0 CHECKOUT
IT Security Market in China 2015-2019 - Product Image

IT Security Market in China 2015-2019

  • ID: 3175844
  • April 2015
  • Region: China
  • 98 pages
  • TechNavio
1 of 5

FEATURED COMPANIES

  • CA Technologies Inc.
  • Cisco Systems Inc.
  • Dell SonicWall
  • Emc² Corp.
  • Fortinet
  • F-Secure
  • MORE

About IT Security

IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.

The analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.

Covered in this Report
The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:

- Hardware: Integrated Firewall/VPN, UTM, Content Management, READ MORE >

Note: Product cover images may vary from those shown
2 of 5

FEATURED COMPANIES

  • CA Technologies Inc.
  • Cisco Systems Inc.
  • Dell SonicWall
  • Emc² Corp.
  • Fortinet
  • F-Secure
  • MORE

01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Types of Threat
06.1.1 Trojan
06.1.2 Virus
06.1.3 Worms
06.1.4 Adware
06.1.5 Keylogger
06.1.6 Backdoor
06.1.7 Exploit
06.1.8 Dropper
06.1.9 Phishing
06.1.10 Cookies
06.1.11 Bluesnarfing
06.1.12 Boot Sector Virus
06.1.13 Browser Hijackers
06.1.14 Mousetrapping
06.1.15 Obfuscated Spam
06.1.16 Crimeware
06.2 Components of IT Security
06.3 Advantages of IT Security
07. Market Landscape
07.1 Market Overview
07.1.1 Market Structure
07.1.2 Market Size and Forecast
07.2 China in IT Security Market in APAC Region
07.3 Five Forces Analysis
08. BYOD Implementation: Market Opportunities
09. Product Lifecycle Analysis
10. Market Segmentation by Product
10.1 Segmentation of IT Security Market in China by Product 2014
10.2 Segmentation of IT Security Market in China by Product 2014-2019
10.3 IT Security Hardware Market in China
10.3.1 Market Size and Forecast
10.3.2 Segmentation of IT Security Hardware Market in China by Product
10.3.3 Segmentation of IT Security Hardware Market in China by Product 2014-2019
10.3.4 Integrated Firewall/VPN Market in China
10.3.5 UTM Market in China
10.3.6 IPS Market in China
10.3.7 Content Management Market in China
10.3.8 VPN Market in China
10.3.9 IDS Market in China
10.4 IT Security Services Market in China
10.4.1 Market Size and Forecast
10.5 IT Security Software Market in China
10.5.1 Market Size and Forecast
11. Market Attractiveness
11.1 Market Attractiveness by Product
12. Buying Criteria
13. Market Growth Drivers
14. Drivers and their Impact
15. Market Challenges
16. Impact of Drivers and Challenges
17. Market Trends
18. Trends and their Impact
19. Vendor Landscape
19.1 Competitive Scenario
19.2 Vendor Analysis 2014
19.2.1 Vendor Comparison based on Application Offered
19.2.2 Key News
19.2.3 Mergers and Acquisitions
19.3 Other Prominent Vendors
20. Key Vendor Analysis
20.1 CA Technologies
20.1.1 Key Facts
20.1.2 Business Overview
20.1.3 Business Segmentation by Revenue 2013
20.1.4 Business Segmentation by Revenue 2012 and 2013
20.1.5 Geographical Segmentation by Revenue 2013
20.1.6 Business Strategy
20.1.7 Recent Developments
20.1.8 SWOT Analysis
20.2 Check Point Software
20.2.1 Key Facts
20.2.2 Business Overview
20.2.3 Business Strategy
20.2.4 Recent Developments
20.2.5 SWOT Analysis
20.3 Cisco Systems
20.3.1 Key Facts
20.3.2 Business Overview
20.3.3 Business Segmentation by Revenue
20.3.4 Geographical Segmentation by Revenue
20.3.5 Business Strategy
20.3.6 Key Information
20.3.7 SWOT Analysis
20.4 Emc²
20.4.1 Key Facts
20.4.2 Business Overview
20.4.3 Business Segmentation by Revenue 2013
20.4.4 Business Segmentation by Revenue 2012 and 2013
20.4.5 Geographical Segmentation by Revenue 2013
20.4.6 Business Strategy
20.4.7 Recent Developments
20.4.8 SWOT Analysis
20.5 IBM
20.5.1 Key Facts
20.5.2 Business Description
20.5.3 Business Segmentation
20.5.4 Revenue Segmentation by Business Segment
20.5.5 Revenue Segmentation by Business Operation
20.5.6 Revenue Comparison of Business Segments 2012 and 2013
20.5.7 Revenue Segmentation by Geography
20.5.8 Business Strategy
20.5.9 Key Developments
20.5.10 SWOT Analysis
20.6 Juniper Networks
20.6.1 Key Facts
20.6.2 Business Overview
20.6.3 Business Segmentation
20.6.4 Business Segmentation by Revenue 2012 and 2013
20.6.5 Sales by Geography 2013
20.6.6 Business Strategy
20.6.7 Recent Developments
20.6.8 SWOT Analysis
20.7 Symantec
20.7.1 Key Facts
20.7.2 Business Overview
20.7.3 Business Segmentation by Revenue 2013
20.7.4 Business Segmentation by Revenue 2013 and 2014
20.7.5 Geographical Segmentation by Revenue 2013
20.7.6 Business Strategy
20.7.7 Recent Developments
20.7.8 SWOT Analysis
21. Other Reports in this Series

List of Exhibits:
Exhibit 1: Market Research Methodology
Exhibit 2: Components of IT Security
Exhibit 3: Market Structure
Exhibit 4: Segmentation by Hardware
Exhibit 5: IT Security Market in China 2014-2019 (US$ billion)
Exhibit 6: China in IT Security Market in APAC Region 2014
Exhibit 7: Adoption of BYOD Across Countries
Exhibit 8: Adoption of BYOD in Enterprises across Countries (million units)
Exhibit 9: Average Number of BYOD Devices in Enterprises in China
Exhibit 10: Product Lifecycle Analysis
Exhibit 11: Segmentation of IT Security Market in China by Product 2014
Exhibit 12: Segmentation of IT Security Market in China by Product 2014-2019
Exhibit 13: IT Security Hardware Market in China 2014-2019 (US$ billion)
Exhibit 14: Segmentation of IT Security Hardware Market in China by Product 2014
Exhibit 15: Segmentation of IT Security Hardware Market in China by Product 2014-2019
Exhibit 16: Integrated Firewall/VPN Market in China 2014-2019 (US$ billion)
Exhibit 17: UTM Market in China 2014-2019 (US$ billion)
Exhibit 18: IPS Market in China 2014-2019 (US$ billion)
Exhibit 19: Content Management Market in China 2014-2019 (US$ billion)
Exhibit 20: VPN Market in China 2014-2019 (US$ billion)
Exhibit 21: IDS Market in China 2014-2019 (US$ billion)
Exhibit 22: IT Security Services Market in China 2014-2019 (US$ billion)
Exhibit 23: IT Security Software Market in China 2014-2019 (US$ billion)
Exhibit 24: Market Attractiveness by Product
Exhibit 25: Vendor Comparison based on Application Offered
Exhibit 26: CA Technologies: Business Segmentation by Revenue 2013
Exhibit 27: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 28: CA Technologies: Geographical Segmentation by Revenue 2013
Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2013
Exhibit 30: Business Segmentation of Cisco Systems by Revenue 2011-2013 (US$ billion)
Exhibit 31: Geographical Segmentation of Cisco Systems by Revenue 2013
Exhibit 32: Emc²: Business Segmentation by Revenue 2013
Exhibit 33: Emc²: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 34: EMC² : Geographical Segmentation by Revenue 2013
Exhibit 35: IBM: Business Segmentation
Exhibit 36: IBM: Revenue Segmentation by Business 2013
Exhibit 37: IBM: Revenue Segmentation 2013
Exhibit 38: IBM: Revenue Comparison of Business Segments 2012 and 2013 (US$ million)
Exhibit 39: IBM: Revenue Segmentation by Geography 2013
Exhibit 40: Juniper Networks: Business Segmentation 2013
Exhibit 41: Juniper Networks: Business Segmentation by Revenue 2012 and 2013 (US$ billion)
Exhibit 42: Juniper Networks: Sales by Geography 2013
Exhibit 43: Symantec: Business Segmentation by Revenue 2013
Exhibit 44: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
Exhibit 45: Symantec: Geographical Segmentation by Revenue 2013

Note: Product cover images may vary from those shown
3 of 5

FEATURED COMPANIES

  • CA Technologies Inc.
  • Cisco Systems Inc.
  • Dell SonicWall
  • Emc² Corp.
  • Fortinet
  • F-Secure
  • MORE

The author Announces the Publication of its Research Report – IT Security Market in China 2015-2019

The author recognizes the following companies as the key players in the IT Security Market in China 2015-2019: CA Technologies Inc., Check Point Software Technologies Ltd., Cisco Systems Inc., Emc² Corp., IBM Corp., Juniper Networks Inc. and Symantec Corp.

Other Prominent Vendors in the market are: Dell SonicWall, Fortinet, F-Secure, McAfee, Sophos, TrendMicro

Commenting on the report, an analyst from the team said: “The market is expected to witness significant growth during the forecast period, given the increased demand for cloud-based security solutions. Advances in technology have compelled vendors to offer cloud-based security solutions to increase their market share.”

According to the report, high dependence on the Internet is a major growth driver for the market. Increased usage of the Internet has exposed sensitive data, such as corporate emails and critical business information, to a number of cyber threats. Therefore, companies are adopting security products and services to protect their networks and provide employees with safe access.

Further, the report states that the high implementation costs of security products pose a challenge for the market.

The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to a SWOT analysis of the key vendors.

Note: Product cover images may vary from those shown
4 of 5

- CA Technologies Inc.
- Check Point Software Technologies Ltd.
- Cisco Systems Inc.
- Emc² Corp.
- IBM Corp.
- Juniper Networks Inc. and Symantec Corp.
- Dell SonicWall
- Fortinet
- F-Secure
- McAfee
- Sophos
- TrendMicro

Note: Product cover images may vary from those shown
5 of 5
Note: Product cover images may vary from those shown

PLEASE SELECT A FORMAT

  • Quick Help: The report will be emailed to you. The report is sent in PDF format. This is a single user license, allowing one specific user access to the product.

  • Quick Help: The report will be emailed to you. The report is sent in PDF format. This is a 1-5 user licence, allowing up to five users have access to the product.

  • Quick Help: The report will be emailed to you. The report is sent in PDF format. This is a site license, allowing all users within a given geographical location of your organisation access to the product.

  • Quick Help: The report will be emailed to you. The report is sent in PDF format. This is an enterprise license, allowing all employees within your organisation access to the product.

HAVE A QUESTION?

If you have a more general question about our products please try our

FAQ SECTION

RELATED PRODUCTS from Db

Our Clients

  • Visonic Group
  • Symantec Corporation
  • Raytheon Company
  • EMC Corporation
  • Nagra Kudelski Group
  • Cisco Systems, Inc.