• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

300
36
33
32
24

COUNTRY

22
7
7
7
4

PRICE

88
116
246
453

PUBLISHED

10
31
106
453

PRODUCT TYPE

427
11
9
3
1
1
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE

The Global Cybersecurity Market 2014-2024

The Global Cybersecurity Market 2014-2024 report provides readers with a detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry...

September 2014
FROM

Turning the Tables on Cyber Threats

The bad guys are getting better quicker than the good guys are improving, despite the good guys’ proclivity to spend to keep the bad guys out. This situation prompts Stratecast to question whether security...

September 2014
FROM

Analysis of the Global SSL Certification Market

SSL certificates are an encryption technology used to secure communications between end users and Web sites. Certificate Authorities (CAs) also provide scan and inventory tools to help customers manage...

September 2014
FROM

Intrusion Detection Market in Southeast Asia 2014-2018

About Intrusion Detection System Intrusion detection system monitors the malicious intrusions at various levels in an enterprise. The system gathers information, analyses for malicious activities,...

September 2014
FROM

Global DDoS Prevention Market 2014-2018

About DDoS Prevention A DDoS attack is a malicious attempt to disrupt the normal functioning of a network resource by making it unavailable to its intended users. A DDoS attack is significantly different...

September 2014
FROM

BFSI Security Market by Physical Security, & by Cyber Security – Worldwide Forecasts & Analysis (2014 - 2019)

BFSI Security Market by Physical Security (Video Surveillance, Access Control, Intrusion Detection, PSIM), & by Cyber Security (IAM, Encryption, DLP, IDS/IPS, UTM, SVM/SIEM, Antivirus/Antimalware) –...

September 2014
FROM

Analysis of the Endpoint Security Market

The efficacy of traditional antivirus-based endpoint protection is beginning to be challenged. While it is true that the role of traditional protection has changed with today's cyber reality offering...

September 2014
FROM

Global SaaS Security Market 2014-2018

About SaaS Security SaaS security is a type of IT security deployment that makes use of cloud computing technology. SaaS security services involve a range of applications provided by the service provider...

September 2014
FROM

Social, Mobile, Analytics, Cloud (SMAC) and Security Software Research Digest H1 2014

The SMAC and Security Software Research Digest is a digest of all the most important research in the software industry each quarter available as an annual subscription. It covers areas such as: -...

September 2014
FROM

The Forgotten Barometer: Bot Detection as an Integral Security Technology

The model for threat detection is continually evolving in response to changing tactics utilized by malicious actors. Network-based threats are increasingly deceptive and dubious in nature;and, as a...

August 2014
FROM
India Managed Security Services Market Forecast and Opportunities, 2019 India Managed Security Services Market Forecast and Opportunities, 2019 - Product Thumbnail Image

India Managed Security Services Market Forecast and Opportunities, 2019

Managed security services offer a comprehensive solution for round-the-clock management and monitoring of data warehouses. Over the last decade, industrial as well as government-owned sectors across...

August 2014
FROM

Security Testing Market by Network Security Testing, Application Security Testing, SAST, DAST, Security Testing Tools, Penetration Testing Tools, Automated Testing Tools, Code Review Tools - Global Advancements, Forecasts & Analysis (2014 - 2019)

Security Testing Market by Network Security Testing, Application Security Testing, SAST, DAST, Security Testing Tools, Penetration Testing Tools, Automated Testing Tools, Code Review Tools - Global...

August 2014
FROM

Preparing for 2015: The Year of the Liability Shift

Credit card issuers are gearing up for a fourth quarter that will likely mark the kickoff of widespread EMV issuance. Card manufacturers are adding capacity to meet demand, and all sources indicate...

August 2014

IP Networking for Security

IP Networking can be complex and confusing. The use of acronyms and an ever-changing landscape certainly does not make it any easier to learn and understand. In this course, we start with the very basics...

August 2014
FROM
CloudWeaver Brings Visibility and Control to Public Cloud Infrastructure CloudWeaver Brings Visibility and Control to Public Cloud Infrastructure - Product Thumbnail Image

CloudWeaver Brings Visibility and Control to Public Cloud Infrastructure

A software platform from CloudWeaver—formerly Lyatiss, the French-based cloud monitoring and optimization company—is enhancing public cloud functionality, making it more intuitive, resilient, and ...

August 2014
FROM

Mobile Security in Enterprise: Solutions and Companies 2014

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits...

August 2014
FROM

Machine-to-Machine (M2M) Security and Privacy: Challenges and Opportunities

Machine-to-Machine (M2M) applications will be developed in various sectors of the industry at a rapid pace over the next five years, reaching an inflexion point by 2020 as the Internet of Things (IoT)...

August 2014
FROM

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive,...

August 2014
FROM

Global Messaging Security Gateway Market 2014-2018

About Messaging Security Gateways A messaging security gateway is a security solution that protects an organization’s messaging infrastructure. It has the ability to filter internet messaging services...

July 2014
FROM

Global Network Security Market 2014-2018

About Network Security Network security consists of products and services used to monitor, detect, and prevent unauthorized access, misuse, malfunctioning, and destruction of a computer network. It...

July 2014
FROM
Loading Indicator

Our Clients

Our clients' logos