株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

脆弱性管理(VM)の世界市場分析

Vulnerability Management (VM) - Global Market Analysis

発行 Frost & Sullivan 商品コード 422300
出版日 ページ情報 英文 236 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=114.37円で換算しております。
Back to Top
脆弱性管理(VM)の世界市場分析 Vulnerability Management (VM) - Global Market Analysis
出版日: 2017年01月11日 ページ情報: 英文 236 Pages
概要

脆弱性評価(VA)はエンドポイントに対する既知の脆弱性のスクリプトを実行し、脆弱性管理(VM)はスキャン後に見つかった事項の正式な報告と優先付けをするものです。2016年、VMベンダーはライセンス、機器、その他のサービスで7683億米ドルの収益をあげ、対前年比13.4%の成長となっています。

当レポートは、VM市場の概要や課題、収益予測、出荷数、価格動向などび市場全体および企業規模別分析について取り上げています。

第1章 エグゼクティブサマリー

  • 主な調査結果
  • エグゼクティブサマリー - 指標分析
  • 指標分析
  • エグゼクティブサマリー - イントロダクション
  • エグゼクティブサマリーCEOの視点
  • エグゼクティブサマリー - 当レポートでわかること

第2章 市場の概要

  • 市場概要
  • 販路
  • 販路に関する議論

第3章 市場の概要 - 脆弱性管理の進化

  • VMの進化について
  • VMの4x4マトリクス
  • VMの展望の歴史的視点(2010年)
  • VMの展望の歴史的視点(2013年)
  • VMの展望の現在の視点(2016年)
  • VMの展望の将来的視点(2019年)

第4章 市場の概要 - 脆弱性管理の進化のロールアップ

  • ネットワーク環境の4x4マトリクス
  • VAスキャンの4x4マトリクス的視点におけるエンドポイント/端末
  • 製品導入におけるVMの4x4マトリクス的視点
  • 収益におけるVMの4x4マトリクス的視点
  • 脆弱性管理の進化のロールアップ

第5章 外的課題:活性因子と抑制因子 - 市場全体

  • 活性因子と抑制因子
  • 活性因子
  • 抑制因子

第6章 予測と動向 - 市場全体

  • 市場予測の前提条件
  • VM市場全体 - 収益予測
  • VMの全収益予測と出荷数
  • VM市場全体 - 価格動向と予測
  • 収益予測と出荷数
  • VM市場全体 - 地域別収益予測
  • VM市場全体 - 地域別出荷数予測
  • VM市場全体 - 地域別平均販売価格
  • 地域的収益予測と出荷数に関する議論
  • VM市場全体 - 製品タイプ別収益予測
  • VM市場全体 - 製品タイプ別出荷数予測
  • VM市場全体 - 製品タイプ別平均販売価格
  • 製品タイプ別の収益予測と出荷数
  • VM市場全体 - 産業別収益予測
  • VM市場全体 - 産業別出荷数予測
  • VM市場全体 - 産業別兵器販売価格
  • 産業別の出荷数と収益予測に関する議論
  • VM市場全体 - 企業規模別収益予測
  • VM市場全体 - 企業規模別出荷数予測
  • VM市場全体 - 企業規模別平均販売価格
  • 企業規模別の収益予測と出荷数に関する議論

第7章 市場のシェアと競争分析 - 市場全体

  • 競争分析 - 市場のシェア
  • 競争因子と評価
  • 競争環境

第8章 競争差別化のポイント

第9章 企業規模別市場分類 - 巨大企業層の内訳(エンドポイント10,000以上)

  • 巨大企業のVMセグメント - 市場指標分析
  • 巨大企業市場の市場指標分析
  • 巨大企業のVM収益予測と出荷数
  • 巨大企業のVM市場 - 価格動向と予測
  • 巨大企業の価格動向と予測に関する議論
  • 巨大企業の競争環境

第10章 大企業層の内訳(エンドポイント2,500〜9,999)

  • 大企業のVMセグメント - 市場指標分析
  • 大企業市場の市場指標分析
  • 大企業のVM収益予測と出荷数
  • 大企業のVM市場 - 価格動向と予測
  • 大企業の価格動向と予測に関する議論
  • 大企業の競争環境

第11章 中規模企業層の内訳(エンドポイント1,000〜2,444)

  • 中規模企業のVMセグメント - 市場指標分析
  • 中規模企業市場の市場指標分析
  • 中規模企業のVM収益予測と出荷数
  • 中規模企業のVM市場 - 価格動向と予測
  • 中規模企業の価格動向と予測に関する議論
  • 中規模企業の競争環境

第12章 小規模/ROBO企業層の内訳(エンドポイント1〜999)

  • 小規模/ROBO企業のVMセグメント - 市場指標分析
  • 小規模/ROBO企業市場の市場指標分析
  • 小規模/ROBO企業のVM収益予測と出荷数
  • 小規模/ROBO企業のVM市場 - 価格動向と予測
  • 小規模/ROBO企業の価格動向と予測に関する議論
  • 小規模/ROBO企業の競争環境

第13章 結論

  • 予測
  • 提言
  • 法的免責事項

第14章 ベンダーのプロファイル

  • AlienVault
  • Beyond Security
  • BeyondTrust
  • Digital Defense, Inc.
  • Flexera Software(旧Secunia)
  • Outpost24
  • Promisec
  • Qualys
  • Rapid7
  • Tenable Network Security
  • Tripwire

第15章 付属資料

目次
Product Code: K109-74

Adding Actionable Intelligence to Network Scan Technology

A vulnerability assessment (VA) runs a script of known vulnerabilities against an endpoint. Vulnerability management (VM) is the formal reporting and prioritization of what is found after the scan. In 2016, VM vendors achieved $768.3 million in licenses, appliances, and related services; representing an improvement of 13.4% over 2015. VM vendors are challenged because VM scanning/reporting is a static technology, and network defenses require a combination of static and dynamic tools. Additionally, several adjacent network security technologies such as SIEM, NAC, and endpoint detection and response (EDR) also make use of behavioral analytics and machine listening technologies. However, VM has always been designed to protect the enterprise network surface. The enterprise network surface is expanding to include cloud, mobile, and Internet of Things (IoT). As much as any other network security technology, VM vendors are in a prime position to provide detection and protection products for the heterogeneous network.

A vulnerability assessment (VA) runs a script of known vulnerabilities against an endpoint. Vulnerability management (VM) is the formal reporting and prioritization of what is found after the scan. In 2016, VM vendors achieved $768.3 million in licenses, appliances, and related services; representing an improvement of 13.4% over 2015. VM vendors are challenged because VM scanning/reporting is a static technology, and network defenses require a combination of static and dynamic tools. Additionally, several adjacent network security technologies such as SIEM, NAC, and endpoint detection and response (EDR) also make use of behavioral analytics and machine listening technologies. However, VM has always been designed to protect the enterprise network surface. The enterprise network surface is expanding to include cloud, mobile, and Internet of Things (IoT). As much as any other network security technology, VM vendors are in a prime position to provide detection and protection products for the heterogeneous network.

Table of Contents

1. Executive Summary

  • Key Findings
  • Key Findings (continued)
  • Executive Summary-Market Engineering Measurements
  • Executive Summary-Market Engineering Measurements (continued)
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • Executive Summary-Introduction to the Research
  • Executive Summary-CEO's Perspective
  • Executive Summary-Key Questions This Study Will Answer

2. Market Overview

  • Market Overview
  • Market Overview (continued)
  • Market Overview (continued)
  • Market Overview-Distribution Channels
  • Market Overview-Distribution Channel Discussion

3. Market Overview-Evolution of Vulnerability Management

  • Market Overview-About the Evolution of VM
  • Market Overview-Introducing the 4 x 4 VM Matrices
  • Market Overview-Introducing the 4 x 4 VM Matrices (continued)
  • Market Overview-Historical View of VM Landscape 2010
  • Market Overview-Historical View of VM Landscape 2010 Explained
  • Market Overview-Historical View of VM Landscape 2013
  • Market Overview-Historical View of VM Landscape 2013 Explained
  • Market Overview-Current View of VM Landscape 2016
  • Market Overview-Historical View of VM Landscape 2016 Explained
  • Market Overview-Forecast View of VM Landscape 2019
  • Market Overview-Historical View of VM Landscape 2019 Explained

4. Market Overview-Roll-up Tables for the Evolution of Vulnerability Management

  • Market Overview-Roll-up Tables for the Evolution of Vulnerability Management
  • Market Overview-Network Environment 4 x 4 VM Metric View
  • Market Overview-Network Environment Matrix Explained
  • Market Overview-Endpoints/Devices in VA Scans 4 x 4 VM Metric View
  • Market Overview-Endpoints/Devices in VA Scans Explained
  • Market Overview-Product Deployment 4 x 4 VM Metric View
  • Market Overview-Product Deployment Explained
  • Market Overview-Revenues 4 x 4 VM Metric View
  • Market Overview-Revenues Explained
  • Market Overview-Revenues Explained (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)
  • Market Overview-Definitions for Roll-up Tables for the Evolution of Vulnerability Management (continued)

5. External Challenges: Drivers and Restraints-Total Market

  • Drivers and Restraints
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Restraints Explained
  • Restraints Explained (continued)
  • Restraints Explained (continued)
  • Restraints Explained (continued)
  • Restraints Explained (continued)

6. Forecasts and Trends-Total Market

  • Forecast Assumptions
  • Total VM Market-Revenue Forecast
  • Total VM Revenue Forecast and Unit Shipments
  • Total VM Market-Pricing Trends and Forecast
  • Revenue Forecast and Unit Shipments Discussion
  • Total VM Market-Revenue Forecast by Region
  • Total VM Market-Unit Shipments Forecast by Region
  • Total VM Market-Average Selling Price Forecast by Region
  • Regional Revenue Forecast and Unit Shipments Discussion
  • Total VM Market-Revenue Shipments Forecast by Product Type
  • Total VM Market-Unit Forecast by Product Type
  • Total VM Market-Average Selling Price Forecast by Product Type
  • Product Type Revenue Forecast and Unit Shipments (Product Definitions)
  • Product Type Revenue Forecast and Unit Shipments Discussion
  • Total VM Market-Revenue Forecast by Vertical Market
  • Total VM Market-Unit Shipments Forecast by Vertical Market
  • Total VM Market-Average Selling Price Forecast by Vertical Market
  • Vertical Market Unit Shipments and Revenue Forecast Discussion
  • Total VM Market-Revenue Forecast by Size of Business
  • Total VM Market-Unit Shipments Forecast by Size of Business
  • Total VM Market-Average Selling Price Forecast by Size of Business
  • Size of Business Revenue Forecast and Unit Shipments Discussion

7. Market Share and Competitive Analysis-Total Market

  • Competitive Analysis-Market Share
  • Competitive Analysis-Market Share (LEGACY 2015 VM Report)
  • Competitive Factors and Assessment
  • Competitive Factors and Assessment (continued)
  • Competitive Environment
  • Competitive Environment (continued)

8. Points of Competitive Differentiation

  • Points of Competitive Differentiation
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)
  • Points of Competitive Differentiation (continued)

9. Market Segmentation by Size of Business-Enterprise Segment Breakdown (10,000 or More Endpoints)

  • Enterprise VM Segment-Market Engineering Measurements
  • Enterprise Market Engineering Measurements
  • Enterprise VM Revenue Forecast and Unit Shipments
  • Enterprise VM Market-Pricing Trends and Forecast
  • Enterprise VM Pricing Trends and Forecast Discussion
  • Enterprise Competitive Environment
  • Enterprise Competitive Environment (continued)

10. Large Business (2,500-9,999 Endpoints) Segment Breakdown

  • Large Business VM Segment-Market Engineering Measurements
  • Large Business Marketing Engineering Measurements
  • Large Business Marketing Engineering Measurements (continued)
  • Large Business VM Revenue Forecast and Unit Shipments
  • Large Business VM Market-Pricing Trends and Forecast
  • Large Business VM Pricing Trends and Forecast Discussion
  • Large Business Competitive Environment
  • Large Business Competitive Environment (continued)

11. Midsized Business (1,000-2,499 Endpoints) Market Breakdown

  • Midsized Business Segment-Market Engineering Measurements
  • Midsized Business Marketing Engineering Measurements
  • Midsized Business VM Revenue Forecast and Units Shipments
  • Midsized Business VM Market-Pricing Trends and Forecast
  • Midsized Business VM Pricing Trends and Forecast Discussion
  • Midsized Business Competitive Environment
  • Midsized Business Competitive Environment (continued)

12. Small/ROBO Segment Breakdown (1-999 Endpoints)

  • Small/ROBO VM Segment-Market Engineering Measurements
  • Small/ROBO Marketing Engineering Measurements
  • Small/ROBO VM Unit Shipments and Revenue Forecast
  • Small/ROBO VM Market-Pricing Trends and Forecast
  • Small/ROBO VM Pricing Trends and Forecast Discussion
  • Small/ROBO Competitive Environment
  • Small/ROBO Competitive Environment (continued)

13. The Last Word

  • The Last Word-Predictions
  • The Last Word-Recommendations
  • Legal Disclaimer

14. Vendor Profiles

  • Vendor Profile: AlienVault
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: AlienVault (continued)
  • Vendor Profile: Beyond Security
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: Beyond Security (continued)
  • Vendor Profile: BeyondTrust
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: BeyondTrust (continued)
  • Vendor Profile: Digital Defense, Inc.
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Digital Defense, Inc. (continued)
  • Vendor Profile: Flexera Software (formerly Secunia)
  • Vendor Profile: Flexera Software (formerly Secunia) (continued)
  • Vendor Profile: Flexera Software (formerly Secunia) (continued)
  • Vendor Profile: Flexera Software (formerly Secunia) (continued)
  • Vendor Profile: Outpost24
  • Vendor Profile: Outpost24 (continued)
  • Vendor Profile: Outpost24 (continued)
  • Vendor Profile: Outpost24 (continued)
  • Vendor Profile: Promisec
  • Vendor Profile: Promisec (continued)
  • Vendor Profile: Promisec (continued)
  • Vendor Profile: Promisec (continued)
  • Vendor Profile: Qualys
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Qualys (continued)
  • Vendor Profile: Rapid7
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Rapid7 (continued)
  • Vendor Profile: Tenable Network Security
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tenable Network Security (continued)
  • Vendor Profile: Tripwire
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)
  • Vendor Profile: Tripwire (continued)

15. Appendix

  • Market Engineering Methodology
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • Market Engineering Measurements (continued)
  • List of Abbreviations and Acronyms Used in the Report
  • List of Abbreviations and Acronyms Used in the Report (continued)
  • Additional Sources of Information on Study Topic Area
  • Partial List of Companies Interviewed
  • List of Companies Included in “Others”
  • Learn More-Next Steps
Back to Top