表紙
市場調査レポート

ITセキュリティ支出の世界市場:2015-2019年

Global IT Security Spending Market 2015-2019

発行 TechNavio (Infiniti Research Ltd.) 商品コード 288978
出版日 ページ情報 英文 100 Pages
即納可能
価格
本日の銀行送金レート: 1USD=101.50円で換算しております。
Back to Top
ITセキュリティ支出の世界市場:2015-2019年 Global IT Security Spending Market 2015-2019
出版日: 2015年07月29日 ページ情報: 英文 100 Pages
概要

IT(情報技術)セキュリティは単独ユーザーまたは多数のユーザーネットワークのデータおよび情報を不正アクセスや改ざんから保護することを目的とし、そうした脅威を検出、監視、報告するとともに、これに対処する仕組みを指すもの。企業や行政機関がデータやシステム、ネットワークを守るために支出する費用は長期投資であり、その関連市場は今後数年にわたって9.88%の複合年間成長率で拡大する見込みです。

当レポートでは、ITセキュリティ支出の世界市場に注目し、2015-2019年の期間におけるその推移を分析・予測するほか、今後に向けた発展の動向、推進要因、主要参入企業プロファイルなどの最新情報をまとめています。

第1章 エグゼクティブサマリー

第2章 略語一覧

第3章 レポートの範囲

  • 市場概要

第4章 市場調査方法

  • 市場調査プロセス
  • 取材方法

第5章 イントロダクション

第6章 市場解説

  • ITセキュリティの構成要素
    • ネットワークセキュリティ
    • アクセスコントロール
    • 事業の継続性
    • 法令順守の姿勢
    • 機密性
    • リスク評価
  • ITセキュリティソリューションの導入形式
    • オンプレミス
    • クラウド利用
    • ハイブリッド

第7章 市場環境

  • 市場概要
  • 市場規模および予測
  • ファイブフォース分析

第8章 製品ライフサイクル分析

第9章 サイバー保険 - サイバー損失を軽減する新たな方法

第10章 市場セグメンテーション - ソリューション別

  • 世界のITセキュリティ支出市場 - ソリューション別:2014-2019年
  • 世界のITセキュリティ製品支出市場
    • 市場規模および予測
  • 世界のITセキュリティサービス支出市場
    • 市場規模および予測

第11章 地域セグメンテーション

  • ITセキュリティ支出の世界市場 - 地域別:2014-2019年
    • ITセキュリティ支出の世界市場 - 地域別:2014-2019年(収益額)
    • 米国のITセキュリティ支出市場
    • 欧州・中東・アフリカのITセキュリティ支出市場
    • アジア太平洋地域のITセキュリティ支出市場

第12章 購入基準

第13章 市場成長推進要因

第14章 推進要因とその影響度

第15章 市場課題

第16章 推進要因および課題の影響度

第17章 市場動向

第18章 動向とその影響度

第19章 事業環境

  • 競合状況
    • 商品ライン
  • 市場シェア分析:2014年
  • その他の有力企業

第20章 主要供給企業分析(重要ファクト、事業概要、事業戦略、最新展開、SWOT分析など)

  • Check Point Software
  • Cisco Systems
  • EMC2
  • Fortinet
  • Juniper Networks
  • McAfee
  • Palo Alto Networks
  • Symantec
  • Trend Micro

第21章 仮説

第22章 シリーズ内の関連レポート

参考資料一覧

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次
Product Code: IRTNTR6612

About IT Security

IT security is used to protect data and information of single-user or multi-user networks. It protects data and information from unauthorized access and modification. IT security refers to measures taken to detect, monitor, report, and counter such threats. IT security spending refers to the expense incurred by enterprises and government organizations to secure their data, systems, and networks. It also includes expenses incurred while securing computers, communications, and information and data. IT security spending is a long-term investment to save and protect critical data.

Technavio's analysts forecast the global IT security spending market to grow at a CAGR of 9.88% over the period 2014-2019.

Covered in this Report

This report covers the present scenario and the growth prospects of the global IT security spending market for the period 2015-2019. To calculate the market size, the report considers revenue generated from the sales of the following:

  • Products
  • Services

It also presents the vendor landscape and a corresponding detailed analysis of the top eight vendors in the market. In addition, the report discusses the major drivers that influence the growth of the global IT security spending market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends emerging in the market.

Technavio's report, Global IT Security Spending Market 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the global IT security spending market landscape and its growth prospects in the coming years. The report includes a discussion on the key vendors operating in this market.

Key Vendors

  • Check Point Software Technologies
  • Cisco Systems
  • EMC
  • Fortinet
  • Juniper Networks
  • McAfee
  • Palo Alto Networks
  • Symantec
  • Trend Micro

Other Prominent Vendors

  • Akamai Technologies
  • Avast Software
  • AVG Technologies
  • Barracuda Networks
  • Citrix Systems
  • Dell SonicWALL
  • F5 Networks
  • Hewlett-Packard
  • IBM
  • Imperva
  • Microsoft
  • Panda Security
  • Radware
  • Sophos
  • Trustwave Holdings

Market Driver

  • Increased Use of Mobile Devices
  • For a full, detailed list, view our report

Market Challenge

  • High Implementation Costs
  • For a full, detailed list, view our report

Market Trend

  • Increasing Demand for Cloud-based Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Components of IT Security
    • 06.1.1. Network Security
    • 06.1.2. Access Control
    • 06.1.3. Business Continuity
    • 06.1.4. Compliance
    • 06.1.5. Confidentiality
    • 06.1.6. Risk Assessment
  • 06.2. Implementation of IT Security Solutions
    • 06.2.1. On-Premise
    • 06.2.2. Cloud-Based
    • 06.2.3. Hybrid
  • 06.3. Regulations against IT Security Threats
  • 06.4. IT Security Breaches
    • 06.4.1. IT Security Breaches in Enterprises 2010-2014
    • 06.4.2. IT Security Breaches by Regions 2014

07. Market Landscape

  • 07.1. Market Overview
  • 07.2. Market Size and Forecast
  • 07.3. Five Forces Analysis

08. Product Life Cycle Analysis

09. Cyber Insurance: A New Way to Curb Cyber Loss

10. Market Segmentation by Solutions

  • 10.1. Global IT Security Spending Market by Solutions 2014-2019
  • 10.2. Global IT Security Products Spending Market
    • 10.2.1. Market Size and Forecast
  • 10.3. Global IT Security Services Spending Market
    • 10.3.1. Market Size and Forecast

11. Geographical Segmentation

  • 11.1. Global IT Security Spending Market by Geography 2014-2019
    • 11.1.1. Global IT Security Spending Market by Geography 2014-2019(revenue)
    • 11.1.2. IT Security Spending Market in Americas
    • 11.1.3. IT Security Spending Market in EMEA
    • 11.1.4. IT Security Spending Market in APAC

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

  • 19.1. Competitive Scenario
    • 19.1.1. Product Offerings
  • 19.2. Competitive Analysis 2014
  • 19.3. Other Prominent Vendors

20. Key Vendor Analysis

  • 20.1. Check Point Software
    • 20.1.1. Key Facts
    • 20.1.2. Business Overview
    • 20.1.3. Business Strategy
    • 20.1.4. Recent Developments
    • 20.1.5. SWOT Analysis
  • 20.2. Cisco Systems
    • 20.2.1. Key facts
    • 20.2.2. Business overview
    • 20.2.3. Business segmentation by revenue
    • 20.2.4. Geographical segmentation by revenue
    • 20.2.5. Business strategy
    • 20.2.6. Key developments
    • 20.2.7. SWOT analysis
  • 20.3. EMC²
    • 20.3.1. Key Facts
    • 20.3.2. Business Overview
    • 20.3.3. Business Segmentation by Revenue 2013
    • 20.3.4. Business Segmentation by Revenue 2012 and 2013
    • 20.3.5. Geographical Segmentation by Revenue 2013
    • 20.3.6. Business Strategy
    • 20.3.7. Recent Developments
    • 20.3.8. SWOT Analysis
  • 20.4. Fortinet
    • 20.4.1. Key Facts
    • 20.4.2. Key Information
    • 20.4.3. Business Overview
    • 20.4.4. Business Segmentation by Revenue
    • 20.4.5. Business Segmentation by Revenue
    • 20.4.6. Geographical Segmentation by Revenue
    • 20.4.7. Business Strategy
    • 20.4.8. Recent Developments
    • 20.4.9. SWOT Analysis
  • 20.5. Juniper Networks
    • 20.5.1. Key Facts
    • 20.5.2. Business Overview
    • 20.5.3. Business Segmentation
    • 20.5.4. Business Segmentation by Revenue 2012 and 2013
    • 20.5.5. Sales by Geography 2013
    • 20.5.6. Business Strategy
    • 20.5.7. Recent Developments
    • 20.5.8. SWOT Analysis
  • 20.6. McAfee
    • 20.6.1. Key facts
    • 20.6.2. Business overview
    • 20.6.3. Product segmentation
    • 20.6.4. Key locations
    • 20.6.5. Business strategy
    • 20.6.6. Recent developments
    • 20.6.7. SWOT Analysis
  • 20.7. Palo Alto Networks
    • 20.7.1. Key Facts
    • 20.7.2. Key Information
    • 20.7.3. Business Overview
    • 20.7.4. Business Segmentation by Revenue
    • 20.7.5. Business Segmentation by Revenue
    • 20.7.6. Geographical Segmentation by Revenue
    • 20.7.7. Business Strategy
    • 20.7.8. Recent Developments
    • 20.7.9. SWOT Analysis
  • 20.8. Symantec
    • 20.8.1. Key facts
    • 20.8.2. Business overview
    • 20.8.3. Business segmentation by revenue 2013
    • 20.8.4. Business segmentation by revenue 2013 and 2014
    • 20.8.5. Geographical segmentation by revenue 2013
    • 20.8.6. Business strategy
    • 20.8.7. Recent developments
    • 20.8.8. SWOT analysis
  • 20.9. Trend Micro
    • 20.9.1. Key facts
    • 20.9.2. Business overview
    • 20.9.3. Geographical segmentation by revenue 2012 and 2013
    • 20.9.4. Geographical segmentation by revenue 2013
    • 20.9.5. Business strategy
    • 20.9.6. Recent developments
    • 20.9.7. SWOT analysis

21. Assumptions

22. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Components of IT Security
  • Exhibit 3: IT Security Breaches in Enterprises 2010-2014
  • Exhibit 4: IT Security Breaches by Regions 2014
  • Exhibit 5: Global IT Security Spending Market 2014-2019 ($ billions)
  • Exhibit 6: Product Life Cycle of IT Security Solutions
  • Exhibit 7: Global IT Security Spending Market by Solutions 2014-2019
  • Exhibit 8: Global IT Security Products Spending Market 2014-2019 ($ billions)
  • Exhibit 9: Global IT Security Services Spending Market 2014-2019 ($ billions)
  • Exhibit 10: Global IT Security Spending Market by Geography 2014-2019
  • Exhibit 11: Global IT Security Spending Market by Geography 2014-2019 ($ billions)
  • Exhibit 12: Cisco Systems: Business segmentation by revenue 2013
  • Exhibit 13: Cisco Systems: Business segmentation by revenue 2011-2013 ($ billions)
  • Exhibit 14: Cisco Systems: Geographical segmentation by revenue 2013
  • Exhibit 15: EMC²: Business Segmentation by Revenue 2013
  • Exhibit 16: EMC²: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 17: Global IT Security Spending Market: Geographical Segmentation by Revenue 2013
  • Exhibit 18: Fortinet: Business Segmentation by Revenue 2013
  • Exhibit 19: Fortinet: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 20: Fortinet: Geographical Segmentation by Revenue 2013
  • Exhibit 21: Juniper Networks: Business Segmentation 2013
  • Exhibit 22: Juniper Networks: Business Segmentation by Revenue 2012 and 2013 ($ billions)
  • Exhibit 23: Juniper Networks: Sales by Geography 2013
  • Exhibit 24: McAfee: Product segmentation 2013
  • Exhibit 25: McAfee: Key locations
  • Exhibit 26: Palo Alto Networks: Business Segmentation by Revenue 2013
  • Exhibit 27: Palo Alto Networks: Business Segmentation by Revenue 2012 and 2013 (US$ million)
  • Exhibit 28: Palo Alto Networks: Geographical Segmentation by Revenue 2013
  • Exhibit 29: Symantec: Business segmentation by revenue 2013
  • Exhibit 30: Symantec: Business segmentation by revenue 2013 and 2014 ($ millions)
  • Exhibit 31: Symantec: Geographical segmentation by revenue 2013
  • Exhibit 32: Trend Micro: Geographical segmentation by revenue 2012 and 2013 ($ millions)
  • Exhibit 33: Trend Micro: Geographical segmentation by revenue 2013
Back to Top