お知らせ :東京証券取引所JASDAQスタンダード市場への新規上場に関するお知らせ
株式会社グローバルインフォメーション
市場調査レポート
商品コード
932665

サイバーセキュリティ- 世界市場の展望(2018年~2027年)

Cybersecurity - Global Market Outlook (2018-2027)

出版日: | 発行: Stratistics Market Research Consulting | ページ情報: 英文 175 Pages | 納期: 2-3営業日

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=107.25円
サイバーセキュリティ- 世界市場の展望(2018年~2027年)
出版日: 2020年03月01日
発行: Stratistics Market Research Consulting
ページ情報: 英文 175 Pages
納期: 2-3営業日
  • 全表示
  • 概要
  • 図表
  • 目次
概要

世界のサイバーセキュリティ市場は2018年に1,527億1,000万米ドルに達し、2018年から2027年にかけて12.2%のCAGRで成長を続け、2027年には4,303億3,000万米ドルに達すると予測されています。市場の成長を促進する主な要因のいくつかは、モノのインターネット、技術の進歩、およびクラウドソリューションに対する高い需要の受け入れの増加です。ただし、専門家の労働力の不足は、市場の成長を抑制する要因です。

当レポートは世界のサイバーセキュリティ市場について調査しており、成長および抑制要因、市場機会や脅威、展開別、組織規模別、サービス別、セキュリティの種類別、ソリューション別、提供別、エンドユーザー別、地域別の市場分析、発展動向、主要企業のプロファイル等の情報を提供しています。

目次

第1章 エグゼクティブサマリー

第2章 イントロダクション

第3章 市場動向分析

  • イントロダクション
  • 成長要因
  • 抑制要因
  • 市場機会
  • 脅威
  • エンドユーザー分析
  • 新興市場
  • Covid-19の影響

第4章 ポーターのファイブフォース分析

  • サプライヤーの交渉力
  • バイヤーの交渉力
  • 代用品の脅威
  • 新規参入の脅威
  • 競争相手

第5章 世界のサイバーセキュリティ市場:展開別

  • イントロダクション
  • クラウド
  • オンプレミス

第6章 世界のサイバーセキュリティ市場:組織規模別

  • イントロダクション
  • 大企業
  • 中小企業

第7章 世界のサイバーセキュリティ市場:サービス別

  • イントロダクション
  • マネージドセキュリティサービス
  • プロフェッショナルサービス
    • トレーニングと教育
    • リスクと脅威の評価
    • サポートとメンテナンス
    • 設計と統合
    • コンサルティング

第8章 世界のサイバーセキュリティ市場:セキュリティの種類別

  • イントロダクション
  • アプリケーションセキュリティ
  • ネットワークセキュリティー
  • クラウドセキュリティ
  • エンドポイントセキュリティ
  • エンタープライズセキュリティ
  • インフラセキュリティ
    • 管理効果評価
    • 境界とネットワークセキュリティ
    • エンタープライズセキュリティアーキテクチャの設計とレビュー
    • セキュリティのオーケストレーションと自動化
    • 端末管理
    • セキュリティインシデントおよびイベント管理
  • その他のセキュリティタイプ
    • データベースのセキュリティ
    • コンテンツのセキュリティ
    • ウェブセキュリティ
    • 産業用制御システム(ICS)のセキュリティ

第9章 世界のサイバーセキュリティ市場:ソリューション別

  • イントロダクション
  • 脅威インテリジェンス
    • アイデンティティおよびアクセス管理
    • 脅威インテリジェンスプラットフォーム
    • インシデントフォレンジック
    • セキュリティと脆弱性管理
    • リスクおよびコンプライアンス管理
  • 暗号化
  • ファイアウォール
  • 災害からの回復
  • ウェブフィルタリング
  • アンチウイルス/アンチマルウェア
  • データ損失防止
    • ストレージ/データセンターのデータ損失防止
    • ネットワークデータ損失防止
    • エンドポイントのデータ損失防止
  • 分散型サービス拒否の軽減
  • 侵入検知システム/侵入防止システム
    • ホストベース
    • 無線
    • ネットワークベース
  • その他のソリューション
    • パッチ管理
    • アプリケーションのホワイトリスト

第10章 世界のサイバーセキュリティ市場:提供別

  • イントロダクション
  • セキュリティとプライバシーサービス
    • クラウドデータ保護
    • データマスキング
    • データの発見と分類
    • データ保護のアーキテクチャと設計
    • データ保護の現状評価と修正戦略
  • 統合脆弱性管理
    • ネットワーク侵入テスト
    • セキュリティアーキテクチャのレビュー
    • セキュリティテスト
    • レッドチームオペレーション
    • 脅威モデリングとリスク分析
    • ソフトウェア合成分析
    • 安全なソフトウェア開発ライフサイクルの実装
    • サービス指向アーキテクチャ (SOA)テスト
    • L1-L2-L3オペレーション
    • インフラ仮想マシンツールの展開
    • 仮想マシンプロセスコンサルティング

第11章 世界のサイバーセキュリティ市場:エンドユーザー別

  • イントロダクション
  • 政府と防衛
  • 銀行、金融サービスおよび保険(BFSI)
  • 製造
  • ITおよびテレコム
  • 小売り
  • エネルギーとユーティリティ
  • ヘルスケア
  • その他のエンドユーザー
    • メディアとエンターテインメント
    • 輸送と物流
    • 教育

第12章 世界の・サイバーセキュリティ市場: 地域別

  • イントロダクション
  • 北米
    • 米国
    • カナダ
    • メキシコ
  • 欧州
    • ドイツ
    • 英国
    • イタリア
    • フランス
    • スペイン
    • その他欧州
  • アジア太平洋地域
    • 日本
    • 中国
    • インド
    • オーストラリア
    • ニュージーランド
    • 韓国
    • その他アジア太平洋地域
  • 南米
    • アルゼンチン
    • ブラジル
    • チリ
    • その他
  • 中東・アフリカ地域
    • サウジアラビア
    • アラブ首長国連邦
    • カタール
    • 南アフリカ
    • 中近東およびアフリカのその他中東の地域

第13章 主な発展

  • 契約、パートナーシップ、コラボレーション、合弁事業
  • 買収と合併
  • 新製品の発売
  • 拡張
  • その他の主な戦略

第14章 企業プロファイル

  • Intel Corporation
  • IBM
  • Microsoft
  • Google
  • McAfee LLC
  • Cisco
  • Sophos Ltd
  • Check Point Software Technologies Ltd
  • FireEye Inc
  • Trend Micro Incorporated
  • Imperva
  • Symantec Corporation
  • Micro Focus
  • Rapid7
図表

List of Tables

  • Table 1 Global Cybersecurity Market Outlook, By Region (2017-2027) ($MN)
  • Table 2 Global Cybersecurity Market Outlook, By Deployment (2017-2027) ($MN)
  • Table 3 Global Cybersecurity Market Outlook, By Cloud (2017-2027) ($MN)
  • Table 4 Global Cybersecurity Market Outlook, By On Premises (2017-2027) ($MN)
  • Table 5 Global Cybersecurity Market Outlook, By Organization Size (2017-2027) ($MN)
  • Table 6 Global Cybersecurity Market Outlook, By Large Enterprises (2017-2027) ($MN)
  • Table 7 Global Cybersecurity Market Outlook, By Small & Medium Enterprises (2017-2027) ($MN)
  • Table 8 Global Cybersecurity Market Outlook, By Service (2017-2027) ($MN)
  • Table 9 Global Cybersecurity Market Outlook, By Managed Security Services (2017-2027) ($MN)
  • Table 10 Global Cybersecurity Market Outlook, By Professional Services (2017-2027) ($MN)
  • Table 11 Global Cybersecurity Market Outlook, By Training and Education (2017-2027) ($MN)
  • Table 12 Global Cybersecurity Market Outlook, By Risk and Threat Assessment (2017-2027) ($MN)
  • Table 13 Global Cybersecurity Market Outlook, By Support and Maintenance (2017-2027) ($MN)
  • Table 14 Global Cybersecurity Market Outlook, By Design and Integration (2017-2027) ($MN)
  • Table 15 Global Cybersecurity Market Outlook, By Consulting (2017-2027) ($MN)
  • Table 16 Global Cybersecurity Market Outlook, By Security Type (2017-2027) ($MN)
  • Table 17 Global Cybersecurity Market Outlook, By Application Security (2017-2027) ($MN)
  • Table 18 Global Cybersecurity Market Outlook, By Network Security (2017-2027) ($MN)
  • Table 19 Global Cybersecurity Market Outlook, By Cloud Security (2017-2027) ($MN)
  • Table 20 Global Cybersecurity Market Outlook, By Endpoint Security (2017-2027) ($MN)
  • Table 21 Global Cybersecurity Market Outlook, By Enterprise Security (2017-2027) ($MN)
  • Table 22 Global Cybersecurity Market Outlook, By Infrastructure Security (2017-2027) ($MN)
  • Table 23 Global Cybersecurity Market Outlook, By Control Effectiveness Assessment (2017-2027) ($MN)
  • Table 24 Global Cybersecurity Market Outlook, By Perimeter and Network Security (2017-2027) ($MN)
  • Table 25 Global Cybersecurity Market Outlook, By Enterprise Security Architecture Design and Review (2017-2027) ($MN)
  • Table 26 Global Cybersecurity Market Outlook, By Security Orchestration and Automation (2017-2027) ($MN)
  • Table 27 Global Cybersecurity Market Outlook, By Device Management (2017-2027) ($MN)
  • Table 28 Global Cybersecurity Market Outlook, By Security Incident and Event Management (2017-2027) ($MN)
  • Table 29 Global Cybersecurity Market Outlook, By Other Security Types (2017-2027) ($MN)
  • Table 30 Global Cybersecurity Market Outlook, By Database Security (2017-2027) ($MN)
  • Table 31 Global Cybersecurity Market Outlook, By Content Security (2017-2027) ($MN)
  • Table 32 Global Cybersecurity Market Outlook, By Web Security (2017-2027) ($MN)
  • Table 33 Global Cybersecurity Market Outlook, By Industrial Control System (ICS) Security (2017-2027) ($MN)
  • Table 34 Global Cybersecurity Market Outlook, By Solution (2017-2027) ($MN)
  • Table 35 Global Cybersecurity Market Outlook, By Threat Intelligence (2017-2027) ($MN)
  • Table 36 Global Cybersecurity Market Outlook, By Identity and Access Management (2017-2027) ($MN)
  • Table 37 Global Cybersecurity Market Outlook, By Threat Intelligence Platforms (2017-2027) ($MN)
  • Table 38 Global Cybersecurity Market Outlook, By Incident Forensics (2017-2027) ($MN)
  • Table 39 Global Cybersecurity Market Outlook, By Security and Vulnerability Management (2017-2027) ($MN)
  • Table 40 Global Cybersecurity Market Outlook, By Risk and Compliance Management (2017-2027) ($MN)
  • Table 41 Global Cybersecurity Market Outlook, By Encryption (2017-2027) ($MN)
  • Table 42 Global Cybersecurity Market Outlook, By Firewall (2017-2027) ($MN)
  • Table 43 Global Cybersecurity Market Outlook, By Disaster Recovery (2017-2027) ($MN)
  • Table 44 Global Cybersecurity Market Outlook, By Web Filtering (2017-2027) ($MN)
  • Table 45 Global Cybersecurity Market Outlook, By Antivirus/Antimalware (2017-2027) ($MN)
  • Table 46 Global Cybersecurity Market Outlook, By Data Loss Prevention (2017-2027) ($MN)
  • Table 47 Global Cybersecurity Market Outlook, By Storage/ Data Center Data Loss Prevention (2017-2027) ($MN)
  • Table 48 Global Cybersecurity Market Outlook, By Network Data Loss Prevention (2017-2027) ($MN)
  • Table 49 Global Cybersecurity Market Outlook, By Endpoint Data Loss Prevention (2017-2027) ($MN)
  • Table 50 Global Cybersecurity Market Outlook, By Distributed Denial Of Service Mitigation (2017-2027) ($MN)
  • Table 51 Global Cybersecurity Market Outlook, By Intrusion Detection Systems/Intrusion Prevention Systems (2017-2027) ($MN)
  • Table 52 Global Cybersecurity Market Outlook, By Host-based (2017-2027) ($MN)
  • Table 53 Global Cybersecurity Market Outlook, By Wireless (2017-2027) ($MN)
  • Table 54 Global Cybersecurity Market Outlook, By Network -based (2017-2027) ($MN)
  • Table 55 Global Cybersecurity Market Outlook, By Other Solutions (2017-2027) ($MN)
  • Table 56 Global Cybersecurity Market Outlook, By Patch Management (2017-2027) ($MN)
  • Table 57 Global Cybersecurity Market Outlook, By Application Whitelisting (2017-2027) ($MN)
  • Table 58 Global Cybersecurity Market Outlook, By Offering (2017-2027) ($MN)
  • Table 59 Global Cybersecurity Market Outlook, By Security and Privacy Service (2017-2027) ($MN)
  • Table 60 Global Cybersecurity Market Outlook, By Cloud Data Protection (2017-2027) ($MN)
  • Table 61 Global Cybersecurity Market Outlook, By Data Masking (2017-2027) ($MN)
  • Table 62 Global Cybersecurity Market Outlook, By Data Discovery and Classification (2017-2027) ($MN)
  • Table 63 Global Cybersecurity Market Outlook, By Data Protection Architecture and Design (2017-2027) ($MN)
  • Table 64 Global Cybersecurity Market Outlook, By Data Protection Current State Assessment and Remediation Strategy (2017-2027) ($MN)
  • Table 65 Global Cybersecurity Market Outlook, By Unified Vulnerability Management (2017-2027) ($MN)
  • Table 66 Global Cybersecurity Market Outlook, By Network Penetration Testing (2017-2027) ($MN)
  • Table 67 Global Cybersecurity Market Outlook, By Security Architecture Review (2017-2027) ($MN)
  • Table 68 Global Cybersecurity Market Outlook, By Security Testing (2017-2027) ($MN)
  • Table 69 Global Cybersecurity Market Outlook, By Red Team Operation (2017-2027) ($MN)
  • Table 70 Global Cybersecurity Market Outlook, By Threat Modelling and Risk Analysis (2017-2027) ($MN)
  • Table 71 Global Cybersecurity Market Outlook, By Software Compositing Analysis (2017-2027) ($MN)
  • Table 72 Global Cybersecurity Market Outlook, By Secure Software Development Life Cycle Implementation (2017-2027) ($MN)
  • Table 73 Global Cybersecurity Market Outlook, By Service Oriented Architecture (SOA) Testing (2017-2027) ($MN)
  • Table 74 Global Cybersecurity Market Outlook, By L1 - L2 - L3 Operations (2017-2027) ($MN)
  • Table 75 Global Cybersecurity Market Outlook, By Infra Virtual Machine Tool Deployment (2017-2027) ($MN)
  • Table 76 Global Cybersecurity Market Outlook, By Virtual Machine Process Consulting (2017-2027) ($MN)
  • Table 77 Global Cybersecurity Market Outlook, By End User (2017-2027) ($MN)
  • Table 78 Global Cybersecurity Market Outlook, By Government and Defense (2017-2027) ($MN)
  • Table 79 Global Cybersecurity Market Outlook, By Banking, Financial Services and Insurance (BFSI) (2017-2027) ($MN)
  • Table 80 Global Cybersecurity Market Outlook, By Manufacturing (2017-2027) ($MN)
  • Table 81 Global Cybersecurity Market Outlook, By IT and Telecom (2017-2027) ($MN)
  • Table 82 Global Cybersecurity Market Outlook, By Retail (2017-2027) ($MN)
  • Table 83 Global Cybersecurity Market Outlook, By Energy and Utilities (2017-2027) ($MN)
  • Table 84 Global Cybersecurity Market Outlook, By Healthcare (2017-2027) ($MN)
  • Table 85 Global Cybersecurity Market Outlook, By Other End Users (2017-2027) ($MN)
  • Table 86 Global Cybersecurity Market Outlook, By Media & Entertainment (2017-2027) ($MN)
  • Table 87 Global Cybersecurity Market Outlook, By Transportation & Logistics (2017-2027) ($MN)
  • Table 88 Global Cybersecurity Market Outlook, By Education (2017-2027) ($MN)

Note: Tables for North America, Europe, APAC, South America, and Middle East & Africa Regions are also represented in the same manner as above.

目次

According to Stratistics MRC, the Global Cybersecurity market is accounted for $152.71 billion in 2018 and is expected to reach $430.33 billion by 2027 growing at a CAGR of 12.2% during the forecast period. Some of the key factors propelling the market growth are increasing acceptance of Internet of Things, technological advancements, and high demand for cloud solutions. However, insufficient number of expert workforce is the restraining factor for the growth of the market.

Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services provided by them.

By deployment, the cloud segment is expected to grow at a significant market share during the forecast period. The growth of this segment is mainly attributed to low cost of maintenance, which mainly attracts the small & medium enterprises. Also, they do not require purchase, installation and maintenance of hardware or software. On the basis of geography, North America is anticipated to hold considerable market share during the forecast period due to the presence of key market players in the region.

Some of the key players in Cybersecurity Market include Intel Corporation, IBM, Microsoft, Google, McAfee LLC, Cisco, Sophos Ltd, Check Point Software Technologies Ltd, FireEye Inc, Trend Micro Incorporated, Imperva, Symantec Corporation, Micro Focus, and Rapid7.

Deployments Covered:

  • Cloud
  • On Premises

Organization Sizes Covered:

  • Large Enterprises
  • Small & Medium Enterprises

Services Covered:

  • Managed Security Services
  • Professional Services

Security Types Covered:

  • Application Security
  • Network Security
  • Cloud Security
  • Endpoint Security
  • Enterprise Security
  • Infrastructure Security
  • Other Security Types

Solutions Covered:

  • Threat Intelligence
  • Encryption
  • Firewall
  • Disaster Recovery
  • Web Filtering
  • Antivirus/Antimalware
  • Data Loss Prevention
  • Distributed Denial Of Service Mitigation
  • Intrusion Detection Systems/Intrusion Prevention Systems
  • Other Solutions

Offerings Covered:

  • Security and Privacy Service
  • Unified Vulnerability Management

End Users Covered:

  • Government and Defense
  • Banking, Financial Services and Insurance (BFSI)
  • Manufacturing
  • IT and Telecom
  • Retail
  • Energy and Utilities
  • Healthcare
  • Other End Users

Regions Covered:

  • North America
    • US
    • Canada
    • Mexico
  • Europe
    • Germany
    • France
    • Italy
    • UK
    • Spain
    • Rest of Europe
  • Asia Pacific
    • Japan
    • China
    • India
    • Australia
    • New Zealand
    • Rest of Asia Pacific
  • South America
    • Argentina
    • Brazil
    • Chile
    • Rest of South America
  • Middle East & Africa
    • Saudi Arabia
    • UAE
    • Qatar
    • South Africa
    • Rest of Middle East & Africa

What our report offers:

  • Market share assessments for the regional and country-level segments
  • Strategic recommendations for the new entrants
  • Covers Market data for the years 2017, 2018, 2019, 2023 and 2027
  • Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations)
  • Strategic analysis: Drivers and Constraints, Product/Technology Analysis, Porter's five forces analysis, SWOT analysis, etc.
  • Strategic recommendations in key business segments based on the market estimations
  • Competitive landscaping mapping the key common trends
  • Company profiling with detailed strategies, financials, and recent developments
  • Supply chain trends mapping the latest technological advancements

Free Customization Offerings:

All the customers of this report will be entitled to receive one of the following free customization options:

  • Company Profiling
    • Comprehensive profiling of additional market players (up to 3)
    • SWOT Analysis of key players (up to 3)
  • Regional Segmentation
    • Market estimations, Forecasts and CAGR of any prominent country as per the client's interest (Note: Depends on feasibility check)
  • Competitive Benchmarking
    • Benchmarking of key players based on product portfolio, geographical presence, and strategic alliances

Table of Contents

1 Executive Summary

2 Preface

  • 2.1 Abstract
  • 2.2 Stake Holders
  • 2.3 Research Scope
  • 2.4 Research Methodology
    • 2.4.1 Data Mining
    • 2.4.2 Data Analysis
    • 2.4.3 Data Validation
    • 2.4.4 Research Approach
  • 2.5 Research Sources
    • 2.5.1 Primary Research Sources
    • 2.5.2 Secondary Research Sources
    • 2.5.3 Assumptions

3 Market Trend Analysis

  • 3.1 Introduction
  • 3.2 Drivers
  • 3.3 Restraints
  • 3.4 Opportunities
  • 3.5 Threats
  • 3.6 End User Analysis
  • 3.7 Emerging Markets
  • 3.8 Impact of Covid-19

4 Porters Five Force Analysis

  • 4.1 Bargaining power of suppliers
  • 4.2 Bargaining power of buyers
  • 4.3 Threat of substitutes
  • 4.4 Threat of new entrants
  • 4.5 Competitive rivalry

5 Global Cybersecurity Market, By Deployment

  • 5.1 Introduction
  • 5.2 Cloud
  • 5.3 On Premises

6 Global Cybersecurity Market, By Organization Size

  • 6.1 Introduction
  • 6.2 Large Enterprises
  • 6.3 Small & Medium Enterprises

7 Global Cybersecurity Market, By Service

  • 7.1 Introduction
  • 7.2 Managed Security Services
  • 7.3 Professional Services
    • 7.3.1 Training and Education
    • 7.3.2 Risk and Threat Assessment
    • 7.3.3 Support and Maintenance
    • 7.3.4 Design and Integration
    • 7.3.5 Consulting

8 Global Cybersecurity Market, By Security Type

  • 8.1 Introduction
  • 8.2 Application Security
  • 8.3 Network Security
  • 8.4 Cloud Security
  • 8.5 Endpoint Security
  • 8.6 Enterprise Security
  • 8.7 Infrastructure Security
    • 8.7.1 Control Effectiveness Assessment
    • 8.7.2 Perimeter and Network Security
    • 8.7.3 Enterprise Security Architecture Design and Review
    • 8.7.4 Security Orchestration and Automation
    • 8.7.5 Device Management
    • 8.7.6 Security Incident and Event Management
  • 8.8 Other Security Types
    • 8.8.1 Database Security
    • 8.8.2 Content Security
    • 8.8.3 Web Security
    • 8.8.4 Industrial Control System (ICS) Security

9 Global Cybersecurity Market, By Solution

  • 9.1 Introduction
  • 9.2 Threat Intelligence
    • 9.2.1 Identity and Access Management
      • 9.2.1.1 User Access Management
      • 9.2.1.2 Next Gen Authentication
      • 9.2.1.3 Enterprise Identity Governance
      • 9.2.1.4 Privilege Management
      • 9.2.1.5 Innovation and Automation
      • 9.2.1.6 Identity as a Service (IDaaS)
      • 9.2.1.7 Digital Identity for Consumers
    • 9.2.2 Threat Intelligence Platforms
    • 9.2.3 Incident Forensics
    • 9.2.4 Security and Vulnerability Management
    • 9.2.5 Risk and Compliance Management
      • 9.2.5.1 Application Risk Management
      • 9.2.5.2 Internal Audit Services
      • 9.2.5.3 Cloud Security Risk Assessment
      • 9.2.5.4 Privacy Compliance Assessment
      • 9.2.5.5 Establish Cyber Security Metrics and Reporting Framework
      • 9.2.5.6 Vendor Risk Management
      • 9.2.5.7 Compliance Readiness Assessment
      • 9.2.5.8 Common Control Framework
      • 9.2.5.9 Offshore Delivery Center (ODC) Compliance Assessments
      • 9.2.5.10 Maturity Assessment
      • 9.2.5.11 Information Security Management System Implementation
      • 9.2.5.12 Control Assessment
  • 9.3 Encryption
  • 9.4 Firewall
  • 9.5 Disaster Recovery
  • 9.6 Web Filtering
  • 9.7 Antivirus/Antimalware
  • 9.8 Data Loss Prevention
    • 9.8.1 Storage/ Data Center Data Loss Prevention
    • 9.8.2 Network Data Loss Prevention
    • 9.8.3 Endpoint Data Loss Prevention
  • 9.9 Distributed Denial Of Service Mitigation
  • 9.10 Intrusion Detection Systems/Intrusion Prevention Systems
    • 9.10.1 Host-based
    • 9.10.2 Wireless
    • 9.10.3 Network -based
  • 9.11 Other Solutions
    • 9.11.1 Patch Management
    • 9.11.2 Application Whitelisting

10 Global Cybersecurity Market, By Offering

  • 10.1 Introduction
  • 10.2 Security and Privacy Service
    • 10.2.1 Cloud Data Protection
    • 10.2.2 Data Masking
    • 10.2.3 Data Discovery and Classification
    • 10.2.4 Data Protection Architecture and Design
    • 10.2.5 Data Protection Current State Assessment and Remediation Strategy
  • 10.3 Unified Vulnerability Management
    • 10.3.1 Network Penetration Testing
    • 10.3.2 Security Architecture Review
    • 10.3.3 Security Testing
    • 10.3.4 Red Team Operation
    • 10.3.5 Threat Modelling and Risk Analysis
    • 10.3.6 Software Compositing Analysis
    • 10.3.7 Secure Software Development Life Cycle Implementation
    • 10.3.8 Service Oriented Architecture (SOA) Testing
    • 10.3.9 L1 - L2 - L3 Operations
    • 10.3.10 Infra Virtual Machine Tool Deployment
    • 10.3.11 Virtual Machine Process Consulting

11 Global Cybersecurity Market, By End User

  • 11.1 Introduction
  • 11.2 Government and Defense
  • 11.3 Banking, Financial Services and Insurance (BFSI)
  • 11.4 Manufacturing
  • 11.5 IT and Telecom
  • 11.6 Retail
  • 11.7 Energy and Utilities
  • 11.8 Healthcare
  • 11.9 Other End Users
    • 11.9.1 Media & Entertainment
    • 11.9.2 Transportation & Logistics
    • 11.9.3 Education

12 Global Cybersecurity Market, By Geography

  • 12.1 Introduction
  • 12.2 North America
    • 12.2.1 US
    • 12.2.2 Canada
    • 12.2.3 Mexico
  • 12.3 Europe
    • 12.3.1 Germany
    • 12.3.2 UK
    • 12.3.3 Italy
    • 12.3.4 France
    • 12.3.5 Spain
    • 12.3.6 Rest of Europe
  • 12.4 Asia Pacific
    • 12.4.1 Japan
    • 12.4.2 China
    • 12.4.3 India
    • 12.4.4 Australia
    • 12.4.5 New Zealand
    • 12.4.6 South Korea
    • 12.4.7 Rest of Asia Pacific
  • 12.5 South America
    • 12.5.1 Argentina
    • 12.5.2 Brazil
    • 12.5.3 Chile
    • 12.5.4 Rest of South America
  • 12.6 Middle East & Africa
    • 12.6.1 Saudi Arabia
    • 12.6.2 UAE
    • 12.6.3 Qatar
    • 12.6.4 South Africa
    • 12.6.5 Rest of Middle East & Africa

13 Key Developments

  • 13.1 Agreements, Partnerships, Collaborations and Joint Ventures
  • 13.2 Acquisitions & Mergers
  • 13.3 New Product Launch
  • 13.4 Expansions
  • 13.5 Other Key Strategies

14 Company Profiling

  • 14.1 Intel Corporation
  • 14.2 IBM
  • 14.3 Microsoft
  • 14.4 Google
  • 14.5 McAfee LLC
  • 14.6 Cisco
  • 14.7 Sophos Ltd
  • 14.8 Check Point Software Technologies Ltd
  • 14.9 FireEye Inc
  • 14.10 Trend Micro Incorporated
  • 14.11 Imperva
  • 14.12 Symantec Corporation
  • 14.13 Micro Focus
  • 14.14 Rapid7
株式会社グローバルインフォメーション
© Copyright 1996-2021, Global Information, Inc. All rights reserved.