• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)
Lawful Interception Market by Components, Technologies & Interface: Worldwide Market Forecasts and Analysis (2013 - 2018) - Product Image

Lawful Interception Market by Components, Technologies & Interface: Worldwide Market Forecasts and Analysis (2013 - 2018)

  • Published: October 2013
  • Region: Global
  • 143 Pages
  • Markets and Markets

FEATURED COMPANIES

  • Aqsacom
  • Bluecoat
  • Cisco
  • Incognito Software
  • Net Optics
  • Netscout
  • MORE

'Lawful Interception Market [Components (Mediation, IAP, Decoders, Interfaces), Technologies (VoIP, NGN, Email, SMS, MMS, Telephony), by Interface (GSM, GPRS, UMTS, LTE, PSTN, DSL, Cable, WLAN)]: Worldwide Market Forecasts and Analysis (2013 - 2018)'

With the technologically enhanced, diverse and versatile range of communication channels today, the Law Enforcement Agencies (LEAs) and other security agencies are facing momentous challenges for combating terrorism and criminal activities around the world. Lawful Interception (LI) is the surveillance method for such electronic communication services with the consent of legal authority.

For co-operating against growing terrorism and threats, most countries are now adopting LI and have already conceded laws for the same. It helps to ease and improve the investigation process for collecting evidences and better inspection. Though it is a legally approved interception to the information related to particular person or group of people, still LI solution providers have major concern for the accuracy, privacy, and illegal access of the information such as access by any employee of the Service Providers (SPs).

The global READ MORE >

1 Introduction
1.1 Key Take-Aways
1.2 Report Description
1.3 Markets Covered
1.4 Stakeholders
1.5 Research Methodology
1.5.1 Key Data Points
1.5.2 Data Triangulation And Market Forecasting
1.6 Forecast Assumptions

2 Executive Summary
2.1 Abstract
2.2 Overall Market Size

3 Market Overview
3.1 Lawful Interception: Market Definition And Architecture
3.2 Active And Passive Approach
3.3 Lawful Interception: Compliance Standards
3.4 Market Segmentation
3.5 Market Dynamics
3.5.1 Drivers
3.5.1.1 Advancement In Communication Channels And Technologies
3.5.1.2 Increased Security Threats
3.5.2 Restraints
3.5.2.1 Privacy Of Target And Maintain Secrecy, Reliability Of Investigation
3.5.2.2 Adherence To Rules, Regulations, And Laws
3.5.3 Opportunities
3.5.3.1 Intercepting Newest Communication Methods
3.5.4 Time Impact Analysis Of Drivers, Restraints, And Opportunities (Dros)
3.6 Value Chain

4 Lawful Interception: Market Size And Forecast By Components
4.1 Introduction
4.2 Management Servers
4.2.1 Overview
4.2.2 Market Size And Forecast
4.3 Mediation Devices
4.3.1 Overview
4.3.2 Market Size And Forecast
4.4 Intercept Access Points (Iaps)
4.4.1 Overview
4.4.2 Market Size And Forecast
4.5 Decoder
4.5.1 Overview
4.5.2 Market Size And Forecast
4.6 Handover Interface (Hi)
4.6.1 Overview
4.6.2 Market Size And Forecast

5 Lawful Interception: Market Size And Forecast By Communication Technology
5.1 Introduction
5.2 Voip
5.2.1 Overview
5.2.2 Market Size And Forecast
5.3 Ngn
5.3.1 Overview
5.3.2 Market Size And Forecast
5.4 Email
5.4.1 Overview
5.4.2 Market Size And Forecast
5.5 Sms
5.5.1 Overview
5.5.2 Market Size And Forecast
5.6 Mms
5.6.1 Overview
5.6.2 Market Size And Forecast
5.7 Telephony
5.7.1 Overview
5.7.2 Market Size And Forecast

6 Lawful Interception: Market Size And Forecast By Networking Technology
6.1 Introduction
6.2 Gsm
6.2.1 Overview
6.2.2 Market Size And Forecast
6.3 Gprs
6.3.1 Overview
6.3.2 Market Size And Forecast
6.4 Umts
6.4.1 Overview
6.4.2 Market Size And Forecast
6.5 Lte
6.5.1 Overview
6.5.2 Market Size And Forecast
6.6 Pstn
6.6.1 Overview
6.6.2 Market Size And Forecast
6.7 Dsl
6.7.1 Overview
6.7.2 Market Size And Forecast
6.8 Cable
6.8.1 Overview
6.8.2 Market Size And Forecast
6.9 Wlsn
6.9.1 Overview
6.9.2 Market Size And Forecast
6.10 Wimax
6.10.1 Overview
6.10.2 Market Size And Forecast

7 Lawful Interception: Market Size And Forecast By Regions
7.1 Introduction
7.1.1 Parfait Chart
7.1.2 Regional Market Lifecycle
7.2 North America (Na)
7.2.1 Overview
7.2.2 Market Size And Forecast By Components
7.2.3 Market Size And Forecast By Communication Technology
7.2.4 Market Size And Forecast By Networking Technology
7.3 Latin America (La)
7.3.1 Overview
7.3.2 Market Size And Forecast By Components
7.3.3 Market Size And Forecast By Communication Technology
7.3.4 Market Size And Forecast By Networking Technology
7.4 Europe (Eu)
7.4.1 Overview
7.4.2 Market Size And Forecast By Components
7.4.3 Market Size And Forecast By Communication Technology
7.4.4 Market Size And Forecast By Networking Technology
7.5 Asia-pacific (Apac)
7.5.1 Overview
7.5.2 Market Size And Forecast By Components
7.5.3 Market Size And Forecast By Communication Technology
7.5.4 Market Size And Forecast By Networking Technology
7.6 Middle-East And Africa (Mea)
7.6.1 Overview
7.6.2 Market Size And Forecast By Components
7.6.3 Market Size And Forecast By Communication Technology
7.6.4 Market Size And Forecast By Networking Technology

8 Lawful Interception: Market Landscape
8.1 Competitive Landscape
8.1.1 Ecosystem And Roles
8.2 End-User Landscape
8.2.1 Market Opportunity Analysis

9 Company Profiles (Marketsandmarkets View, Overview, Products & Services, Financials, Strategy & Insights)*
9.1 Aqsacom
9.2 Bluecoat
9.3 Cisco
9.4 Incognito Software
9.5 Net Optics
9.6 Netscout
9.7 Pine Lawful Interception B.V.
9.8 Siemens
9.9 Ss8
9.10 Utimaco Safeware Ag
9.11 Verint
9.12 Verisign, Inc. (Security Business Acquired By Symantec)
9.13 Zte
* View, Overview, Products & Services, Financials, Strategy & Insights Might Not Be Captured In Case Of Unlisted Companies.

Appendix
Mergers And Acquisitions
Venture Capital (Vc) Trends

List Of Tables (80 Tables)

Table 1 Lawful Interception: Market Size And Y-O-Y, 2013–2018 ($Million, %)
Table 2 Lawful Interception: Market Size, By Region, 2013–2018 ($Million)
Table 3 Lawful Interception: Market Size, By Components, 2013–2018 ($Million)
Table 4 LI: Management Server Market Size, By Communication Technology, 2013–2018 ($Million)
Table 5 LI: Management Server Market Size, By Networking Technology, 2013–2018 ($Million)
Table 6 LI: Management Server Market Size, By Region, 2013–2018 ($Million)
Table 7 LI: Mediation Device Market Size, By Communication Technology, 2013–2018 ($Million)
Table 8 LI: Mediation Device Market Size, By Networking Technology, 2013–2018 ($Million)
Table 9 LI: Mediation Device Market Size, By Region, 2013–2018 ($Million)
Table 10 LI: Iap Market Size, By Communication Technology, 2013–2018 ($Million)
Table 11 LI: Iap Market Size, By Networking Technology, 2013–2018 ($Million)
Table 12 LI: Iap Market Size, By Region, 2013–2018 ($Million)
Table 13 LI: Decoder Market Size, By Communication Technology, 2013–2018 ($Million)
Table 14 LI: Decoder Market Size, By Networking Technology, 2013–2018 ($Million)
Table 15 LI: Decoder Market Size, By Region, 2013–2018 ($Million)
Table 16 LI: Hi Market Size, By Communication Technology, 2013–2018 ($Million)
Table 17 LI: Hi Market Size, By Networking Technology, 2013–2018 ($Million)
Table 18 LI: Hi Market Size, By Region, 2013–2018 ($Million)
Table 19 LI: Market Size, By Communication Technology, 2013–2018 ($Million)
Table 20 LI: Voip Market Size, By Components, 2013–2018 ($Million)
Table 21 LI: Voip Market Size, By Region, 2013–2018 ($Million)
Table 22 LI: Ngn Market Size, By Components, 2013–2018 ($Million)
Table 23 LI: Ngn Market Size, By Region, 2013–2018 ($Million)
Table 24 LI: Email Market Size, By Components, 2013–2018 ($Million)
Table 25 LI: Email Market Size, By Region, 2013–2018 ($Million)
Table 26 LI: Sms Market Size, By Components, 2013–2018 ($Million)
Table 27 LI: Sms Market Size, By Region, 2013–2018 ($Million)
Table 28 LI: Mms Market Size, By Components, 2013–2018 ($Million)
Table 29 LI: Mms Market Size, By Region, 2013–2018 ($Million)
Table 30 LI: Telephony Market Size, By Components, 2013–2018 ($Million)
Table 31 LI: Telephony Market Size, By Region, 2013–2018 ($Million)
Table 32 LI: Market Size, By Networking Technology, 2013–2018 ($Million)
Table 33 LI: Gsm Market Size, By Components, 2013–2018 ($Million)
Table 34 LI: Gsm Market Size, By Region, 2013–2018 ($Million)
Table 35 LI: Gprs Market Size, By Components, 2013–2018 ($Million)
Table 36 LI: Gprs Market Size, By Region, 2013–2018 ($Million)
Table 37 LI: Umts Market Size, By Components, 2013–2018 ($Million)
Table 38 LI: Umts Market Size, By Region, 2013–2018 ($Million)
Table 39 LI: Lte Market Size, By Components, 2013–2018 ($Million)
Table 40 LI: Lte Market Size, By Region, 2013–2018 ($Million)
Table 41 LI: Pstn Market Size, By Components, 2013–2018 ($Million)
Table 42 LI: Pstn Market Size, By Region, 2013–2018 ($Million)
Table 43 Li Dsl Market Size, By Components, 2013–2018 ($Million)
Table 44 LI: Dsl Market Size, By Region, 2013–2018 ($Million)
Table 45 LI: Cable Market Size, By Components, 2013–2018 ($Million)
Table 46 LI: Cable Market Size, By Region, 2013–2018 ($Million)
Table 47 LI: Wlan Market Size, By Components, 2013–2018 ($Million)
Table 48 LI: Wlan Market Size, By Region, 2013–2018 ($Million)
Table 49 LI: Wimax Market Size, By Components, 2013–2018 ($Million)
Table 50 LI: Wimax Market Size, By Region, 2013–2018 ($Million)
Table 51 LI: North America Market Size, By Components, 2013–2018 ($Million)
Table 52 LI: North America Market Size, By Communication Technology, 2013–2018 ($Million)
Table 53 LI: North America Market Size, By Networking Technology, 2013–2018 ($Million)
Table 54 LI: Latin America Market Size, By Components, 2013–2018 ($Million)
Table 55 LI: Latin America Market Size, By Communication Technology, 2013–2018 ($Million)
Table 56 LI: Latin America Market Size, By Networking Technology, 2013–2018 ($Million)
Table 57 LI: Europe Market Size, By Components, 2013–2018 ($Million)
Table 58 LI: Europe Market Size, By Communication Technology, 2013–2018 ($Million)
Table 59 LI: Europe Market Size, By Networking Technology, 2013–2018 ($Million)
Table 60 LI: Apac Market Size, By Components, 2013–2018 ($Million)
Table 61 LI: Apac Market Size, By Communication Technology, 2013–2018 ($Million)
Table 62 LI: Apac Market Size, By Networking Technology, 2013–2018 ($Million)
Table 63 LI: Mea Market Size, By Components, 2013–2018 ($Million)
Table 64 LI: Mea Market Size, By Communication Technology, 2013–2018 ($Million)
Table 65 LI: Mea Market Size, By Networking Technology, 2013–2018 ($Million)
Table 66 Cisco Systems: Revenue, 2011–2012 ($Million)
Table 67 Cisco Systems: Revenue By Region, 2011–2012 ($Million)
Table 68 Cisco Systems: Revenue By Segment, 2011–2012 ($Million)
Table 69 Netscout Systems: Revenue, 2011–2012 ($Million)
Table 70 Netscout Systems: Revenue By Region, 2011–2012 ($Million)
Table 71 Siemens Ag: Revenue, 2011–2012 ($Million)
Table 72 Seimens Ag: Revenue By Region, 2011–2012 ($Million)
Table 73 Seimens Ag: Revenue By Segment, 2011–2012 ($Million)
Table 74 Verint Systems: Revenue, 2011–2012 ($Million)
Table 75 Verisign: Revenue, 2011–2012 ($Million)
Table 76 Verisign: Revenue By Region, 2011–2012 ($Million)
Table 77 Zte Corporation: Revenue, 2011–2012 ($Million)
Table 78 Zte Corporation: Revenue By Region, 2011–2012 ($Million)
Table 79 LI: Mergers And Acquisitions
Table 80 LI: Venture Capital

List Of Figures (10 Figures)

Figure 1 Data Triangulation And Forecasting
Figure 2 Lawful Interception: Market Size And Y-O-Y, 2013–2018, ($Million, %)
Figure 3 LI: Architecture
Figure 4 LI: Market Segmentation
Figure 5 LI: Time Impact Analysis Of Dros
Figure 6 LI: Value-Chain
Figure 7 LI: Market Size, By Region, 2013–2018 ($Million)
Figure 8 LI: Regional Market Lifecycle
Figure 9 LI: Ecosystem
Figure 10 Lawful Interception: Market Opportunity Plot

Lawful Interception (LI) has proven helpful for security agencies or Law Enforcement Agencies (LEAs) for combating terrorism and criminal activities. Mushrooming criminal activities and advancement in communication channels has driven the Lawful Interception Market to a high extend. For the purpose of evidences and analysis both, intercepting a private communication has become very essential. LI makes this possible with government approval and compliance with international standards, and national and international regulations.

The LEA, after detecting their target, sends a request to the Service Provider (SP) for intercepting the targets traffic. The SP determines the target's Internet Protocol (IP) address for finding out the edge router that manages the suspect's communication traffic. When the data travel through that particular router, the SP intercepts and sends copy of request data to the LEA. The suspect during the whole process is completely unaware of the fact that his/her communication is being intercepted.

Across the world, countries have adopted such legislative regulation and made it compulsory for operators to make LI-enabled communication network. To follow this regulation, International Standard Organization (ISO) has set parameters which SPs need to adhere with.

- Aqsacom
- Bluecoat
- Cisco
- Incognito Software
- Net Optics
- Netscout
- Pine Lawful Interception B.V.
- Siemens
- Ss8
- Utimaco Safeware Ag
- Verint
- Verisign, Inc. (Security Business Acquired By Symantec)
- Zte

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos