表紙:デセプション技術の世界市場-2023年~2030年
市場調査レポート
商品コード
1360037

デセプション技術の世界市場-2023年~2030年

Global Deception Technology Market - 2023-2030

出版日: | 発行: DataM Intelligence | ページ情報: 英文 201 Pages | 納期: 約2営業日

● お客様のご希望に応じて、既存データの加工や未掲載情報(例:国別セグメント)の追加などの対応が可能です。  詳細はお問い合わせください。

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=156.76円
デセプション技術の世界市場-2023年~2030年
出版日: 2023年10月11日
発行: DataM Intelligence
ページ情報: 英文 201 Pages
納期: 約2営業日
ご注意事項 :
本レポートは最新情報反映のため適宜更新し、内容構成変更を行う場合があります。ご検討の際はお問い合わせください。
  • 全表示
  • 概要
  • 目次
概要

概要:

世界のデセプション技術市場は、2022年に19億米ドルに達し、2023年から2030年の予測期間中にCAGR 12.1%で成長し、2030年には57億米ドルに達すると予測されています。

デセプション技術は、脅威が被害をもたらす前にその脅威を検知し、対応するためのプロアクティブな防衛戦略を提供します。デセプション技術は、脅威の早期検知と迅速な対応に重点を置いており、進化するサイバーセキュリティの状況に合致しています。従来のセキュリティ対策は予防に重点を置くことが多いですが、デセプション技術は、すでにネットワーク内部に存在する脅威を積極的に特定することで、これらの対策を補完します。

例えば、2022年1月14日、ハネウェルはAcalvio Technologiesと共同で、Honeywell Threat Defense Platform(HTDP)と呼ばれる新しいサイバーセキュリティ・ソリューションを発表しました。このソリューションは、商業ビルの運用技術(OT)環境内で既知および未知の(ゼロデイ)サイバー攻撃を検出するように設計されています。

アジア太平洋地域は予測期間中に最も速い速度で発展し、2022年には世界のデセプション技術市場の約1/4を占めると予想されています。アジア太平洋地域では近年、サイバーセキュリティの脅威や攻撃が増加しており、これには高度な持続的脅威、ランサムウェア攻撃、データ漏洩などが含まれます。この地域の政府や規制機関は、より厳しいデータ保護やサイバーセキュリティの規則や規制を実施しており、組織もこれらの規制に準拠するか、厳しい罰則に直面しています。

ダイナミクス:

政府のイニシアチブの高まり

機密データ、重要インフラ、国家安全保障を保護するため、世界中の政府がサイバーセキュリティへの支出を拡大しています。サイバーセキュリティ・イニシアチブに対する政府の資金援助や支援は、組織によるデセプション技術の採用を後押ししています。政府はしばしばサイバーセキュリティに関する規制や基準を導入し、組織に高度なセキュリティ対策の実施を義務付けています。

例えば、2023年8月31日には、CERT-Inがサイバーセキュリティの脅威に対処する責任を負う国家機関となっています。電子情報技術省(MeitY)が始めたこの取り組みは、"デジタル・インディア"のコンセプトに沿ったインドのサイバーセキュリティ・エコシステムの改善を意図しています。MeitYとNational Electronic Governance Division(NeGD)のパートナーシップによるものです。

ゼロデイや標的型APTの増加

ゼロデイ脆弱性は日を追うごとに増加し、組織はサイバー攻撃の大きなリスクに直面しています。デセプション技術は、ネットワーク内に欺瞞的なレイヤーを作成することで、攻撃者がこれらの脆弱性を見つけ、悪用することを困難にします。APTは高度に洗練された攻撃であり、多くの場合、特定の組織や業界をターゲットにした国家による支援を受けています。デセプション技術は、攻撃者を欺瞞的な罠に誘い込み、重要なシステムから隔離することで、このような高度な脅威を検知・阻止するように設計されています。

2022年4月、Mandiant Threat Intelligenceは、ゼロデイ脆弱性の悪用が増加していることを報告しました。国家に支援されたグループ、特に中国のアクターが、ゼロデイ脆弱性を悪用する主要な犯人であることに変わりはありません。さらに、ランサムウェアグループを含む金銭的な動機に基づく脅威アクターは、ゼロデイ脆弱性の利用を大幅に増加させました。

サイバー脅威ラボ設立のためのパートナーシップ

サイバー脅威ラボは、サイバーセキュリティ分野における研究とイノベーションを促進します。学術機関と協力することで、テクノロジー企業は新たな脅威に関する最新の研究成果や洞察にアクセスすることができ、これらのラボは、デセプション技術やその他のサイバーセキュリティ・ソリューションを実世界のシナリオでテストするための制御された環境を提供し、最先端のセキュリティ対策の開発と改良を可能にします。

例えば、2023年2月13日、クラウドリスクと脅威検知のリーダーであるRapid7は、南フロリダ大学(USF)と提携し、USFにRapid7 Cyber Threat Intelligence Labを設立します。このイニシアチブは、Rapid7の慈善部門からの150万米ドルの投資によって賄われ、サイバー脅威検知分野における学際的な研究努力を支援することを目的としています。この共同研究は、サイバー脅威インテリジェンスと検知に関連する研究努力を促進します。USFの複数の学問分野とカレッジの教員専門家と学生は、サイバーセキュリティ領域における革新的なプロジェクトに共同で取り組むことになります。

ネットワーク管理と互換性の問題

デセプション技術は誤警報や誤検知を発生させる可能性があり、デセプション技術は主に攻撃者がネットワーク内に侵入した後の検知に重点を置いているため、脅威が存在しないにもかかわらず脅威を示す警報が発せられ、存在しない問題の調査に無駄な時間とリソースを費やすことになります。欺瞞資産のネットワークを管理することは、複雑でリソースを必要とします。組織は、欺瞞環境を現実的かつ最新の状態に保つ必要があります。

デセプションソリューションの効果的な導入と維持には、ハードウェア、ソフトウェア、人材などのITリソースを追加する必要があります。デセプション技術を既存のセキュリティ・システムやワークフローと統合することは、困難な場合があります。互換性の問題が生じる可能性があり、他のセキュリティ・ツールとのシームレスな連携が不可欠です。より大規模なネットワークをカバーするために、デセプションソリューションを拡張することは困難な場合があります。広範なインフラを持つ組織では、すべての資産で一貫したレベルのデセプションを維持することが困難な場合があります。

目次

第1章 調査手法と調査範囲

第2章 定義と概要

第3章 エグゼクティブサマリー

第4章 市場力学

  • 影響要因
    • 促進要因
      • 政府のイニシアティブの高まり
      • ゼロデイや標的型APTの増加
      • サイバー脅威ラボ設立のためのパートナーシップ
    • 抑制要因
      • ネットワーク管理と互換性の問題
    • 影響分析

第5章 業界分析

  • ポーターのファイブフォース分析
  • サプライチェーン分析
  • 価格分析
  • 規制分析
  • ロシア・ウクライナ戦争の影響分析
  • DMIの見解

第6章 COVID-19分析

第7章 展開方式別

  • クラウド
  • オンプレミス

第8章 組織規模別

  • 中小企業
  • 大企業

第9章 サービス別

  • マネージドサービス
  • プロフェッショナルサービス

第10章 デセプションスタック別

  • データセキュリティ
  • アプリケーションセキュリティ
  • エンドポイントセキュリティ
  • ネットワークセキュリティ

第11章 エンドユーザー別

  • 政府機関
  • 医療
  • BFSI
  • 防衛
  • IT
  • その他

第12章 地域別

  • 北米
    • 米国
    • カナダ
    • メキシコ
  • 欧州
    • ドイツ
    • 英国
    • フランス
    • イタリア
    • ロシア
    • その他欧州
  • 南米
    • ブラジル
    • アルゼンチン
    • その他南米
  • アジア太平洋
    • 中国
    • インド
    • 日本
    • オーストラリア
    • その他アジア太平洋
  • 中東・アフリカ

第13章 競合情勢

  • 競合シナリオ
  • 市況/シェア分析
  • M&A分析

第14章 企業プロファイル

  • Illusive Networks Ltd.
    • 企業概要
    • 製品ポートフォリオと説明
    • 財務概要
    • 主な動向
  • Attivo Networks Inc.
  • Rapid7, Inc.
  • Ridgeback Network Defense Inc.
  • Acalvio Technologies Inc.
  • Akamai Technologies Inc.
  • CounterCraft SL
  • CyberTrap Software GmbH
  • NTT Security Limited
  • Broadcom Inc.

第15章 付録

目次
Product Code: ICT2236

Overview:

Global Deception Technology Market reached US$ 1.9 billion in 2022 and is expected to reach US$ 5.7 billion by 2030, growing with a CAGR of 12.1% during the forecast period 2023-2030.

Deception technology offers a proactive defense strategy that helps detect and respond to threats before they cause damage. Deception technology focuses on early threat detection and rapid response, which aligns with the evolving cybersecurity landscape. Traditional security measures often focus on prevention, but deception technology complements these measures by actively identifying threats already inside the network.

For instance, on 14 January 2022, Honeywell, in collaboration with Acalvio Technologies, introduced a new cybersecurity solution called the Honeywell Threat Defense Platform (HTDP) and this solution is designed to detect both known and unknown (zero-day) cyberattacks within operational technology (OT) environments in commercial buildings.

Asia-Pacific is expected to develop at the fastest rate during the forecast period, making up around 1/4th of the global deception technology market in 2022. Asia-Pacific has seen a rise in cybersecurity threats and attacks in recent years and this includes advanced persistent threats, ransomware attacks and data breaches. Governments and regulatory bodies in the region are implementing stricter data protection and cybersecurity rules and regulation, also organizations are compiling with these regulations or face severe penalties.

Dynamics:

Rising Government Initiatives

In order to protect sensitive data, key infrastructure and national security, governments all over the world are expanding their spending on cybersecurity. Government funding and support for cybersecurity initiatives encourage the adoption of deception technology by organizations. Governments often introduce cybersecurity regulations and standards that mandate organizations to implement advanced security measures.

For instance, on 31 August 2023, CERT-In is the national agency responsible for addressing cybersecurity threats. The number of cyberattacks on government networks has significantly decreased as a result of its improvements and this effort, which was started by the Ministry of Electronics and Information Technology (MeitY), intends to improve India's cybersecurity ecosystem in line with the concept of a "digital India." It is a partnership between MeitY and the National Electronic Governance Division (NeGD).

Growing Number of Zero-day and Targeted APT's

As the number day passes the zero-day vulnerabilities rises and organizations face a greater risk of cyberattacks. Deception technology helps by creating a deceptive layer within the network, making it harder for attackers to locate and exploit these vulnerabilities. APTs are highly sophisticated and often state-sponsored attacks that target specific organizations or industries. Deception technology is designed to detect and thwart such advanced threats by luring attackers into deceptive traps and isolating them from critical systems.

In April 2022, Mandiant Threat Intelligence reported a concerning increase in the exploitation of zero-day vulnerabilities, with the identification of 80 such exploits used in the wild and this marks more than double the previous record volume observed in 2019. State-sponsored groups, notably Chinese actors, remained the primary culprits behind zero-day exploits. Additionally, financially motivated threat actors, including ransomware groups, significantly increased their use of zero-day vulnerabilities.

Partnership for Establishing Cyber Threat Labs

Cyber threat labs foster research and innovation in the field of cybersecurity. By collaborating with academic institutions, technology companies can access the latest research findings and insights into emerging threats and these labs provide a controlled environment for testing deception technology and other cybersecurity solutions in real-world scenarios, this allows for the development and refinement of cutting-edge security measures.

For instance, on 13 February 2023, Rapid7, a leader in cloud risk and threat detection, is partnering with the University of South Florida (USF) to establish the Rapid7 Cyber Threat Intelligence Lab at USF and this initiative, funded by a US$ 1.5 Million investment from Rapid7's charitable arm, aims to support interdisciplinary research efforts in the field of cyber threat detection. The collaboration will foster research efforts related to cyber threat intelligence and detection. Faculty experts and students from multiple disciplines and colleges at USF will work together on innovative projects in the cybersecurity domain.

Network Management and Compatibility Issue

Deception technology can generate false alarms or false positives and deception technology primarily focuses on detecting attackers once they are inside the networks are alerts that indicate a threat when there is none, leading to wasted time and resources investigating non-existent issues. Managing a network of deceptive assets can be complex and resource-intensive. Organizations need to ensure that the deception environment remains realistic and up to date.

Deception solutions require additional IT resources, including hardware, software and personnel, to deploy and maintain effectively. Integrating deception technology with existing security systems and workflows can be challenging. Compatibility issues may arise and seamless coordination with other security tools is essential. Scaling deception solutions to cover larger networks can be difficult. Organizations with extensive infrastructure may find it challenging to maintain a consistent level of deception across all assets.

Segment Analysis:

The global deception technology market is segmented based on deployment organization size, service, deception stack, end-user and region.

Cloud Platform Enhance the Growth of the Market

In 2022, cloud deployment is expected to be the dominant segment in the global deception technology market covering around 1/3rd of the market. Organizations are rapidly migrating their workloads to cloud environments, making cloud platforms a lucrative target for cyberattacks. Deception technology provides an additional layer of security to detect and respond to threats within the cloud infrastructure. Deception technology can effectively detect these elusive threats by luring attackers into decoy environments and capturing their activities.

For instance, on 22 November 2022, Acalvio Technologies made its ShadowPlex platform available on AWS Marketplace and this platform offers autonomous deception technology for advanced cybersecurity and is designed to be easily deployed across on-premises, cloud and remote user environments. It provides comprehensive deception capabilities for both IT and operational technology (OT) environments, helping reduce the dwell time of attackers by swiftly and accurately detecting malicious activities.

Geographical Penetration:

Growing Regulatory Frameworks in North America

North America is the dominant region in the global deception technology market covering more than 1/3rd of the market. The region faces a significant and ever-evolving cybersecurity threat landscape. Technology that uses deception provides a powerful method for proactively identifying and countering these threats. At the federal, state and industry levels organizations are subject to a variety of data protection and cybersecurity requirements. Implementing deception technology can assist in achieving compliance with these regulatory requirements, as it enhances overall security.

For instance, on 18 May 2023, The Federal Trade Commission issued a Policy Statement on Biometric Information and Section 5 of the Federal Trade Commission Act and this statement reflects the FTC's intention to hold companies accountable for their collection and utilization of consumers' biometric information. One notable aspect of the Policy Statement is its broad definition of biometric information, which goes beyond definitions found in existing U.S. laws and regulations, including the California Consumer Privacy Act (CCPA) and the Washington State My Data Act.

Competitive Landscape

The major global players in the market include Illusive Networks Ltd., Attivo Networks Inc., Rapid7, Inc., Ridgeback Network Defense Inc., Acalvio Technologies Inc., Akamai Technologies Inc., CounterCraft SL, CyberTrap Software GmbH, NTT Security Limited and Broadcom Inc. .

COVID-19 Impact Analysis

The pandemic led to a surge in cyberattacks and threats. Threat actors took advantage of the chaos and transition to remote work to launch various cyberattacks, including phishing, ransomware and supply chain attacks and this increased threat landscape highlighted the need for advanced cybersecurity solutions, including deception technology. Organizations became more aware of the importance of robust cybersecurity measures as they faced an influx of cyber threats during the pandemic.

Remote work becoming the norm and organizations are focused on securing remote access and endpoints. Deception technology plays a crucial role in protecting remote workers and endpoints by detecting unauthorized access and lateral movement within networks. Insider threats became a significant concern during the pandemic, as remote employees had access to sensitive data and systems. Deception technology can help identify insider threats by monitoring user behavior and detecting unusual or unauthorized activities.

The shift to cloud-based services and infrastructure accelerated during the pandemic. Deception technology extended its capabilities to protect cloud environments, detecting and responding to threats within cloud-based applications and resources. The Zero Trust security model gained traction as organizations sought to verify every user and device accessing their networks, especially in remote work scenarios. Deception technology aligns with the principles of Zero Trust by continuously monitoring and verifying user and device behavior.

AI Impact

AI-powered deception technology can analyze vast amounts of data and network traffic to identify anomalies and potential threats more effectively than traditional methods. Machine learning models can continuously learn and adapt to new attack patterns, making them more adept at detecting sophisticated threats.AI enables deception technology to perform behavioral analysis on network traffic and user activity.

AI-driven deception systems can respond to threats in real-time by autonomously taking actions to isolate, contain or divert attackers and this reduces response time and minimizes the impact of cyberattacks. AI can create highly customized deception scenarios that mimic an organization's specific network environment and assets, this level of customization makes it more challenging for attackers to distinguish between real and deceptive assets.

For instance, on 11 September 2023, Lockheed Martin and the University of Iowa's Operator Performance Laboratory (OPL) successfully demonstrated the use of artificial intelligence (AI) in coordinating manned and unmanned aircraft during an electronic attack mission. The project, known as Enhanced Collaborative High-Frequency Orientation System (ECOS), utilized two pilot-flown L-29 aircraft acting as surrogates for unmanned systems.

Russia- Ukraine War Impact

Geopolitical conflicts often lead to an uptick in cyberattacks and cyber espionage activities. State-sponsored threat actors may exploit the situation to target organizations, critical infrastructure and government entities. Deception technology could play a critical role in detecting and mitigating these threats by luring attackers into deceptive environments and providing early warning. The conflict may result in more targeted attacks on organizations and industries related to defense, energy, finance and critical infrastructure.

The disruption of supply chains due to the conflict can introduce cybersecurity risks. Organizations may need to assess and secure their supply chain partners. Deception technology can assist in identifying and isolating potential threats originating from the supply chain. As geopolitical tensions rise organizations may increase remote work arrangements to protect their employees and operations. Ensuring the security of remote work environments becomes paramount. Deception technology can help monitor remote access points and detect any unauthorized activities.

By Deployment

  • Cloud
  • On-Premise

By Organization Size

  • Small and Medium Enterprises
  • Large Enterprises

By Service

  • Managed Services
  • Professional Services

By Deception Stack

  • Data Security
  • Application Security
  • Endpoint Security
  • Network Security

By End-User

  • Government
  • Medical
  • BFSI
  • Defense
  • IT
  • Others

By Region

  • North America
    • U.S.
    • Canada
    • Mexico
  • Europe
    • Germany
    • UK
    • France
    • Italy
    • Russia
    • Rest of Europe
  • South America
    • Brazil
    • Argentina
    • Rest of South America
  • Asia-Pacific
    • China
    • India
    • Japan
    • Australia
    • Rest of Asia-Pacific
  • Middle East and Africa

Key Developments

  • In July 2022, Booz Allen Hamilton and Acalvio Technologies are collaborating to offer cyber deception technologies to both commercial and government organizations. Acalvio's ShadowPlex cyber deception product will complement Booz Allen's existing cybersecurity services, allowing organizations to detect, investigate and respond to cyber threats in IT and OT environments across on-premises and cloud deployments..
  • In September 2022, Commvault announced the general availability of Metallic ThreatWise, an early warning system designed to proactively identify unknown and zero-day threats, thereby reducing the risk of compromised data and minimizing business impact and this offering enhances Commvault's data management capabilities across on-premises, cloud and SaaS environments.
  • In March 2023, Akamai Technologies announced its acquisition of Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running stateful applications across various cloud environments. Ondat's technology offers persistent storage directly onto Kubernetes clusters, facilitating the secure operation of critical stateful applications across public, private and hybrid clouds.

Why Purchase the Report?

  • To visualize the global deception technology market segmentation based on deployment organization size, service, deception stack, end-user and region, as well as understand key commercial assets and players.
  • Identify commercial opportunities by analyzing trends and co-development.
  • Excel data sheet with numerous data points of deception technology market-level with all segments.
  • PDF report consists of a comprehensive analysis after exhaustive qualitative interviews and an in-depth study.
  • Product mapping available as excel consisting of key products of all the major players.

The global deception technology market report would provide approximately 77 tables, 78 figures and 201 pages.

Target Audience 2023

  • Manufacturers/ Buyers
  • Industry Investors/Investment Bankers
  • Research Professionals
  • Emerging Companies

Table of Contents

1. Methodology and Scope

  • 1.1. Research Methodology
  • 1.2. Research Objective and Scope of the Report

2. Definition and Overview

3. Executive Summary

  • 3.1. Snippet by Deployment
  • 3.2. Snippet by Organization Size
  • 3.3. Snippet by Service
  • 3.4. Snippet by Deception Stack
  • 3.5. Snippet by End-User
  • 3.6. Snippet by Region

4. Dynamics

  • 4.1. Impacting Factors
    • 4.1.1. Drivers
      • 4.1.1.1. Rising Government Initiatives
      • 4.1.1.2. Growing Number of Zero-day and Targeted APT's
      • 4.1.1.3. Partnership for Establishing Cyber Threat Labs
    • 4.1.2. Restraints
      • 4.1.2.1. Network Management and Compatibility Issue
    • 4.1.3. Impact Analysis

5. Industry Analysis

  • 5.1. Porter's Five Force Analysis
  • 5.2. Supply Chain Analysis
  • 5.3. Pricing Analysis
  • 5.4. Regulatory Analysis
  • 5.5. Russia-Ukraine War Impact Analysis
  • 5.6. DMI Opinion

6. COVID-19 Analysis

  • 6.1. Analysis of COVID-19
    • 6.1.1. Scenario Before COVID
    • 6.1.2. Scenario During COVID
    • 6.1.3. Scenario Post COVID
  • 6.2. Pricing Dynamics Amid COVID-19
  • 6.3. Demand-Supply Spectrum
  • 6.4. Government Initiatives Related to the Market During Pandemic
  • 6.5. Manufacturers Strategic Initiatives
  • 6.6. Conclusion

7. By Deployment

  • 7.1. Introduction
    • 7.1.1. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deployment
    • 7.1.2. Market Attractiveness Index, By Deployment
  • 7.2. Cloud*
    • 7.2.1. Introduction
    • 7.2.2. Market Size Analysis and Y-o-Y Growth Analysis (%)
  • 7.3. On-Premise

8. By Organization Size

  • 8.1. Introduction
    • 8.1.1. Market Size Analysis and Y-o-Y Growth Analysis (%), By Organization Size
    • 8.1.2. Market Attractiveness Index, By Organization Size
  • 8.2. Small and Medium Enterprises*
    • 8.2.1. Introduction
    • 8.2.2. Market Size Analysis and Y-o-Y Growth Analysis (%)
  • 8.3. Large Enterprises

9. By Service

  • 9.1. Introduction
    • 9.1.1. Market Size Analysis and Y-o-Y Growth Analysis (%), By Service
    • 9.1.2. Market Attractiveness Index, By Service
  • 9.2. Managed Services*
    • 9.2.1. Introduction
    • 9.2.2. Market Size Analysis and Y-o-Y Growth Analysis (%)
  • 9.3. Professional Services

10. By Deception Stack

  • 10.1. Introduction
    • 10.1.1. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deception Stack
    • 10.1.2. Market Attractiveness Index, By Deception Stack
  • 10.2. Data Security*
    • 10.2.1. Introduction
    • 10.2.2. Market Size Analysis and Y-o-Y Growth Analysis (%)
  • 10.3. Application Security
  • 10.4. Endpoint Security
  • 10.5. Network Security

11. By End-User

  • 11.1. Introduction
    • 11.1.1. Market Size Analysis and Y-o-Y Growth Analysis (%), By End-User
    • 11.1.2. Market Attractiveness Index, By End-User
  • 11.2. Government*
    • 11.2.1. Introduction
    • 11.2.2. Market Size Analysis and Y-o-Y Growth Analysis (%)
  • 11.3. Medical
  • 11.4. BFSI
  • 11.5. Defense
  • 11.6. IT
  • 11.7. Others

12. By Region

  • 12.1. Introduction
    • 12.1.1. Market Size Analysis and Y-o-Y Growth Analysis (%), By Region
    • 12.1.2. Market Attractiveness Index, By Region
  • 12.2. North America
    • 12.2.1. Introduction
    • 12.2.2. Key Region-Specific Dynamics
    • 12.2.3. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deployment
    • 12.2.4. Market Size Analysis and Y-o-Y Growth Analysis (%), By Organization Size
    • 12.2.5. Market Size Analysis and Y-o-Y Growth Analysis (%), By Service
    • 12.2.6. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deception Stack
    • 12.2.7. Market Size Analysis and Y-o-Y Growth Analysis (%), By End-User
    • 12.2.8. Market Size Analysis and Y-o-Y Growth Analysis (%), By Country
      • 12.2.8.1. U.S.
      • 12.2.8.2. Canada
      • 12.2.8.3. Mexico
  • 12.3. Europe
    • 12.3.1. Introduction
    • 12.3.2. Key Region-Specific Dynamics
    • 12.3.3. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deployment
    • 12.3.4. Market Size Analysis and Y-o-Y Growth Analysis (%), By Organization Size
    • 12.3.5. Market Size Analysis and Y-o-Y Growth Analysis (%), By Service
    • 12.3.6. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deception Stack
    • 12.3.7. Market Size Analysis and Y-o-Y Growth Analysis (%), By End-User
    • 12.3.8. Market Size Analysis and Y-o-Y Growth Analysis (%), By Country
      • 12.3.8.1. Germany
      • 12.3.8.2. UK
      • 12.3.8.3. France
      • 12.3.8.4. Italy
      • 12.3.8.5. Russia
      • 12.3.8.6. Rest of Europe
  • 12.4. South America
    • 12.4.1. Introduction
    • 12.4.2. Key Region-Specific Dynamics
    • 12.4.3. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deployment
    • 12.4.4. Market Size Analysis and Y-o-Y Growth Analysis (%), By Organization Size
    • 12.4.5. Market Size Analysis and Y-o-Y Growth Analysis (%), By Service
    • 12.4.6. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deception Stack
    • 12.4.7. Market Size Analysis and Y-o-Y Growth Analysis (%), By End-User
    • 12.4.8. Market Size Analysis and Y-o-Y Growth Analysis (%), By Country
      • 12.4.8.1. Brazil
      • 12.4.8.2. Argentina
      • 12.4.8.3. Rest of South America
  • 12.5. Asia-Pacific
    • 12.5.1. Introduction
    • 12.5.2. Key Region-Specific Dynamics
    • 12.5.3. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deployment
    • 12.5.4. Market Size Analysis and Y-o-Y Growth Analysis (%), By Organization Size
    • 12.5.5. Market Size Analysis and Y-o-Y Growth Analysis (%), By Service
    • 12.5.6. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deception Stack
    • 12.5.7. Market Size Analysis and Y-o-Y Growth Analysis (%), By End-User
    • 12.5.8. Market Size Analysis and Y-o-Y Growth Analysis (%), By Country
      • 12.5.8.1. China
      • 12.5.8.2. India
      • 12.5.8.3. Japan
      • 12.5.8.4. Australia
      • 12.5.8.5. Rest of Asia-Pacific
  • 12.6. Middle East and Africa
    • 12.6.1. Introduction
    • 12.6.2. Key Region-Specific Dynamics
    • 12.6.3. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deployment
    • 12.6.4. Market Size Analysis and Y-o-Y Growth Analysis (%), By Organization Size
    • 12.6.5. Market Size Analysis and Y-o-Y Growth Analysis (%), By Service
    • 12.6.6. Market Size Analysis and Y-o-Y Growth Analysis (%), By Deception Stack
    • 12.6.7. Market Size Analysis and Y-o-Y Growth Analysis (%), By End-User

13. Competitive Landscape

  • 13.1. Competitive Scenario
  • 13.2. Market Positioning/Share Analysis
  • 13.3. Mergers and Acquisitions Analysis

14. Company Profiles

  • 14.1. Illusive Networks Ltd.*
    • 14.1.1. Company Overview
    • 14.1.2. Product Portfolio and Description
    • 14.1.3. Financial Overview
    • 14.1.4. Key Developments
  • 14.2. Attivo Networks Inc.
  • 14.3. Rapid7, Inc.
  • 14.4. Ridgeback Network Defense Inc.
  • 14.5. Acalvio Technologies Inc.
  • 14.6. Akamai Technologies Inc.
  • 14.7. CounterCraft SL
  • 14.8. CyberTrap Software GmbH
  • 14.9. NTT Security Limited
  • 14.10. Broadcom Inc.

LIST NOT EXHAUSTIVE

15. Appendix

  • 15.1. About Us and Services
  • 15.2. Contact Us