+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Network Security Forensics Global Market

  • ID: 3499592
  • Report
  • Region: Global
  • 195 Pages
  • Frost & Sullivan
1 of 3
How Much Forensics Do You Need?

FEATURED COMPANIES

  • Blue Coat Systems, Inc.
  • IBM
  • LogRhythm
  • NIKSUN
  • PacketSled
  • Savvius
  • MORE
When a security breach occurs, an investigation needs to be initiated. Network security forensics is the technology used not only to understand the nature of the breach, but also to trigger the beginning of remediation. Traditional network security platforms include event correlation and full packet capture. However, different security approaches include the collection of flow data and the use of packet headers to reduce storage requirements.

This comprehensive report about network security forensics includes global & regional market analysis and forecasts for 2015-2019. Technology and pricing trends are detailed and key drivers and restraints identified. The key vendors are profiled and distribution channels and market verticals have been forecasted.

Key Findings:
- In the years 2014–2019, the physical appliances form factor will be the largest product group in terms of revenue
- North America is the region that accounts for most network security forensics sales
- The biggest vendors in terms of revenues are Blue Coat Systems, NETSCOUT, and RSA. These companies are noted for their high line-rates (meaning lossless packet ingestion and translation)
Note: Product cover images may vary from those shown
2 of 3

FEATURED COMPANIES

  • Blue Coat Systems, Inc.
  • IBM
  • LogRhythm
  • NIKSUN
  • PacketSled
  • Savvius
  • MORE
1. Executive Summary
  • Key Findings
  • Executive Summary-Market Engineering Measurements
  • Executive Summary-CEO’s Perspective
  • Executive Summary-Introduction to the Research
  • Executive Summary-Key Questions This Study Will Answer
2. Market Overview
  • Market Overview
  • Network Security Forensics Role in APT Defense
  • Market Overview-Network Security Forensics Post-Breach
  • Market Overview-Security Incidents versus Breaches
  • Market Overview-Definitions
  • Market Overview-Forensics Topics not Covered in this Report
  • Market Overview-Full Packet Capture Limitations
  • Total Network Security Forensics Market-Percent Revenue by Distribution Channels
  • Market Overview-Distribution Channels Discussion
3. External Challenges: Drivers and Restraints-Total Market
  • Drivers and Restraints
  • Drivers Explained
  • Restraints Explained
4. Network Security Forensics Origins by Technology Types
  • Network Security Forensics Origins by Technology Types
5. Forecasts and Trends-Total Market
  • Forecast Assumptions
  • Total Network Security Forensics Market-Unit and Revenue Forecast
  • Unit Shipment and Revenue Forecast Discussion
  • Total Network Security Forensics Market-Pricing Trends and Forecast
  • Pricing Trends and Forecast Discussion
  • Total Network Security Forensics Market-Unit Shipment Forecast by Region
  • Total Network Security Forensics Market-Revenue Forecast by Region
  • Regional Unit Shipment and Revenue Forecast Discussion
  • Total Network Security Forensics Market-Unit Shipments Forecast by Product Type
  • Total Network Security Forensics Market-Revenue Forecast by Product Type
  • Product Type Unit Shipment and Revenue Forecast Discussion
  • Total Network Security Forensics Market-Unit Shipments Forecast by Vertical Market
  • Total Network Security Forensics Market-Revenue Forecast by Vertical Market
  • Vertical Market Unit Shipment and Revenue Forecast Discussion
6. Market Share and Competitive Analysis- Total Market
  • Competitive Analysis-Market Share
  • Competitive Factors and Assessment
  • Mergers and Acquisitions
  • Competitive Environment
  • Competitive Environment
  • Top Competitors
  • Points of Competitive Differentiation
7. Large Enterprise Segment Breakdown
  • Large Enterprise Network Security Forensics Segment-Market Engineering Measurements
  • Large Enterprise Network Security Forensics Unit Shipment and Revenue Forecast
  • Large Enterprise Network Security Forensics Market-Pricing Trends and Forecast
  • Large Enterprise Network Security Forensics Pricing Trends and Forecast Discussion
  • Large Enterprise Network Security Forensics Competitive Analysis-Market Share
  • Large Enterprise Network Security Forensics Segment-Competitive Environment
  • Competitive Environment
8. SMB thru Enterprise Segment Breakdown
  • SMB thru Enterprise Network Security Forensics Segment-Market Engineering Measurements
  • SMB thru Enterprise Network Security Forensics Unit Shipment and Revenue Forecast
  • SMB thru Enterprise Network Security Forensics Market-Pricing Trends and Forecast
  • SMB thru Enterprise Network Security Forensics Pricing Trends and Forecast Discussion
  • SMB thru Enterprise Network Security Forensics Competitive Analysis-Market Share
  • SMB Network Security Forensics Segment-Competitive Environment
  • Competitive Environment
9. The Last Word
  • The Last Word-Predictions
  • The Last Word-Recommendations
  • Legal Disclaimer
10. Vendor Profiles
  • Vendor Profile: Blue Coat Systems, Inc.
  • Vendor Profile: FireEye
  • Vendor Profile: IBM
  • Vendor Profile: Lancope
  • Vendor Profile: LogRhythm
  • Vendor Profile: NetFort
  • Vendor Profile: NIKSUN
  • Vendor Profile: Novetta
  • Vendor Profile: PacketSled
  • Vendor Profile: PacketSled – Screenshot (Interactive Dashboard)
  • Vendor Profile: PacketSled – Screenshot (Investigator)
  • Vendor Profile: RSA Security Analytics
  • Vendor Profile: Savvius
  • Vendor Profile: Viavi Solutions
11. Appendix
  • Market Engineering Methodology
  • Market Engineering Measurements
  • Additional Sources of Information on Study Topic Area
  • Partial List of Companies Interviewed
  • List of Companies Included in “Others”
  • Learn More-Next Steps
Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
- Blue Coat Systems, Inc.
- FireEye
- IBM
- Lancope
- LogRhythm
- NIKSUN
- NetFort
- Novetta
- PacketSled
- PacketSled – Screenshot (Interactive Dashboard)
- PacketSled – Screenshot (Investigator)
- RSA Security Analytics
- Savvius
- Viavi Solutions
Note: Product cover images may vary from those shown
Adroll
adroll