NEW YORK, April 16, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:
Global Cyber Security Industry
http://www.reportlinker.com/p0552759/Global-Cyber-Security-Industry.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_
This report analyzes the worldwide markets for Cyber Security in US$ million by the following Product Segments - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2009 through 2017. Also, a six-year historic analysis is provided for these markets. The report profiles 128 companies including many key and niche players such as AVG Technologies, BitDefender® LLC, CA Technologies, Inc., Check Point Software Technologies Ltd., Cisco Systems, Inc., IronPort, F-Secure Corporation, IBM Corporation, BigFix, Inc., IBM Internet Security Systems, Juniper Networks, Inc., Kaspersky Lab, McAfee, Inc., Microsoft Corporation, Panda Security, SafeNet, Inc., Sophos PLC, Utimaco Safeware AG, Symantec Corporation, MessageLabs Ltd., Trend Micro Incorporated., and WebSense, Inc. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based upon search engine sources in the public domain.
I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS
Study Reliability and Reporting Limitations I-1
Disclaimers I-2
Data Interpretation & Reporting Level I-3
Quantitative Techniques & Analytics I-3
Product Definitions and Scope of Study I-3
1. Application Security I-3
2. Content Security I-4
3. Data Security I-4
4. Endpoint Security I-4
5. Network Security I-4
6. Identity & Access Management I-4
7. Risk & Compliance Management I-4
8. Security Operations I-4
9. Consulting Services I-5
II. EXECUTIVE SUMMARY
1. INDUSTRY OVERVIEW II-1
A Curtain Raiser II-1
Internet & the Modern Enterprise II-2
Magnitude of Cyber Crime II-3
Cyber Crime Trends At a Glance II-3
Table 1: World Malware on the Web (2010): Percentage Share
Breakdown of Leading Countries Hosting Malware on the Web
(includes corresponding Graph/Chart) II-4
Table 2: Percentage Share Breakdown of Leading Spam Relaying
Countries for the year 2010 (includes corresponding
Graph/Chart) II-5
Flurry of Social Networking Sites Foster Cyber Crime Activities II-5
Use of Cloud Services Spur Cyber Crime II-6
The Rise of Mobile Devices and Applications Bring Mobile
Computing Devices Under Attack II-6
Virtualization - Enhancing Security Concerns II-6
Stealthier Infiltration Methods - A Key Challenge II-7
Web Evolution Gives New Opportunities to Malware Writers II-8
Trojan: Fastest Growing Data-Stealing Malware II-8
Malware, Botnets, Scareware on the Rise II-8
Hactivism II-9
Current Market Conditions II-9
Recession Ups Cyber Crime Attacks II-9
Recession Magnifies the Business Case for Cyber Security II-10
Security - Scoring High on Corporate Agenda II-11
Regulatory Compliance Requirements Propel Cyber Security Market II-11
Competitive Landscape II-12
Consolidation Wave in Cyber Security Market II-12
Prime Market Stimulators & Inhibitors in a Capsule II-12
Market Drivers II-12
Market Growth Inhibitors II-13
Market Drivers & Trends II-13
Rising Internet Usage, Security Concerns Offer Opportunity
For Rapid Growth II-13
Spate of Security Breaches Creates Need for Advanced
Encryption Solutions II-13
Development of Advanced Security Solutions will Stimulate
Rapid Growth II-14
Integrated Security Appliances Gather Momentum II-14
Vendors Provide Integrated Solutions to Stay Ahead II-14
Internet Filtering Solutions: Protection at the Gateway II-15
Protecting Remote Work II-15
Low Footprint Anti-Virus - Prolonging Usable Life of PCs II-15
Availability of Low-priced or Free Competitive Products II-15
2. CYBER SECURITY - SEGMENTAL OVERVIEW II-16
Application Security Market II-16
Content Security Market II-16
Demand for Messaging Security (E-mail Scanning) Will Continue
to Rise II-16
Key Statistics II-17
Table 3: Global Web Security Market (2011E): Percentage Share
Breakdown of Revenues by Platform - Software, Appliance, and
SaaS (includes corresponding Graph/Chart) II-17
Table 4: Leading Vendors in the Global Web Security Market
(2010): Percentage Share Breakdown of Revenues for Websense,
Trend Micro, Microsoft, McAfee, Blue Coat, and Others
(includes corresponding Graph/Chart) II-17
Table 5: Leading Vendors in the Global Web Security Software
Market (2010): Percentage Share Breakdown of Revenues for
Websense, Trend Micro, Microsoft, McAfee, Check Point, and
Others (includes corresponding Graph/Chart) II-17
Table 6: Leading Vendors in the Global Web Security SaaS
Market (2010): Percentage Share Breakdown of Revenues for
Cisco/ScanSafe, Websense, Symantec, Trend Micro, Webroot, and
Others (includes corresponding Graph/Chart) II-18
Data Security Market II-18
PKI: A Promising Market II-18
E-mail Encryption Gathers Steam II-18
Endpoint Security Market II-19
Key Statistics II-19
Table 7: Leading Vendors in the Global Anti-Virus Software
Market (2010): Percentage Share Breakdown of Revenues for
Symantec, McAfee, Trend Micro, Kaspersky Lab, and Others
(includes corresponding Graph/Chart) II-19
Network Security Market II-20
UTM Appliances - A Whip on Blended Security Threats II-20
VPN Market on an Upswing II-20
Table 8: Leading Vendors in the Global Intrusion
Detection/Prevention Market (2010) - Percentage Share
Breakdown of Revenues for IBM Internet Security Systems,
Cisco Systems, McAfee Inc, Hewlett-Packard/TippingPoint,
Juniper Networks and Others (includes corresponding
Graph/Chart) II-21
Table 9: Leading Vendors in the Global Market for Network
Hardware Intrusion Detection/Prevention Software (2010) -
Percentage Share Breakdown of Revenues for IBM Internet
Security Systems, Cisco Systems,
Hewlett-Packard/TippingPoint, McAfee Inc, Juniper Networks,
and Others (includes corresponding Graph/Chart) II-21
Table 10: Leading Vendors in the Global Market for Host
Intrusion Detection/Prevention Software (2010) - Percentage
Share Breakdown of Revenues for Cisco, IBM Internet Security
Systems, McAfee, Symantec, and Others (includes
corresponding Graph/Chart) II-22
Identity & Access Management Solutions II-22
Need for Identity and Access Management II-22
Table 11: Global Identity and Access Management Market
(2009): Percentage Share Breakdown of Revenues by Operating
Environment (includes corresponding Graph/Chart) II-23
IAM: A Key Security Initiative for Enterprises II-23
An Integral Part of Corporate Strategy II-24
Growing Prominence of Identity-as-a-Service (IaaS) II-25
Risk & Compliance Management Market II-25
Security Operations Market II-25
Security Technologies Find Favor Among Organizations II-25
Compliance Requirements Boost Vulnerability Management Market II-26
Small and Mid-Sized Businesses - An Under-Penetrated Segment
for SVM II-26
Diverse Delivery Systems for SVM Products II-27
3. KEY END-USE MARKETS II-28
Banking and Finance II-28
Top Security Initiatives by Sector II-28
Regulatory Compliance: A High Priority for Financial
Institutions II-29
Growing Significance of Data Loss Prevention II-29
Lack of Alignment Between Business Objectives and Security II-29
Convergence Gains Strength II-29
Key Barriers in Cyber Security for Financial Services Sector II-30
Government Agencies II-30
Enterprises II-30
Rise in Deployments of SSL-Encrypted Application II-30
Telecommunication and IT II-31
VPN - An Alternative to WAN II-31
4. PRODUCT OVERVIEW II-32
Cyber Crime: An Introduction II-32
Cyber Crimes against Individuals II-32
Cyber Crimes against Property II-32
Cyber Crimes against Government II-32
Types of Cyber Crimes II-33
Methods of Committing Cyber Crime II-34
Cyber Security II-35
Application Security II-35
Content Security II-36
Data Security II-36
Endpoint Security II-36
Network Security II-36
Identity & Access Management II-37
Risk & Compliance Management II-37
Security Operations II-38
Consulting Services II-38
5. PRODUCT & SERVICE LAUNCHES II-39
AVG Technologies Launches AVG LinkScanner for Mac OS II-39
Webroot Unveils Prevyx 3.0 Anti-Malware Solution II-39
Kaspersky Lab Introduces Kaspersky Anti-Virus 2011 for Mac II-39
eScan Unveils eScan 11 Information Security Solution II-40
Sophos Introduces Anti-Virus Home Edition for Mac II-40
Kaspersky Lab Launches Anti-Malware Protection System II-40
AVG Unveils AVG Anti-Virus 2011 Business Edition and AVG
Internet Security 2011 Business Edition II-41
Panda Security Introduces Panda Antivirus for Mac II-41
GFI Software Unveils GFI VIPRE Antivirus Premium Lifetime Edition II-42
Celestix Networks Launches MSA 1500i Threat Management Gateway
Appliance II-42
ESET Unveils ESET Cybersecurity and ESET NOD32 Antivirus
Business Edition for Mac OS X II-42
Trend Micro™ Introduces Titanium Security 2011 Security Software II-43
Apple Unveils Anti-Malware Update to Snow Leopard II-44
Max Secure Software Introduces Max Secure Anti Virus Pro Software II-44
Keniu.com Unveils Free Anti-Virus Product II-44
McAfee Launches VirusScan Mobile Anti-Malware Solution II-44
Coranti Introduces 2010 Multi-Core Anti-Virus and Anti-Virus Beta II-45
RSA Security Unveils CyberCrime Intelligence Service II-45
Limewire Integrates LimeWire Pro Service with AVG Anti-Malware
Protection II-45
TrustPort Launches Anti-Virus Software in India II-46
Trend Micro Introduces Internet Security Pro Package for
Windows 7 II-46
Immunet Unveils Immunet Protect Free 2.0 Anti-Virus Software II-46
GFI Software Unveils Latest Version of GFI WebMonitor 2009 II-47
GFI Software Unveils GFI MAX MailProtection and GFI MAX MailEdge II-47
Microsoft Launches Microsoft Security Essentials Anti-Malware
Service II-48
Symantec Introduces Cyber Crime Detection Technologies II-49
SecureWorks Introduces Managed Web Application Firewall Service II-49
Avira Antivir Unveils Avira AntiVir9 II-49
ESET Introduces Server Security v3.0.12 II-49
ESET Introduces New Antivirus II-49
Kerio Introduces New VPN Client for Linux and Mac OS X II-50
ESET Introduces Version 4 of ESET Smart Security and ESET
NOD32 Antivirus II-50
AVG Technologies Launches AVG Identity Protection II-50
Trend Micro Introduces TrendTM Smart Surfing for Mac OS X II-51
AVG Launches New Linux Anti-Malware Solution II-51
Akamai Technologies Introduces Web Application Firewall
Managed Service II-51
Microsoft to Unveil Microsoft Security Essentials II-52
Kaspersky Lab Introduces Kaspersky Anti-Virus for Mac OS II-52
Panda Security Introduces Advanced Security Tools II-52
Symantec Unveils Norton 2010 Range of Security Products II-53
M86 Security Launches WebMarshal 6.5 II-53
Trend Micro Rolls Out Internet Security Products II-54
Microsoft to Introduce Microsoft Security Essentials Antivirus II-55
Kaspersky Lab Introduces Kaspersky Anti-Virus 2010 and
Kaspersky Internet Security 2010™ II-55
BitDefender Unveils Anti-Virus Scanner Software II-56
Norman Launches New Technology for Malware Detection II-56
MicroWorld Introduces MailScan 6.1 II-57
F-Secure Introduces Client Security 9 II-57
AVG Launches AVG Link Scanner II-57
PC Tools Unveils iAntiVirus Version 1.0 II-58
ESET Introduces ESET Personal Firewall Module II-58
Trend Micro Introduces Threat Management Services II-59
AVG Unveils AVG 9.0 II-59
6. PRODUCT INTRODUCTIONS/INNOVATIONS - A HISTORIC PERSPECTIVE BUILDER II-61
MXI Security™ Offers Anti-Phishing Solution to Combat Online
Security Threats II-61
PGP and Lumension Jointly Launch PGP EndPoint II-61
Check Point Extends Capabilities of Check Point Integrity II-61
McAfee Attaches Endpoint Encryption into McAfee Total Protection II-61
SECUDE International Unveils FinallySecure™ 9.1 II-61
Senforce Technologies® Improves Endpoint Security Suite with
Encryption Solution II-62
Recipero Limited Introduces CheckMEND across the US II-62
Trend Micro Unveils New Range of Client Security Products II-62
Intrepidus Group Unveils PhishMe II-63
Trend Micro Launches Worry-Free Business Security 5.1 II-63
Trend Micro Unveils Trend MicroTM Message Archiver II-63
ESET Introduces ESET Mobile Anti-Virus II-64
Vere Software Introduces WebCase Internet Forensic Software II-64
McAfee Unveils Anti-Theft Protection II-64
Trend Micro Introduces Email Encryption Solution Portfolio II-64
7. RECENT INDUSTRY ACTIVITY II-66
AVG Technologies Acquires DroidSecurity II-66
Raytheon Company Takes Over Trusted Computer Solutions II-66
Webroot Software Purchases Prevyx II-66
Intel Signs Definitive Agreement to Purchase McAfee II-67
IBM Takes Over BigFix II-67
Emsi Software Purchases Online Armor Software from Tall Emu II-67
AVG Technologies Enters into Collaboration with Google II-67
Imperva Establishes Hacker Intelligence Initiative II-68
Microsoft Establishes Internet Fraud Alert Group II-68
immixGroup Bags Contract from US Department of Homeland Security II-68
Tech Data and BitDefender® Ink an Agreement II-69
Avira Acquires CleanPort II-69
F-Secure Inks Agreement with 3 Italia II-69
K7 Computing Enters into Strategic Collaboration with Proxma II-70
FaceTime Communications Signs Licensing Agreement with Sunbelt
Software II-70
Cisco® Collaborates with Trend Micro to Introduce Home Network
Defender II-70
Marshal8e6 Pockets Avinti II-70
Trend Micro to Buy Third Brigade II-71
AVG Takes Over Sana Security II-71
RSA Teams Up with Trend Micro II-71
Trend Micro Enters into Partnership with Sago Networks II-72
Cisco Systems Acquires ScanSafe II-72
McAfee Acquires Solidcore Systems II-73
AvePoint Enters into Partnership with Trend Micro II-73
Kaspersky Lab and Juniper Networks Extend Partnership II-74
Aladdin Knowledge Systems Merges with Investor Group II-74
8. STRATEGIC CORPORATE DEVELOPMENTS - A HISTORIC PERSPECTIVE BUILDER II-75
Alternative Technology, Aladdin Knowledge Systems Ink Agreement II-75
Seagate Technology, WinMagic Enter Into Partnership II-75
Actebis Peacock, Seagate, SECUDE Introduce Full Disk
Encryption Technology II-75
Seagate, McAfee, and Dell to Develop Data Encryption Solution II-76
Concordia University Establishes National Cyber Forensics
Training Alliance Canada II-76
IT Companies Form Consortium for World IT Security II-76
Paradigm Establishes Cyber Forensics Training Academy II-76
Marshall Merges with 8e6 Technologies to Form Marshal8e6 II-77
Sophos Acquires Majority Stake in Utimaco Safeware II-77
Axway Takes Over Tumbleweed Communications II-77
Thales Acquires nCipher for £50.7 Million II-77
McAfee Acquires Secure Computing II-78
KONGSBERG Purchases AchillesTM Satellite System II-78
Aladdin Knowledge Systems Introduces Attack Intelligence
Research Center II-78
GRISOFT Renamed as AVG Technologies II-78
Microsoft Takes Over Komoku II-79
Trend Micro Takes Over Identum II-79
Trustwave Acquires Creduware II-79
McAfee Acquires ScanAlert Inc, and Reconnex Inc. II-80
McAfee Purchases SafeBoot Holding II-80
9. FOCUS ON SELECT PLAYERS II-81
AVG Technologies (Czech Republic) II-81
BitDefender® LLC (USA) II-81
CA Technologies, Inc. (USA) II-81
Check Point Software Technologies Ltd. (Israel) II-82
Cisco Systems, Inc. (USA) II-83
IronPort (USA) II-83
F-Secure Corporation (Finland) II-83
IBM Corporation (USA) II-84
BigFix, Inc. (USA) II-84
IBM Internet Security Systems (USA) II-85
Juniper Networks, Inc. (USA) II-85
Kaspersky Lab (Russia) II-86
McAfee, Inc. (USA) II-86
Microsoft Corporation (USA) II-87
Panda Security (Spain) II-87
SafeNet, Inc (USA) II-87
Sophos PLC (UK) II-88
Utimaco Safeware AG (Germany) II-88
Symantec Corporation (USA) II-89
MessageLabs Ltd (UK) II-89
Trend Micro Incorporated (USA) II-89
WebSense, Inc. (USA) II-90
10. GLOBAL MARKET PERSPECTIVE II-91
Table 12: World Recent Past, Current & Future Analysis for
Cyber Security by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-91
Table 13: World Historic Review for Cyber Security by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-92
Table 14: World 15-Year Perspective for Cyber Security by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-93
Table 15: World Recent Past, Current & Future Analysis for
Application Security by Geographic Region - US, Canada,
Europe, Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-94
Table 16: World Historic Review for Application Security by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-95
Table 17: World 15-Year Perspective for Application Security
by Geographic Region - Percentage Breakdown of Revenues for
US, Canada, Europe, Asia-Pacific, Latin America and Rest of
World Markets for Years 2003, 2011 & 2017 (includes
corresponding Graph/Chart) II-96
Table 18: World Recent Past, Current & Future Analysis for
Content Security by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-97
Table 19: World Historic Review for Content Security by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-98
Table 20: World 15-Year Perspective for Content Security by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-99
Table 21: World Recent Past, Current & Future Analysis for
Data Security by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-100
Table 22: World Historic Review for Data Security by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-101
Table 23: World 15-Year Perspective for Data Security by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-102
Table 24: World Recent Past, Current & Future Analysis for
Endpoint Security by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-103
Table 25: World Historic Review for Endpoint Security by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-104
Table 26: World 15-Year Perspective for Endpoint Security by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-105
Table 27: World Recent Past, Current & Future Analysis for
Network Security by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-106
Table 28: World Historic Review for Network Security by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-107
Table 29: World 15-Year Perspective for Network Security by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-108
Table 30: World Recent Past, Current & Future Analysis for
Identity & Access Management by Geographic Region - US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) II-109
Table 31: World Historic Review for Identity & Access
Management by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2003 through 2008 (includes corresponding Graph/Chart) II-110
Table 32: World 15-Year Perspective for Identity & Access
Management by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Europe, Asia-Pacific, Latin America
and Rest of World Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) II-111
Table 33: World Recent Past, Current & Future Analysis for
Risk & Compliance Management by Geographic Region - US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) II-112
Table 34: World Historic Review for Risk & Compliance
Management by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2003 through 2008 (includes corresponding Graph/Chart) II-113
Table 35: World 15-Year Perspective for Risk & Compliance
Management by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Europe, Asia-Pacific, Latin America
and Rest of World Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) II-114
Table 36: World Recent Past, Current & Future Analysis for
Consulting Services by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-115
Table 37: World Historic Review for Consulting Services by
Geographic Region - US, Canada, Europe, Asia- Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-116
Table 38: World 15-Year Perspective for Consulting Services by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-117
Table 39: World Recent Past, Current & Future Analysis for
Security Operations by Geographic Region - US, Canada, Europe,
Asia-Pacific, Latin America and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2009 through 2017 (includes corresponding Graph/Chart) II-118
Table 40: World Historic Review for Security Operations by
Geographic Region - US, Canada, Europe, Asia-Pacific, Latin
America and Rest of World Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2003 through 2008
(includes corresponding Graph/Chart) II-119
Table 41: World 15-Year Perspective for Security Operations by
Geographic Region - Percentage Breakdown of Revenues for US,
Canada, Europe, Asia-Pacific, Latin America and Rest of World
Markets for Years 2003, 2011 & 2017 (includes corresponding
Graph/Chart) II-120
III. MARKET
1. THE UNITED STATES III-1
A.Market Analysis III-1
Rising Cybercrime Activities in the US III-1
Banking/Financial Institutions: A Key End Use Industry III-1
Identity Theft: A Growing Menace in the US III-1
Regulatory Environment III-2
Key Statistics III-2
Table 42: Cyber Security Breaches in the US (2010):
Percentage Share Breakdown by User Group (includes
corresponding Graph/Chart) III-2
B.Market Analytics III-3
Table 43: US Recent Past, Current & Future Analysis for
Cyber Security by Segment - Application Security, Content
Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-3
Table 44: US Historic Review for Cyber Security by Segment -
Application Security, Content Security, Data Security,
Endpoint Security, Network Security, Identity & Access
Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-4
Table 45: US 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-5
2. CANADA III-6
A.Market Analysis III-6
Market Overview III-6
B.Market Analytics III-7
Table 46: Canadian Recent Past, Current & Future Analysis
for Cyber Security by Segment - Application Security,
Content Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-7
Table 47: Canadian Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-8
Table 48: Canadian 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-9
3. JAPAN III-10
A.Market Analysis III-10
Cyber Security Market - A Primer III-10
Regulatory Environment III-10
Competitive Scenario III-10
B.Market Analytics III-11
Table 49: Japanese Recent Past, Current & Future Analysis
for Cyber Security by Segment - Application Security,
Content Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-11
Table 50: Japanese Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-12
Table 51: Japanese 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-13
4. EUROPE III-14
A.Market Analysis III-14
Market Overview III-14
Regulatory Environment III-14
B.Market Analytics III-15
Table 52: European Recent Past, Current & Future Analysis
for Cyber Security by Geographic Region - France, Germany,
Italy, UK, and Rest of Europe Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2009 through
2017 (includes corresponding Graph/Chart) III-15
Table 53: European Recent Past, Current & Future Analysis
for Cyber Security by Segment - Application Security,
Content Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-16
Table 54: European Historic Review for Cyber Security by
Geographic Region - France, Germany, Italy, UK, and Rest of
Europe Markets Independently Analyzed with Annual Revenues
in US$ Million for Years 2003 through 2008 (includes
corresponding Graph/Chart) III-17
Table 55: European Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-18
Table 56: European 15-Year Perspective for Cyber Security by
Geographic Region - Percentage Breakdown of Revenues for
France, Germany, Italy, UK, and Rest of Europe Markets for
Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-19
Table 57: European 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-20
4a. FRANCE III-21
A.Market Analysis III-21
Market Overview III-21
B.Market Analytics III-22
Table 58: French Recent Past, Current & Future Analysis for
Cyber Security by Segment - Application Security, Content
Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-22
Table 59: French Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-23
Table 60: French 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-24
4b. GERMANY III-25
A.Market Analysis III-25
Market Overview III-25
B.Market Analytics III-26
Table 61: German Recent Past, Current & Future Analysis for
Cyber Security by Segment - Application Security, Content
Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-26
Table 62: German Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-27
Table 63: German 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-28
4c. ITALY III-29
A.Market Analysis III-29
Market Overview III-29
B.Market Analytics III-30
Table 64: Italian Recent Past, Current & Future Analysis for
Cyber Security by Segment - Application Security, Content
Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-30
Table 65: Italian Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-31
Table 66: Italian 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-32
4d. THE UNITED KINGDOM III-33
A.Market Analysis III-33
Market Overview III-33
B.Market Analytics III-34
Table 67: UK Recent Past, Current & Future Analysis for
Cyber Security by Segment - Application Security, Content
Security, Data Security, Endpoint Security, Network
Security, Identity & Access Management, Risk & Compliance
Management, Security Operations, and Consulting Services
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2009 through 2017 (includes corresponding
Graph/Chart) III-34
Table 68: UK Historic Review for Cyber Security by Segment -
Application Security, Content Security, Data Security,
Endpoint Security, Network Security, Identity & Access
Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-35
Table 69: UK 15-Year Perspective for Cyber Security by
Segment - Percentage Breakdown of Revenues for Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets for Years 2003, 2011 & 2017
(includes corresponding Graph/Chart) III-36
4e. REST OF EUROPE III-37
A.Market Analysis III-37
Russia III-37
Market Overview III-37
Russian Antivirus Market - An Insight III-37
Table 70: Leading Vendors in the Russian Anti-Virus
Software Market (2010): Percentage Share Breakdown of
Value Sales for Kaspersky Lab, Eset, Symantec, DrWeb,
Trend Micro, and Others (includes corresponding
Graph/Chart) III-37
B.Market Analytics III-38
Table 71: Rest of Europe Recent Past, Current & Future
Analysis for Cyber Security by Segment - Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2009 through 2017
(includes corresponding Graph/Chart) III-38
Table 72: Rest of Europe Historic Review for Cyber Security
by Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-39
Table 73: Rest of Europe 15-Year Perspective for Cyber
Security by Segment - Percentage Breakdown of Revenues for
Application Security, Content Security, Data Security,
Endpoint Security, Network Security, Identity & Access
Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets for Years 2003,
2011 & 2017 (includes corresponding Graph/Chart) III-40
5. ASIA-PACIFIC III-41
A.Market Analysis III-41
Market Overview III-41
Focus on Select Regional Markets III-41
China III-41
Regulatory Overview III-42
Table 74: Chinese Network Security Market (2010):
Percentage Share Breakdown of Value Sales by Leading
Companies - Beijing Topsec Network Security Technology Co
Ltd., Beijing Rising International Software Co Ltd.,
Cisco Systems, Symantec, Neusoft Corporation, Trend
Micro, Juniper Networks, Check Point, and Others
(includes corresponding Graph/Chart) III-43
India III-43
Market Overview III-43
Impact of Cyber Crimes on Indian Companies III-44
The Indian Security Market III-45
Indian Anti-Virus Market III-45
Select Key Players III-46
MicroWorld Technologies, Inc. III-46
Quick Heal Technologies (P) Ltd. III-46
B.Market Analytics III-47
Table 75: Asia-Pacific Recent Past, Current & Future
Analysis for Cyber Security by Segment - Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2009 through 2017
(includes corresponding Graph/Chart) III-47
Table 76: Asia-Pacific Historic Review for Cyber Security by
Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-48
Table 77: Asia-Pacific 15-Year Perspective for Cyber
Security by Segment - Percentage Breakdown of Revenues for
Application Security, Content Security, Data Security,
Endpoint Security, Network Security, Identity & Access
Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets for Years 2003,
2011 & 2017 (includes corresponding Graph/Chart) III-49
6. LATIN AMERICA III-50
A.Market Analysis III-50
Network Security Market Shows Steady Growth III-50
Competitive Landscape III-50
Table 78: Latin American Network Security Market (2010):
Percentage Value Share Breakdown by Country/Region -
Brazil, Mexico, and Rest of Latin America (includes
corresponding Graph/Chart) III-50
Table 79: Latin American Network Security Market (2010):
Percentage Breakdown of Value Sales by Leading Company for
Check Point, Cisco, Juniper, IBM ISS, McAfee, SonicWALL
Inc, Enterasys Networks Inc, Aker Security Solutions, and
Others (includes corresponding Graph/Chart) III-51
Table 80: Latin American IDS/IPS Market (2010): Percentage
Breakdown of Value Sales by Leading Company for IBM ISS,
Cisco, McAfee, Check Point, Enterasys Networks Inc, and
Others (includes corresponding Graph/Chart) III-51
End-Use Market III-51
Table 81: Latin American Network Security Market (2010):
Percentage Breakdown of Value Sales by End-Use Segment -
Banking and Finance, Government, Telecom & Technology,
Manufacturing, Retail, and Others (includes corresponding
Graph/Chart) III-52
B.Market Analytics III-53
Table 82: Latin America Recent Past, Current & Future
Analysis for Cyber Security by Segment - Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2009 through 2017
(includes corresponding Graph/Chart) III-53
Table 83: Latin America Historic Review for Cyber Security
by Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-54
Table 84: Latin America 15-Year Perspective for Cyber
Security by Segment - Percentage Breakdown of Revenues for
Application Security, Content Security, Data Security,
Endpoint Security, Network Security, Identity & Access
Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets for Years 2003,
2011 & 2017 (includes corresponding Graph/Chart) III-55
7. REST OF WORLD III-56
A.Market Analysis III-56
Security Software Market in Gulf States on the Rise III-56
B.Market Analytics III-57
Table 85: Rest of World Recent Past, Current & Future
Analysis for Cyber Security by Segment - Application
Security, Content Security, Data Security, Endpoint
Security, Network Security, Identity & Access Management,
Risk & Compliance Management, Security Operations, and
Consulting Services Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2009 through 2017
(includes corresponding Graph/Chart) III-57
Table 86: Rest of World Historic Review for Cyber Security
by Segment - Application Security, Content Security, Data
Security, Endpoint Security, Network Security, Identity &
Access Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2003
through 2008 (includes corresponding Graph/Chart) III-58
Table 87: Rest of World 15-Year Perspective for Cyber
Security by Segment - Percentage Breakdown of Revenues for
Application Security, Content Security, Data Security,
Endpoint Security, Network Security, Identity & Access
Management, Risk & Compliance Management, Security
Operations, and Consulting Services Markets for Years 2003,
2011 & 2017 (includes corresponding Graph/Chart) III-59
IV. COMPETITIVE LANDSCAPE
Total Companies Profiled: 128 (including Divisions/Subsidiaries - 149)
------------------------------------------
Region/Country Players
------------------------------------------
The United States 73
Canada 4
Japan 3
Europe 37
France 3
Germany 5
The United Kingdom 11
Spain 1
Rest of Europe 17
Asia-Pacific (Excluding Japan) 30
Middle East 2
To order this report:
Security Systems Industry: Global Cyber Security Industry
Check our Industry Analysis and Insights
CONTACT:
Nicolas Bombourg
Reportlinker
Email: [email protected]
US: (805)652-2626
Intl: +1 805-652-2626
SOURCE Reportlinker
Share this article