0 CHECKOUT

PRODUCT FILTERS

REGION

305
47
39
37
28

COUNTRY

36
11
8
6
6

CATEGORIES

  • 52
  • 47
  • 44
  • 43
  • 37
  • 31
  • 24
  • 19
  • 19
  • 17
  • 16
  • 15
  • 14
  • 14
  • 13
  • 12
  • 12
  • 12
  • 11
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
SHOW ALL

PRICE

182
211
281
603

PUBLISHED

12
34
176
603

PRODUCT TYPE

429
150
17
3
2
1
1

Search for: "The Future of Privacy and IT Security"

The Mobile Security (mSecurity) Bible: 2014 – 2020 - Device Security, Infrastructure Security & Security Services

Mobile networks around the globe generate more than 86 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  April 2014
Price:  From

Mobile Security Solutions: An Increasingly Insecure Mobile Environment - Markets, Trends & Technologies

This report examines the world of mobile security, providing a broad overview of the main players, their strategies and positioning, future trends and the market as a whole – its structuring and value...

Published:  May 2016
Price:  From

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive,...

Published:  August 2014
Price:  From

Cyber Security - M&A Partnerships 2014 - 2015

In cyber security market, mergers and acquisitions are signed with the focus on strategic growth or capability enhancement. Cyber threats are increasing rapidly with adversaries becoming expert in breaking...

Published:  April 2016
Price:  From

Enterprise Mobility: Wireless Carrier offerings Beyond MDM and BYOD Management

Enterprise Mobility has been one of the most important issues for corporate IT department for the last few years and is expected to continue to be a top priority Technology marches on while enterprise...

Published:  February 2014
Price:  From

Security and Vulnerability Management Market by Solution, by Services, by End Users, & by Verticals - Global Forecast to 2019

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), by...

Published:  March 2015
Price:  From

Global Encryption Software Market (Usage, Vertical and Geography) - Size, Global Trends, Company Profiles, Segmentation and Forecast, 2013 - 2020

Software-based encryption is one of the fast emerging end point data security solutions. An increasing number of organizations worldwide are adopting encryption to address their growing concerns of...

Published:  January 2015
Price:  From

Mobile Security in Enterprise: Solutions and Companies 2014

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits...

Published:  August 2014
Price:  From

Health IT Security Market Products and Services, Services, Application, Delivery Mode, End User - Global Forecast to 2020

Health IT Security Market Products and Services (Products (Antivirus, IAM, DLP), Services (Consulting, MSS)), Application (Network Security, Endpoint Security), Delivery Mode (On-premise, On-demand),...

Published:  December 2015
Price:  From

Cyber Security Market by Solution - Global Forecast to 2020

'Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and...

Published:  June 2015
Price:  From

The Mobile Device & Network Security Bible: 2013 - 2020

Mobile networks around the globe generate more than 50 Exabytes of traffic annually The immense volume of traffic together with the growing adoption of open source Operating System (OS) platforms such...

Published:  September 2013
Price:  From

Unmanned Aerial Systems Bundle 2015

The world’s unmanned systems markets, technologies and regulatory environments are evolving rapidly, creating opportunities in platforms, payloads, leasing, operations and maintenance. This bundle...

Published:  January 2015
Price: 

Home Security Solutions Market (By Component - Hardware, Software, Services) - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2015 - 2022

The Home Security Solutions Market report provides an analysis of the global home security solution market for the period 2013–2022, wherein the period from 2015 to 2022 comprises the forecast period...

Published:  November 2015
Price:  From

Becoming a Global Chief Security Executive Officer

Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader's ability to lead both today's, and tomorrow's, multidisciplined...

Published:  October 2015
Price: 

Data Center Security: Global Market Research Report 2015-2019

About data center security A data center being the backbone of enterprise business operations, requires the highest level of security. Data center security solutions safeguard confidential data against...

Published:  October 2015
Price:  From

Cloud Security Gateways - Global Strategic Analysis

This report analyzes the worldwide markets for Cloud Security Gateways in US$ Thousand. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Middle East...

Published:  February 2016
Price:  From

Mobile Phone Biometric Security - Analysis and Forecasts 2011-2015

Mobile phone biometric security is a strategic analysis of the market for mobile phone biometric security products and services This 200+ page report includes an investigation on current mobile phone...

Published:  June 2011
Price:  From

Information Security Products and Services - Global Strategic Business Report

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware,...

Published:  July 2014
Price:  From

Global Airport Passenger Screening Systems Market 2015-2019

About airport passenger screening systems Air passengers have to undergo strict security screening procedures before embarking an aircraft. In airports, passenger screening involves pat-down search...

Published:  August 2015
Price:  From

Network Security Market in India CY 2014

In the last few years, there have been organised security breaches in the Indian subcontinent that have caused data losses worth millions of dollars. Organisations in the region have started to realise...

Published:  July 2015
Price:  From
Loading Indicator

Our Clients

  • FedEx Corporation
  • AirBridgeCargo Airlines LLC
  • DHL International GmbH
  • Cathay Pacific Airways Limited
  • Martinair Cargo
  • United Parcel Service Inc.