• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

221
40
34
31
26

COUNTRY

25
9
8
7
4

PRICE

93
110
240
407

PUBLISHED

4
12
99
407

PRODUCT TYPE

381
12
10
3
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE

Social, Mobile, Analytics, Cloud (SMAC) and Security Software Research Digest H1 2014

The SMAC and Security Software Research Digest is a digest of all the most important research in the software industry each quarter available as an annual subscription. It covers areas such as: -...

March 2015
FROM

Global Endpoint Security Market 2015-2019

About Endpoint Security Endpoint security is a methodology that helps protect corporate networks when they are accessed remotely through laptops, tablets, and smartphones. Endpoint security solutions...

February 2015
FROM

Global Cyber Security Market in the BFSI sector 2015-2019

About Cyber Security Cyber threats are web-based threats such as data thefts and identity thefts. They disrupt IT systems in organizations and hack critical information using malware, spyware, or by...

February 2015
FROM

Cybersecurity in the US Oil and Gas Industry

In a world of advanced persistent threats, perilous infrastructure industries that are progressively expanding into the digital and smart frontiers become increasingly vulnerable. This research...

February 2015
FROM

Structuring Public-Private Partnership for Reducing Cyber Risks to Critical Infrastructure

The current model of public-private cooperation in combating cybercrime shows fragmentation and ineffectiveness. Policy frameworks and legislation in both the U.S. and the EU advocate a stronger cooperation...

February 2015

Are Digital Transactions Secure Enough?

The payment ecosystem was targeted in 2014 by many different types of attacks, including security and data breaches exploited for the purpose of collecting sensitive information. This is a global threat...

January 2015
FROM
Information Technology Bundle 2015 Information Technology Bundle 2015 - Product Thumbnail Image

Information Technology Bundle 2015

Cyber conflicts are no longer esoteric threats, posed by a few rogue “hackers”. Digital technologies and technologies rapidly become the backbone of our economies, contributing to both the strength...

January 2015

Public Safety LTE: A Global Assessment of Market Size, Technology, Vendor Trends and Spectrum Allocation 2015 - 2020

Considered as the de-facto standard for Public Safety broadband communications, LTE is rapidly gaining momentum within the Public Safety industry. As a result Public Safety agencies, vendors and service...

January 2015
FROM

Analysis of the Global Network Access Control (NAC) Market

In 2013, network access control (NAC) entered a “hot” market stage. Frost & Sullivan estimates that NAC global revenues grew 40.5% year-over-year. Continuing strong demand for NAC functionality is expected...

December 2014
FROM

Industrial Control System (ICS) Security Market by Technology, by Services, and by Verticals - Global Forecast to 2019

Industrial Control System (ICS) Security Market by Technology (DDOS, IDS/IPS, Firewall, SIEM, SCADA Encryption, UTM, Application, Whitelisting, DLP, Database Activity Monitoring), by Services, and by...

December 2014
FROM

Analysis of the Global Utilities Infrastructure Security Market 2014

"The increasing global appetite for energy is driving investment in the utilities infrastructure security market. Critical infrastructure is expensive and involves high-value construction projects....

December 2014
FROM

Global Next Generation Firewall (NGFW) Market 2015-2019

About Next Generation Firewall A NGFW is a deep packet inspection firewall that can detect and block sophisticated attacks. It is enabled by implementing security policies at the application level...

December 2014
FROM
IT Security Consulting in the US IT Security Consulting in the US - Product Thumbnail Image

IT Security Consulting in the US

IT Security Consulting As more services are conducted online and as cloud computing becomes standard for a wide array of activities, demand for the IT Security Consulting industry grows. Because...

December 2014
FROM
Strategic Focus Report - Enterprise IT Security: Technology and market trends Strategic Focus Report - Enterprise IT Security: Technology and market trends - Product Thumbnail Image

Strategic Focus Report - Enterprise IT Security: Technology and market trends

This Strategic Focus report analyses the current trends, drivers, and challenges impacting the enterprise IT Security market. The report outlines the evolution of enterprise IT security technologies,...

November 2014
FROM

Mobile Data Protection Market by Solutions & by Services - Global Forecast to 2019

Mobile Data Protection Market by Solutions (Mobile Data Protection, Data Loss Prevention, Mobile Device Management)& by Services (Implementation, Training & Support, Consulting, Managed Services) -...

November 2014
FROM

The Managed Security Services (MSS) Market in the Gulf Corporation Council (GCC) Countries

The research service discusses the managed security services (MSS) market in the Gulf Corporation Council (GCC) countries. The current market size has been discussed and forecasts have been provided...

November 2014
FROM
Cyber Security - Emerging Trends and Investment Outlook Cyber Security - Emerging Trends and Investment Outlook - Product Thumbnail Image

Cyber Security - Emerging Trends and Investment Outlook

“Cyber Security - Emerging Trends and Investment Outlook” is a new report by It that globally analyzes cyber security environment, potential sources of cyber-attacks, preferred strategies deployed to...

November 2014
FROM

Professional Security Services in North America

Professional cyber security services are value-added security advisory, implementation services, and technical services, such as assessment, benchmarking, design, planning, configuration, and incident...

November 2014
FROM

Code of Practice for Cyber Security in the Built Environment

This code of practice explains why and how cyber security should be considered throughout a building’s lifecycle and explains good practice, focusing on building-related systems and all connections...

November 2014
FROM

Global BYOD Security Market 2015-2019

About BYOD Security Enterprise mobility refers to accessing of corporate data by the employees using their personal devices. Enterprise mobility solutions serve the purpose of keeping the remotely...

November 2014
FROM
Loading Indicator

Our Clients

Visonic Group Symantec Corporation Raytheon Company EMC Corporation Nagra Kudelski Group Cisco Systems, Inc.