• +353-1-415-1241(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)
Information Security Products And Services - Global Strategic Business Report Product Image

Information Security Products And Services - Global Strategic Business Report

  • Published: October 2012
  • Region: Global
  • 2008 Pages
  • Global Industry Analysts, Inc

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware, and Information Security Services. The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software. The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances.

The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management Services, Education READ MORE >

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS
Study Reliability and Reporting Limitations I-1
Disclaimers I-2
Data Interpretation & Reporting Level I-2
Quantitative Techniques & Analytics I-3
Product Definitions and Scope of Study I-3
Information Security Software I-4
Identity & Access Management (I&AM) I-5
Public Key Infrastructure (PKI) I-5
Web Single Sign-On I-5
Host Single Sign-On I-5
User Provisioning I-5
Directory Services I-5
Legacy Authorization I-6
Advanced Authentication I-6
Secure Content Management (SCM) I-6
Antivirus Software I-6
Web/Content Filtering I-6
Messaging Security (E-mail Scanning) I-6
Intrusion Detection/Prevention (IDP) I-6
Security & Vulnerability Management I-7
Firewall/VPN Software I-7
Other Security Software I-7
Information Security Hardware I-7
Hardware Authentication I-7
Tokens I-7
Smart Cards I-8
Biometrics I-8
Threat Management Security Appliances I-8
Firewall/VPN Appliances I-8
SCM Appliances I-8
Intrusion Detection/Prevention Appliances I-8
Unified Threat Management (UTM) Appliances I-8
Information Security Services I-9
Consulting Services I-9
Education and Training Services I-9
Implementation Services I-9
Management Services I-9
Response Services I-9

II. Executive Summary

1. INDUSTRY OVERVIEW II-1
Corporate Information Assets - Vulnerable as Ever II-1
Growing Instances of IT Security Breaches - A Serious Cause
for Concern II-2
Types of Internal IT Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-3
Types of External Security Breaches in Organizations - Ranked
in the Order of Frequency of Occurrence II-3
A Look at Common Security Threats for Enterprise Information
Assets II-3
Damages Caused by Security Breaches II-4
Proprietary Information Destruction II-4
Disruption in Systems Performance II-4
Data/Application Damage or Corruption II-5
Information Security - High on Priority List for Enterprises II-5
Factors Affecting Implementation of Information Security
Solutions by Enterprises Worldwide - Ranked in Order of
Influence II-6
Network Security - Keeping Security Threats at Bay II-6
Enterprise Endpoint Security Grows in Prominence II-7
General Trends Underpinning the Endpoint Security Solutions
Market II-7
Server Security Concerns Driving Demand for Server Security
Solutions II-8
Impact of Recession in Retrospect II-9
Outlook II-10
Emerging Markets - Hotspots for Growth II-10
Growing Use of Technology Brings Security Concerns for
Enterprises, Opportunities for Information Security Vendors II-10
Growing Use of Internet as a Business Platform Demands Robust
Information Security Solutions II-10
Threat from Social Networking Sites to Drive Demand for
Information Security Solutions II-11
Security Risks Posed by Virtualization & Cloud Computing to
Fuel Security Solutions Market II-11
Growing Use of Smartphones Boosts Demand for Smartphone
Security Solutions Market II-13
Smartphone Convenience at the Cost of Information Security II-13
Table 1: Worldwide Worker Population (2008 & 2011):
Breakdown of Number of Workers (in Millions) by Nature of
Work - Mobile & Non Mobile (includes corresponding
Graph/Chart) II-14

Table 2: Worldwide Mobile Worker Population (2008 & 2011):
Breakdown of Number of Mobile Workers (in Millions) by
Nature of Work - Mobile Office, Mobile Non-Office, Mobile
Home Based (includes corresponding Graph/Chart) II-14

Table 3: Worldwide Mobile Workforce (2011): Percentage
Share Breakdown of Number of Mobile Workers by Region
(includes corresponding Graph/Chart) II-14
Enabling Smartphone Security - An Urgent Need II-15
Industry Still Underprepared to Tackle Security Concerns II-15
Smartphone Security Solutions II-15
Regulatory Compliance Requirements Drives Demand for
Information Security Solutions II-16
Dearth of Trained Staff and Infrastructure to Drive Demand for
Information Security II-16
IP4 to IPv6 to Boost Adoption of Cyber Security Solutions and
Services II-16
Growth in Sophisticated & Compound Security Threats to Drive
Demand for Enhanced Security Solutions II-17
Rapid Expansion in Security Technologies II-18
Hosted Security Services: Growing in Demand II-18
Increased use of Open Source Tools II-19
Growing Significance of Application-Level Security II-19
VoIP Security for Expanding VoIP II-19
Security for Converged Data and Voice Environments II-19
Growing Commoditization of Security Products II-20
Financial Services - A Key End Use Market for Information
Security Solutions II-20
Information Security in Financial Services Sector II-20
Industry Wise Implementation of Information Security Policy -
Industries Ranked by Level of Implementation II-20
Major External & Internal Breaches in Financial Services Sector II-21
Top Security Initiatives by Sector II-21
Advanced Solutions Gain Traction II-21
Regulatory Compliance: A High Priority for Financial
Institutions II-22
Growing Significance of Data Loss Prevention II-22
Lack of Alignment Between Business Objectives and Security II-22
Convergence Gains Strength II-22
Key Barriers in Information Security for Financial Services
Sector II-23
Increasing Adoption of Digital Health Records to Drive Demand
for IT Security Solutions in Healthcare Sector II-23
Production Systems too Bitten by Security Bug II-23
Key Issues and Challenges II-24
Major Restraints to Efficient Information Security in
Enterprises Worldwide II-24
Inadequate Budget - Main Constraint against Effective
Information Security II-24
External Threats More Recognized than Internal Threats II-25
Organizations are Essentially Reactive Rather than Proactive II-25
Lack of Comprehensive Security Solutions II-25

2. REVIEW OF SELECT PRODUCT/SERVICE MARKET OPPORTUNITIES II-26
Information Security Software II-26
Identity & Access Management Solutions II-26
Table 4: Global Identity and Access Management Market
(2009): Percentage Share Breakdown of Revenues by Operating
Environment (includes corresponding Graph/Chart) II-27
A Key Security Initiative for Enterprises II-27
An Integral Part of Corporate Strategy II-28
Growing Prominence of Identity-as-a- Service (IaaS) II-28
Cloud Services Boost IaaS II-29
Concerns with IaaS Implementation II-29
Lack of Unified Standards - A Major Concern II-29
Problems Confronting SaaS Implementation II-29
PKI (Public Key Infrastructure) II-29
Legacy Authorization - A Declining Market II-30
Secure Content Management Grows in Prominence II-30
Antivirus Accounts for Lion's Share II-30
Low Footprint Anti-Virus Grow in Prominence among SMBs II-30
Top 10 Anti Virus Software Solutions for 2011 II-31
Web Filtering II-31
Increasing Web 2.0 & E-Mail Threats Boost Demand for Content
Filtering Products II-31
Messaging Security (E-mail Scanning) - A Promising Market II-32
Security & Vulnerability Management II-32
Table 5: Global Vulnerability Management Market (2011):
Percentage Share Breakdown of Revenues for Device
Vulnerability Assessment and Application Scanners (includes
corresponding Graph/Chart) II-33
Small and Mid-Sized Businesses - An Under- Penetrated
Segment for SVM II-33
Diverse Delivery Systems for SVM Products II-33
Firewall/VPN Software II-33
Encryption for Data Protection II-33
Information Security Hardware II-34
Hardware Authentication - A Trivial but Embryonic Market II-34
Tokens & Smart Cards II-34
Smart Cards Market - A Review II-34
Telecom Sector to Remain Major Driver of Smart Card Demand II-35
Market Overview of Authentication Tokens II-35
Hardware vs. Software Tokens II-35
Demand for Software-Based Authentication Tokens on the Rise II-36
Trends in Authentication Tokens Market II-36
Growing Use of Two-Factor Authentication II-36
Latest Development in Two Factor Authentication Security II-37
New Technologies II-37
Adaptive Authentication II-37
Near Field Communications II-37
New Form Factors II-37
Growing Prominence of Wireless Technology II-37
Biometrics II-38
Table 6: Global Biometrics Market (2011): Percentage Share
Breakdown of Revenues by Technology - Fingerprint
Technology, Facial Scan Technology, and Others (includes
corresponding Graph/Chart) II-38

Table 7: Global Biometrics Market By Application (2015P):
Percentage Share Breakdown of Revenues for Identity
Services, Logical Access, Physical Access, and Surveillance &
Monitoring (includes corresponding Graph/Chart) II-39
Rapid Growth of Biometric Surveillance II-39
Biometric Authentication - Key Issues II-39
Threat Management Security Appliances - Order of the Day II-39
Firewall/VPN Appliances II-39
VPN Market on an Upswing II-40
SSL VPN - A Nascent Market II-40
UTM Appliances - A Whip on Blended Security Threats II-40
Need for Simplifying Information Security Procedures - A
Business Case for UTM II-41
Increasing Fascination for UTM Appliances in Large Enterprises II-41
Shift from UTM to XTMs II-41
Integrated Security Suites Emerge as the Preferred Choice for
Information Security II-41
Information Security Services - Primary Revenue Contributor II-42

3. COMPETITIVE LANDSCAPE II-43
Information Security Market - Highly Competitive II-43
Consolidation Wave in Security Software Market II-43
Convergence of Product Portfolio - A Key Competitive Ploy II-43
Key Statistics II-44
Table 8: Leading Vendors in the Global Security Software
Market (2011): Percentage Share Breakdown of Revenues for
Symantec, McAfee, Trend Micro, IBM, CA, and Others (includes
corresponding Graph/Chart) II-44

Table 9: Global Identity and Access Management Market
(2011): Percentage Share Breakdown of Revenues by Leading
Players (includes corresponding Graph/Chart) II-44

Table 10: Worldwide Messaging Security Market (2011):
Percentage Share Breakdown of Revenue by leading Players
(includes corresponding Graph/Chart) II-44

Table 11: Global Security and Vulnerability Management
Market (2010): Percentage Share Breakdown of Revenue by
Leading Players (includes corresponding Graph/Chart) II-45

Table 12: Global Firewall Market (2010): Percentage Share
Breakdown of Revenue by Leading Players (includes
corresponding Graph/Chart) II-45

Table 13: Global Intrusion Detection/Prevention Market
(2011) - Percentage Share Breakdown of Revenues by Leading
Players (includes corresponding Graph/Chart) II-45

Table 14: Global Market for Unified Threat Management
(Q2-2010): Percentage Market Share Breakdown by Leading
Players (includes corresponding Graph/Chart) II-45

4. PRODUCT/SERVICE OVERVIEW II-46
Information Security - An Introduction II-46
Organizational Security Strata II-46
Managing Information Security II-46
Measures to Ensure Information Security: II-47
Information Security Projects in Organizations - Ranked in
the Order of Relative Importance II-47

5. AN UNDERSTANDING OF KEY PRODUCT SEGMENTS II-48
Information Security Software II-49
Identity & Access Management (I&AM) II-49
Key Functionalities of Identity & Access Management Solutions II-50
Authentication II-50
Authorization II-50
Administration II-50
PKI (Public Key Infrastructure) II-50
Benefits of PKI II-51
Glitches with PKI II-51
Single Sign-On (SSO) II-51
Web Single Sign-On II-52
Host Single Sign-On II-52
User Provisioning II-52
Directory Services II-52
Legacy Authorization II-52
Advanced Authentication II-52
Secure Content Management (SCM) II-53
Antivirus Software II-53
Web/Content Filtering II-54
Messaging Security (E-mail Scanning) II-54
Table 15: Principal Factors Affecting Installation of
Web/E-mail Monitoring in Organizations (includes
corresponding Graph/Chart) II-54
Intrusion Detection/Prevention (IDP) II-54
Security & Vulnerability Management II-55
Firewall/VPN II-56
Firewalls II-56
Major Firewall Types II-56
Packet Filter Firewall II-56
Stateful Packet Inspection Firewall II-57
Application Layer Gateways or Proxies II-57
Available Forms of Firewalls II-57
Software Firewalls II-57
Hardware Firewalls II-57
Virtual Private Networks (VPNs) II-57
Key Components of a VPN II-58
VPN Gateways II-58
Security Servers II-58
Keys II-58
Network II-58
Available Forms of VPN II-58
VPN Software II-58
VPN Hardware II-58
Types of VPN II-58
Remote-access VPN II-58
Site-to-Site VPN II-58
Technologies Supporting Delivery of VPN Services II-59
Internet Protocol Security (IPSec) II-59
Point-to-Point Tunneling Protocol (PPTP) II-59
Layer 2 Tunneling Protocol (L2TP) II-59
Secure Socket Layer (SSL) II-59
Multi Protocol Label Switching (MPLS) II-59
Firewall/VPN - The Need for Integration II-60
Encryption II-60
Other Security Software II-60
Information Security Hardware II-60
Hardware Authentication Products II-60
Tokens II-61
Smart Cards II-61
Biometrics II-61
Threat Management Security Appliances II-61
Firewall/VPN Appliances II-62
SCM Appliances II-62
Intrusion Detection/Prevention Appliances II-62
Intrusion Detection System (IDS) II-62
Types of IDS II-63
Intrusion Prevention System (IPS) II-63
Unified Threat Management (UTM) Appliances - The Viable
Solution II-63
Benefits of UTM Appliances II-63
Information Security Services II-64
Information Security Services Life Cycle II-64
Stages of Information Security Life Cycle II-64
Initiation II-64
Assessment II-64
Solution II-64
Implementation II-65
Operations II-65
Closeout II-65
Security Policy II-65
Program Policies II-65
Issue-Specific Policies II-65
System-Specific Policies II-65
Security Services Management Tools II-65
Metrics II-66
Service Agreements II-66
Types of Information Security Services II-66
Consulting Services II-66
Education and Training Services II-66
Implementation Services II-66
Management Services II-67
Response Services II-67
Types of Delivery Models II-67
Software Licenses II-67
Appliance Based Devices II-67
Hosted Services (Security- as- a-Service Solutions) II-68
Complete Outsourcing Models II-68
Hybrid Model II-68

6. PRODUCT/SERVICE INNOVATIONS/ INTRODUCTIONS II-69
CloudPassage Introduces Halo NetSec Security Solution for
Public Clouds II-69
Stonesoft Launches IPS-1302 for Encrypted Traffic Inspection
and Web II-69
IBM Releases Latest Security Software for Mobile Applications II-69
SafeNet Launches Enhanced Version of Sentinel Cloud II-70
Proofpoint Unveils Enhancements Proofpoint Enterprise Product
Portfolio II-71
Lumension Releases New Endpoint Management and Security Suite
v7.2 Integrated with Endpoint Integrity Service II-72
Norman Introduces New Malware Analyzer G2 Platform Version II-73
Norman Announces Improvements to Email Protection Solution II-73
Proofpoint Launches Proofpoint Android App and Mobile
Decryption App II-74
Fortinet® Launches a Range of Network Security Appliances II-74
Fortinet® Introduces FortiGate™-5101C and FortiGate™-3240C
Firewall Products II-75
Symantec Announces Updation of Backup Exec 3600 and NetBackup
5220 II-76
Symantec Releases Enterprise Mobile Enhancements II-77
McAfee Releases New Database Security Solution II-78
F-Secure Unveils Safe Anywhere II-78
Fujitsu Develops 5mm Sensor, World's Slimmest Sensor for
Biometric Authentication II-79
F-Secure Launches Server and Email Security Solution II-79
IBM Launches SmartCloud Foundation II-80
ActivIdentity Integrates CIV-Compliant Credential Management
System with Crescendo Card Platform II-81
Juniper Introduces Upgraded Mykonos Web Security Platform II-81
Juniper Launches Universal Access Solutions with ACX Series
Platforms II-82
Novell Launches ZENworks® 11 Support Pack 2 II-83
Norman Launches NSP System II-84
Proofpoint Launches Proofpoint Enterprise Governance II-84
SafeNet Launches White Box Cryptography II-85
SafeNet Launches eToken 3500 II-85
Trustwave Launches Innovative Managed Security Services II-86
Check Point Launches Check Point R75.40 II-87
Check Point Launches Check Point ThreatCloud II-88
Websense Launches Websense X10G II-88
Fortinet to Launch FortiDDoS Series II-89
ActivIdentity Unveils Enhancements to 4TRESS Authentication
Solution II-90
RSA Integrates KMIP Specification into RSA Data Protection
Manager Solution II-91
WatchGuard® Technologies Introduces WatchGuard XCSv series II-91
WatchGuard® Technologies Introduces WatchGuard XTM 25 and
WatchGuard XTM 26 UTM Appliances II-91
HP Introduces Thin Clients Featuring Windows Embedded Standard
7 WS7P SKU II-92
HP Introduces New Solutions for Converged Cloud Portfolio II-92
Grid Infocom Introduces Information Security Solutions and
Services Bundle for Mid-Sized Companies II-94
Okta Launches New Service to Offer Single Sign-on for All Web
Apps II-94
EdgeWave Launches New Messaging Security Suite II-95
Raytheon Launches SureView 6.6 for Information Protection II-95
Fox Technologies Introduces FoxT SOX Report Pack II-95
Check Point Launches R75, Latest Version of Network Security
Suite for Better Control, Visibility II-96
Sophos Introduces Mobile Control, SafeGuard Enterprise 5.60, &
Endpoint Security and Data Protection 9.7 Solutions II-97
Sophos Unveils Mobile Management Platform II-99
Symantec Launches Endpoint Protection 12 and Protection 2.0
Security Solutions II-100
Trustwave Launches MyIdentity II-100
Symantec Launches Encryption Solutions Specialization II-101
Norton Launches NortonLive Ultimate Help Desk Service II-102
Clearswift Launches SECURE Email Gateway 3.4 and SECURE Web
Gateway 2.5 II-103
Trustwave Launches an Innovative Suite of Web Security Solutions II-104
Trustwave Launches FIM Solution II-105
CA Technologies Introduces CA Service and Portfolio Management
Partner Solution Center II-105
Crossbeam Expands X-Series Security Platform II-105
Crossbeam Launches X50 II-106
Entrust Launches Entrust IdentityGuard 10.0 II-106
Entrust Launches Entrust IdentityGuard Mobile SDK II-107
CA Technologies Updates Advanced Authentication Cloud Security
Service II-108
Crossbeam Launches XOS 9.6 II-109
Trustwave Launches Apache Software License v2 II-110
Sophos Introduces Upgraded SafeGuard(R) Full-Disk Mac
Encryption Software (UK) II-111
McAfee Introduces Upgraded Security Management Solution II-111
RSA Introduces Upgraded Data Loss Prevention Suite II-112
WatchGuard Introduces the XTMv Series for Virtual Infrastructures II-113
F-Secure Introduces New Mobile Security Solutions II-113
Juniper Networks Introduces New Improvements for Pulse Mobile
Security II-114
Norman Launches Endpoint Protection 9 Information Security System II-115
Norman Enhances Direct Quarantine Email Security Solution II-115
Norman Unveils Upgraded Norman Network Protection Antimalware
Security Appliance II-116
Norman Launches Latest and Superior Security Appliance Version
4.0 II-116
Norman Launches Latest Edition Security Suite 9 Software II-117
RSA Introduces Automated Security Incident Management Solution II-117
Stonesoft Launches StoneGate Mass Security Solution II-118
Stonesoft Unveils AERT II-119
HID Global Rolls Out Certified PIV-I Service II-120
WatchGuard Introduces Next-Generation Firewall XTM 2050 II-121
F-Secure Launches Anti-Virus for Mac II-121
WatchGuard Introduces Security Appliance for Small Businesses II-121
Fortinet® Introduces FortiScan-VM™ and FortiGate-VM™ for
Citrix™ XenServer II-122
F-Secure Launches F-Secure Mobile Backup Solution II-123
Juniper Launches WLA532 II-123
Fortinet Launches FortiGate-600C and FortiGate-1000C II-124
Fortinet® Launches FortiClient II-125
Fortinet® Launches FortiAnalyzer 4.0MR3 and FortiManager 4.0MR3 II-126
Juniper Networks Launches Simply Connected Line of Security,
Switching and Wireless Products II-126
Juniper Networks Launches MAG Series Junos Pulse Gateways II-127
Juniper Introduces New Integrated Virtualization-Aware Solution II-127
Norman Unveils Malware Analyzer G2 Platform II-127
Novell Releases New Healthcare Solution Pack II-128
Norman Introduces New Advanced Free Malware Cleaner Version 2.1 II-129
Proofpoint Releases New Cloud-Based Compliance for Microsoft
Office 365 II-129
Proofpoint Introduces New Proofpoint Mobile, Security and
Compliance Platform for Mobile Enterprise II-130
SafeNet Introduces Ultra-Small Sentinel HASP HL MaxMicro
Licensing Dongle II-130
SafeNet Unveils KG-345 Ethernet Encryptor II-130
SafeNet Unveils SafeNet Authentication Manager 8.0 II-131
SafeNet Unveils MDeX System II-132
Check Point Introduces New Range of Security Appliances II-132
Symantec Expands Encryption Solution Range for Improved
Organizational Flexibility and Mobile Device Connectivity II-133
SafeNet Introduces New Mobile Device Credentialing Solution
for Secure Utilization of End-User Mobile Devices II-133
Sophos Introduces Advanced Anti-Virus Software for Mac OS X Lion II-134
Check Point® Launches New 3D Security Solution II-134
SafeNet Introduces Two Innovative Authentication Migration
Products II-134
Check Point Launches Check Point 61000, the Swiftest Security
Gateway Available II-134
Check Point Unveils ZoneAlarm SocialGuard, a Tool to Secure
Children from Facebook-based Threats II-136
ActivIdentity Launches 4TRESS Authentication Appliance FT2011 II-137
Fortinet to Launch FortiGate and FortiWiFi Series II-138

7. PRODUCT/SERVICE INTRODUCTIONS/ INNOVATIONS IN RECENT PAST - A
PERSPECTIVE BUILDER II-140
SHI, Solutionary Unveil ActiveGuard UTM Complete for Small to
Mid-Sized Businesses II-140
IBM to Launch InfoSphere Guardium 8 II-140
Portcullis Launches Threat Management Gateway II-141
Barracuda Networks Rolls Out NG Firewall II-142
NTT America Partners with Integralis to Introduce Superior
Information Security Solutions (USA) II-142
Cyberoam Introduces Virtual SSL VPN Device II-143
ConvergEx Introduces Management Access Service to Enable
Direct Access to Senior Executives II-144
St. Bernard Software Unveils Red Condor 7.3 Version II-144
CSI Launches Version 3 SSO v3.7.5 II-145
ActivIdentity Launches ActivID CMS Appliance II-146
WatchGuard Launches Innovative Authentication Updates for
Firewalls II-147
WatchGuard Launches WatchGuard SSL 560 II-147
ActivIdentity Launches 4TRESS Authentication Server 7.0 II-148
ActivIdentity Launches FIPS 201 Partner Program and F5 PAC
Solution with API II-148
ActivIdentity Unveils Appliance-based Model of ActivIdentity
4TRESSTM Authentication Server II-149
Fortinet Launches Fortigate-5001B Security Blade and
FortiSwitch-5003B Switching Blade II-150
Fortinet Unveils New E-Mail Security Solution II-151
Websense Launches Websense® Web Security Gateway Anywhere™ II-152
Norman Releases Norman Security PRO II-153
Fortinet Launches Two Novel Multi-Threat Security Systems with
Industry-Best Firewall and IPS Performance II-153
ActivIdentity Launches New PKI Secure Mobile Solution for
Smart Phones II-154
Check Point® Introduces New ZoneAlarm DataLock to Prevent
Unauthorized Access to Private Data II-154
Trustwave Debuts an Integrated Managed Security Portal II-154
Novell Introduces Novell Cloud Security Service II-155
Novell Cloud Security Service Extends WorkloadQ Profile II-156
Fortinet Releases New Multi-Threat Security Device FortGate-3040B II-156
Entrust Launches Secure E-mail Certificates II-157
Websense Launches DLP for Download II-157
Juniper Launches LN1000 II-158
Norman Unveils Norman Patch and Remediation Advanced
Vulnerability Solution II-159
Norman Launches Norman Network Protection 3.7 Security Solution II-159
SafeNet Launches Luna SA 5.0 HSM II-160
SafeNet Integrates ProtectServer HSM with DS3 Authentication
Toolkit II-161
Check Point Launches New Version of ZoneAlarm® Free Firewall II-162
F-Secure Security Gateway Launches E-mail Encryption Features II-163
Trustwave Introduces Powerful SSL Management Solution II-163
Entrust Launches IdentityGuard Mobile Solution II-164
Proofpoint Unveils an Advanced Version of SaaS Email Security
and DLP Platform in Europe II-164
Netgear Introduces Prosecure UTM5 II-165
WatchGuard Technologies Rolls Out WatchGuard XTM Multifunction
Security II-166
Nokia Siemens Networks and Juniper Networks Launch New
Security Solutions II-166
Netgear Introduces Prosecure UTM25 and UTM10 Security Solutions II-167
Global Secure Systems and QinetiQ Roll Out New Managed Digital
Security Service II-167
Netmagic Solutions and iViZ Security to Unveil New Security
Solutions II-167
SafeNet Introduces eSafe® SmartSuite™ Mail and Web Security
Gateway II-167
Splunk and GlassHouse Technologies Develop Enterprise Security
Suite II-168

8. RECENT INDUSTRY ACTIVITY II-169
Sterling Takes Over AISS II-169
Integralis Acquires Secode II-169
Edelman Launches Data Security & Privacy Group II-170
IBM Acquires Q1 Labs II-170
Quantum Telecom to Acquire Zebra Technologies II-171
QuadraMed Inks Contracts with Three Healthcare Organizations
for Identity Management Products II-171
Telaid Deploys NLSS Networking Gateway II-171
ValidSoft Inks Agreement with Utiba (Singapore) II-172
Vanguard Inks Agreement with 3CON and MSCS-X II-173
Trustwave Acquires M86 II-173
Red Bull Technology Selects HP 3PAR Storage Solution of HP II-174
HP Enterprise Services Bags Contract from Defense Information
Systems Agency II-174
Ping Identity and IIJ Global Solutions Enter into Partnership II-175
ONeill Europe Chooses MobilePASS© Multi-Factor Authentication
Solution of SafeNet II-175
Crossbeam Systems Certifies R75.40 Security Gateway of Check
Point on X-Series Security Platforms II-176
CSC Inks Technology Collaboration Agreement with Ping Identity II-176
SafeNet Acquires Cryptocard II-177
RSA Join Forces with Zscaler to Develop Cloud Based solution
for Secure Identities II-177
Winvale Inks Partnership Agreement with Ping Identity II-177
Ping Identity Collaborates with Macnica Networks II-178
Dell Acquires SonicWALL II-178
Sophos Collaborates with Egnyte II-179
Verizon Enters into Strategic Alliance with Cellcrypt II-179
Bright House Networks Partners with Cisco II-180
Spirent and Crossbeam Partner for Real-time Network Security
Tests II-181
McAfee Acquires NitroSecurity II-181
Sophos Acquires Astaro II-182
ePlus Acquires NCC II-182
Intel Acquires McAfee II-183
The Attachmate Group Acquires Novell II-183
WISeKey and The Bancorp Ink Agreement to Set Up Joint Venture II-184
Sophos Inks Distribution Pact with D&H Distributing II-184
EMC Takes Over NetWitness II-185
BAE Systems Takes Over stratsec.net II-185
GCA Technology Services and Symplified Ink Partnership Agreement II-186
Quest Software Acquires BiTKOO II-186
MobileIron Inks Promotion Agreement with Box II-186
HID Inks Agreement with NXP II-187
VASCO Acquires A & A II-187
CSI Transitions Assets to UBM TechWeb II-188
Student Flights Selects Multicard to Offer Identity Management
Services II-188
Thales Collaborates with Imprivata II-189
GSA Grants Blanket Purchase Agreement to Telos II-189
Dell Acquires SecureWorks II-190
Xceedium Purchases Password Management Business of Irdeto II-190
VASCO Data Security Acquires DigiNotar to Enhance Market
Position and Product Offering II-191
Radiant Logic and ForgeRock Forge Partnership to Deliver Web
Access Management Software II-192
CyberPoint Inks Agreement with Integrita II-193
Clearswift Introduces Clearswift SECURE Email Gateway 3.3.1
and Clearswift SECURE Web Gateway 2.4 II-193
Sprint and McAfee Introduce McAfee® Mobile Security Technology , II-194
CA Technologies Introduces CA Virtual Placement and Balancing II-195
Ping Identity Forms Alliance with Symantec II-195
Fujitsu Laboratories Develops Biometric Authentication Technology II-196
Intel Selects McAfee to Develop Anti-theft Software for
Ultrabook Devices Microsoft to Incorporate RSA SecurID® in
Microsoft Windows® Active Directory® Federation Services 2.0 II-197
WatchGuard® Technologies Introduces XTMv Range of Virtual
Firewalls II-198
Security First and IBM Sign Joint Development Agreement for
Security System II-198
Lyceum Takes Over Clearswift II-198
Novell Commences Sale of Patents to CPTN Holdings II-199
Sophos Signs OEM Agreement with BlockMaster to Integrate Anti
Virus Technology into USB Drives II-199
Proofpoint Collaborates with VMware to Deliver Advanced
Security and Compliance for Zimbra® platform II-200
Entrust in Partnership with INTERPOL and EDAP Launches
INTERPOL Smartcard II-201
Good Technology Inks Delivery Agreement with ActivIdentity II-201
Nexus Inks Reseller Agreement with Accumulate II-202
ActivIdentity and Realsec Enter into Strategic Alliance Agreement II-203
ThreatMetrix Enters into Partnership with ActivIdentity II-203
IBM Acquires BigFix II-204
EDB ErgoGroup SYSteam Inks Agreement with Nexus II-204

9. CORPORATE ACTIVITY IN RECENT PAST - A PERSPECTIVE BUILDER II-205
Symantec to Take Over Gideon Technologies II-205
Symantec Takes Over the Security Business of VeriSign II-205
TrustWave Purchases Breach Security II-206
HP Acquires Fortify II-207
Stratsec Inks Agreement with Cybersecurity II-207
CCTV High-Tech Development Partners with Intertrust for
Technology Development II-207
Raytheon Purchases Trusted Computer Solutions II-208
Kaspersky Lab and IceWarp Enter into Technological Partnership II-208
Cyber-Ark Enters into a Partnership Agreement with Avecto II-208
ADTRAN Partners with NetVanta to Launch UTM Security System II-209
IQ Global Re-launches itself as SecureIQ II-209
CA Technologies Acquires Arcot II-210
Quest Unveils Acquisition of Völcker II-210
Cadre Inks Agreement with Quaresso II-211
Metro Bank Selects ActivIdentity4TRESSTM Authentication Server
of ActivIdentity II-211
idOnDemandTM Selects ActivIdentity ActivIDTM Card Management
System of ActivIdentity II-212
Fujitsu Laboratories Develops Cloud Information Gateway
Technology II-212
ASSA ABLOY to Acquire ActivIdentity II-212
Crossbeam Inks Agreement with McAfee II-213
Nexus Merges with PortWise II-213
Nexus Inks Agreement with Utimaco II-214
Vietnam Posts and Telecommunications Enters into Partnership
with F-Secure II-214
Stonesoft Signs Partnership Agreements with System Integrators
in Saudi Arabia II-214
Crossbeam Widens Strategic Partnership Agreement with Check Point II-214
HID Global Acquires ActivIdentity II-215
Stonesoft Inks Agreement with Teamsun II-215
Oracle Corporation Takes Over Sun Microsystems II-216
Trustwave Takes Over Intellitactics II-216
AuthenTec Acquires Embedded Security Solutions Division of
SafeNet II-216
Prolifics Takes Over Watson SCS II-217
ANXeBusiness Takes Over ETSec II-217
Cisco Acquires Rohati Systems II-217
EMC to Take Over Archer Technologies II-217
SHI International Enters into Partnership with Solutionary II-217
Torrid Networks and Beyond Security Enter Into Partnership II-218
CentraComm Selects eIQnetworks to Provide SecureVue II-218
WatchGuard® Technologies Takes Over BorderWare Technologies II-218
SafeNet Takes Over Assured Decisions II-218
Check Point® Acquires Nokia Security Appliance Business II-219
IBM Takes Over Guardium II-219
Cryptzone to Acquire AppGate Network Security II-219
M86 Security Takes Over Finjan II-220
Rapid7 Takes Over Metasploit II-220
Fortinet® Acquires Intellectual Property and Assets of Woven
Systems II-220
SecureWorks Acquires MSS Business of VeriSign II-220
McAfee Acquires Solidcore Systems II-221
SIFT and stratsec Merge II-221
SCM Microsystems Merges with Hirsch Electronics II-221
LogLogic Takes Over Exaprotect II-221
netForensics Acquires Cinxi Product Appliances from High Tower
Software II-222
Novell Takes over Fortefis Technology Assets II-222
CA Takes Over Orchestria Corporation II-222
Ping Identity Acquires Sxip Access II-222
Aladdin Offers eToken NG-Flash to Zagrebacka Bank of Croatia II-223
Evidian Enters into Partnership with Gemalto II-223
Prism Microsystems Inks Contract with EWA-Canada II-224
HITRUST to Deploy nCircle HIT Security Solutions II-224
Bivio Networks Acquires FlowInspect SpA II-225
Department of Homeland Security and SecureInfo Renew Contract II-225
WISeKey Acquires from WISeKey ELA II-225
Mindware Signs Distributor Deal with Huawei Symantec II-226
LogRhythm and Sapphire Enters into Partnership II-226
Trend Micro to Acquire Third Brigade II-226
FutureSoft Renews Reseller Partnership with TigerRidge II-227
GigaTrust Enters into Agreement with Siemens PLM Software II-227
Q1 Labs Signs Distribution Agreement with VADition II-228
SRM Acquires InfoSec Associates II-228
Good Harbor Acquires TECHMARK Security II-228
Vector Capital Acquires Aladdin Knowledge Systems II-229
AIA Teams Up with Internet ISA II-229
NitroSecurity Acquires Assets of Chronicle Solutions II-229
Berkana and Waterfall Security Solutions Sign Reseller Agreement II-230
ManTech Completes Acquisition of DDK Technology Group II-230
Optenet and FishNet Security Partner to Provide SaaS Solutions II-231
SecureWorks Teams Up With ETEK International to Extend
Security Service Portfolio II-231
Integralis and TELEHOUSE America Announce Alliance II-231
Promisec and Internet Binat Announce New Information Security
Service II-232
LogRhythm forms Distribution Partnership with Excelerate Systems II-232
Motion Computing Partners with Sig-Tec II-232
QSGI Selects Fujitsu Mag EraSURE Data Degausser II-233
Agilex Technologies forms Partnership with HBGary II-233
Kaizen and RSA Join Forces for Information Security Solutions II-234
Cygate Partners with Sourcefire II-234
Ask.com Collaborates with Symantec to Enhance Web Search Safety II-234
Workshare Enters into Partnership with ABBYY® II-234
DeviceLock and ATHENA in Distribution Agreement II-235
Q1 Labs Combines QRadar Network Security Management with
McAfee's ePO II-235
Authentic Response Enters into Partnership with RelevantView© II-235
Perimeter Enters into Partnership with Techmate II-236
elQnetworks Joins McAfee's Security Innovation Alliance Program II-236
ClearPoint Metrics Inks Partnership with Lumeta for Software
Integration II-236
Cobham to Take Over Argotek II-237
VidSys and Harris Stratex Networks Ink Partnership II-237
Cyber-Ark Finalizes Distribution Deal with DLT Solutions II-237
BigFix and Trend Micro in Licensing Agreement II-238
Trustwave Takes Over Mirage Networks II-238

10. FOCUS ON SELECT PLAYERS II-239
ActivIdentity Corporation (USA) II-239
AuthenTec (USA) II-239
Check Point Software Technologies Ltd (Israel) II-239
Cisco Systems, Inc. (USA) II-240
Clearswift Ltd (UK) II-241
CA Technologies, Inc. (USA) II-241
Crossbeam Systems, Inc. (USA) II-242
Entrust, Inc. (USA) II-242
F-Secure Corporation (Finland) II-242
Fortinet, Inc. (USA) II-243
Fujitsu Ltd. (Japan) II-243
Hewlett-Packard Development Company, L.P. (USA) II-244
IBM Corporation (USA) II-244
Juniper Networks, Inc. (USA) II-245
Keyware Technologies NV (Belgium) II-245
Lumension Security, Inc. (USA) II-245
McAfee, Inc. (USA) II-245
Norman ASA (Norway) II-246
Novell, Inc. (USA) II-246
Ping Identity Corp. (USA) II-247
Proofpoint, Inc. (USA) II-247
EMC Corporation II-247
SafeNet, Inc. (USA) II-248
Secui.com Co., Ltd. (Korea) II-248
SonicWALL, Inc. (USA) II-249
Sophos Plc (UK) II-249
Utimaco Safeware AG (Germany) II-250
Stonesoft Corporation (Finland) II-250
Symantec Corporation (USA) II-250
Technology Nexus AB (Sweden) II-251
Thales Group (France) II-251
Trend Micro Incorporated (Japan) II-252
Trustwave (USA) II-252
Verizon Business (USA) II-253
WatchGuard Technologies, Inc. (USA) II-253
WebSense, Inc. (USA) II-254
Leading Global Information Security Research Institutes II-254
Center for Education and Research in Information Assurance
and Security (CERIAS) (USA) II-254
Information Security Group (UK) II-255

11. GLOBAL MARKET PERSPECTIVE II-256
Table 16: World Recent Past, Current & Future Analysis for
Information Security Products & Services by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-256

Table 17: World Historic Review for Information Security
Products & Services by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-257

Table 18: World 15-Year Perspective for Information Security
Products & Services by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America and Rest of
World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-258
Information Security Software Market by Product Group/Segment II-259
Information Security Software II-259
Table 19: World Recent Past, Current & Future Analysis for
Information Security Software by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-259

Table 20: World Historic Review for Information Security
Software by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-260

Table 21: World Recent Past, Current & Future Analysis for
Information Security Software by Product Segment - Identity
& Access Management, Secure Content Management, Intrusion
Detection/ Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-261

Table 22: World Historic Review for Information Security
Software by Product Segment - Identity & Access Management,
Secure Content Management, Intrusion Detection/ Prevention,
Security & Vulnerability Management, Firewall/VPN and Other
Security Software Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2004 through 2009
(includes corresponding Graph/Chart) II-262

Table 23: World 15-Year Perspective for Information Security
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-263

Table 24: World 15-Year Perspective for Information Security
Software by Product Group/Segment - Percentage Breakdown of
Revenues for Identity & Access Management, Secure Content
Management, Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-264

Table 25: World Recent Past, Current & Future Analysis for
Identity & Access Management Software by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-265

Table 26: World Historic Review for Identity & Access
Management Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2004 through
2009 (includes corresponding Graph/Chart) II-266

Table 27: World Recent Past, Current & Future Analysis for
Identity & Access Management Software by Product Segment -
PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication Software Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-267

Table 28: World Historic Review for Identity & Access
Management Software by Product Segment - PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced Authentication
Software Markets Independently Analyzed with Annual Revenues
in US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-268

Table 29: World 15-Year Perspective for Identity and Access
Management Software by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America and Rest of
World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-269

Table 30: World 15-Year Perspective for Identity and Access
Management Software by Product Group/Segment - Percentage
Breakdown of Revenues for PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication Software
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-270

Table 31: World Recent Past, Current & Future Analysis for
Secure Content Management Software by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-271

Table 32: World Historic Review for Secure Content
Management Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2004 through
2009 (includes corresponding Graph/Chart) II-272

Table 33: World Recent Past, Current & Future Analysis for
Secure Content Management Software by Product Segment -
Antivirus, Web Filtering and Messaging Security Software
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-273

Table 34: World Historic Review for Secure Content
Management Software by Product Segment - Antivirus, Web
Filtering and Messaging Security Software Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2004 through 2009 (includes corresponding
Graph/Chart) II-274

Table 35: World 15-Year Perspective for Secure Content
Management Software by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America and Rest of
World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-275

Table 36: World 15-Year Perspective for Secure Content
Management Software by Product Group/Segment - Percentage
Breakdown of Revenues for Antivirus, Web Filtering and
Messaging Security Software Markets for Years 2004, 2011 &
2018 (includes corresponding Graph/Chart) II-276

Table 37: World Recent Past, Current & Future Analysis for
Intrusion Detection/ Prevention Software by Geographic
Region - US, Canada, Japan, Europe, Asia-Pacific (excluding
Japan), Latin America, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-277

Table 38: World Historic Review for Intrusion Detection/
Prevention Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2004 through
2009 (includes corresponding Graph/Chart) II-278

Table 39: World 15-Year Perspective for Intrusion
Detection/Prevention Software by Geographic Region -
Percentage Breakdown of Revenues for US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America and
Rest of World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-279

Table 40: World Recent Past, Current & Future Analysis for
Security & Vulnerability Management Software by Geographic
Region - US, Canada, Japan, Europe, Asia-Pacific (excluding
Japan), Latin America, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-280

Table 41: World Historic Review for Security & Vulnerability
Management Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2004 through
2009 (includes corresponding Graph/Chart) II-281

Table 42: World 15-Year Perspective for Security &
Vulnerability Management Software by Geographic Region -
Percentage Breakdown of Revenues for US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America and
Rest of World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-282

Table 43: World Recent Past, Current & Future Analysis for
Firewall/VPN Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-283

Table 44: World Historic Review for Firewall/VPN Software by
Geographic Region - US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2004 through 2009 (includes corresponding
Graph/Chart) II-284

Table 45: World 15-Year Perspective for Firewall/VPN
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-285

Table 46: World Recent Past, Current & Future Analysis for
Other Security Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-286

Table 47: World Historic Review for Other Security Software
by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-287

Table 48: World 15-Year Perspective for Other Security
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-288
Information Security Hardware II-289
Table 49: World Recent Past, Current & Future Analysis for
Information Security Hardware by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-289

Table 50: World Historic Review for Information Security
Hardware by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-290

Table 51: World Recent Past, Current & Future Analysis for
Information Security Hardware by Product Segment - Hardware
Authentication and Threat Management Security Appliance
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-291

Table 52: World Historic Review for Information Security
Hardware by Product Segment - Hardware Authentication and
Threat Management Security Appliance Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2004
through 2009 (includes corresponding Graph/Chart) II-292

Table 53: World 15-Year Perspective for Information Security
Hardware by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-293

Table 54: World 15-Year Perspective for Information Security
Hardware by Product Group/Segment - Percentage Breakdown of
Revenues for Hardware Authentication and Threat Management
Security Appliance Markets for Years 2004, 2011 & 2018
(includes corresponding Graph/Chart) II-294

Table 55: World Recent Past, Current & Future Analysis for
Hardware Authentication by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-295

Table 56: World Historic Review for Hardware Authentication
by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-296

Table 57: World Recent Past, Current & Future Analysis for
Hardware Authentication by Product Segment - Tokens, Smart
Cards, and Biometrics Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) II-297

Table 58: World Historic Review for Hardware Authentication
by Product Segment - Tokens, Smart Cards, and Biometrics
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) II-298

Table 59: World 15-Year Perspective for Hardware
Authentication by Geographic Region - Percentage Breakdown
of Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-299

Table 60: World 15-Year Perspective for Hardware
Authentication by Product Group/ Segment - Percentage
Breakdown of Revenues for Tokens, Smart Cards and Biometrics
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-300

Table 61: World Recent Past, Current & Future Analysis for
Threat Management Security Appliances by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-301

Table 62: World Historic Review for Threat Management
Security Appliances by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2004 through
2009 (includes corresponding Graph/Chart) II-302

Table 63: World Recent Past, Current & Future Analysis for
Threat Management Security Appliances by Product Segment -
Firewall/VPN, Secure Content Management, Intrusion
Detection/ Prevention and Unified Threat Management Security
Appliances Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) II-303

Table 64: World Historic Review for Threat Management
Security Appliances by Product Segment - Firewall/VPN,
Secure Content Management, Intrusion Detection/ Prevention
and Unified Threat Management Security Appliances Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2004 through 2009 (includes corresponding
Graph/Chart) II-304

Table 65: World 15-Year Perspective for Threat Management
Security Appliances by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America and Rest of
World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-305

Table 66: World 15-Year Perspective for Threat Management
Security Appliances by Product Group/Segment - Percentage
Breakdown of Revenues for Firewall/VPN, Secure Content
Management, Intrusion Detection/Prevention and Unified
Threat Management Security Appliances Markets for Years
2004, 2011 & 2018 (includes corresponding Graph/Chart) II-306
Information Security Services II-307
Table 67: World Recent Past, Current & Future Analysis for
Information Security Services by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-307

Table 68: World Historic Review for Information Security
Services by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-308

Table 69: World Recent Past, Current & Future Analysis for
Information Security Services by Service Segment -
Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-309

Table 70: World Historic Review for Information Security
Services by Service Segment - Implementation Services,
Consulting Services, Management Services, Education &
Training and Response Services Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2004
through 2009 (includes corresponding Graph/Chart) II-310

Table 71: World 15-Year Perspective for Information Security
Services by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) II-311

Table 72: World 15-Year Perspective for Information Security
Services by Service Product Group/Segment - Percentage
Breakdown of Revenues for Implementation Services,
Consulting Services, Management Services, Education &
Training and Response Services Markets for Years 2004, 2011
& 2018 (includes corresponding Graph/Chart) II-312

III. MARKET

1. THE UNITED STATES III-1
A.Market Analysis III-1
Outlook III-1
An Overview III-1
Impact of Recession in Retrospect III-1
End Use Markets III-2
Table 73: US Information Security Services Market (2011):
Percentage Share Breakdown of Revenues by End Use
Industries - Banking, Communications, Healthcare, Financial
Services, and Insurance (includes corresponding
Graph/Chart) III-2
Regulatory Environment III-2
Product/Service Innovations III-3
Strategic Corporate Developments III-63
Regional Players III-81
B.Market Analytics III-93
Table 74: US Recent Past, Current & Future Analysis for
Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-93

Table 75: US Historic Review for Information Security
Products & Services by Product Group/Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/ VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-95

Table 76: US 15-Year Perspective for Information Security
Products & Services by Product Group/Segment - Percentage
Breakdown of Revenues for Information Security Software
(Identity & Access Management (PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication), Secure
Content Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) III-97

2. CANADA III-98
A.Market Analysis III-98
Product Launch III-98
B.Market Analytics III-99
Table 77: Canadian Recent Past, Current & Future Analysis
for Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/ Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-99

Table 78: Canadian Historic Review for Information Security
Products & Services by Product Group/Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/ Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-101

Table 79: Canadian 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/ VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/ Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-103

3. JAPAN III-104
A.Market Analysis III-104
Outlook III-104
Highlights III-104
Growing Popularity of Biometric Technology III-105
Table 80: Biometric Market in Japan (2011): Percentage
Share Breakdown of Value Sales for Fingerprint Technology,
Vein Technologies, Facial Recognition and Others (includes
corresponding Graph/Chart) III-105
Leading Players III-105
Table 81: Leading Players in the Japanese Biometrics
Market (2012): Percentage Breakdown of Value Sales for
NEC, DDS, Fujitsu, and Others (includes corresponding
Graph/Chart) III-105
Growing Demand for Cloud Infrastructure to Boost Market
for Security Solutions III-106
Rising Emphasis on After Sales Service III-106
Product Launch III-106
Strategic Corporate Developments III-107
Regional Players III-108
B.Market Analytics III-110
Table 82: Japanese Recent Past, Current & Future Analysis
for Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-110

Table 83: Japanese Historic Review for Information Security
Products & Services by Product Group/Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-112

Table 84: Japanese 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/ Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-114

4. EUROPE III-115
A.Market Analysis III-115
Outlook III-115
Information Security - High on Enterprise Priority III-115
Network and Information Security (NIS) Market in EU-27 III-116
At a Glance III-116
Growth Drivers III-116
Major Threats III-116
Table 85: EU NIS Market for Business Users (2011):
Percentage Share Breakdown of Spending by Company Size
(includes corresponding Graph/Chart) III-116
Regulations Influencing NIS Market III-117
Growing Demand for NIS Services III-117
Table 86: Leading Vendors in the EU NIS Market (2010):
Percentage Share Breakdown of Revenues for Symantec, IBM,
McAfee, Cisco, Trend Micro, and Others (includes
corresponding Graph/Chart) III-118
Strong Uptake in the SME Sector to Fuel European Email
Security Growth III-118
Regulatory Environment III-118
Product Launch III-118
B.Market Analytics III-120
Table 87: European Recent Past, Current & Future Analysis
for Information Security Products & Services by Geographic
Region - France, Germany, Italy, UK, and Rest of Europe
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2010 through 2018 (includes corresponding
Graph/Chart) III-120

Table 88: European Historic Review for Information Security
Products & Services by Geographic Region - France, Germany,
Italy, UK, and Rest of Europe Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2004
through 2009 (includes corresponding Graph/Chart) III-121

Table 89: European Recent Past, Current & Future Analysis
for Information Security Products & Services by Product
Group/ Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/ Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-122

Table 90: European Historic Review for Information Security
Products & Services by Product Group/Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-124

Table 91: European 15-Year Perspective for Information
Security Products & Services by Geographic Region -
Percentage Breakdown of Revenues for France, Germany, Italy,
UK, and Rest of Europe Markets for Years 2004, 2011 & 2018
(includes corresponding Graph/Chart) III-126

Table 92: European 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion Detection/
Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-127

4a. FRANCE III-128
A.Market Analysis III-128
An Overview of Information Security Market III-128
Outlook III-128
Regulatory Standards III-128
Competitive Scenario III-128
Regional Player III-129
B.Market Analytics III-130
Table 93: French Recent Past, Current & Future Analysis for
Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-130

Table 94: French Historic Review for Information Security
Products & Services by Product Group/ Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/ VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-132

Table 95: French 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/ VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/ Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-134

4b. GERMANY III-135
A.Market Analysis III-135
Outlook III-135
US Vendors Hold Lion's Share III-135
Strategic Corporate Developments III-135
Utimaco Safeware AG - A Key German Player III-137
B.Market Analytics III-138
Table 96: German Recent Past, Current & Future Analysis for
Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-138

Table 97: German Historic Review for Information Security
Products & Services by Product Group/ Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-140

Table 98: German 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-142

4c. ITALY III-143
Market Analysis III-143
Table 99: Italian Recent Past, Current & Future Analysis for
Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/ VPN, Secure
Content Management, Intrusion Detection/ Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-144

Table 100: Italian Historic Review for Information Security
Products & Services by Product Group/ Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-146

Table 101: Italian 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-148

4d. THE UNITED KINGDOM III-149
A.Market Analysis III-149
Product Launches III-149
Strategic Corporate Developments III-152
Regional Players III-153
B.Market Analytics III-155
Table 102: UK Recent Past, Current & Future Analysis for
Information Security Products & Services by Product
Group/Segment - Information Security Software (Identity &
Access Management (PKI, Web Single Sign-On, Host Single
Sign-On, User Provisioning, Directory Services, Legacy
Authorization, and Advanced Authentication), Secure Content
Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-155

Table 103: UK Historic Review for Information Security
Products & Services by Product Group/ Segment - Information
Security Software (Identity & Access Management (PKI, Web
Single Sign-On, Host Single Sign-On, User Provisioning,
Directory Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-157

Table 104: UK 15-Year Perspective for Information Security
Products & Services by Product Group/ Segment - Percentage
Breakdown of Revenues for Information Security Software
(Identity & Access Management (PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication), Secure
Content Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) III-159

4e. REST OF EUROPE III-160
A.Market Analysis III-160
Outlook III-160
Product Launches III-160
Strategic Corporate Developments III-173
Regional Players III-175
B.Market Analytics III-177
Table 105: Rest of Europe Recent Past, Current & Future
Analysis for Information Security Products & Services by
Product Group/Segment - Information Security Software
(Identity & Access Management (PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication), Secure
Content Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-177

Table 106: Rest of Europe Historic Review for Information
Security Products & Services by Product Group/Segment -
Information Security Software (Identity & Access Management
(PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication), Secure Content Management
(Antivirus, Web Filtering and Messaging Security), Intrusion
Detection/ Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-179

Table 107: Rest of Europe 15-Year Perspective for
Information Security Products & Services by Product
Group/Segment - Percentage Breakdown of Revenues for
Information Security Software (Identity & Access Management
(PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication), Secure Content Management
(Antivirus, Web Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-181

5. ASIA-PACIFIC III-182
A.Market Analysis III-182
Outlook III-182
Overview III-182
SOHO & Consumer Segments - Potential Growth Opportunities III-183
Increasing Room for Appliances III-183
Leading Vendors III-183
Focus on Select Information Security Markets III-183
China III-183
Key Trends III-184
South Korea III-184
India III-184
Growing Demand for Security Software Solutions III-184
Singapore III-185
Taiwan III-185
Product Launch III-185
Strategic Corporate Developments III-186
Regional Player III-189
B.Market Analytics III-190
Table 108: Asia-Pacific Recent Past, Current & Future
Analysis for Information Security Products & Services by
Product Group/Segment - Information Security Software
(Identity & Access Management (PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication), Secure
Content Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-190

Table 109: Asia-Pacific Historic Review for Information
Security Products & Services by Product Group/Segment -
Information Security Software (Identity & Access Management
(PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication), Secure Content Management
(Antivirus, Web Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-192

Table 110: Asia-Pacific 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-194

6. LATIN AMERICA III-195
A.Market Analysis III-195
Strategic Corporate Developments III-195
B.Market Analytics III-196
Table 111: Latin American Recent Past, Current & Future
Analysis for Information Security Products & Services by
Product Group/Segment - Information Security Software
(Identity & Access Management (PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication), Secure
Content Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services, Consulting Services,
Management Services, Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-196

Table 112: Latin American Historic Review for Information
Security Products & Services by Product Group/Segment -
Information Security Software (Identity & Access Management
(PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication), Secure Content Management
(Antivirus, Web Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-198

Table 113: Latin American 15-Year Perspective for
Information Security Products & Services by Product
Group/Segment - Percentage Breakdown of Revenues for
Information Security Software (Identity & Access Management
(PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication), Secure Content Management
(Antivirus, Web Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-200

7. REST OF WORLD III-201
A.Market Analysis III-201
Outlook III-201
Security Software Market in Gulf States on the Rise III-201
Product Launches III-201
Strategic Corporate Developments III-204
Regional Player III-205
B.Market Analytics III-206
Table 114: Rest of World Recent Past, Current & Future
Analysis for Information Security Products & Services by
Product Group/Segment - Information Security Software
(Identity & Access Management (PKI, Web Single Sign-On, Host
Single Sign-On, User Provisioning, Directory Services,
Legacy Authorization, and Advanced Authentication), Secure
Content Management (Antivirus, Web Filtering and Messaging
Security), Intrusion Detection/Prevention, Security &
Vulnerability Management, Firewall/ VPN and Other Security
Software), Information Security Hardware (Hardware
Authentication (Tokens, Smart Cards and Biometrics) and
Threat Management Security Appliances (Firewall/VPN, Secure
Content Management, Intrusion Detection/Prevention and
Unified Threat Management)) and Information Security
Services (Implementation Services Consulting Services
Management Services Education & Training and Response
Services) Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2010 through 2018
(includes corresponding Graph/Chart) III-206

Table 115: Rest of World Historic Review for Information
Security Products & Services by Product Group/Segment -
Information Security Software (Identity & Access Management
(PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication), Secure Content Management
(Antivirus, Web Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services Consulting Services Management
Services Education & Training and Response Services) Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2004 through 2009 (includes corresponding
Graph/Chart) III-208

Table 116: Rest of World 15-Year Perspective for Information
Security Products & Services by Product Group/Segment -
Percentage Breakdown of Revenues for Information Security
Software (Identity & Access Management (PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced
Authentication), Secure Content Management (Antivirus, Web
Filtering and Messaging Security), Intrusion
Detection/Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software), Information
Security Hardware (Hardware Authentication (Tokens, Smart
Cards and Biometrics) and Threat Management Security
Appliances (Firewall/VPN, Secure Content Management,
Intrusion Detection/Prevention and Unified Threat
Management)) and Information Security Services
(Implementation Services, Consulting Services, Management
Services, Education & Training and Response Services)
Markets for Years 2004, 2011 & 2018 (includes corresponding
Graph/Chart) III-210

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 385 (including Divisions/Subsidiaries - 531)

The United States (231)
Canada (12)
Japan (12)
Europe (179)
- France (17)
- Germany (23)
- The United Kingdom (48)
- Italy (5)
- Spain (8)
- Rest of Europe (78)
Asia-Pacific (Excluding Japan) (75)
Latin America (6)
Africa (3)
Middle East (13)

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos