• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

291
36
32
32
24

COUNTRY

22
7
7
7
4

PRICE

88
111
243
442

PUBLISHED

9
22
97
442

PRODUCT TYPE

417
11
9
3
1
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE
India Managed Security Services Market Forecast and Opportunities, 2019 India Managed Security Services Market Forecast and Opportunities, 2019 - Product Thumbnail Image

India Managed Security Services Market Forecast and Opportunities, 2019

Managed security services offer a comprehensive solution for round-the-clock management and monitoring of data warehouses. Over the last decade, industrial as well as government-owned sectors across...

August 2014
FROM

Preparing for 2015: The Year of the Liability Shift

Credit card issuers are gearing up for a fourth quarter that will likely mark the kickoff of widespread EMV issuance. Card manufacturers are adding capacity to meet demand, and all sources indicate...

August 2014

IP Networking for Security

IP Networking can be complex and confusing. The use of acronyms and an ever-changing landscape certainly does not make it any easier to learn and understand. In this course, we start with the very basics...

August 2014
FROM
CloudWeaver Brings Visibility and Control to Public Cloud Infrastructure CloudWeaver Brings Visibility and Control to Public Cloud Infrastructure - Product Thumbnail Image

CloudWeaver Brings Visibility and Control to Public Cloud Infrastructure

A software platform from CloudWeaver—formerly Lyatiss, the French-based cloud monitoring and optimization company—is enhancing public cloud functionality, making it more intuitive, resilient, and ...

August 2014
FROM

Mobile Security in Enterprise: Solutions and Companies 2014

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits...

August 2014
FROM

Machine-to-Machine (M2M) Security and Privacy: Challenges and Opportunities

Machine-to-Machine (M2M) applications will be developed in various sectors of the industry at a rapid pace over the next five years, reaching an inflexion point by 2020 as the Internet of Things (IoT)...

August 2014
FROM

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive,...

August 2014
FROM

Global Messaging Security Gateway Market 2014-2018

About Messaging Security Gateways A messaging security gateway is a security solution that protects an organization’s messaging infrastructure. It has the ability to filter internet messaging services...

July 2014
FROM

Global Network Security Market 2014-2018

About Network Security Network security consists of products and services used to monitor, detect, and prevent unauthorized access, misuse, malfunctioning, and destruction of a computer network. It...

July 2014
FROM

Analysis of the EMEA Managed Security Services Market

The managed security services (MSS) market continues to grow at double-digit rates in Europe, the Middle East, and Africa (EMEA). Threat intelligence, incident remediation, and advanced MSS will be...

July 2014
FROM

Analysis of the North American Managed Security Services Market

This report provides an analysis of the market for the North American managed security services market These network security services include some degree of proactive monitoring of the customer's security...

July 2014
FROM

High Security Risk Technologies Impacting IT Decision Makers - United States and Europe

The overall research objective of this research was to measure the current use and future decision-making behavior toward information technology (IT), specifically network security technologies Cloud...

July 2014
FROM

Biometrics Market in Europe 2014-2018

About Biometrics Biometrics is a technology which helps to assess individuals on the basis of their physical or behavioral patterns. It involves the verification and identification of both physiological...

July 2014
FROM

Biometrics Market in Latin America 2014-2018

About Biometrics Biometrics measure and analyze biological data. These systems capture biological traits such as fingerprints, facial patterns, irises, eye retinas, voice patterns, and hand measurements...

July 2014
FROM

Global IT Security Solutions Market in the Transportation Industry 2014-2018

About IT Security Solutions in the Transportation Industry Transportation security refers to the physical and cyber securities implemented in mass transit locations such as railway stations, bus stations,...

July 2014
FROM

Cyber Security Market in the US Government Sector 2014-2018

About Cyber Security Cyber threats are internet-based attempts to attack information systems and hack critical information. These threats include hacking, malware, and phishing, and have the capability...

July 2014
FROM

Middle East Cyber Security Market by Technologies & by Services - Market Forecasts and Analysis (2014-2019

Middle East Cyber Security Market by Technologies (IAM, DLP, UTM, IDS/IPS, Firewall, Risk & Compliance Management, Antivirus, SVM/SIEM, Disaster Recovery, DDOS Mitigation, Encryption, Web Filtering)...

July 2014
FROM
IT Security Market Report Plus 2014 IT Security Market Report Plus 2014 - Product Thumbnail Image

IT Security Market Report Plus 2014

This market report analyses the UK market for IT security services and products The market is estimated to have grown by 8% year-on-year in 2013, following previous annual trends of high growth due...

July 2014

Global Hardware One Time Password (OTP) Token Authentication Market 2014-2018

About Hardware One-time Password Token Authentication Hardware OTP authentication is a two-factor authentication solution that enables secure remote network access and digital signature functionality...

June 2014
FROM

Mobile and Wearable Biometric Authentication Market Forecast Report 2015 - 2019

Mobile and Wearable Biometric Authentication Market Analysis and Forecasts (2014-2019) is a market analyst report that provides detailed analysis of the market for mobile and wearable biometrics for...

June 2014
Loading Indicator

Our Clients

Our clients' logos