Cybersecurity Technologies & Market - Focus on Europe - 2017-2022

  • ID: 4173023
  • Report
  • Region: Europe
  • 386 pages
  • Homeland Security Research Corporation
1 of 3

Cyber-attacks against European targets are becoming increasingly more frequent and more sophisticated, pushing existing security capabilities to the limit. New solutions and the rapid expansion of networks and services indicate that this information overload will only worsen.

Considering the economic and business implications of cyber-attacks, it has now become mandatory for the Europeans to significantly increase their investments in state-of-the-art cybersecurity technologies, solutions and outsourced services to detect, prevent, analyze, and resolve the epidemics of cyber-crime and cyber-terror.

The Cyber Security report presents:

A. Market data – analyzed via 2 independent key perspectives:
With a highly-fragmented market, we address the "money trail" (each dollar spent is analyzed and crosschecked via 2 orthogonal viewpoints):
18 national markets:

  • UK
  • France
  • Netherlands
  • Belgium
  • Sweden
  • Norway
  • Finland
  • Denmark
  • Germany
  • Austria
  • Switzerland
  • Italy
  • Spain
  • Poland
  • Hungary
  • Czech Republic
  • Russia
  • Rest of Europe

3 Revenue source markets:

  • Products sales
  • Aftersales revenues (maintenance & upgrades)
  • Other revenues (consulting, planning, training, contracted services and government funded R&D)

B. European cybersecurity market analysis:

  • Business opportunities and challenges
  • Cybersecurity market SWOT analysis
  • Market dynamics
  • Market drivers and inhibitors

C. Dozens of European cybersecurity legislation and standards

D. Current & emerging technologies & services, key facts, sector background and analysis of the following 15 cybersecurity sectors:

1. Endpoint Security
2. Identity and Access Management
3. Mobile Enterprise Management
4. Mobile Security
5. Security Information and Event Management (SIEM)
6. Content Security
7. Malware Mitigation
8. Data Loss Prevention (DLP)
9. Datacenter Security
10. Firewalls
11. Next Generation Firewalls
12. IDS/IPS
13. Unified Threat Management (UTM)
14. Cloud-Based Services
15. Vulnerability/Risk Management & Managed Security Services

READ MORE
Note: Product cover images may vary from those shown
2 of 3

1 Executive Summary
2 European Cybersecurity Market Background
2.1 The European Cybersecurity Eco-System
2.1.1 European Cyberterrorism & Cybercrime
2.1.2 Cyber Warfare
2.1.3 The European Cybersecurity Policy
2.2 Cybersecurity Standards and Regulations
2.2.1 ISO 27001 and 27002 Standards
2.2.2 Standard of Good Practice
2.2.3 NERC Standards
2.2.4 NIST Standards
2.2.5 RFC 2196 Standards
2.2.6 ISA/IEC-62443 Standards
2.2.7 Planned and Published ISA-62443 IACS Security Standards.
2.2.7.1 ISA-62443 Standards
2.2.7.2 General Standards
2.2.8 Policy and Procedure Standards
2.2.9 System Integrator Standards
2.2.10 Component Provider Standards
2.2.11 ISA Security Compliance Institute
2.2.12 The U.K. IASME Standards
2.2.13 Payment Card Industry Security Standard (PCI DSS)
2.2.13.1 PCI DSS of Major Debit, Credit, Prepaid, E-Purse, ATM, and POS Cards
2.2.13.2 PCI DSS Requirements
2.2.13.3 U.S. Mandated Compliance
2.2.13.4 Compliance and Wireless LANs
2.2.14 IT Security Standards
2.2.14.1 ISO 27000 Series of Standards
2.2.15 The EU Banking and Financial Services Cyber-Security Regulations
2.2.15.1 EU financial services Regulations
2.2.15.2 Financial Services Legislation in Force
2.2.15.3 FATF International financial services Standard
2.2.15.4 Cybercrime, Money Laundering & Terrorist Financing Pipeline Legislation
2.2.16 Digital Identity Management Standards
2.3 Recommendations for Cybersecurity Managers
2.4 European Cybersecurity Challenges
2.5 Cybersecurity Risk Assessment
2.6 The International Treaty on Cybercrime
3 Cybersecurity Technologies
3.1 Endpoint Security: Technology & Market Background
3.2 Identity & Access Management: Technology & Market Background
3.3 Mobile Enterprise Management: Technology & Market Background
3.4 Mobile Security: Technology & Market Background
3.5 Security Information & Event Management (SIEM): Technology & Market Background
3.6 Security Information Overload
3.6.1 Overview
3.6.2 Example: IBM QRadar Security Intelligence Platform
3.7 Content Security: Technology & Market Background
3.8 Malware Mitigation: Technology & Market Background
3.8.1 Overview
3.8.2 Market Drivers
3.9 Data Loss Prevention: Technology & Market Background
3.9.1 Overview
3.9.2 Market Drivers
3.1 Datacenter Security: Technology & Market Background
3.10.1 Overview
3.10.2 Market Drivers
3.11 Firewalls: Technologies & Market Background
3.11.1 Overview
3.11.2 Next Generation Firewall: Technology & Market Background
3.12 Intrusion Prevention Systems & Intrusion Detection (IDS/IPS) Technologies & Market Background
3.12.1 Overview
3.12.2 IDS/IPS Market Ecosystem
3.12.3 Market Drivers
3.13 Unified Threat Management (UTM) Technology & Market Background
3.13.1 Overview
3.13.2 UTM Market Drivers
3.14 Cloud-Based Services: Technology & Market Background
3.14.1 Hybrid Cloud
3.14.2 Market Drivers
3.15 Vulnerability/Risk Management & Managed Security Services & Market Background
3.15.1 Denial of Service
3.15.2 Deliberate Manipulation of Information
3.15.3 Detection of Unauthorized Activity
3.15.4 Anti-Malware Cybersecurity
3.15.5 Privacy Enhanced Technologies (PETs)
3.15.6 Digital Identity Management (DIM)
3.15.7 Digital Identity Management Services
3.15.8 Digital Identity Management Identity Federation
3.15.9 Digital Identity Management System Competences
3.15.10 European Digital Identity Management Research
4 Cybersecurity Business Opportunities
5 Cybersecurity: SWOT Analysis
5.1 Strengths
5.2 Weaknesses
5.3 Opportunities
5.4 Threats
6 Barriers to New Entry, Supplier Power, Buyer Power and Barriers to Substitution
7 Cybersecurity Market Drivers
8 Cybersecurity Market Inhibitors
9 European Cybersecurity Market – 2015-2022
9.1 European Cybersecurity Market by Country – 2015-2022
9.1.1 National Markets & Forecast
9.1.2 Market Breakdown by Country - 2015-2022
9.2 Market by Revenue Source – 2015-2022
9.2.1 Market & Forecast
9.2.2 Market Breakdown Revenue Source - 2015-2022
10 National Cybersecurity Markets – 2015-2022
10.1 UK Cybersecurity Market – 2015-2022
10.2 France Cybersecurity Technologies Market – 2015-2022
10.3 Belgium Cybersecurity Technologies Market – 2015-2022
10.4 Sweden, Norway, Finland & Denmark Cybersecurity Technologies Market – 2015-2022
10.5 Germany Cybersecurity Technologies Market – 2015-2022
10.6 Austria & Switzerland: Cybersecurity Technologies Market – 2015-2022
10.7 Italy Cybersecurity Technologies Market – 2015-2022
10.8 Spain Cybersecurity Technologies Market – 2015-2022
10.9 Poland Cybersecurity Technologies Market – 2015-2022
10.1 Hungary & Czech Republic: Cybersecurity Technologies Market – 2015-2022
10.11 Russia Cybersecurity Technologies Market – 2015-2022
10.12 Rest of Europe: Cybersecurity Technologies Market – 2015-2022
11 Appendix A: European Homeland Security & Public Safety Related Product Standards
11.1 European Committee for Standardization (CEN)
11.2 European Homeland Security and Public Safety Standards
11.3 EU Buildings & Perimeter Security Standards & Specifications
12 Appendix B: The European Union Challenges and Outlook
12.1 Summary
12.2 The EU Economy
12.3 Anti-EU Trends
12.4 The EU Frail Leadership and Poor Strategic Vision
12.5 Migration and Refugee Crisis
12.6 European Security Worries
12.7 Terrorism
12.8 EU Future Scenarios
13 Appendix C: Europe Migration Crisis & Border Security
13.1 Introduction
13.2 EU Migration: Background
13.3 The European Borders Security
13.3.1 Introduction
13.3.2 The Schengen Area
13.3.3 The European Integrated Border Management System (IBM)
13.3.4 The EU Smart Borders Initiative
13.3.5 The Schengen Zone: Passenger Name Record (PNR) System Outlook
13.3.6 Temporary Reintroduction of Border Control
13.4 European Smart & Secure Border Market
14 Appendix D: Abbreviations
15 Scope, Methodology & Disclaimer
15.1 Research Scope
15.2 Research Methodology
16 Disclaimer & Copyright

Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Note: Product cover images may vary from those shown
Adroll
adroll