市場調査レポート

暗号化ソフトウェアの世界市場

Encryption Software

発行 Global Industry Analysts, Inc. 商品コード 341989
出版日 ページ情報 英文 176 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=106.12円で換算しております。

ご注意:Single user licenseはDRM(デジタル著作権管理システム)付PDFとなります。
PDFの閲覧には Adobe Digital Editions (無償)のインストールが必要となります。
認証されたPC上のみでの閲覧と、1回のプリントアウトが可能となっております。

Back to Top
暗号化ソフトウェアの世界市場 Encryption Software
出版日: 2015年09月01日 ページ情報: 英文 176 Pages
概要

当レポートでは、暗号化ソフトウェアの世界市場について、米国、カナダ、日本、欧州、アジア太平洋、南米およびその他の各地域別の分析、2020年までの市場予測、主要プレーヤーのプロファイルなどについて、概略以下の構成で取り上げています。

第1章 イントロダクション、調査手法、製品の定義

第2章 エグゼクティブサマリー

  • 産業の概要
    • 暗号:インターネット時代のデータ漏えい防止の重要戦略
    • デジタルデータの重要性
    • 企業内でのデータ漏えい
    • 漏えいを防ぐ次世代ツールに開かれた市場
    • 暗号化ソフトウェア:データ漏えいの潜在ツール
    • 市場の動向と問題点
    • 重要なデジタルデータの価値に対する意識の高まりが暗号化への投資を加速化
    • スマートフォン盗難の増加でBYODのセキュリティ方策として暗号化にスポットライト
    • スノーデンの暴露とNSA調査が明るみに出たことで暗号化へのニーズに拍車
    • 統合エンドポイントのセキュリティへの関心の高まりが示すエンドポイント暗号化
    • IoTの登場でIoTの枠組み暗号化の重要性に注目が集まる
    • BYODとCYODがデータ漏えいのリスクを高め暗号化ソフトウェアの事業使用事例を増加
    • クラウドにおけるデータ漏えいへの対応の必要性が暗号化ソフトウェアの需要を高める
    • 暗号持参がクラウドアプリにおける暗号化の使用を機能させる
    • 仮想化が広げる暗号化へのニーズ
    • クラウドコンピューティングの分断上昇がクラウド型暗号を採算性あるビジネスモデルに
    • 先進国が市場を占め、発展途上国が成長をけん引
    • 自己暗号化ドライブの人気上昇:暗号化ソフトウェアへの大きな脅威
    • コンプライアンスに対するプレッシャーの高まりが市場の成長を後押し
    • 競争
  • 製品概要
  • 新製品/革新
  • 最近の業界の活動
  • 主要グローバルプレーヤー
  • 世界的な市場展望

第3章 市場分析

  • 米国
  • カナダ
  • 日本
  • 欧州
    • フランス
    • ドイツ
    • イタリア
    • 英国
    • スペイン
    • ロシア
    • その他欧州
  • アジア太平洋
    • 中国
    • インド
    • その他アジア太平洋
  • 南米
    • ブラジル
    • その他南米
  • その他の地域

第4章 比較展望

目次
Product Code: MCP-7981

This report analyzes the worldwide markets for Encryption Software in US$ Thousand. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 49 companies including many key and niche players such as -

Bloombase
Check Point Software Technologies Ltd.
Cisco Systems Inc.
Cypherix Encryption Software
Dekart

Table of Contents

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

  • Study Reliability and Reporting Limitations
  • Disclaimers
  • Data Interpretation & Reporting Level
    • Quantitative Techniques & Analytics
  • Product Definitions and Scope of Study
    • Encryption Software

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW

  • Encryption: A Critical Data Leakage Prevention Strategy in the Internet Era
  • Importance of Digital Data...
  • Where in an Enterprise, Data Leaks....
  • Market Opens Up for Next-Gen Tools to Plug Leaks...
    • Table 1: Leaking Faucets in an Enterprise (includes corresponding Graph/Chart)
  • Encryption Software: A Potent Tool to Plug Leaks
  • Market Trends & Issues
  • Growing Awareness Over the Value of Sensitive Digital Data Fuels Investments in Encryption
  • Rise in Smartphone Theft Throws the Spotlight on Encryption as a BYOD Security Measure
  • Snowden Revelations & the Bringing to Light of the Age of NSA Surveillance Spurs the Need for Encryption
  • Growing Focus on Unifying Endpoint Security Augurs Well for Endpoint Encryption s
  • The Rise of IoT Turns the Spotlight on the Importance of Encrypting the IoT Framework
    • Table 2: With Over 387% Growth in Connected Autonomous Things by 2020, the Security Pressure Builds On IoT, Fuelling Opportunities for Encryption Software as a Key Security Component: Breakdown of the Installed Base of IoT Connected Devices (In Million Units) for the Years 2015 & 2020 (includes corresponding Graph/Chart)
    • The IoT Phenomenon Spurs Demand for Lightweight Cryptography
  • BYOD & CYOD Aggravate the Risk of Data Leakage & Fuel the Business Case for Encryption Software
    • Era of "BYOD"....
    • Wearables in an Enterprise: The Next Wave of BYOD Spurring Opportunities for Encryption
    • Surging Security Threats Posed by Moving Data in a BYOD Era...
    • Software Encryption Rides the BYOD Wave Balancing BYOD Risks & Rewards
    • Table 3: With a Projected 11.7% Increase in the Share of Corporate-Owned Tablets by 2018, BYOD Goes Mainstream Spurring Opportunities for Data Encryption in a BYOD Environment: Global Percentage Breakdown of Installed Base of Corporate-Owned and Consumer Owned Tablets for the Years 2011, 2014 & 2017P (includes corresponding Graph/Chart)
    • Table 4: Robust Penetration of BYOD Devices as Measured by the Per Capita Distribution of Connected Devices Per Knowledge Worker in Select Countries for the Year 2012 & 2015 (includes corresponding Graph/Chart)
  • Need to Counter Data Leakage in the Cloud Spurs Demand for Encryption Software
    • The Age of the Clouds...
    • Security Threats in the Cloud Drives the Importance of Encrypting Data in the Cloud
    • Table 5: Robust Spending On Public Cloud Services Drives the Emphasis on Server Side & Client Side Encryption: Global Market for Public Cloud Computing Services (In US$ Million) by Geographic Region for the Years 2015 & 2020 (includes corresponding Graph/Chart)
  • Bring Your Own Encryption Catalyzes the Use of Encryption in Cloud Applications
  • Virtualization Expands the Need for Encryption
    • Table 6: Surging Penetration of Virtualization Brings Encryption into the Spotlight to Prevent Information Leakage from VMs: Penetration (In %) of Virtualization Technology and Average Number of Virtual Servers Per Host (x:1) in Select Countries for the Year 2015 (includes corresponding Graph/Chart)
  • The Disruptive Ascend of Cloud Computing Gives Rise to Encryption as a Service as a Lucrative Business Model
    • The Disruption of Cloud Computing in the New Economy
    • Encryption as a Service (EaaS) Grows in Prominence
  • Developed Countries Dominate the Market, Developing Countries to Lead Growth
  • Surging Popularity of Self-Encrypting Drives: A Key Threat to Encryption Software
  • Growing Pressure of Compliance Fuels Market Growth
    • Regulations Governing Data Leakage
    • A Synoptic Review of Key Data Protection Regulations Penalizing Data Leakages
      • Payment Card Industry Data Security Standard (PCI DSS)
      • Listed below is the high-level overview of the PCI DSS requirements:
      • Gramm-Leach-Bliley Act (GLBA)
      • Sarbanes-Oxley Act (SOX)
      • EURO-SOX
      • Health Insurance Portability & Accountability Act (HIPAA)
      • Data Protection Act (DPA) of 1984 (amended 1998)
      • California Senate Bill 1386
  • Competition

2. PRODUCT OVERVIEW

  • Software-Based Encryption- Defined
  • Types of Encryption Software
  • Software Based Disk Encryption
  • Software Based File/Folder Encryption
  • Software Based Database Encryption
  • Software Based Communication Encryption
  • Cloud Encryption
  • Protecting Data at Rest and Data in Motion
  • Protecting Data at Rest
  • Securing Data in Motion
  • Benefits of Encryption
  • Ensures Customer Loyalty
  • Enables Use of Cloud
  • Helps Comply with Regulations
  • Drawbacks of Encryption Software

3. RECENT INDUSTRY ACTIVITY

  • New Softwares Updates Folder Lock
  • HP Takes Over Voltage Security
  • HP Launches Novel HP Cloud Access Security Protection Platform
  • WowTron Introduces WowTron PDF Encryption
  • Cloudera Acquires Gazzang
  • INSIDE Secure Takes Over Metaforic
  • Sophos Takes Over Mojave
  • CipherPoint Enters into Reseller Partnership with DocPoint
  • Data Locker Rolls Out SkyCrypt
  • CRYPTR 2 Broadband IP Encryption Obtains Certification of National Security Agency
  • Mitsubishi Electric Develops New Encryption Platform Software
  • Penta Security Launches MyDiamo

4. FOCUS ON SELECT GLOBAL PLAYERS

  • Bloombase (US)
  • Check Point Software Technologies Ltd. (Israel)
  • Cisco Systems Inc. (US)
  • Cypherix Encryption Software (US)
  • Dekart (Republic of Moldova)
  • East-Tec (Romania)
  • EMC Corporation (US)
  • Entrust Tech (US)
  • Hewlett-Packard (US)
  • IBM Corporation (US)
  • InterCrypto Ltd. (US)
  • Jetico Inc. (Finland)
  • McAfee Inc. (US)
  • Microsoft Corporation (US)
  • NewSoftwares.Net.Inc. (US)
  • PC Dynamics Inc. (US)
  • ProofPoint (US)
  • Ranquel Data Security (Argentina)
  • Sophos Ltd. (UK)
  • Symantec Corporation (US)
  • Trend Micro (Japan)
  • WebMinds Inc. (US)
  • Winmagic Inc. (US)
  • Zix Corporation (US)

5. GLOBAL MARKET PERSPECTIVE

    • Table 7: World Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 8: World 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

III. MARKET

1. THE UNITED STATES

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
    • Key Players
  • B. Market Analytics
    • Table 9: US Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

2. CANADA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 10: Canadian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

3. JAPAN

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
    • Trend Micro - A Key Player
  • B. Market Analytics
    • Table 11: Japanese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4. EUROPE

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 12: European Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 13: European 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

4a. FRANCE

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 14: French Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4b. GERMANY

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 15: German Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4c. ITALY

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 16: Italian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4d. THE UNITED KINGDOM

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
    • Sophos Ltd. - A Key Player
  • B. Market Analytics
    • Table 17: UK Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4e. SPAIN

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 18: Spanish Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4f. RUSSIA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 19: Russian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

4g. REST OF EUROPE

  • A. Market Analysis
    • Outlook
    • Key Players
  • B. Market Analytics
    • Table 20: Rest of Europe Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5. ASIA-PACIFIC

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 21: Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 22: Asia-Pacific 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

5a. CHINA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 23: Chinese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5b. INDIA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 24: Indian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

5c. REST OF ASIA-PACIFIC

  • A. Market Analysis
    • Outlook
    • Recent Industry Activity
  • B. Market Analytics
    • Table 25: Rest of Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

6. LATIN AMERICA

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 26: Latin American Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)
    • Table 27: Latin American 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart)

6a. BRAZIL

  • A. Market Analysis
    • Outlook
  • B. Market Analytics
    • Table 28: Brazilian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

6b. REST OF LATIN AMERICA

  • A. Market Analysis
    • Outlook
    • Ranquel Data Security (Argentina) - A Key Player
  • B. Market Analytics
    • Table 29: Rest of Latin America Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

7. REST OF WORLD

  • A. Market Analysis
    • Outlook
    • Check Point Software Technologies Ltd. (Israel) - A Key Player
  • B. Market Analytics
    • Table 30: Rest of World Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart)

IV. COMPETITIVE LANDSCAPE

Back to Top