株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

自動侵害・攻撃シミュレーションの世界市場 - 2024年までの予測:コンフィギュレーション管理、パッチ管理、脅威インテリジェンス

Automated Breach and Attack Simulation Market by Offerings (Platforms/Tools, Services), Application (Configuration Management, Patch Management, Threat Intelligence), End Users, Region - Global Forecast to 2024

発行 MarketsandMarkets 商品コード 907158
出版日 ページ情報 英文 101 Pages
即納可能
価格
本日の銀行送金レート: 1USD=109.74円で換算しております。
Back to Top
自動侵害・攻撃シミュレーションの世界市場 - 2024年までの予測:コンフィギュレーション管理、パッチ管理、脅威インテリジェンス Automated Breach and Attack Simulation Market by Offerings (Platforms/Tools, Services), Application (Configuration Management, Patch Management, Threat Intelligence), End Users, Region - Global Forecast to 2024
出版日: 2019年08月14日 ページ情報: 英文 101 Pages
概要

自動侵害・攻撃シミュレーション市場は、2019年の1億3400万米ドルから、2024年までに7億2400万米ドルまで拡大すると見られています。市場は、2019年~2024年のCAGR (複合年間成長率) で、40.2%の成長が予測されています。

当レポートでは、世界の自動侵害・攻撃シミュレーション市場について調査分析し、市場概要、産業動向、セグメント別の市場分析、競合情勢、主要企業などについて、体系的な情報を提供しています。

第1章 イントロダクション

第2章 調査手法

第3章 エグゼクティブサマリー

第4章 重要考察

  • 自動侵害・攻撃シミュレーション市場の魅力的な機会
  • 自動侵害・攻撃シミュレーション市場:提供別
  • 自動侵害・攻撃シミュレーション市場:サービス別
  • 自動侵害・攻撃シミュレーション市場:アプリケーション別
  • 自動侵害・攻撃シミュレーション市場:地域別

第5章 市場概要と産業動向

  • イントロダクション
  • 市場力学
    • 促進要因
    • 抑制要因
    • 機会
    • 課題
  • ユースケース

第6章 自動侵害・攻撃シミュレーションの世界市場:提供別

  • イントロダクション
  • プラットフォーム/ツール
  • サービス

第7章 自動侵害・攻撃シミュレーションの世界市場:アプリケーション別

  • イントロダクション
  • コンフィギュレーション管理
  • パッチ管理
  • 脅威インテリジェンス
  • その他

第8章 自動侵害・攻撃シミュレーションの世界市場:エンドユーザー別

  • 概要
  • 企業・データセンター
  • マネージドサービスプロバイダー

第9章 自動侵害・攻撃シミュレーションの世界市場:地域別

  • イントロダクション
  • 北米
  • 欧州
  • アジア太平洋地域
  • その他

第10章 競合情勢

  • 競合リーダーシップマッピング
  • 製品ポートフォリオの強み
  • 事業戦略の優秀性
  • 主要企業のランキング

第11章 企業プロファイル

  • イントロダクション
  • QUALYS
  • RAPID7
  • DXC TECHNOLOGY
  • ATTACKIQ
  • CYMULATE
  • XM CYBER
  • SKYBOX SECURITY
  • SAFEBREACH
  • FIREMON
  • VERODIN (FIREEYE)
  • NOPSEC
  • THREATCARE
  • MAZEBOLT
  • SCYTHE
  • CRONUS CYBER TECHNOLOGIES

第12章 付録

図表

LIST OF TABLES

  • TABLE 1 UNITED STATES DOLLAR EXCHANGE RATE, 2016-2018
  • TABLE 2 FACTOR ANALYSIS
  • TABLE 3 AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, 2017-2024 (USD MILLION)
  • TABLE 4 AUTOMATED BREACH AND ATTACK SIMULATION MARKET: USE CASES
  • TABLE 5 AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY OFFERING, 2017-2024 (USD THOUSAND)
  • TABLE 6 PLATFORMS/TOOLS: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 7 SERVICES: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY TYPE, 2017-2024 (USD THOUSAND)
  • TABLE 8 SERVICES: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 9 TRAINING: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 10 ON-DEMAND ANALYST: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 11 AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY APPLICATION, 2017-2024 (USD THOUSAND)
  • TABLE 12 CONFIGURATION MANAGEMENT: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 13 PATCH MANAGEMENT: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 14 THREAT INTELLIGENCE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 15 OTHERS: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 16 AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY REGION, 2017-2024 (USD THOUSAND)
  • TABLE 17 NORTH AMERICA: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY OFFERING, 2017-2024 (USD THOUSAND)
  • TABLE 18 NORTH AMERICA: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY SERVICE, 2017-2024 (USD THOUSAND)
  • TABLE 19 NORTH AMERICA: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY APPLICATION, 2017-2024 (USD THOUSAND)
  • TABLE 20 NORTH AMERICA: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY END USER, 2017-2024 (USD THOUSAND)
  • TABLE 21 EUROPE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY OFFERING, 2017-2024 (USD THOUSAND)
  • TABLE 22 EUROPE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY SERVICE, 2017-2024 (USD THOUSAND)
  • TABLE 23 EUROPE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY APPLICATION, 2017-2024 (USD THOUSAND)
  • TABLE 24 ASIA PACIFIC: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY OFFERING, 2017-2024 (USD THOUSAND)
  • TABLE 25 ASIA PACIFIC: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY SERVICE, 2017-2024 (USD THOUSAND)
  • TABLE 26 ASIA PACIFIC: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY APPLICATION, 2017-2024 (USD THOUSAND)
  • TABLE 27 REST OF THE WORLD: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY OFFERING, 2017-2024 (USD THOUSAND)
  • TABLE 28 REST OF THE WORLD: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY SERVICE, 2017-2024 (USD THOUSAND)
  • TABLE 29 REST OF THE WORLD: AUTOMATED BREACH AND ATTACK SIMULATION MARKET SIZE, BY APPLICATION, 2017-2024 (USD THOUSAND)

LIST OF FIGURES

  • FIGURE 1 AUTOMATED BREACH AND ATTACK SIMULATION MARKET: RESEARCH DESIGN
  • FIGURE 2 AUTOMATED BREACH AND ATTACK SIMULATION MARKET: TOP-DOWN AND BOTTOM-UP APPROACHES
  • FIGURE 3 PLATFORMS/TOOLS SEGMENT TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD (USD THOUSAND)
  • FIGURE 4 TRAINING SEGMENT TO DOMINATE THE ABAS MARKET DURING THE FORECAST PERIOD
  • FIGURE 5 THREAT INTELLIGENCE APPLICATION TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 6 NORTH AMERICA TO ACCOUNT FOR THE HIGHEST MARKET SHARE IN 2019
  • FIGURE 7 DEMAND FOR ABAS SOLUTIONS TO HELP ORGANIZATIONS PRIORITIZE THEIR SECURITY INVESTMENTS TO DRIVE THE MARKET GROWTH
  • FIGURE 8 PLATFORMS/TOOLS SEGMENT TO HOLD A HIGHER MARKET SHARE DURING THE FORECAST PERIOD
  • FIGURE 9 TRAINING SEGMENT TO HOLD A HIGHER MARKET SHARE DURING THE FORECAST PERIOD
  • FIGURE 10 THREAT INTELLIGENCE TO HOLD THE HIGHEST MARKET SHARE DURING THE FORECAST PERIOD
  • FIGURE 11 ASIA PACIFIC TO GROW AT THE HIGHEST CAGR DURING THE FORECAST PERIOD
  • FIGURE 12 DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES: AUTOMATED BREACH AND ATTACK SIMULATION MARKET
  • FIGURE 13 ABAS PLATFORMS/TOOLS TO GROW AT A HIGHER CAGR DURING THE FORECAST PERIOD
  • FIGURE 14 STRATEGIES TO OVERCOME CYBERSECURITY SKILL GAPS
  • FIGURE 15 CONFIGURATION MANAGEMENT SEGMENT TO HOLD THE LARGEST MARKET SIZE DURING THE FORECAST PERIOD
  • FIGURE 16 KEY INSIGHTS INTO THREAT LANDSCAPE ACROSS END USERS
  • FIGURE 17 PROPENSITY OF ADOPTION OF ABAS PLATFORMS/TOOLS ACROSS ENTERPRISE AND DATA CENTER CONTINUES TO BE THE HIGHEST TO ASSIST INTERNAL SECURITY TEAMS
  • FIGURE 18 PROPENSITY OF ADOPTION OF ABAS PLATFORMS/TOOLS BY SERVICE PROVIDERS (MSP/MSSP) TO BE DRIVEN BY INCREASE IN MANAGED SERVICES
  • FIGURE 19 NORTH AMERICA TO HOLD THE LARGEST MARKET SIZE DURING THE FORECAST PERIOD
  • FIGURE 20 NORTH AMERICA: MARKET SNAPSHOT
  • FIGURE 21 ASIA PACIFIC: MARKET SNAPSHOT
  • FIGURE 22 AUTOMATED BREACH AND ATTACK SIMULATION MARKET (GLOBAL) COMPETITIVE LEADERSHIP MAPPING, 2019
  • FIGURE 23 RANKING OF KEY PLAYERS, 2019
  • FIGURE 24 QUALYS: COMPANY SNAPSHOT
  • FIGURE 25 RAPID7: COMPANY SNAPSHOT
  • FIGURE 26 DXC TECHNOLOGY: COMPANY SNAPSHOT
目次
Product Code: TC 7285

"Increase in the use of data quality tools for data management to drive the overall growth of the Automated Breach and Attack Simulation (ABAS) market."

The ABAS market is projected to grow from USD 134 million in 2019 to USD 724 million by 2024, at a Compound Annual Growth Rate (CAGR) of 40.2% from 2019 to 2024. The market growth is driven by various factors, such as the increasing regulations and compliances, growing requirement to prioritize security investments, and complexity of managing regulations and compliances have contributed considerable share in the ABAS ecosystem.

By services, the training segment is estimated to hold a larger market size in 2019

Cybersecurity training services is a critical requirement for enterprises that face an increasing volume of constantly evolving threats. The Information Technology (IT) security recruits need to be skilled in the advanced techniques and procedures required for effective threat management and mitigation strategies. Training of security personnel with up-to-date knowledge, practices, and procedures help defend the enterprises against most cyberattacks.

By application type, other threat intelligence to register a higher growth rate during the forecast period

Threat intelligence solutions collect and analyze information about the existing and evolving threat vectors from multiple sources to provide actionable threat intelligence feeds and reports, which can be effectively utilized by various security control solutions. Such solutions keep organizations informed of the risks of Advanced Persistent Threat (APTs), zero-day attacks, and threats, and help them protect themselves against the possibilities of data breach occurrences. With the increasing dependence of organizations on information and communication technologies to ease various business processes, these organizations have become exposed to a variety of cybercrimes and security vulnerabilities. In such cases, threat intelligence solutions offer the required assistance. They provide an effective and reliable threat detection to alleviate cyber threats based on security events and security intelligence feeds, manage business risks, reduce potential damage, and improve organizations' entire security infrastructure.

Asia Pacific (APAC) to register highest growth rate during the forecast period

APAC is making great strides toward the adoption of various technologies. The region is leading the charge in adoption of many technologies such as Smart Cities. While all the happenings have opened up a greater corridor for growth and developments, it also made the region more vulnerable, giving more opportunities for threats to get through. Gradually, attackers are developing better, sophisticated, and cutting-edge techniques to breach organizations. APAC is an ideal environment for cybercriminals to thrive in, owing to high digital connectivity, contrasted with the low cybersecurity awareness, growing cross-border data transfers, and weak regulations. Although the organizations in this region considers cybersecurity a high priority but only a handful of companies employ cybersecurity professionals. Countries such as India and Japan are witnessing a significant increase in cyber-attacks. The traditional methods are no longer adequate to manage and mitigate the advanced bot attacks. These challenges are going to eventual push the automated attack simulation and remediation market in APAC region.

  • By Company Type: Tier 1 - 25%, Tier 2 - 55%, and Tier 3 - 20%
  • By Designation: C-level - 50%, D-level - 30%, and Others - 20%
  • By Region: North America - 55%, Europe - 25%, APAC - 15%, RoW - 5%

Major vendors offering ABAS solutions include: Qualys (US), Rapid7 (US), DXC Technology (US), AttackIQ (US), Cymulate (Israel), XM Cyber (Israel), Skybox Security (US), SafeBreach (US), Firemon (US), Verdoin (FireEye) (US), NopSec (US), Threatcare (US), Mazebolt (US), Scythe (US), and Cronus-Cyber Technologies (Israel). The study includes an in-depth competitive analysis of these key market players along with their profiles, recent developments, and key market strategies.

Research Coverage:

The market study covers the ABAS market size across segments. It aims at estimating the market size and the growth potential of this market across different segments by offering, application, end user, and region. The study also includes an in-depth competitive analysis of the key market players, along with their company profiles, key observations related to product and business offerings, recent developments, and key market strategies.

The report will help the market leaders/new entrants with information on the closest approximations of the revenue numbers for the overall ABAS market and its subsegments. This report will help stakeholders understand the competitive landscape and gain more insights to better position their businesses and to plan suitable go-to-market strategies. The report will also help stakeholders understand the pulse of the market and provide them with information on key market drivers, restraints, challenges, and opportunities.

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 OBJECTIVES OF THE STUDY
  • 1.2 MARKET DEFINITION
  • 1.3 MARKET SCOPE
    • 1.3.1 MARKET SEGMENTATION
    • 1.3.2 REGIONAL SCOPE
  • 1.4 YEARS CONSIDERED FOR THE STUDY
  • 1.5 CURRENCY CONSIDERED
  • 1.6 STAKEHOLDERS

2 RESEARCH METHODOLOGY

  • 2.1 RESEARCH DATA
    • 2.1.1 SECONDARY DATA
    • 2.1.2 PRIMARY DATA
      • 2.1.2.1 Breakup of primaries
      • 2.1.2.2 Key industry insights
  • 2.2 MARKET BREAKUP AND DATA TRIANGULATION
  • 2.3 MARKET SIZE ESTIMATION
    • 2.3.1 TOP-DOWN APPROACH
    • 2.3.2 BOTTOM-UP APPROACH
  • 2.4 MARKET FORECAST
  • 2.5 ASSUMPTIONS FOR THE STUDY
  • 2.6 LIMITATIONS OF THE STUDY

3 EXECUTIVE SUMMARY

4 PREMIUM INSIGHTS

  • 4.1 ATTRACTIVE OPPORTUNITIES IN THE AUTOMATED BREACH AND

ATTACK SIMULATION MARKET 26

  • 4.2 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY OFFERING, 2019-2024
  • 4.3 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY SERVICE, 2019-2024
  • 4.4 AUTOMATED BREACH AND ATTACK SIMULATION MARKET,

BY APPLICATION, 2019-2024 27

  • 4.5 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY REGION, 2019-2024

5 MARKET OVERVIEW AND INDUSTRY TRENDS

  • 5.1 INTRODUCTION
  • 5.2 MARKET DYNAMICS
    • 5.2.1 DRIVERS
      • 5.2.1.1 Complexity in managing vulnerabilities from various sources
      • 5.2.1.2 Demand for prioritizing security investments
      • 5.2.1.3 Need to manage regulations and compliances
    • 5.2.2 RESTRAINTS
      • 5.2.2.1 Highly crowded security industry
    • 5.2.3 OPPORTUNITIES
      • 5.2.3.1 Growing business sizes making manual testing complex
    • 5.2.4 CHALLENGES
      • 5.2.4.1 Dearth of cybersecurity professionals
      • 5.2.4.2 Low awareness about cybersecurity
  • 5.3 USE CASES

6 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY OFFERING

  • 6.1 INTRODUCTION
  • 6.2 PLATFORMS/TOOLS
    • 6.2.1 NEED FOR CONTINUOUS ASSESSMENT OF SECURITY HYGIENE TO DRIVE THE DEMAND FOR ABAS PLATFORMS/TOOLS
  • 6.3 SERVICES
    • 6.3.1 TRAINING
      • 6.3.1.1 Need for continuous skill assessment and training to understand the complexities of rapidly evolving security posture to drive the ABAS market
    • 6.3.2 ON-DEMAND ANALYST
      • 6.3.2.1 Inadequate in-house skills to map or prioritize threat vectors to accelerate

7 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY APPLICATION

  • 7.1 INTRODUCTION
  • 7.2 CONFIGURATION MANAGEMENT
    • 7.2.1 GROWING DEMAND FOR THE ABILITY TO VISUALIZE THE THREATS AND VULNERABILITIES DURING CONFIGURATION
  • 7.3 PATCH MANAGEMENT
    • 7.3.1 NEED TO COMPLY WITH REGULATORY FRAMEWORKS AND FOCUS ON IT GOVERNANCE POLICIES DRIVING THE DEMAND FOR PATCH MANAGEMENT APPLICATION
  • 7.4 THREAT INTELLIGENCE
    • 7.4.1 HIGH DEMAND FOR THREAT INTELLIGENCE AND MITIGATION SOLUTIONS TO CREATE REMEDIATION STRATEGY
  • 7.5 OTHERS

8 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY END USER

  • 8.1 OVERVIEW
  • 8.2 ENTERPRISE AND DATACENTERS
  • 8.3 MANAGED SERVICE PROVIDERS

9 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY REGION

  • 9.1 INTRODUCTION
  • 9.2 NORTH AMERICA
    • 9.2.1 UNITED STATES
    • 9.2.2 CANADA
  • 9.3 EUROPE
    • 9.3.1 UNITED KINGDOM
    • 9.3.2 GERMANY
    • 9.3.3 FRANCE
    • 9.3.4 REST OF EUROPE
  • 9.4 ASIA PACIFIC
    • 9.4.1 CHINA
    • 9.4.2 JAPAN
    • 9.4.3 INDIA
    • 9.4.4 AUSTRALIA AND NEW ZEALAND
    • 9.4.5 REST OF ASIA PACIFIC
  • 9.5 REST OF THE WORLD
    • 9.5.1 MIDDLE EAST
    • 9.5.2 LATIN AMERICA

10 COMPETITIVE LANDSCAPE

  • 10.1 COMPETITIVE LEADERSHIP MAPPING
    • 10.1.1 VISIONARY LEADERS
    • 10.1.2 INNOVATORS
    • 10.1.3 DYNAMIC DIFFERENTIATORS
    • 10.1.4 EMERGING COMPANIES
  • 10.2 STRENGTH OF PRODUCT PORTFOLIO (20 PLAYERS)
  • 10.3 BUSINESS STRATEGY EXCELLENCE (20 PLAYERS)
  • 10.4 RANKING OF KEY PLAYERS FOR THE AUTOMATED BREACH AND ATTACK SIMULATION MARKET, 2019

11 COMPANY PROFILES

  • 11.1 INTRODUCTION

(Business Overview, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View)*

  • 11.2 QUALYS
  • 11.3 RAPID7
  • 11.4 DXC TECHNOLOGY
  • 11.5 ATTACKIQ
  • 11.6 CYMULATE
  • 11.7 XM CYBER
  • 11.8 SKYBOX SECURITY
  • 11.9 SAFEBREACH
  • 11.10 FIREMON
  • 11.11 VERODIN (FIREEYE)
  • 11.12 NOPSEC
  • 11.13 THREATCARE
  • 11.14 MAZEBOLT
  • 11.15 SCYTHE
  • 11.16 CRONUS CYBER TECHNOLOGIES

Details on Business Overview, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View might not be captured in case of unlisted companies.

12 APPENDIX

  • 12.1 DISCUSSION GUIDE
  • 12.2 KNOWLEDGE STORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL
  • 12.3 AVAILABLE CUSTOMIZATION
  • 12.4 RELATED REPORTS
  • 12.5 AUTHOR DETAILS
Back to Top