表紙
市場調査レポート

ネットワークセキュリティサンドボックス市場の分析

Network Security Sandbox Market Analysis

発行 Frost & Sullivan 商品コード 332896
出版日 ページ情報 英文 96 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=101.50円で換算しております。
Back to Top
ネットワークセキュリティサンドボックス市場の分析 Network Security Sandbox Market Analysis
出版日: 2015年06月15日 ページ情報: 英文 96 Pages
概要

当レポートでは、世界のネットワークセキュリティサンドボックス市場について調査分析し、市場規模 (実績・予測) 、主要企業の市場シェア、市場概要と市場動向、促進要因と抑制要因、主要サンドボックスソリューションの競合分析、サンドボックス市場の競合情勢などについて、体系的な情報を提供しています。

第1章 エグゼクティブサマリー

第2章 市場概要

  • 市場定義
  • APT市場の環境と実績
  • APT防御
  • ネットワークセキュリティサンドボックス
  • 追加の懸念事項
  • 価格設定
  • 流通経路
  • 市場流通経路の考察

第3章 促進要因と抑制要因:総合市場

  • 促進要因
  • 抑制要因

第4章 予測と動向:総合市場

  • 予測の前提条件
  • 収益予測
  • 収益予測の考察
  • 収益シェア予測:地域別
  • 収益シェア予測:事業規模別
  • 収益シェア予測:流通経路別
  • 収益シェア予測:産業別市場
  • 産業別市場の収益予測の考察

第5章 市場シェアと競合分析:総合市場

  • 競合分析:市場シェア
  • 競合環境
  • 競合分析
  • 競合情勢
  • 競合分析の考察

第6章 まとめ

  • 予測
  • 提言
  • 免責事項

第7章 ベンダープロファイル

  • ベンダープロファイル
    • Blue Coat
    • Check Point
    • Cisco
    • FireEye
    • Fortinet
    • Intel Security (McAfee)
    • Lastline
    • Palo Alto Networks
    • Trend Micro
    • Websense

第8章 付録

目次
Product Code: NF0F-74

APTs Create a "Must Have" Security Technology

A network security sandbox is a dedicated analysis environment in which a suspicious program is executed and the behavior of the program is observed, noted, and then analyzed in an automated manner. This report provides an analysis of the market for sandboxes including four years of historical market sizing including base year 2014 and five years of market forecast; market shares for the market participants; market description and market trends; drivers and restraints; competitive analysis of the leading sandbox solutions; competitive landscape of the sandbox market; and individual company profiles of the market participants. Segments of the market analyzed include geography, size of business, distribution channel and vertical market.

Table of Contents

1. EXECUTIVE SUMMARY

  • 1. Key Findings
  • 2. Measurements
  • 3. CEO's Perspective
  • 4. Introduction to the Research
  • 5. Key Questions This Study Will Answer

2. MARKET OVERVIEW

  • 1. Market Definitions
  • 2. APT Market Environment and Historical Perspective
  • 3. APT Market Environment and Historical Perspective (continued)
  • 4. APT Market Environment and Historical Perspective (continued)
  • 5. APT Market Environment and Historical PerspectiveTargeted Attribute
  • 6. APT Market Environment and Historical PerspectivePersistent Attribute
  • 7. APT Market Environment and Historical PerspectiveAdvanced Attribute
  • 8. APT Market Environment and Historical Perspective Advanced Attribute (continued)
  • 9. APT Market Environment and Historical Perspective (continued)
  • 10. APT Defense
  • 11. Network Security Sandboxes
  • 12. Network Security Sandboxes (continued)
  • 13. Network Security Sandboxes (continued)
  • 14. Network Security Sandboxes (continued)
  • 15. Network Security Sandboxes Additional Considerations
  • 16. Pricing
  • 17. Distribution Channels
  • 18. Market Distribution Channels Discussion

3. DRIVERS AND RESTRAINTS-TOTAL MARKET

  • 1. Drivers and Restraints
  • 2. Drivers Explained
  • 3. Drivers Explained (continued)
  • 4. Drivers Explained (continued)
  • 5. Drivers Explained (continued)
  • 6. Drivers Explained (continued)
  • 7. Restraints Explained
  • 8. Restraints Explained (continued)
  • 9. Restraints Explained (continued)
  • 10. Restraints Explained (continued)
  • 11. Restraints Explained (continued)

4. FORECASTS AND TRENDS-TOTAL MARKET

  • 1. Forecast Assumptions
  • 2. Revenue Forecast
  • 3. Revenue Forecast Discussion
  • 4. Percent Revenue Forecast by Geography
  • 5. Percent Revenue Forecast by Geography
  • 6. Percent Revenue Forecast by Size of Business
  • 7. Percent Revenue Forecast by Size of Business Discussion
  • 8. Percent Revenue Forecast by Distribution Channel
  • 9. Percent Revenue Forecast by Distribution Channel Discussion
  • 10. Percent Revenue Forecast by Vertical Market
  • 11. Vertical Market Revenue Forecast Discussion

5. MARKET SHARE AND COMPETITIVE ANALYSIS- TOTAL MARKET

  • 1. Competitive Analysis-Market Share
  • 2. Competitive Environment
  • 3. Competitive Analysis
  • 4. Competitive Landscape
  • 5. Competitive Analysis Discussion
  • 6. Competitive Analysis Discussion (continued)
  • 7. Competitive Analysis Discussion (continued)

6. THE LAST WORD

  • 1. Predictions
  • 2. Recommendations
  • 3. Legal Disclaimer

7. VENDOR PROFILES

  • 1. Vendor Profile: Blue Coat
  • 2. Vendor Profile: Blue Coat (continued)
  • 3. Vendor Profile: Check Point
  • 4. Vendor Profile: Check Point (continued)
  • 5. Vendor Profile: Cisco
  • 6. Vendor Profile: Cisco (continued)
  • 7. Vendor Profile: Cisco (continued)
  • 8. Vendor Profile: FireEye
  • 9. Vendor Profile: FireEye (continued)
  • 10. Vendor Profile: FireEye (continued)
  • 11. Vendor Profile: FireEye (continued)
  • 12. Vendor Profile: Fortinet
  • 13. Vendor Profile: Fortinet (continued)
  • 14. Vendor Profile: Intel Security (McAfee)
  • 15. Vendor Profile: Intel Security (McAfee) (continued)
  • 16. Vendor Profile: Lastline
  • 17. Vendor Profile: Lastline (continued)
  • 18. Vendor Profile: Palo Alto Networks
  • 19. Vendor Profile: Palo Alto Networks (continued)
  • 20. Vendor Profile: Trend Micro
  • 21. Vendor Profile: Trend Micro (continued)
  • 22. Vendor Profile: Websense
  • 23. Vendor Profile: Websense (continued)

8. APPENDIX

  • 1. Methodology
  • 2. Measurements
  • 3. Additional Sources of Information on Study Topic Area
  • 4. List of Companies Included in "Others"
  • 5. Partial List of Companies Interviewed
  • 6. Learn More-Next Steps
  • 7. List of Exhibits
Back to Top