表紙
市場調査レポート

暗号化ソフトウェアの世界市場 (用途・産業部門・地域別) :市場規模・市場シェア・世界的動向・企業プロファイル・需要・各種考察・分析・調査・市場機会・市場予測

Global Encryption Software Market (Usage, Vertical and Geography) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2013 - 2020

発行 Allied Market Research 商品コード 324242
出版日 ページ情報 英文 144 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=101.16円で換算しております。
Back to Top
暗号化ソフトウェアの世界市場 (用途・産業部門・地域別) :市場規模・市場シェア・世界的動向・企業プロファイル・需要・各種考察・分析・調査・市場機会・市場予測 Global Encryption Software Market (Usage, Vertical and Geography) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2013 - 2020
出版日: 2015年01月15日 ページ情報: 英文 144 Pages
概要

ソフトウェアベースの暗号化は急速に台頭しつつあるエンドポイントデータセキュリティソリューションです。増大すするデータの安全性に対する懸念への対応やデータプライバシーに関する法令遵守のため、世界中で多くの組織が暗号化を導入しています。世界の暗号化ソフトウェア市場は2014年から2020年にかけて14.27%のCAGRで成長し、2020年には21億6,000万ドルの規模に達すると予測されています。

当レポートでは、世界の暗号化ソフトウェア市場について調査し、各種暗号化ソフトウェアの種類と概要、用途・エンドユーザー産業・地域別の市場規模の推移と予測、市場成長への影響因子の分析、主要企業のプロファイルなどをまとめています

第1章 イントロダクション

第2章 エグゼクティブサマリー

第3章 市場概要

  • 市場の定義・調査範囲
    • 暗号化の概要
  • 暗号化ソフトウェア
    • 成長推進因子
    • 課題
    • 動向
  • 主要調査結果
    • 主な市場影響因子
    • 主要な成功戦略
    • 主要な投資財源
  • ポーターのファイブフォース分析
  • 市場シェア分析

第4章 世界の暗号化ソフトウェア市場:用途別

  • イントロダクション
  • 保存済みデータ暗号化ソフトウェア市場
    • 市場規模・予測:区分別
    • フルディスク/ホールディスク暗号化(FDE)
      • 成長推進因子
      • 課題
    • ファイル/フォルダレベル暗号化(FLE)ソフトウェア
      • 成長推進因子
      • 課題
    • 市場動向
    • 市場規模・予測:地域別
      • 北米
      • 欧州
      • アジア太平洋
      • ラテンアメリカ・中東・アフリカ
    • 市場規模・予測:産業部門別
      • 金融サービス
      • 医療
      • 公共部門 (政府・その他セキュリティ機関)
      • その他
  • 転送中データ暗号化ソフトウェア市場 (Eメール暗号化)
    • 成長推進因子
    • 課題
    • 市場規模・予測:地域別
    • 北米
      • 米国
      • カナダ
      • その他
    • 欧州
      • 英国
      • フランス
      • ドイツ
      • その他
    • アジア太平洋
      • 中国
      • 日本
      • インド
      • オーストラリア
      • その他
    • ラテンアメリカ・中東・アフリカ
      • メキシコ
      • UAE
      • 南アフリカ
      • その他
    • 市場規模・予測:産業部門別
    • 長期的機会のある市場
      • 成長推進因子
      • 課題

第5章 企業プロファイル・分析

  • Symantec
  • Sophos
  • McAfee
  • Check Point Software Technologies
  • Proofpoint
  • Trend Micro
    • 企業概要
    • 業績
    • 主要戦略および発展動向
    • SWOT分析、など

図表

目次
Product Code: IC 15551

Software-based encryption is one of the fast emerging end point data security solutions. An increasing number of organizations worldwide are adopting encryption to address their growing concerns of data safety and data privacy compliance regulations. With data protection and compliance becoming a high priority, organizations have started to view encryption as an enabler to achieve compliance, data security and flexibility. In addition to the complex regulations, increasing adoption of new technologies such as mobility, cloud and virtualization have also fuelled the need for encryption more than ever before.

The main purpose of an encryption software is to protect the confidentiality of the data stored in files/folders and disks or data-at-rest; and the data travelling over wireless network or data-in-transit, depending upon the security and compliance requirements of an organization. This is achieved by converting a message or plain text into coded message called the Cipher text so that only the authorized parties can read it. Software-based encryption uses software to encrypt and decrypt data at-rest as well as data-in-transit. Thus, by rendering the data unreadable by unauthorized persons, encryption software ensures the safety and security of the confidential data. Additionally, a number of data privacy legislations mandate the use of encryption or cite encryption as one most appropriate measures of data protection. Thus, the adoption of encryption would continue to grow in response to data protection compliance regulations and the on-going cyber attacks.

The global encryption software market is expected to reach $2.16 billion by 2020, growing at a CAGR (compounded annual growth rate) of CAGR of 14.27% from 2014 to 2020. The global encryption software market has been segmented in this report as per usage, segments, geography and verticals. On the basis of usage, the global encryption software market is categorized into Data-at-rest and Data-in-transit. The Data-at-rest encryption software market is further bifurcated into two key segments; Full Disk Encryption (FDE) and File level encryption (FLE). The global encryption software market stakeholders encompass IT security providers, IT security consultants, venture capitalists, and enterprises across different industry verticals. The global encryption software market in terms of geography covers North America, Europe, APAC and LAMEA. Presently, North America dominates the global encryption software market, followed by Europe. It is expected that the North America would continue to dominate the global encryption software market from 2014 to 2020 owing to the burgeoning number of high profile data breaches, stringent data privacy compliance regulations and the increasing adoption of technologies specifically cloud and mobility.

KEY BENEFITS

  • The study provides an in-depth analysis of the encryption software market with current and future trends to elucidate the imminent investment pockets in the market
  • Current and future trends are outlined to determine the overall attractiveness and to single out profitable trends for gaining a stronger foothold in the market
  • The report provides information regarding key drivers, restraints and opportunities with impact analysis
  • Quantitative analysis of the current market and estimations through 2013-2020 are provided to highlight the financial caliber of the market
  • Porters Five Forces model and SWOT analysis of the industry illustrates the potency of the buyers & suppliers participating in the market
  • Value chain analysis in the report provides a clear understanding of the roles of stakeholders involved in the value chain

KEY MARKET SEGMENTATION

The market is segmented on the basis of usage, vertical and geography.

MARKET BY USAGE

  • Encryption for Data-at-rest
  • Full Disk Encryption (FDE)
  • File Level Encryption (FLE)
  • Encryption for Data-in-transit
  • Email Encryption

MARKET BY VERTICAL

  • Financial Sector
  • Healthcare
  • Public Sector
  • Others (Retail)

MARKET BY GEOGRAPHY

  • North America
  • United States
  • Canada
  • Others
  • Europe
  • United Kingdom
  • France
  • Germany
  • Others
  • Asia Pacific
  • Japan
  • China
  • India
  • Australia
  • Others
  • LAMEA
  • Mexico
  • UAE
  • South Africa
  • Others

Table of Contents

CHAPTER 1 - INTRODUCTION

  • 1.1. Report description
  • 1.2. Key benefits
  • 1.3. Key market segmentation
  • 1.4. Research methodology
    • 1.4.1. Secondary research
    • 1.4.2. Primary research
    • 1.4.3. Analyst tools and models

CHAPTER 2 - EXECUTIVE SUMMARY:

  • 2.1. Market beyond: what to expect by 2025
    • 2.1.1. Base case scenario
    • 2.1.2. Rapid growth scenario
    • 2.1.3. Critical growth scenario

CHAPTER 3 - MARKET OVERVIEW

  • 3.1. Market definition and scope
    • 3.1.1. Encryption overview
  • 3.2. Encryption software
    • 3.2.1. Drivers
      • 3.2.1.1. Increased compliance regulations
      • 3.2.1.2. Growing number and complexity of number of data breaches:
      • 3.2.1.3. Snowden Revelations
      • 3.2.1.4. Increased adoption of cloud and virtualization
      • 3.2.1.5. Increased Mobility
    • 3.2.2. Challenges
      • 3.2.2.1. Management of Encryption Keys: Increased Costs and Complexity
      • 3.2.2.2. Lack of awareness and education
      • 3.2.2.3. Regulatory restrictions on crypto-software:
    • 3.2.3. Trends
      • 3.2.3.1. Increasing deployment of enterprise wide encryption strategy
      • 3.2.3.2. Increasing demand for Cloud data encryption
  • 3.3. Key findings
    • 3.3.1. Top factors impacting the market
    • 3.3.2. Top winning strategies
    • 3.3.3. Top investment pockets
  • 3.4. Porters five force analysis
    • 3.4.1. Bargaining power of supplier
    • 3.4.2. Bargaining power of buyer
    • 3.4.3. Threat of substitute
    • 3.4.4. Threat of new entrants
    • 3.4.5. Competition within the industry
  • 3.5. Market share analysis, 2013

CHAPTER 4 - GLOBAL ENCRYPTION SOFTWARE MARKET BY USAGE:

  • 4.1. Introduction
  • 4.2. Data at rest encryption software market
    • 4.2.1. Market size and forecasts by segments
    • 4.2.2. Full disk/whole disk encryption (FDE)
      • 4.2.2.1. Drivers
      • 4.2.2.2. Challenges
    • 4.2.3. File/folder level encryption (FLE) software
      • 4.2.3.1. Drivers
      • 4.2.3.2. Challenges
    • 4.2.4. Market trends
    • 4.2.5. Market size and forecasts by geography
      • 4.2.5.1. North America
        • 4.2.5.1.1. DRIVERS
        • 4.2.5.1.2. CHALLENGES
        • 4.2.5.1.3. TRENDS
        • 4.2.5.1.4. UNITED STATES
        • 4.2.5.1.5. CANADA
        • 4.2.5.1.6. OTHERS
      • 4.2.5.2. Europe
        • 4.2.5.2.1. DRIVERS
        • 4.2.5.2.2. CHALLENGES
        • 4.2.5.2.3. TRENDS
        • 4.2.5.2.4. UNITED KINGDOM
        • 4.2.5.2.5. FRANCE
        • 4.2.5.2.6. GERMANY
        • 4.2.5.2.7. OTHERS
      • 4.2.5.3. APAC
        • 4.2.5.3.1. DRIVERS
        • 4.2.5.3.2. CHALLENGES:
        • 4.2.5.3.3. CHINA
        • 4.2.5.3.4. JAPAN
        • 4.2.5.3.5. INDIA
        • 4.2.5.3.6. AUSTRALIA
        • 4.2.5.3.7. OTHERS
      • 4.2.5.4. LAMEA:
        • 4.2.5.4.1. DRIVERS
        • 4.2.5.4.2. CHALLENGES
        • 4.2.5.4.3. MEXICO
        • 4.2.5.4.4. UAE
        • 4.2.5.4.5. SOUTH AFRICA
        • 4.2.5.4.6. OTHERS
    • 4.2.6. Market size and forecasts by Industry verticals
      • 4.2.6.1. Financial services
        • 4.2.6.1.1. DRIVERS
      • 4.2.6.2. Healthcare
        • 4.2.6.2.1. DRIVERS
      • 4.2.6.3. Public sector (Government & other security agencies)
        • 4.2.6.3.1. DRIVERS:
      • 4.2.6.4. Others
        • 4.2.6.4.1. DRIVERS:
  • 4.3. Data in transit encryption software market (Email Encryption)
    • 4.3.1. Drivers
    • 4.3.2. Challenges
    • 4.3.1. Market size and forecasts by Geography
    • 4.3.2. North America
      • 4.3.2.1. United States
      • 4.3.2.2. Canada
      • 4.3.2.3. Others
    • 4.3.3. Europe
      • 4.3.3.1. United Kingdom
      • 4.3.3.2. France
      • 4.3.3.3. Germany
      • 4.3.3.4. Others
    • 4.3.4. APAC
      • 4.3.4.1. China
      • 4.3.4.2. Japan
      • 4.3.4.3. India
      • 4.3.4.4. Australia
      • 4.3.4.5. Others
    • 4.3.5. LAMEA
      • 4.3.5.1. Mexico
      • 4.3.5.2. UAE
      • 4.3.5.3. South Africa
      • 4.3.5.4. Others
    • 4.3.6. Market size and forecasts by Industry Verticals
    • 4.3.7. Long-term opportunistic Markets for Data in Transit Encryption Software
      • 4.3.7.1. Drivers
      • 4.3.7.2. Challenges

CHAPTER 5 - COMPANY PROFILES AND ANALYSIS

  • 5.1. Symantec
    • 5.1.1. Company overview
    • 5.1.2. Company snapshot
    • 5.1.3. Business performance
    • 5.1.4. Strategic moves and developments
      • 5.1.4.1. Organic growth strategies: organizational restructuring & product launches
      • 5.1.4.2. Inorganic growth strategies: Partnerships and Acquisitions
    • 5.1.5. SWOT analysis & strategic conclusions of Symantec
  • 5.2. Sophos
    • 5.2.1. Company overview
    • 5.2.2. Company snapshot
    • 5.2.3. Business performance
    • 5.2.4. Strategic moves and developments
      • 5.2.4.1. Organic growth strategies: Product Launches
      • 5.2.4.2. Inorganic growth Strategies: Partnerships and acqusitions
    • 5.2.5. SWOT analysis & strategic conclusions of Sophos
  • 5.3. McAfee
    • 5.3.1. Company overview
    • 5.3.2. Company snapshot
    • 5.3.3. Business performance
    • 5.3.4. Strategic moves and developments
      • 5.3.4.1. Organic growth strategies: Product Launches
      • 5.3.4.2. Inorganic growth strategies: Partnerships and Acquisitions
    • 5.3.5. SWOT analysis & strategic conclusions
  • 5.4. Check Point Software Technologies
    • 5.4.1. Company overview
    • 5.4.2. Company snapshot
    • 5.4.3. Business performance
    • 5.4.4. Strategic moves and developments
      • 5.4.4.1. Organic growth strategies: Product Launches
      • 5.4.4.2. Inorganic growth strategies: Partnerships and acquisitions
    • 5.4.5. SWOT analysis & strategic conclusions of Checkpoint
  • 5.5. Proofpoint
    • 5.5.1. Company overview
    • 5.5.2. Company snapshot
    • 5.5.3. Business performance
    • 5.5.4. Strategic moves and developments
      • 5.5.4.1. Organic growth strategies: product launches
      • 5.5.4.2. Inorganic strategies: partnerships and acquisitions
    • 5.5.5. SWOT analysis & strategic conclusions of Proofpoint
  • 5.6. Trend Micro
    • 5.6.1. Company overview
    • 5.6.2. Company snapshot
    • 5.6.3. Business performance
    • 5.6.4. Strategic moves and developments
      • 5.6.4.1. Organic growth strategies: organizational restructuring and product launches
      • 5.6.4.2. Inorganic growth strategies: acquisitions and partnerships
    • 5.6.5. SWOT analysis & strategic conclusions of Trend Micro

List of Tables

  • TABLE 1: GLOBAL ENCRYPTION SOFTWARE MARKET MODERATE GROWTH SCENARIO, 2020 - 2025 ($ MILLION)
  • TABLE 2: GLOBAL ENCRYPTION SOFTWARE MARKET RAPID GROWTH SCENARIO, 2020 - 2025 ($ MILLION)
  • TABLE 3: GLOBAL ENCRYPTION SOFTWARE MARKET RAPID GROWTH SCENARIO, 2020 - 2025 ($ MILLION)
  • TABLE 4: KEY COMPLIANCE STANDARDS AND REGULATIONS
  • TABLE 5: REGULATIONS IN OTHER KEY ASIAN REGIONS
  • TABLE 6: MOST RECENT AND SIGNIFICANT DATA BREACHES OF 2014
  • TABLE 7: TABLE OF ACQUISITIONS BY DOMINANT PLAYERS
  • TABLE 8: GLOBAL ENCRYTION SOFTWARE MARKET BY VALUE, 2013 - 2020 ($MILLION)
  • TABLE 9: GLOBAL ENCRYPTION SOFTWARE MARKET BY INDUSTRY VERTICALS, 2013 - 2020 ($MILLION)
  • TABLE 10: GLOBAL ENCRYPTION SOFTWARE MARKET BY GEOGRAPHY, 2013 - 2020 ($MILLION)
  • TABLE 11: GLOBAL DATA-AT-REST ENCRYTION SOFTWARE MARKET BY VALUE, 2013 - 2020 ($MILLION)
  • TABLE 12: GLOBAL DATA-AT-REST ENCRYPTION SOFTWARE MARKET, BY INDUSTRY VERTICAL, 2013 - 2020 ($MILLION)
  • TABLE 13: GLOBAL DATA-AT-REST ENCRYPTION SOFTWARE MARKET, BY GEOGRAPHY, 2013 - 2020 ($MILLION)
  • TABLE 14: GLOBAL DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 15: GLOBAL FDE ENCRYPTION SOFTWARE MARKET BY VALUE, 2013 - 2020 ($MILLION)
  • TABLE 16: GLOBAL FLE ENCRYPTION SOFTWARE MARKET BY VALUE, 2013 - 2020 ($MILLION)
  • TABLE 17: NORTH AMERICA DATA-AT-REST ENCRYPTION MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 18: EUROPEAN DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 19: APAC DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 20: LAMEA DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 21: GLOBAL FINANCIAL SERVICES DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 22: GLOBAL HEALTHCARE SECTOR DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 23: GLOBAL PUBLIC SECTOR DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 24: GLOBAL OTHER INDUSTRIES DATA-AT-REST ENCRYPTION SOFTWARE MARKET BY SEGMENTS, 2013 - 2020 ($MILLION)
  • TABLE 25: GLOBAL DATA-IN-TRANSIT ENCRYPTION SOFTWARE MARKET BY GEOGRAPHY, 2013 - 2020 ($MILLION)
  • TABLE 26: GLOBAL DATA-IN-TRANSIT ENCRYPTION SOFTWARE MARKET BY INDUSTRY VERTICAL, 2013 - 2020 ($MILLION)
  • TABLE 27: SYMANTEC BUSINESS SNAPSHOT
  • TABLE 28: SOPHOS BUSINESS SNAPSHOT
  • TABLE 29: MCAFEE BUSINESS SNAPSHOT
  • TABLE 30: CHECK POINT BUSIESS SNAPSHOT
  • TABLE 31: PROOFPOINT BUSINESS SNAPSHOT
  • TABLE 32: TREND MICRO BUSINESS SNAPSHOT

List of Figures

  • FIG. 1: TOP IMPACTING FACTORS, BASE CASE SCENARIO (2020-2025)
  • FIG. 2: TOP IMPACTING FACTORS,RAPID CASE SCENARIO (2020-2025)
  • FIG. 3: TOP IMPACTING FACTORS, CRITICALCASE SCENARIO (2020-2025)
  • FIG. 1: TOP IMPACTING FACTORS
  • FIG. 2: TOP WINNING STRATEGIES IN ENCRYPTION SOFTWARE MARKET
  • FIG. 3: TOP INVESTMENT POCKETS
  • FIG. 4: PORTERS FIVE FORCE ANALYSIS
  • FIG. 5: MARKET SHARE ANALYSIS, 2013
  • FIG. 6: MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY INDUSTRY VERTICAL, 2013 & 2020
  • FIG. 7: MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY INDUSTRY VERTICAL, 2013 & 2020
  • FIG. 8: MARKET SHARE ANALYSIS OF THE ENCRYPTON SOFTWARE MARKET SIZE BY USAGE, 2013 & 2020
  • FIG. 9: MARKET SHARE ANALYSIS OF DATA-AT-REST ENCRYPTON SOFTWARE MARKET SIZE BY USAGE, 2013 & 2020
  • FIG. 10: REVENUE GENERATED BY SYMANTEC., 2012 - 2014, ($ MILLION)
  • FIG. 11: SYMANTEC FINANCIAL REVENUES (2014), BY OPERATING SEGMENT (%)
  • FIG. 12: SYMANTEC FINANCIAL REVENUES (2014), BY GEOGRAPHIC REGIONS (%)
  • FIG. 13: SWOT ANALYSIS OF SYMANTEC
  • FIG. 14: REVENUE GENERATED BY SOPHOS, 2012 - 2014, $ MILLION
  • FIG. 15: FINANCIAL REVENUES (2014), BY GEOGRAPHIC REGIONS
  • FIG. 16: SWOT ANALYSIS OF SOPHOS
  • FIG. 17: REVENUE GENERATED BY INTEL'S SSG (MCAFEE) SEGMENT, 2011 - 2013, $ MILLION
  • FIG. 18: SWOT ANALYSIS OF MCAFEE
  • FIG. 19: REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES, 2011 - 2013, $ MILLION
  • FIG. 20: FINANCIAL REVENUES 2013, BY GEOGRAPHY
  • FIG. 21: SWOT ANALYSIS OF CHECK POINT SOFTWARE
  • FIG. 22: REVENUE GENERATED BY PROOFPOINT, 2011 - 2013, $ MILLION
  • FIG. 23: FINANCIAL REVENUES (2013), BY SEGMENTS
  • FIG. 24: FINANCIAL REVENUES (2013), BY GEOGRAPHIC AREA
  • FIG. 25: SWOT ANALYSIS OF PROOFPOINT
  • FIG. 26: REVENUE GENERATED BY TREND MICRO, (2011 - 2013 ), $ MILLION
  • FIG. 27: FINANCIAL REVENUES (2013), BY GEOGRAPHIC REGIONS
  • FIG. 28: SWOT ANALYSIS OF TREND MICRO
Back to Top