0 CHECKOUT

PRODUCT FILTERS

REGION

204
45
35
34
29

COUNTRY

26
9
8
8
5

PRICE

100
117
183
388

PUBLISHED

1
21
90
388

PRODUCT TYPE

367
9
8
2
1
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

388 Products

Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics), Service (Managed, Professional), Deployment, Organization Size, Vertical, Region - Global Forecast to 2020

In today’s cyber security landscape, it is very difficult to protect enterprise networks against advanced threats by employing traditional security measures. To combat these sophisticated threats, organizations...

Published:  July 2015
Price:  From

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution (IAM, Risk and Compliance Management, IDS/IPS, Encryption, Antivirus and Antimalware, Firewall, DLP, UTM, Security and Vulnerability management, Disaster Recovery...

Published:  June 2015
Price:  From

Physical Identity & Access Management Market by Software, Services, Vertical (BFSI, Airport, IT & Telecom, Utilities, Education, Defense & Security, Chemical/Pharma), & Geography - Global Forecast to 2019

The global physical identity & access management market is estimated to grow at a CAGR of 14.9% from 2014 to 2019. Physical identity & access management (PIAM) system is deployed in an organization...

Published:  August 2015
Price:  From

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

Published:  March 2015
Price:  From

Managed Mobility Services Market by Solution - Global Forecast to 2019

Managed Mobility Services Market by Solution (Sourcing & Logistics Management, Mobile Service Management, Security & Content Management, Device & Systems Management, Application & Collaboration Management,...

Published:  April 2015
Price:  From

Mobile Security Market by Solution & by Service - Global Forecast to 2019

Mobile Security Market by Solution (Mobile Identity Management, Mobile Data Protection, Mobile Device Management, Mobile VPN, MAM) & by Service (Implementation, Training & Support, Consulting, and Managed...

Published:  February 2015
Price:  From

Managed Security Services Market by Services, by Deployment Type, & by Organization Size - Global Forecast (2014 - 2019)

Managed Security Services Market by Services (Managed IDS/IPS, DDOS Protection, Managed SWG, SIEM, MICS, Log Management & Analytics), by Deployment Type (Hosted, On-Premise), & by Organization Size...

Published:  October 2014
Price:  From

BFSI Security Market by Physical Security, & by Cyber Security – Worldwide Forecasts & Analysis (2014 - 2019)

BFSI Security Market by Physical Security (Video Surveillance, Access Control, Intrusion Detection, PSIM), & by Cyber Security (IAM, Encryption, DLP, IDS/IPS, UTM, SVM/SIEM, Antivirus/Antimalware) –...

Published:  September 2014
Price:  From

Global Internet Security Market (Products & Services, Technology, Application and Geography) - Size, Share, Global Trends, Company Profiles, Analysis, Segmentation and Forecast, 2013 - 2020

The internet, in its essence has come a long way and has been constantly evolving in its approach to the consumers. The world, today, is inevitably attached to the internet with online networking. Organizations...

Published:  November 2014
Price:  From

Global IT Security Spending Market 2015-2019

About IT Security IT security is used to protect data and information of single-user or multi-user networks. It protects data and information from unauthorized access and modification. IT security refers...

Published:  July 2015
Price:  From

Cyber Security Market in North America 2015-2019

About Cyber Security Cyber security solutions help organizations monitor, detect, report, and counter cyber threats to maintain the confidentiality of IT systems. Internet penetration in emerging countries...

Published:  June 2015
Price:  From

Global Wireless Video Surveillance Market 2015-2019

About Wireless Video Surveillance Video surveillance is the process of monitoring or observing the activities, behavior, or movements of individuals or groups, for enhanced security. It is used by...

Published:  July 2015
Price:  From

Global Fraud Analytics Market 2015-5019

About Fraud Analytics Fraud can be defined as an illegal activity that is intentional and uses misrepresentation to produce a financial gain to an individual or an organization. Fraud is on the rise...

Published:  June 2015
Price:  From

Global Industrial Cyber Security Market 2015-2019

About Industrial Cyber Security Cyber threats are internet-based attempts that disrupt or damage IT systems and hack critical information using spyware, malware, and phishing. The major attacks seen...

Published:  June 2015
Price:  From

Mobile Security Market in Latin America 2015-2019

About Mobile Security The protection of smartphones, tablets, laptops, and the networks they connect to from threats and vulnerabilities associated with wireless computing is known as mobile security....

Published:  June 2015
Price:  From

Global Content Security Gateway Market 2015-2019

About Content Security Gateway Content security gateway prevents unwanted network traffic before it enters an organization's network and prevents unauthorised personnel from gaining access. They provide...

Published:  July 2015
Price:  From

Global Consumer Motion Sensor Market 2015-2019

About Consumer Motion Sensors Motion sensors are devices that detect any 3-dimensional motion. Micro-electro-mechanical-systems (MEMS), also called micromachines or micro systems technology, are miniaturized...

Published:  July 2015
Price:  From

Global Information Security Products and Services Market 2015-2019

About Information Security Products and Services Information security products and services include security software, hardware, and services that focus on the key parameters such as data protection,...

Published:  March 2015
Price:  From

IT Security Market in China 2015-2019

About IT Security IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken...

Published:  April 2015
Price:  From

Global Enterprise IT Security Market 2015-2019

Enterprise IT security focuses on the security of key parameters such as data protection, compliance, architecture, email and web security, governance, data loss prevention, and identity and access....

Published:  May 2015
Price:  From
Loading Indicator

Our Clients