• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

227
41
34
32
27

COUNTRY

26
9
8
7
4

PRICE

91
112
183
417

PUBLISHED

3
16
98
417

PRODUCT TYPE

392
12
10
3

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE

SIEM and Log Management Global Market Analysis

Security information event management (SIEM) and log management (LM) products have been used traditionally by organizations for compliance reporting and auditing. SIEM/LM are integral to advanced persistent...

April 2015
FROM
Total Addressable Market for IT Security Solutions: 2012-2017 Total Addressable Market for IT Security Solutions: 2012-2017 - Product Thumbnail Image

Total Addressable Market for IT Security Solutions: 2012-2017

This data-rich report provides a detailed forecast for the total addressable market for Global IT Security. It includes 3 different segments: content security, network security and application delivery....

April 2015

Data Center Security Market by Solution, by Services, by Data Center Types and by Region - Global Forecast to 2020

Data Center Security Market by Solution (Logical Security, Physical Security), by Services (Consulting Services, Managed Services and Professional Services ), by Data Center Types (Mid-Size, Enterprise...

April 2015
FROM

Global Information Security Products and Services Market 2015-2019

About Information Security Products and Services Information security products and services include security software, hardware, and services that focus on the key parameters such as data protection,...

March 2015
FROM

Security Competitive Profiles - Finmeccanica

This report anticipates that Finmeccanica will continue to enhance its security portfolio, focusing on the development of its communications and cybersecurity product lines. Divestment of noncore businesses,...

March 2015
FROM

Cyber Security Market in the APAC Region 2015-2019

About Cyber Security Cyber threats are internet-based attempts that disrupt or damage IT systems and hack critical information using spyware, malware, and phishing. Cyber security solutions help organizations...

March 2015
FROM

Cloud Security Market in the UAE 2015-2019

About Cloud Security Cloud security offers security to cloud-based services and cloud computing architectures. Cloud security can be standalone solutions or a suite of products. It deals with key parameters...

March 2015
FROM

Security Competitive Profiles - NEC

NEC will continue to supply a range of IT security management and biometric solutions to the market, with a company focus on the development of a Big Data and cloud services solution anticipated. Winning...

March 2015
FROM

Security Competitive Profiles - Northrop Grumman

Northrop Grumman is expected to continue enhancing its security-centric portfolio, focusing on the development of cybersecurity and communications solutions. The company works closely with national...

March 2015
FROM

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

March 2015
FROM

Social, Mobile, Analytics, Cloud (SMAC) and Security Software Research Digest H1 2014

The SMAC and Security Software Research Digest is a digest of all the most important research in the software industry each quarter available as an annual subscription. It covers areas such as: -...

March 2015
FROM

Global Endpoint Security Market 2015-2019

About Endpoint Security Endpoint security is a methodology that helps protect corporate networks when they are accessed remotely through laptops, tablets, and smartphones. Endpoint security solutions...

February 2015
FROM

Cybersecurity in the US Oil and Gas Industry

In a world of advanced persistent threats, perilous infrastructure industries that are progressively expanding into the digital and smart frontiers become increasingly vulnerable. This research...

February 2015
FROM

Global Cyber Security Market in the BFSI sector 2015-2019

About Cyber Security Cyber threats are web-based threats such as data thefts and identity thefts. They disrupt IT systems in organizations and hack critical information using malware, spyware, or by...

February 2015
FROM

Data Center Logical Security Market by Solutions Types, by Services Type, by Data Center Type, by Vertical, and by Regions - Forecasts and Analysis 2014-2019

Data Center Logical Security Market by Solutions Types (Threat and Application Security Solutions, Access Control and Compliance, Data Protection Solutions), by Services Type, by Data Center Type, by...

February 2015
FROM

Structuring Public-Private Partnership for Reducing Cyber Risks to Critical Infrastructure

The current model of public-private cooperation in combating cybercrime shows fragmentation and ineffectiveness. Policy frameworks and legislation in both the U.S. and the EU advocate a stronger cooperation...

February 2015

Are Digital Transactions Secure Enough?

The payment ecosystem was targeted in 2014 by many different types of attacks, including security and data breaches exploited for the purpose of collecting sensitive information. This is a global threat...

January 2015
FROM
Information Technology Bundle 2015 Information Technology Bundle 2015 - Product Thumbnail Image

Information Technology Bundle 2015

Cyber conflicts are no longer esoteric threats, posed by a few rogue “hackers”. Digital technologies and technologies rapidly become the backbone of our economies, contributing to both the strength...

January 2015

Public Safety LTE: A Global Assessment of Market Size, Technology, Vendor Trends and Spectrum Allocation 2015 - 2020

Considered as the de-facto standard for Public Safety broadband communications, LTE is rapidly gaining momentum within the Public Safety industry. As a result Public Safety agencies, vendors and service...

January 2015
FROM

Analysis of the Global Network Access Control (NAC) Market

In 2013, network access control (NAC) entered a “hot” market stage. Frost & Sullivan estimates that NAC global revenues grew 40.5% year-over-year. Continuing strong demand for NAC functionality is expected...

December 2014
FROM
Loading Indicator

Our Clients

Visonic Group Symantec Corporation Raytheon Company EMC Corporation Nagra Kudelski Group Cisco Systems, Inc.