特集 : 国別レポートが13,000件から検索可能になりました!

特集 : 海外市場の委託調査がセミカスタムベースでお手軽にできます

株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

サイバー犯罪 & サイバーセキュリティの将来:脅威分析・影響評価・主要ベンダー 2019-2024年

The Future of Cybercrime & Security: Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024

発行 Juniper Research Ltd 商品コード 677119
出版日 ページ情報 英文
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1GBP=143.38円で換算しております。
サイバー犯罪 & サイバーセキュリティの将来:脅威分析・影響評価・主要ベンダー 2019-2024年 The Future of Cybercrime & Security: Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024
出版日: 2019年08月27日 ページ情報: 英文
概要

当レポートでは、サイバーセキュリティの現在の市場環境および脅威の情勢について調査し、サイバーセキュリティ法の状況、主要企業の戦略、およびエンドポイント & ネットワークセキュリティ、クラウドセキュリティ & ID & アクセス管理、IoT & デバイスセキュリティにフォーカスし、市場に影響を及ぼす全体的な動向に関する情報などをまとめています。

第1章 サイバー犯罪 & サイバーセキュリティ:要点

  • サイバー犯罪
  • サイバーセキュリティ

第2章 サイバー犯罪の動向 & 展望

  • イントロダクション
  • 定義 & 類型
  • サイバー犯罪の動向
  • サイバー犯罪脅威の評価
    • 金融の脅威
    • デバイスの脅威
  • サイバー犯罪ブリーチの予測

第3章 サイバーセキュリティの動向

  • イントロダクション
  • サイバーセキュリティの動向
  • サイバーセキュリティ市場の予測
  • 規制環境
    • 北米
    • ラテンアメリカ
    • 欧州
    • アジア太平洋

第4章 サイバーセキュリティ部門の展望 & 競合分析

  • サイバーセキュリティ市場部門の展望
    • クラウドセキュリティ
    • IAM (ID & アクセス管理)
    • エンドポイントセキュリティ
    • スレットインテリジェンス
  • サイバーセキュリティ市場部門の競合分析
    • ベンダー評価基準
    • クラウドセキュリティプロバイダーのリーダーボード
    • ID & アクセス管理のリーダーボード
    • エンドポイントセキュリティのリーダーボード
    • 制限事項
目次

Overview

‘The Future of Cybercrime & Security’ provides a thorough examination of the current market environment and threat landscape for cybersecurity. The research presents vital information on the state of cybersecurity legislation, in-depth analysis of player strategies and an assessment of the overall trends affecting the market, focusing on the following areas:

  • Endpoint & Network Security
  • Cloud Security & Identity & Access Management
  • IoT & Device Security

The research includes:

  • Market Trends & Opportunities (PDF)
  • 5-Year Market Sizing & Forecast spreadsheet (Excel)

Key Features

  • Threat Landscape: See what are the main cyberthreats for enterprises and consumers in 2019 and beyond, for the following key sectors:
    • Banking & Finance
    • Consumer Devices
    • IoT
  • Market Dynamics: Strategic assessment of the current market landscape, examining future developments across the cybersecurity market, including segment by segment analysis.
  • Regulatory Guide: Examination of the range of cybersecurity legislation in place across 13 territories, and an analysis of their implications and future development.
  • Juniper Leaderboards & Vendor Analysis: Key player capability and capacity assessment for 48 enterprise cybersecurity providers, split by:
    • Endpoint Security Leaderboard
    • Cloud Cybersecurity Leaderboard
    • Identity & Access Management Leaderboard
    • Security Awareness Training Leaderboard
  • Market Sizing: 5-year forecasts for both the cost of cybersecurity data breaches and levels of enterprise cybersecurity spending.

Key Questions

  • 1. How are cyberthreats evolving in an ever-more connected landscape?
  • 2. Where are the biggest vulnerabilities in the current digital environment?
  • 3. How are the key players in cybersecurity players reacting to the latest market developments?
  • 4. What are the strategies of the leading players in key cybersecurity segments?
  • 5. What are governments doing to support greater cybersecurity?

Companies Referenced

  • Included in Juniper Leaderboards: Akamai, Alert Logic, AlienVault, Avast, Avoco Secure, Barkly, Carbon Black, Centrify, CipherCloud, CloudFlare, Cofense, Cyberark, Cylance, DarkTrace, Duo, Everynym, FireEye, Forcepoint, Forgerock, IBM, Illumio, Infosec Institute, KnowB4, Lookout, Minerva, Netskope, Okta, Oracle, Paladion, Palo Alto Networks, Ping, Proofpoint, Qualys, RSA, SailPoint, SANS Institute, SecureWorks, SentinelOne, SentryBay, SonicWall, Sophos, Symantec, Tanium, The Defence Works, Trend Micro, Webroot, Yoti, Zscaler.
  • Mentioned: Apple, AT&T, Australian Notifiable Data Breaches, Blackpoint Cyber, Broadcom, CA Technologies, Citizensafe, Deloitte, ESET, Facebook, FDA (Food and Drug Administration), Federal Trade Commission, FIDO Alliance, First American Mortgage, GB Group, Gemalto/Thales, Google, Harris Interactive, HSBC Bank, IMF, INAI (National Institute for Transparency, Access to Information and Personal Data Protection), Information Commissioner's Office, Iovation, ISO, iWelcome, JanRain, Kaspersky, LightCyber, McAfee, Medtronic, Metro Bank, Microsoft, MVine, National Data Protection Authority, NetIQ, NetScout, NetWatcher, Neustar, NIST (National Institute of Standards and Technology), OECD, OIX, Positive Technologies, ProofPoint, PureSec, Royal Mail, SecureKey, Sift Security, Skyfence, Sovrin Foundation, Tax Investment and Saving Association, The Ponemon Institute, TwistLock, Verified.me, Verizon, WeChat, WhatsApp, WTO (World Trade Organisation).

Data & Interactive Forecast

Juniper's ‘The Future of Cybercrime & Security’ forecast suite includes:

  • Cybersecurity spend forecast splits for 8 key regions and 8 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Data breach volume and value forecast splits for 8 key regions and 8 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Interactive Scenario tool allowing user the ability to manipulate Juniper's data for 10 different metrics.
  • Access to the full set of forecast data of 28 tables and over 3,700 datapoints.

Juniper Research's highly granular IFxls (Interactive Excels) enable clients to manipulate Juniper's forecast data and charts to test their own assumptions using the Interactive Scenario Tool, and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

1. The Outlook for Cybercrime & Financial Services

  • 1.1 Introduction
  • 1.2 Key Takeaways

2. Cybercrime Trends

  • 2.1 Introduction
  • 2.2 Definitions & Typology
    • 2.2.1 Incident Types
    • 2.2.2 Attack Types
      • i. DoS & DDoS
      • ii. Phishing
      • iii. Trojans
      • iv. Keylogging
      • v. MITM Attacks
      • vi. Scrapers & Skimmers
      • vii. Ransomware
      • viii. Botnets
      • ix. Cryptojacking
      • x. Quantum Computing
    • 2.2.3 Motivations
  • 2.3 Cybercrime Trends
    • Figure 2.1: DDoS Attack Trends
    • Case Study: Smarter Botnets Take on Businesses
      • Figure 2.2: Multi-Vector DDoS Attacks
  • 2.4 Juniper Cybercrime Threat Assessments
    • 2.4.1 Financial Threat Assessments
      • i. Banking
        • Figure 2.3: Juniper Research 2019 Banking Cybercrime Threat Landscape Assessment
        • Figure 2.4: Juniper Research Banking Cybercrime Future Threat Landscape .... 18 ii. Payments & Money Transfer
        • Figure 2.12: Forecast
        • Figure 2.5: Juniper Research 2019 Payments & Money Transfer Cybercrime Threat Landscape Assessment
        • Figure 2.6: Juniper Research Payments & Money Transfer Cybercrime Future Threat Landscape
      • iii. Mobile Wallets
        • Figure 2.7: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape Assessment
        • Figure 2.8: Juniper Research Mobile Wallets Cybercrime Future Threat Landscape
    • 2.4.2 Device Threat Assessment
      • i. Smartphones
        • Figure 2.9: Juniper Research 2019 Smartphone Cybercrime Threat Landscape Assessment
        • Figure 2.10: Juniper Research Smartphone Cybercrime Future Threat Landscape
      • ii. IoT Devices
        • Figure 2.11: Juniper Research 2019 IoT Cybercrime Threat Landscape Assessment
        • Figure 2.12: Juniper Research 2019 IoT Cybercrime Threat Landscape
  • 2.5 Cybercrime Breach Forecast
    • 2.5.1 Methodology
      • Figure 2.13: Criminal Data Breach Forecast Methodology
      • i. Forecast Assumptions & Limitations of Analysis
  • 2.6 Cybercrime Breaches Forecasts
    • 2.6.1 Breaches Volume
      • Figure & Table 2.14: Total Number of Criminal Data Breaches per annum, Split by 8 Key Regions, 2019-2024
    • 2.6.2 Data Breaches Value
      • Figure & Table 2.15: Cost of Criminal Data Breaches per annum ($m), Split by 8 Key Regions 2019-2024

3. Cybersecurity Trends

  • 3.1 Introduction
    • 3.1.1 Definitions
  • 3.2 Cybersecurity Trends
    • Figure 3.1: Threats & Alerts Investigation Rate
  • 3.3 Cybersecurity Market Forecasts
    • 3.3.1 Cybersecurity Spend Forecast Methodology
      • Figure 3.2: Cybersecurity Spend Forecast Methodology
    • 3.3.2 Forecast Assumptions & Limitations of Analysis
    • 3.3.3 Cybersecurity Market Spend Forecast
      • Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key Regions 2019-2024
  • 3.4 Regulatory Environment
    • 3.4.1 North America
      • i. US
      • ii. Canada
    • 3.4.2 Latin America
      • i. Argentina
      • ii. Brazil
      • iii. Mexico
    • 3.4.3 Europe
      • i. EU
      • ii. Germany
      • iii. Russia
      • iv. Turkey
      • v. UK
    • 3.4.4 Asia Pacific
      • i. China
      • ii. Japan
      • iii. India

4. Cybersecurity Sector Outlook & Competitive Analysis

  • 4.1 Cybersecurity Market Sectors Outlook
    • 4.1.1 Cloud Security
    • 4.1.2 IAM (Identity & Access Management)
    • 4.1.3 Endpoint Security
    • 4.1.4 Threat Intelligence
    • 4.1.5 Security Awareness Training
  • 4.2 Cybersecurity Market Sectors Competitive Analysis
    • 4.2.1 Vendor Assessment Criteria
      • Table 4.1: Cybersecurity Vendor Assessment Criteria
    • 4.2.2 Cloud Security Providers Leaderboard
      • Figure 4.2: Juniper Research Leaderboard for Cloud Security Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.3 Identity & Access Management Leaderboard
      • Figure 4.3: Juniper Research Leaderboard for IAM Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disrupters & Emulators
    • 4.2.4 Endpoint Security Leaderboard
      • Figure 4.4: Juniper Leaderboard for Endpoint Security Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.5 Security Awareness Training Vendors
      • Figure 4.5: Juniper Leaderboard for Security Awareness Training Vendors
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.6 Limitations & Interpretation