表紙
市場調査レポート

脅威情報セキュリティの世界市場予測 2020年:SIEM・ログ管理・IAM・SVM・リスク管理・インシデントフォレンジック

Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics), Service (Managed, Professional), Deployment, Organization Size, Vertical, Region - Global Forecast to 2020

発行 MarketsandMarkets 商品コード 335104
出版日 ページ情報 英文 139 Pages
即納可能
価格
本日の銀行送金レート: 1USD=101.39円で換算しております。
Back to Top
脅威情報セキュリティの世界市場予測 2020年:SIEM・ログ管理・IAM・SVM・リスク管理・インシデントフォレンジック Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics), Service (Managed, Professional), Deployment, Organization Size, Vertical, Region - Global Forecast to 2020
出版日: 2015年07月07日 ページ情報: 英文 139 Pages
概要

世界の脅威情報セキュリティ市場規模は2015年から2020年にかけて14.3%のCAGRで拡大し、2015年の30億270万米ドルから、2020年までに58億6,050万米ドルに達すると予測されています。主要企業には、IBM、Intel Security (McAfee)、Symantec、Trend Micro、Dell SecureWorks、Juniper Networks、Cyveillance および Webroot などが含まれます。

当レポートは、世界の脅威情報セキュリティ市場について調査分析し、ソリューション、サービス、展開タイプ、組織規模、垂直産業、および地域別の市場分析を提供しており、競合情勢および主要企業のプロファイルなどをまとめ、お届けいたします。

第1章 イントロダクション

第2章 調査手法

第3章 エグゼクティブサマリー

第4章 重要考察

  • 脅威情報セキュリティ市場における魅力的な市場機会
  • 脅威情報セキュリティ市場:サービス別
  • 世界の脅威情報セキュリティ市場
  • ライフサイクル分析:地域別

第5章 市場概要

  • イントロダクション
  • 市場発展
  • 市場区分
  • 市場ダイナミクス
    • 促進因子
    • 阻害因子
    • 機会
    • 脅威

第6章 産業動向

  • イントロダクション
  • バリューチェーン分析
  • ポーターのファイブフォース分析

第7章 脅威情報セキュリティ市場分析:ソリューション別

  • イントロダクション
  • セキュリティ情報・イベント管理
  • ログ管理
  • ID・アクセス管理
  • セキュリティ・脆弱性管理
  • リスク管理
  • インシデントフォレンジック

第8章 脅威情報セキュリティ市場分析:サービス別

  • イントロダクション
  • マネージドサービス
  • プロフェッショナルサービス

第9章 脅威情報セキュリティ市場分析:展開タイプ別

  • イントロダクション
  • クラウド
  • オンプレミス

第10章 脅威情報セキュリティ市場分析:組織規模別

  • イントロダクション
  • SMB (中小企業)
  • 大企業

第11章 脅威情報セキュリティ市場分析:垂直産業別

  • イントロダクション
  • 政府
  • BFSI
  • IT & 通信
  • 医療
  • 小売り
  • 輸送
  • エネルギー & ユーティリティ
  • 製造
  • 教育
  • その他

第12章 地域分析

  • イントロダクション
  • 北米
  • 欧州
  • アジア太平洋地域 (APAC)
  • 中東・アフリカ (MEA)
  • ラテンアメリカ

第13章 競合情勢

  • 概要
  • 競合状況・動向

第14章 企業プロファイル

  • イントロダクション
  • IBM
  • MCAFEE (INTEL SECURITY)
  • SYMANTEC
  • TREND MICRO
  • CYVEILLANCE
  • DELL SECUREWORKS
  • JUNIPER NETWORKS
  • ARBOR NETWORKS
  • FIREEYE
  • WEBROOT

第15章 付録

図表

目次
Product Code: TC 3591

In today's cyber security landscape, it is very difficult to protect enterprise networks against advanced threats by employing traditional security measures. To combat these sophisticated threats, organizations are taking countermeasures by implementing threat intelligence security solutions against advanced, persistent threats, zero-day malwares, and other undisclosed threats to protect critical information thefts.

An increase in the number of sophisticated threats and the growing government compliance on data security are the main drivers of the threat intelligence security market. The lack of awareness about advance security threats is a major restraint of the threat intelligence market. The major challenge in this market would be the dynamic nature of advanced threats attacking the enterprise networks.

The report also provides an in-depth analysis of the threat intelligence security market across the solutions, services, deployment types, organization size, verticals, and regions. The geographical segmentation covers North America, Europe, Asia-Pacific (APAC), the Middle East and Africa (MEA), and Latin America. Among all the regions, North America holds the largest market share in the threat intelligence security market, whereas APAC is the fastest-growing growing region. Small and medium businesses in APAC are rapidly adopting cloud-based threat intelligence solutions, which is driving the market in this region.

The threat intelligence security market size is expected to grow from $3,002.7 million in 2015 to $5,860.5 million by 2020, at a Compound Annual Growth Rate (CAGR) of 14.3% from 2015 to 2020. The key players in this market include IBM, Intel Security (McAfee), Symantec, Trend Micro, Dell SecureWorks, Juniper Networks, Cyveillance, and Webroot.

There are various assumptions that have been taken into consideration for the market sizing and forecasting exercise. A few of the global assumptions include political, economic, social, technological, and economic factors. The dollar fluctuations are expected not to seriously affect the forecasts in the emerging regions.

The report will help the market leaders or new entrants in this market in the following ways:

  • 1. This report segments the market into various subsegments covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market and the subsegments. The market numbers are further split across the different end users and regions.
  • 2. This report will help in the better understanding of the competitors and gain more insights to better one's position in business. There is a separate section on competitive landscape, which includes competitor ecosystem, mergers and acquisitions, partnerships, agreements and collaborations, and business expansion developments. Apart from this, the report includes the company profiles of the top 10 players in the threat intelligence security market. In this section, the companies' market internals and key strategies are provided that can put one ahead of the competitors.
  • 3. The report also helps in understanding the overall growth of the threat intelligence security market. It provides information on the key market drivers, restraints, challenges, and opportunities.

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. OBJECTIVES OF THE STUDY
  • 1.2. MARKET DEFINITION
  • 1.3. MARKET SCOPE
    • 1.3.1. MARKETS COVERED
    • 1.3.2. YEARS CONSIDERED FOR THE STUDY
  • 1.4. CURRENCY
  • 1.5. LIMITATIONS
  • 1.6. STAKEHOLDERS

2. RESEARCH METHODOLOGY

  • 2.1. MARKET SIZE ESTIMATION
    • 2.1.1. BOTTOM-UP APPROACH
    • 2.1.2. TOP-DOWN APPROACH
      • 2.1.2.1. Breakdown of Primary Interviews
  • 2.2. MARKET BREAKDOWN AND DATA TRIANGULATION
    • 2.2.1. MARKET SHARE ESTIMATION
    • 2.2.2. KEY DATA FROM SECONDARY SOURCES
    • 2.2.3. KEY DATA FROM PRIMARY SOURCES
  • 2.3. ASSUMPTIONS
  • 2.4. KEY INDUSTRY INSIGHTS

3. EXECUTIVE SUMMARY

4. PREMIUM INSIGHTS

  • 4.1. ATTRACTIVE MARKET OPPORTUNITIES IN THREAT INTELLIGENCE SECURITY MARKET
  • 4.2. THREAT INTELLIGENCE SECURITY MARKET, BY SERVICE
  • 4.3. THREAT INTELLIGENCE GLOBAL MARKET
  • 4.4. LIFECYCLE ANALYSIS, BY REGION

5. MARKET OVERVIEW

  • 5.1. INTRODUCTION
  • 5.2. MARKET EVOLUTION
  • 5.3. MARKET SEGMENTATION
  • 5.4. MARKET DYNAMICS
    • 5.4.1. DRIVERS
      • 5.4.1.1. Rise in the number of sophisticated threats
      • 5.4.1.2. Increasing government compliance on data security
      • 5.4.1.3. Cloud adoption across enterprises
    • 5.4.2. RESTRAINTS
      • 5.4.2.1. Lack of awareness about advance security threats
      • 5.4.2.2. Lack of security talent
    • 5.4.3. OPPORTUNITIES
      • 5.4.3.1. Rapid adoption of BYOD model
      • 5.4.3.2. Evolution of next-generation threat intelligence solutions
      • 5.4.3.3. Integration of big data analytics with threat intelligence
    • 5.4.4. CHALLENGES
      • 5.4.4.1. Diverse nature of threats
      • 5.4.4.2. Heterogeneous information security infrastructure

6. INDUSTRY TRENDS

  • 6.1. INTRODUCTION
  • 6.2. VALUE CHAIN ANALYSIS
  • 6.3. PORTER'S FIVE FORCES ANALYSIS
    • 6.3.1. THREAT OF SUBSTITUTES
    • 6.3.2. BARGAINING POWER OF BUYERS
    • 6.3.3. THREAT OF NEW ENTRANTS
    • 6.3.4. BARGAINING POWER OF THE SUPPLIERS
    • 6.3.5. INTENSITY OF COMPETITIVE RIVALRY

7. THREAT INTELLIGENCE SECURITY MARKET ANALYSIS, BY SOLUTION

  • 7.1. INTRODUCTION
  • 7.2. SECURITY INFORMATION AND EVENT MANAGEMENT
  • 7.3. LOG MANAGEMENT
  • 7.4. IDENTITY AND ACCESS MANAGEMENT
  • 7.5. SECURITY AND VULNERABILITY MANAGEMENT
  • 7.6. RISK MANAGEMENT
  • 7.7. INCIDENT FORENSICS

8. THREAT INTELLIGENCE SECURITY MARKET ANALYSIS, BY SERVICE

  • 8.1. INTRODUCTION
  • 8.2. MANAGED SERVICES
  • 8.3. PROFESSIONAL SERVICES

9. THREAT INTELLIGENCE SECURITY MARKET ANALYSIS, BY DEPLOYMENT TYPE

  • 9.1. INTRODUCTION
  • 9.2. CLOUD
  • 9.3. ON PREMISES

10. THREAT INTELLIGENCE SECURITY MARKET ANALYSIS, BY ORGANIZATION SIZE

  • 10.1. INTRODUCTION
  • 10.2. SMALL AND MEDIUM BUSINESSES
  • 10.3. LARGE ENTERPRISES

11. THREAT INTELLIGENCE SECURITY MARKET ANALYSIS, BY VERTICAL

  • 11.1. INTRODUCTION
  • 11.2. GOVERNMENT
  • 11.3. BANKING, FINANCIAL SERVICES, AND INSURANCE
  • 11.4. IT AND TELECOM
  • 11.5. HEALTHCARE
  • 11.6. RETAIL
  • 11.7. TRANSPORTATION
  • 11.8. ENERGY AND UTILITIES
  • 11.9. MANUFACTURING
  • 11.10. EDUCATION
  • 11.11. OTHERS

12. GEOGRAPHIC ANALYSIS

  • 12.1. INTRODUCTION
  • 12.2. NORTH AMERICA
  • 12.3. EUROPE
  • 12.4. ASIA-PACIFIC
  • 12.5. MIDDLE EAST AND AFRICA
  • 12.6. LATIN AMERICA

13. COMPETITIVE LANDSCAPE

  • 13.1. OVERVIEW
  • 13.2. COMPETITIVE SITUATION AND TRENDS
    • 13.2.1. NEW PRODUCT LAUNCHES
    • 13.2.2. AGREEMENTS, PARTNERSHIPS, COLLABORATIONS, AND JOINT VENTURES
    • 13.2.3. MERGERS AND ACQUISITIONS

14. COMPANY PROFILES (Overview, Products & Services, Strategies & Insights, Developments and MnM View)*

  • 14.1. INTRODUCTION
  • 14.2. IBM
  • 14.3. MCAFEE (INTEL SECURITY)
  • 14.4. SYMANTEC
  • 14.5. TREND MICRO
  • 14.6. CYVEILLANCE
  • 14.7. DELL SECUREWORKS
  • 14.8. JUNIPER NETWORKS
  • 14.9. ARBOR NETWORKS
  • 14.10. FIREEYE
  • 14.11. WEBROOT

*Details on Overview, Products & Services, Strategies & Insights, Developments and MnM View might not be captured in case of unlisted companies.

15. APPENDIX

  • 15.1. INDUSTRY EXPERTS
  • 15.2. DISCUSSION GUIDE
  • 15.3. INTRODUCTION RT: REAL-TIME MARKET INTELLIGENCE
  • 15.4. AVAILABLE CUSTOMIZATIONS
  • 15.5. RELATED REPORTS

LIST OF TABLES

  • TABLE 1: THREAT INTELLIGENCE SECURITY MARKET SIZE AND GROWTH, 2013-2020 ($MILLION, Y-O-Y %)
  • TABLE 2: DRIVERS: IMPACT ANALYSIS
  • TABLE 3: RESTRAINTS: IMPACT ANALYSIS
  • TABLE 4: OPPORTUNITIES: IMPACT ANALYSIS
  • TABLE 5: CHALLENGES: IMPACT ANALYSIS
  • TABLE 6: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SOLUTION, 2013-2020 ($MILLION)
  • TABLE 7: SIEM: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 8: LOG MANAGEMENT: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 9: IDENTITY AND ACCESS MANAGEMENT: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 10: SECURITY AND VULNERABILITY MANAGEMENT: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 11: RISK MANAGEMENT: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 12: INCIDENT FORENSICS: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 13: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SERVICE, 2013-2020 ($MILLION)
  • TABLE 14: MANAGED SERVICES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY TYPE, 2013-2020 ($MILLION)
  • TABLE 15: MANAGED SERVICES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 16: PROFESSIONAL SERVICES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY TYPE, 2013-2020 ($MILLION)
  • TABLE 17: PROFESSIONAL SERVICES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 18: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY DEPLOYMENT, 2013-2020 ($MILLION)
  • TABLE 19: CLOUD: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 20: CLOUD: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 21: ON PREMISES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 22: ON PREMISES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 23: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 24: SMALL AND MEDIUM BUSINESSES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY DEPLOYMENT, 2013-2020 ($MILLION)
  • TABLE 25: SMALL AND MEDIUM BUSINESSES: THREAT INTELLIGENCE SECURITY MARKET SIZE, B Y REGION, 2013-2020 ($MILLION)
  • TABLE 26: LARGE ENTERPRISES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY DEPLOYMENT, 2013-2020 ($MILLION)
  • TABLE 27: LARGE ENTERPRISES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 28: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY VERTICAL, 2013-2020 ($MILLION)
  • TABLE 29: GOVERNMENT: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 30: BANKING, FINANCIAL SERVICES, AND INSURANCE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 31: IT AND TELECOM: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 32: HEALTHCARE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 33: RETAIL: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 34: TRANSPORTATION: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 35: ENERGY AND UTILITIES: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 36: MANUFACTURING: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 37: EDUCATION: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 38: OTHERS: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 39: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY REGION, 2013-2020 ($MILLION)
  • TABLE 40: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY COMPONENT, 2013-2020 ($MILLION)
  • TABLE 41: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SOLUTION, 2013-2020 ($MILLION)
  • TABLE 42: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SERVICE, 2013-2020 ($MILLION)
  • TABLE 43: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY MANAGED SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 44: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY PROFESSIONAL SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 45: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 46: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY DEPLOYMENT TYPE, 2013-2020 ($MILLION)
  • TABLE 47: NORTH AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY VERTICAL, 2013-2020 ($MILLION)
  • TABLE 48: EUROPE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY COMPONENT, 2013-2020 ($MILLION)
  • TABLE 49: EUROPE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SOLUTION, 2013-2020 ($MILLION)
  • TABLE 50: EUROPE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SERVICE, 2013-2020 ($MILLION)
  • TABLE 51: EUROPE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY MANAGED SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 52: EUROPE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY PROFESSIONAL SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 53: EUROPE: THREAT INTELLIGENCE MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 54: EUROPE: THREAT INTELLIGENCE MARKET SIZE, BY DEPLOYMENT TYPE, 2013-2020 ($MILLION)
  • TABLE 55: EUROPE: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY VERTICAL, 2013-2020 ($MILLION)
  • TABLE 56: APAC: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY COMPONENT, 2013-2020 ($MILLION)
  • TABLE 57: APAC: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SOLUTION, 2013-2020 ($MILLION)
  • TABLE 58: APAC: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SERVICE, 2013-2020 ($MILLION)
  • TABLE 59: APAC: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY MANAGED SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 60: APAC: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY PROFESSIONAL SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 61: APAC: THREAT INTELLIGENCE MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 62: APAC: THREAT INTELLIGENCE MARKET SIZE, BY DEPLOYMENT TYPE, 2013-2020 ($MILLION)
  • TABLE 63: APAC: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY VERTICAL, 2013-2020 ($MILLION)
  • TABLE 64: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY COMPONENT, 2013-2020 ($MILLION)
  • TABLE 65: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SOLUTION, 2013-2020 ($MILLION)
  • TABLE 66: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SERVICE, 2013-2020 ($MILLION)
  • TABLE 67: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY MANAGED SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 68: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY PROFESSIONAL SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 69: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 70: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY DEPLOYMENT TYPE, 2013-2020 ($MILLION)
  • TABLE 71: MIDDLE EAST AND AFRICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY VERTICAL, 2013-2020 ($MILLION)
  • TABLE 72: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY COMPONENT, 2013-2020 ($MILLION)
  • TABLE 73: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SOLUTION, 2013-2020 ($MILLION)
  • TABLE 74: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY SERVICE, 2013-2020 ($MILLION)
  • TABLE 75: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY MANAGED SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 76: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY PROFESSIONAL SERVICE TYPE, 2013-2020 ($MILLION)
  • TABLE 77: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
  • TABLE 78: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY DEPLOYMENT TYPE, 2013-2020 ($MILLION)
  • TABLE 79: LATIN AMERICA: THREAT INTELLIGENCE SECURITY MARKET SIZE, BY VERTICAL, 2013-2020 ($MILLION)
  • TABLE 80: NEW PRODUCT LAUNCHES, 2011-2014
  • TABLE 81: AGREEMENTS, PARTNERSHIPS, COLLABORATIONS, AND JOINT VENTURES, 2011-2014
  • TABLE 82: MERGERS AND ACQUISITIONS, 2012-2015

LIST OF FIGURES

  • FIGURE 1: GLOBAL THREAT INTELLIGENCE SECURITY MARKET: RESEARCH DESIGN
  • FIGURE 2: MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
  • FIGURE 3: MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
  • FIGURE 4: BREAKDOWN OF PRIMARY INTERVIEWS: BY COMPANY TYPE, DESIGNATION, AND REGION
  • FIGURE 5: DATA TRIANGULATION
  • FIGURE 6: SERVICES MARKET TO GROW THE FASTEST DURING THE FORECAST PERIOD
  • FIGURE 7: CLOUD DEPLOYMENT WILL FUEL THE GROWTH OF THE GLOBAL THREAT INTELLIGENCE SECURITY MARKET FROM 2015 TO 2020
  • FIGURE 8: LARGER ENTERPRISES ARE EXPECTED TO HOLD THE MAXIMUM MARKET SIZE FROM 2015 TO 2020
  • FIGURE 9: BFSI VERTICAL TO GROW AT THE HIGHEST CAGR FROM 2015 TO 2020
  • FIGURE 10: NORTH AMERICA IS EXPECTED TO CONTRIBUTE THE LARGEST SHARE TO THREAT INTELLIGENCE SECURITY MARKET IN 2015
  • FIGURE 11: RISE IN AWARENESS FOR CYBER THREATS WILL PROPEL THE THREAT INTELLIGENCE SECURITY MARKET
  • FIGURE 12: PROFESSIONAL SERVICES TO GROW WITH THE HIGHEST RATE DURING THE FORECAST PERIOD
  • FIGURE 13: SIEM WILL CONTINUE TO DOMINATE THE THREAT INTELLIGENCE SECURITY MARKET
  • FIGURE 14: ASIA PACIFIC WOULD BE IN THE HIGH GROWTH PHASE DURING THE FORECAST PERIOD
  • FIGURE 15: EVOLUTION OF THREAT INTELLIGENCE SECURITY MARKET
  • FIGURE 16: THREAT INTELLIGENCE SECURITY MARKET SEGMENTATION
  • FIGURE 17: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES OF THE THREAT INTELLIGENCE SECURITY MARKET
  • FIGURE 18: THREAT INTELLIGENCE SECURITY MARKET: VALUE CHAIN
  • FIGURE 19: SIEM IS EXPECTED TO HOLD THE LARGEST MARKET SIZE FROM 2015 TO 2020
  • FIGURE 20: PROFESSIONAL SERVICES TO GROW THE HIGHEST DURING THE FORECAST PERIOD
  • FIGURE 21: CLOUD-BASED DEPLOYMENT FOR THREAT INTELLIGENCE SECURITY TO GROW THE HIGHEST DURING THE FORECAST PERIOD
  • FIGURE 22: SMB TO GROW WITH THE HIGHEST RATE DURING THE FORECAST PERIOD
  • FIGURE 23: NORTH AMERICA HAS THE LARGEST MARKET SIZE IN THE GLOBAL THREAT INTELLIGENCE SECURITY MARKET
  • FIGURE 24: REGIONAL SNAPSHOT: MEA IS EMERGING AS A NEW HOTSPOT
  • FIGURE 25: APAC: AN EMERGING DESTINATION FOR THREAT INTELLIGENCE SECURITY MARKET
  • FIGURE 26: NORTH AMERICA MARKET SNAPSHOT: PRESENCE OF MAJOR THREAT INTELLIGENCE SECURITY VENDORS IS A FACTOR CONTRIBUTING TOWARDS GROWTH IN THIS REGION
  • FIGURE 27: APAC MARKET SNAPSHOT: RISING DEMAND FOR THREAT INTELLIGENCE SECURITY VENDORS IS THE MAJOR DRIVER FOR MARKET IN THIS REGION
  • FIGURE 28: COMPANIES ADOPTED NEW PRODUCT LAUNCH AS THE KEY GROWTH STRATEGY BETWEEN 2011 AND 2014
  • FIGURE 29: SYMANTEC GREW AT THE HIGHEST GROWTH RATE BETWEEN 2010 AND 2014
  • FIGURE 30: BATTLE FOR MARKET SHARE: PARTNERSHIP, AGREEMENT, AND COLLABORATION IS THE KEY STRATEGY OF THE LEADING MARKET PLAYERS
  • FIGURE 31: GEOGRAPHIC REVENUE MIX OF TOP MARKET PLAYERS
  • FIGURE 32: IBM: COMPANY SNAPSHOT
  • FIGURE 33: SWOT ANALYSIS: IBM
  • FIGURE 34: SWOT ANALYSIS: INTEL SECURITY
  • FIGURE 35: SYMANTEC: COMPANY SNAPSHOT
  • FIGURE 36: SWOT ANALYSIS: SYMANTEC
  • FIGURE 37: TREND MICRO: COMPANY SNAPSHOT
  • FIGURE 38: SWOT ANALYSIS: TREND MICRO
  • FIGURE 39: SWOT ANALYSIS: CYVEILLANCE
  • FIGURE 40: JUNIPER NETWORKS: COMPANY SNAPSHOT
  • FIGURE 41: FIREEYE: COMPANY SNAPSHOT
Back to Top