• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

318
37
34
33
26

COUNTRY

22
8
8
7
4

PRICE

89
120
250
470

PUBLISHED

9
33
108
470

PRODUCT TYPE

445
11
9
3
1
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE
Cyber Security - Global Strategic Business Report Cyber Security - Global Strategic Business Report - Product Thumbnail Image

Cyber Security - Global Strategic Business Report

This report analyzes the worldwide markets for Cyber Security in US$ Million by the following Product Segments: Application Security, Content Security, Endpoint Security, Network Security, Services,...

June 2014
FROM

Global Managed Security Services Market 2014-2018

About Managed Security Services Managed security services are information and network security services that are outsourced to third-party service providers. These providers offer network boundary...

May 2014
FROM

Global Unified Threat Management Market 2014-2018

About Unified Threat Management Unified threat management is a fully integrated network security solution that provides a secure way of establishing a network connection with the host server. Unified...

May 2014
FROM

Global Port Security Management Market 2014-2018

About Port Security Management Port security refers to the physical and cyber security implemented in airport and marine port premises As airports and marine ports are the major hubs for transportation...

May 2014
FROM

Global Cyber Security Market 2014-2018

About Cyber Security Cyber threats are internet-based attempts to attack information systems and hack critical information. These threats include hacking, malware, and phishing, and have the capability...

May 2014
FROM

Physical Security Information Management (PSIM) Market in the APAC Region 2014-2018

About PSIM PSIM is a software platform that integrates multiple security systems. PSIM software collects data from multiple security systems, which it collates and analyzes. The software can be used...

May 2014
FROM

Enterprise Mobility Security – Convenient And Secure Access – Market Shares And Growth Trends To 2019

Bring Your Own Device (BYOD) has revolutionized the way corporates function but it has opened up the risk of the presence of varied devices without proper security cover accessing secure data This has...

May 2014
FROM

Global Smart Card Market in the Government Sector 2014-2018

About Smart Cards Smart cards are used across various end-user segments for a variety of applications. Smart cards are used extensively for a range of purposes, from basic identification to border...

May 2014
FROM

Global Anti-money Laundering (AML) Software Market 2014-2018

About Anti-money Laundering (AML) Software AML software is used by financial institutions to detect suspicious transactions and analyze customer data. AML software operates under various categories...

May 2014
FROM

Cloud Security Market (Cloud IAM/IDAAS, DLP, Web Security, Email Security, Cloud IDS/IPS, SIEM, Encryption Services, BCDR, Network Security, Cloud Database Security, Virtualization Security) - Global Advancements, Forecasts & Analysis (2014-2019)

Cloud Security is a strong growing market This market witnessed the growth, particularly after 2010, when the majority of organizations started adopting cloud services for cost cutting, agility and...

April 2014
FROM

World Certificates Markets - A Focus on Public Key Infrastructure (PKI)

This research service covers the global market for Digital certificates Detailed market trend analysis including drivers, and restraints are provided for each geographic region, i e North America, Latin...

April 2014
FROM

Network Security Product Evolution: Functional Consolidation

This report addresses: - How the push for standardization will affect the structure of the network security industry - Implications of standardization on the industry - Recommendations for industry...

April 2014
FROM

Global Big Data Services Market 2014-2018

About Big Data Services Big data services are a wide range of services required for processing and analyzing enterprise data, which is too large for traditional data processing tools. This data is...

April 2014
FROM

Global Intelligent Virtual Assistant Market 2014-2018

About IVAs An IVA is a customized automated digital character, such as an avatar or a 3D animated persona, which provides information and service assistance to customers. An IVA provides assistance...

April 2014
FROM

Wireless Network Security Market by Solutions and by Services - Worldwide Market Forecasts and Analysis (2014-2019)

'Wireless Network Security Market by Solutions (Firewall, IPS/IDS, Encryption, I&AM, UTM), Services (Security Operations, Consulting, Managed Security Services) - Worldwide Market Forecasts and Analysis...

April 2014
FROM

Cyber Security Market - Global Advancements, Forecasts & Analysis (2014-2019)

'Cyber Security Market (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SVM/SIEM, Disaster Recovery, DDoS Mitigation, Web Filtering, Security Services)...

April 2014
FROM

Global Email Encryption Market 2014-2018

About Email Encryption Email encryption refers to the encryption of emails as a security measure to protect the content from unauthorized access. There are different protocols for email encryption...

March 2014
FROM

Data Quality Tools Market in the APAC Region 2014-2018

About Data Quality Tools Data quality tools are used to ensure that the quality of data delivered, used, or received is fit for purpose, including core business operations, business information analytics...

March 2014
FROM

Cybersecurity Threats Require Dynamic Response Capabilities

Most people now associate cybersecurity with computer hackers, organized crime, and exposure of actions by governments tracking personal and private data Most enterprises increasingly fear the threat...

March 2014
FROM

Endpoint Security Market (Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption) - Global Advancements, Forecasts & Analysis (2014 - 2019)

'Endpoint Security Market [Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption] - Global Advancements,...

March 2014
FROM
Loading Indicator

Our Clients

Our clients' logos