表紙
市場調査レポート

ITセキュリティーの中国市場:2015年〜2019年

IT Security Market in China 2015-2019

発行 TechNavio (Infiniti Research Ltd.) 商品コード 232735
出版日 ページ情報 英文 98 Pages
即納可能
価格
本日の銀行送金レート: 1USD=102.95円で換算しております。
Back to Top
ITセキュリティーの中国市場:2015年〜2019年 IT Security Market in China 2015-2019
出版日: 2015年04月15日 ページ情報: 英文 98 Pages
概要

中国におけるITセキュリティー市場は、2014年から2019年にかけて、11.39%のCAGRで拡大する見込みです。

当レポートでは、中国におけるITセキュリティー市場の概要と今後の見通し、発展因子、課題、主要企業のプロファイルなどを提供しています。

第1章 エグゼクティブサマリー

第2章 略語リスト

第3章 調査範囲

  • 市場概要
  • 主な製品

第4章 市場調査手法

  • 市場調査プロセス
  • 調査手法

第5章 イントロダクション

第6章 市場説明

  • 脅威の種類
    • トロイの木馬
    • ウイルス
    • ワーム
    • アドウェア
    • キーロガー
    • バックドア
    • エクスプロイト
    • ドロッパー
    • フィッシング
    • クッキー
    • ブルースナーフィング
    • ブートセクタウイルス
    • ブラウザハイジャッカー
    • マウストラッピング
    • スパム
    • クライムウェア
  • ITセキュリティーの要素
  • ITセキュリティーの利点

第7章 市場情勢

  • 市場概要
    • 市場構造
    • 市場規模と予測
  • アジア太平洋地域における中国のITセキュリティー市場
  • ファイブフォース分析

第8章 BYOD:市場機会

第9章 製品ライフサイクル分析

第10章 製品別の市場分類

  • 中国の製品別ITセキュリティー市場
  • 中国のITセキュリティーハードウェア市場
    • 市場規模と予測
    • ITセキュリティーハードウェア市場の製品別分類
    • 統合ファイアウォール/VPN市場
    • UTM市場
    • IPS市場
    • コンテンツ管理市場
    • VPN市場
    • IDS市場
  • 中国のITセキュリティーサービス市場
    • 市場規模と予測
  • 中国のITセキュリティーソフトウェア市場
    • 市場規模と予測

第11章 市場の魅力

第12章 購入基準

第13章 市場成長因子

第14章 成長因子とその影響

第15章 市場の課題

第16章 成長因子と課題の影響

第17章 市場動向

第18章 動向とその影響

第19章 ベンダー情勢

  • 競合シナリオ
  • ベンダー分析
    • ベンダー比較
    • 主なニュース
    • M&A
  • その他の有力ベンダー

第20章 主要ベンダーの分析

  • CA Technologies
  • Check Point Software
  • Cisco Systems
  • Emc2
  • IBM
  • Juniper Networks
  • Symantec

第21章 関連レポート

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次
Product Code: IRTNTR5643

About IT Security

IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.

TechNavio's analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.

Covered in this Report

The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:

  • Hardware: Integrated Firewall/VPN, UTM, Content Management, IPS, IDS, and VPN
  • Services
  • Software

The major end-users listed in the market are described below:

  • SMEs: This segment includes organizations that have less than 10,000 employees and generate revenue of less than US$100 million
  • Large Enterprises: This segment includes organizations that have more than 10,000 employees and generate revenue of more than US$100 million
  • Government Organizations: This segment includes all government agencies and institutions that are funded and managed by government authorities

TechNavio's report, IT Security Market in China 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Vendors

  • CA Technologies
  • Check Point Software
  • Cisco Systems
  • Emc²
  • IBM
  • Juniper Networks
  • Symantec

Other Prominent Vendors

  • Dell SonicWALL
  • Fortinet
  • F-Secure
  • McAfee
  • Sophos
  • TrendMicro

Market Driver

  • Increased Dependency on Internet
  • For a full, detailed list, view our report

Market Challenge

  • High Implementation Cost
  • For a full, detailed list, view our report

Market Trend

  • Increased Demand for Cloud-based Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview
  • 03.2. Product Offerings

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Types of Threat
    • 06.1.1. Trojan
    • 06.1.2. Virus
    • 06.1.3. Worms
    • 06.1.4. Adware
    • 06.1.5. Keylogger
    • 06.1.6. Backdoor
    • 06.1.7. Exploit
    • 06.1.8. Dropper
    • 06.1.9. Phishing
    • 06.1.10. Cookies
    • 06.1.11. Bluesnarfing
    • 06.1.12. Boot Sector Virus
    • 06.1.13. Browser Hijackers
    • 06.1.14. Mousetrapping
    • 06.1.15. Obfuscated Spam
    • 06.1.16. Crimeware
  • 06.2. Components of IT Security
  • 06.3. Advantages of IT Security

07. Market Landscape

  • 07.1. Market Overview
    • 07.1.1. Market Structure
    • 07.1.2. Market Size and Forecast
  • 07.2. China in IT Security Market in APAC Region
  • 07.3. Five Forces Analysis

08. BYOD Implementation: Market Opportunities

09. Product Lifecycle Analysis

10. Market Segmentation by Product

  • 10.1. Segmentation of IT Security Market in China by Product 2014
  • 10.2. Segmentation of IT Security Market in China by Product 2014-2019
  • 10.3. IT Security Hardware Market in China
    • 10.3.1. Market Size and Forecast
    • 10.3.2. Segmentation of IT Security Hardware Market in China by Product
    • 10.3.3. Segmentation of IT Security Hardware Market in China by Product 2014-2019
    • 10.3.4. Integrated Firewall/VPN Market in China
    • 10.3.5. UTM Market in China
    • 10.3.6. IPS Market in China
    • 10.3.7. Content Management Market in China
    • 10.3.8. VPN Market in China
    • 10.3.9. IDS Market in China
  • 10.4. IT Security Services Market in China
    • 10.4.1. Market Size and Forecast
  • 10.5. IT Security Software Market in China
    • 10.5.1. Market Size and Forecast

11. Market Attractiveness

  • 11.1. Market Attractiveness by Product

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

  • 19.1. Competitive Scenario
  • 19.2. Vendor Analysis 2014
    • 19.2.1. Vendor Comparison based on Application Offered
    • 19.2.2. Key News
    • 19.2.3. Mergers and Acquisitions
  • 19.3. Other Prominent Vendors

20. Key Vendor Analysis

  • 20.1. CA Technologies
    • 20.1.1. Key Facts
    • 20.1.2. Business Overview
    • 20.1.3. Business Segmentation by Revenue 2013
    • 20.1.4. Business Segmentation by Revenue 2012 and 2013
    • 20.1.5. Geographical Segmentation by Revenue 2013
    • 20.1.6. Business Strategy
    • 20.1.7. Recent Developments
    • 20.1.8. SWOT Analysis
  • 20.2. Check Point Software
    • 20.2.1. Key Facts
    • 20.2.2. Business Overview
    • 20.2.3. Business Strategy
    • 20.2.4. Recent Developments
    • 20.2.5. SWOT Analysis
  • 20.3. Cisco Systems
    • 20.3.1. Key Facts
    • 20.3.2. Business Overview
    • 20.3.3. Business Segmentation by Revenue
    • 20.3.4. Geographical Segmentation by Revenue
    • 20.3.5. Business Strategy
    • 20.3.6. Key Information
    • 20.3.7. SWOT Analysis
  • 20.4. Emc²
    • 20.4.1. Key Facts
    • 20.4.2. Business Overview
    • 20.4.3. Business Segmentation by Revenue 2013
    • 20.4.4. Business Segmentation by Revenue 2012 and 2013
    • 20.4.5. Geographical Segmentation by Revenue 2013
    • 20.4.6. Business Strategy
    • 20.4.7. Recent Developments
    • 20.4.8. SWOT Analysis
  • 20.5. IBM
    • 20.5.1. Key Facts
    • 20.5.2. Business Description
    • 20.5.3. Business Segmentation
    • 20.5.4. Revenue Segmentation by Business Segment
    • 20.5.5. Revenue Segmentation by Business Operation
    • 20.5.6. Revenue Comparison of Business Segments 2012 and 2013
    • 20.5.7. Revenue Segmentation by Geography
    • 20.5.8. Business Strategy
    • 20.5.9. Key Developments
    • 20.5.10. SWOT Analysis
  • 20.6. Juniper Networks
    • 20.6.1. Key Facts
    • 20.6.2. Business Overview
    • 20.6.3. Business Segmentation
    • 20.6.4. Business Segmentation by Revenue 2012 and 2013
    • 20.6.5. Sales by Geography 2013
    • 20.6.6. Business Strategy
    • 20.6.7. Recent Developments
    • 20.6.8. SWOT Analysis
  • 20.7. Symantec
    • 20.7.1. Key Facts
    • 20.7.2. Business Overview
    • 20.7.3. Business Segmentation by Revenue 2013
    • 20.7.4. Business Segmentation by Revenue 2013 and 2014
    • 20.7.5. Geographical Segmentation by Revenue 2013
    • 20.7.6. Business Strategy
    • 20.7.7. Recent Developments
    • 20.7.8. SWOT Analysis

21. Other Reports in this Series

List of Exhibits:

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Components of IT Security
  • Exhibit 3: Market Structure
  • Exhibit 4: Segmentation by Hardware
  • Exhibit 5: IT Security Market in China 2014-2019 (US$ billion)
  • Exhibit 6: China in IT Security Market in APAC Region 2014
  • Exhibit 7: Adoption of BYOD Across Countries
  • Exhibit 8: Adoption of BYOD in Enterprises across Countries (million units)
  • Exhibit 9: Average Number of BYOD Devices in Enterprises in China
  • Exhibit 10: Product Lifecycle Analysis
  • Exhibit 11: Segmentation of IT Security Market in China by Product 2014
  • Exhibit 12: Segmentation of IT Security Market in China by Product 2014-2019
  • Exhibit 13: IT Security Hardware Market in China 2014-2019 (US$ billion)
  • Exhibit 14: Segmentation of IT Security Hardware Market in China by Product 2014
  • Exhibit 15: Segmentation of IT Security Hardware Market in China by Product 2014-2019
  • Exhibit 16: Integrated Firewall/VPN Market in China 2014-2019 (US$ billion)
  • Exhibit 17: UTM Market in China 2014-2019 (US$ billion)
  • Exhibit 18: IPS Market in China 2014-2019 (US$ billion)
  • Exhibit 19: Content Management Market in China 2014-2019 (US$ billion)
  • Exhibit 20: VPN Market in China 2014-2019 (US$ billion)
  • Exhibit 21: IDS Market in China 2014-2019 (US$ billion)
  • Exhibit 22: IT Security Services Market in China 2014-2019 (US$ billion)
  • Exhibit 23: IT Security Software Market in China 2014-2019 (US$ billion)
  • Exhibit 24: Market Attractiveness by Product
  • Exhibit 25: Vendor Comparison based on Application Offered
  • Exhibit 26: CA Technologies: Business Segmentation by Revenue 2013
  • Exhibit 27: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 28: CA Technologies: Geographical Segmentation by Revenue 2013
  • Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 30: Business Segmentation of Cisco Systems by Revenue 2011-2013 (US$ billion)
  • Exhibit 31: Geographical Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 32: Emc²: Business Segmentation by Revenue 2013
  • Exhibit 33: Emc²: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 34: EMC² : Geographical Segmentation by Revenue 2013
  • Exhibit 35: IBM: Business Segmentation
  • Exhibit 36: IBM: Revenue Segmentation by Business 2013
  • Exhibit 37: IBM: Revenue Segmentation 2013
  • Exhibit 38: IBM: Revenue Comparison of Business Segments 2012 and 2013 (US$ million)
  • Exhibit 39: IBM: Revenue Segmentation by Geography 2013
  • Exhibit 40: Juniper Networks: Business Segmentation 2013
  • Exhibit 41: Juniper Networks: Business Segmentation by Revenue 2012 and 2013 (US$ billion)
  • Exhibit 42: Juniper Networks: Sales by Geography 2013
  • Exhibit 43: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 44: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
  • Exhibit 45: Symantec: Geographical Segmentation by Revenue 2013
Back to Top