表紙
市場調査レポート

データセンターセキュリティ:世界市場

Data Center Security: Global Markets

発行 BCC Research 商品コード 345798
出版日 ページ情報 英文 162 Pages
即納可能
価格
本日の銀行送金レート: 1USD=105.42円で換算しております。
Back to Top
データセンターセキュリティ:世界市場 Data Center Security: Global Markets
出版日: 2015年11月30日 ページ情報: 英文 162 Pages
担当者のコメント
BCC Research社のレポートは、Reuter、Wall Street Journal、Fortuneなどで引用されることも多く、それぞれの業界の識者の意見として重きを置かれています。同社レポートを複数冊ご購入の場合年間パッケージのご契約がお得です。詳細は右の担当者のおすすめ商品よりご覧下さい。
概要

世界のデータセンターセキュリティ製品市場規模は、2014年に56億米ドルに達しました。同市場は2015年から2020年にかけて13.8%のCAGRで推移し、2015年の約64億米ドルから、2020年の121億米ドルへと拡大する見込みです。

当レポートでは、データセンターセキュリティの世界市場および技術について調査し、世界市場、主な市場動向、および市場ダイナミクスの分析を提供しており、データセンターセキュリティプロバイダーおよび新興のデータセンターセキュリティプロバイダーに関する情報などをまとめ、お届けいたします。

第1章 イントロダクション

第2章 サマリー

第3章 概要

  • 絶え間なく変わるデータセンター市場
  • ITセキュリティのイントロダクション
  • サイバーセキュリティ情勢の変化
  • モノのインターネット (IoT) がデータセンターおよびITセキュリティ市場に及ぼす影響
  • BYODがデータセンターおよびITセキュリティ市場に及ぼす影響
  • サイバーセキュリティ:イントロダクション
  • クラウド・仮想化の発明およびデータセンター空間におけるセキュリティ脅威の新形態の登場
  • データセンターセキュリティソリューションの成長予測
  • 長年にわたる市場変化
  • データセンターセキュリティ市場の影響力
  • データセンターセキュリティ空間における主要戦略

第4章 市場:技術タイプ別

  • データセンターセキュリティ市場向けIDS・IPS技術
  • データセンターセキュリティ市場向けDDOS技術
  • データセンターセキュリティ市場向け統合脅威管理 (UTM) 技術
  • データセンターセキュリティ市場向けID・アクセス管理 (IAM) 技術
  • データセンターセキュリティ市場向けセキュリティ特定・イベント管理 (SIEM) 技術
  • 市場区分 - 従来型データセンター vs. クラウド/ソフトウェア定義データセンターセキュリティ

第5章 市場:アプリケーション別

  • 区分:産業別
    • 金融サービス
    • 銀行
    • 小売り・Eコマース
    • 医療
    • 政府
    • その他
  • 中規模組織における採用の拡大

第6章 産業構造

  • 市場における主要ステークホルダー
  • データセンターセキュリティ市場における主要動向
  • データセンターセキュリティ空間におけるベンチャーキャピタル資金・投資
  • 規制の枠組みとそのデータセンターセキュリティ市場への影響

第7章 特許分析

第8章 地域区分

  • 南北アメリカ
  • 欧州・中東・アフリカ
  • アジア太平洋

第9章 ベンダーのプロファイル

第10章 企業プロファイル

第11章 略語

図表リスト

目次
Product Code: SAS025A

REPORT HIGHLIGHTS

The global market for data center security products reached $5.6 billion in 2014. The market is expected to increase from nearly $6.4 billion in 2015 to $12.1 billion in 2020, with a compound annual growth rate (CAGR) of 13.8% for 2015-2020.

This report provides:

  • An overview of the global markets and technologies for data center security.
  • Analyses of global market trends, with data from 2014, estimates for 2015, and projections of compound annual growth rates (CAGRs) through 2020.
  • A look at key trends in the market including industry trends, growth in mega data centers, increased spending in security solutions, global IT spending trends, and virtualized data center trends.
  • Analysis of the market's dynamics, specifically growth drivers which include increasing data traffic and network connections, rising virtualization in data centers, new sophisticated threats and cyber attacks, government regulations and compliance requirements, as well as others.
  • Information on existing data center security providers and new and emerging data center security providers as well as discussion about the mergers and acquisitions in this space and how this is changing the data center security landscape.

DEFINITION AND SCOPE OF REPORT

BCC Research defines data center security as a computer or cyber security applied to data centers, where the data centers can be in physical form or can be virtualized (software-defined data centers). The security applied can be either as software form, hardware form, or can be a mix of software and hardware. Further, for the purpose of this report, security is defined as all forms of processes and mechanisms by which data center equipment, information and services are protected from intended or unintended (and unauthorized) access and change or destruction.

For calculating the market size, the report has considered the following forms of security:

  • Intrusion detection system and intrusion prevention system.
  • Distributed denial of service (DDoS) protection systems.
  • Unified threat management solutions.
  • Identity and access management solutions.
  • Security information and event management solutions.

Further, for calculating the market and various other figures such as market segmentation, we have considered data center software security, data center hardware security as well as data center security services. However, services that are not directly related to implementation or maintenance such as education and training, and consulting services are out of the scope of this report. Further, hardware security that are not part of cyber security, such as closed circuit television (CCTV) and biometric access control are out of scope of this report.

The analysis starts with introducing the reader to how the data center security industry has evolved over time and how cloud and virtualization has affected the market. Building on that understanding, the study proceeds to identify the following forces driving the market:

  • Primary forces are the forces having a direct impact on the data center security space. Secondary forces are the forces that, albeit important, have an indirect impact.
  • Key funding and financing in this space, which shows strong support (especially the new entrants).
  • Some key challenges that may hinder the growth of this market.
  • Key trends visible in the market.
  • The top seven industries that are key users of data center security solutions, along with some other industries that are expected to be strong users in the future.
  • Demand in the Americas, EMEA and Asia-Pacific for data center security solutions.

ANALYST'S CREDENTIALS

Ritam Biswas is an established market research analyst. The author has more than eight years of experience in the market research and financial research space and has undertaken several research and advisory projects in various IT security and other technology verticals. In the professional space, he has worked a team lead and lead analyst in IT security research, where he has written multiple reports in areas such as cloud security, virtualization security, mobile security, deep packet inspection security and security solutions in the SMB space.

He has also taken part as an audience in various webinars, analyst presentations, conferences, and has interacted with C-level executives for various report writing purposes.

Table of Contents

CHAPTER 1 - INTRODUCTION

  • REPORT OBJECTIVE
  • DEFINITION AND SCOPE OF REPORT
  • REASONS FOR DOING THE STUDY
  • INTENDED AUDIENCE
  • METHODOLOGY
  • INFORMATION SOURCES
  • ANALYST'S CREDENTIALS
  • RELATED BCC RESEARCH REPORTS
  • BCC RESEARCH WEBSITE
  • DISCLAIMER

CHAPTER 2 - SUMMARY

  • SUMMARY TABLE: GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, THROUGH 2020 ($ MILLIONS)
  • SUMMARY FIGURE: GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($ MILLIONS)

CHAPTER 3 - OVERVIEW

  • EVER CHANGING DATA CENTER MARKET
    • DATA CENTER AS A SERVICE (DCAAS)
    • SOFTWARE-DEFINED DATA CENTER (SDDC)
    • EMERGENCE OF NEW DATA CENTERS AROUND THE WORLD
    • NEED FOR SECURITY
      • TABLE 1: KEY DDOS ATTACKS, 2014 AND 2015
  • INTRODUCTION TO IT SECURITY
    • CRITICAL INFRASTRUCTURE SECURITY
    • STUXNET WORM
    • MOTIVATION FOR IT SECURITY ATTACKS
    • IT SECURITY SERVICES
    • MANAGED SECURITY SERVICE
    • SECURITY-AS-A-SERVICE
  • CHANGE IN CYBER SECURITY LANDSCAPE
  • IMPACT OF INTERNET OF THINGS (IOT) ON THE DATA CENTER AND IT SECURITY MARKETS
  • IMPACT OF BRING YOUR OWN DEVICE (BYOD) ON THE DATA CENTER AND IT SECURITY MARKETS
  • DATA CENTER SECURITY: INTRODUCTION
    • LAYERED SECURITY APPROACH FOR DATA CENTERS
    • DATA CENTER SECURITY IN DETAIL
      • TABLE 2: SECURITY TECHNOLOGIES IN A DATA CENTER SECURITY SOLUTION
  • ADVENT OF CLOUD AND VIRTUALIZATION AND EMERGENCE OF NEW FORMS OF SECURITY THREATS IN THE DATA CENTER SPACE
  • GROWTH FORECAST FOR DATA CENTER SECURITY SOLUTIONS
  • MARKET CHANGES OVER THE YEARS
    • EMERGENCE OF SOCIAL NETWORKING COMPANIES AND THEIR IMPACT ON THE DATA CENTER SECURITY MARKET
    • DATA CENTER SECURITY MARKET FORCES
      • TABLE 3: MAJOR MARKET FORCES AND THEIR EFFECTS
    • INCREASING INSIDER THREAT AND INFORMATION LEAKAGE
      • TABLE 4: TOP CAUSES OF DATA BREACHES, 2013 (%)
      • TABLE 5: TOP TYPES OF INFORMATION BREACHED
      • TABLE 6: KEY INSIDER DATA THEFTS, 2011-2015
  • RISE IN COMPLEXITY OF THREATS
  • CYBERCRIME-AS-A-SERVICE
  • GROWTH IN DDOS ATTACKS
    • TABLE 7: KEY DDOS ATTACKS, 2014 AND 2015
    • Operation Ababil
  • INCREASE IN ATTACKS ON GOVERNMENT DEPARTMENTS
    • TABLE 8: KEY ATTACKS ON GOVERNMENT DEPARTMENTS AND WEBSITES, 2012-2015
    • TABLE 9: MOST FREQUENTLY ATTACKED COUNTRIES
  • GROWING CRITICALITY OF THE INFORMATION STORED IN DATA CENTERS
  • INCREASING SPENDING ON IT SECURITY
  • GROWING STRINGENT REGULATORY REQUIREMENTS
    • TABLE 10: KEY SECTORS WITH HIGH LEVEL OF CONTROL
  • MIGRATION TO THE CLOUD
  • INCREASE IN ONLINE TRANSACTIONS
  • KEY STRATEGIES IN THE DATA CENTER SECURITY SPACE
  • KEY BUYING CRITERIA
  • DEPLOYMENT STRATEGIES
    • Large, High-Performance Appliances
    • Protection of Servers at the Hypervisor Level
    • Protection of Individual Server Instances
  • DATA CENTER SECURITY GOVERNANCE AND FRAMEWORK

CHAPTER 4 - MARKET BY TYPE OF TECHNOLOGY

  • TABLE 11: GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE OF TECHNOLOGY, 2015 AND 2020 (%)
  • TABLE 12: KEY DDOS MITIGATION AND SECURITY PROVIDERS
  • IDS AND IPS TECHNOLOGY FOR DATA CENTER SECURITY MARKET
    • TABLE 13: GLOBAL MARKET FOR IDS AND IPS TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 14: KEY IDS AND IPS TECHNOLOGY PROVIDERS
  • DDOS TECHNOLOGY FOR DATA CENTER SECURITY MARKET
    • TABLE 15: GLOBAL MARKET FOR DDOS TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 16: KEY DDOS MITIGATION PROVIDERS
  • UNIFIED THREAT MANAGEMENT (UTM) TECHNOLOGY FOR DATA CENTER SECURITY MARKET
    • TABLE 17: GLOBAL MARKET FOR UTM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 18: KEY UTM TECHNOLOGY PROVIDERS
  • IDENTITY AND ACCESS MANAGEMENT (IAM) TECHNOLOGY FOR DATA CENTER SECURITY MARKET
    • FIGURE 1: COMPARISON OF VARIOUS STAGES OF IAM TECHNOLOGY
    • TABLE 19: GLOBAL MARKET FOR IAM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 20: KEY IAM TECHNOLOGY PROVIDERS
  • SECURITY IDENTITY AND EVENT MANAGEMENT (SIEM) TECHNOLOGY FOR DATA CENTER SECURITY MARKET
    • TABLE 21: GLOBAL MARKET FOR SIEM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 22: KEY SIEM TECHNOLOGY PROVIDERS
  • MARKET SEGMENTATION-TRADITIONAL DATA CENTER SECURITY VS. CLOUD/SOFTWARE-DEFINED DATA CENTER SECURITY
    • TABLE 23: GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE, 2014-2020 (%)
    • FIGURE 2: GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($ MILLIONS)

CHAPTER 5 - MARKET BY APPLICATION

  • SEGMENTATION BY INDUSTRY
    • TABLE 24: GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
    • FIGURE 3: GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, 2014-2020 ($ MILLIONS)
  • FINANCIAL SERVICES SECTOR OUTLOOK
    • FIGURE 4: AVERAGE ANNUALIZED COST GROWTH OF CYBER CRIME FOR A FINANCIAL SERVICES COMPANY, 2011-2013 (%)
    • TABLE 25: LIST OF HIGH PROFILE DATA LOSS CASES AMONG FINANCIAL SERVICES ORGANIZATIONS, 2012-2014
    • TABLE 26: IMPORTANCE OF KEY SECURITY SOLUTIONS IN FINANCIAL SERVICE SECTOR
    • TABLE 27: GLOBAL MARKET FOR FINANCIAL SERVICES SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
  • BANKING SECTOR
    • TABLE 28: MAPPING OF ATTACKERS AND VARIOUS ATTACKS AND IMPACT ON BANKING SECTOR
  • RETAIL AND E-COMMERCE SECTOR OUTLOOK
    • TABLE 29: INTERNET USER PENETRATION FOR KEY COUNTRIES AS PERCENTAGE OF POPULATION, 2014 (NO./%)
    • TABLE 30: GLOBAL MARKET FOR RETAIL AND E-COMMERCE SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
  • HEALTH CARE SECTOR OUTLOOK
    • TABLE 31: IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE HEALTHCARE SECTOR
    • TABLE 32: GLOBAL MARKET FOR HEALTHCARE SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
  • GOVERNMENT SECTOR OUTLOOK
    • TABLE 33: IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE GOVERNMENT SECTOR
    • TABLE 34: GLOBAL MARKET FOR GOVERNMENT SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 35: KEY ATTACKS ON DATA CENTERS IN THE GOVERNMENT SPACE
  • OTHER SECTORS
    • TABLE 36: GLOBAL MARKET FOR ENERGY AND UTILITIES SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 37: GLOBAL MARKET FOR TELECOM SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 38: GLOBAL MARKET FOR INFORMATION TECHNOLOGY SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
  • GROWING ACCEPTANCE AMONG MID-SIZED ORGANIZATIONS
    • TABLE 39: KEY MID-SIZED COMPANIES ACCEPTING DATA CENTER SECURITY SOLUTIONS

CHAPTER 6 - INDUSTRY STRUCTURE

  • KEY STAKEHOLDERS IN THE MARKET
  • KEY TRENDS IN THE DATA CENTER SECURITY MARKET
    • EMERGENCE OF CONVERGED SOLUTIONS
    • CONSOLIDATION IN THE DATA CENTER SECURITY MARKET
      • TABLE 40: KEY ACQUISITIONS AND MERGERS IN THE DATA CENTER SECURITY AND RELATED SPACE
  • VENTURE CAPITAL FUNDING AND INVESTMENTS IN THE DATA CENTER SECURITY SPACE
    • TABLE 41: FUNDING IN THE DATA CENTER SECURITY AND RELATED SPACE
  • REGULATORY FRAMEWORKS AND THEIR EFFECTS ON THE DATA CENTER SECURITY MARKET
    • SARBANES-OXLEY ACT (SARBOX, SOX)
    • PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)
    • THE GRAMM-LEACH-BLILEY ACT (GLB) ACT OF 1999
    • FAIR AND ACCURATE CREDIT TRANSACTION ACT (FACTA), INCLUDING RED FLAGS RULE
    • FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
    • HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
    • EUROPEAN UNION DATA PROTECTION DIRECTIVE
    • BANK SECRECY ACT
    • CALIFORNIA SENATE BILL 1386
    • PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA)
    • INFORMATION SECURITY MANAGEMENT SYSTEM COMPLIANCE (ISO 27001/27002)
    • HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT
    • LAW ON THE PROTECTION OF PERSONAL DATA HELD BY PRIVATE PARTIES

CHAPTER 7 - PATENT ANALYSIS

  • TABLE 42: LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (NUMBER)
  • FIGURE 5: LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (%)
  • TABLE 43: NUMBER OF PATENTS BY TECHNOLOGIES AND SUB-TECHNOLOGIES

CHAPTER 8 - INTERNATIONAL

  • GEOGRAPHIC SEGMENTATION
    • TABLE 44: GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • FIGURE 6: GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, 2014-2020 ($ MILLIONS)
  • THE AMERICAS
    • TABLE 45: KEY U.S. GOVERNMENT DATA BREACHES
    • Key Growth Sectors in the U.S.
      • TABLE 46: AMERICAS MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
      • Government/Public Sector
      • Financial Services
      • Retail and e-Commerce
      • Healthcare
  • EUROPE, MIDDLE EAST AND AFRICA
    • TABLE 47: KEY EUROPEAN GOVERNMENT DATA BREACHES, 2014 AND 2015
    • TABLE 48: EMEA MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
    • Key Growth Sectors in the U.K.
      • Healthcare
      • Government
    • Key Growth Sectors in Germany
    • Key Growth Sectors and Technologies in Switzerland
    • Key Growth Sectors in the Nordic region
  • KEY GROWTH SECTORS AND TECHNOLOGIES IN THE MIDDLE EAST
    • Oil and Gas
    • Government/Public Sector
    • Financial Services
  • ASIA-PACIFIC
    • TABLE 49: ASIA-PACIFIC MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
    • Key Growth Sectors in India
      • Financial Services
      • Government Sector
    • Key Growth Sectors in South Korea
      • Government Sector

CHAPTER 9 - VENDOR PROFILES

  • KEY PLAYERS IN THE DATA CENTER SECURITY MARKET AND THE COMPETITIVE SCENARIO
    • CISCO
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • CHECK POINT SOFTWARE TECHNOLOGIES
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • DELL
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • FORTINET
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • IBM
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • MCAFEE
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • JUNIPER NETWORKS
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • SYMANTEC
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • A10 NETWORKS
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • ALLOT COMMUNICATIONS
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • ARBOR NETWORKS
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • CORERO NETWORK SECURITY
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • F5 NETWORKS
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • FIREEYE
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • IMPERVA
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • KASPERSKY
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • PALO ALTO NETWORKS
      • Business Overview
      • Key Data Center and Related Solutions
      • Strengths
      • Weaknesses
    • TREND MICRO
      • Business Overview
      • Key Data Center and Related Solutions
      • Key Clients in the Data Center Security Space
      • Strengths
      • Weaknesses
    • VARMOUR
      • Business Overview
      • Strengths
      • Weaknesses

CHAPTER 10 - COMPANY PROFILES

  • OTHER PARTICIPANTS IN THE DATA CENTER SECURITY MARKET
    • A10 NETWORKS
    • ABB
    • AKAMAI TECHNOLOGIES INC.
    • ALLOT COMMUNICATIONS
    • ANDRISOFT
    • ARBOR NETWORKS
    • AT&T
    • BIT9
    • BLACK LOTUS
    • BLOCKDOS
    • BMC SOFTWARE
    • BROCADE COMMUNICATIONS SYSTEMS INC.
    • CHECK POINT SOFTWARE TECHNOLOGIES
    • CISCO
    • CLEVERSAFE INC.
    • CLOUDFLARE
    • COMMVAULT SYSTEMS INC.
    • CORERO NETWORK SECURITY
    • CORESITE
    • CYBEROAM
    • DELL INC.
    • DIGITAL REALTY
    • DOSARREST INTERNET SECURITY
    • EMC
    • EQUINIX
    • ESOLUTIONS GROUP
    • EXPEDIENT
    • EXTREME NETWORKS
    • F5 NETWORKS INC.
    • FIREEYE
    • FOGO DATA CENTERS
    • FORTINET INC.
    • GLOBAL SWITCH
    • HEWLETT-PACKARD
    • HITACHI DATA SYSTEMS
    • IBM
    • IMPERVA
    • INTEL
    • INTEROUTE
    • IXIA
    • JUNIPER NETWORKS
    • KASPERSKY LAB
    • LEVEL 3 COMMUNICATIONS
    • LIMELIGHT NETWORKS
    • NARUS
    • NETAPP
    • NETCETERA
    • NEUSTAR
    • NTT
    • NUTANIX
    • ORACLE
    • PALO ALTO NETWORKS
    • PROLEXIC TECHNOLOGIES
    • RACKSPACE
    • RADWARE
    • SAFENET
    • SCHNEIDER ELECTRIC
    • SIX DEGREES GROUP
    • STAMINUS
    • STRATOSCALE
    • SUNGARD AVAILABILITY SERVICES
    • SYMANTEC
    • TELECITY GROUP
    • TREND MICRO
    • VARMOUR
    • VERISIGN INC.
    • VMWARE

CHAPTER 11 - APPENDIX ABBREVIATIONS

LIST OF TABLES

  • SUMMARY TABLE: GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, THROUGH 2020 ($ MILLIONS)
    • TABLE 1: KEY DDOS ATTACKS, 2014 AND 2015
    • TABLE 2: SECURITY TECHNOLOGIES IN A DATA CENTER SECURITY SOLUTION
    • TABLE 3: MAJOR MARKET FORCES AND THEIR EFFECTS
    • TABLE 4: TOP CAUSES OF DATA BREACHES, 2013 (%)
    • TABLE 5: TOP TYPES OF INFORMATION BREACHED
    • TABLE 6: KEY INSIDER DATA THEFTS, 2011-2015
    • TABLE 7: KEY DDOS ATTACKS, 2014 AND 2015
    • TABLE 8: KEY ATTACKS ON GOVERNMENT DEPARTMENTS AND WEBSITES, 2012-2015
    • TABLE 9: MOST FREQUENTLY ATTACKED COUNTRIES
    • TABLE 10: KEY SECTORS WITH HIGH LEVEL OF CONTROL
    • TABLE 11: GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE OF TECHNOLOGY, 2015 AND 2020 (%)
    • TABLE 12: KEY DDOS MITIGATION AND SECURITY PROVIDERS
    • TABLE 13: GLOBAL MARKET FOR IDS AND IPS TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 14: KEY IDS AND IPS TECHNOLOGY PROVIDERS
    • TABLE 15: GLOBAL MARKET FOR DDOS TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 16: KEY DDOS MITIGATION PROVIDERS
    • TABLE 17: GLOBAL MARKET FOR UTM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 18: KEY UTM TECHNOLOGY PROVIDERS
    • TABLE 19: GLOBAL MARKET FOR IAM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 20: KEY IAM TECHNOLOGY PROVIDERS
    • TABLE 21: GLOBAL MARKET FOR SIEM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 22: KEY SIEM TECHNOLOGY PROVIDERS
    • TABLE 23: GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE, 2014-2020 (%)
    • TABLE 24: GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
    • TABLE 25: LIST OF HIGH PROFILE DATA LOSS CASES AMONG FINANCIAL SERVICES ORGANIZATIONS, 2012-2014
    • TABLE 26: IMPORTANCE OF KEY SECURITY SOLUTIONS IN FINANCIAL SERVICE SECTOR
    • TABLE 27: GLOBAL MARKET FOR FINANCIAL SERVICES SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 28: MAPPING OF ATTACKERS AND VARIOUS ATTACKS AND IMPACT ON BANKING SECTOR
    • TABLE 29: INTERNET USER PENETRATION FOR KEY COUNTRIES AS PERCENTAGE OF POPULATION, 2014 (NO./%)
    • TABLE 30: GLOBAL MARKET FOR RETAIL AND E-COMMERCE SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 31: IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE HEALTHCARE SECTOR
    • TABLE 32: GLOBAL MARKET FOR HEALTHCARE SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 33: IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE GOVERNMENT SECTOR
    • TABLE 34: GLOBAL MARKET FOR GOVERNMENT SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 35: KEY ATTACKS ON DATA CENTERS IN THE GOVERNMENT SPACE
    • TABLE 36: GLOBAL MARKET FOR ENERGY AND UTILITIES SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 37: GLOBAL MARKET FOR TELECOM SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 38: GLOBAL MARKET FOR INFORMATION TECHNOLOGY SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
    • TABLE 39: KEY MID-SIZED COMPANIES ACCEPTING DATA CENTER SECURITY SOLUTIONS
    • TABLE 40: KEY ACQUISITIONS AND MERGERS IN THE DATA CENTER SECURITY AND RELATED SPACE
    • TABLE 41: FUNDING IN THE DATA CENTER SECURITY AND RELATED SPACE
    • TABLE 42: LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (NUMBER)
    • TABLE 43: NUMBER OF PATENTS BY TECHNOLOGIES AND SUB-TECHNOLOGIES
    • TABLE 44: GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
    • TABLE 45: KEY U.S. GOVERNMENT DATA BREACHES
    • TABLE 46: AMERICAS MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
    • TABLE 47: KEY EUROPEAN GOVERNMENT DATA BREACHES, 2014 AND 2015
    • TABLE 48: EMEA MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
    • TABLE 49: ASIA-PACIFIC MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)

LIST OF FIGURES

  • SUMMARY FIGURE: GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($ MILLIONS)
    • FIGURE 1: COMPARISON OF VARIOUS STAGES OF IAM TECHNOLOGY
    • FIGURE 2: GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($ MILLIONS)
    • FIGURE 3: GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, 2014-2020 ($ MILLIONS)
    • FIGURE 4: AVERAGE ANNUALIZED COST GROWTH OF CYBER CRIME FOR A FINANCIAL SERVICES COMPANY, 2011-2013 (%)
    • FIGURE 5: LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (%)
    • FIGURE 6: GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, 2014-2020 ($ MILLIONS)
Back to Top