表紙
市場調査レポート

サイバー戦争市場予測:主要企業の将来展望

Cyberwarfare Market Forecast 2014-2024: Future Prospects for Leading Players

発行 Visiongain Ltd 商品コード 256992
出版日 ページ情報 英文 261 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1GBP=137.27円で換算しております。

ご注意:
Single UserとDepartmentalライセンスは、DRM (デジタル著作権管理システム) 付PDFになります。
制限内容は、上記ライセンスの[?]アイコンをクリックしてご確認ください。

Back to Top
サイバー戦争市場予測:主要企業の将来展望 Cyberwarfare Market Forecast 2014-2024: Future Prospects for Leading Players
出版日: 2014年03月10日 ページ情報: 英文 261 Pages
概要

当レポートでは、サイバー戦争市場の包括的分析とともに、同市場の予測、主要国における機会、市場に参入する主要企業のプロファイルと製品、サービス、戦略、今後の見通しなどをまとめ、概略下記の構成で取り上げております。

第1章 エグゼクティブサマリー

第2章 サイバー戦争市場のイントロダクション

  • サイバー戦争とは
  • サイバー戦争市場構造の概要
  • サイバー攻撃、武器および防御
  • 主なサイバー攻撃のリスト

第3章 世界のサイバー戦争市場の予測

  • 世界のサイバー戦争市場の予測
  • 世界のサイバー戦争市場の分析
  • 世界のサイバー戦争市場の促進因子と阻害因子
  • 世界のサイバー戦争市場の予測
  • 世界のサイバー戦争市場の成長率
  • 急成長するサイバー戦争市場の2次市場
  • 主要15サイバー戦争地域の市場シェア予測
  • サイバー戦争市場の累積額
  • 主要15地域のサイバー戦争市場の累積額
  • サイバー戦争2次市場の累積額

第4章 主要15地域のサイバー戦争市場

  • 主要地域のサイバー戦争市場シェア予測
  • 米国
  • 中国
  • 韓国
  • 英国
  • ロシア
  • フランス
  • イスラエル
  • ドイツ
  • 日本
  • イタリア
  • オーストラリア
  • カナダ
  • インド
  • 中東
  • ブラジル
  • その他
  • 主要国

第5章 サイバー戦争の2次市場

  • サイバー戦争の2次市場の予測
  • サイバー戦争の軍事市場
  • サイバー戦争の政府市場

第6章 SWOT分析

第7章 サイバー戦争市場における主要12企業

  • BAE Systems
  • Booz Allen Hamilton
  • Computer Science Corporation
  • EADS (Airbus Group)
  • General Dynamics Corporation
  • Hewlett Packard (HP) Company
  • International Business Machines (IBM) Corporation
  • Intel Corporation (incl. McAfee, Inc.)
  • L-3 Communications
  • Lockheed Martin Corporation
  • Northrop Grumman Corporation
  • Raytheon Company

第8章 結論

  • 市場展望
  • 主な調査結果
  • 地域・地理的変動

第9章 用語

図表

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次

The global cyberwarfare market is currently, despite sustained attention and prior spending, still very much a formative presence in the global defence and security industry, lacking either clear direction (or even formal definition). Substantial debate remains as to whether 'cyberwarfare' is more properly an appendage of 'information war,' or retains the properties of other military sectors (such as electronic warfare). Yet, despite lacking a clear conceptual framework, spending in the cyberwarfare market is already substantial, as a range of governments and global military organisations move to secure their networks and is expected to increase further over the course of the forecast period, 2014-2024. Visiongain anticipates that growth will be significant, albeit subject to significant fluctuation, with several markets increasing in size several times over.

Why you should buy Cyberwarfare Market Forecast 2014-2024: Future Prospects for Leading Players

What is the future of the cyber warfare market? Visiongain's comprehensive analysis contains highly quantitative content delivering solid conclusions benefiting your analysis and illustrates new opportunities and potential revenue streams helping you to remain competitive. This definitive report will benefit your decision making and help to direct your future business strategy.

We guarantee that you will receive key information which will benefit you in the following way

  • View cyberwarfare market forecasts and analysis from 2014-2024 to keep your knowledge ahead of your competition and ensure you exploit key business opportunities
    • The report provides detailed sales projections of the market, the competitors, and the commercial drivers and restraints allowing you to more effectively compete in the market. In addition to market forecasts from 2014-2024, our new study shows current market data, market shares, original critical analysis, and revealing insight into commercial developments
  • Why struggle to find key market data? Why miss crucial information? Our comprehensive report provides instant market insight
    • Our 261 page report provides 203 tables, charts, and graphs providing details of contracts and programmes. Let our analysts present you with a thorough assessment of the current and future cyberwarfare market prospects.
    • This analysis will achieve quicker, easier understanding. Also you will gain from our analyst's industry expertise allowing you to demonstrate your authority on the cyberwarfare market.
  • Discover sales predictions for the key end use submarkets from 2014-2024
    • What are the driving dynamics of the cyberwarfare markets? How will these markets expand? Which submarkets will generate the most revenue? Use our forecasts and expert insight to grow your business and give you more industry influence. Find where you can gain and how your organisation can succeed. Avoid falling behind. Stay informed about the potential for each of these cyberwarfare submarkets with individual forecasts and analysis from 2014-2024.
    • Military Cyberwarfare
    • Government Cyberwarfare
  • Understand the prospects for the leading regional cyberwarfare markets - where will the highest revenues and opportunities occur?
    • Learn about the market potential for cyberwarfare companies in developed and developing countries, from 2013 onwards. You will see where and how opportunities exist with revealing individual market forecasts and analysis for 2014-2024 for 15 leading regional markets:
    • US
    • PRC
    • ROK
    • UK
    • Russia
    • France
    • Israel
    • Germany
    • Japan
    • Italy
    • Australia
    • Canada
    • India
    • Middle East
    • Brazil
    • Rest of the World (ROW)
  • Find out about the market dynamics & opportunities in 15 leading regions
    • Understand industry activity with detailed data revealing where companies are earning their revenues and with what products and with which technology.
    • You will be able to examine detailed tables of significant regional contracts, projects & programmes.
  • Explore the factors affecting product developers, and everyone within the value chain. Learn about the forces influencing market dynamics.
  • Identify who the leading companies are in the cyberwarfare market
    • Our report reveals the technologies and companies which hold the greatest potential. In particular, exploring and analyzing the activities of these companies: See where the expected gains will be. Prospects for advances in the cyberwarfare industry are strong, and from 2014 it holds many opportunities for revenue growth. View Visiongain's assessment of the prospects for established competitors, rising companies, and new market entrants. Our work explains that potential, helping you stay ahead. Gain a thorough understanding of the competitive landscape with profiles of 12 leading cyberwarfare companies examining their positioning, capabilities, product portfolios, R&D activity, services, focus, strategies, M&A activity, and future outlook.
    • BAE Systems plc
    • Booz Allen Hamilton Inc
    • Computer Sciences Corporation (CSC)
    • EADS Group/ Airbus Defence & Space
    • General Dynamics Corporation
    • Hewlett Packard Company
    • International Business Machine Corporation (IBM)
    • Intel Corporation
    • L-3 Communications Holdings Inc
    • Lockheed Martin Corporation
    • Northrop Grumman Corporation
    • Raytheon Company

Discover Information found nowhere else in this independent assessment of the cyberwarfare market

The Cyberwarfare Market Forecast 2014-2024: Future Prospects for Leading Players report provides impartial cyberwarfare sector analysis. With the independent business intelligence found only in our work, you will discover where the prospects are for profit. In particular, our new research provides you with key strategic advantages: Our informed forecasts, independent and objective analysis, exclusive interviews and revealing company profiles will provide you with that necessary edge, allowing you to gain ground over your competitors.

With this report you are less likely to fall behind in knowledge or miss crucial business opportunities. You will save time and receive recognition for your market insight. See how you this report could benefit and enhance your research, analysis, company presentations and ultimately your individual business decisions and your company's prospects.

What makes this report unique?

Visiongain's research methodology involves an exclusive blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global, submarket and regional markets forecasts from 2014-2024

Why choose visiongain business intelligence?

Visiongain's increasingly diverse sector coverage strengthens our research portfolio. The growing cross-sector convergence of key verticals and the interplay of game changing technologies across hitherto unrelated industries are creating new synergies, resulting in new business opportunities for you to leverage.

As such, visiongain's team of London based in-house analysts offer a wealth of knowledge and experience to inform your strategic business decisions. Let visiongain guide you.

How Cyberwarfare Market Forecast 2014-2024: Future Prospects for Leading Players can benefit you

Visiongain's report is for anyone requiring analysis of the cyberwarfare market. You will discover market forecasts, technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are. Don't miss this key opportunity to gain a competitive advantage.

Avoid falling behind your competitors, overlooking critical business opportunities or losing industry influence. In our new report you will discover forecasts from 2014-2024 at the global, submarket, and national level. The report also assesses technologies, competitive forces and expected product pipeline developments. Read on to discover the prospects for the cyberwarfare sector and find out what its future market prospects are.

Table of Contents

1. Executive Summary

  • 1.1 Global Cyberwarfare Market Overview
  • 1.2 Benefits of This Report
  • 1.3 Who is This Report For?
  • 1.4 Methodology

2. Introduction to the Cyberwarfare Market

  • 2.1 What is Cyberwarfare?
  • 2.2 The Cyberwarfare Market Structure Overview
  • 2.3 Cyberwarfare Attacks, Weapons & Defences
    • 2.3.1 Mechanisms of Cyber Attack
    • 2.3.2 Cyber Weaponry
    • 2.3.3 Methods of Cyber Defence
  • 2.4 List of Major Cyber Attacks
    • 2.4.1 Estonia
    • 2.4.2 Operation Orchard
    • 2.4.4 Conficker
    • 2.4.5 Pentagon
    • 2.4.6 Aurora
    • 2.4.7 Chinese Diversion of Internet Traffic
    • 2.4.8 Stuxnet
    • 2.4.9 Duqu
    • 2.4.10 RSA
    • 2.4.11 Sony
    • 2.4.12 Operation Shady RAT
    • 2.4.13 Mitsubishi Heavy Industries
    • 2.4.14 Flame / Operation: Olympic Games
    • 2.4.15 Aramco
    • 2.4.16 PRISM

3. Global Cyberwarfare Market Forecast 2014-2024

  • 3.1 The Global Cyberwarfare Market Forecast 2014-2024
  • 3.2 The Global Cyberwarfare Market Analysis 2014-2024
  • 3.3 Global Cyberwarfare Drivers & Restraints
  • 3.4 The Global Cyberwarfare Market Forecast 2014-2024
  • 3.5 The Global Cyberwarfare Market Growth Rates
  • 3.6 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets
    • 3.6.1 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets 2014-2024
    • 3.6.2 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets 2014-2019
    • 3.6.3 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets 2019-2024
  • 3.7 Fastest Growing Cyberwarfare Submarkets
    • 3.7.1 Fastest Growing Cyberwarfare Submarkets 2014-2024
    • 3.7.2 Fastest Growing Cyberwarfare Submarkets 2014-2019
    • 3.7.3 Fastest Growing Cyberwarfare Submarkets 2019-2024
  • 3.8 Leading 15 Regional Cyberwarfare Markets Share Forecast 2014-2024
  • 3.9 Cumulative Value of the Cyberwarfare Market 2014-2024
  • 3.10 Cumulative Value of the Leading 15 Regional Cyberwarfare Markets 2014-2024
  • 3.11 Cumulative Value of the Cyberwarfare Submarkets 2014-2024

4. Leading 15 Regional Cyberwarfare Markets 2014-2024

  • 4.1 Leading Regional Cyberwarfare Markets Share Forecast 2014-2024
  • 4.2 US Cyberwarfare Market 2014-2024
    • 4.2.1 US Cyberwarfare Market Forecast
    • 4.2.2 US Cyberwarfare Sector Forecasts 2014-2024
    • 4.2.3 US Cyberwarfare Market Analysis
    • 4.2.4 US Federal Government Cyber Spending Analysis
    • 4.2.5 US Federal Spending Drivers & Future Trends
    • 4.2.6 US DHS Budget Request
    • 4.2.7 Major US Cyberwarfare Contracts & Programmes
  • 4.3 Chinese (PRC) Cyberwarfare Market 2014-2024
    • 4.3.1 Chinese Cyberwarfare Market Forecast
    • 4.3.2 Chinese Cyberwarfare Sector Forecasts 2014-2024
    • 4.3.3 Chinese Cyberwarfare Market Analysis
    • 4.3.4 How Chinese Military Doctrine Shapes Cyberwarfare Efforts
    • 4.3.5 Is an Inability to Understand Chinese Policy Limiting Insight Into PRC Cyberwarfare Efforts?
    • 4.3.6 How Does China Conceptualise 'Cyberwarfare'?
    • 4.3.7 What Cyber Threats Does China Face at the Government Level?
    • 4.3.8 The Cyberwarfare Command Chain in the PRC
  • 4.4 South Korean Cyberwarfare Market 2014-2024
    • 4.4.1 South Korean Cyberwarfare Market Forecast
    • 4.4.2 South Korean Cyberwarfare Sector Forecasts 2014-2024
    • 4.4.3 South Korean Cyberwarfare Market Analysis
    • 4.4.4 How does the Cyber Threat Calculus Affect ROK Spending?
    • 4.4.5 How Has South Korea Met the Challenge of the Cyber Threat?
    • 4.4.6 South Korean National Cyberwarfare Centre
    • 4.4.7 Major South Korean Cyberwarfare Contracts & Programmes
  • 4.5 UK Cyberwarfare Market 2014-2024
    • 4.5.1 UK Cyberwarfare Market Forecast
    • 4.5.2 UK Cyberwarfare Sector Forecasts 2014-2024
    • 4.5.3 UK Cyberwarfare Market Analysis
    • 4.5.4 How Has the British Government Responded to the Cyber Threat?
    • 4.5.5 Cyber Information Sharing Partnership
    • 4.5.6 Major UK Cyberwarfare Contracts & Programmes
  • 4.6 Russian Cyberwarfare Market 2014-2024
    • 4.6.1 Russian Cyberwarfare Market Forecast
    • 4.6.2 Russian Cyberwarfare Sector Forecasts 2014-2024
    • 4.6.3 Russian Cyberwarfare Market Analysis
    • 4.6.4 Does Russia's Seven Year Plan Impact on Cyberwarfare Plans?
    • 4.6.5 Are Russian Cyberwarfare Capabilities Military or Governmental in Focus?
    • 4.6.6 How Do Russia's Collective Security Agreements Relate to Future Cyberwarfare Policy?
    • 4.6.7 Major Russian Cyberwarfare Contracts & Programmes
  • 4.7 French Cyberwarfare Market 2014-2024
    • 4.7.1 French Cyberwarfare Market Forecast
    • 4.7.2 French Cyberwarfare Sector Forecasts 2014-2024
    • 4.7.3 French Cyberwarfare Market Analysis
    • 4.7.4 The Prospect of Increased French Spending on Cyberwarfare
    • 4.7.5 French Offensive Cyber Capabilities
    • 4.7.6 The French Data Protection Authority (CNIL)
  • 4.8 Israeli Cyberwarfare Market 2014-2024
    • 4.8.1 Israeli Cyberwarfare Market Forecast
    • 4.8.2 Israeli Cyberwarfare Sector Forecasts 2014-2024
    • 4.8.3 Israeli Cyberwarfare Market Analysis
    • 4.8.4 How the Balance of Regional Power is Driving Israeli Cyberwarfare Efforts
    • 4.8.5 Israeli Cyberwarfare: Too Important to be Left to the Generals?
    • 4.8.6 Major Israeli Cyberwarfare Contracts & Programmes
  • 4.9 German Cyberwarfare Market 2014-2024
    • 4.9.1 German Cyberwarfare Market Forecast
    • 4.9.2 German Cyberwarfare Sector Forecasts 2014-2024
    • 4.9.3 German Cyberwarfare Market Analysis
    • 4.9.4 How the German National Cyber Security Strategy Has Affected Readiness for Cyberwarfare
    • 4.9.5 Will German Future Cyberwarfare Efforts be Multilateral Affairs?
    • 4.9.6 What Strategic Objectives Does Germany Have in Cyberspace?
    • 4.9.7 Major German Cyberwarfare Contracts & Programmes
  • 4.10 Japanese Cyberwarfare Market 2014-2024
    • 4.10.1 Japanese Cyberwarfare Market Forecast
    • 4.10.2 Japanese Cyberwarfare Sector Forecasts 2014-2024
    • 4.10.3 Japanese Cyberwarfare Market Analysis
    • 4.10.4 How Japanese Government Networks Have Been Hit by Cyber Attacks
    • 4.10.5 How Has the Japanese Response to Cyberwarfare Developed?
    • 4.10.6 How Unified is the Japanese Cyberwarfare Command Structure?
    • 4.10.7 Major Japanese Cyberwarfare Contracts & Programmes
  • 4.11 Italian Cyberwarfare Market 2014-2024
    • 4.11.1 Italian Cyberwarfare Market Forecast
    • 4.11.2 Italian Cyberwarfare Sector Forecasts 2014-2024
    • 4.11.3 Italian Cyberwarfare Market Analysis
    • 4.11.4 Why 2013 Represents a Watershed in Italian Cyber Warfare Efforts
  • 4.12 Australian Cyberwarfare Market 2014-2024
    • 4.12.1 Australian Cyberwarfare Market Forecast
    • 4.12.2 Australian Cyberwarfare Sector Forecasts 2014-2024
    • 4.12.3 Australian Cyberwarfare Market Analysis
    • 4.12.4 How the Australian Government Has Fallen Behind in Cyberwarfare
    • 4.12.5 Is the Strong Role of Cyberwarfare Contractors Undermining Australian Government Efforts?
    • 4.12.6 How Increased Partnerships Are Expected by Australia and Her Pacific Partners
    • 4.12.7 Australian Cyberwarfare Strategy
    • 4.12.8 Cyberwarfare Operations Centre (CSOC)
    • 4.12.9 Major Australian Cyberwarfare Contracts & Programmes
  • 4.13 Canadian Cyberwarfare Market 2014-2024
    • 4.13.1 Canadian Cyberwarfare Market Forecast
    • 4.13.2 Canadian Cyberwarfare Sector Forecasts 2014-2024
    • 4.13.3 Canadian Cyberwarfare Market Analysis
    • 4.13.4 Why 'Limited Progress' in Canadian Cyberwarfare is Optimistic
    • 4.13.5 Canada's Cyberwarfare Strategy
    • 4.13.6 A US-Canadian Partnership - Integrating North American Cyber Space
    • 4.13.7 Canadian Cyber Incident Response Centre (CCIRC)
    • 4.13.8 Major Canadian Cyberwarfare Contracts & Programmes
  • 4.14 Indian Cyberwarfare Market 2014-2024
    • 4.14.1 Indian Cyberwarfare Market Forecast
    • 4.14.2 Indian Cyberwarfare Sector Forecasts 2014-2024
    • 4.14.3 Indian Cyberwarfare Market Analysis
    • 4.14.4 CERT-In To Receive More Funding: How Indian Political Discourse is Affording Increased Focus to Cyberwarfare
    • 4.14.5 When Will Indian Offensive Cyber Capabilities be Fully Realised?
    • 4.14.6 Major Indian Cyberwarfare Contracts & Programmes
  • 4.15 Middle Eastern Cyberwarfare Market 2014-2024
    • 4.15.1 Middle Eastern Cyberwarfare Market Forecast
    • 4.15.2 Middle Eastern Cyberwarfare Sector Forecasts 2014-2024
    • 4.15.3 Middle Eastern Cyberwarfare Market Analysis
    • 4.15.4 The Middle Eastern Threat Calculus in Cyberwarfare
    • 4.15.5 How Are Turkish Cyberwarfare Efforts Proceeding?
    • 4.15.6 Major Middle Eastern Cyberwarfare Contracts & Programmes
  • 4.16 Brazil Cyberwarfare Market 2014-2024
    • 4.16.1 Brazil Cyberwarfare Market Forecast
    • 4.16.2 Brazil Cyberwarfare Sector Forecasts 2014-2024
    • 4.16.3 Brazil Cyberwarfare Market Analysis
    • 4.16.4 How is Brazil Currently Investing in Cyberwarfare Solutions?
  • 4.17 ROW Cyberwarfare Market 2014-2024
    • 4.17.1 ROW Cyberwarfare Market Forecast
    • 4.17.2 ROW Cyberwarfare Sector Forecasts 2014-2024
    • 4.17.3 ROW Cyberwarfare Market Analysis
    • 4.17.4 How Are the Evolving Security Requirement in South East Asia Driving Cyberwarfare Needs?
    • 4.17.5 Is the European Cyberwarfare Market Oversaturated?
    • 4.17.6 The African Cyberwarfare Market - A Future or Current Prospect?
    • 4.17.7 Major ROW Cyberwarfare Contracts & Programmes

5. Cyberwarfare Submarkets 2014-2024

  • 5.1 Cyberwarfare Submarket Forecasts 2014-2024
  • 5.2 The Cyberwarfare Military Submarket 2014-2024
    • 5.2.1 The Cyberwarfare Military Submarket Forecast
    • 5.2.2 Cyberwarfare Military Submarket Analysis
    • 5.2.3 How Offensive Military Cyberwarfare Operations May Be a Viable Method of Deterrence
    • 5.2.4 Why Does the Integrated Battlespace Require Increased Protection Against Cyberwarfare?
  • 5.3 The Cyberwarfare Government Submarket 2014-2024
    • 5.3.1 The Cyberwarfare Government Submarket Forecast
    • 5.3.2 Cyberwarfare Government Submarket Analysis
    • 5.3.3 Why Government Spending Will Remain Elevated Throughout the Forecast Period

6. SWOT Analysis of the Cyberwarfare Market 2014-2024

7. Leading 12 Companies in the Cyberwarfare Market

  • 7.1 BAE Systems
    • 7.1.1 BAE Systems Analysis & Future Outlook
    • 7.1.2 BAE Systems Competitors
    • 7.1.3 BAE Systems Regional Emphasis / Focus
    • 7.1.4 BAE Systems M&A Activity
  • 7.2 Booz Allen Hamilton, Inc. Overview
    • 7.2.1 Booz Allen Hamilton Analysis & Future Outlook
    • 7.2.2 Booz Allen Hamilton M&A Activity
  • 7.3 Computer Science Corporation (CSC) Overview
    • 7.3.1 Computer Science Corporation Analysis & Future Outlook
    • 7.3.2 CSC M&A Activity
  • 7.4 EADS (Airbus Group)
    • 7.4.1 EADS/Airbus Analysis & Future Outlook
    • 7.4.2 EADS/Airbus M&A Activity
  • 7.5 General Dynamics Corporation Overview
    • 7.5.1 General Dynamics Corporation Analysis & Future Outlook
    • 7.5.2 General Dynamics M&A Activity
  • 7.6 Hewlett Packard (HP) Company
    • 7.6.1 HP Analysis & Future Outlook
    • 7.6.2 HP Regional Emphasis / Focus
    • 7.6.3 HP M&A Activity
  • 7.7 International Business Machines (IBM) Corporation
    • 7.7.1 IBM Analysis & Future Outlook
    • 7.7.2 IBM Competitors
    • 7.7.3 IBM Regional Emphasis / Focus
    • 7.7.4 IBM M&A Activity
  • 7.8 Intel Corporation (incl. McAfee, Inc.)
    • 7.8.1 Intel Analysis Future Outlook
    • 7.8.2 Intel Competitors
    • 7.8.3 Intel Regional Emphasis / Focus
    • 7.8.4 Intel M&A Activity
  • 7.9 L-3 Communications Overview
    • 7.9.1 L-3 Communications Analysis & Future Outlook
    • 7.9.2 L-3 Communications M&A Activity
  • 7.10 Lockheed Martin Corporation
    • 7.10.1 Lockheed Martin Analysis & Future Outlook
    • 7.10.2 Lockheed Martin Competitors
    • 7.10.3 Lockheed Martin Regional Emphasis / Focus
    • 7.10.4 Lockheed Martin M&A Activity
  • 7.11 Northrop Grumman Corporation Overview
    • 7.11.1 Northrop Grumman Analysis & Future Outlook
    • 7.11.2 Northrop Grumman Regional Emphasis / Focus
    • 7.11.3 Northrop Grumman M&A Activity
  • 7.12 Raytheon Company Overview
    • 7.12.1 Raytheon Company Analysis & Future Outlook
    • 7.12.2 Raytheon Company M&A Activity
    • 7.13 Other Relevant Companies in the Cyberwarfare Market

8. Conclusion

  • 8.1 The Cyberwarfare Market Outlook 2014-2024
  • 8.2 Key Findings for the Future Cyberwarfare Market
  • 8.3 Regional and Geographic Shifts in Spending on Cyberwarfare

9. Glossary

List of Tables

  • Table 2.1 Types of Cyber Attack (Type, Description)
  • Table 2.2 Cyber Weapons (Type, Description)
  • Table 2.3 Cyber Defences (Type, Description)
  • Table 3.1 Global Cyberwarfare Market Drivers & Restraints
  • Table 3.2 Global Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 3.3 Leading 15 Regional Cyberwarfare Markets Forecast CAGR (%) 2014-2024, 2014-2019, 2019-2024
  • Table 3.4 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets Forecast CAGR (%) 2014-2024
  • Table 3.5 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets Forecast CAGR (%) 2014-2019
  • Table 3.6 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets Forecast CAGR (%) 2014-2024
  • Table 3.7 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2024
  • Table 3.8 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2019
  • Table 3.9 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2019-2024
  • Table 3.10 Leading 15 Regional Cyberwarfare Markets Share Forecast 2014, 2019 & 2024 (% Share, % Change)
  • Table 3.11 Leading 15 Regional Cyberwarfare Markets, Market Sectors, and Submarkets Cumulative Sales Forecast 2014-2024 ($m, %)
  • Table 4.1 Leading 15 Regional Cyberwarfare Markets Forecast 2014-2024 ($m, AGR %)
  • Table 4.2 US Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.3 US Cyberwarfare Market Drivers & Restraints
  • Table 4.4 US Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.5 Major US Cyberwarfare Contracts & Programmes (Company, Value, Date, Details)
  • Table 4.6 Chinese Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.7 Chinese Cyberwarfare Market Drivers & Restraints
  • Table 4.8 Chinese Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.8 South Korean Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.9 South Korean Cyberwarfare Market Drivers & Restraints
  • Table 4.10 Korean Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.11 Major South Korean Cyberwarfare Contracts & Programmes (Company, Date, Details)
  • Table 4.12 UK Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.13 UK Cyberwarfare Market Drivers & Restraints
  • Table 4.14 UK Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.15 Major UK Cyber Security Contracts & Programmes (Company, Value, Date, Details)
  • Table 4.16 Russian Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.17 Russian Cyberwarfare Market Drivers & Restraints
  • Table 4.18 Russian Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.19 Major Russian Cyber Security Contracts & Programmes (Company, Value, Date, Details)
  • Table 4.20 French Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.20 French Cyberwarfare Market Drivers & Restraints
  • Table 4.21 French Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.22 Israeli Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.23 Israeli Cyberwarfare Market Drivers & Restraints
  • Table 4.24 Israeli Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.25 Major Israeli Cyberwarfare Contracts & Programmes (Company, Value, Date, Details)
  • Table 4.26 German Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.27 German Cyberwarfare Market Drivers & Restraints
  • Table 4.28 German Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.29 Major German Cyberwarfare Contracts & Programmes (Company, Date, Details)
  • Table 4.30 Japanese Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.31 Japanese Cyberwarfare Market Drivers & Restraints
  • Table 4.32 Japanese Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.33 Major Japanese Cyberwarfare Contracts & Programmes (Company, Value,
  • Date, Details)
  • Table 4.34 Italian Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.35 Italian Cyberwarfare Market Drivers & Restraints
  • Table 4.36 Italian Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.37 Australian Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.38 Australian Cyberwarfare Market Drivers & Restraints
  • Table 4.39 Australian Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.40 Major Australian Cyberwarfare Contracts & Programmes (Company, Value, Date, Details)
  • Table 4.41 Canadian Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.42 Canadian Cyberwarfare Market Drivers & Restraints
  • Table 4.43 Canadian Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.44 Major Canadian Cyberwarfare Contracts & Programmes (Company, Date, Details)
  • Table 4.45 Indian Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.46 Indian Cyberwarfare Market Drivers & Restraints
  • Table 4.47 Indian Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.48 Major Indian Cyberwarfare Contracts & Programmes (Company, Date, Details)
  • Table 4.49 Middle Eastern Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.50 Middle Eastern Cyberwarfare Market Drivers & Restraints
  • Table 4.51 Middle Eastern Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.52 Major Middle Eastern Cyberwarfare Contracts & Programmes (Company / Country, Value, Date, Details
  • Table 4.53 Brazil Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.54 Brazil Cyberwarfare Market Drivers & Restraints
  • Table 4.55 Brazil Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.56 ROW Cyberwarfare Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 4.57 ROW Cyberwarfare Market Drivers & Restraints
  • Table 4.58 ROW Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Table 4.59 Major ROW Cyberwarfare Contracts & Programmes (Company / Country, Value, Date, Details
  • Table 5.1 Cyberwarfare Submarket Forecasts 2014-2024 ($m, AGR %)
  • Table 5.2 Cyberwarfare Military Submarket Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.3 Cyberwarfare Military Submarket Drivers & Restraints
  • Table 5.4 Cyberwarfare Govt Submarket Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.5 Cyberwarfare Govt Submarket Drivers & Restraints
  • Table 6.1 SWOT Analysis of the Cyber Warfare Market 2014-2024
  • Table 7.1 Leading 12 Companies in the Cyberwarfare Market 2013 (Company, Cyberwarfare Subsidiary)
  • Table 7.2 BAE Systems Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.3 BAE Systems Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Country, Value, Expires, Details)
  • Table 7.4 BAE Systems Cyberwarfare Market Services (Division, Product, Specification)
  • Table 7.5 Booz Allen Hamilton Inc Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.6 Booz Allen Hamilton Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Country, Value, Expires, Details)
  • Table 7.7 Booz Allen Hamilton Cyberwarfare Market Services (Division, Product/Service Product & Technology)
  • Table 7.8 Computer Sciences Corporation (CSC) Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.9 Computer Sciences Corporation (CSC) Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Details)
  • Table 7.10 Computer Sciences Corporation (CSC) Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.11 Airbus Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.12 Airbus Major Cyberwarfare Market Projects / Programmes (Date, Country, Value, Details)
  • Table 7.13 Airbus Group Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.14 General Dynamics Corporation Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.15 General Dynamics Corporation Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.16 General Dynamics Corporation Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.17 Hewlett Packard Company Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.18 Hewlett Packard Company Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.19 Hewlett Packard Company Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.20 International Business Machines Corporation (IBM) Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.21 International Business Machines Corporation (IBM) Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.22 International Business Machines Corporation (IBM) Cyberwarfare Market Services (Division, Product, Specification)
  • Table 7.23 Intel Corporation Overview 2012 (Total Revenue, HQ, Ticker, Website)
  • Table 7.24 Intel Corporation Major Cyberwarfare Market / Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.25 Intel Corporation Cyberwarfare Market/Services (Division, Product/Service, Description)
  • Table 7.26 L-3 Communications Holdings Inc Overview 2012 (Total Revenue, HQ, Ticker, Website)
  • Table 7.27 L-3 Communications Holdings Inc Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.28 L-3 Communications Holdings Inc Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.29 Lockheed Martin Corporation Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.30 Lockheed Martin Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.31 Lockheed Martin Corporation Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.32 Northrop Grumman Corporation Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.33 Northrop Grumman Corporation Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Expires, Details)
  • Table 7.34 Northrop Grumman Corporation Cyberwarfare Market Services (Division, Product/Service, Description)
  • Table 7.35 Raytheon Company Overview 2012 (Total Revenue, HQ, Ticker, Contact, Website)
  • Table 7.36 Raytheon Company Major Cyberwarfare Market Projects / Programmes (Date, Subcontractors, Value, Details)
  • Table 7.37 Raytheon Company Cyberwarfare Market Services (Division, Capability, Products & Technology)
  • Table 7.38 Other Relevant Companies in the Cyberwarfare Market (Company Name)

List of Figures

  • Figure 2.1 Global Cyberwarfare Market Structure Overview
  • Figure 2.2 Operation Shady RAT Targets (Sector, Number of Targets)
  • Figure 3.1 Global Cyberwarfare Market Forecast 2014-2024 ($m, AGR %)
  • Figure 3.2 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets Forecast CAGR (%)
  • 2014-2024
  • Figure 3.3 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets Forecast CAGR (%)
  • 2014-2019
  • Figure 3.4 Fastest Growing of the 15 Leading Regional Cyberwarfare Markets Forecast CAGR (%)
  • 2019-2024
  • Figure 3.5 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2024
  • Figure 3.6 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2019
  • Figure 3.7 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2019-2024
  • Figure 3.8 Leading 15 Regional Cyberwarfare Markets Cumulative Sales Forecast 2014-2024 ($m)
  • Figure 3.9 Leading 15 Regional Cyberwarfare Markets Cumulative Sales Share 2014-2024 (%)
  • Figure 3.10 Cyberwarfare Submarkets Cumulative Sales Forecast 2014-2024 ($m)
  • Figure 3.11 Cyberwarfare Submarkets Cumulative Sales Share 2014-2024 (%)
  • Figure 4.1 Leading 15 Regional Cyberwarfare Markets Forecast 2014-2024 ($m)
  • Figure 4.2 Leading 15 Regional Cyberwarfare Markets Share Forecast 2014 (%)
  • Figure 4.3 Leading 15 Regional Cyberwarfare Markets Share Forecast 2019 (%)
  • Figure 4.4 Leading 15 Regional Cyberwarfare Markets Share Forecast 2024 (%)
  • Figure 4.5 Leading 15 Regional Cyberwarfare Markets Percentage Share Change 2014-2024 (%)
  • Figure 4.6 US Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.7 US Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.8 US Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.9 Chinese Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.10 Chinese Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.11 Chinese Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.12 South Korean Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.13 South Korean Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.14 Korean Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.15 UK Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.16 UK Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.17 UK Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.18 Russian Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.19 Russian Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.20 Russian Cyberwarfare Sector Forecasts 2014-2024 ($m, AGR %)
  • Figure 4.21 French Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.22 French Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.23 French Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.24 Israeli Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.25 Israeli Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.26 Israeli Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.27 German Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.28 German Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.29 German Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.30 Japanese Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.31 Japanese Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.32 Japanese Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.33 Italian Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.34 Italian Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.35 Italian Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.36 Australian Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.37 Australian Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.38 Australian Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.39 Canadian Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.40 Canadian Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.41 Canadian Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.42 Indian Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.43 Indian Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.44 Indian Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.45 Middle Eastern Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.46 Middle Eastern Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.47 Middle Eastern Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.48 Brazil Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.49 Brazil Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.50 Brazil Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 4.51 ROW Cyberwarfare Market Forecast 2014-2024 ($m, AGR%)
  • Figure 4.52 ROW Cyberwarfare Market Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 4.53 ROW Cyberwarfare Sector Forecasts 2014-2024 ($m)
  • Figure 5.1 Cyberwarfare Submarket Forecasts 2014-2024 ($m)
  • Figure 5.2 Cyberwarfare Submarket Share Forecast 2014 (%)
  • Figure 5.3 Cyberwarfare Submarket Share Forecast 2019 (%)
  • Figure 5.4 Cyberwarfare Submarket Share Forecast 2024 (%)
  • Figure 5.5 Cyberwarfare Submarket Shares Percentage Change 2014-2024 (%)
  • Figure 5.6 Cyberwarfare Military Submarket Forecast 2014-2024 ($m, AGR %)
  • Figure 5.7 Cyberwarfare Military Submarket Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 5.8 Cyberwarfare Govt Submarket Forecast 2014-2024 ($m, AGR %)
  • Figure 5.9 Cyberwarfare Govt Submarket Share Forecast 2014, 2019 and 2024 (% Share)
  • Figure 7.1 BAE Systems Company Structure 2013
  • Figure 7.3 Computer Sciences Corporation (CSC ) Inc Structure 2013
  • Figure 7.4 Airbus Defence & Space Structure 2013
  • Figure 7.5 General Dynamics Corporation Company Structure 2013
  • Figure 7.6 Hewlett Packard Company Structure 2013
  • Figure 7.7 International Business Machines Corporation (IBM) Structure 2013
  • Figure 7.8 Intel Corporation Structure 2013
  • Figure 7.9 L-3 Communications Holdings Inc Structure 2013
  • Figure 7.10 Lockheed Martin Corporation Structure 2013
  • Figure 7.11 Raytheon Company Structure 2013

Companies Listed

  • 3Di Technologies LLC
  • 42Six Solutions, LLC
  • ACS
  • Advanced C4 Systems Inc.
  • Advanced Content Services Inc
  • Advanced Laser Systems Technologies Inc
  • Advanced Micro Devices
  • Aeromet
  • AfreecaTV Co Ltd
  • AhnLab, Inc.
  • Airborne Technologies Inc
  • Airbus Defence & Space
  • Airbus Group
  • Akamai Technologies
  • ALEX-AS, J.V.
  • ALON, Inc.
  • Ami
  • Anagran
  • Antiy Labs
  • Apple
  • Applied Visions, Inc
  • ArcSight
  • Argon ST
  • ARINC
  • Arkoon Network Security
  • ASA
  • Asgent Inc
  • Assured Information Security, Inc
  • Astrium
  • AT&T
  • Atac
  • Atheeb NetSol
  • ATR
  • AVAST Software
  • AVG Technologies
  • BAE Systems
  • BAE Systems Australia
  • BAE Systems Detica
  • BAE Systems Electronic Systems (ES)
  • BAE Systems India
  • BAE Systems Land & Armaments (L&A)
  • BAE Systems Maritime
  • BAE Systems Military Air & Information (MA&I)
  • BAE Systems Regional Aircraft
  • BAE Systems Saudi Arabia
  • BAE Systems Shared Services
  • BAE Systems Support Solutions
  • Barracuda Networks Inc
  • Bath Iron Works
  • BBN Technologies
  • Beijing VRV Software Corp Ltd
  • Bell Canada
  • Blue Screen IT Ltd
  • Blue Sun Media Inc
  • Boeing Defense, Space and Security
  • Boeing Information Solutions
  • Boeing Network & Space Systems
  • Bombardier
  • Booz & Company
  • Booz Allen Hamilton Inc.
  • BreakingPoint Systems
  • British Gas
  • British Telecom (BT)
  • Business Computers Management Consulting Group, LLC
  • Business Integra Technology Solutions, Inc.
  • Byres Security
  • CACI, Inc.
  • Camber Corporation
  • Cassidian CyberSecurity
  • CGI Logica
  • Check Point Software Technologies Ltd
  • China Telecom
  • Cisco Systems, Inc
  • CloudShield Technologies, Inc.
  • ComCept
  • CommVault Systems Inc
  • Computer Science Corporation
  • Computer Sciences Canada Inc.
  • Corero Network Security
  • Cosentini Associates
  • Creative Computing Solutions
  • Crestview Aerospace
  • CrySyS Lab
  • CSC North American Public Sector Defense Group
  • Cubic XD
  • CyberArk Software
  • Danaher Corporation
  • Defense Systems Engineering & Support
  • Def-Logix
  • Dell Corporation
  • Detica Group plc
  • Detica NetReveal
  • Diebold
  • Digital Arts Inc
  • DMI
  • DRC Systems
  • Dynamic Network Enterprises, Inc.
  • EADS Cassidian
  • EADS Group (Airbus)
  • EADS Sodern
  • El Al Israel Airlines Ltd
  • Elbit Systems
  • EMC Corporation
  • EmeSec Inc.
  • EmeSec Incorporated
  • Emiraje Systems
  • Enel
  • Enterprise Information Services
  • ETI
  • Eurocopter
  • Exelis, Inc.
  • Exida Canada
  • Exobox Technologies Corp
  • Experian
  • Federal Management Systems, Inc.
  • Fidelis Security Solutions Inc
  • Finmeccanica SpA
  • FireEye, Inc.
  • Fondation Télécom
  • Foreground Security
  • Fortify Software
  • F-Secure Corporation
  • Fujitsu
  • Galois
  • General Dynamics Advanced Information Systems
  • General Dynamics C4 Systems
  • General Dynamics Canada
  • General Dynamics Corporation
  • General Dynamics Electric Boat
  • General Dynamics European Land Systems
  • General Dynamics Information Systems and Technology
  • General Dynamics Information Technology
  • General Dynamics Ordnance and Tactical Systems
  • General Dynamics UK
  • Georgia Tech Research Corp
  • Gideon technologies
  • Global Info Tek, Inc.
  • Google
  • Group-IB
  • GuardianEdge
  • Gulfstream
  • H3G
  • Hangzhou Shunwang Technology Co Ltd
  • Harris Corporation
  • Harris Government Communications Systems
  • Harris Integrated Network Solutions
  • HAURI Inc
  • Henggeler Computer Consultants, Inc.
  • Hewlett Packard Corporation (HP)
  • HighAction, LLC
  • Honeywell, Inc.
  • HP Enterprise Business
  • HP Mobility Global Business
  • HP Software
  • HRL Laboratories, LLC
  • Huawei Technologies Ltd
  • i2
  • IBM Global Business Services (GBS)
  • IBM Global Financing
  • IBM Global Technology Services (GTS)
  • IBM Integrated Supply Chain (ISC)
  • IBM Research
  • IBM Software
  • ICL
  • Igloo Security Inc
  • IHI Corporation
  • Imagine One StraCon Venture, LLC
  • Infineon Technologies AG
  • Injazat
  • In-Q-Tel
  • Intel Corporation
  • International Business Machine (IBM) Corporation
  • International Computer Science Institute
  • Intrusion Inc
  • Invincea
  • iPass Inc
  • ISC8, Inc.
  • ISHPI Information Technologies, Inc.
  • ITT Advanced Engineering & Sciences Division
  • Ivincea
  • Johnson Controls
  • Jupiter Networks
  • Kaspersky Labs
  • Kawasaki Heavy Industries
  • KCG
  • KEO
  • Kestrel Technology, LLC
  • KEYW
  • KISA
  • Knownsec
  • Kollmorgen Electro-Optical
  • Kratos Defence
  • Kratos Defense & Security Solutions, Inc.
  • KT Corporation
  • L-3 Communications
  • L-3 Communications Systems East
  • L-3 Communications Systems West
  • L-3 GCS
  • L-3 Insight Technology
  • L-3 Ruggedized Command & Control Solutions
  • L-3 Tactical Systems
  • L-3 Warrior Systems
  • Lacoon Mobile Security
  • Lacoon Security Ltd
  • Leidos
  • LETA Group
  • LGS Innovations
  • LiveOffice
  • Lockheed Martin Aeronautics
  • Lockheed Martin Corporation
  • Lockheed Martin Electronic Systems (ES)
  • Lockheed Martin Information Systems & Global Solutions (IS&GS)
  • Lockheed Martin Space Systems
  • Lockheed Martin UK
  • Lockheed Martin's Information Systems & Global Solutions Division
  • M5 Network Security Pty Ltd
  • MacAulay-Brown Inc.
  • Mandiant
  • ManTech International Corporation
  • MasterCard
  • McAfee Inc.
  • MEI Technologies
  • Merit Network Inc
  • Merlin RAMCo
  • MessageLabs
  • MHI
  • Mi5 Networks
  • Microsoft Corporation
  • MicroTech
  • Mitsubishi Heavy Industries
  • Mobile Vault Inc
  • Mobilityone Ltd
  • NASSCO
  • National Agricultural Cooperatives Federation (Nonghyup)
  • Neoarena Inc
  • NetApp, Inc.
  • Netasq
  • NetentSec
  • NetSol Technologies, Inc.
  • NetWitness Corporation
  • Network Security Systems Plus, Inc.
  • New York Times
  • NexG Co Ltd
  • Nicstech Co Ltd
  • NitroSecurity
  • Northrop Grumman Corporation
  • Northrop Grumman Information Systems
  • Norton
  • Nukona
  • Nutrisystem, Inc.
  • Oasis Systems
  • Oculis Labs
  • Odyssey Software
  • Odyssey Technologies Ltd
  • One Source
  • Panda Security
  • Paradigm Technologies
  • PGP Corporation
  • Photonics
  • Pikewerks Corporation
  • Plantynet Co Ltd
  • Q1 Labs
  • Qihoo 360 Technology Co. Ltd
  • Qinetiq Group Plc
  • QinetiQ North America
  • Radiance Technologies, Inc.
  • Raytheon Australia
  • Raytheon BBN Technologies
  • Raytheon Company
  • Raytheon Company Cyber Security Solutions
  • Raytheon Company Intelligence & Information Systems
  • Raytheon UK
  • Raytheon Vision Systems
  • RLM Communications, Inc.
  • Rockwell Collins
  • Rolls-Royce
  • RSA (EMC)
  • Safenet
  • SAIC
  • SAIC Defense Solutions Group (DSG)
  • SAIC Health, Energy and Civil Solutions Group (HECSG)
  • SAIC Intelligence, Surveillance, and Reconnaissance Group (ISRG)
  • SAIC, Inc. (Leidos)
  • Salient Federal Solutions, Inc.
  • Sandia Corporation
  • Saudi Aramco
  • Schneider Electric
  • Secure Computing
  • Secure Digital Inc
  • Secure Tech
  • Selex Finmeccanica
  • Senetas Corp Ltd
  • Sentek Consulting, Inc.
  • Sentrigo
  • Serco
  • Skolkovo Foundation
  • Skype
  • Skyscape
  • SMSi
  • SoftScan
  • Software Box Ltd
  • Sojitz Corporation
  • Solana Networks
  • Sony
  • Sotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. )
  • Sparta Inc.
  • Spirent Communications
  • SRA International, Inc.
  • Stratavia
  • Strategic Operational Solutions, Inc.
  • STRATIS
  • stratsec.net
  • Strikeforce Technologies Inc
  • STS Group
  • Sukhoi
  • Symantec Corporation
  • Symantec Corporation Consumer Business
  • Symantec Corporation Enterprise Products and Services
  • Symantec Corporation Enterprise Security
  • Symantec Corporation Information Management
  • Symantec Corporation SMB and Symantec.cloud
  • SynApps Solutions
  • Taia Global, Inc.
  • TCS
  • Technica
  • TeleCommunication Systems, Inc.
  • Teligy
  • Telstra
  • Tempest Security Intelligence
  • Thales Aerospace
  • Thales Alenia Space
  • Thales Communications & Security (C&S)
  • Thales Defence
  • Thales Group
  • Thales Raytheon Systems
  • Thales UK
  • The Boeing Company
  • The Economist
  • The Washington Post
  • Times of India
  • TISTA Science and Technology Corp
  • Trend Micro Inc
  • Trusteer
  • Trustwave
  • TWD & Associates
  • VASCO Data Security International Inc
  • Venustech
  • Verint Systems
  • VeriSign Inc
  • Verizon Communications, Inc.
  • Vertica Systems
  • VMWare, Inc.
  • Vulnerability Research Labs
  • VulnHunt
  • Waterfall Security Solutions Ltd
  • WIJET, LLC
  • Wind River Software Group
  • xInformation Systems Security
  • Your Internet Defender Inc
  • YouTube
  • Zix Corp
  • ZTE Corporation

Other Organisations Mentioned in This Report

  • American Civil Liberties Union (ACLU)
  • Anonymous
  • Australian Attorney-General's Department
  • Australian Customs and Border Protection Service
  • Australian Cyber Security Centre (ACSC)
  • Australian Cyber Security Operations Centre (CSOC)
  • Australian Defence Force
  • Australian Defence Force Academy
  • Australian Defence Intelligence Organisation
  • Australian Defence Science and Technology Organisation
  • Australian Defence Science and Technology Organisation (DSTO)
  • Australian Defence Signals Directorate (DSD)
  • Australian Department of Agriculture, Fisheries, and Forestry
  • Australian Department of Broadband, Communications, and the Digital Economy
  • Australian Department of Defence
  • Australian Department of Immigration & Citizenship
  • Australian Federal Police
  • Australian Government
  • Australian Government Information Management Office (AGIMO)
  • Australian Secret Intelligence Service (ASIS)
  • Australian Security Intelligence Organisation
  • Brazilian Air Force
  • Brazilian Armed Forces
  • Brazilian Army
  • Brazilian Army's Cyber Defence Centre
  • Brazilian CBCyber
  • Brazilian Federation of Banks (Febraban)
  • Brazilian Ministry of Science Technology
  • Brazilian National Computer Emergency Response Team (CERT)
  • Brazilian Navy
  • Brazilian Stock Exchange
  • Bristol Security Centre
  • Bristol University
  • British Broadcasting Corporation (BBC)
  • Canadian Communications Security Establishment
  • Canadian Cyber Incident Response Centre
  • Canadian Department of National Defence
  • Canadian Department of Public Safety and Emergency Preparedness
  • Chinese Anti-Virus Products Testing and Certification Centre
  • Chinese General Office of the CPC Central Committee
  • Chinese General Office of the State Council
  • Chinese Information Security Certification Centre
  • Chinese Information Technology Security Evaluation Centre
  • Chinese National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC)
  • Chinese National Research Centre for Anti-Computer Invasion and Virus Prevention
  • Chinese People's Liberation Army (PLA)
  • Chinese Quality Supervision and Test Centre of Security Products for Computer Information System of the Ministry of Public Security
  • Columbia University
  • Cutting Sword of Justice
  • Cyber Security Research Alliance (CRSA)
  • Danish Defence Ministry
  • Danish Forsvarets Efterretningstjeneste (Military Intelligence)
  • Danish Parliament
  • DarkSeoul
  • Defence Research and Development Canada
  • Def-Logix
  • East West Institute
  • Electronic Frontier Foundation (EFF)
  • European Commission (EC)
  • European Council/EU
  • European Defence Agency (EDA)
  • European External Action Service (EEAS)
  • European Network and Information Security Agency (ENISA)
  • European Union (EU)
  • European Union Committee
  • EUROPOL
  • Executive Office US Attorneys (EOUSA)
  • Foreign Ministry, People's Republic of China
  • French Agence nationale de la sécurité des systèmes d'information (ANSSI)
  • French Commission Nationale de l'informatique et des Libertés (French Data Protection Authority)
  • French Commission Nationale de l'informatique et des Libertés (National Data Protection Authority)
  • French Defense Ministry
  • French Navy
  • French Senate Committee on Foreign Affairs, Defence & Armed Forces
  • G8 (Group of Eight)
  • George Mason University
  • German Bundeswehr
  • German Customs Criminological Office
  • German Federal commissioner for Date Protection and Freedom of Information
  • German Federal Criminal Police Office
  • German Federal Intelligence Service
  • German Federal Ministry for Economics and Technology
  • German Federal Ministry of the Interior
  • German Federal Network Agency for Gas, Telecommunications, Post and Railway
  • German Federal Office for Information Security
  • German Federal Office for Information Technology
  • German Federal Office for the Protection of the Constitution
  • German Federal Office of Civil Protection and Disaster Assistance
  • German Federal Police
  • German Federal Post Office
  • German Nationaler Cyber-Sicherheitsrat (NCS, Cyber Security Council)
  • German Nationales Cyber-Abwehrzentrum (NCAZ, National Cyber Response Centre)
  • IBM Institute for Advanced Security
  • ICT KTN
  • Indian Armed Forces
  • Indian CERT-In (Computer Emergency Response Team)
  • Indian Defence Intelligence Agency (DIA)
  • Indian Defence Research and Development Organisation (DRDO)
  • Indian Department of Technology
  • Indian Department of Telecommunications
  • Indian Government
  • Indian Joint Working Group (JWG) on Cyber Security
  • Indian Minister of State for Communications and Information Technology
  • Indian Ministry of Communication and Information Technology (MCIT)
  • Indian Ministry of Defence
  • Indian Ministry of Human Resource Development (MHRD)
  • Indian National Association of Software Services Companies
  • Indian National Critical Information Infrastructure Protection Centre
  • Indian National Security Council Secretariat (NSCS)
  • Indian National Technical Research Organisation (NTRO)
  • Indian Navy (IN)
  • Indonesian Communications and Information Ministry
  • Information Security Institute, Moscow State University
  • International Security Assistance Force (ISAF)
  • ISA Security Compliance Institute
  • Israeli Air Force (IAF)
  • Israeli Cabinet
  • Israeli Defence Force (IDF)
  • Israeli Intelligence Corps
  • Israeli Ministry of Defence Directorate for Research and Development
  • Israeli Ministry of Finance
  • Israeli Mossad
  • Israeli National Cyber Bureau
  • Israeli National Cyber Committee
  • Israeli National Cyber Directorate (NCD)
  • Israeli Science and Technology Ministry
  • Israeli Security Agency
  • Israeli Shin Bet
  • Japan Information Security Audit Association (JASA)
  • Japan Information-Technology Promotion Agency
  • Japan Information-technology Promotion Agency
  • Japan Network Security Association (JNSA)
  • Japanese Defence Ministry
  • Japanese Information Security Policy Council
  • Japanese Internal Affairs and Communications Ministry
  • Japanese ISA Security Compliance Institute
  • Japanese Ministry of Economy, Trade and Industry (METI)
  • Japanese National Information Security Center (NISC)
  • Japanese National Police Agency (NPA)
  • Japanese SDF Command, Control, Communication, & Computers Systems Command (C4SC)
  • Japanese Self-Defence Force (JSDF)
  • Kansas State University (KSU)
  • Khalifa University
  • Korea Communications Commission (KCC)
  • Korea Information Security Industry Association (KISIA)
  • Korea Telecommunication Corporation
  • Korean National Cyber Security Centre
  • Korean National Intelligence Service
  • Kuwait Ministry of Commerce and Industry
  • Lancaster University
  • LM Cyber Security Alliance
  • LulzSec
  • MAHER Center of Iranian National Computer Emergency Response Team
  • Morgridge Institute for Research
  • Mossad
  • National Computer Network Emergency Response Coordination Centre of China
  • National Information Communications Technology Australia
  • NATO (North Atlantic Treaty Organisation)
  • Naval Postgraduate School
  • North Atlantic Treaty Organisation (NATO)
  • Oak Ridge National Laboratory
  • OECD (Organisation for Economic Co-operation and Development)
  • Organisation for Economic Co-operation and Development (OECD)
  • Organisation for Security and Co-operation in Europe (OSCE)
  • OSCE (Organisation for Security and Co-operation in Europe)
  • Pacific NW National Laboratory
  • Public Safety Canada
  • Purdue University
  • Queen's University Belfast
  • Royal United Services Institute (RUSI)
  • Russian - Bulgarian Joint working Group on Information Society and Communication Technologies
  • Russian Federal Security Service (FSB)
  • Russian Federal Service for Technical and Export Control (FSTEC)
  • Russian Security Council
  • Rutgers University - New Brunswick Campus
  • Security and Defence Agenda
  • Security and Defence Agenda Think Tank
  • Shanghai Cooperation Organisation (SCO)
  • Singapore Info-communications Technology Security Authority (SITSA)
  • Singaporean Infocomm Development Authority
  • Singaporean Ministry of Home Affairs
  • Singaporean National Cyber Security Centre (NCSC)
  • Soon Chun Hyang University
  • South Africa Cabinet
  • South Africa State Security Agency (SSA)
  • South African National Cyber Security Advisory Council
  • Tel Aviv Stock Exchange
  • Thai Computer Emergency Response Team (ThaiCERT)
  • Thailand National Cyber Security Policy Committee
  • The Boeing Cyber Engagement Center (CEC)
  • The Trustees of Princeton University
  • The University of Alabama at Birmingham
  • The University of North Carolina at Chapel Hill
  • Trustees of Dartmouth College
  • Trustees of Indiana University
  • UK Cabinet Office
  • UK Cyber Security Evaluation Centre
  • UK Defence Cyber Protection Partnership
  • UK Defence Industrial Base (DIB)
  • UK Department for Business, Innovation and Skills (BIS)
  • UK Engineering and Physical Sciences Research Council (EPSRC)
  • UK Environment Agency
  • UK Foreign and Commonwealth Office (FCO)
  • UK GCHQ (Government Communications Headquarters)
  • UK Home Office
  • UK Ministry of Defence (MOD)
  • UK Ministry of Justice (MOJ)
  • UK National Crime Agency
  • UK Public Services Network
  • UK Royal Air Force (RAF)
  • UN (United Nations)
  • United Nations (UN)
  • Universiti Malaya (UM)
  • University of Arizona
  • University of California, San Diego
  • University of Illinois at Urbana-Champaign
  • University of Lancaster
  • University of Maryland
  • University of Maryland
  • University of Minnesota
  • University of Southern California Information Sciences Institute
  • University of Texas
  • US 1st Information Operations Command (Land) (1st IO (Land))
  • US 780th Military Intelligence Brigade
  • US 9th Army Signal Command (NETCOM/9th SC)
  • US Air Force
  • US Air Force Cyber Command (AFCYBER)
  • US Air Force Medical Services (AFMS)
  • US Air Force Office of Special Investigations (AFOSI)
  • US Air Force Research Laboratory (AFRL)
  • US Antarctic Program (USAP)
  • US Army
  • US Army Forces Cyber Command (ARCYBER)
  • US Army Intelligence and Security Command (INSCOM)
  • US Army Network Enterprise Technology Command (NETCOM)
  • US Army Research Laboratory (ARL)
  • US Centers for Medicare & Medicaid Services (CMS)
  • US Central Intelligence Agency
  • US Central Intelligence Agency (CIA)
  • US Chamber of Commerce
  • US Coast Guard
  • US Commonwealth of Massachusetts' Executive Office of Health and Human Services
  • US Computer Emergency Readiness Team
  • US Computer Emergency Readiness Team (US CERT)
  • US Congress
  • US Cyber Command (CYBERCOM)
  • US Defense Advanced Research Projects Agency (DARPA)
  • US Defense Industrial Base (DIB)
  • US Defense Information Systems Agency (DISA)
  • US Defense Intelligence Agency (DIA)
  • US Department for Homeland Security (DHS)
  • US Department of Defense (DOD)
  • US Department of Homeland Security Science and Technology Directorate (DHS S&T)
  • US Department of Justice (DOJ)
  • US Department of Justice's Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)
  • US Department of State
  • US Department of State's Bureau of Diplomatic Security
  • US Department of Transportation's Research and Innovative Technology Administration
  • US DHS S&T Cyber Security Division (CSD)
  • US DOD Defense Industrial Base (DIB) Cyber Security Task Force
  • US DOD Manpower Data Centre (DMDC)
  • US Federal Bureau of Investigation (FBI)
  • US Federal Government
  • US Fleet Cyber Command (FLTCYBERCOM)
  • US General Accountability Office (GAO)
  • US House Intelligence Committee
  • US House of Representatives
  • US Joint Operations Center of the Integrated Cyber Center
  • US Marine Corps Cryptologic Support Battalion's (MCSB)
  • US Marine Corps Cyberspace Command (MARFORCYBER)
  • US Marine Corps Network Operations Security Center (MCNOSC)
  • US Marshals Service (USMS)
  • US National Cyber Response Co-ordination Group (NCRCG)
  • US National Cyber Security and Communications Integration Center
  • US National Cyber Security Center
  • US National Cyber Security Division
  • US National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC)
  • US National Protection and Programs Directorate (NPPD)
  • US National Security Agency (NSA)
  • US Naval Academy
  • US Naval Information Operation Commands (NIOC)
  • US Naval Network Warfare Command (NNWC)
  • US Naval Supply Systems Command (NAVSUP) Fleet Logistics Center
  • US Navy
  • US Navy Cyber Defense Operations Command (NCDOC)
  • US NSTIC (National Strategies on Trusted Identities in Cyberspace)
  • US Office of Cyber Security and Communications (CS&C)
  • US Office of the Chief Information Officer
  • US Office of the Chief Information Officer's Information Assurance Division
  • US Pentagon
  • US Pentagon's Cyber Crime Center
  • US Secret Service
  • US Securities and Exchange Commission (SEC)
  • US Senate
  • US Space and Naval Warfare Systems Center
  • US Space and Naval Warfare Systems Center (SSC)
  • US Special Operations Command (SOCOM)
  • US Transportation Security Administration (TSA)
  • US-China Economic and Security Review Commission
  • Wikileaks
  • World Bank
Back to Top