株式会社グローバルインフォメーション
TEL: 044-952-0102
市場調査レポート

メッセージングおよびWebセキュリティ市場の動向:2011年〜2014年

Messaging and Web Security Market Trends, 2011-2014

発行 Osterman Research, Inc. 商品コード 233049
出版日 ページ情報 英文
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=115.18円で換算しております。
Back to Top
メッセージングおよびWebセキュリティ市場の動向:2011年〜2014年 Messaging and Web Security Market Trends, 2011-2014
出版日: 2011年11月30日 ページ情報: 英文
概要

当レポートでは、メッセージングおよびWebセキュリティ市場について調査分析し、メッセージングおよびWeb関連のセキュリティ脅威に対処するように設計されているソリューションの需要促進要因に焦点を当てて、市場や市場動向、製品と技術などの関連データを提供し、市場予測なども含めて、概略以下の構成でお届けいたします。

第1章 エグゼクティブサマリー

第2章 調査手法と背景

第3章 メッセージングおよびWebセキュリティの現状

第4章 セキュリティの特徴と機能の要件

第5章 セキュリティポリシーへの取り組み

第6章 セキュリティ配信モデル

第7章 セキュリティ投資計画

第8章 セキュリティベンダー問題

第9章 セキュリティ市場の予測

図表

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次

Abstract

Report Focus

This report is focused on the demand drivers for solutions that are designed to address messaging and Web-related security threats. The research conducted for this report, and the report itself, are focused on the needs of vendors, investors and others who are interested in participating in the email, instant messaging and Web security markets in some fashion. The information included in this report is designed to help these vendors and interested parties make informed decisions about the future opportunities available in this market.

The research for this report was conducted, and this report was written, from a completely objective viewpoint, not with any predisposition for or against a particular vendor, solution or technology. Because multiple vendors were involved in funding this report, no one vendor's viewpoint had an influence on shaping the research focus. Early subscribers to this report were given the opportunity to provide input to the research program conducted specifically for it.

About Osterman Research, Inc.

Osterman Research, Inc. provides market research, cost modeling, benchmarking and related services to vendors of messaging and collaboration products and services.

We help vendors, IT departments and other organizations make better decisions through the acquisition and application of relevant, accurate and timely data on markets, market trends, products and technologies. We also help vendors of technologyoriented products and services to understand the needs of their current and prospective customers.

Part of what makes us unique is our market research panel: a large and growing group of IT professionals and end-users around the world with whom we conduct our research surveys. This allows us to conduct surveys quickly and accurately.

Table of Contents

Chapter - 1:

  • Executive Summary

Chapter - 2:

  • Methodology and Background

Chapter - 3:

  • Where is Messaging and Web Security Today?

Chapter - 4:

  • Security Feature and Function Requirements

Chapter - 5:

  • Approaches to Security Policies

Chapter - 6:

  • Security Delivery Models

Chapter - 7:

  • Security Investment Plans

Chapter - 8:

  • Security Vendor Issues

Chapter - 9:

  • Security Market Forecast

List of Figures

  • North American Security Market Forecast, 2011-2014
  • Distribution of End Users by On-Premise Messaging Platform, 2011 and 2013
  • Distribution of End Users by Cloud-Based Messaging Platform, 2011 and 2013
  • Penetration of Mobile Devices, 2011 and 2013
  • Security Incidents That Have Occurred During the Previous 12 Months
  • Concerns About Various Security Issues, 2010 and 2011
  • Proportion of Organizations Reporting a Successful Security Violation by Mode, 2007-2011
  • Changes in Percentage of Spam Blocked Over Time
  • Changes in the Spam False Positive Ratio Over Time
  • Changes in Web-Based Threats Over Time
  • Priorities for Security-Related Spending During 2011
  • Plans for Overall IT Spending in 2011 Compared to 2010
  • Plans for Email Security Spending in 2011 Compared to 2010
  • Plans for Web Security Spending in 2011 Compared to 2010
  • Importance of Features That Influence Decisions for Anti-Spam Solutions
  • Importance of Features That Influence Decisions for Anti-Malware Solutions
  • Importance of Features That Influence Decisions for Web Filtering Solutions
  • Importance of Features That Influence Decisions for Web Security Solutions
  • Current and Preferred Models for Point vs. Centralized Email Security Solutions
  • Current and Preferred Models for Point vs. Centralized Security Solutions
  • Desirability for Manual vs. Automatic Encryption
  • Perceived Legitimacy of Various Tools For Use in a Business Context
  • Perceived Legitimacy of Various Tools For Use in a Business Context, 2007-2011
  • Status of Allowing and Blocking Various Tools
  • Desirability of Various Delivery Models for Email Security
  • Desirability of Various Delivery Models for Mobile/Smartphone Security
  • Desirability of Various Delivery Models for Web Security
  • Agreement With Various Statements About Security
  • Solutions For Which Organizations Have Switched From One Vendor to Another During the Previous Two Years
  • North American Security Market Forecast, 2011-2014
  • Likelihood of Using a Managed or Cloud-Based Service Provider for One or More Email Security Services Within the Next 12 Months
  • Likelihood of Using a Managed or Cloud-Based Service Provider for One or More Web Security Services Within the Next 12 Months
  • Cloud-Based Security Capabilities Deployed, 2011/H2 and 2013/H1
  • Plans for a Cloud-Based Email Security Service Among Organizations Planning to Use One During the Next 12 Months
  • Plans for a Cloud-Based Web Security Service Among Organizations Planning to Use One During the Next 12 Months
  • Installed Base of Anti-Malware Solution Deployments by Delivery Model, 2011 and 2012
  • Installed Base of Anti-Spam Solution Deployments by Delivery Model, 2011 and 2012
  • Installed Base of Web Security Solution Deployments by Delivery Model, 2011 and 2012
  • Deployment of Encryption Capabilities by Type, 2011 and 2012

List of Tables

  • Concern About Various Security Problems
  • Reasons for Deploying a Web Security Solution
  • Agreement With Various Statements About Cloud-Based Email Security Providers
  • Likelihood of Investing in New Security-Related Deployments or Upgrades
  • Likelihood of Purchasing Various Security-Related Solutions
  • Likelihood of Considering Various Security Vendors
Back to Top