表紙
市場調査レポート

サイバーセキュリティの北米市場:2015年〜2019年

Cyber Security Market in North America 2015-2019

発行 TechNavio (Infiniti Research Ltd.) 商品コード 332620
出版日 ページ情報 英文 128 Pages
即納可能
価格
本日の銀行送金レート: 1USD=101.75円で換算しております。
Back to Top
サイバーセキュリティの北米市場:2015年〜2019年 Cyber Security Market in North America 2015-2019
出版日: 2015年06月10日 ページ情報: 英文 128 Pages
概要

サイバーセキュリティソリューションは、企業がITシステムの機密性を保持するために、サイバー脅威を監視・検出・報告・反撃するものです。北米のサイバーセキュリティ市場は、2014年〜2019年のCAGRで、7.32%の増加が予測されています。

当レポートでは、北米のサイバーセキュリティ市場について調査分析し、市場規模と成長率、市場動向、市場促進要因・課題、市場機会について検証するほか、主要ベンダーなどについて、体系的な情報を提供しています。

第1章 エグゼクティブサマリー

第2章 略語リスト

第3章 調査範囲

  • 市場概要
  • 製品とサービス

第4章 市場調査手法

  • 市場調査プロセス
  • 調査手法

第5章 イントロダクション

第6章 市場考察

  • 世界の統計
  • 北米の統計
  • 世界のサイバー犯罪
  • 北米のサイバー犯罪
  • 世界のインターネット普及率
  • 北米のインターネット普及率
  • 世界のインターネットユーザー
  • 北米のインターネットユーザー:国別
  • 世界のインターネットユーザー:デバイス別
  • サイバー脅威のレベル
  • 世界のサイバーセキュリティ市場:脅威の種類別
  • サイバー攻撃の結果
  • 企業のBYOD導入に対するサイバー脅威の影響
  • 世界の大規模なデータ漏洩
  • 北米の大規模なデータ漏洩
  • フィッシング攻撃の犠牲者

第7章 サイバーセキュリティの必要性

第8章 サイバー攻撃:モバイルデバイスを標的

第9章 北米のサイバー攻撃

第10章 市場概要

  • サイバー脅威の種類
  • サイバーセキュリティソリューションの段階
  • サイバーセキュリティソリューションの利点
  • サイバーセキュリティソリューションのメリット

第11章 市場情勢

  • 市場概要
  • 製品ライフサイクル分析
  • 世界のサイバーセキュリティ市場
  • 北米のサイバーセキュリティ市場
  • 世界のサイバーセキュリティ市場における北米のシェア
  • ファイブフォース分析

第12章 市場区分:エンドユーザー別

  • エンドユーザー別

第13章 購入基準

第14章 市場成長促進要因

第15章 促進要因とその影響

第16章 市場の課題

第17章 促進要因と課題の影響

第18章 市場動向

第19章 動向とその影響

第20章 ベンダー情勢

  • 競合シナリオ
  • ベンダーニュースと最新情報
  • 主要ベンダーのリスト
  • ベンダーの比較
  • 主要ベンダーの概要
  • その他の有力ベンダー

第21章 その他の有力ベンダーの概要

  • BAE Systems
  • Brocade Communications Systems
  • Check Point Software Technologies
  • EMC2
  • HP
  • IBM
  • Juniper Networks
  • Kaspersky Lab
  • L-3 Communications
  • Lockheed Martin
  • Palo Alto Networks

第22章 主要ベンダー分析

  • Booz Allen Hamilton
  • Cisco Systems
  • CSC
  • Fortinet
  • General Dynamics
  • McAfee
  • Northrop Grumman
  • Symantec

第23章 市場の要点

第24章 関連レポート

図表

目次
Product Code: IRTNTR6094

About Cyber Security

Cyber security solutions help organizations monitor, detect, report, and counter cyber threats to maintain the confidentiality of IT systems. Internet penetration in emerging countries and usage of smartphones, tablets, and laptops and mobile apps have given rise to complex cyber-attacks on IT infrastructure. This has become a major concern for countries in North America. Organizations in North America need to adopt cyber security solutions to ensure the security of critical information stored on computer systems or digital memory devices.

Adoption of cloud services, wireless technologies, and accessing social media websites within organizations in North America have brought high level of risk in terms cyber threats. The growing complexities of cyber-attacks are prompting organizations in the government, BFSI, retail, telecom, and manufacturing sectors to adopt cyber security solutions to ensure security of critical information stored on their network servers or data centers. For instance, JPMorgan Chase was affected by data breach in 2014; hackers attempted to access its servers and gained access to the names, addresses, emails, and telephone numbers including savings account information of nearly 83 million customers.

Technavio's analysts forecast the cyber security market in North America to grow at a CAGR of 7.32% over the period 2014-2019.

Covered in this Report

The report covers the present scenario and the growth prospects of the cyber security market in North America for the period 2015-2019. To calculate the market size, the report considers revenue generated from the sales of cyber security solutions in North America. The market is highly fragmented with the presence of several small and large vendors. The report does not include the market share of all vendors; it only presents a list of key vendors and their corresponding detailed analysis.

Technavio's report, Cyber Security Market in North America 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in the market.

Key Vendors

  • Booz Allen Hamilton
  • Cisco Systems
  • CSC
  • Fortinet
  • General Dynamics
  • McAfee
  • Northrop Grumman
  • Symantec

Other Prominent Vendors

  • BAE Systems
  • Brocade Communications Systems
  • Check Point Software Technologies
  • EMC
  • HP
  • IBM
  • Juniper Networks
  • Kaspersky Lab
  • L-3 Communications
  • Lockheed Martin
  • McAfee
  • Palo Alto Networks
  • Raytheon

Market Driver

  • Growing Use of Mobile Devices
  • For a full, detailed list, view our report

Market Challenge

  • High Deployment Cost
  • For a full, detailed list, view our report

Market Trend

  • Demand for Cloud-based Security Solutions
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

1. Executive Summary

2. List of Abbreviations

3. Scope of the Report

  • 3.1. Market Overview

4. Market Research Methodology

  • 4.1. Market Research Process
  • 4.2. Research Methodology

5. Introduction

6. Market Insights

  • 6.1. Global Statistics 2014
  • 6.2. North America Statistics 2014
  • 6.3. Global Cybercrime 2014
  • 6.4. Cybercrime in North America 2014
  • 6.5. Global Internet Penetration
  • 6.6. Internet Penetration in North America
  • 6.7. Worldwide Internet Users
  • 6.8. Internet Users in North America by Country
  • 6.9. Global Internet Users by Devices
  • 6.1. Level of Cyber Threats
  • 6.11. Global Cyber Security Market by Type of Threat 2014
  • 6.12. Consequences of Cyber-attacks
  • 6.13. Impact of Cyber Threats on BYOD Adoption in Enterprises
  • 6.14. Major Global Data Breaches in 2014
  • 6.15. Major Data Breaches in North America in 2014
  • 6.16. Victims of Phishing Attacks 2014

7. Need for Cyber Security

8. Cyber-attacks: Targeting Mobile Devices

9. Cyber-attacks in North America 2014

10. Market Description

  • 10.1. Types of Cyber Threats
  • 10.2. Stages of Cybersecurity Solution
  • 10.3. Advantages of Cyber Security Solutions
  • 10.4. Benefits of Deployment of Cyber Security Solutions

11. Market Landscape

  • 11.1. Market Overview
  • 11.2. Product Life Cycle Analysis
  • 11.3. Global Cyber Security Market
    • 11.3.1. Market Size and Forecast
  • 11.4. Cyber Security Market in North America
    • 11.4.1. Market Size and Forecast
  • 11.5. Share of North America in Global Cyber Security Market in 2014
  • 11.6. Share of North America in Global Cyber Security Market 2014-2019
  • 11.7. Five Forces Analysis

12. Market Segmentation by End-user

  • 12.1. Cyber Security Market in North America by End-user 2014

13. Buying Criteria

14. Market Growth Drivers

15. Drivers and their Impact

16. Market Challenges

17. Impact of Drivers and Challenges

18. Market Trends

19. Trends and their Impact

20. Vendor Landscape

  • 20.1. Competitive Scenario
  • 20.2. Vendor News and Updates
    • 20.2.1. Key News
    • 20.2.2. Mergers and Acquisitions
  • 20.3. List of Key Vendors 2014
  • 20.4. Comparison of Vendors
    • 20.4.1. Comparison of Vendors Based on Geographical Presence
  • 20.5. Description of Key Vendors
    • 20.5.1. Booz Allen Hamilton
    • 20.5.2. Cisco Systems
    • 20.5.3. CSC
    • 20.5.4. Fortinet
    • 20.5.5. General Dynamics
    • 20.5.6. McAfee
    • 20.5.7. Northrop Grumman
    • 20.5.8. Symantec
  • 20.6. Other Prominent Vendors

21. Description of Other Prominent Vendors

  • 21.1. BAE Systems
    • 21.1.1. Strengths
    • 21.1.2. Weaknesses
  • 21.2. Brocade Communications Systems
    • 21.2.1. Strengths
    • 21.2.2. Weaknesses
  • 21.3. Check Point Software Technologies
    • 21.3.1. Strengths
    • 21.3.2. Weaknesses
  • 21.4. EMC²
    • 21.4.1. Strengths
    • 21.4.2. Weaknesses
  • 21.5. HP
    • 21.5.1. Strengths
    • 21.5.2. Weaknesses
  • 21.6. IBM
    • 21.6.1. Strengths
    • 21.6.2. Weaknesses
  • 21.7. Juniper Networks
    • 21.7.1. Strengths
    • 21.7.2. Weaknesses
  • 21.8. Kaspersky Lab
    • 21.8.1. Strengths
    • 21.8.2. Weaknesses
  • 21.9. L-3. Communications
    • 21.9.1. Strengths
    • 21.9.2. Weaknesses
  • 21.1. Lockheed Martin
    • 21.10.1. Strengths
    • 21.10.2. Weaknesses
  • 21.11. Palo Alto Networks
    • 21.11.1. Strengths
    • 21.11.2. Weaknesses

22. Key Vendor Analysis

  • 22.1. Booz Allen Hamilton
    • 22.1.1. Key Facts
    • 22.1.2. Business Overview
    • 22.1.3. Key Financials 2012-2014
    • 22.1.4. Business Strategy
    • 22.1.5. Recent Developments
    • 22.1.6. SWOT Analysis
  • 22.2. Cisco Systems
    • 22.2.1. Key Facts
    • 22.2.2. Business Overview
    • 22.2.3. Business Segmentation by Revenue
    • 22.2.4. Geographical Segmentation by Revenue
    • 22.2.5. Business Strategy
    • 22.2.6. Key Information
    • 22.2.7. SWOT Analysis
  • 22.3. CSC
    • 22.3.1. Key Facts
    • 22.3.2. Business Overview
    • 22.3.3. Business Segmentation by Revenue 2013
    • 22.3.4. Business Segmentation by Revenue 2012 and 2013
    • 22.3.5. Geographical Segmentation by Revenue 2013
    • 22.3.6. Business Strategy
    • 22.3.7. Recent Developments
    • 22.3.8. SWOT Analysis
  • 22.4. Fortinet
    • 22.4.1. Key Facts
    • 22.4.2. Business Overview
    • 22.4.3. Business Segmentation by Revenue
    • 22.4.4. Business Segmentation by Revenue
    • 22.4.5. Geographical Segmentation by Revenue
    • 22.4.6. Business Strategy
    • 22.4.7. Key Information
    • 22.4.8. Recent Developments
    • 22.4.9. SWOT Analysis
  • 22.5. General Dynamics
    • 22.5.1. Key Facts
    • 22.5.2. Business Overview
    • 22.5.3. Business Segmentation by Revenue 2013
    • 22.5.4. Business Segmentation by Revenue 2012 and 2013
    • 22.5.5. Geographical Segmentation by Revenue 2013
    • 22.5.6. Business Strategy
    • 22.5.7. Key Information
    • 22.5.8. SWOT Analysis
  • 22.6. McAfee
    • 22.6.1. Key Facts
    • 22.6.2. Business Overview
    • 22.6.3. Product Segmentation
    • 22.6.4. Key Locations
    • 22.6.5. Business Strategy
    • 22.6.6. Recent Developments
    • 22.6.7. SWOT Analysis
  • 22.7. Northrop Grumman
    • 22.7.1. Key Facts
    • 22.7.2. Business Overview
    • 22.7.3. Business Segmentation by Revenue 2013
    • 22.7.4. Business Segmentation by Revenue 2012 and 2013
    • 22.7.5. Business Strategy
    • 22.7.6. Key Developments
    • 22.7.7. SWOT Analysis
  • 22.8. Symantec
    • 22.8.1. Key Facts
    • 22.8.2. Business Overview
    • 22.8.3. Business Segmentation by Revenue 2013
    • 22.8.4. Business Segmentation by Revenue 2013 and 2014
    • 22.8.5. Geographical Segmentation by Revenue 2013
    • 22.8.6. Business Strategy
    • 22.8.7. Recent Developments
    • 22.8.8. SWOT Analysis

23. Market Takeaways

24. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Global Statistics 2014
  • Exhibit 3: North America Statistics 2014
  • Exhibit 4: Global Cybercrime 2014
  • Exhibit 5: Cybercrime in North America 2014
  • Exhibit 6: Global Internet Penetration
  • Exhibit 7: Internet Penetration in North America
  • Exhibit 8: Worldwide Internet Users 2000-2014 (billions)
  • Exhibit 9: Internet Users in North America by Country (millions of users)
  • Exhibit 10: Global Internet Users by Devices 2009-2014 (millions)
  • Exhibit 11: Level of Cyber Threats
  • Exhibit 12: Global Cyber Security Market by Type of Threat 2014
  • Exhibit 13: Consequences of Cyber-attacks
  • Exhibit 14: Global BYOD Adoption
  • Exhibit 15: Major Global Data Breaches in 2014
  • Exhibit 16: Major Data Breaches in North America in 2014
  • Exhibit 17: Victims of Phishing Attacks 2014
  • Exhibit 18: Stages of Cybersecurity Solution
  • Exhibit 19: Product Life Cycle Analysis
  • Exhibit 20: Global Cyber Security Market 2014-2019 ($ billions)
  • Exhibit 21: Cyber Security Market in North America 2014-2019 ($ billions)
  • Exhibit 22: Share of North America in Global Cyber Security Market in 2014
  • Exhibit 23: Share of North America in Global Cyber Security Market 2014-2019
  • Exhibit 24: Cyber Security Market in North America by End-user 2014-2019
  • Exhibit 25: List of Key Vendors 2014
  • Exhibit 26: Comparison of Vendors Based on Geographical Presence
  • Exhibit 27: Booz Allen Hamilton: Key Financials 2012-2014 ($ billions)
  • Exhibit 28: Business Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2011-2013 ($ billions)
  • Exhibit 30: Geographical Segmentation of Cisco Systems by Revenue 2013
  • Exhibit 31: Computer Sciences: Business Segmentation by Revenue 2013
  • Exhibit 32: Computer Sciences: Business Segmentation by Revenue 2012 and 2013 ($ billions)
  • Exhibit 33: Computer Sciences: Geographical Segmentation by Revenue 2013
  • Exhibit 34: Fortinet: Business Segmentation by Revenue 2013
  • Exhibit 35: Fortinet: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 36: Fortinet: Geographical Segmentation by Revenue 2013
  • Exhibit 37: General Dynamics: Business Segmentation by Revenue 2013
  • Exhibit 38: General Dynamics: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 39: General Dynamics: Geographical Segmentation by Revenue 2013
  • Exhibit 40: McAfee: Product Segmentation 2013
  • Exhibit 41: McAfee: Key Locations
  • Exhibit 42: Northrop Grumman: Business Segmentation by Revenue 2013
  • Exhibit 43: Northrop Grumman: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 44: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 45: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ millions)
  • Exhibit 46: Symantec: Geographical Segmentation by Revenue 2013
Back to Top