• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD
Information Security Products and Services - Global Strategic Business Report Product Image

Information Security Products and Services - Global Strategic Business Report

  • ID: 338544
  • July 2014
  • Region: Global
  • 644 Pages
  • Global Industry Analysts, Inc

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments:
Information Security Software, Information Security Hardware, and Information Security Services.

The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software.

The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances.

The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management READ MORE >

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

Study Reliability and Reporting Limitations
Disclaimers
Data Interpretation & Reporting Level
Quantitative Techniques & Analytics
Product Definitions and Scope of Study
Information Security Software
Identity & Access Management (I&AM)
Public Key Infrastructure (PKI)
Web Single Sign-On
Host Single Sign-On
User Provisioning
Directory Services
Legacy Authorization
Advanced Authentication
Secure Content Management (SCM)
Antivirus Software
Web/Content Filtering
Messaging Security (E-mail Scanning)
Intrusion Detection/Prevention (IDP)
Security & Vulnerability Management
Firewall/VPN Software
Other Security Software
Information Security Hardware
Hardware Authentication Products
Tokens
Smart Cards
Biometrics
Threat Management Security Appliances
Firewall/VPN Appliances
SCM Appliances
Intrusion Detection/Prevention Appliances
Unified Threat Management (UTM) Appliances
Information Security Services
Consulting Services
Education and Training Services
Implementation Services
Management Services
Response Services

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW

Corporate Information Assets
Vulnerable as Ever
Growing Instances of IT Security Breaches
A Serious Cause for Concern
A Look at Common Security Threats for Enterprise Information Assets
Damages Caused by Security Breaches
Proprietary Information Destruction
Disruption in Systems Performance
Data/Application Damage or Corruption
Types of Internal IT Security Breaches in Organizations
Ranked in the Order of Frequency of Occurrence
Types of External Security Breaches in Organizations
Ranked in the Order of Frequency of Occurrence
Top IT Security Breaches Between 2013 & Early 2014
Information Security
High on Priority List for Enterprises
Factors Affecting Implementation of Information Security Solutions by Enterprises Worldwide
Ranked in Order of Influence
Increased Use of Internet Drives Focus on Cyber Security
Key Statistical Findings
Table 1: Number of Internet Users (in Million) and Penetration Percentage for Years 2001, 2011 & 2013 (includes corresponding Graph/Chart)
Table 2: Global Internet Market (2013): Percentage Share Breakdown of Number of Internet Users by Country (includes corresponding Graph/Chart)
Top Priority Malicious Elements Threatening Cyber Security in Enterprises: On a Scale 1
10 (10
High Priority; 1
Low Priority)
Key Focus Areas for Enterprises in Implementation of Cyber Security in their Premises: Ranked in Order of Relative Importance
Key Focus Areas for Information Security in Enterprises
Network Security
Keeping Security Threats at Bay
Security of Internal Network Infrastructure
A Key Necessity for Any Business
Enterprise Endpoint Security Gains Prominence
General Trends Underpinning Need for Endpoint Security Solutions in Organizations
Growth in Adoption of Mobile End-Points in Enterprises Make Enterprise Endpoint Security a Major Necessity
Content Security
Fast Gaining Prominence
Application Security too Finds Traction
Server Security Concerns Brings Focus on Server Security Solutions
Periods of Economic Slowdown Increases Information Security Risks
Magnifies the Business Case for Efficient Security Solutions
Impact of Economic Recession on Global Enterprises
Market Outlook
Developing Regions to Lend Traction to Information Security Market

2. NOTEWORTHY TRENDS, GROWTH DRIVERS & ISSUES

Rise in Magnitude of Cyber Crime to Drive Adoption of Information Security Products & Services
Table 3: Breakdown of Number of Cyber Attacks Reported in October 2013 by Source Nation (includes corresponding Graph/Chart)
Table 4: Percentage Share Breakdown of Number of Cyber Attacks by Nature of Attack as of 2013 (includes corresponding Graph/Chart)
Types of External IT Security Breaches in Organizations
Ranked in the Order of Frequency of Occurrence
Types of Internal IT Security Breaches in Organizations
Ranked in the Order of Frequency of Occurrence
Increasing Prevalence of Malware to Drive Demand for Information Security Products & Services
Table 5: World Anti-Malware Market (2014): Percentage Share Breakdown of Revenues by Type
Corporate Endpoint Security, IDS & IPS, Messaging Security, and Web Security (includes corresponding Graph/Chart)
APTs Emerge as a New Sophisticated Threat
Create Business Case for Information Security Solutions
Emergence of Fake QR Codes and TecTiles Drive Demand for Security Solutions
Growing Use of Advanced Digital Platforms Make Enterprises Highly Vulnerable to Security Threats
Security Threats from Virtualization & Cloud Infrastructure Deployments to Drive Demand for Information Security Solutions
Table 6: Global IT Market (2013): Percentage Share Breakdown of Spending by Segment (includes corresponding Graph/Chart)
Table 7: Global Cloud Computing Services Market (2013 & 2015P): Breakdown of Annual Revenue Figures in US$ Million by Region (includes corresponding Graph/Chart)
Table 8: Global Virtualization Software Market (2013): Percentage Share Breakdown of Revenue by Geographic Region (includes corresponding Graph/Chart)
Growing Use of Internet Enabled Mobile Handsets Lends Traction to Information Security Market
Enterprise Mobility Makes Enterprise Information Assets Highly Vulnerable to Cyber Attacks
Table 9: Global Smartphones market: Annual Sales Figures (in Million Units) for Years 2013, 2016 & 2018 (includes corresponding Graph/Chart)
Table 10: Global Smartphones Market (2013): Penetration for Select Countries (as a Percentage of Mobile Phone Users) (includes corresponding Graph/Chart)
Table 11: Global Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Workers by Nature of Work (includes corresponding Graph/Chart)
Table 12: Global Mobile Worker Population (2013 & 2017): Percentage Share Breakdown of Number of Mobile Workers by Nature of Work (includes corresponding Graph/Chart)
Table 13: Global Mobile Workforce (2013): Percentage Share Breakdown of Number of Mobile Workers by Region (includes corresponding Graph/Chart)
Growing BYOD Phenomenon Drives Adoption of Information Security Solutions
Industry Still Underprepared to Tackle Mobile Security Concerns
Information Security Solutions Focusing on Smartphone Security Gains Rapid Adoption
Security for Converged Data and Voice Environments
VoIP Security for Expanding VoIP
Threat from Social Networking Sites Drives Demand for Information Security Solutions
IP4 to IPv6 Transition to Boost Adoption of Information Security Solutions and Services
Regulatory Compliance Requirements Continue to Drive Demand for Information Security Solutions
Governments and Regulatory Authorities Continue to Implement Strict Privacy Regulations
Avoiding Unnecessary Costs
Key Rationale for Adoption of IT Security Solutions
Growing Commoditization of Security Products Brings Down Prices
Boosts Order Influx Rates
Small and Mid-Sized Businesses
A Lucrative Market Segment

3. FOCUS ON SELECT PRODUCT MARKETS

Information Security Software Market
Secure Content Management Solutions Anchors Information Security Software Market
Antivirus Accounts for Lion’s Share in SCM Market
Low Footprint Anti-Virus Grow in Prominence among SMBs
Top 10 Anti Virus Software Solutions for 2011
Web Filtering Software Finds Steady Growth Prospects
Increasing Web 2.0 & E-Mail Threats Boost Demand for Content Filtering Products
Messaging Security
The Fastest Growing Secure Content Management Solution
E-mail Encryption Gathers Steam
Table 14: Principal Factors Influencing Installation of Web/E-mail Monitoring in Organizations (includes corresponding Graph/Chart)
Identity & Access Management Software Solutions
Table 15: Global Identity and Access Management Market (2013): Percentage Share Breakdown of Revenues by Operating Environment (includes corresponding Graph/Chart)
IAM: A Key Security Initiative for Enterprises
An Integral Part of Corporate Strategy
Legacy Authorization
A Declining Market
Compliance Requirements Boost Security & Vulnerability Management Market
Table 16: Global Vulnerability Assessment Market (2013): Percentage Share Breakdown of Revenues for Device Vulnerability Assessment and Application Scanners (includes corresponding Graph/Chart)
Small and Mid-Sized Businesses
An Under- Penetrated Segment for SVM
Diverse Delivery Systems for SVM Products
Firewall/VPN Software
The Traditional But Mature Market Segment
Next Generation Firewall (NGFW)
An Emerging Technology
SSL VPN
A Nascent Market
Encryption for Data Protection
Growing Significance of Data Loss Protection
Key Trends in Information Security Software Market
Growing Adoption of SaaS Business Model Drives Strong Growth Prospects for Software Vendors
Growing Prominence of Identity-as-a-Service (IaaS)
A Case in Point
Increased Use of Open Source Tools
A Key Trend in Information Security Software Market
Information Security Hardware
Threat Management Security Appliances
The Predominant Information Security Hardware Category
Unified Threat Management (UTM) Appliances
A Whip on Blended Security Threats
XTMs Emerge as More Potential Tool
Steady Growth in Secure Content Management Appliances Market
Intrusion Detection & Prevention Systems
A Review of Opportunities
Hardware Authentication
A Trivial but Key Revenue Contributor for Information Security Hardware Market
Market Overview of Authentication Tokens
Trends in Authentication Tokens Market
Smart Cards Market
A Review
Telecom Sector to Remain Major Driver of Smart Card Demand
Need for Tamper-Free System Drives Adoption of Smart Cards in the Transportation Sector
Demand for Banking and Payment Smart Cards Continue to Grow
Biometrics
An Emerging Authentication Module
Table 17: World Biometrics Market (2012): Percentage Share Breakdown of Revenues by Technology (includes corresponding Graph/Chart)
Table 18: World Biometrics Market (2012): Percentage Share Breakdown of Revenue by End-Use Sector (includes corresponding Graph/Chart)
Rapid Growth of Biometric Surveillance
World Biometrics Market (2011-2015): Analysis of Demand in Commercial Sector by Application Areas
Enterprise Security, Information Transactions and Financial Transactions
Information Security Services
Primary Revenue Contributor
Dearth of Trained Staff and In-House Infrastructure to Boost Market Prospects for Information Security Services
Managed Security Services Continue to Gain Acceptance
Hosted Security Services: Growing in Demand

4. REVIEW OF SELECT END-USE MARKETS

Financial Services
A Key End Use Market for Information Security Solutions
Major External & Internal Breaches in Financial Services Sector
Table 19: Leading Targets of Fraud (2013): Percentage Breakdown of Number of Breaches by Type of Asset (includes corresponding Graph/Chart)
Implementation of Information Security Policy
Industries Ranked by Level of Implementation
Top Security Initiatives by Sector
Advanced IT Security Solutions Gain Traction in Financial Sector
Regulatory Compliance: A High Priority for Financial Institutions
Need to Sustain Customer Trust
A Business Case for Informaiton Security Solutions in the Financial Sector
Key Barriers in Information Security for Financial Services Sector
Telecommunication and IT
DOS Attacks Threaten Mobile Network Security
Drive Demand for Cyber Security Solutions in Telecom Industry
Overbilling Attack: A Business Case for Cyber Security Solutions in Telecom Industry
VPN to Make Telecommunication Networks More Safer
Opportunities for Wireless Network Security in Telecom Industry
Table 20: Worldwide Mobile Data Traffic by Device Type (2013, 2015 & 2018)
Percentage Share Breakdown of Monthly Data Traffic Volume for Laptops, Non-Smartphones, Smartphones,Tablets, and Others (includes corresponding Graph/Chart)
Table 21: Worldwide Mobile Data Traffic by Application (2013, 2015 & 2018)
Percentage Share Breakdown of Monthly Data Traffic Volume for Data, File Sharing, M2M, and Video (includes corresponding Graph/Chart)
Table 22: Worldwide Mobile Networks (2013 & 2018): Percentage Share Breakdown of Number of Connections by Type of Network Technology (includes corresponding Graph/Chart)
Production Systems Also Adopt Information Security Solutions
IT Security Solutions Find Increased Demand in Healthcare Sector

5. KEY ISSUES/CHALLENGES & THE WAY FORWARD

Major Restraints to Efficient Information Security in Enterprises Worldwide
Inadequate Budget
the Key Constraint
High Cost of Ownership
A Major Drawback for Biometric Solutions
Lack of Alignment between Business Objectives and Security
External Threats More Recognized than Internal Threats
Most Organizations Continue to Remain Reactive Rather than Proactive
Growing Sophistication & Complexity of Security Threats
A Challenge to Reckon With for Information Security Solution Providers
Stealthier Infiltration Methods Pose Challenges for Information Security
Advanced Security Solutions
The Need of the Hour
Security Analytics to See Light in the Enterprise Security Sector
Big Data Analytics Set to Storm the Information Security Market
Artificial intelligence Gains Widespread Acceptance
Convergence Gains Strength
Vendors Come Up with Integrated Solutions to Stay Ahead

6. COMPETITIVE LANDSCAPE

Information Security Market
Highly Competitive
Security Software Market Witnesses Consolidation Trend
Convergence of Product Portfolio
A Key Competitive Ploy
What Does it Take to Survive in the Marketplace?
Key Market Share Findings:
Table 23: Leading Vendors in the Global Security Software Market (2012): Percentage Share Breakdown of Revenues for CA, IBM, McAfee, Symantec, Trend Micro, and Others (includes corresponding Graph/Chart)
Table 24: Leading Players in Global Identity and Access Management Market (2013): Percentage Share Breakdown of Revenues for CA, EMC, IBM, Oracle, SafeNet, Symantec, and Others (includes corresponding Graph/Chart)
Table 25: Leading Players in Global Messaging Security Market (2013): Percentage Share Breakdown of Revenues for Cisco, Google, McAfee, Microsoft, Symantec, TrendMicro, and Others (includes corresponding Graph/Chart)
Table 26: Leading Players in Global Security and Vulnerability Management Market (2012): Percentage Share Breakdown of Revenues for EMC, HP, IBM, McAfee, Rapid and Others (includes corresponding Graph/Chart)
Table 27: Leading Players in Global Vulnerability Management Market (2012): Percentage Share Breakdown of Revenues for HP, IBM, McAfee, Qualys, Rapid and Others (includes corresponding Graph/Chart)
Table 28: Leading Players in Global Content Security Gateway Market (2013): Percentage Share Breakdown of Revenues for Blue Coat, Cisco, McAfee, Symantec, Trend Micro, Websense, and Others (includes corresponding Graph/Chart)
Table 29: Leading Players in Global Web Security Market (2013): Percentage Share Breakdown of Revenues for Barracuda, Blue Coat, Cisco, Trend Micro, Websense, and Others (includes corresponding Graph/Chart)
Table 30: Leading Players in Global Firewall Market (2013): Percentage Share Breakdown of Revenues for Checkpoint, Cisco, Juniper Networks, Microsoft, and Others (includes corresponding Graph/Chart)
Table 31: Leading Players in Global VPN Market (2013)
Percentage Share Breakdown of Revenues for Checkpoint, Cisco, Citrix, F5 Networks, Juniper Networks, Microsoft, SafeNet, and Others (includes corresponding Graph/Chart)
Table 32: Leading Players in Global Intrusion Detection/Prevention Market (2013)
Percentage Share Breakdown of Revenues for Arbor Networks, Checkpoint, Cisco, HP, IBM, McAfee, Sourcefire, and Others (includes corresponding Graph/Chart)
Table 33: Leading Players in Global Unified Threat Management Market (2013): Percentage Share Breakdown of Revenues for Checkpoint, Cisco, Dell, Fortinet, Juniper Networks, Palo Alto Networks, WatchGuard, and Others (includes corresponding Graph/Chart)
Table 34: Leading Vendors in Global Antivirus Market (Jan 2014): Percentage Share Breakdown of Revenues for Avast, AVG, Avira, ESET, Kaspersky, Microsoft, Symantec, and Others (includes corresponding Graph/Chart)

7. PRODUCT/SERVICE OVERVIEW

Information Security
An Introduction
Organizational Security Strata
Managing Information Security
Measures to Ensure Information Security:
Information Security Projects in Organizations
Ranked in the Order of Relative Importance
Key Product Segments
Information Security Software
Identity & Access Management (I&AM)
Key Functionalities of Identity & Access Management Solutions
Authentication
Authorization
Administration
PKI (Public Key Infrastructure)
Benefits of PKI
Glitches with PKI
Single Sign-On (SSO)
Web Single Sign-On
Host Single Sign-On
User Provisioning
Directory Services
Legacy Authorization
Advanced Authentication
Secure Content Management (SCM)
Antivirus Software
Web/Content Filtering
Messaging Security (E-mail Scanning)
Intrusion Detection/Prevention (IDP)
Security & Vulnerability Management
Firewall/VPN
Firewalls
Major Firewall Types
Packet Filter Firewall
Stateful Packet Inspection Firewall
Application Layer Gateways or Proxies
Available Forms of Firewalls
Software Firewalls
Hardware Firewalls
Virtual Private Networks (VPNs)
Key Components of a VPN
VPN Gateways
Security Servers
Keys
Network
Available Forms of VPN
VPN Software
VPN Hardware
Types of VPN
Remote-access VPN
Site-to-Site VPN
Technologies Supporting Delivery of VPN Services
Internet Protocol Security (IPSec)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Secure Socket Layer (SSL)
Multi Protocol Label Switching (MPLS)
Firewall/VPN
The Need for Integration
Encryption
Other Security Software
Information Security Hardware
Hardware Authentication Products
Tokens
Smart Cards
Biometrics
Threat Management Security Appliances
Firewall/VPN Appliances
SCM Appliances
Intrusion Detection/Prevention Appliances
Intrusion Detection System (IDS)
Types of IDS
Network based and Host based IDS
Misuse Detection and Anomaly Detection
Passive System and Reactive System
Intrusion Prevention System (IPS)
Unified Threat Management (UTM) Appliances
The Viable Solution
Benefits of UTM Appliances
Information Security Services
Information Security Services Life Cycle
Stages of Information Security Life Cycle
Initiation
Assessment
Solution
Implementation
Operations
Closeout
Security Policy
Program Policies
Issue-Specific Policies
System-Specific Policies
Security Services Management Tools
Metrics
Service Agreements
Types of Information Security Services
Consulting Services
Education and Training Services
Implementation Services
Management Services
Response Services
Types of Delivery Models
Software Licenses
Appliance Based Devices
Hosted Services (Security- as- a-Service Solutions)
Complete Outsourcing Models
Hybrid Model

8. PRODUCT/SERVICE INNOVATIONS/ INTRODUCTIONS

HP Releases New Security Metrics Services
CA Technologies Launches New Mobility and API Solutions
Parsons Launches Enhanced Cybersecurity Product
Watchful Software Introduces New Version of RightsWATCH information protection solution
Brekeke Software Launches New Version of PBX and SIP Server
Dell Releases Server Protection Services
Nowell Introduces Advanced Security and Risk Analytics Software Platform
Ping Identity Releases New Generation Identity Gateway
CSC Launches New ATD Solution
Toshiba's Digital Products Division Introduces Smart Client Manager 2.0
docTrackr Releases New Solution for Gmail
LockPath Introduces New SIEM Solution
SecureAuth Releases New Cloud-Hosted Authentication Solution
McAfee Launches New Access and Identity Management Solutions
Intego Launches New Range of Mac Security and Antivirus Products
BitSight Technologies Releases New Range of Cybersecurity Solutions
Bkav Launches New Internet Security Products
VanDyke Software Introduces New SecureCRT 7.2 and SecureFX 7.2 Platforms
AVG Releases new AVG AntiVirus for Mac
Kaspersky Introduces New Virtual Networking and Security Solution
GWAVA Releases New GWAVA messaging security version
TeleMate.Net Introduces New Improved NetSpective Web Filter Version
EdgeWave Releases Advanced Secure Web Gateway
ZyXEL Introduces New new ZyWALL series of ultra-fast gigabit firewall / VPN devices
Tripwire Launches Enhanced Tripwire IP360
Fortinet Launches New Operating System
HP Introduces New Big Data Tools
Cyberoam Releases Advanced Firewall Appliances
Prolifics Launches New Identity Intelligence-branded solution
RSA Launches New VRM Software Solution
AFORE Releases Enhanced Data Encryption Solutions
ForgeRock Launches New IRM Platform
Cisco Releases New Range of IT Security Products

9. RECENT INDUSTRY ACTIVITY

Sophos Takes Over Cyberoam Technologies
Agio Acquires Secure Enterprise Computing
EMC Takes Over Aveska
Click Security Acquires VisibleRisk
MDT Takes Over CUsource
Trustwave Takes Over Application Security
HyTrust Takes Over HighCloud Security
Akamai Technologies to Acquire Prolexic
Openwave Messaging Takes Over Critical Path
Datacard Group to Acquire Entrust
Vision Computer Solutions Enters into an Agreement with Awareness Technologies
Global Payout and ImageWare Systems Ink a Pact

10. FOCUS ON SELECT PLAYERS

ActivID® IT Security Solutions (US)
Blue Coat Systems Inc. (US)
CA Technologies Inc. (USA)
Check Point Software Technologies Ltd. (Israel)
Cisco Systems, Inc. (USA)
Clearswift Ltd. (UK)
EMC Corporation (US)
Entrust (US)
F-Secure Corporation (Finland)
Fortinet, Inc. (US)
Fujitsu Ltd. (Japan)
Hewlett-Packard Development Company, L.P. (US)
IBM Corporation (US)
Juniper Networks, Inc. (US)
Lumension Security, Inc. (US)
McAfee, Inc. (US)
Stonesoft Corporation (Finland)
Nexus (Sweden)
Norman ASA (Norway)
Novell, Inc. (US)
Ping Identity Corp. (US)
Proofpoint, Inc. (US)
SafeNet, Inc. (US)
SonicWALL, Inc. (US)
Sophos Plc (UK)
Symantec Corporation (US)
Thales Group (France)
Trend Micro Incorporated (Japan)
Trustwave (US)
Verizon Business (US)
WatchGuard Technologies, Inc. (US)
WebSense, Inc. (US)
Leading Global Information Security Research Institutes
Center for Education and Research in Information Assurance and Security (CERIAS) (USA)
Information Security Group (UK)

11. GLOBAL MARKET PERSPECTIVE

Table 35: World Recent Past, Current & Future Analysis for Information Security Products & Services by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 36: World Historic Review for Information Security Products & Services by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 37: World 15-Year Perspective for Information Security Products & Services by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Information Security Software Market by Product Group/Segment
Information Security Software
Table 38: World Recent Past, Current & Future Analysis for Information Security Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 39: World Historic Review for Information Security Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 40: World Recent Past, Current & Future Analysis for Information Security Software by Product Group/Segment
Identity & Access Management, Secure Content Management, Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 41: World Historic Review for Information Security Software by Product Group/Segment
Identity & Access Management, Secure Content Management, Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 42: World 15-Year Perspective for Information Security Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 43: World 15-Year Perspective for Information Security Software by Product Group/Segment
Percentage Breakdown of Revenues for Identity & Access Management, Secure Content Management, Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 44: World Recent Past, Current & Future Analysis for Identity & Access Management Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 45: World Historic Review for Identity & Access Management Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 46: World Recent Past, Current & Future Analysis for Identity & Access Management Software by Product Segment
PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication Software Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 47: World Historic Review for Identity & Access Management Software by Product Segment
PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication Software Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 48: World 15-Year Perspective for Identity & Access Management Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 49: World 15-Year Perspective for Identity & Access Management Software by Product Segment
Percentage Breakdown of Revenues for PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication Software Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 50: World Recent Past, Current & Future Analysis for Secure Content Management Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 51: World Historic Review for Secure Content Management Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 52: World Recent Past, Current & Future Analysis for Secure Content Management Software by Product Segment
Antivirus, Web Filtering and Messaging Security Software Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 53: World Historic Review for Secure Content Management Software by Product Segment
Antivirus, Web Filtering and Messaging Security Software Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 54: World 15-Year Perspective for Secure Content Management Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 55: World 15-Year Perspective for Secure Content Management Software by Product Group/Segment
Percentage Breakdown of Revenues for Antivirus, Web Filtering and Messaging Security Software Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 56: World Recent Past, Current & Future Analysis for Intrusion Detection/ Prevention Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 57: World Historic Review for Intrusion Detection/ Prevention Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 58: World 15-Year Perspective for Intrusion Detection/Prevention Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 59: World Recent Past, Current & Future Analysis for Security & Vulnerability Management Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 60: World Historic Review for Security & Vulnerability Management Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 61: World 15-Year Perspective for Security & Vulnerability Management Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 62: World Recent Past, Current & Future Analysis for Firewall/VPN Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 63: World Historic Review for Firewall/VPN Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 64: World 15-Year Perspective for Firewall/ VPN Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 65: World Recent Past, Current & Future Analysis for Other Security Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 66: World Historic Review for Other Security Software by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 67: World 15-Year Perspective for Other Security Software by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Information Security Hardware
Table 68: World Recent Past, Current & Future Analysis for Information Security Hardware by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 69: World Historic Review for Information Security Hardware by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 70: World Recent Past, Current & Future Analysis for Information Security Hardware by Product Segment
Hardware Authentication and Threat Management Security Appliance Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 71: World Historic Review for Information Security Hardware by Product Segment
Hardware Authentication and Threat Management Security Appliance Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 72: World 15-Year Perspective for Information Security Hardware by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 73: World 15-Year Perspective for Information Security Hardware by Product Group/Segment
Percentage Breakdown of Revenues for Hardware Authentication and Threat Management Security Appliance Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 74: World Recent Past, Current & Future Analysis for Hardware Authentication by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 75: World Historic Review for Hardware Authentication by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 76: World Recent Past, Current & Future Analysis for Hardware Authentication by Product Segment
Tokens, Smart Cards, and Biometrics Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 77: World Historic Review for Hardware Authentication by Product Segment
Tokens, Smart Cards, and Biometrics Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 78: World 15-Year Perspective for Hardware Authentication by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 79: World 15-Year Perspective for Hardware Authentication by Product Group/ Segment
Percentage Breakdown of Revenues for Tokens, Smart Cards, and Biometrics Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 80: World Recent Past, Current & Future Analysis for Threat Management Security Appliances by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 81: World Historic Review for Threat Management Security Appliances by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 82: World Recent Past, Current & Future Analysis for Threat Management Security Appliances by Product Segment
Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management Security Appliances Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 83: World Historic Review for Threat Management Security Appliances by Product Segment
Firewall/VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management Security Appliances Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 84: World 15-Year Perspective for Threat Management Security Appliances by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 85: World 15-Year Perspective for Threat Management Security Appliances by Product Group/Segment
Percentage Breakdown of Revenues for Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management Security Appliances Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Information Security Services
Table 86: World Recent Past, Current & Future Analysis for Information Security Services by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 87: World Historic Review for Information Security Services by Geographic Region
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 88: World Recent Past, Current & Future Analysis for Information Security Services by Service Segment
Implementation Services, Consulting Services, Management Services, Education & Training and Response Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 89: World Historic Review for Information Security Services by Service Segment
Implementation Services, Consulting Services, Management Services, Education & Training and Response Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 90: World 15-Year Perspective for Information Security Services by Geographic Region
Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America, and Rest of World Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 91: World 15-Year Perspective for Information Security Services by Service Segment
Percentage Breakdown of Revenues for Implementation Services, Consulting Services, Management Services, Education & Training and Response Services Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

III. MARKET

1. THE UNITED STATES

A.Market Analysis
Current & Future Analysis
An Overview
Rising Cyber Security Issues in the US
Table 92: US Cyber Security Market (2013): Percentage Share Breakdown of Number of Incidents in Critical Infrastructure Sectors (includes corresponding Graph/Chart)
Identity Theft: A Growing Menace in the US
Identity and Access Management Solutions
A Market Laden with Immense Potential
Intrusion Detection
A Growing Market in the US
End Use Market Summary
Table 93: US Information Security Services Market (2013): Percentage Share Breakdown of Revenues by End Use Industries
Banking, Communications, Healthcare, Financial Services, and Insurance (includes corresponding Graph/Chart)
Banking/Financial Institutions: A Key End Use Industry
Regulatory Environment
Laws Governing the Data Security
Product Launches
Strategic Corporate Developments
Key Players
B.Market Analytics
Table 94: US Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 95: US Historic Review for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 96: US 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

2. CANADA

A.Market Analysis
Current & Future Analysis
Market Overview
Product Launches
B.Market Analytics
Table 97: Canadian Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 98: Canadian Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 99: Canadian 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

3. JAPAN

A.Market Analysis
Current & Future Analysis
Information Security Market
A Primer
Highlights
Secure Content Threat Management Gains Focus
Growing Popularity of Biometric Technology
Table 100: Biometric Market in Japan (2013): Percentage Share Breakdown of Value Sales for Fingerprint Technology, Vein Technologies, Facial Recognition and Others (includes corresponding Graph/Chart)
Regulatory Environment
Rising Emphasis on After Sales Service
Competitive Scenario
Product Launch
Key Players
B.Market Analytics
Table 101: Japanese Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 102: Japanese Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 103: Japanese 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

4. EUROPE

A.Market Analysis
Current & Future Analysis
Information Security
High on Enterprise Priority
Security Software Market
Network and Information Security (NIS) Market in EU-27
At a Glance
Growth Drivers
Major Threats
Table 104: EU NIS Market for Business Users (2013): Percentage Share Breakdown of Spending by Company Size (includes corresponding Graph/Chart)
Regulations Influencing NIS Market
Growing Demand for NIS Services
Identity Access Management Market
Strong Uptake in the SME Sector to Fuel European Email Security Growth
Regulatory Environment
B.Market Analytics
Table 105: European Recent Past, Current & Future Analysis for Information Security Products & Services by Geographic Region
France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 106: European Historic Review for Information Security Products & Services by Geographic Region
France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 107: European Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall / VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 108: European Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 109: European 15-Year Perspective for Information Security Products & Services by Geographic Region
Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
Table 110: European 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4a. FRANCE
A.Market Analysis
Current & Future Analysis
An Overview of Information Security Market
Regulatory Standards
Competitive Scenario
Thales Group
A Key Player
B.Market Analytics
Table 111: French Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 112: French Historic Review for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 113: French 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4b. GERMANY
A.Market Analysis
Current & Future Analysis
US Vendors Hold Major Share in the Marketplace
B.Market Analytics
Table 114: German Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 115: German Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 116: German 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/ VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4c. ITALY
A.Market Analysis
Current & Future Analysis
Cyber Security Market
An Overview
B.Market Analytics
Table 117: Italian Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 118: Italian Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/ VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 119: Italian 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/ VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4d. THE UNITED KINGDOM
A.Market Analysis
Current & Future Analysis
Market Overview
Key Players
B.Market Analytics
Table 120: UK Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 121: UK Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 122: UK 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4e. SPAIN
A.Market Analysis
Current & Future Analysis
B.Market Analytics
Table 123: Spanish Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 124: Spanish Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 125: Spanish 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4f. RUSSIA
A.Market Analysis
Current & Future Analysis
B.Market Analytics
Table 126: Russian Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/ VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 127: Russian Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/ VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 128: Russian 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)
4g. REST OF EUROPE
A.Market Analysis
Current & Future Analysis
Product Launches
Key Players
B.Market Analytics
Table 129: Rest of Europe Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 130: Rest of Europe Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 131: Rest of Europe 15-Year Perspective for Information Security Products & Services by Product Group/Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

5. ASIA-PACIFIC

A.Market Analysis
Current & Future Analysis
Overview
Review of Select Product Markets
Secure Content Management Software
The Largest Market Segment
Web Filtering
Gaining Prominence
Identity Access Management
Fastest Growing Product Segment in Asia-Pacific
Managed Security Services (MSS) Market
Asia-Pacific
Increasing Room for Appliances
SOHO & Consumer Segments
Potential Growth Opportunities
Leading Vendors
Focus on Select Information Security Markets
China
Key Trends
Regulatory Overview
India
Factors Driving Growth
Issues & Challenges
Growing Demand for Security Software Solutions
Indian Anti-Virus Market
South Korea
Singapore
Taiwan
An Overview of Information Security Market in Taiwan
Product Launches
Strategic Corporate Development
Secui.Com Co., Ltd. (Korea)
A Key Player
B.Market Analytics
Table 132: Asia-Pacific Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 133: Asia-Pacific Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 134: Asia-Pacific 15-Year Perspective for Information Security Products & Services by Product Group/ Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

6. LATIN AMERICA

A.Market Analysis
Current & Future Analysis
Information Security Market Shows Steady Growth
Brazil Offers Robust Opportunities for Biometrics
B.Market Analytics
Table 135: Latin American Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 136: Latin American Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/ VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 137: Latin American 15-Year Perspective for Information Security Products & Services by Product Group/Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/ Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

7. REST OF WORLD

A.Market Analysis
Current & Future Analysis
Security Software Market in Gulf States on the Rise
Demand for Security Software Gains Tration in South Africa
Check Point Software Technologies Ltd. (Israel)
A Key Player
B.Market Analytics
Table 138: Rest of World Recent Past, Current & Future Analysis for Information Security Products & Services by Product Group/Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)
Table 139: Rest of World Historic Review for Information Security Products & Services by Product Group/ Segment
Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/ Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2006 through 2012 (includes corresponding Graph/Chart)
Table 140: Rest of World 15-Year Perspective for Information Security Products & Services by Product Group/Segment
Percentage Breakdown of Revenues for Information Security Software (Identity & Access Management (PKI, Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, and Advanced Authentication), Secure Content Management (Antivirus, Web Filtering and Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN and Other Security Software)), Information Security Hardware (Hardware Authentication (Tokens, Smart Cards and Biometrics) and Threat Management Security Appliances (Firewall/VPN, Secure Content Management, Intrusion Detection/Prevention and Unified Threat Management)) and Information Security Services (Implementation Services, Consulting Services, Management Services, Education & Training and Response Services) Markets for Years 2006, 2014 & 2020 (includes corresponding Graph/Chart)

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 313 (including Divisions/Subsidiaries 395)
he United States (186)
Canada (9)
Japan (8)
Europe (127)
France (11)
Germany (16)
The United Kingdom (40)
Italy (3)
Spain (5)
Rest of Europe (52)
Asia-Pacific (Excluding Japan) (51)
Latin America (3)
Africa (3)
Middle East (8)

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos