株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

セキュリティおよび脆弱性管理の世界市場予測 2019年:セキュリティ・脆弱性管理ソリューション、セキュリティ・脆弱性管理サービス

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), Services, End Users, & Verticals: Global Forecast to 2019

発行 MarketsandMarkets 商品コード 325461
出版日 ページ情報 英文 136 Pages
即納可能
価格
本日の銀行送金レート: 1USD=114.77円で換算しております。
Back to Top
セキュリティおよび脆弱性管理の世界市場予測 2019年:セキュリティ・脆弱性管理ソリューション、セキュリティ・脆弱性管理サービス Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), Services, End Users, & Verticals: Global Forecast to 2019
出版日: 2015年03月02日 ページ情報: 英文 136 Pages
概要

当レポートでは、世界のセキュリティおよび脆弱性管理市場について調査し、市場規模の推移と予測、サービス・エンドユーザー・産業別市場・地域別の内訳、競合情勢、および主要企業のプロファイルなどを詳細にわたってまとめています。

第1章 イントロダクション

第2章 調査手法

第3章 エグゼクティブサマリー

第4章 重要考察

  • セキュリティおよび脆弱性管理市場における魅力的な市場機会
  • セキュリティおよび脆弱性管理市場:タイプ別
  • セキュリティおよび脆弱性管理市場:サービス市場別
  • 多様な地域にわたるセキュリティおよび脆弱性管理市場
  • ライフサイクル分析:地域別

第5章 市場概要

  • イントロダクション
  • 発展の経緯
  • 市場区分
  • 市場ダイナミクス

第6章 産業動向

  • イントロダクション
  • バリューチェーン分析
  • ポーターのファイブフォース分析
  • 戦略的ベンチマーキング

第7章 セキュリティおよび脆弱性管理の世界市場:タイプ別

  • イントロダクション
  • ソリューション
    • セキュリティ情報・イベント管理
    • ポリシー・コンプライアンス
    • フォレンジック (法医学) ・事件捜査
    • デバイス脆弱性評価
    • アプリケーション脆弱性評価
  • サービス
    • コンサルティング
    • サポート
    • インテグレーション

第8章 セキュリティおよび脆弱性管理の世界市場:エンドユーザー別

  • イントロダクション
  • SMB (中小企業)
  • 大企業

第9章 セキュリティおよび脆弱性管理の世界市場:産業市場別

  • イントロダクション
  • BFSI
  • IT・通信
  • 政府・防衛
  • 小売り
  • エネルギー・ユーティリティ
  • 医療
  • その他

第10章 地域分析

  • イントロダクション
  • 北米 (NA)
  • 欧州
  • アジア太平洋地域 (APAC)
  • ラテンアメリカ (LA)
  • その他の地域 (ROW)

第11章 競合情勢

  • 概要
  • 競合状況・動向

第12章 企業プロファイル

  • イントロダクション
  • EMC Corporation
  • Hewlett-Packard
  • IBM Corporation
  • Qualys
  • Symantec Corporation
  • Microsoft Corporation
  • Mcafee, Inc.
  • Netiq Corporation
  • Rapid7
  • Tripwire

第13章 付録

目次
Product Code: TC 3202

The global concerns over the rising severity of cyber threats are fuelling the demands for advanced security management solutions. The adoption of cloud technologies have resulted in restricting the operational and deployment costs of the organizations to a greater extent. The associated security risks are rising with the growing adoption of cloud services. Thus, the movement of enterprises toward cloud infrastructure is one of the major drivers for the security and vulnerability management market. The rising trend of Bring Your Own Device (BYOD) is expected to catapult the demands for vulnerability management solutions for device and application assessment.

Though the security and vulnerability management market is going strong in the near future, there are various factors restraining and posing relative challenges to the market. Though companies are equipped with advanced security management products, there still exists certain lack of awareness regarding vulnerability management solutions. The regulatory compliances and concerns regarding data breaches would continue to haunt the positive traction of the market.

The report also provides an insight about the opportunities in the market for the future. The rise in mobility is expected to have a major impact on the market and to provide greater opportunities with advanced vulnerability assessment solutions. The market is expected to see the evolution of next-generation cyber security solutions with the increasing severity of cyber threats.

The report gives an insight about the number of Small and Medium Businesses (SMBs), rapidly expanding throughout the globe. These companies do not possess the capital to maintain full-fledged security management solutions. Thus, the SMB segment relies on the post-impact diagnosis and prevention methods for cyber threats. Such factors are propelling the demands for forensics and incident investigation solutions catering to the SMBs.

Security and vulnerability management technologies are a very critical part of an organization's security strategy, as they create a consolidation point for various forms of security monitoring and can be utilized to spot a targeted attack in its early phases to reduce damage. North America is expected to be the largest market in terms of revenue contribution, while Asia-Pacific (APAC) is expected to experience increased market traction, during the forecast period.

Table of Contents

1. Introduction

  • 1.1. Objectives of the Study
  • 1.2. Market Definition
  • 1.3. Market Scope
    • 1.3.1. Markets Covered
    • 1.3.2. Years Considered in the Study
    • 1.3.3. Currency
  • 1.4. Limitations
  • 1.5. Stakeholders

2. Research Methodology

  • 2.1. Research Data
    • 2.1.1. Secondary Data
      • 2.1.1.1. Key Data From Secondary Sources
    • 2.1.2. Primary Data
      • 2.1.2.1. Key Data From Primary Sources
      • 2.1.2.2. Key Industry Insights
      • 2.1.2.3. Breakdown of Primaries
  • 2.2. Market Size Estimation
    • 2.2.1. Bottom-Up Approach
    • 2.2.2. Top-Down Approach
  • 2.3. Market Breakdown and Data Triangulation
  • 2.4. Research Assumptions and Limitations
    • 2.4.1. Assumptions
    • 2.4.2. Limitations

3. Executive Summary

4. Premium Insights

  • 4.1. Attractive Market Opportunities in Security and Vulnerability Management Market
  • 4.2. Security and Vulnerability Management: By Type
  • 4.3. Security and Vulnerability Management: Services Market
  • 4.4. Security and Vulnerability Management Market Across Various Regions
  • 4.5. Lifecycle Analysis, By Region, 2014

5. Market Overview

  • 5.1. Introduction
  • 5.2. Evolution
  • 5.3. Market Segmentation
    • 5.3.1. Security and Vulnerability Management Market
  • 5.4. Market Dynamics
    • 5.4.1. Drivers
      • 5.4.1.1. Enterprises Moving to the Cloud
      • 5.4.1.2. Increasing Government Compliance on Data Privacy
      • 5.4.1.3. Rising Threats From Cyber Attacks
    • 5.4.2. Restraints
      • 5.4.2.1. Lack of Awareness About Vulnerability Management Solutions
      • 5.4.2.2. Deployment Cost and Scalability
    • 5.4.3. Opportunities
      • 5.4.3.1. Growing Market of Mobility Devices and Web Platforms
      • 5.4.3.2. Evolution of Next-Generation Cyber Security Solutions
    • 5.4.4. Challenges
      • 5.4.4.1. Concerns About Data Breaches and Regulatory Compliance

6. Industry Trends

  • 6.1. Introduction
  • 6.2. Value Chain Analysis
  • 6.3. Porter's Five Forces Analysis
    • 6.3.1. Threat From New Entrants
    • 6.3.2. Threat of Substitutes
    • 6.3.3. Bargaining Power of Suppliers
    • 6.3.4. Bargaining Power of Buyers
    • 6.3.5. Intensity of Competitive Rivalry
  • 6.4. Strategic Benchmarking

7. Global Security and Vulnerability Management Market, By Type

  • 7.1. Introduction
  • 7.2. Solutions
    • 7.2.1. Security Information and Event Management
      • 7.2.1.1. Log and Event Management
      • 7.2.1.2. Firewall Security Management
      • 7.2.1.3. Patch Management
      • 7.2.1.4. Others
    • 7.2.2. Policy and Compliance
    • 7.2.3. Forensic and Incident Investigation
    • 7.2.4. Device Vulnerability Assessment
    • 7.2.5. Application Vulnerability Assessment
  • 7.3. Services
    • 7.3.1. Consulting
    • 7.3.2. Support
    • 7.3.3. Integration

8. Global Security and Vulnerability Management Market, By End User

  • 8.1. Introduction
  • 8.2. SMBS
  • 8.3. Enterprise

9. Global Security and Vulnerability Management Market, By Vertical

  • 9.1. Introduction
  • 9.2. BFSI
  • 9.3. It and Telecom
  • 9.4. Government and Defense
  • 9.5. Retail
  • 9.6. Energy and Utilities
  • 9.7. Healthcare
  • 9.8. Others

10. Geographic Analysis

  • 10.1. Introduction
  • 10.2. North America (NA)
  • 10.3. Europe
  • 10.4. Asia-Pacific (APAC)
  • 10.5. Latin America (LA)
  • 10.6. Middle East and Africa (MEA)

11. Competitive Landscape

  • 11.1. Overview
  • 11.2. Competitive Situation and Trends
    • 11.2.1. New Product/Service Developments
    • 11.2.2. Agreements, Partnerships, and Collaborations
    • 11.2.3. Mergers and Acquisitions
    • 11.2.4. Expansions

12. Company Profiles

  • 12.1. Introduction
  • 12.2. EMC Corporation
    • 12.2.1. Business Overview
    • 12.2.2. Solutions and Services
    • 12.2.3. Key Strategies
    • 12.2.4. Recent Developments, 2013-2014
    • 12.2.5. SWOT Analysis
    • 12.2.6. MNM View
  • 12.3. Hewlett-Packard
    • 12.3.1. Business Overview
    • 12.3.2. Solutions and Services
    • 12.3.3. Key Strategies
    • 12.3.4. Recent Developments, 2013-2014
    • 12.3.5. SWOT Analysis
    • 12.3.6. MNM View
  • 12.4. IBM Corporation
    • 12.4.1. Business Overview
    • 12.4.2. Solutions and Services
    • 12.4.3. Key Strategies
    • 12.4.4. Recent Developments, 2012-2014
    • 12.4.5. SWOT Analysis
    • 12.4.6. MNM View
  • 12.5. Qualys
    • 12.5.1. Business Overview
    • 12.5.2. Solutions and Services
    • 12.5.3. Key Strategies
    • 12.5.4. Recent Developments, 2012-2014
    • 12.5.5. SWOT Analysis
    • 12.5.6. MNM View
  • 12.6. Symantec Corporation
    • 12.6.1. Business Overview
    • 12.6.2. Solutions and Services
    • 12.6.3. Key Strategies
    • 12.6.4. Recent Developments, 2012-2014
    • 12.6.5. SWOT Analysis
    • 12.6.6. MNM View
  • 12.7. Microsoft Corporation
    • 12.7.1. Business Overview
    • 12.7.2. Solutions and Services
    • 12.7.3. Key Strategies
    • 12.7.4. Recent Developments, 2012-2014
    • 12.7.5. MNM View
  • 12.8. Mcafee, Inc.
    • 12.8.1. Business Overview
    • 12.8.2. Solutions and Services
    • 12.8.3. Key Strategies
    • 12.8.4. Recent Developments, 2012-2014
    • 12.8.5. MNM View
  • 12.9. Netiq Corporation
    • 12.9.1. Business Overview
    • 12.9.2. Solutions and Services
    • 12.9.3. Key Strategies
    • 12.9.4. Recent Developments, 2012-2014
    • 12.9.5. MNM View
  • 12.1. Rapid7
    • 12.10.1. Business Overview
    • 12.10.2. Solutions and Services
    • 12.10.3. Key Strategies
    • 12.10.4. Recent Developments, 2012-2014
    • 12.10.5. MNM View
  • 12.11. Tripwire
    • 12.11.1. Business Overview
    • 12.11.2. Solutions and Services
    • 12.11.3. Key Strategies
    • 12.11.4. Recent Developments, 2012-2014
    • 12.11.5. MNM View

13. Appendix

  • 13.1. Insights of Industry Experts
  • 13.2. Discussion Guide
  • 13.3. Introducing RT: Real-Time Market Intelligence
  • 13.4. Available Customizations
  • 13.5. Related Reports

List of Tables

  • Table 1: Assumptions of the Research Study
  • Table 2: Global Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Billion)
  • Table 3: Rising Threat From Cyber Security is Majorly Propelling the Growth of the Security and Vulnerability Management Market
  • Table 4: Lack of Awareness About Vulnerability Management Solutions Are Hampering the Growth of the Security and Vulnerability Management Market
  • Table 5: Evolution of Next-Generation Cyber-Security Solutions Has Created Opportunities for the Rise in Security and Vulnerability Management Market
  • Table 6: Concerns About Data Breaches and Regulatory Compliance Could Result in Major Security and Vulnerability Management Challenges
  • Table 7: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 8: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 9: SIEM Market Size, By Type, 2012-2019 ($Million)
  • Table 10: Log and Event Management Market Size, By Region, 2012-2019 ($Million)
  • Table 11: Firewall Security Management Market Size, By Region, 2012-2019 ($Million)
  • Table 12: Patch Management Market Size, By Region, 2012-2019 ($Million)
  • Table 13: Other SIEM Solutions Market Size, By Region, 2012-2019 ($Million)
  • Table 14: Policy and Compliance Market Size, By Region, 2012-2019 ($Million)
  • Table 15: Forensic and Incident Investigation Market Size, By Region, 2012-2019 ($Million)
  • Table 16: Device Vulnerability Assessment Market Size, By Region, 2012-2019 ($Million)
  • Table 17: Application Vulnerability Assessment Market Size, By Region, 2012-2019 ($Million)
  • Table 18: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 19: Consulting Market Size, By Region, 2012-2019 ($Million)
  • Table 20: Support Market Size, By Region, 2012-2019 ($Million)
  • Table 21: Integration Market Size, By Region, 2012-2019 ($Million)
  • Table 22: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 23: SMBS Market Size, By Region, 2012-2019 ($Million)
  • Table 24: Enterprise Market Size, By Region, 2012-2019 ($Million)
  • Table 25: Security and Vulnerability Management Market Size , By Vertical, 2012-2019 ($Million)
  • Table 26: BFSI Market Size, By Region, 2012-2019 ($Million)
  • Table 27: It and Telecom Market Size, By Region, 2012-2019 ($Million)
  • Table 28: Government and Defense Market Size, By Region, 2012-2019 ($Million)
  • Table 29: Retail Market Size, By Region, 2012-2019 ($Million)
  • Table 30: Energy and Utilities Market Size, By Region, 2012-2019 ($Million)
  • Table 31: Healthcare Market Size, By Region, 2012-2019 ($Million)
  • Table 32: Other Verticals Market Size, By Region, 2012-2019 ($Million)
  • Table 33: Security and Vulnerability Management Market Size, By Region, 2012-2019 ($Million)
  • Table 34: NA: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 35: NA: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 36: NA: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 37: NA: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 38: NA: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 39: NA: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 40: NA: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 41: Europe: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 42: Europe: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 43: Europe: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 44: Europe: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 45: Europe: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 46: Europe: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 47: Europe: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 48: APAC: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 49: APAC: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 50: APAC: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 51: APAC: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 52: APAC: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 53: APAC: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 54: APAC: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 55: LA: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 56: LA: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 57: LA: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 58: LA: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 59: LA: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 60: LA: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 61: LA: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 62: MEA: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 63: MEA: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 64: MEA: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 65: MEA: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 66: MEA: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 67: MEA: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 68: MEA: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 69: New Product/Service Developments, 2012-2014
  • Table 70: Agreements, Partnerships, and Collaborations, 2012-2014
  • Table 71: Mergers and Acquisitions, 2012-2014
  • Table 72: Expansions, 2012-2014

List of Figures

  • Figure 1: Security and Vulnerability Management Market: Stakeholders
  • Figure 2: Research Design
  • Figure 3: Bottom-Up Approach
  • Figure 4: Top-Down Approach
  • Figure 5: Limitations of the Research
  • Figure 6: Security and Vulnerability Management Market: By Type(Solutions), 2014
  • Figure 7: Security and Vulnerability Management Market Snapshot (2014 vs. 2019): SIEM Solution Constitutes the Largest Market
  • Figure 8: Large-Scale Implementation of Smarter Solutions Will Act as An Attractive Market Opportunity
  • Figure 9: Consulting Services to Grow With the Highest Rate During the Forecast
  • Figure 10: Integration Service Has Gained Largest Demand and Market Share in the Year 2014
  • Figure 11: North America to Be the Most Lucrative Security and Vulnerability Management Market in 2014
  • Figure 12: APAC Security and Vulnerability Management Market is Expected to Be in the High Growth Phase in the Near Future
  • Figure 13: Evolution of Security and Vulnerability Management Market
  • Figure 14: Security and Vulnerability Management Segmentation
  • Figure 15: Greater Adoption of Cloud By Enterprises Would Drive the Security and Vulnerability Management Market
  • Figure 16: Value Chain Analysis
  • Figure 17: Porter's Five Forces Analysis: Security and Vulnerability Management Market
  • Figure 18: IBM Adopted All-Round Strategies for Technology Integration and Product Enhancement
  • Figure 19: Security and Vulnerability Management Solution to Exhibit the Highest CAGR During the Forecast Period
  • Figure 20: Application Vulnerability Assessment to Remain in High Growth During the Forecast Period
  • Figure 21: Log and Event Management Continues to Dominate in the SIEM Segment
  • Figure 22: Consulting Services Show A High Growth During the Forecast
  • Figure 23: SMBS Segment to Exhibit the Highest CAGR During the Forecast Period
  • Figure 24: BFSI is Expected to Show Greater Demand in the Market During the Forecast
  • Figure 25: NA to Have Major Share of the Market During the Forecast Period(2014-2019)
  • Figure 26: The Solution Snapshot Across Regions Shows A Favorable Market in the APAC Region
  • Figure 27: North America Market Snapshot: Strict Government Regulations to Drive Higher Adoption in the Market
  • Figure 28: Asia-Pacific Market Snapshot: the Rapidly Growing Internet Devices Will Fuel the Need for Greater Network Security
  • Figure 29: Companies Adopted New Product/Service Developments as the Key Growth Strategies Over the Last 3 Years
  • Figure 30: New Product/Service Developments Would Fuel the Intense Competition in the Market
  • Figure 31: IBM Considered as A Forerunner in Providing Comprehensive Solutions Portfolio
  • Figure 32: Battle for Market Share: New Product/Service Developments Has Been Seen as the Key Strategy for Company Growth
  • Figure 33: Geographic Revenue Mix of Top 5 Market Players
  • Figure 34: EMC: Company Snapshot
  • Figure 35: EMC: SWOT Analysis
  • Figure 36: Hewlett-Packard: Company Snapshot
  • Figure 37: Hewlett-Packard: SWOT Analysis
  • Figure 38: IBM: Company Snapshot
  • Figure 39: IBM: SWOT Analysis
  • Figure 40: Qualys: Company Snapshot
  • Figure 41: Qualys: SWOT Analysis
  • Figure 42: Symantec: Company Snapshot
  • Figure 43: Symantec: SWOT Analysis
  • Figure 44: Microsoft: Company Snapshot
Back to Top