• +353-1-415-1241(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

280
36
33
32
21

COUNTRY

20
7
7
6
4

PRICE

88
107
233
415

PUBLISHED

5
23
97
415

PRODUCT TYPE

389
11
7
3
3
1
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE
IT/Network Security: Media Monitor IT/Network Security: Media Monitor - Product Thumbnail Image

IT/Network Security: Media Monitor

About the service: When IT security news breaks, we get it fast - so you can deliver fresh business intelligence - Search 33,500 news sources - Plus, search 508,000 social media sources - Covers 200...

April 2014
FROM

Global Email Encryption Market 2014-2018

About Email Encryption Email encryption refers to the encryption of emails as a security measure to protect the content from unauthorized access. There are different protocols for email encryption...

March 2014
FROM

Data Quality Tools Market in the APAC Region 2014-2018

About Data Quality Tools Data quality tools are used to ensure that the quality of data delivered, used, or received is fit for purpose, including core business operations, business information analytics...

March 2014
FROM

Endpoint Security Market (Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption) - Global Advancements, Forecasts & Analysis (2014 - 2019)

'Endpoint Security Market [Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption] - Global Advancements,...

March 2014
FROM

Cybersecurity Threats Require Dynamic Response Capabilities

Most people now associate cybersecurity with computer hackers, organized crime, and exposure of actions by governments tracking personal and private data Most enterprises increasingly fear the threat...

March 2014
FROM

Asia-Pacific Advanced Persistent Threat (APT) Solution Market

The advanced persistent threat (APT) solution market in Asia-Pacific region is still at a nascent stage in 2013 As such, the market is estimated to be relatively small at present This is despite the...

March 2014
FROM

Global NoSQL Market 2014-2018

The analysts forecast the Global NoSQL market will grow at a CAGR of 53 09 percent over the period 2013-2018 One of the key factors contributing to this market growth is the increased adoption of big...

March 2014
FROM

Card Fraud Detection Software: Enterprise and Transaction Solutions Converge

Recent data breaches at major US retailers have reinvigorated the discussion of how the payments industry can improve the way stakeholders protect card data Issuers are completely rethinking how they...

March 2014

Physical and Virtual Server Security Policy

The Physical and Virtual Server Security Policy is provided in MS WORD and PDF formats The policy is IS0, Cobit, Sarbanes Oxley, PCI-DSS, and HIPAA compliant This policy is also included in the CIO...

March 2014
FROM

The Euromoney Financial Crime & Cyber Security Handbook 2014/15

The FT published a piece in June 2013 saying that the Bank of England's twice-yearly systemic risk poll, released in June 2013, found that more respondents, mostly risk managers in financial businesses,...

March 2014

Global Wireless LAN Security Market 2014-2018

The analysts forecast the Global Wireless LAN Security market to grow at a CAGR of 22.47 percent over the period 2013-2018. One of the key factors contributing to this market growth is the increasing...

February 2014
FROM

Global Security Analytics Market 2014-2018

The analysts forecast the Global Security Analytics market to grow at a CAGR of 10.61 percent over the period 2013-2018. One of the key factors contributing to this market growth is the need to improve...

February 2014
FROM

Global Content Security Gateway Market 2014-2018

The analysts forecast the Global Content Security Gateway market to grow at a CAGR of 4 3 percent over the period 2013-2018 One of the key factors contributing to this market growth is the increasing...

February 2014
FROM
Market Opportunity Forecasts to 2018: Enterprise IT Security Software Market Opportunity Forecasts to 2018: Enterprise IT Security Software - Product Thumbnail Image

Market Opportunity Forecasts to 2018: Enterprise IT Security Software

The report outlines the primary findings from our ongoing research into the dynamics in the Enterprise IT Security Software market This product provides revenue opportunity forecast in the Enterprise...

February 2014

Global Gesture Recognition Market 2014-2018

The analysts forecast the Global Gesture Recognition market to grow at a CAGR of 29.2 percent over the period 2013-2018. One of the key factors contributing to this market growth is the cost-effectiveness...

February 2014
FROM

Video Surveillance Market in the EMEA Region 2014-2018

The analysts forecast the Video Surveillance market in the EMEA region to grow at a CAGR of 13.7 percent over the period 2013-2018. One of the key factors contributing to this market growth is the increasing...

February 2014
FROM

IT Security Market in Japan 2014-2018

The analysts forecast the IT Security market in Japan to grow at a CAGR of 5 1 percent over the period 2013-2018 One of the key factors contributing to this market growth is the need to improve the...

February 2014
FROM

Biometrics in Cellphones

Voice and fingerprint authentication solutions-enabled mobilephones are growing in popularity as the world shifts from a contact-based financial transactions to smartphones fitted with biometrics integrated...

February 2014
FROM

A New Age for the Global Biometrics Market

This market insight provides an overview of how the biometrics market landscape is evolving, shifting from traditional applications to emerging ones The central focus examines biometrics mobility, specifically...

February 2014
FROM

Cyber Security Market in South Korea 2014-2018

The analysts forecast the Cyber Security market in South Korea to grow at a CAGR of 21 24 percent over the period 2013-2018 One of the key factors contributing to this market growth is the need to improve...

February 2014
FROM
Loading Indicator

Our Clients

Our clients' logos