表紙
市場調査レポート

ネットワークセキュリティフォレンジックの世界市場

Network Security Forensics Global Market

発行 Frost & Sullivan 商品コード 345532
出版日 ページ情報 英文 195 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=102.06円で換算しております。
Back to Top
ネットワークセキュリティフォレンジックの世界市場 Network Security Forensics Global Market
出版日: 2015年09月16日 ページ情報: 英文 195 Pages
概要

当レポートでは、世界および地域ごとのネットワークセキュリティフォレンジック市場について包括的に調査し、技術・料金の動向、主な市場成長促進因子・阻害因子の分析、主要ベンダーのプロファイル、および流通チャネル・垂直市場の予測などについて、まとめています。

第1章 エグゼクティブサマリー

第2章 市場概要

  • 市場概要
  • APT防衛におけるネットワークセキュリティフォレンジックの役割
  • ネットワークセキュリティフォレンジックのポストブリーチ
  • セキュリティインシデント vs. ブリーチ
  • 定義
  • 本調査で対象としないフォレンジックのトピック
  • フルパケットキャプチャーの限界
  • ネットワークセキュリティフォレンジック市場全体:流通チャネルごとの収益比
  • 流通チャネルの議論

第3章 外部課題:促進因子・阻害因子 - 市場全体

  • 促進因子・阻害因子
  • 促進因子の説明
  • 阻害因子
  • 阻害因子の説明

第4章 ネットワークセキュリティフォレンジックの起源:技術タイプ別

  • ネットワークセキュリティフォレンジックの起源:技術タイプ別

第5章 予測・動向 - 市場全体

  • 予測の前提条件
  • ネットワークセキュリティフォレンジック市場全体:出荷高・収益予測
  • 出荷高・収益予測の議論
  • ネットワークセキュリティフォレンジック市場全体:料金動向・予測
  • 料金動向・予測の議論
  • ネットワークセキュリティフォレンジック市場全体:出荷高予測、地域別
  • ネットワークセキュリティフォレンジック市場全体:収益予測、地域別
  • 地域別の出荷高・収益予測の議論
  • ネットワークセキュリティフォレンジック市場全体:出荷高予測、製品タイプ別
  • ネットワークセキュリティフォレンジック市場全体:収益予測、製品タイプ別
  • 製品タイプ別の出荷高・収益予測の議論
  • ネットワークセキュリティフォレンジック市場全体:出荷高予測、垂直市場別
  • ネットワークセキュリティフォレンジック市場全体:収益予測、垂直市場別
  • 垂直市場の出荷高・収益予測の議論

第6章 市場シェア・競合分析 - 市場全体

  • 競合分析 - 市場シェア
  • 競合要素・評価
  • M&A
  • 競合環境
  • 主な競合企業
  • 競合差別化のポイント

第7章 大企業セグメントの分析

  • 大企業ネットワークセキュリティフォレンジックセグメント:市場エンジニアリング測定
  • 出荷高・収益予測
  • 料金動向・予測
  • 料金動向・予測の議論
  • 競合分析:市場シェア
  • 競合環境

第8章 SMB (中小企業) 〜企業セグメントの分析

第9章 総論

第10章 ベンダーのプロファイル

  • Blue Coat Systems, Inc.
  • FireEye
  • IBM
  • Lancope
  • LogRhythm
  • NetFort
  • NIKSUN
  • Novetta
  • PacketSled
  • RSA Security Analytics
  • Savvius
  • Viavi Solutions

第11章 付録

目次
Product Code: NF8B-01-00-00-00

How Much Forensics Do You Need?

When a security breach occurs, an investigation needs to be initiated. Network security forensics is the technology used not only to understand the nature of the breach, but also to trigger the beginning of remediation. Traditional network security platforms include event correlation and full packet capture. However, different security approaches include the collection of flow data and the use of packet headers to reduce storage requirements. This comprehensive report about network security forensics includes global & regional market analysis and forecasts for 2015-2019. Technology and pricing trends are detailed and key drivers and restraints identified. The key vendors are profiled and distribution channels and market verticals have been forecasted.

Table of Contents

1. EXECUTIVE SUMMARY

Executive Summary

  • 1. Key Findings
  • 2. Key Findings (continued)
  • 3. Executive Summary-Market Engineering Measurements
  • 4. Executive Summary-Market Engineering Measurements (continued)
  • 5. Executive Summary-CEO's Perspective
  • 6. Executive Summary-Introduction to the Research
  • 7. Executive Summary-Key Questions This Study Will Answer

2. MARKET OVERVIEW

Market Overview

  • 1. Market Overview
  • 2. Market Overview (continued)
  • 3. Network Security Forensics Role in APT Defense
  • 4. Market Overview-Network Security Forensics Post-Breach
  • 5. Market Overview-Security Incidents versus Breaches
  • 6. Market Overview-Security Incidents versus Breaches (continued)
  • 7. Market Overview-Definitions
  • 8. Market Overview-Forensics Topics not Covered in this Report
  • 9. Market Overview-Full Packet Capture Limitations
  • 10. Market Overview-Full Packet Capture Limitations (continued)
  • 11. Total Network Security Forensics Market-Percent Revenue by Distribution Channels
  • 12. Market Overview-Distribution Channels Discussion

3. EXTERNAL CHALLENGES: DRIVERS AND RESTRAINTS-TOTAL MARKET

External Challenges: Drivers and Restraints-Total Market

  • 1. Drivers and Restraints
  • 2. Drivers Explained
  • 3. Drivers Explained (continued)
  • 4. Drivers Explained (continued)
  • 5. Drivers Explained (continued)
  • 6. Drivers Explained (continued)
  • 7. Drivers Explained (continued)
  • 8. Drivers Explained (continued)
  • 9. Restraints Explained
  • 10. Restraints Explained (continued)
  • 11. Restraints Explained (continued)
  • 12. Restraints Explained (continued)

4. NETWORK SECURITY FORENSICS ORIGINS BY TECHNOLOGY TYPES

Network Security Forensics Origins by Technology Types

  • 1. Network Security Forensics Origins by Technology Types
  • 2. Network Security Forensics Origins by Technology Types (continued)
  • 3. Network Security Forensics Origins by Technology Types (continued)
  • 4. Network Security Forensics Origins by Technology Types (continued)
  • 5. Network Security Forensics Origins by Technology Types (continued)
  • 6. Network Security Forensics Origins by Technology Types (continued)
  • 7. Network Security Forensics Origins by Type of Technology (continued)
  • 8. Network Security Forensics Origins by Type of Technology (continued)

5. FORECASTS AND TRENDS-TOTAL MARKET

Forecasts and Trends-Total Market

  • 1. Forecast Assumptions
  • 2. Total Network Security Forensics Market-Unit and Revenue Forecast
  • 3. Unit Shipment and Revenue Forecast Discussion
  • 4. Total Network Security Forensics Market-Pricing Trends and Forecast
  • 5. Pricing Trends and Forecast Discussion
  • 6. Total Network Security Forensics Market-Unit Shipment Forecast by Region
  • 7. Total Network Security Forensics Market-Revenue Forecast by Region
  • 8. Regional Unit Shipment and Revenue Forecast Discussion
  • 9. Total Network Security Forensics Market-Unit Shipments Forecast by Product Type
  • 10. Total Network Security Forensics Market-Revenue Forecast by Product Type
  • 11. Product Type Unit Shipment and Revenue Forecast Discussion
  • 12. Product Type Unit Shipment and Revenue Forecast Discussion
  • 13. Product Type Unit Shipment and Revenue Forecast Discussion (continued)
  • 14. Product Type Unit Shipment and Revenue Forecast Discussion (continued)
  • 15. Total Network Security Forensics Market-Unit Shipments Forecast by Vertical Market
  • 16. Total Network Security Forensics Market-Revenue Forecast by Vertical Market
  • 17. Vertical Market Unit Shipment and Revenue Forecast Discussion

6. MARKET SHARE AND COMPETITIVE ANALYSIS- TOTAL MARKET

Market Share and Competitive Analysis- Total Market

  • 1. Competitive Analysis-Market Share
  • 2. Competitive Factors and Assessment
  • 3. Competitive Factors and Assessment
  • 4. Mergers and Acquisitions
  • 5. Competitive Environment
  • 6. Competitive Environment
  • 7. Top Competitors
  • 8. Points of Competitive Differentiation
  • 9. Points of Competitive Differentiation (continued)
  • 10. Points of Competitive Differentiation (continued)
  • 11. Points of Competitive Differentiation (continued)
  • 12. Points of Competitive Differentiation (continued)
  • 13. Points of Competitive Differentiation (continued)
  • 14. Points of Competitive Differentiation (continued)
  • 15. Points of Competitive Differentiation (continued)
  • 16. Points of Competitive Differentiation (continued)
  • 17. Points of Competitive Differentiation (continued)
  • 18. Points of Competitive Differentiation (continued)
  • 19. Points of Competitive Differentiation (continued)
  • 20. Points of Competitive Differentiation (continued)
  • 21. Points of Competitive Differentiation (continued)
  • 22. Points of Competitive Differentiation (continued)
  • 23. Points of Competitive Differentiation (continued)
  • 24. Points of Competitive Differentiation (continued)
  • 25. Points of Competitive Differentiation (continued)
  • 26. Points of Competitive Differentiation (continued)

7. LARGE ENTERPRISE SEGMENT BREAKDOWN

Large Enterprise Segment Breakdown

  • 1. Large Enterprise Network Security Forensics Segment-Market Engineering Measurements
  • 2. Large Enterprise Marketing Engineering Measurements (continued)
  • 3. Large Enterprise Network Security Forensics Unit Shipment and Revenue Forecast
  • 4. Large Enterprise Network Security Forensics Market-Pricing Trends and Forecast
  • 5. Large Enterprise Network Security Forensics Pricing Trends and Forecast Discussion
  • 6. Large Enterprise Network Security Forensics Competitive Analysis-Market Share
  • 7. Large Enterprise Network Security Forensics Segment-Competitive Environment
  • 8. Competitive Environment

8. SMB THRU ENTERPRISE SEGMENT BREAKDOWN

SMB thru Enterprise Segment Breakdown

  • 1. SMB thru Enterprise Network Security Forensics Segment-Market Engineering Measurements
  • 2. SMB thru Enterprise Marketing Engineering Measurements (continued)
  • 3. SMB thru Enterprise Network Security Forensics Unit Shipment and Revenue Forecast
  • 4. SMB thru Enterprise Network Security Forensics Market-Pricing Trends and Forecast
  • 5. SMB thru Enterprise Network Security Forensics Pricing Trends and Forecast Discussion
  • 6. SMB thru Enterprise Network Security Forensics Competitive Analysis-Market Share
  • 7. SMB Network Security Forensics Segment-Competitive Environment
  • 8. Competitive Environment

9. THE LAST WORD

The Last Word

  • 1. The Last Word-Predictions
  • 2. The Last Word-Recommendations
  • 3. Legal Disclaimer

10. VENDOR PROFILES

Vendor Profiles

  • 1. Vendor Profile: Blue Coat Systems, Inc.
  • 2. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 3. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 4. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 5. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 6. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 7. Vendor Profile: Blue Coat Systems, Inc. (continued)
  • 8. Vendor Profile: FireEye
  • 9. Vendor Profile: FireEye (continued)
  • 10. Vendor Profile: FireEye (continued)
  • 11. Vendor Profile: FireEye (continued)
  • 12. Vendor Profile: FireEye (continued)
  • 13. Vendor Profile: IBM
  • 14. Vendor Profile: IBM (continued)
  • 15. Vendor Profile: IBM (continued)
  • 16. Vendor Profile: IBM (continued)
  • 17. Vendor Profile: IBM (continued)
  • 18. Vendor Profile: Lancope
  • 19. Vendor Profile: Lancope (continued)
  • 20. Vendor Profile: Lancope (continued)
  • 21. Vendor Profile: Lancope (continued)
  • 22. Vendor Profile: Lancope (continued)
  • 23. Vendor Profile: LogRhythm
  • 24. Vendor Profile: LogRhythm (continued)
  • 25. Vendor Profile: LogRhythm (continued)
  • 26. Vendor Profile: LogRhythm (continued)
  • 27. Vendor Profile: NetFort
  • 28. Vendor Profile: NetFort (continued)
  • 29. Vendor Profile: NetFort (continued)
  • 30. Vendor Profile: NetFort (continued)
  • 31. Vendor Profile: NetFort (continued)
  • 32. Vendor Profile: NetFort (continued)
  • 33. Vendor Profile: NIKSUN
  • 34. Vendor Profile: NIKSUN (continued)
  • 35. Vendor Profile: NIKSUN (continued)
  • 36. Vendor Profile: NIKSUN (continued)
  • 37. Vendor Profile: NIKSUN (continued)
  • 38. Vendor Profile: NIKSUN (continued)
  • 39. Vendor Profile: Novetta
  • 40. Vendor Profile: Novetta (continued)
  • 41. Vendor Profile: Novetta (continued)
  • 42. Vendor Profile: Novetta (continued)
  • 43. Vendor Profile: Novetta (continued)
  • 44. Vendor Profile: Novetta (continued)
  • 45. Vendor Profile: Novetta (continued)
  • 46. Vendor Profile: PacketSled
  • 47. Vendor Profile: PacketSled (continued)
  • 48. Vendor Profile: PacketSled
  • 49. Vendor Profile: PacketSled - Screenshot (Interactive Dashboard)
  • 50. Vendor Profile: PacketSled - Screenshot (Investigator)
  • 51. Vendor Profile: PacketSled (continued)
  • 52. Vendor Profile: PacketSled (continued)
  • 53. Vendor Profile: PacketSled (continued)
  • 54. Vendor Profile: RSA Security Analytics
  • 55. Vendor Profile: RSA Security Analytics (continued)
  • 56. Vendor Profile: RSA Security Analytics (continued)
  • 57. Vendor Profile: RSA Security Analytics (continued)
  • 58. Vendor Profile: RSA Security Analytics (continued)
  • 59. Vendor Profile: Savvius
  • 60. Vendor Profile: Savvius (continued)
  • 61. Vendor Profile: Savvius (continued)
  • 62. Vendor Profile: Savvius (continued)
  • 63. Vendor Profile: Viavi Solutions
  • 64. Vendor Profile: Viavi Solutions (continued)
  • 65. Vendor Profile: Viavi Solutions (continued)
  • 66. Vendor Profile: Viavi Solutions (continued)
  • 67. Vendor Profile: Viavi Solutions (continued)
  • 68. Vendor Profile: Viavi Solutions (continued)

11. APPENDIX

Appendix

  • 1. Methodology
  • 2. Measurements
  • 3. Measurements (continued)
  • 4. Measurements (continued)
  • 5. Additional Sources of Information on Study Topic Area
  • 6. Partial List of Companies Interviewed
  • 7. List of Companies Included in “Others”
  • 8. Learn More-Next Steps
Back to Top