市場調査レポート

世界の脆弱性評価市場と13社の分析

Worldwide Vulnerability Assessment Market and 13 Companies Analysis

発行 Renub Research 商品コード 171674
出版日 ページ情報 英文 86 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=101.39円で換算しております。
Back to Top
世界の脆弱性評価市場と13社の分析 Worldwide Vulnerability Assessment Market and 13 Companies Analysis
出版日: 2011年03月01日 ページ情報: 英文 86 Pages
概要

当レポートでは、世界の脆弱性評価市場を取り上げ、世界のITセキュリティー支出市場および将来予測、世界の脆弱性評価市場の概要および将来予測を概括し、主要な参入企業のSaaSソリューションを使って製品分析を行い、主要な市場参入企業13社に関する分析をまとめるなど、概略以下の構成でお届けします。

第1章 世界のITセキュリティーリスク管理市場と将来予測

第2章 世界の脆弱性評価(VA)市場の規模と将来予測

第3章 ITセキュリティーリスクとコンプライアンス管理推進要因

  • クレジットカード業界のセキュリティー基準(PCI DSS)
  • 各企業のセキュリティー向上におけるPCI DSSの役割
    • 常時、すべての記録を収集
    • ユーザー活動の監視
    • リスクの優先順位付け
  • ITセキュリティーリスクによる投資収益率
  • PCI業界における規制および法律
    • グラム・リーチ・ブライリー法(GLBA)
    • 医療保険の携行性と責任に関する法律(HIPAA)
    • サーベンス・オクスリー法(SOX)
    • EUデータ保護指令(EUDPD)
    • ISO 27002情報セキュリティマネジメント実践のための規範
    • COBIT

第4章 主な市場参入企業:製品およびSaaSソリューションを提供

  • 主な市場参入企業:2009年の市場シェア

第5章 ワイヤレスネットワークセキュリティー

  • ワイヤレスサービスプロバイダー:Cisco
    • 評価サービス
    • 計画および設計サービス
    • 最適化サービス
  • ワイヤレスサービスプロバイダー:Hewlett Packard Networking
    • A Series:大規模かつ複雑なネットワークを有する企業クライアント用
    • E Series:手ごろな価格で使いやすい技術を求めている中規模クライアント用
    • V Series:中小規模事業を支援
    • S Series:ネットワークセキュリティーの向上を要するクライアント用

第6章 主要参入企業の分析(13社)

  • Qualys Incorporation
  • Beyond Security
  • Critical Watch, Inc.
  • eEye Digital Security
  • IBM Internet Security System
  • Lumension Security Inc.
  • McAfee Inc.
  • nCircle Network Security Inc.
  • Rapid7 Inc.
  • Saint Corporation
  • StillSecure
  • Tenable Network Security Inc
  • Trustwave

図表

目次

Report titled “Worldwide Vulnerability Assessment Market and 13 Companies Analysis” is divided in four parts:

  • First Section describes worldwide IT security spending market and future forecast
  • Second Section explains worldwide vulnerability assessment market and future forecast
  • Third Section describes key players' products analysis with Saas solutions
  • Fourth Section talks about the key players - 13 Key Players has been analyzed in the report

Key Players section has been analyzed in the report in the following format:

  • Products Analysis - Company product analysis compared to its competitor products
  • Revenue Analysis - Company Revenue in Vulnerability Assessment Market
  • Strengths - Company strength in vulnerability assessment market
  • Weakness - Company weakness in vulnerability assessment market

Data Sources

Information and data in this report has been collected from various printable and non-printable sources like Trade Journals, White papers, Online paid databases, News websites, Government Agencies, Magazines, Newspapers and Trade associations.

Table of Contents

1. Worldwide IT Security Risk Management Market & Future Forecast

2. Worldwide Vulnerability Assessment (VA) Market Size & Future Forecast

3. IT Security Risk and Compliance Management Drivers

  • 3.1 The Payment Card Industry Data Security Standard (PCI DSS)
  • 3.2 Role of PCI DSS to Improve Security in the Companies
    • 3.2.1 Collecting All Logs, All the Time
    • 3.2.2 Monitoring User Activity
    • 3.2.3 Prioritizing the Risks
  • 3.3 Return on Investments from IT Security Risk
  • 3.4 Regulations and Acts for PCI Industry
    • 3.4.1 Gramm-Leach-Bliley Act (GLBA)
    • 3.4.2 Health Insurance Portability and Accountability Act (HIPAA)
    • 3.4.3 Sarbanes Oxley Act (SOX)
    • 3.4.4 European Union Data Protection Directive (EUDPD)
    • 3.4.5 ISO 27002 Code of Practice for Information Security Management
    • 3.4.6 COBIT

4. Key Players - Offering Products & Saas Solutions

  • 4.1 Key Players - Market Share for 2009

5. Wireless Network Security

  • 5.1 Wireless Service Providers - Cisco
    • 5.1.1 Assessment Services
    • 5.1.2 Planning and Design Services
    • 5.1.3 Optimization Service
  • 5.2 Wireless Service Providers - Hewlett Packard Networking
    • 5.2.1 A Series - For Enterprise Clients with Large and Complex Deployments
    • 5.2.2 E Series - For Midsize Clients Seeking Affordable, Easy-To-Use Technology
    • 5.2.3 V Series - Helps Small and Midsize Businesses
    • 5.2.4 S Series - Offers Clients Needing Increased Network Security

6. Analysis of the key players

  • 6.1 Qualys Incorporation
    • 6.1.1 Products
    • 6.1.2 Qualys - Strengths
    • 6.1.3 Qualys - Weakness
    • 6.1.4 Qualys - Revenue
  • 6.2 Beyond Security
    • 6.2.1 Products
    • 6.2.2 Beyond Security - Strengths
    • 6.2.3 Beyond Security - Weakness
  • 6.3 Critical Watch, Inc.
    • 6.3.1 Products
    • 6.3.2 Critical Watch - Strengths
    • 6.3.3 Critical Watch - Weakness
  • 6.4 eEye Digital Security
    • 6.4.1 Products
    • 6.4.2 eEye Digital Security - Strengths
    • 6.4.3 eEye Digital Security - Weakness
  • 6.5 IBM Internet Security System
    • 6.5.1 Products
    • 6.5.2 IBM (Vulnerability Assessment) - Strengths
    • 6.5.3 IBM (Vulnerability Assessment) - Weakness
    • 6.5.4 IBM (Vulnerability Assessment) - Revenue
  • 6.6 Lumension Security Inc.
    • 6.6.1 Products
    • 6.6.2 Lumension Security - Strengths
    • 6.6.3 Lumension Security - Weakness
    • 6.6.4 Lumension Security - Revenue
  • 6.7 McAfee Inc.
    • 6.7.1 Products
    • 6.7.2 McAfee - Strengths
    • 6.7.3 McAfee - Weakness
  • 6.8 nCircle Network Security Inc.
    • 6.8.1 Products
    • 6.8.2 nCircle - Strengths
    • 6.8.3 nCircle - Weakness
    • 6.8.4 nCircle - Revenue
  • 6.9 Rapid7 Inc.
    • 6.9.1 Products
    • 6.9.2 Rapid7 - Strengths
    • 6.9.3 Rapid7 - Weakness
    • 6.9.4 Rapid7 - Revenue
  • 6.10 Saint Corporation
    • 6.10.1 Products
    • 6.10.2 Saint Corporation - Strengths
    • 6.10.3 Saint Corporation - Weakness
    • 6.10.4 Saint Corporation - Revenue
  • 6.11 StillSecure
    • 6.11.1 Products
    • 6.11.2 StillSecure - Strengths
    • 6.11.3 StillSecure - Weakness
  • 6.12 Tenable Network Security Inc
    • 6.12.1 Products
    • 6.12.2 Tenable Network Security - Strengths
    • 6.12.3 Tenable Network Security - Weakness
    • 6.12.4 Tenable Network Security - Revenue
  • 6.13 Trustwave
    • 6.13.1 Products
    • 6.13.2 Trustwave - Strengths
    • 6.13.3 Trustwave - Weakness
    • 6.13.4 Trust Wave - Revenue

List of Figures:

  • Figure 1 1: Worldwide - IT Security Spending Market (Billion US$), 2007 - 2010
  • Figure 1 2: Worldwide - Forecast for IT Security Spending Market (Billion US$), 2011 - 2014
  • Figure 2 1: Worldwide - Vulnerability Assessment Market Size (Million US$), 2005 - 2009
  • Figure 2 2: Worldwide - Forecast for Vulnerability Assessment (VA) Market Size (Million US$), 2010 - 2013
  • Figure 3 1: Worldwide - Organization Experience in Various Types of Fraud (Percent %), 2010
  • Figure 3 2: United States - Online Sales Market (Billion US$), 2007 - 2012
  • Figure 4 1: Worldwide - Key Players Vulnerability Assessment (VA) Market Share Percentage (%), 2009
  • Figure 5 1: Worldwide - Network Performance Monitoring and Management Solutions Market, (Million US$), 2008 - 2010
  • Figure 5 2: Worldwide - Network Performance Monitoring and Management Solutions Market, (Million US$), 2011 - 2015
  • Figure 6 1: Qualys - Revenue (Million US$) 2003 - 2009
  • Figure 6 2: IBM - Vulnerability Assessment Revenue (Million US$), 2007 & 2008
  • Figure 6 3: Lumension - Revenue (Million US$), 2004 - 2009
  • Figure 6 4: nCircle - Revenue (Million US$), 2002 - 2009
  • Figure 6 5: Rapid7 - Revenue (Million US$), 2005 - 2009
  • Figure 6 6: Saint Corporation - Revenue (Million, US$), 2008 - 2010
  • Figure 6 7: Teenable Network Security - Revenue (Million US$), 2006 & 2009
  • Figure 6 8: Trustwave - Revenue (Million US$), 2008 - 2010

List of Tables:

  • Table 2 1: Worldwide - Key Player Offering Products and Saas Solutions
Back to Top