PROTECTION REGULATION
    • 5.3.2. PAYMENT CARD INDUSTRY DATA SECURITY STANDARD
    • 5.3.3. HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT
    • 5.3.4. FEDERAL INFORMATION SECURITY MANAGEMENT ACT
    • 5.3.5. GRAMM-LEACH-BLILEY ACT
    • 5.3.6. SARBANES-OXLEY ACT
    • 5.3.7. THE INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 27001
  • 5.4. USE CASES
    • 5.4.1. ADOPTION OF USER BEHAVIOR ANALYTICS FOR DETECTING INSIDER THREATS IN RETAIL ORGANIZATION
    • 5.4.2. DEPENDENCE OF A LEADING IT AND TELECOM COMPANY ON DDOS PROTECTION AND MITIGATION SOLUTION
    • 5.4.3. DEPENDENCE OF OIL AND GAS ORGANIZATION ON RANSOMEWARE PROTECTION SOLUTION
    • 5.4.4. ANOMALY DETECTION SOLUTION ADOPTED BY ELECTRIC-POWER AND GAS COMPANY
    • 5.4.5. LARGE-SCALE ADOPTION OF EMAIL ENCRYPTION IN FINANCIAL ORGANIZATION
  • 5.5. INNOVATION SPOTLIGHT
    • 5.5.1. SPLUNK
    • 5.5.2. CYBERBIT
    • 5.5.3. CARBON BLACK
    • 5.5.4. BALBIX

6. CYBERSECURITY MARKET, BY COMPONENT

  • 6.1. INTRODUCTION
  • 6.2. SOLUTIONS
  • 6.3. SERVICES

7. CYBERSECURITY MARKET, BY SOLUTION

  • 7.1. INTRODUCTION
  • 7.2. IDENTITY AND ACCESS MANAGEMENT
  • 7.3. RISK AND COMPLIANCE MANAGEMENT
  • 7.4. ENCRYPTION
  • 7.5. DATA LOSS PREVENTION
  • 7.6. UNIFIED THREAT MANAGEMENT
  • 7.7. FIREWALL
  • 7.8. ANTIVIRUS/ANTIMALWARE
  • 7.9. INTRUSION DETECTION SYSTEM/INTRUSION PREVENTION SYSTEM
  • 7.10. SECURITY AND VULNERABILITY MANAGEMENT
  • 7.11. DISASTER RECOVERY
  • 7.12. DISTRIBUTED DENIAL OF SERVICE MITIGATION
  • 7.13. WEB FILTERING
  • 7.14. OTHERS

8. CYBERSECURITY MARKET, BY SERVICE

  • 8.1. INTRODUCTION
  • 8.2. PROFESSIONAL SERVICES
    • 8.2.1. DESIGN AND IMPLEMENTATION
    • 8.2.2. RISK AND THREAT ASSESSMENT
    • 8.2.3. CONSULTING
    • 8.2.4. TRAINING AND EDUCATION
    • 8.2.5. SUPPORT AND MAINTENANCE
  • 8.3. MANAGED SERVICES

9. CYBERSECURITY MARKET, BY SECURITY TYPE

  • 9.1. INTRODUCTION
  • 9.2. NETWORK SECURITY
  • 9.3. ENDPOINT SECURITY
  • 9.4. APPLICATION SECURITY
  • 9.5. CLOUD SECURITY
  • 9.6. OTHERS

10. CYBERSECURITY MARKET, BY DEPLOYMENT MODE

  • 10.1. INTRODUCTION
  • 10.2. ON-PREMISES
  • 10.3. CLOUD

11. CYBERSECURITY MARKET, BY ORGANIZATION SIZE

  • 11.1. INTRODUCTION
  • 11.2. SMALL AND MEDIUM-SIZED ENTERPRISES
  • 11.3. LARGE ENTERPRISES

12. CYBERSECURITY MARKET, BY INDUSTRY VERTICAL

  • 12.1. INTRODUCTION
  • 12.2. AEROSPACE AND DEFENSE
  • 12.3. GOVERNMENT
  • 12.4. BANKING, FINANCIAL SERVICES, AND INSURANCE
  • 12.5. IT AND TELECOM
  • 12.6. HEALTHCARE
  • 12.7. RETAIL
  • 12.8. MANUFACTURING
  • 12.9. ENERGY AND UTILITIES
  • 12.10. OTHERS

13. CYBERSECURITY MARKET, BY REGION

  • 13.1. INTRODUCTION
  • 13.2. NORTH AMERICA
    • 13.2.1. UNITED STATES
    • 13.2.2. CANADA
  • 13.3. EUROPE
    • 13.3.1. UNITED KINGDOM
    • 13.3.2. GERMANY
    • 13.3.3. FRANCE
    • 13.3.4. REST OF EUROPE
  • 13.4. ASIA PACIFIC
    • 13.4.1. CHINA
    • 13.4.2. JAPAN
    • 13.4.3. INDIA
    • 13.4.4. AUSTRALIA AND NEW ZEALAND
    • 13.4.5. REST OF ASIA PACIFIC
  • 13.5. MIDDLE EAST AND AFRICA
    • 13.5.1. MIDDLE EAST
    • 13.5.2. AFRICA
  • 13.6. LATIN AMERICA
    • 13.6.1. BRAZIL
    • 13.6.2. MEXICO
    • 13.6.3. REST OF LATIN AMERICA

14. COMPETITIVE LANDSCAPE

  • 14.1. OVERVIEW
  • 14.2. COMPETITIVE SCENARIO
    • 14.2.1. NEW PRODUCT LAUNCHES AND PRODUCT ENHANCEMENTS
    • 14.2.2. PARTNERSHIPS, AGREEMENTS, AND COLLABORATIONS
    • 14.2.3. MERGERS AND ACQUISITIONS
    • 14.2.4. BUSINESS EXPANSIONS

15. COMPANY PROFILES (Business Overview, Solutions, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View)*

  • 15.1. IBM
  • 15.2. SYMANTEC
  • 15.3. FIREEYE
  • 15.4. CHECK POINT
  • 15.5. CISCO
  • 15.6. TREND MICRO
  • 15.7. SOPHOS
  • 15.8. RAPID7
  • 15.9. MCAFEE
  • 15.10. MICRO FOCUS
  • 15.11. MICROSOFT
  • 15.12. IMPERVA
  • 15.13. SPLUNK
  • 15.14. F5 NETWORKS
  • 15.15. PROOFPOINT
  • 15.16. RSA SECURITY
  • 15.17. AWS
  • 15.18. JUNIPER NETWORKS
  • 15.19. ORACLE
  • 15.20. FORTINET
  • 15.21. PALO ALTO NETWORKS
  • 15.22. CYBERARK
  • 15.23. FORCEPOINT
  • 15.24. F-SECURE
  • 15.25. QUALYS

*Details on Business Overview, Solutions, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View might not be captured in case of unlisted companies.

16. APPENDIX

  • 16.1. INSIGHTS OF INDUSTRY EXPERTS
  • 16.2. DISCUSSION GUIDE
  • 16.3. KNOWLEDGE STORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL
  • 16.4. AVAILABLE CUSTOMIZATIONS
  • 16.5. RELATED REPORTS
  • 16.6. AUTHOR DETAILS

LIST OF TABLES

  • TABLE 1: CYBERSECURITY MARKET SIZE AND GROWTH, 2016-2023 (USD BILLION, Y-O-Y %)
  • TABLE 2: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2016-2023 (USD BILLION)
  • TABLE 3: SOLUTIONS: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 4: SERVICES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 5: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2016-2023 (USD BILLION)
  • TABLE 6: IDENTITY AND ACCESS MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 7: RISK AND COMPLIANCE MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 8: ENCRYPTION: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 9: DATA LOSS PREVENTION: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 10: UNIFIED THREAT MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 11: FIREWALL: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 12: ANTIVIRUS/ANTIMALWARE: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 13: INTRUSION DETECTION SYSTEM/INTRUSION PREVENTION SYSTEM: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 14: SECURITY AND VULNERABILITY MANAGEMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 15: DISASTER RECOVERY: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 16: DISTRIBUTED DENIAL OF SERVICE MITIGATION: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 17: WEB FILTERING: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 18: OTHERS: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 19: CYBERSECURITY MARKET SIZE, BY SERVICE, 2016-2023 (USD BILLION)
  • TABLE 20: PROFESSIONAL SERVICES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 21: PROFESSIONAL SERVICES: CYBERSECURITY MARKET SIZE, BY TYPE, 2016-2023 (USD BILLION)
  • TABLE 22: DESIGN AND IMPLEMENTATION MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 23: RISK AND THREAT ASSESSMENT MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 24: CONSULTING MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 25: TRAINING AND EDUCATION MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 26: SUPPORT AND MAINTENANCE MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 27: MANAGED SERVICES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 28: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2016-2023 (USD BILLION)
  • TABLE 29: NETWORK SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 30: ENDPOINT SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 31: APPLICATION SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 32: CLOUD SECURITY: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 33: OTHERS: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 34: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2016-2023 (USD BILLION)
  • TABLE 35: ON-PREMISES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 36: CLOUD: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 37: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2016-2023 (USD BILLION)
  • TABLE 38: SMALL AND MEDIUM-SIZED ENTERPRISES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 39: LARGE ENTERPRISES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 40: CYBERSECURITY MARKET SIZE, BY INDUSTRY VERTICAL, 2016-2023 (USD BILLION)
  • TABLE 41: AEROSPACE AND DEFENSE: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 42: GOVERNMENT: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 43: BANKING, FINANCIAL SERVICES, AND INSURANCE: CYBERSECURITY MARKET SIZE, BY COUNTRY, 2016-2023 (USD BILLION)
  • TABLE 44: IT AND TELECOM: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 45: HEALTHCARE: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 46: RETAIL: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 47: MANUFACTURING: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 48: ENERGY AND UTILITIES: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 49: OTHERS: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 50: CYBERSECURITY MARKET SIZE, BY REGION, 2016-2023 (USD BILLION)
  • TABLE 51: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY COUNTRY, 2016-2023 (USD BILLION)
  • TABLE 52: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2016-2023 (USD BILLION)
  • TABLE 53: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2016-2023 (USD BILLION)
  • TABLE 54: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY SERVICE, 2016-2022 (USD BILLION)
  • TABLE 55: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2016-2023 (USD BILLION)
  • TABLE 56: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2016-2023 (USD BILLION)
  • TABLE 57: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2016-2023 (USD BILLION)
  • TABLE 58: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2016-2023 (USD BILLION)
  • TABLE 59: NORTH AMERICA: CYBERSECURITY MARKET SIZE, BY INDUSTRY VERTICAL, 2016-2023 (USD BILLION)
  • TABLE 60: EUROPE: CYBERSECURITY MARKET SIZE, BY COUNTRY, 2016-2023 (USD BILLION)
  • TABLE 61: EUROPE: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2016-2023 (USD BILLION)
  • TABLE 62: EUROPE: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2016-2023 (USD BILLION)
  • TABLE 63: EUROPE: CYBERSECURITY MARKET SIZE, BY SERVICE, 2016-2022 (USD BILLION)
  • TABLE 64: EUROPE: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2016-2023 (USD BILLION)
  • TABLE 65: EUROPE: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2016-2023 (USD BILLION)
  • TABLE 66: EUROPE: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2016-2023 (USD BILLION)
  • TABLE 67: EUROPE: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2016-2023 (USD BILLION)
  • TABLE 68: EUROPE: CYBERSECURITY MARKET SIZE, BY INDUSTRY VERTICAL, 2016-2023 (USD BILLION)
  • TABLE 69: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY COUNTRY, 2016-2023 (USD BILLION)
  • TABLE 70: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2016-2023 (USD BILLION)
  • TABLE 71: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2016-2023 (USD BILLION)
  • TABLE 72: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY SERVICE, 2016-2022 (USD BILLION)
  • TABLE 73: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2016-2023 (USD BILLION)
  • TABLE 74: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2016-2023 (USD BILLION)
  • TABLE 75: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2016-2023 (USD BILLION)
  • TABLE 76: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2016-2023 (USD BILLION)
  • TABLE 77: ASIA PACIFIC: CYBERSECURITY MARKET SIZE, BY INDUSTRY VERTICAL, 2016-2023 (USD BILLION)
  • TABLE 78: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SUBREGION, 2016-2023 (USD BILLION)
  • TABLE 79: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2016-2023 (USD BILLION)
  • TABLE 80: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2016-2023 (USD BILLION)
  • TABLE 81: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SERVICE, 2016-2022 (USD BILLION)
  • TABLE 82: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2016-2023 (USD BILLION)
  • TABLE 83: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2016-2023 (USD BILLION)
  • TABLE 84: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2016-2023 (USD BILLION)
  • TABLE 85: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2016-2023 (USD BILLION)
  • TABLE 86: MIDDLE EAST AND AFRICA: CYBERSECURITY MARKET SIZE, BY INDUSTRY VERTICAL, 2016-2023 (USD BILLION)
  • TABLE 87: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY COUNTRY, 2016-2023 (USD BILLION)
  • TABLE 88: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY COMPONENT, 2016-2023 (USD BILLION)
  • TABLE 89: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY SOLUTION, 2016-2023 (USD BILLION)
  • TABLE 90: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY SERVICE, 2016-2022 (USD BILLION)
  • TABLE 91: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY PROFESSIONAL SERVICE, 2016-2023 (USD BILLION)
  • TABLE 92: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY SECURITY TYPE, 2016-2023 (USD BILLION)
  • TABLE 93: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY DEPLOYMENT MODE, 2016-2023 (USD BILLION)
  • TABLE 94: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2016-2023 (USD BILLION)
  • TABLE 95: LATIN AMERICA: CYBERSECURITY MARKET SIZE, BY INDUSTRY VERTICAL, 2016-2023 (USD BILLION)
  • TABLE 96: NEW PRODUCT LAUNCHES AND PRODUCT ENHANCEMENTS, 2017-2018
  • TABLE 97: PARTNERSHIPS, AGREEMENTS, AND COLLABORATIONS, 2017-2018
  • TABLE 98: MERGERS AND ACQUISITIONS, 2017-2018
  • TABLE 99: BUSINESS EXPANSIONS, 2017-2018

LIST OF FIGURES

  • FIGURE 1: CYBERSECURITY MARKET: MARKET SEGMENTATION
  • FIGURE 2: CYBERSECURITY MARKET: RESEARCH DESIGN
  • FIGURE 3: BREAKDOWN OF PRIMARY INTERVIEWS: BY COMPANY, DESIGNATION, AND REGION
  • FIGURE 4: DATA TRIANGULATION
  • FIGURE 5: MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
  • FIGURE 6: MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
  • FIGURE 7: CYBERSECURITY MARKET: ASSUMPTIONS
  • FIGURE 8: SERVICES SEGMENT IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 9: NORTH AMERICA IS ESTIMATED TO HOLD THE LARGEST MARKET SHARE IN 2018
  • FIGURE 10: FASTEST-GROWING SEGMENTS OF THE CYBERSECURITY MARKET
  • FIGURE 11: CONSTANTLY EVOLVING AND INCREASING CYBER-ATTACKS ARE EXPECTED TO STEADILY PUSH THE DEMAND FOR CYBERSECURITY SOLUTIONS AND SERVICES ACROSS VARIOUS INDUSTRY VERTICALS AND REGIONS
  • FIGURE 12: NETWORK SECURITY TYPE SEGMENT AND NORTH AMERICAN REGION ARE ESTIMATED TO HAVE THE LARGEST MARKET SHARES IN 2018
  • FIGURE 13: IDENTITY AND ACCESS MANAGEMENT SOLUTION IS ESTIMATED TO HAVE THE LARGEST MARKET SHARE IN 2018
  • FIGURE 14: PROFESSIONAL SERVICES SEGMENT IS EXPECTED TO HAVE THE LARGER MARKET SHARE DURING THE FORECAST PERIOD
  • FIGURE 15: CONSULTING SEGMENT IS ESTIMATED TO HAVE THE LARGEST MARKET SHARE IN 2018
  • FIGURE 16: ON-PREMISES DEPLOYMENT MODE SEGMENT IS EXPECTED TO HOLD THE LARGER MARKET SHARE IN 2018
  • FIGURE 17: LARGE ENTERPRISES SEGMENT IS ESTIMATED TO HOLD THE LARGER MARKET SHARE IN 2018
  • FIGURE 18: GOVERNMENT INDUSTRY VERTICAL TO HAVE THE LARGEST MARKET SHARE IN 2018
  • FIGURE 19: ASIA PACIFIC IS EXPECTED TO EMERGE AS THE BEST MARKET FOR INVESTMENT IN THE NEXT 5 YEARS
  • FIGURE 20: CYBERSECURITY MARKET: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES
  • FIGURE 21: MOTIVATION BEHIND HACKING, 2017
  • FIGURE 22: VULNERABILITIES ACROSS A SOFTWARE SUPPLY CHAIN
  • FIGURE 23: TOP GLOBAL RANSOMWARE ATTACKS, 2017
  • FIGURE 24: TOP ENTERPRISE CONCERNS ABOUT MALWARE EFFORTS FROM UNLICENCED SOFTWARE
  • FIGURE 25: TOP 10 ATTACK TECHNIQUES IN 2017
  • FIGURE 26: SERVICES SEGMENT TO GROW AT THE HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 27: ENCRYPTION SOLUTION IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 28: MANAGED SERVICES SEGMENT IS EXPECTED TO GROW AT THE HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 29: APPLICATION SECURITY SEGMENT IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 30: CLOUD DEPLOYMENT MODE IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 31: SMALL AND MEDIUM-SIZED ENTERPRISES SEGMENT IS EXPECTED TO GROW AT THE HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 32: SECURITY BREACH AND ATTACK RATE ON 5 INDUSTRY VERTICALS
  • FIGURE 33: AVERAGE ANNUALIZED COST OF CYBERCRIME BY INDUSTRY VERTICAL
  • FIGURE 34: HEALTHCARE INDUSTRY VERTICAL IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 35: TOP MALWARE, BY REGION, 2017
  • FIGURE 36: ASIA PACIFIC IS EXPECTED TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 37: NORTH AMERICA: MARKET SNAPSHOT
  • FIGURE 38: ASIA PACIFIC: MARKET SNAPSHOT
  • FIGURE 39: KEY DEVELOPMENTS BY THE LEADING PLAYERS IN THE CYBERSECURITY MARKET, 2017-2018
  • FIGURE 40: KEY MARKET EVALUATION FRAMEWORK
  • FIGURE 41: IBM: COMPANY SNAPSHOT
  • FIGURE 42: IBM: SWOT ANALYSIS
  • FIGURE 43: SYMANTEC: COMPANY SNAPSHOT
  • FIGURE 44: SYMANTEC: SWOT ANALYSIS
  • FIGURE 45: FIREEYE: COMPANY SNAPSHOT
  • FIGURE 46: FIREEYE: SWOT ANALYSIS
  • FIGURE 47: CHECK POINT: COMPANY SNAPSHOT
  • FIGURE 48: CHECK POINT: SWOT ANALYSIS
  • FIGURE 49: CISCO: COMPANY SNAPSHOT
  • FIGURE 50: CISCO: SWOT ANALYSIS
  • FIGURE 51: TREND MICRO: COMPANY SNAPSHOT
  • FIGURE 52: SOPHOS: COMPANY SNAPSHOT
  • FIGURE 53: RAPID7: COMPANY SNAPSHOT
  • FIGURE 54: MICRO FOCUS: COMPANY SNAPSHOT
  • FIGURE 55: MICROSOFT: COMPANY SNAPSHOT
  • FIGURE 56: IMPERVA: COMPANY SNAPSHOT
  • FIGURE 57: SPLUNK: COMPANY SNAPSHOT
  • FIGURE 58: F5 NETWORKS: COMPANY SNAPSHOT
  • FIGURE 59: PROOFPOINT: COMPANY SNAPSHOT
  • FIGURE 60: AWS: COMPANY SNAPSHOT
  • FIGURE 61: JUNIPER NETWORKS: COMPANY SNAPSHOT
  • FIGURE 62: ORACLE: COMPANY SNAPSHOT
  • FIGURE 63: FORTINET: COMPANY SNAPSHOT
  • FIGURE 64: PALO ALTO NETWORKS: COMPANY SNAPSHOT
  • FIGURE 65: CYBERARK: COMPANY SNAPSHOT
  • FIGURE 66: FORCEPOINT: COMPANY SNAPSHOT
  • FIGURE 67: F-SECURE: COMPANY SNAPSHOT
  • FIGURE 68: QUALYS: COMPANY SNAPSHOT
Back to Top