市場調査レポート
商品コード
1086404

サイバーセキュリティ市場予測:主要動向、競合のリーダーボード(2022年~2027年)

Cybersecurity: Key Trends, Competitor Leaderboard & Market Forecasts 2022-2027

出版日: | 発行: Juniper Research Ltd | ページ情報: 英文 | 納期: 即日から翌営業日

価格
価格表記: GBPを日本円(税抜)に換算
本日の銀行送金レート: 1GBP=198.76円
サイバーセキュリティ市場予測:主要動向、競合のリーダーボード(2022年~2027年)
出版日: 2022年06月06日
発行: Juniper Research Ltd
ページ情報: 英文
納期: 即日から翌営業日
  • 全表示
  • 概要
  • 目次
概要

当レポートでは、世界のサイバーセキュリティ市場について調査し、市場規模や予測、戦略、競合情勢、主要企業のプロファイルなどの情報を提供しています。

主要8地域、60か国別データ

  • アルジェリア
  • アルゼンチン
  • オーストラリア
  • オーストリア
  • バングラデシュ
  • ベルギー
  • ブラジル
  • カナダ
  • チリ
  • 中国
  • コロンビア
  • クロアチア
  • チェコ共和国
  • デンマーク
  • エクアドル
  • エジプト
  • フィンランド
  • フランス
  • ドイツ
  • ギリシャ
  • 香港
  • ハンガリー
  • インド
  • インドネシア
  • アイルランド
  • イスラエル
  • イタリア
  • 日本
  • ケニア
  • クウェート
  • マレーシア
  • メキシコ
  • ネパール
  • オランダ
  • ニュージーランド
  • ナイジェリア
  • ノルウェー
  • パキスタン
  • ペルー
  • フィリピン
  • ポーランド
  • ポルトガル
  • カタール
  • ルーマニア
  • ロシア
  • サウジアラビア
  • シンガポール
  • 南アフリカ
  • 韓国
  • スペイン
  • スウェーデン
  • スイス
  • タイ
  • トルコ
  • 英国
  • ウクライナ
  • アラブ首長国連邦
  • ウルグアイ
  • 米国
  • ベトナム

目次

第1章 要点と戦略的提言

第2章 サイバーセキュリティ:市場情勢の展望と動向

  • イントロダクション
  • 定義と範囲
  • 脅威の情勢
  • 現在のサイバーセキュリティ情勢
  • サイバーセキュリティの主な動向

第3章 サイバーセキュリティ:セグメント分析

  • サイバーセキュリティ:セグメント分析
    • クラウドセキュリティ
    • DDoS(分散型サービス拒否)の緩和
    • 電子メールのセキュリティ
    • エンドポイントセキュリティ
    • IAM
    • IoTセキュリティ
    • 脅威インテリジェンス
    • 統一脅威管理

第4章 競合のリーダーボードとベンダーのプロファイル

  • 当レポートを読む理由
  • ベンダープロファイル
    • AWS
    • Cisco
    • Forcepoint
    • Fortinet
    • IBM
    • Imperva
    • Micro Focus
    • Oracle
    • Palo Alto Networks
    • Proofpoint
    • RSA Security
    • Sophos
    • Splunk
    • Symantec
    • Trellix
    • Trend Micro
  • Juniper Researchリーダーボード評価調査手法
    • 制限と解釈

第5章 サイバーセキュリティ市場の予測

  • イントロダクション
  • 調査手法と前提条件
    • サイバーセキュリティ支出の前提条件
    • データ侵害の前提条件
  • サイバー犯罪違反の予測
    • 違反数
    • サイバーセキュリティ市場の支出予測
目次

Juniper Research's new “Cybersecurity” research report provides a highly detailed analysis of this rapidly changing market. This assessment features an examination of the different segments growing within the cybersecurity space, including:

  • Cloud security
  • DDoS (Distributed Denial of Service) Mitigation
  • Email Security
  • Endpoint Security
  • IAM (Identity & Access Management)
  • IoT Security
  • Threat Intelligence
  • Unified Threat Management

The report also presents extensive market forecasts; delivering detailed insights and whole market sizing across both enterprise cybersecurity spend, split by large, medium and small enterprises, and the volume and cost of data breaches to business. The report also positions 16 cybersecurity vendors in the Juniper Research Competitor Leaderboard; providing an invaluable resource for stakeholders seeking to understand the competitive landscape of this dynamic market.

This research suite comprises:

  • Strategy & Forecasts (PDF)
  • 5-year Market Sizing & Forecast Spreadsheet (Excel)
  • 12 months' access to harvest Online Data Platform

KEY FEATURES

  • Market Dynamics: Detailed assessment of how cybersecurity technologies are being deployed, and the future trends that will influence this highly dynamic area. This includes the most prominent evolving threats, such as ransomware, malware and supply chain attacks.
  • Segment Analysis: Future outlook for the development of eight different cybersecurity markets, including:
    • Cloud Security
    • DDoS (Distributed Denial of Service) Mitigation
    • Email Security
    • Endpoint Security
    • IAM (Identity & Access Management)
    • IoT Security
    • Threat Intelligence
    • Unified Threat Management
  • Juniper Research Competitor Leaderboard: Key player capability and capacity assessment for 16 cybersecurity vendors:
    • AWS
    • Cisco
    • Forcepoint
    • Fortinet
    • IBM
    • Imperva
    • Micro Focus
    • Oracle
    • Palo Alto Networks
    • Proofpoint
    • RSA Security
    • Sophos
    • Splunk
    • Symantec
    • Trellix
    • Trend Micro
  • Benchmark Industry Forecasts: 5-year forecasts provided for total number of businesses using cybersecurity solutions and total enterprise cybersecurity spend, split by business size (small, medium and large businesses). Juniper Research also provides 5-year forecasts for the total volume of criminal data breaches, total number of data records exposed and the cost of data breaches to businesses. Data is also split by our 8 key regions and the 60 countries listed below:
    • Algeria
    • Argentina
    • Australia
    • Austria
    • Bangladesh
    • Belgium
    • Brazil
    • Canada
    • Chile
    • China
    • Colombia
    • Croatia
    • Czech Republic
    • Denmark
    • Ecuador
    • Egypt
    • Finland
    • France
    • Germany
    • Greece
    • Hong Kong
    • Hungary
    • India
    • Indonesia
    • Ireland
    • Israel
    • Italy
    • Japan
    • Kenya
    • Kuwait
    • Malaysia
    • Mexico
    • Nepal
    • Netherlands
    • New Zealand
    • Nigeria
    • Norway
    • Pakistan
    • Peru
    • Philippines
    • Poland
    • Portugal
    • Qatar
    • Romania
    • Russia
    • Saudi Arabia
    • Singapore
    • South Africa
    • South Korea
    • Spain
    • Sweden
    • Switzerland
    • Thailand
    • Turkey
    • UK
    • Ukraine
    • United Arab Emirates
    • Uruguay
    • US
    • Vietnam

KEY QUESTIONS ANSWERED

  • 1. Who are the most successful players in the cybersecurity space, and why?
  • 2. What are the largest segments for growth within cybersecurity?
  • 3. How is the role of machine learning within cybersecurity changing?
  • 4. What is the value of the cybersecurity market today, and what will it be in 2027?
  • 5. Which factors will drive the adoption of cybersecurity solutions?

COMPANIES REFERENCED

  • Included in the Juniper Research Competitor Leaderboard: AWS, Cisco, Forcepoint, Fortinet, IBM, Imperva, Micro Focus, Oracle, Palo Alto Networks, Proofpoint, RSA Security, Sophos, Splunk, Symantec, Trellix, Trend Micro.
  • Mentioned: ACBA-Credit Agricole Bank, Accenture, Acer, ACI Worldwide, Acorn Campus Ventures, adidas, Adobe, Alibaba, Anthem, Apple, Aviva, Axway, Bayer, BBVA, BDO Israel, Best Buy, Bitglass, Boeing, Bosch, Braintrace, Bridgecrew, Broadcom Software Group, BT, Capsule8, Checkpoint Software Technologies, China Development Bank, CISA (Cybersecurity and Infrastructure Security Agency), Claroty, Cloudflare, Cloudreach, CloudVector, Cloudvisory, Coca Cola, Cognizant, CrowdStrike, CVS, CyberArk, Cyberink, Deep Secure, DEFTA Partners, Dell, Deloitte, Deutsche Bank, DHL, Dropbox, EMC, Equifax, Esri, European Commission, Forbes, ForeScout, Fujitsu, GE, GlobalSign, Globespan Capital Brothers, GoDaddy, Goldman Sachs, Google, Grab, Hewlett Packard, Honda, Honeywell, Imperva, Infosys, Instagram, Intel, Juniper Networks, Kenna Security Inc, Kyndryl, L'Oréal, Lehman Brothers, Lenovo, Liberty Mutual, Los Angeles World Airports, Mars, MassMutual, McAfee, Meritech Capital Partners, Meta, Microsoft, MySQL, Nasdaq, Nasstar, National Cyber Security Centre, National Grid, Netflix, NHS, Nissan, Okta, Opaq, Orange, Panopta, Peter Norton Computing Inc, Pfizer, PUMA, PwC, Qantas, Radware, ReaQta, Red Hat, Refactr, Respond Software, Reuters, Salesforce, Saltworks, SAP, Sequoia Capital, ShieldX Networks, Shopify, Siemens, Singtel, Slack, Société Generale, SolarWinds, Splunk, Symantec, TalkTalk, Telefónica, Thales, The National Gallery, Thoma Bravo, Thomson, Toshiba, ThousandEyes, Toyota, TruSTAR, United Airlines, University of South Carolina, Verizon, VMware, Vodafone, Volkswagen, Walmart, Waterfall Security, Wipro, Zoom.

DATA & INTERACTIVE FORECAST

Juniper Research's “Cybersecurity” forecast suite includes:

  • Forecast splits for 8 key regions, as well as 60 country-level data splits for:
    • Algeria
    • Argentina
    • Australia
    • Austria
    • Bangladesh
    • Belgium
    • Brazil
    • Canada
    • Chile
    • China
    • Colombia
    • Croatia
    • Czech Republic
    • Denmark
    • Ecuador
    • Egypt
    • Finland
    • France
    • Germany
    • Greece
    • Hong Kong
    • Hungary
    • India
    • Indonesia
    • Ireland
    • Israel
    • Italy
    • Japan
    • Kenya
    • Kuwait
    • Malaysia
    • Mexico
    • Nepal
    • Netherlands
    • New Zealand
    • Nigeria
    • Norway
    • Pakistan
    • Peru
    • Philippines
    • Poland
    • Portugal
    • Qatar
    • Romania
    • Russia
    • Saudi Arabia
    • Singapore
    • South Africa
    • South Korea
    • Spain
    • Sweden
    • Switzerland
    • Thailand
    • Turkey
    • UK
    • Ukraine
    • United Arab Emirates
    • Uruguay
    • US
    • Vietnam
  • Cybersecurity forecasts, including enterprise cybersecurity spend split by business size. (small, medium and large), as well as the number and cost of data breaches to businesses.
  • Interactive scenario tool allowing users to manipulate Juniper Research's data for four different metrics.
  • Access to the full set of forecast data of 28 tables and more than 12,700 datapoints.

Juniper Research's highly granular IFxls (interactive Excels) enable clients to manipulate our forecast data and charts to test their own assumptions, by using the interactive scenario tool, and compare select markets side by side in customised charts and tables. IFXLs greatly increase the clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

1. Key Takeaways & Strategic Recommendations

  • 1.1. Key Takeaways
  • 1.2. Strategic Recommendations

2. Cybersecurity: Market Landscape & Trends

  • 2.1. Introduction
  • 2.2. Definitions and Scope
  • 2.3. The Threat Landscape
    • Figure 2.1: Third-party Software Provider Attack Cycle
  • 2.4. Current Cybersecurity Landscape
  • 2.5. Key Cybersecurity Trends

3. Cybersecurity: Segment Analysis

  • 3.1. Cybersecurity: Segment Analysis
    • 3.1.1. Cloud Security
      • Figure 3.1: Cloud Security Shared Responsibility Map
      • Figure 3.2: AWS Cloud Shared Responsibility Model
    • 3.1.2. DDoS (Distributed Denial of Service) Mitigation
      • Figure 3.3: DDoS Mitigation Stages
    • 3.1.3. Email Security
    • 3.1.4. Endpoint Security
    • 3.1.5. IAM
    • 3.1.6. IoT Security
      • Figure 3.4: Holistic IoT Security
    • 3.1.7. Threat Intelligence
    • 3.1.8. Unified Threat Management
      • Figure 3.5: Bastion Jump Box/Bastion Host

4. Competitor Leaderboard & Vendor Profiles

  • 4.1. Why Read This Report
    • Table 4.1: Juniper Research Leaderboard: Cybersecurity Vendors Included & Product Portfolio
    • Figure 4.2: Juniper Research Leaderboard for Cybersecurity Vendors
    • Table 4.3: Juniper Research Leaderboard Vendors & Positioning
    • Table 4.4: Juniper Research Competitor Leaderboard Heatmap: Cybersecurity
  • 4.2. Vendor Profiles
    • 4.2.1. AWS
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.5: AWS Security Hub
        • Figure 4.6: AWS Web Application Firewall
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.2. Cisco
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.7: Cisco Secure X Platform
        • Figure 4.8: Cisco Umbrella Solution
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.3. Forcepoint
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.4. Fortinet
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.9: FortiSASE Overview
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.5. IBM
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.10: IBM QRadar SIEM Capabilities
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.6. Imperva
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.11: Imperva Data Risk Analytics Dashboard
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.7. Micro Focus
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.8. Oracle
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.9. Palo Alto Networks
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.10. Proofpoint
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.12: Proofpoint Supernova Platform Capabilities
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.11. RSA Security
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.12. Sophos
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.13: Sophos Zero Trust Network Access
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.13. Splunk
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.14. Symantec
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 4.14: Symantec's Zero Trust
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.15. Trellix
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
    • 4.2.16. Trend Micro
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients and Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Strategic Recommendations and Key Opportunities
  • 4.3. Juniper Research Leaderboard Assessment Methodology
    • 4.3.1. Limitations & Interpretation
      • Table 4.15: Juniper Research Leaderboard Assessment Criteria

5. Cybersecurity Market Forecasts

  • 5.1. Introduction
  • 5.2. Methodology & Assumptions
    • 5.2.1. Cybersecurity Spend Assumptions
    • 5.2.2. Data Breaches Assumptions
      • Figure 5.1: Data Breaches Forecast Methodology
      • Figure 5.2: Cybersecurity Spend Forecast Methodology
  • 5.3. Cybercrime Breaches Forecasts
    • 5.3.1. Breaches Volume
      • Figure & Table 5.3: Total Number of Criminal Data Breaches per annum, Split 8 Key Regions 2022-2027
    • 5.3.2. Cybersecurity Market Spend Forecast
      • Figure & Table 5.4: Total Cybersecurity Spend per annum ($m), Split by 8 Key Regions, 2022-2027