デフォルト表紙
市場調査レポート
商品コード
755118

EDR(エンドポイントの検知および対応) - 世界市場の見通し(2017年~2026年)

Endpoint Detection and Response - Global Market Outlook (2017-2026)

出版日: | 発行: Stratistics Market Research Consulting | ページ情報: 英文 173 Pages | 納期: 2-3営業日

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=115.03円
EDR(エンドポイントの検知および対応) - 世界市場の見通し(2017年~2026年)
出版日: 2018年11月01日
発行: Stratistics Market Research Consulting
ページ情報: 英文 173 Pages
納期: 2-3営業日
  • 全表示
  • 概要
  • 図表
  • 目次
概要

世界のEDR(Endpoint Detection and Response;エンドポイントの検知および対応)市場は、2017年に9億1,622万米ドルと評価され、2017年から2026年にかけては25.9%のCAGRで推移し、2026年までに72億7,336万米ドル規模の市場に成長することが予測されています。BYOD(私用端末の業務利用)の浸透、エンドポイントを標的とした攻撃の増加、クラウドプラットフォームの拡大などが当市場の主な成長要因となっています。

当レポートでは、世界のEDR(エンドポイントの検知および対応)市場を調査し、市場の概要、実行ポイント、サービス・ソリューション・展開タイプ・コンポーネント・脅威・組織規模・機能・エンドユーザー・地域別の市場規模の推移と予測、市場の成長要因および阻害要因の分析、競合情勢、主要企業のプロファイルなど、包括的な情報を提供しています。

目次

第1章 エグゼクティブサマリー

第2章 イントロダクション

第3章 市場動向分析

  • イントロダクション
  • 成長要因
  • 阻害要因
  • 市場機会
  • 脅威
  • エンドユーザー分析
  • 新興市場
  • 今後の市場のシナリオ

第4章 ファイブフォース分析

  • サプライヤーの交渉力
  • バイヤーの交渉力
  • 代替品の脅威
  • 新規参入の脅威
  • 企業間競争

第5章 世界のEDR市場:実行ポイント別

  • イントロダクション
  • ワークステーション
  • POSターミナル
  • モバイルデバイス
  • その他

第6章 世界のEDR市場:サービス・ソリューション別

  • イントロダクション
  • サービス
    • マネージドサービス
    • プロフェッショナルサービス
  • ソリューション
    • SIEM(セキュリティ情報イベント管理)
    • Syslog
    • ウェブポータル
    • Webhooks
    • カスタムプラットフォーム(PagerDuty、VictorOps)
    • 電子メール

第7章 世界のEDR市場:展開タイプ別

  • イントロダクション
  • ハイブリッド
  • オンプレミス
  • 管理/ホステッド
  • クラウド

第8章 世界のEDR市場:コンポーネント別

  • イントロダクション
  • ユーザー行動分析
  • 動的バイナリー解析
  • バイナリー脅威インテリジェンス
  • ネットワーク脅威インテリジェンス
  • サーバー動作分析

第9章 世界のEDR市場:脅威別

  • イントロダクション
  • ネットワーク攻撃
  • マルウェア
    • トロイの木馬
    • クライムウェア
    • エクスプロイトキット
    • ランサムウェア
  • ステガノグラフィ

第10章 世界のEDR市場:組織規模別

  • イントロダクション
  • 大企業
  • 中小企業

第11章 世界のEDR市場:機能別

  • イントロダクション
  • エンドポイントインシデント
    • プロセス実行
    • ネットワークトラフィック
  • セキュリティインシデント調査
  • エンドポイント修復
  • セキュリティインシデント検出

第12章 世界のEDR市場:エンドユーザー別

  • イントロダクション
  • 政府・公共事業
  • 製造
  • 金融・金融サービス・保険
  • 航空宇宙・防衛
  • 小売
  • 医療
  • IT・テレコム
  • その他

第13章 世界のEDR市場:地域別

  • イントロダクション
  • 北米
    • 米国
    • カナダ
    • メキシコ
  • 欧州
    • ドイツ
    • 英国
    • イタリア
    • フランス
    • スペイン
    • その他
  • アジア太平洋地域
    • 日本
    • 中国
    • インド
    • オーストラリア
    • ニュージーランド
    • 韓国
    • その他
  • 南米
    • アルゼンチン
    • ブラジル
    • チリ
    • その他
  • 中東・アフリカ
    • サウジアラビア
    • アラブ首長国連邦
    • カタール
    • 南アフリカ
    • その他

第14章 市場の主な動向

  • 合意、パートナーシップ、コラボレーション、合弁事業
  • 買収と合併
  • 新製品の発売
  • 拡張
  • その他の主要戦略

第15章 企業プロファイル

  • Intel Security - McAfee
  • Fireeye Inc.
  • Carbon Black Inc.
  • Digital Guardian
  • RSA Security (EMC)
  • Deep Instinct
  • Cisco Systems Inc.
  • Sophos Group PLC
  • Crowdstrike Inc.
  • Cybereason Inc.
  • Fortinet
  • Panda Security
  • Symantec Corporation
  • F-Secure
  • OPEN TEXT CORPORATION
  • TANIUM INC
図表

List of Tables

  • Table 1 Global Endpoint Detection and Response Market Outlook, By Region (2016-2026) ($MN)
  • Table 2 Global Endpoint Detection and Response Market Outlook, By Enforcement Point (2016-2026) ($MN)
  • Table 3 Global Endpoint Detection and Response Market Outlook, By Workstations (2016-2026) ($MN)
  • Table 4 Global Endpoint Detection and Response Market Outlook, By Point of Sale Terminals (2016-2026) ($MN)
  • Table 5 Global Endpoint Detection and Response Market Outlook, By Mobile Devices (2016-2026) ($MN)
  • Table 6 Global Endpoint Detection and Response Market Outlook, By Other Enforcement Points (2016-2026) ($MN)
  • Table 7 Global Endpoint Detection and Response Market Outlook, By Services and Solutions (2016-2026) ($MN)
  • Table 8 Global Endpoint Detection and Response Market Outlook, By Services (2016-2026) ($MN)
  • Table 9 Global Endpoint Detection and Response Market Outlook, By Managed Services (2016-2026) ($MN)
  • Table 10 Global Endpoint Detection and Response Market Outlook, By Professional Services (2016-2026) ($MN)
  • Table 11 Global Endpoint Detection and Response Market Outlook, By Support and Maintenance (2016-2026) ($MN)
  • Table 12 Global Endpoint Detection and Response Market Outlook, By Implementation (2016-2026) ($MN)
  • Table 13 Global Endpoint Detection and Response Market Outlook, By Training and Education (2016-2026) ($MN)
  • Table 14 Global Endpoint Detection and Response Market Outlook, By Consulting (2016-2026) ($MN)
  • Table 15 Global Endpoint Detection and Response Market Outlook, By Solutions (2016-2026) ($MN)
  • Table 16 Global Endpoint Detection and Response Market Outlook, By SIEM (Security Information and Event Management) Connectors (2016-2026) ($MN)
  • Table 17 Global Endpoint Detection and Response Market Outlook, By Syslog (2016-2026) ($MN)
  • Table 18 Global Endpoint Detection and Response Market Outlook, By Web Portal (2016-2026) ($MN)
  • Table 19 Global Endpoint Detection and Response Market Outlook, By Webhooks (2016-2026) ($MN)
  • Table 20 Global Endpoint Detection and Response Market Outlook, By Custom Platforms (PagerDuty, VictorOps) (2016-2026) ($MN)
  • Table 21 Global Endpoint Detection and Response Market Outlook, By Email (2016-2026) ($MN)
  • Table 22 Global Endpoint Detection and Response Market Outlook, By Deployment Mode (2016-2026) ($MN)
  • Table 23 Global Endpoint Detection and Response Market Outlook, By Hybrid (2016-2026) ($MN)
  • Table 24 Global Endpoint Detection and Response Market Outlook, By On-Premises (2016-2026) ($MN)
  • Table 25 Global Endpoint Detection and Response Market Outlook, By Managed/Hosted (2016-2026) ($MN)
  • Table 26 Global Endpoint Detection and Response Market Outlook, By Cloud (2016-2026) ($MN)
  • Table 27 Global Endpoint Detection and Response Market Outlook, By Components (2016-2026) ($MN)
  • Table 28 Global Endpoint Detection and Response Market Outlook, By User Behavior Analytics (2016-2026) ($MN)
  • Table 29 Global Endpoint Detection and Response Market Outlook, By Dynamic Binary Analysis (2016-2026) ($MN)
  • Table 30 Global Endpoint Detection and Response Market Outlook, By Sandboxing (2016-2026) ($MN)
  • Table 31 Global Endpoint Detection and Response Market Outlook, By Binary Threat Intelligence (2016-2026) ($MN)
  • Table 32 Global Endpoint Detection and Response Market Outlook, By YARA (2016-2026) ($MN)
  • Table 33 Global Endpoint Detection and Response Market Outlook, By Binary Singing Data (2016-2026) ($MN)
  • Table 34 Global Endpoint Detection and Response Market Outlook, By Known Bad MD5s (2016-2026) ($MN)
  • Table 35 Global Endpoint Detection and Response Market Outlook, By File Paths (2016-2026) ($MN)
  • Table 36 Global Endpoint Detection and Response Market Outlook, By Network Threat Intelligence (2016-2026) ($MN)
  • Table 37 Global Endpoint Detection and Response Market Outlook, By IP Addresses (2016-2026) ($MN)
  • Table 38 Global Endpoint Detection and Response Market Outlook, By Known Bad Domains (2016-2026) ($MN)
  • Table 39 Global Endpoint Detection and Response Market Outlook, By Behavioral Analysis of Servers (2016-2026) ($MN)
  • Table 40 Global Endpoint Detection and Response Market Outlook, By Types of Threats (2016-2026) ($MN)
  • Table 41 Global Endpoint Detection and Response Market Outlook, By Network Attack Methods (2016-2026) ($MN)
  • Table 42 Global Endpoint Detection and Response Market Outlook, By Malware (2016-2026) ($MN)
  • Table 43 Global Endpoint Detection and Response Market Outlook, By Trojans (2016-2026) ($MN)
  • Table 44 Global Endpoint Detection and Response Market Outlook, By Crimeware (2016-2026) ($MN)
  • Table 45 Global Endpoint Detection and Response Market Outlook, By Exploit Kits (2016-2026) ($MN)
  • Table 46 Global Endpoint Detection and Response Market Outlook, By Ransomware (2016-2026) ($MN)
  • Table 47 Global Endpoint Detection and Response Market Outlook, By Steganography Threats (2016-2026) ($MN)
  • Table 48 Global Endpoint Detection and Response Market Outlook, By Organization Size (2016-2026) ($MN)
  • Table 49 Global Endpoint Detection and Response Market Outlook, By Large Enterprises (2016-2026) ($MN)
  • Table 50 Global Endpoint Detection and Response Market Outlook, By Small and Medium Enterprises (2016-2026) ($MN)
  • Table 51 Global Endpoint Detection and Response Market Outlook, By Capabilities (2016-2026) ($MN)
  • Table 52 Global Endpoint Detection and Response Market Outlook, By Endpoint Incidents (2016-2026) ($MN)
  • Table 53 Global Endpoint Detection and Response Market Outlook, By Process Execution (2016-2026) ($MN)
  • Table 54 Global Endpoint Detection and Response Market Outlook, By Network Traffic (2016-2026) ($MN)
  • Table 55 Global Endpoint Detection and Response Market Outlook, By Investigate Security Incidents (2016-2026) ($MN)
  • Table 56 Global Endpoint Detection and Response Market Outlook, By Remediate Endpoints (2016-2026) ($MN)
  • Table 57 Global Endpoint Detection and Response Market Outlook, By Detect Security Incidents (2016-2026) ($MN)
  • Table 58 Global Endpoint Detection and Response Market Outlook, By End User (2016-2026) ($MN)
  • Table 59 Global Endpoint Detection and Response Market Outlook, By Government and Public Utilities (2016-2026) ($MN)
  • Table 60 Global Endpoint Detection and Response Market Outlook, By Manufacturing (2016-2026) ($MN)
  • Table 61 Global Endpoint Detection and Response Market Outlook, By Banking, Financial Services and Insurance (BFSI) (2016-2026) ($MN)
  • Table 62 Global Endpoint Detection and Response Market Outlook, By Aerospace and Defense (2016-2026) ($MN)
  • Table 63 Global Endpoint Detection and Response Market Outlook, By Retail (2016-2026) ($MN)
  • Table 64 Global Endpoint Detection and Response Market Outlook, By Healthcare (2016-2026) ($MN)
  • Table 65 Global Endpoint Detection and Response Market Outlook, By IT and Telecom (2016-2026) ($MN)
  • Table 66 Global Endpoint Detection and Response Market Outlook, By Other End Users (2016-2026) ($MN)

Note: Regional Tables for North America, Europe, Asia Pacific, South America, and Middle East & Africa are presented in the same manner above.

目次

According to Stratistics MRC, the Global Endpoint Detection and Response market is accounted for $916.22 million in 2017 and is expected to reach $7,273.36 million by 2026 growing at a CAGR of 25.9%. Rise in Bring Your Own Device (BYOD) across organizations, increasing incidence of enterprise endpoint-targeted attacks and expanding cloud platform are some of the major factors favoring the market growth. However, lack of awareness regarding internal and external threats is hampering the market growth.

Endpoint detection and response (EDR) technology is about providing security against cyber threats such as malware and ransomware. Moreover, it detects incidents, confirms & prioritize risks, and prevents attacks in the systems. EDR delivers automation, data integration, and provides advanced support to organizations data storage systems. The EDR is systems that store endpoint system level behaviors & events, for instance, file, registry, process, memory, and network events.

Based on deployment mode, on-premises segment is expected to grow due to the availability of a variety of products. Vendors are developing advanced products that help enterprises in the mitigation of cyber threats. In terms of geography, North America commanded the largest market share. The growth is attributed to increasing adoption of technologies and high frequency of cyber-attacks. Asia Pacific is anticipated to grow due to the presence of several small and medium scale enterprises and flourishing IT sector in countries such as India.

Some of the key players in the Endpoint Detection and Response market include Intel Security - McAfee, Fireeye Inc., Carbon Black Inc., Digital Guardian, RSA Security (EMC), Deep Instinct, Cisco Systems Inc., Sophos Group PLC, Crowdstrike Inc., Cybereason Inc., Fortinet, Panda Security, Symantec Corporation, F-Secure, Open Text Corporation and Tanium inc.

Enforcement Points Covered:

  • Workstations
  • Point of Sale Terminals
  • Mobile Devices
  • Other Enforcement Points

Services and Solutions Covered:

  • Services
  • Solutions

Deployment Modes Covered:

  • Hybrid
  • On-Premises
  • Managed/Hosted
  • Cloud

Components Covered:

  • User Behavior Analytics
  • Dynamic Binary Analysis
  • Binary Threat Intelligence
  • Network Threat Intelligence
  • Behavioral Analysis of Servers

Types of Threats Covered:

  • Network Attack Methods
  • Malware
  • Steganography Threats

Organization Sizes Covered:

  • Large Enterprises
  • Small and Medium Enterprises

Capabilities Covered:

  • Endpoint Incidents
  • Investigate Security Incidents
  • Remediate Endpoints
  • Detect Security Incidents

End Users Covered:

  • Government and Public Utilities
  • Manufacturing
  • Banking, Financial Services and Insurance (BFSI)
  • Aerospace and Defense
  • Retail
  • Healthcare
  • IT and Telecom
  • Other End Users

Regions Covered:

  • North America
    • US
    • Canada
    • Mexico
  • Europe
    • Germany
    • UK
    • Italy
    • France
    • Spain
    • Rest of Europe
  • Asia Pacific
    • Japan
    • China
    • India
    • Australia
    • New Zealand
    • South Korea
    • Rest of Asia Pacific
  • South America
    • Argentina
    • Brazil
    • Chile
    • Rest of South America
  • Middle East & Africa
    • Saudi Arabia
    • UAE
    • Qatar
    • South Africa
    • Rest of Middle East & Africa

What our report offers:

  • Market share assessments for the regional and country level segments
  • Market share analysis of the top industry players
  • Strategic recommendations for the new entrants
  • Market forecasts for a minimum of 9 years of all the mentioned segments, sub segments and the regional markets
  • Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations)
  • Strategic recommendations in key business segments based on the market estimations
  • Competitive landscaping mapping the key common trends
  • Company profiling with detailed strategies, financials, and recent developments
  • Supply chain trends mapping the latest technological advancements

Table of Contents

1 Executive Summary

2 Preface

  • 2.1 Abstract
  • 2.2 Stake Holders
  • 2.3 Research Scope
  • 2.4 Research Methodology
    • 2.4.1 Data Mining
    • 2.4.2 Data Analysis
    • 2.4.3 Data Validation
    • 2.4.4 Research Approach
  • 2.5 Research Sources
    • 2.5.1 Primary Research Sources
    • 2.5.2 Secondary Research Sources
    • 2.5.3 Assumptions

3 Market Trend Analysis

  • 3.1 Introduction
  • 3.2 Drivers
  • 3.3 Restraints
  • 3.4 Opportunities
  • 3.5 Threats
  • 3.6 End User Analysis
  • 3.7 Emerging Markets
  • 3.8 Futuristic Market Scenario

4 Porters Five Force Analysis

  • 4.1 Bargaining power of suppliers
  • 4.2 Bargaining power of buyers
  • 4.3 Threat of substitutes
  • 4.4 Threat of new entrants
  • 4.5 Competitive rivalry

5 Global Endpoint Detection and Response Market, By Enforcement Point

  • 5.1 Introduction
  • 5.2 Workstations
  • 5.3 Point of Sale Terminals
  • 5.4 Mobile Devices
  • 5.5 Other Enforcement Points

6 Global Endpoint Detection and Response Market, By Services and Solutions

  • 6.1 Introduction
  • 6.2 Services
    • 6.2.1 Managed Services
    • 6.2.2 Professional Services
      • 6.2.2.1 Support and Maintenance
      • 6.2.2.2 Implementation
      • 6.2.2.3 Training and Education
      • 6.2.2.4 Consulting
  • 6.3 Solutions
    • 6.3.1 SIEM (Security Information and Event Management) Connectors
    • 6.3.2 Syslog
    • 6.3.3 Web Portal
    • 6.3.4 Webhooks
    • 6.3.5 Custom Platforms (PagerDuty, VictorOps)
    • 6.3.6 Email

7 Global Endpoint Detection and Response Market, By Deployment Mode

  • 7.1 Introduction
  • 7.2 Hybrid
  • 7.3 On-Premises
  • 7.4 Managed/Hosted
  • 7.5 Cloud

8 Global Endpoint Detection and Response Market, By Components

  • 8.1 Introduction
  • 8.2 User Behavior Analytics
  • 8.3 Dynamic Binary Analysis
    • 8.3.1 Sandboxing
  • 8.4 Binary Threat Intelligence
    • 8.4.1 YARA
    • 8.4.2 Binary Singing Data
    • 8.4.3 Known Bad MD5s
    • 8.4.4 File Paths
  • 8.5 Network Threat Intelligence
    • 8.5.1 IP Addresses
    • 8.5.2 Known Bad Domains
  • 8.6 Behavioral Analysis of Servers

9 Global Endpoint Detection and Response Market, By Types of Threats

  • 9.1 Introduction
  • 9.2 Network Attack Methods
  • 9.3 Malware
    • 9.3.1 Trojans
    • 9.3.2 Crimeware
    • 9.3.3 Exploit Kits
    • 9.3.4 Ransomware
  • 9.4 Steganography Threats

10 Global Endpoint Detection and Response Market, By Organization Size

  • 10.1 Introduction
  • 10.2 Large Enterprises
  • 10.3 Small and Medium Enterprises

11 Global Endpoint Detection and Response Market, By Capabilities

  • 11.1 Introduction
  • 11.2 Endpoint Incidents
    • 11.2.1 Process Execution
    • 11.2.2 Network Traffic
  • 11.3 Investigate Security Incidents
  • 11.4 Remediate Endpoints
  • 11.5 Detect Security Incidents

12 Global Endpoint Detection and Response Market, By End User

  • 12.1 Introduction
  • 12.2 Government and Public Utilities
  • 12.3 Manufacturing
  • 12.4 Banking, Financial Services and Insurance (BFSI)
  • 12.5 Aerospace and Defense
  • 12.6 Retail
  • 12.7 Healthcare
  • 12.8 IT and Telecom
  • 12.9 Other End Users

13 Global Endpoint Detection and Response Market, By Geography

  • 13.1 Introduction
  • 13.2 North America
    • 13.2.1 US
    • 13.2.2 Canada
    • 13.2.3 Mexico
  • 13.3 Europe
    • 13.3.1 Germany
    • 13.3.2 UK
    • 13.3.3 Italy
    • 13.3.4 France
    • 13.3.5 Spain
    • 13.3.6 Rest of Europe
  • 13.4 Asia Pacific
    • 13.4.1 Japan
    • 13.4.2 China
    • 13.4.3 India
    • 13.4.4 Australia
    • 13.4.5 New Zealand
    • 13.4.6 South Korea
    • 13.4.7 Rest of Asia Pacific
  • 13.5 South America
    • 13.5.1 Argentina
    • 13.5.2 Brazil
    • 13.5.3 Chile
    • 13.5.4 Rest of South America
  • 13.6 Middle East & Africa
    • 13.6.1 Saudi Arabia
    • 13.6.2 UAE
    • 13.6.3 Qatar
    • 13.6.4 South Africa
    • 13.6.5 Rest of Middle East & Africa

14 Key Developments

  • 14.1 Agreements, Partnerships, Collaborations and Joint Ventures
  • 14.2 Acquisitions & Mergers
  • 14.3 New Product Launch
  • 14.4 Expansions
  • 14.5 Other Key Strategies

15 Company Profiling

  • 15.1 Intel Security - McAfee
  • 15.2 Fireeye Inc.
  • 15.3 Carbon Black Inc.
  • 15.4 Digital Guardian
  • 15.5 RSA Security (EMC)
  • 15.6 Deep Instinct
  • 15.7 Cisco Systems Inc.
  • 15.8 Sophos Group PLC
  • 15.9 Crowdstrike Inc.
  • 15.10 Cybereason Inc.
  • 15.11 Fortinet
  • 15.12 Panda Security
  • 15.13 Symantec Corporation
  • 15.14 F-Secure
  • 15.15 OPEN TEXT CORPORATION
  • 15.16 TANIUM INC