The trend of BYOD adoption at workplaces to improve the productivity by allowing the employee to access corporate data via personal devices has been rising, thereby increasing the need for data security. Lack of capital resources and skilled IT staff has been diverting organizations from in-house security management. Additionally, compliance requirements for data security are stimulating the organizations to outsource the data security tasks. However, reluctance to share sensitive data and varying customer demands regarding security package are the major challenges for the market. Further, the growing awareness and concerns about data breaches would create the opportunities for MSSPs in the future.
The global managed security services market is segmented on the basis of deployment mode, organization size, application, verticals and geography. Application segment include managed IPS/IDS, Distributed Denial of Services (DDoS), Unified threat management (UTM), firewall management, and endpoint security. Deployment mode includes cloud-based and on-premise or customer-premise equipment deployment mode. The organizations are divided into small- and medium-sized businesses and large businesses. Verticals segment includes BFSI, telecom and IT, retail, healthcare, manufacturing sectors and other. Key players in MSS market include IBM, HP, Cisco Systems Inc., Dell SecureWorks, AT&T, Computer Science Corp., Symantec Corp., Fortinet Inc., Check Point Software Technologies Ltd. and BT Group.
- This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market.
- The report provides information regarding key drivers, restraints and opportunities with impact analysis.
- Porter’s five forces analysis and a SWOT analysis of the key market players are provided to illustrate the business strategies adopted by them.
- The value chain analysis of the industry provides a clear view of key intermediaries involved and elaborates their roles and value addition at every stage in the chain.
- The quantitative analysis of the market through 2013–2020 is provided to elaborate the market potential.
1.1 Report description
1.2 Key benefits
1.3 Key market segments
1.4 Research methodology
1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models
CHAPTER 2 EXECUTIVE SUMMARY
2.1 CXO perspective
2.2 Market beyond: What to expect by 2025
2.2.1 Moderate case scenario
2.2.2 Optimistic case scenario
2.2.3 Diminishing case scenario
CHAPTER 3 MARKET OVERVIEW
3.1 Market definition and scope
3.2 Key findings
3.2.1 Top impacting factors
3.2.2 Top investment pockets
3.2.3 Top winning strategies
3.3 Porter’s five forces analysis
3.3.1 Plenty of suppliers lowers the bargaining power of suppliers
3.3.2 Demand of customized solutions keeps buyers bargaining power at moderate level
3.3.3 Lack of capital and IT resources for in-house security management lowers the threat of substitute
3.3.4 Technological and policy requirement lowers the threat of new entrants
3.3.5 Presence of strong players intensifies the rivalry
3.4 Value chain analysis
3.5 Market share analysis
3.6 Market dynamics
18.104.22.168 Increasing cyber crime activities
22.214.171.124 Cost effectiviness
126.96.36.199 Stringent government regulations
188.8.131.52 Growing trend of mobile devices at workplaces
184.108.40.206 Rise in electronic data
220.127.116.11 Hesitation to share sensitive data
18.104.22.168 Demand of customized services
22.214.171.124 Growing awareness about data security
126.96.36.199 Growing importance of e-business
CHAPTER 4 GLOBAL MSS MARKET BY DEPLOYMENT MODE
4.1.1 Market size and forecast
4.2 Hosted or cloud based managed security services
4.2.1 Key market trends
4.2.2 Competitive scenario
4.2.3 Key growth factors and opportunities
4.2.4 Market size and forecast
4.3 On-premise or Customer Premise Equipment (CPE) managed security services
4.3.1 Key market trends
4.3.2 Competitive scenario
4.3.3 Key growth factors and opportunities
4.3.4 Market size and forecast
CHAPTER 5 GLOBAL MSS MARKET BY ORGANIZATION SIZE
5.1.1 Market size and forecast
5.2 Small and medium sized business
5.2.1 Key market trends
5.2.2 Competitive scenario
5.2.3 Key growth factors and opportunities
5.2.4 Market size and forecast
5.3 Large businesses
5.3.1 Key market trends
5.3.2 Competitive scenario
5.3.3 Key growth factors and opportunities
5.3.4 Market size and forecast
CHAPTER 6 GLOBAL MSS MARKET BY APPLICATION
6.1.1 Market size and forecast
6.2 Managed Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS)
6.2.1 Market size and forecast
6.3 Distributed Denial of Services (DDoS)
6.3.1 Market size and forecast
6.4 Unified Threat Management (UTM)
6.4.1 Market size and forecast
6.5 Secured Information and Event Management (SIEM)
6.5.1 Market size and forecast
6.6 Endpoint security
6.6.1 Market size and forecast
6.7 Firewall management
6.7.1 Market size and forecast
6.8.1 Market size and forecast
CHAPTER 7 GLOBAL MSS MARKET BY VERTICALS
7.1.1 Market size and forecast
7.2 Banking, Financial Services and Insurance (BFSI)
7.2.1 Market size and forecast
7.3.1 Market size and forecast
7.4.1 Market size and forecast
7.5.1 Market size and forecast
7.6 Telecom and information technology
7.6.1 Market size and forecast
7.7.1 Market size and forecast
CHAPTER 8 GLOBAL MSS MARKET BY GEOGRAPHY
8.1 North America
8.1.1 Key market trends
8.1.2 Competitive scenario
8.1.3 Key growth factors and opportunities
8.1.4 Market size and forecast
8.2.1 Key market trends
8.2.2 Competitive scenario
8.2.3 Key growth factors and opportunities
8.2.4 Market size and forecast
8.3 Asia Pacific
8.3.1 Key Market trends
8.3.2 Competitive scenario
8.3.3 Key growth factors and opportunities
8.3.4 Market size and forecast
8.4 Latin America, Middle East and Africa (LAMEA)
8.4.1 Key market trends
8.4.2 Competitive scenario
8.4.3 Key growth factors and opportunities
8.4.4 Market size and forecast
CHAPTER 9 COMPANY PROFILES
9.1 International Business Machines Corporation (IBM)
9.1.1 Company overview
9.1.2 Company Snapshot
9.1.1 Business Performance
9.1.2 Strategic Moves and Developments
9.1.3 SWOT Analysis and Strategic Conclusion of IBM Corp.
9.2 Hewlett Packard
9.2.1 Company Overview
9.2.2 Company Snapshot
9.2.3 Business performance
9.2.4 Strategic Moves and Developments
9.2.5 SWOT Analysis and Strategic Conclusion of Hewlett Packard
9.3 AT&T Inc.
9.3.1 Company overview
9.3.2 Company snapshot
9.3.3 Business performance
9.3.4 Strategic moves and developments
9.3.5 SWOT analysis and strategic conclusion of AT&T Inc.
9.4 Computer Science Corporation (CSC)
9.4.1 Company overview
9.4.2 Company snapshot
9.4.3 Business performance
9.4.4 Strategic moves and developments
9.4.5 SWOT analysis and strategic conclusion of CSC
9.5 Symantec Corporation
9.5.1 Company overview
9.5.2 Company snapshot
9.5.3 Business performance
9.5.4 Strategic moves and developments
9.5.5 SWOT analysis and strategic conclusion of Symantec Corp.
9.6 Dell SecureWorks Inc.
9.6.1 Company overview
9.6.2 Company snapshot
9.6.3 Business performance
9.6.4 Strategic moves and developments
9.6.5 SWOT analysis and strategic conclusion of Dell SecureWorks
9.7 Cisco Systems Inc.
9.7.1 Company overview
9.7.2 Company snapshot
9.7.3 Business performance
9.7.4 Strategic moves and developments
9.7.5 SWOT analysis and strategic conclusion of Cisco Systems Inc.
9.8 Fortinet Inc.
9.8.1 Company overview
9.8.2 Company snapshot
9.8.3 Business performance
9.8.4 Strategic moves and developments
9.8.5 SWOT analysis and strategic conclusion of Fortinet Inc.
9.9 Check Point Software Technologies Ltd.
9.9.1 Company overview
9.9.2 Company snapshot
9.9.3 Business performance
9.9.4 Strategic moves and developments
9.9.5 SWOT analysis and strategic conclusion of Check Point Software Technologies Ltd.
9.10 BT Group
9.10.1 Company overview
9.10.2 Company snapshot
9.10.3 Business performance
9.10.4 Strategic moves and developments
9.10.5 SWOT analysis and strategic conclusion of BT Group
List of Tables:
Table 1 Global Mss Market Revenue by Geography, 2013-2020 ($Million)
Table 2 Global Mss Market Revenue Moderate Growth Scenario, 2020 – 2025 ($Million)
Table 3 Global Mss Market Revenue Rapid Growth Scenario, 2020 – 2025 ($Million)
Table 4 Global Mss Market Revenue Diminishing Growth Scenario, 2020 – 2025 ($Million)
Table 5 Total Net Cost of Cybercrime in USA and Worldwide
Table 6 Cost Comparison of In-House Siem and MSSP Security Solutions, 2014
Table 7 Difference Between On-Premise and Cloud Based Managed Security Services
Table 8 Global Mss Market Revenue by Deployment Mode, 2013-2020 ($Million)
Table 9 Global Hosted Or Cloud Based Mss Market by Geography, 2013-2020 ($Million)
Table 10 Global On-Premise Or Customer Premise Equipment Mss Market by Geography, 2013-2020 ($Million)
Table 11 Global MSS Market by Organization Size, 2013-2020 ($Million)
Table 12 Global Small and Medium Sized Businesses Mss Market by Geography, 2013-2020 ($Million)
Table 13 Global Large Businesses Mss Market by Geography, 2013-2020 ($Million)
Table 14 Global Mss Market by Application, 2013-2020 ($Million)
Table 15 Global Managed Ips/Ids Mss Market by Geography, 2013-2020 ($Million)
Table 16 Global Ddos Mss Market by Geography, 2013-2020 ($Million)
Table 17 Global Utm Mss Market by Geography, 2013-2020 ($Million)
Table 18 Global Siem Mss Market by Geography, 2013-2020 ($Million)
Table 19 Global Endpoint Security Mss Market by Geography, 2013-2020 ($Million)
Table 20 Global Firewall Management Mss Market by Geography, 2013-2020 ($Million)
Table 21 Global Other Applications Mss Market by Geography, 2013-2020 ($Million)
Table 22 Global Mss Market by Verticals, 2013-2020 ($Million)
Table 23 Security Loss in Various Banks in India
Table 24 Global Bfsi Sector Mss Market by Geography, 2013-2020 ($Million)
Table 25 Global Healthcare Sector Mss Market by Geography, 2013-2020 ($Million)
Table 26 Global Manufacturing Sector Mss Market by Geography, 2013-2020 ($Million)
Table 27 Global Retail Sector Mss Market by Geography, 2013-2020 ($Million)
Table 28 Global Telecom and it Sector Mss Market by Geography, 2013-2020 ($Million)
Table 29 Global Other Sector Mss Market by Geography, 2013-2020 ($Million)
Table 30 Mss Market in North America, 2013-2020 ($Million)
Table 31 Mss Market in Europe, 2013-2020 ($Million)
Table 32 Mss Market in Asia Pacific, 2013-2020 ($Million)
Table 33 Mss Market in Lamea, 2013-2020 ($Million)
Table 34 IBM Corporation Snapshot
Table 35 Hewlett Packard Snapshot
Table 36 AT&T Inc. Snapshot
Table 37 CSC Snapshot
Table 38 Symantec Corp. Snapshot
Table 39 Dell Secureworks Snapshot
Table 40 Cisco Systems Inc. Snapshot
Table 41 Fortinet Inc. Snapshot
Table 42 Check Point Software Technologies Ltd. Snapshot
Table 43 BT Group Snapshot
List of Figures:
Fig. 1 Top Impacting Factors, Moderate Growth Scenario (2020-2025)
Fig. 2 Top Impacting Factors, Rapid Growth Scenario (2020-2025)
Fig. 3 Top Impacting Factors, Diminishing Growth Scenario (2020-2025)
Fig. 4 Top Factors Impacting Global Mss Market
Fig. 5 Top Investment Pockets
Fig. 6 Top Winning Strategies
Fig. 7 Porter’S Five Forces Analysis
Fig. 8 Value Chain Analysis
Fig. 9 Market Share Analysis, 2013
Fig. 10 Average Annualized Cost Due to Cybercrime by Industry Sector in Us $, 2011
Fig. 11 Malware Targeting Android in 2011 and 2012
Fig. 12 Growing E-Commerce Market
Fig. 13 Use of Cloud Computing Services Among European Enterprises, 2014
Fig. 14 Applicatioins Least Frequently Transferred From On-Premise to Cloud, 2011(% of Companies)
Fig. 15 Worldwide Smb it Spending Vs Worldwide Corporate it Spending
Fig. 16 E-Commerce Spending in 2011 Compared to 2010 in United States, $ Million
Fig. 17 Cost of Data Breach (U. S.) by Cause Over Time
Fig. 18 Revenue Generated by Ibm Corp., 2013-2011, $ Million
Fig. 19 Revenue of Ibm Corp. by Business Segment, 2013
Fig. 20 Revenue of Ibm Corp. by Geography, 2013
Fig. 21 Swot Analysis of Ibm
Fig. 22 Revenue Generated by Hewlett Packard, 2013-2011, $ Million
Fig. 23 Revenue of Hewlett Packard by Business Segment, 2013
Fig. 24 Revenue of Hewlett Packard by Geography, 2013
Fig. 25 Swot Analysis of Hewlett Packard
Fig. 26 Revenue Generated by At&T Inc., 2011-2013, $ Million
Fig. 27 Revenue of At&T Inc. by Business Segment, 2013
Fig. 28 Swot Analysis of At&T Inc.
Fig. 29 Revenue Generated by Csc, 2012-2014, $ Million
Fig. 30 Revenue of Csc by Business Segment, 2014
Fig. 31 Revenue of Csc by Geography, 2014
Fig. 32 Swot Analysis of Csc
Fig. 33 Revenue Generated by Symantec Corp., 2012-2014, $ Million
Fig. 34 Revenue of Symantec Corp. by Business Segment, 2014
Fig. 35 Revenue of Symantec Corp. by Geography, 2014
Fig. 36 Swot Analysis of Symantec Corp.
Fig. 37 Revenue Generated by Dell Secureworks, 2011-2013, $ Million
Fig. 38 Revenue of Dell Secureworks by Business Segment, 2013
Fig. 39 Revenue of Dell Secureworks by Geography, 2013
Fig. 40 Swot Analysis of Dell Secureworks
Fig. 41 Revenue Generated by Cisco Systems Inc., 2011-2013, $ Million
Fig. 42 Revenue of Cisco Systems Inc. by Business Segment, 2013
Fig. 43 Revenue of Cisco Systems Inc. by Geography, 2013
Fig. 44 Swot Analysis of Cisco Systems Inc.
Fig. 45 Revenue Generated by Fortinet Inc., 2011-2013, $ Million
Fig. 46 Revenue of Fortinet Inc. by Business Segment, 2013
Fig. 47 Revenue of Fortinet Inc. by Geography, 2013
Fig. 48 Swot Analysis of Fortinet Inc.
Fig. 49 Revenue Generated by Check Point Software Technologies Ltd., 2011-2013, $ Million
Fig. 50 Revenue of Check Point Software Technologies Ltd. by Business Segment, 2013
Fig. 51 Swot Analysis of Check Point Software Technologies Ltd.
Fig. 52 Revenue Generated by BT Group, 2011-2013, $ Million
Fig. 53 Revenue of BT Group by Business Segment, 2013
Fig. 54 Swot Analysis of BT Group
Executives consider incidents of data thefts and cybercrimes as the greatest threats to their organization's reputation. Lack of capital and skilled IT resources needed to manage the data security are the major hindrances in protecting the information. Managed security services have emerged as lucrative option for delivering security asset monitoring and management, threat intelligence research, detection and remediation, and risk and compliance management solutions on shared basis to multiple clients. The cost-effectiveness and effective data security have been gaining traction for the managed security market.Among various data security applications, endpoint security application would grow at the fastest rate, with growing adoption of BYOD policy at workplace. Improvement in production efficiency and enhanced employee satisfaction through utilization of mobile devices for accessing corporate data anytime and anywhere would contribute the growth of BYOD trend. Secured Information and Event Management (SIEM), an emerging technology solution suitable for automatic collection, correlation and analysis of log and alert data, would be the next popular application.
Growing regulatory compliances regarding protection of citizen's information globally, would stimulate the organizations to maintain the high data-security level. Banking, Financial Services and Insurance (BFSI) and telecom and IT sectors would be frontrunners in employing managed security services. Hospitals and physician clinics are also outsourcing security tasks with growing trend of electronic health records for improving patient safety, productivity and save costs. Rising threats to intellectual property would demand the enhanced security infrastructure in manufacturing industry with time.
North American region currently leading the market as the region has stringent regulations regarding information security. Though, North American and European regions are the mature markets, they would continue to maintain their leading position during the forecast period. Asia-Pacific and Middle East markets are gaining momentum with the formation of regulations regarding the data security. Big data analytics would be the critical for market growth across the world.
Key findings of the study:
- The global market for managed security services would grow due to growing complex cyber threats and cloud computing during the forecast period (2014-2020).
- Endpoint security application market would grow at the fastest CAGR of 24.5% during 2014-2020.
- Banking, Financial Services and Insurance (BFSI) sector would continue to maintain its leading position through 2020.
- Cloud-based managed security services deployment model would overtake on-premise deployment model by 2016.
- Asia-Pacific region would emerge as one of the most lucrative markets, in terms of growth.
Leading Managed Security Services Providers (MSSP) including IBM, Dell SecureWorks, HP and Cisco launching advanced and customized security solutions to help the clients in facing sophisticated attacks from organized cyber criminals. Recently, IBM and AT&T have introduced new service including security network infrastructure with advanced threat monitoring and analytics. Delivery of customized solutions as per the organization size and structure would be the crucial factor driving the market.
- Hewlett Packard
- AT&T Inc.
- Computer Science Corporation (CSC)
- Symantec Corporation
- Dell SecureWorks Inc
- Cisco Systems Inc.
- Fortinet Inc.
- Check Point Software Technologies Ltd.
- BT Group