株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

クラウドセキュリティソフトウェアの世界市場:成長率、動向および予測分析(2019年~ 2024年)

Cloud Security Software Market - Growth, Trends, and Forecast (2019 - 2024)

発行 Mordor Intelligence LLP 商品コード 546753
出版日 ページ情報 英文 120 Pages
納期: 2-3営業日
価格
本日の銀行送金レート: 1USD=109.55円で換算しております。
Back to Top
クラウドセキュリティソフトウェアの世界市場:成長率、動向および予測分析(2019年~ 2024年) Cloud Security Software Market - Growth, Trends, and Forecast (2019 - 2024)
出版日: 2019年05月01日 ページ情報: 英文 120 Pages
概要

世界のクラウドセキュリティソフトウェア市場は、2018年に281億米ドルと評価され、2024年までに356億米ドルの市場規模に達すると予測され、2019年から2024年の予測期間中に4.98%のCAGRで成長する見込みです。データ生成市場が成長し、技術が複雑化することによって、組織は運用とデータ管理をクラウドサービスに大きく依存するようになりました。クラウドサービスの採用のこのような増加は、クラウドセキュリティソリューションの需要に直接影響を与えています。

当レポートでは、世界のクラウドセキュリティソフトウェア市場を調査し、全体的な市場動向、製品・地域別の詳細動向、市場成長への影響要因の分析、競合情勢、主要企業のプロファイルなどを包括的にまとめています。

目次

第1章 イントロダクション

  • 調査の成果
  • 調査の前提条件
  • 調査範囲

第2章 調査方法

第3章 エグゼクティブサマリー

第4章 市場のダイナミクス

  • 市場概況
  • 市場成長要因および阻害要因
  • 市場成長要因
    • クラウド関連のサイバー攻撃の増加が市場成長を促進
  • 市場の阻害要因
    • オンプレミスからクラウドへのプロセスの移行が大きな課題
  • バリューチェーン分析
  • 業界の魅力 - ファイブフォース分析分析
    • 新規参入の脅威
    • バイヤー/消費者の交渉力
    • サプライヤーの交渉力
    • 代替製品の脅威
    • 業界内の競合の激しさ

第5章 市場セグメンテーション

  • タイプ別
    • クラウドIDおよびアクセス管理ソフトウェア
    • クラウドEメールセキュリティ
    • クラウド型侵入検知と防止
    • クラウド暗号化
  • 展開モデル別
    • パブリック
    • プライベート
    • ハイブリッド
  • エンドユーザー産業別
    • BFSI
    • ヘルスケア
    • 通信・IT
    • 航空宇宙・防衛
    • その他のエンドユーザー産業
  • 地域
    • 北米
    • 欧州
    • アジア太平洋地域
    • 中南米
    • 中東・アフリカ

第6章 競合情勢

  • 企業プロファイル
    • TrendMicro, Inc
    • RSA Security LLC
    • CA Technologies
    • McAfee, Inc
    • IBM Corporation
    • CipherCloud, Inc
    • Gemalto NV
    • VMware
    • Microsoft Corporation
    • Dell Corporation
    • Hewlett Packard Enterprise
    • Cisco Solutions
    • Cisco Systems, Inc
    • Panda Security, S.L
    • Forcepoint LLC
    • Check Point Software Technologies, Ltd
    • Trustwave Holdings
    • Intel Security Group
    • Porticor Ltd
    • Fortinet, Inc
    • NetLib Security, Inc.

第7章 投資分析

第8章 市場機会および将来動向

目次
Product Code: 50235

Market Overview

The cloud security software market was valued at USD 28.1 billion in 2018 and is expected to reach a market value of USD 35.6 billion by 2024, registering a CAGR of 4.98% during the forecast period 2019 - 2024. The growing data generation and increasing complexity of technologies have resulted in a heavy dependence of organizations on cloud services for operations and data management. This growth in the adoption of cloud services is having a direct impact on the demand for cloud security solutions.

  • An increasing number of cloud-related cyberattacks is the major driving factor for this market. A recent report by cloud security provider Armor suggests that cloud customers were hit with 681 million cyber attacks last year According to the 2018 Cost of a Data Breach Study by Ponemon Institute, the average cost of a data breach in 2018 was USD 3.86 million, which is a 6.4% increase on the 2017 cost of USD 3.62 million.
  • Migration of processes from on-premise to cloud is a major challenge since most of the company's processes like billing and CAPEX are based on subscription-based models. Thus however powerful cloud security solutions are adopted by the company, some of the processes can't be protected.

Scope of the Report

The cloud industry has experienced rapid growth in its adoption in the last decade from technology-based companies. This trend is also followed by other industries like BFSI and Healthcare, due to their realization of the advantages offered by the cloud systems. This is creating an environment where cloud services are acting as the backbone of many business operations.

Key Market Trends

Intrusion Detection and Prevention to Register Significant Growth

  • An Intrusion Detection and Prevention Software (IDPS) monitors network traffic for signs of a possible attack. When it detects potentially dangerous activity, it takes action to stop the attack. Often this takes the form of dropping malicious packets, blocking network traffic or resetting connections. The IDPS also usually sends an alert to security administrators about the potential malicious activity.
  • The two main contributors to the successful deployment and operation of an IDS or IPS are the deployed signatures and the network traffic that flows through it.
  • According to Insider Threat 2018 report, most insider exploits are detected through IDPS. This indicates the popularity of IDPS and why majority of the vendors are offering this service.

Asia-Pacific to Witness the Highest Growth

  • In Asia-pacific, great strides are being made in digital economy. But it is also causing more threat-related opportunities. According to Cisco, companies receive 6 threats every minute in APAC and 51% of all cyber attacks resulted in a loss of more than USD$1 million
  • In addition to financial losses, cybersecurity incidents are also undermining Asia Pacific organizations' ability to gain confidence with their consumers and other stakeholders.
  • Major companies are setting their footprint in APAC, for instance, Google expanded the number of Google Cloud Platform regions in APAC from three to six in 2018.
  • To retain the data authenticity generated by any industry (for instance, customer shopping data for personalization in retail), move towards cloud and hence its security is of utmost importance.

Competitive Landscape

The market for cloud security software is fragmented due to the rise in cyber attacks over the years. Enterprises have become more aware and careful regarding their data stored in the cloud and thus are availing offerings from companies like CA Technologies, McAfee and RSA Security for cloud protection.

  • April 2019 - Trend Micro announced enhancements to its Deep Security and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes Engine (GKE) and Gmail on the G Suite.
  • April 2019 - McAfee announced its support for Google Cloud Platform (GCP) Cloud Security Command Center (Cloud SCC). McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources and detect and respond to threats.
  • March 2019 - RSA unveiled the newest version of its market-leading SIEM, RSA NetWitness Platform, which features machine learning models based on deep endpoint observations to rapidly detect anomalies in user's behavior to uncover evolving threats.

Reasons to Purchase this report:

  • The market estimate (ME) sheet in Excel format
  • Report customization as per the client's requirements
  • 3 months of analyst support

Table of Contents

1 INTRODUCTION

  • 1.1 Study Deliverables
  • 1.2 Study Assumptions
  • 1.3 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET DYNAMICS

  • 4.1 Market Overview
  • 4.2 Introduction to Market Drivers and Restraints
  • 4.3 Market Drivers
    • 4.3.1 Increasing Number of Cloud-Related Cyberattacks is Augmenting the Market Growth
  • 4.4 Market Restraints
    • 4.4.1 Migration of Processes from On-Premise to Cloud is a Major Challenge
  • 4.5 Value Chain Analysis
  • 4.6 Industry Attractiveness - Porter's Five Force Analysis
    • 4.6.1 Threat of New Entrants
    • 4.6.2 Bargaining Power of Buyers/Consumers
    • 4.6.3 Bargaining Power of Suppliers
    • 4.6.4 Threat of Substitute Products
    • 4.6.5 Intensity of Competitive Rivalry

5 MARKET SEGMENTATION

  • 5.1 By Type
    • 5.1.1 Cloud Identity & Access Management Software
    • 5.1.2 Cloud Email Security
    • 5.1.3 Cloud Intrusion Detection & Prevention
    • 5.1.4 Cloud Encryption
  • 5.2 By Deployment Model
    • 5.2.1 Public
    • 5.2.2 Private
    • 5.2.3 Hybrid
  • 5.3 By End-user Industry
    • 5.3.1 BFSI
    • 5.3.2 Healthcare
    • 5.3.3 Telecom & IT
    • 5.3.4 Aerospace & Defense
    • 5.3.5 Other End-user Industries
  • 5.4 Geography
    • 5.4.1 North America
      • 5.4.1.1 United States
      • 5.4.1.2 Canada
    • 5.4.2 Europe
      • 5.4.2.1 Germany
      • 5.4.2.2 United Kingdom
      • 5.4.2.3 France
      • 5.4.2.4 Russia
      • 5.4.2.5 Rest of the Europe
    • 5.4.3 Asia-Pacific
      • 5.4.3.1 China
      • 5.4.3.2 Japan
      • 5.4.3.3 India
      • 5.4.3.4 South Korea
      • 5.4.3.5 Rest of Asia-Pacific
    • 5.4.4 Latin America
      • 5.4.4.1 Brazil
      • 5.4.4.2 Mexico
      • 5.4.4.3 Argentina
      • 5.4.4.4 Rest of Latin America
    • 5.4.5 Middle East & Africa
      • 5.4.5.1 UAE
      • 5.4.5.2 Saudi Arabia
      • 5.4.5.3 Israel
      • 5.4.5.4 Rest of Middle East & Africa

6 COMPETITIVE LANDSCAPE

  • 6.1 Company Profiles
    • 6.1.1 TrendMicro, Inc
    • 6.1.2 RSA Security LLC
    • 6.1.3 CA Technologies
    • 6.1.4 McAfee, Inc
    • 6.1.5 IBM Corporation
    • 6.1.6 CipherCloud, Inc
    • 6.1.7 Gemalto NV
    • 6.1.8 VMware
    • 6.1.9 Microsoft Corporation
    • 6.1.10 Dell Corporation
    • 6.1.11 Hewlett Packard Enterprise
    • 6.1.12 Cisco Solutions
    • 6.1.13 Cisco Systems, Inc
    • 6.1.14 Panda Security, S.L
    • 6.1.15 Forcepoint LLC
    • 6.1.16 Check Point Software Technologies, Ltd
    • 6.1.17 Trustwave Holdings
    • 6.1.18 Intel Security Group
    • 6.1.19 Porticor Ltd
    • 6.1.20 Fortinet, Inc
    • 6.1.21 NetLib Security, Inc.

7 INVESTMENT ANALYSIS

8 MARKET OPPORTUNITIES AND FUTURE TRENDS

Back to Top