お知らせ :東京証券取引所JASDAQスタンダード市場への新規上場に関するお知らせ

株式会社グローバルインフォメーション
市場調査レポート
商品コード
968420

サイバーセキュリティの世界市場 - 業界分析と成長予測 (2030年まで)

Cyber Security Market Research Report: By Component, Security Type, Deployment, Enterprise, Use Case, Industry - Global Industry Analysis and Growth Forecast to 2030

出版日: | 発行: Prescient & Strategic Intelligence Private Limited | ページ情報: 英文 244 Pages | 納期: 2-3営業日

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=104.53円
サイバーセキュリティの世界市場 - 業界分析と成長予測 (2030年まで)
出版日: 2020年07月01日
発行: Prescient & Strategic Intelligence Private Limited
ページ情報: 英文 244 Pages
納期: 2-3営業日
  • 全表示
  • 概要
  • 図表
  • 目次
概要

世界のサイバーセキュリティ市場は、2019年の1,199億米ドルから、2030年までに4,336億米ドルに達し、2020年~2030年のCAGRで12.6%の成長が予測されています。

当レポートでは、世界のサイバーセキュリティ市場について調査分析し、市場概要、市場規模と予測、セグメント別の市場分析、地域別の市場分析、競合情勢などについて、体系的な情報を提供しています。

目次

第1章 調査背景

第2章 調査手法

第3章 エグゼクティブサマリー

第4章 イントロダクション

第5章 世界の市場規模と予測

  • コンポーネント別
    • ソリューション
    • サービス
  • 企業別
  • 展開別
  • セキュリティタイプ別
  • ユースケース別
  • 業界別
  • 地域別

第6章 北米の市場規模と予測

  • コンポーネント別
    • ソリューション
    • サービス
  • 企業別
  • 展開別
  • セキュリティタイプ別
  • ユースケース別
  • 業界別
  • 国別

第7章 欧州の市場規模と予測

  • コンポーネント別
    • ソリューション
    • サービス
  • 企業別
  • 展開別
  • セキュリティタイプ別
  • ユースケース別
  • 業界別
  • 国別

第8章 アジア太平洋地域の市場規模と予測

  • コンポーネント別
    • ソリューション
    • サービス
  • 企業別
  • 展開別
  • セキュリティタイプ別
  • ユースケース別
  • 業界別
  • 国別

第9章 ラテンアメリカの市場規模と予測

  • コンポーネント別
    • ソリューション
    • サービス
  • 企業別
  • 展開別
  • セキュリティタイプ別
  • ユースケース別
  • 業界別
  • 国別

第10章 中東・アフリカの市場規模と予測

  • コンポーネント別
    • ソリューション
    • サービス
  • 企業別
  • 展開別
  • セキュリティタイプ別
  • ユースケース別
  • 業界別
  • 国別

第11章 主要国

  • 米国
  • 英国
  • ドイツ
  • 中国
  • インド

第12章 競合情勢

  • 企業とその製品のリスト
  • 主要企業の市場シェア分析
  • 主要企業のベンチマーキング分析
  • 市場における戦略的発展

第13章 企業プロファイル

  • Cisco Systems Inc.
  • Check Point Software Technologies Ltd.
  • Fortinet Inc.
  • Juniper Networks Inc.
  • Palo Alto Networks Inc.
  • FireEye Inc.
  • IBM Corporation
  • McAfee LLC
  • Broadcom Inc.
  • Trend Micro Incorporated

第14章 付録

図表

List of Tables

  • TABLE 1 ANALYSIS PERIOD OF THE STUDY
  • TABLE 2 DRIVERS FOR THE MARKET: IMPACT ANALYSIS
  • TABLE 3 RESTRAINTS FOR THE MARKET: IMPACT ANALYSIS
  • TABLE 4 COVID-19 IMPACT ANALYSIS ON DIFFERENT SECTORS
  • TABLE 5 GLOBAL CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2019)
  • TABLE 6 GLOBAL CYBER SECURITY MARKET, BY COMPONENT, $M (2020-2030)
  • TABLE 7 GLOBAL CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2019)
  • TABLE 8 GLOBAL CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2020-2030)
  • TABLE 9 GLOBAL CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2019)
  • TABLE 10 GLOBAL CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2020-2030)
  • TABLE 11 GLOBAL CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2019)
  • TABLE 12 GLOBAL CYBER SECURITY MARKET, BY ENTERPRISE, $M (2020-2030)
  • TABLE 13 GLOBAL CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2019)
  • TABLE 14 GLOBAL CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2020-2030)
  • TABLE 15 GLOBAL CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
  • TABLE 16 GLOBAL CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
  • TABLE 17 GLOBAL CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 18 GLOBAL CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 19 GLOBAL CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 20 GLOBAL CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 21 GLOBAL CYBER SECURITY MARKET, BY REGION, $M (2014-2019)
  • TABLE 22 GLOBAL CYBER SECURITY MARKET, BY REGION, $M (2020-2030)
  • TABLE 23 NORTH AMERICA CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2019)
  • TABLE 24 NORTH AMERICA CYBER SECURITY MARKET, BY COMPONENT, $M (2020-2030)
  • TABLE 25 NORTH AMERICA CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2019)
  • TABLE 26 NORTH AMERICA CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2020-2030)
  • TABLE 27 NORTH AMERICA CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2019)
  • TABLE 28 NORTH AMERICA CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2020-2030)
  • TABLE 29 NORTH AMERICA CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2019)
  • TABLE 30 NORTH AMERICA CYBER SECURITY MARKET, BY ENTERPRISE, $M (2020-2030)
  • TABLE 31 NORTH AMERICA CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2019)
  • TABLE 32 NORTH AMERICA CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2020-2030)
  • TABLE 33 NORTH AMERICA CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
  • TABLE 34 NORTH AMERICA CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
  • TABLE 35 NORTH AMERICA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 36 NORTH AMERICA CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 37 NORTH AMERICA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 38 NORTH AMERICA CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 39 NORTH AMERICA CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
  • TABLE 40 NORTH AMERICA CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
  • TABLE 41 EUROPE CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2019)
  • TABLE 42 EUROPE CYBER SECURITY MARKET, BY COMPONENT, $M (2020-2030)
  • TABLE 43 EUROPE CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2019)
  • TABLE 44 EUROPE CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2020-2030)
  • TABLE 45 EUROPE CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2019)
  • TABLE 46 EUROPE CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2020-2030)
  • TABLE 47 EUROPE CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2019)
  • TABLE 48 EUROPE CYBER SECURITY MARKET, BY ENTERPRISE, $M (2020-2030)
  • TABLE 49 EUROPE CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2019)
  • TABLE 50 EUROPE CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2020-2030)
  • TABLE 51 EUROPE CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
  • TABLE 52 EUROPE CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
  • TABLE 53 EUROPE CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 54 EUROPE CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 55 EUROPE CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 56 EUROPE CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 57 EUROPE CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
  • TABLE 58 EUROPE CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
  • TABLE 59 APAC CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2019)
  • TABLE 60 APAC CYBER SECURITY MARKET, BY COMPONENT, $M (2020-2030)
  • TABLE 61 APAC CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2019)
  • TABLE 62 APAC CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2020-2030)
  • TABLE 63 APAC CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2019)
  • TABLE 64 APAC CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2020-2030)
  • TABLE 65 APAC CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2019)
  • TABLE 66 APAC CYBER SECURITY MARKET, BY ENTERPRISE, $M (2020-2030)
  • TABLE 67 APAC CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2019)
  • TABLE 68 APAC CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2020-2030)
  • TABLE 69 APAC CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
  • TABLE 70 APAC CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
  • TABLE 71 APAC CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 72 APAC CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 73 APAC CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 74 APAC CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 75 APAC CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
  • TABLE 76 APAC CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
  • TABLE 77 LATAM CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2019)
  • TABLE 78 LATAM CYBER SECURITY MARKET, BY COMPONENT, $M (2020-2030)
  • TABLE 79 LATAM CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2019)
  • TABLE 80 LATAM CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2020-2030)
  • TABLE 81 LATAM CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2019)
  • TABLE 82 LATAM CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2020-2030)
  • TABLE 83 LATAM CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2019)
  • TABLE 84 LATAM CYBER SECURITY MARKET, BY ENTERPRISE, $M (2020-2030)
  • TABLE 85 LATAM CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2019)
  • TABLE 86 LATAM CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2020-2030)
  • TABLE 87 LATAM CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
  • TABLE 88 LATAM CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
  • TABLE 89 LATAM CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 90 LATAM CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 91 LATAM CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 92 LATAM CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 93 LATAM CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
  • TABLE 94 LATAM CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
  • TABLE 95 MEA CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2019)
  • TABLE 96 MEA CYBER SECURITY MARKET, BY COMPONENT, $M (2020-2030)
  • TABLE 97 MEA CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2019)
  • TABLE 98 MEA CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2020-2030)
  • TABLE 99 MEA CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2019)
  • TABLE 100 MEA CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2020-2030)
  • TABLE 101 MEA CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2019)
  • TABLE 102 MEA CYBER SECURITY MARKET, BY ENTERPRISE, $M (2020-2030)
  • TABLE 103 MEA CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2019)
  • TABLE 104 MEA CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2020-2030)
  • TABLE 105 MEA CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2019)
  • TABLE 106 MEA CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2020-2030)
  • TABLE 107 MEA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 108 MEA CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 109 MEA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 110 MEA CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 111 MEA CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2019)
  • TABLE 112 MEA CYBER SECURITY MARKET, BY COUNTRY, $M (2020-2030)
  • TABLE 113 U.S. CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 114 U.S. CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 115 U.S. CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 116 U.S. CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 117 U.K. CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 118 U.K. CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 119 U.K. CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 120 U.K. CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 121 GERMANY CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 122 GERMANY CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 123 GERMANY CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 124 GERMANY CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 125 CHINA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 126 CHINA CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 127 CHINA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 128 CHINA CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 129 INDIA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2019)
  • TABLE 130 INDIA CYBER SECURITY MARKET, BY USE CASE, $M (2020-2030)
  • TABLE 131 INDIA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2019)
  • TABLE 132 INDIA CYBER SECURITY MARKET, BY INDUSTRY, $M (2020-2030)
  • TABLE 133 LIST OF PLAYERS AND THEIR OFFERINGS
  • TABLE 134 BENCHMARKING ANALYSIS OF KEY PLAYERS
  • TABLE 135 CISCO SYSTEMS INC. - AT A GLANCE
  • TABLE 136 CISCO SYSTEMS INC. - KEY FINANCIAL SUMMARY
  • TABLE 137 CHECK POINT SOFTWARE TECHNOLOGIES LTD. - AT A GLANCE
  • TABLE 138 CHECK POINT SOFTWARE TECHNOLOGIES LTD. - KEY FINANCIAL SUMMARY
  • TABLE 139 FORTINET INC. - AT A GLANCE
  • TABLE 140 FORTINET INC. - KEY FINANCIAL SUMMARY
  • TABLE 141 JUNIPER NETWORKS INC. - AT A GLANCE
  • TABLE 142 JUNIPER NETWORKS INC. - KEY FINANCIAL SUMMARY
  • TABLE 143 PALO ALTO NETWORKS INC. - AT A GLANCE
  • TABLE 144 PALO ALTO NETWORKS INC. - KEY FINANCIAL SUMMARY
  • TABLE 145 FIREEYE INC. - AT A GLANCE
  • TABLE 146 FIREEYE INC. - KEY FINANCIAL SUMMARY
  • TABLE 147 IBM CORPORATION - AT A GLANCE
  • TABLE 148 IBM CORPORATION - KEY FINANCIAL SUMMARY
  • TABLE 149 MCAFEE LLC - AT A GLANCE
  • TABLE 150 BROADCOM INC. - AT A GLANCE
  • TABLE 151 BROADCOM INC. - KEY FINANCIAL SUMMARY
  • TABLE 152 TREND MICRO INCORPORATED - AT A GLANCE
  • TABLE 153 TREND MICRO INCORPORATED - KEY FINANCIAL SUMMARY

List of Figures

  • FIG 1 RESEARCH SCOPE
  • FIG 2 RESEARCH METHODOLOGY
  • FIG 3 BREAKDOWN OF PRIMARY RESEARCH BY REGION
  • FIG 4 BREAKDOWN OF PRIMARY RESEARCH BY INDUSTRY PARTICIPANT
  • FIG 5 BREAKDOWN OF PRIMARY RESEARCH BY COMPANY TYPE
  • FIG 6 DATA TRIANGULATION APPROACH
  • FIG 7 CURRENCY CONVERSION RATES FOR USD (2019)
  • FIG 8 GLOBAL CYBER SECURITY MARKET SUMMARY
  • FIG 9 OPINION OF INDUSTRY EXPERTS/KOLS
  • FIG 10 VALUE CHAIN ANALYSIS OF GLOBAL CYBER SECURITY MARKET
  • FIG 11 U.S. ORGANIZATIONS WITH BYOD ACTIVITIES (2011-2018)
  • FIG 12 WEEKLY COVID-19-RELATED CYBERATTACKS
  • FIG 13 BARGAINING POWER OF BUYERS
  • FIG 14 BARGAINING POWER OF SUPPLIERS
  • FIG 15 INTENSITY OF RIVALRY
  • FIG 16 THREAT OF NEW ENTRANTS
  • FIG 17 THREAT OF SUBSTITUTES
  • FIG 18 NUMBER OF CYBERATTACKS, MONTHLY (2018-2019)
  • FIG 19 AVERAGE ANNUAL CYBERCRIME COST, BY INDUSTRY, $M (2018)
  • FIG 20 GLOBAL CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2030)
  • FIG 21 GLOBAL CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2030)
  • FIG 22 GLOBAL CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2030)
  • FIG 23 GLOBAL CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2030)
  • FIG 24 GLOBAL CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2030)
  • FIG 25 GLOBAL AVERAGE TOTAL COST OF A DATA BREACH, $M (2014-2019)
  • FIG 26 GLOBAL CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
  • FIG 27 GLOBAL CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 28 GLOBAL CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 29 WORLDWIDE MAJOR MARKETS FOR CYBER SECURITY SOLUTIONS
  • FIG 30 NORTH AMERICA CYBER SECURITY MARKET SNAPSHOT
  • FIG 31 NORTH AMERICA CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2030)
  • FIG 32 NORTH AMERICA CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2030)
  • FIG 33 NORTH AMERICA CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2030)
  • FIG 34 NORTH AMERICA CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2030)
  • FIG 35 NORTH AMERICA CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2030)
  • FIG 36 NORTH AMERICA CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
  • FIG 37 NORTH AMERICA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 38 NORTH AMERICA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 39 NORTH AMERICA CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
  • FIG 40 EUROPE CYBER SECURITY MARKET SNAPSHOT
  • FIG 41 EUROPE CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2030)
  • FIG 42 EUROPE CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2030)
  • FIG 43 EUROPE CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2030)
  • FIG 44 EUROPE CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2030)
  • FIG 45 EUROPE CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2030)
  • FIG 46 EUROPE CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
  • FIG 47 EUROPE CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 48 EUROPE CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 49 EUROPE CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
  • FIG 50 APAC CYBER SECURITY MARKET SNAPSHOT
  • FIG 51 APAC CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2030)
  • FIG 52 APAC CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2030)
  • FIG 53 APAC CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2030)
  • FIG 54 APAC CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2030)
  • FIG 55 APAC CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2030)
  • FIG 56 APAC CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
  • FIG 57 APAC CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 58 APAC CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 59 APAC CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
  • FIG 60 LATAM CYBER SECURITY MARKET SNAPSHOT
  • FIG 61 LATAM CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2030)
  • FIG 62 LATAM CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2030)
  • FIG 63 LATAM CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2030)
  • FIG 64 LATAM CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2030)
  • FIG 65 LATAM CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2030)
  • FIG 66 LATAM CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
  • FIG 67 LATAM CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 68 LATAM CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 69 LATAM CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
  • FIG 70 MEA CYBER SECURITY MARKET SNAPSHOT
  • FIG 71 MEA CYBER SECURITY MARKET, BY COMPONENT, $M (2014-2030)
  • FIG 72 MEA CYBER SECURITY SOLUTIONS MARKET, BY TYPE, $M (2014-2030)
  • FIG 73 MEA CYBER SECURITY SERVICES MARKET, BY TYPE, $M (2014-2030)
  • FIG 74 MEA CYBER SECURITY MARKET, BY ENTERPRISE, $M (2014-2030)
  • FIG 75 MEA CYBER SECURITY MARKET, BY DEPLOYMENT, $M (2014-2030)
  • FIG 76 MEA CYBER SECURITY MARKET, BY SECURITY TYPE, $M (2014-2030)
  • FIG 77 MEA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 78 MEA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 79 MEA CYBER SECURITY MARKET, BY COUNTRY, $M (2014-2030)
  • FIG 80 U.S. CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 81 U.S. CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 82 U.K. CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 83 U.K. CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 84 GERMANY CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 85 GERMANY CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 86 CHINA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 87 CHINA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 88 INDIA CYBER SECURITY MARKET, BY USE CASE, $M (2014-2030)
  • FIG 89 INDIA CYBER SECURITY MARKET, BY INDUSTRY, $M (2014-2030)
  • FIG 90 GLOBAL CYBER SECURITY MARKET SHARE ANALYSIS OF KEY PLAYERS (2019)
  • FIG 91 CISCO SYSTEMS INC. - REVENUE SPLIT BY PRODUCT CATEGORY AND GEOGRAPHY (2019)
  • FIG 92 CHECK POINT SOFTWARE TECHNOLOGIES LTD. - REVENUE SPLIT BY PRODUCT LINE AND GEOGRAPHY (2019)
  • FIG 93 FORTINET INC. - REVENUE SPLIT BY GEOGRAPHY (2019)
  • FIG 94 JUNIPER NETWORKS INC. - REVENUE SPLIT BY SEGMENT AND GEOGRAPHY (2019)
  • FIG 95 PALO ALTO NETWORKS INC. - REVENUE SPLIT BY GEOGRAPHY (2019)
  • FIG 96 FIREEYE INC. - REVENUE SPLIT BY CATEGORY AND GEOGRAPHY (2019)
  • FIG 97 IBM CORPORATION - REVENUE SPLIT BY SEGMENT AND GEOGRAPHY (2019)
  • FIG 98 BROADCOM INC. - REVENUE SPLIT BY SEGMENT (2019)
  • FIG 99 TREND MICRO INCORPORATED - REVENUE SPLIT BY GEOGRAPHY (2019)
目次

Title:
Cyber Security Market Research Report: By Component (Solutions, Services), Security Type (Application, Network, Endpoint, Cloud, Enterprise), Deployment (On-Premises, Cloud), Enterprise (Large Enterprises, SME), Use Case (Security Monitoring, Network Traffic Analysis, Threat Hunting, Incident Response, Data Exfiltration), Industry (Aerospace & Defense, Government, BFSI, Healthcare, Retail, IT & Telecom, Manufacturing) - Global Industry Analysis and Growth Forecast to 2030.

In 2019, 1,473 data breaches in the U.S. led to the exposure of 164,683,455 confidential records, as per the Identity Theft Resource Center (ITRC). Additionally, in May 2020 alone, 841,529 records were exposed in 108 data breach incidents. The records ranged from people's financial and medical information to strongly protected national secrets. Weak passwords, improper configuration, complex access permissions, and malware attacks are the major reasons behind data breaches. Moreover, with more companies transitioning to the cloud, the threat is becoming even more real.

As per P&S Intelligence, due to the rising number of such attacks, the cyber security market will grow from $119.9 billion in 2019 to $433.6 billion by 2030, at a 12.6% CAGR between 2020 and 2030. Most people associate cyber security with a simple antivirus, but it is a lot more than that, encompassing application, enterprise, endpoint, network, database, cloud, email, and information security. Among these, the demand for enterprise security solutions is the highest, as organizations are becoming aware about keeping their entire IT infrastructure safe from cyber miscreants.

In the coming years though, the requirement for cloud security solutions is expected to rise the fastest, on account of the burgeoning usage of cloud computing. Cloud allows companies to minimize their IT infrastructure requirement, access the data from anywhere, at any time, and scale up and down the storage capacity as per usage. The 2020 State of the Cloud Report says that by 2023, around $500 billion will be publicly spent on cloud around the world. In 2019, McAfee had said that in any company, around 9% of the cloud applications in use are highly vulnerable to cyberattacks.

The cyber security market, under segmentation by use case, is categorized into incident response, security monitoring, threat hunting, network traffic analysis, data exfiltration, and others. Among these, the security monitoring category dominated the industry during the historical period (2014-2019), because of the increasing need to monitor and track events and analyze threats in real time. During the forecast period, the highest CAGR is expected in the threat hunting category, with users becoming more aware on studying persistent threats and responding to them quickly.

Using cybersecurity solutions for threat hunting results in quicker threat and response management system (TRMS) operation, reduced inspection time, proactive specific threat identification, early threat detection, thereby helping secure the network infrastructure, and information analysis by actionable intelligence resources. In an article published in October 2019, CNBC says, "Cyberattacks now cost companies $200,000 on average, putting many out of business." Therefore, it is essential to catch the attack as it happens, so that it can be quickly thwarted and losses can be avoided.

Apart from the increasing cyberattack incidence, another key driver for the cyber security market is the stringent compliance regulations in numerous countries. To encourage companies to take steps for safeguarding their reputation and avoid losses and protect customers' confidential data, several acts mandating a robust cybersecurity infrastructure have been passed. Examples of these laws are the 2018 California Consumer Privacy Act (CCPA), 1999 Gramm-Leach-Bliley Act, 1996 Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA), 2002 Homeland Security Act, General Data Protection Union (GDPR), and Payment Card Industry Data Security Standard (PCI DSS).

Presently, North American people are the most significant users of cybersecurity solutions, due to the wide usage of data analysis tools, increasing number of data centers, rapid adoption of cloud computing, fast-paced digitization, high download rate of mobile applications, and rising usage of electronic health records (EHRs). In the immediate future, the demand for cybersecurity solutions is expected to boom in Asia-Pacific (APAC), due to the increasing awareness about thwarting cyberattacks, rising adoption of data encryption and protection solutions, growing penetration of mobile internet, and government support.

Hence, as losses due to cyberattacks increase, so will the integration of cybersecurity solutions, not only by companies, but also by individuals.

Table of Contents

Chapter 1. Research Background

  • 1.1 Research Objectives
  • 1.2 Market Definition
  • 1.3 Research Scope
    • 1.3.1 Market Segmentation by Component
    • 1.3.2 Market Segmentation by Security Type
    • 1.3.3 Market Segmentation by Deployment
    • 1.3.4 Market Segmentation by Enterprise
    • 1.3.5 Market Segmentation by Use Case
    • 1.3.6 Market Segmentation by Industry
    • 1.3.7 Market Segmentation by Region
    • 1.3.8 Analysis Period
    • 1.3.9 Market Data Reporting Unit
      • 1.3.9.1 Value
  • 1.4 Key Stakeholders

Chapter 2. Research Methodology

  • 2.1 Secondary Research
    • 2.1.1 Paid
    • 2.1.2 Unpaid
  • 2.2 Primary Research
    • 2.2.1 Breakdown of Primary Research Respondents
      • 2.2.1.1 By region
      • 2.2.1.2 By industry participant
      • 2.2.1.3 By company type
  • 2.3 Market Size Estimation
  • 2.4 Data Triangulation
  • 2.5 Currency Conversion Rates
  • 2.6 Assumptions for the Study

Chapter 3. Executive Summary

  • 3.1 Voice of Industry Experts/KOLs

Chapter 4. Introduction

  • 4.1 Definition of Market Segments
    • 4.1.1 By Component
      • 4.1.1.1 Solutions
        • 4.1.1.1.1 Risk & compliance management
        • 4.1.1.1.2 IAM
        • 4.1.1.1.3 Firewall
        • 4.1.1.1.4 SVM
        • 4.1.1.1.5 Encryption
        • 4.1.1.1.6 IDS/IPS
        • 4.1.1.1.7 UTM
        • 4.1.1.1.8 DDoS attack
        • 4.1.1.1.9 Antivirus
        • 4.1.1.1.10 DLP
        • 4.1.1.1.11 Others
      • 4.1.1.2 Services
        • 4.1.1.2.1 Managed
        • 4.1.1.2.2 Professional
        • 4.1.1.2.3 Design and integration
        • 4.1.1.2.4 Risk and threat management
        • 4.1.1.2.5 Training and education
        • 4.1.1.2.6 Support and maintenance
        • 4.1.1.2.7 Consulting
    • 4.1.2 By Security Type
      • 4.1.2.1 Application
      • 4.1.2.2 Network
      • 4.1.2.3 Endpoint
      • 4.1.2.4 Cloud
      • 4.1.2.5 Enterprise
      • 4.1.2.6 Others
    • 4.1.3 By Deployment
      • 4.1.3.1 On-premises
      • 4.1.3.2 Cloud
    • 4.1.4 By Enterprise
      • 4.1.4.1 Large enterprises
      • 4.1.4.2 SMEs
    • 4.1.5 By Use Case
      • 4.1.5.1 Security monitoring
      • 4.1.5.2 Network traffic analysis
      • 4.1.5.3 Threat hunting
      • 4.1.5.4 Incident response
      • 4.1.5.5 Data exfiltration
      • 4.1.5.6 Others
    • 4.1.6 By Industry
      • 4.1.6.1 Aerospace & defense
      • 4.1.6.2 Government
      • 4.1.6.3 BFSI
      • 4.1.6.4 IT & telecom
      • 4.1.6.5 Healthcare
      • 4.1.6.6 Retail
      • 4.1.6.7 Manufacturing
      • 4.1.6.8 Others
  • 4.2 Value Chain Analysis
  • 4.3 Market Dynamics
    • 4.3.1 Trends
      • 4.3.1.1 Increasing preference for bring your own device (BYOD)
      • 4.3.1.2 Rise in number of mergers & acquisitions in the market
    • 4.3.2 Drivers
      • 4.3.2.1 Increasing number of data breaches
      • 4.3.2.2 Rising usage of mobile devices
      • 4.3.2.3 Stringent government regulations for data privacy
      • 4.3.2.4 Impact analysis of drivers on market forecast
    • 4.3.3 Restraints
      • 4.3.3.1 Lack of awareness for cyber security among SMEs
      • 4.3.3.2 Restricted budget for cyber security
      • 4.3.3.3 Impact analysis of restraints on market forecast
    • 4.3.4 Opportunities
      • 4.3.4.1 Increasing adoption of cyber security solutions by healthcare industry
  • 4.4 Impact of COVID-19 on Cyber Security Market
    • 4.4.1 Current scenario
    • 4.4.2 COVID-19 scenario
    • 4.4.3 Future scenario
  • 4.5 Porter's Five Forces Analysis
    • 4.5.1 Bargaining Power of Buyers
    • 4.5.2 Bargaining Power of Suppliers
    • 4.5.3 Intensity of Rivalry
    • 4.5.4 Threat of New Entrants
    • 4.5.5 Threat of Substitutes

Chapter 5. Global Market Size and Forecast

  • 5.1 By Component
    • 5.1.1 Solutions, by Type
    • 5.1.2 Services, by Type
  • 5.2 By Enterprise
  • 5.3 By Deployment
  • 5.4 By Security Type
  • 5.5 By Use Case
  • 5.6 By Industry
  • 5.7 By Region

Chapter 6. North America Market Size and Forecast

  • 6.1 By Component
    • 6.1.1 Solutions, by Type
    • 6.1.2 Services, by Type
  • 6.2 By Enterprise
  • 6.3 By Deployment
  • 6.4 By Security Type
  • 6.5 By Use Case
  • 6.6 By Industry
  • 6.7 By Country

Chapter 7. Europe Market Size and Forecast

  • 7.1 By Component
    • 7.1.1 Solutions, by Type
    • 7.1.2 Services, by Type
  • 7.2 By Enterprise
  • 7.3 By Deployment
  • 7.4 By Security Type
  • 7.5 By Use Case
  • 7.6 By Industry
  • 7.7 By Country

Chapter 8. APAC Market Size and Forecast

  • 8.1 By Component
    • 8.1.1 Solutions, by Type
    • 8.1.2 Services, by Type
  • 8.2 By Enterprise
  • 8.3 By Deployment
  • 8.4 By Security Type
  • 8.5 By Use Case
  • 8.6 By Industry
  • 8.7 By Country

Chapter 9. LATAM Market Size and Forecast

  • 9.1 By Component
    • 9.1.1 Solutions, by Type
    • 9.1.2 Services, by Type
  • 9.2 By Enterprise
  • 9.3 By Deployment
  • 9.4 By Security Type
  • 9.5 By Use Case
  • 9.6 By Industry
  • 9.7 By Country

Chapter 10. MEA Market Size and Forecast

  • 10.1 By Component
    • 10.1.1 Solutions, by Type
    • 10.1.2 Services, by Type
  • 10.2 By Enterprise
  • 10.3 By Deployment
  • 10.4 By Security Type
  • 10.5 By Use Case
  • 10.6 By Industry
  • 10.7 By Country

Chapter 11. Major Countries

  • 11.1 U.S. Market Revenue, By Use Case
  • 11.2 U.S. Market Revenue, By Industry
  • 11.3 U.K. Market Revenue, By Use Case
  • 11.4 U.K. Market Revenue, By Industry
  • 11.5 Germany Market Revenue, By Use Case
  • 11.6 Germany Market Revenue, By Industry
  • 11.7 China Market Revenue, By Use Case
  • 11.8 China Market Revenue, By Industry
  • 11.9 India Market Revenue, By Use Case
  • 11.10 India Market Revenue, By Industry

Chapter 12. Competitive Landscape

  • 12.1 List of Players and Their Offerings
  • 12.2 Market Share Analysis of Key Players
  • 12.3 Benchmarking Analysis of Key Players
  • 12.4 Strategic Developments in the Market
    • 12.4.1 Mergers & Acquisitions
    • 12.4.2 Product Launches
    • 12.4.3 Partnerships
    • 12.4.4 Facility Expansions

Chapter 13. Company Profiles

  • 13.1 Cisco Systems Inc.
    • 13.1.1 Business Overview
    • 13.1.2 Product and Service Offerings
    • 13.1.3 Key Financial Summary
  • 13.2 Check Point Software Technologies Ltd.
    • 13.2.1 Business Overview
    • 13.2.2 Product and Service Offerings
    • 13.2.3 Key Financial Summary
  • 13.3 Fortinet Inc.
    • 13.3.1 Business Overview
    • 13.3.2 Product and Service Offerings
    • 13.3.3 Key Financial Summary
  • 13.4 Juniper Networks Inc.
    • 13.4.1 Business Overview
    • 13.4.2 Product and Service Offerings
    • 13.4.3 Key Financial Summary
  • 13.5 Palo Alto Networks Inc.
    • 13.5.1 Business Overview
    • 13.5.2 Product and Service Offerings
    • 13.5.3 Key Financial Summary
  • 13.6 FireEye Inc.
    • 13.6.1 Business Overview
    • 13.6.2 Product and Service Offerings
    • 13.6.3 Key Financial Summary
  • 13.7 IBM Corporation
    • 13.7.1 Business Overview
    • 13.7.2 Product and Service Offerings
    • 13.7.3 Key Financial Summary
  • 13.8 McAfee LLC
    • 13.8.1 Business Overview
    • 13.8.2 Product and Service Offerings
  • 13.9 Broadcom Inc.
    • 13.9.1 Business Overview
    • 13.9.2 Product and Service Offerings
    • 13.9.3 Key Financial Summary
  • 13.10 Trend Micro Incorporated
    • 13.10.1 Business Overview
    • 13.10.2 Product and Service Offerings
    • 13.10.3 Key Financial Summary

Chapter 14. Appendix

  • 14.1 Abbreviations
  • 14.2 Sources and References
  • 14.3 Related Reports
株式会社グローバルインフォメーション
© Copyright 1996-2021, Global Information, Inc. All rights reserved.