+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Cybersecurity - Thematic Research

  • ID: 4592076
  • Report
  • June 2020
  • Region: Global
  • 57 pages
  • GlobalData

FEATURED COMPANIES

  • Accenture
  • CGI
  • Dell
  • HCL Technologies
  • NTT
  • Securonix
Summary

Today, organizations are plagued by cyberattacks that are advanced, persistent, and which can wreck both operations and reputation.

Companies manage an array of assets, including infrastructure, applications, managed and unmanaged endpoints, mobile devices, and cloud services, all of which can be attacked. Attack types include phishing (the most popular) and ransomware (becoming the most lucrative).

The need for security, along with the idea that innovation is critical to counter the evolving threat landscape, will drive cybersecurity spending despite COVID-19’s economic impact. Companies worldwide are expected to spend $115bn on security in 2020, according to the publisher's figures. The global security industry will be worth nearly $238bn by 2030, having grown at a compound annual growth rate (CAGR) of 6.4% between 2019 and 2030.

Scope
  • This report provides an overview of the cybersecurity theme.
  • It identifies the key trends impacting growth of the theme over the next 12 to 24 months, split into three categories: technology trends, macroeconomic trends, and regulatory trends.
  • It includes a comprehensive industry analysis, including up-to-date forecasts for global security revenues to 2030.
  • The value chain breaks down the cybersecurity organizational stack and identifies the leading vendors across 22 technology segments, including cloud security, network security, mobile security, and managed security services.
Reasons to Buy
  • We are currently in the third wave of the cybersecurity industry, and it is the most challenging in terms of technology and scale. The enterprise attack surface, already massive, is growing rapidly with the forced move to greater remote working in 2020.
  • To counter this, cyber-aware organizations must adopt cybersecurity measures that allow them to be resilient, vigilant, and secure, that keep their employees and partners identified and trusted, and allow the organization to remain risk-aware. In general, organizations fail to understand the landscape they are trying to defend. Consequently, defensive decisions aren’t taken, and actions are not prioritized, leaving enterprises open to compromise.
  • This report is an invaluable guide to the cybersecurity theme, providing detailed analysis of the leading vendors and insights how companies can tackle the threats they face.
Note: Product cover images may vary from those shown

FEATURED COMPANIES

  • Accenture
  • CGI
  • Dell
  • HCL Technologies
  • NTT
  • Securonix
  • Players
  • Technology briefing
  • Trends
  • Industry analysis
  • Value chain
  • Companies
  • Sector scorecards
  • Glossary
  • Further reading
  • Appendix: Thematic research methodology
Note: Product cover images may vary from those shown
  • Microsoft
  • IBM
  • Trend Micro
  • Cisco
  • Darktrace
  • Broadcom
  • Dell
  • Palantir
  • Fortinet
  • Raytheon Technologies
  • Palo Alto Networks
  • BAE Systems
  • SecureWorks
  • Sophos
  • Verizon
  • Accenture
  • Verisign
  • Zscaler
  • F5 Networks
  • ProofPoint
  • Mobile Iron
  • AT&T
  • Tata Consultancy Services
  • Orange
  • Thales
  • Wipro
  • Check Point Software
  • Atos
  • Korea Telecom
  • Qualys
  • Blackberry
  • Softbank
  • Etisalat
  • Infosys
  • SingTel
  • Cognizant
  • Okta
  • HCL Technologies
  • Capgemini
  • SAIC
  • DXC Tech
  • CyberArk Software
  • Rapid7
  • Micro Focus
  • Deutsche Telekom
  • Telstra
  • China Telecom
  • Akamai
  • BT
  • Juniper Networks
  • Tech Mahindra
  • FireEye
  • NTT
  • Telefonica
  • China Unicom
  • Centurylink
  • F-Secure
  • CGI
  • Securonix
  • Chunghwa Telecom
  • Tieto
  • ADP
  • Mphasis
  • EPAM Systems
  • Sopra Steria
  • Conduent
  • Computacenter
  • Genpact
  • Indra
  • Neusoft
  • Fujitsu
Note: Product cover images may vary from those shown
Adroll
adroll