表紙
市場調査レポート

サイバーセキュリティ:新たな動向および投資展望

Cyber Security - Emerging Trends and Investment Outlook

発行 Strategic Defence Intelligence 商品コード 319003
出版日 ページ情報 英文 59 Pages
即納可能
価格
本日の銀行送金レート: 1USD=102.12円で換算しております。
Back to Top
サイバーセキュリティ:新たな動向および投資展望 Cyber Security - Emerging Trends and Investment Outlook
出版日: 2014年11月19日 ページ情報: 英文 59 Pages
概要

当レポートでは、世界のサイバーセキュリティ環境、サイバー攻撃の潜在的起源、サイバー攻撃へ対抗するために採用される戦略の好み、および今後のサイバーセキュリティ製品/サービスへの投資計画などについて分析しており、企業へのサイバー攻撃の潜在的影響に関するエグゼクティブの見解やサイバーセキュリティの主な障壁の調査、サイバーセキュリティ製品の有望な市場の特定、およびサイバーセキュリティ製品/サービスの需要予測などをまとめ、お届けいたします。

目次

  • 調査手法・サンプル規模
  • サイバーセキュリティ環境
  • サイバー攻撃が組織に及ぼす潜在的影響
  • 主要なサイバー攻撃技術
  • サイバー攻撃の潜在的起源
  • サイバー攻撃の発信国
  • サイバー戦争の脅威に対処する主な課題
  • 今後2年間のサイバーセキュリティ製品/サービスに対する投資計画
  • サイバーセキュリティ製品/サービス予算の変化予測
  • サイバーセキュリティ製品/サービスの需要予測
  • サイバーセキュリティ製品の主要市場
  • 付録
目次
Product Code: DF4315PR

Summary

"Cyber Security - Emerging Trends and Investment Outlook" is a new report by Strategic Defence Intelligence that globally analyzes cyber security environment, potential sources of cyber-attacks, preferred strategies deployed to counter cyber attacks, and planned investment on cyber security products and services over the next two years. This report also examines executive opinions about the potential impacts of cyber attacks on organizations. Furthermore, it analyzes key barriers to cyber security, identifies prominent markets for cyber security products and, projects demand for cyber security products and services over the next two years.

Key Findings

  • Executives expect cyber-attacks to result in security lapses, data leaks, and miscommunication within the organization
  • Email propagation of malicious code is the most frequently used technique by cyber-attackers
  • Executives state that the majority of cyber threats originate from China
  • Organizations are conducting periodic review of systems and administrative logs, and adopted computer security policies, to counter cyber-attacks over the next two years
  • The highest percentage of executives expect less than US$50 million of investments towards cyber security products/services over the next two years

This report is the result of an extensive survey drawn from Strategic Defence Intelligence's exclusive panel of leading global defense industry executives. The report analyzes prevailing cyber security scenario, and possible impact of cyber attacks on organizations. Furthermore, it provides information about the potential sources of cyber-attacks, significant countermeasures against cyber attacks, and projects change in budget for cyber security products and services during 2015 as compared to 2014. Moreover, this report evaluates key challenges in handling cyber warfare threats and identifies potential markets for cyber security products over the next two years.

In particular, it provides an in-depth analysis of the following:

  • Cyber security environment: examines incidences of cyber-attacks among organizations in the past 12 months
  • Prime cyber-attack techniques: identifies techniques that are most frequently used by cyber-attackers
  • Significant strategies deployed to counter cyber-attacks: analyzes strategies that organizations have implemented or are planning to implement over the next two years to counter cyber-attacks
  • Key barriers to cyber security: determines key issues/hurdles faced by organizations in handling cyber warfare threats
  • Planned investment on cyber security products/services over the next two years: examines investment planned by organizations on cyber security products/services for the next two years
  • Projected demand for cyber security products and services: identifies cyber security products and services that will record an increase in demand over the next two years
  • Cyber threats - originating countries: highlights countries from where most of the cyber threats usually originate
  • Key markets for cyber security products: identifies countries that will emerge as top spenders on cyber security products over the next two years

Reasons To Buy

  • The report highlights techniques that are most frequently used by cyber-attackers. This will help organizations to strengthen countermeasures against potential cyber-attacks
  • The report assists readers to restructure cyber security strategy by highlighting significant strategies deployed by organizations to counter cyber-attacks over the next two years
  • The report provides information about key potential markets for cyber security products. This will help organizations to develop business expansion plans
  • The report analyzes key challenges faced by organizations in handling cyber warfare threats. This will help organizations to revamp cyber security strategy
  • The report helps defense executives to recognize demand trends for cyber security products by identifying cyber security products and services that will record an increase in demand over the next two years

Table of Contents

  • Methodology and sample size
  • Cyber security environment
  • Potential impacts of cyberattacks on organizations
  • Prime cyberattack techniques
  • Potential sources of cyberattacks
  • Cyber threats originating countries
  • Significant strategies deployed to counter cyberattacks
  • Key challenges in handling cyber warfare threats
  • Planned investment on cyber security products/services over the next two years
  • Projected change in budget for cyber security products/services
  • Projected demand for cyber security products and services
  • Key markets for cyber security products
  • Appendix
Back to Top