+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Cyber Security: Technologies and Global Markets

  • ID: 5031120
  • Report
  • May 2020
  • Region: Global
  • 175 Pages
  • BCC Research

FEATURED COMPANIES

  • BAE Systems Inc.
  • Cisco Systems Inc.
  • Fortinet Inc.
  • Kaspersky Lab
  • Northrop Grumman Corp.
  • Sophos Plc
  • MORE

Report Scope:

The scope of the report encompasses various technologies used in cyber security applications and deployment types. The market is divided on the basis of enterprise size. Applications for the market are segmented into banking and financial services institutions, defense and intelligence, healthcare, retail, IT and telecommunications, government, and others, which includes the education and manufacturing sectors. The present cyber security market offers an opportunity to stakeholders largely because of a surge in cloud-based services and the increased use of the internet for online financial transactions.

This report highlights different solutions in the cyber security market, which include identity and access management (IAM), encryption, data loss protection (DLP), firewall, antivirus and antimalware, disaster recovery, risk and compliance management, and other solutions. Other types of solutions include unified threat management (UTM), distributed denial of service mitigation, and web filtering. In addition, the report also offers the major regional analyses of North America, Europe, the Middle East, Africa, and the Asia-Pacific. The estimated and forecast market revenue considered in this report is the summation of prices for software, hardware, and subscription services.

Report Includes:
75 data tables and 39 additional tables
An in-depth analysis of the global market for cyber security technologies within the industry
Analyses of the global market trends, with data corresponding to market size from 2018 and 2019, and projections of compound annual growth rates (CAGRs) through 2024
Discussion of major market drivers, current trends and opportunities, challenges and restraints, and adoption of managed security service providers
Information on value chain analysis providing a systematic study of the key intermediaries involved, which could further assist stakeholders in formulating appropriate strategies
Competitive landscape covering leading IT security solution providers; their market share analysis and key strategies adopted by these companies within the global cyber security market
Impact of the COVID-19 pandemic outbreak on the global financials, cyber threat, and cyber security solutions
Descriptive company profiles of major vendor companies, including BAE Systems Inc., Cisco Systems Inc., Dell Technology, HP, IBM Corp., Lockheed Martin, Northrop Grumman Corp., and Thales Group

Note: Product cover images may vary from those shown

FEATURED COMPANIES

  • BAE Systems Inc.
  • Cisco Systems Inc.
  • Fortinet Inc.
  • Kaspersky Lab
  • Northrop Grumman Corp.
  • Sophos Plc
  • MORE

Chapter 1 Introduction

  • Cyber Security Goals
  • Study Goals and Objectives
  • Reasons for Doing This Study
  • Scope of Report
  • Research Methodology
  • Intended Audience
  • Analyst's Credentials
  • Custom Research
  • Related Reports

Chapter 2 Summary and Highlights

Chapter 3 Market Overview

  • Market Overview
  • Cyber Threats
  • Malware
  • Phishing
  • Password Attacks
  • Denial-of-Service Attacks and Distributed Denial-Of-Service Attacks
  • Man-In-The-Middle Attack
  • Drive-by Downloads
  • Malvertising
  • Rogue Software
  • Bring Your Own Device
  • Preventive Measures for Organizations
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
  • Mobile Security Management (MSM)
  • Life Cycle Analysis
  • Analysis of Computing Environment
  • Security Requirement
  • Designing Hardware and Software
  • Implementation of Design
  • Testing and Integration
  • Milestones in Cyber Security
  • Benefits of Cyber Security
  • Market Dynamics
  • Market Drivers
  • Market Restraints
  • Market Opportunities
  • Market Challenges
  • Impact of COVID-19
  • Financial Impact
  • Cyber Threat Landscape
  • Cyber Security Solutions

Chapter 4 Market Breakdown by Type

  • Introduction
  • Network Security
  • Ways to Mitigate Network Security Threats
  • Endpoint Security
  • Types of Endpoint Security
  • Wireless Security
  • Types of Wireless Security
  • Content Security
  • Cloud Security
  • Types of Cloud Security
  • Application Security
  • Types of Application Security

Chapter 5 Market Breakdown by Solution

  • Introduction
  • Identity and Access Management (IAM)
  • Identity and Access Management Market by Component
  • Encryption
  • Encryption Market by Component
  • Data Loss Protection
  • Firewall
  • Firewall Market by Component
  • Antivirus and Antimalware
  • Disaster Recovery
  • Risk and Compliance Management
  • Others
  • Web Filtering
  • Distributed Denial of Service Mitigation
  • Unified Threat Management

Chapter 6 Market Breakdown by Deployment Mode

  • Introduction
  • On-premise
  • Cloud
  • Layers of Security

Chapter 7 Market Breakdown by Organization Size

  • Introduction
  • Large Enterprises
  • SMEs

Chapter 8 Market Breakdown by End User

  • Introduction
  • Banking and Financial Institutions
  • Telecom and IT
  • Defense and Intelligence
  • Retail
  • Healthcare
  • Government
  • Others
  • Manufacturing
  • Education
  • Transportation

Chapter 9 Market Breakdown by Region

  • Introduction
  • North America
  • Europe
  • Asia-Pacific
  • Rest of the World

Chapter 10 Competitive Analysis

  • Market Share Analysis
  • Key Market Developments Related to COVID-19

Chapter 11 Company Profiles

  • BAE Systems Inc.
  • Barracuda Networks Inc.
  • Booz Allen Hamilton Holding Corp.
  • Check Point Software Technologies
  • Cisco Systems Inc.
  • Computer Science Corp.
  • Dell Inc. (Sonicwall Inc.)
  • Fortinet Inc.
  • Hewlett Packard Enterprise Co.
  • International Business Machine (IBM) Corp.
  • Intel Corp.
  • Kaspersky Lab
  • Lockheed Martin
  • Northrop Grumman Corp.
  • Palo Alto Networks Inc.
  • Sophos Plc
  • Symantec Corp. (Norton Lifelock Inc.)
  • Thales Group
  • Trend Micro

Chapter 12 Appendix: List of Acronyms

List of Tables
Summary Table: Global Market for Cyber Security, by Region, Through 2024
Table 1: Global Market for Cyber Security, by Type, Through 2024
Table 2: Global Market for Network Security, by Region, Through 2024
Table 3: Global Market for Endpoint Security, by Region, Through 2024
Table 4: Global Market for Wireless Security, by Region, Through 2024
Table 5: Global Market for Content Security, by Region, Through 2024
Table 6: Global Market for Cloud Security, by Region, Through 2024
Table 7: Global Market for Application Security, by Region, Through 2024
Table 8: Global Market for Cyber Security, by Solution, Through 2024
Table 9: Global Market for Identity and Access Management in Cyber Security, by Region, Through 2024
Table 10: Global Market for Encryption in Cyber Security, by Region, Through 2024
Table 11: Global Market for Data Loss Protection in Cyber Security, by Region, Through 2024
Table 12: Global Market for Firewalls in Cyber Security, by Region, Through 2024
Table 13: Global Market for Antivirus and Antimalware in Cyber Security, by Region, Through 2024
Table 14: Global Market for Disaster Recovery in Cyber Security, by Region, Through 2024
Table 15: Global Market for Risk and Compliance in Cyber Security, by Region, Through 2024
Table 16: Global Market for Other Applications in Cyber Security, by Region, Through 2024
Table 17: Global Market for Cyber Security, by Deployment Mode, Through 2024
Table 18: Global Market for On-premise Deployment of Cyber Security, by Region, Through 2024
Table 19: Global Market for Cloud Deployment of Cyber Security, by Region, Through 2024
Table 20: Global Market for Cyber Security, by Organization Size, Through 2024
Table 21: Global Market for Cyber Security for Large Enterprises, by Region, Through 2024
Table 22: Global Market for Cyber Security for SMEs, by Region, Through 2024
Table 23: Global Market for Cyber Security, by End User, Through 2024
Table 24: Global Market for Cyber Security for Banking and Financial Institutions, by Region, Through 2024
Table 25: Global Market for Cyber Security for the Telecom and IT industry, by Region, Through 2024
Table 26: Global Market for Cyber Security in Defense and Intelligence, by Region, Through 2024
Table 27: Global Market for Cyber Security in the Retail Industry, by Region, Through 2024
Table 28: Global Market for Cyber Security in the Healthcare Industry, by Region, Through 2024
Table 29: Global Market for Cyber Security in Government, by Region, Through 2024
Table 30: Global Market for Cyber Security for Other Types of End Users, by Region, Through 2024
Table 31: North American Market for Cyber Security, by Type, Through 2024
Table 32: North American Market for Cyber Security, by Application, Through 2024
Table 33: North American Market for Cyber Security, by Deployment Mode, Through 2024
Table 34: North American Market for Cyber Security, by Organization Size, Through 2024
Table 35: North American Market for Cyber Security, by End User, Through 2024
Table 36: North American Market for Cyber Security, by Country, Through 2024
Table 37: European Market for Cyber Security, by Type, Through 2024
Table 38: European Market for Cyber Security, by Application, Through 2024
Table 39: European Market for Cyber Security, by Deployment Mode, Through 2024
Table 40: European Market for Cyber Security, by Organization Size, Through 2024
Table 41: European Market for Cyber Security, by End User, Through 2024
Table 42: European Market for Cyber Security, by Country/Region, Through 2024
Table 43: Asia-Pacific Market for Cyber Security, by Type, Through 2024
Table 44: Asia-Pacific Market for Cyber Security, by Application, Through 2024
Table 45: Asia-Pacific Market for Cyber Security, by Deployment Mode, Through 2024
Table 46: Asia-Pacific Market for Cyber Security, by Organization Size, Through 2024
Table 47: Asia-Pacific Market for Cyber Security, by End User, Through 2024
Table 48: Asia-Pacific Market for Cyber Security, by Country/Region, Through 2024
Table 49: Country Data Breaches Throughout Asia-Pacific, 2018
Table 50: Rest of the World Market for Cyber Security, by Type, Through 2024
Table 51: Rest of the World Market for Cyber Security, by Application, Through 2024
Table 52: Rest of the World Market for Cyber Security, by Deployment Mode, Through 2024
Table 53: Rest of the World Market for Cyber Security, by Organization Size, Through 2024
Table 54: Rest of the World Market for Cyber Security, by End User, Through 2024
Table 55: Rest of the World Market for Cyber Security, by Country/Region, Through 2024
Table 56: Key COVID-19 Strategies Used by Companies in the Global Cyber Security Market
Table 57: BAE Systems Inc.: Business Snapshot
Table 58: BAE Systems Inc.: Net Revenue, 2016-2018
Table 59: BAE Systems Inc.: Business Developments
Table 60: Barracuda Networks Inc.: Business Snapshot
Table 61: Barracuda Networks Inc.: Net Revenue, 2016 and 2017
Table 62: Barracuda Networks Inc.: Business Developments
Table 63: Booz Allen Hamilton Holding Corp.: Business Snapshot
Table 64: Booz Allen Hamilton Holding Corp.: Net Revenue, 2017-2019
Table 65: Booz Allen Hamilton Holding Corp.: Business Developments
Table 66: Check Point Software Technologies: Business Snapshot
Table 67: Check Point Software Technologies: Net Revenue, 2016-2018
Table 68: Check Point Software Technologies: Business Developments
Table 69: Cisco Systems Inc.: Business Snapshot
Table 70: Cisco Systems Inc.: Net Revenue, 2017-2019
Table 71: Cisco Systems Inc.: Business Developments
Table 72: DXC Technology: Business Snapshot
Table 73: DXC Technology: Net Revenue, 2017-2019
Table 74: DXC Technology: Business Developments
Table 75: Dell Technology: Business Snapshot
Table 76: Dell Technology: Net Revenue, 2017-2019
Table 77: Dell Technology: Business Developments
Table 78: Fortinet Inc.: Business Snapshot
Table 79: Fortinet Inc.: Net Revenue, 2017-2019
Table 80: Fortinet Inc.: Business Developments
Table 81: HP: Business Snapshot
Table 82: HP: Net Revenue, 2017-2019
Table 83: HP: Business Strategies
Table 84: IBM Corp.: Business Snapshot
Table 85: IBM Corp.: Net Revenue, 2017-2019
Table 86: IBM Corp.: Business Developments
Table 87: Intel Corp.: Business Snapshot
Table 88: Intel Corp.: Net Revenue, 2017-2019
Table 89: Intel Corp.: Business Developments
Table 90: Kaspersky Lab: Business Snapshot
Table 91: Kaspersky Lab: Net Revenue, 2019
Table 92: Kaspersky Lab: Business Developments
Table 93: Lockheed Martin: Business Snapshot
Table 94: Lockheed Martin: Net Revenue, 2017-2019
Table 95: Lockheed Martin: Business Developments
Table 96: Northrop Grumman Corp.: Business Snapshot
Table 97: Northrop Grumman Corp.: Net Revenue, 2016-2018
Table 98: Northrop Grumman Corp.: Business Developments
Table 99: Palo Alto Networks Inc.: Business Snapshot
Table 100: Palo Alto Networks Inc.: Net Revenue, 2017-2019
Table 101: Palo Alto Networks Inc.: Business Developments
Table 102: Sophos PLC: Business Snapshot
Table 103: Sophos PLC: Net Revenue, 2017-2019
Table 104: Sophos PLC: Business Developments
Table 105: Symantec Corp.: Business Snapshot
Table 106: Symantec Corp.: Net Revenue, 2016-2018
Table 107: Symantec Corp.: Business Developments
Table 108: Thales Group: Business Snapshot
Table 109: Thales Group: Net Revenue, 2017-2019
Table 110: Thales Group: Business Developments
Table 111: Trend Micro: Business Snapshot
Table 112: Trend Micro: Net Revenue, 2017-2019
Table 113: List of Acronyms

List of Figures
Summary Figure: Global Market for Cyber Security, by Region, 2018-2024
Figure 1: Types of Cyber Threats
Figure 2: Types of Malware
Figure 3: Types of Password Attacks
Figure 4: Types of MITM Attacks
Figure 5: Life Cycle Analysis for Cyber Security
Figure 6: History of Cyber Security
Figure 7: Benefits of Cyber Security
Figure 8: Market Dynamics of the Cyber Security Market
Figure 9: Global Market for Cyber Security, by Type, 2018-2024
Figure 10: Global Market for Cyber Security, by Solution, 2018-2024
Figure 11: Global Market for Cyber Security, by Deployment Mode, 2018-2024
Figure 12: Global Market for Cyber Security, by Organization Size, 2018-2024
Figure 13: Global Market for Cyber Security, by End User, 2018-2024
Figure 14: Global Market for Cyber Security, by Region
Figure 15: Global Market for Cyber Security, by Region, 2018-2024
Figure 16: Global Share of the Market for Cyber Security, by Vendor, 2019
Figure 17: BAE Systems Inc.: Sales Share, by Business Segment, 2018
Figure 18: BAE Systems Inc.: Sales Share, by Region, 2018
Figure 19: BAE Systems Inc.: SWOT Analysis
Figure 20: Barracuda Networks Inc.: Sales Share, by Business Segment, 2017
Figure 21: Barracuda Networks Inc.: SWOT Analysis
Figure 22: Booz Allen Hamilton Holding Corp.: Sales Share, by Contract Type, 2019
Figure 23: Booz Allen Hamilton Holding Corp.: Sales Share, by Customer Type, 2019
Figure 24: Booz Allen Hamilton Corp.: SWOT Analysis
Figure 25: Check Point Software Technologies: Sales Share, by Business Segment, 2018
Figure 26: Check Point Software Technologies: Sales Share, by Region, 2018
Figure 27: Check Point Software Technologies: SWOT Analysis
Figure 28: Cisco Systems Inc.: Sales Share, by Business Segment, 2019
Figure 29: Cisco Systems Inc.: Sales Share, by Region, 2018
Figure 30: Cisco Systems Inc.: SWOT Analysis
Figure 31: DXC Technology: Sales Share, by Business Segment, 2019
Figure 32: DXC Technology: Sales Share, by Region, 2019
Figure 33: Computer Science Corp.: SWOT Analysis
Figure 34: Dell Technology: Sales Share, by Business Segment, 2019
Figure 35: Dell Technology: Sales Share, by Region, 2019
Figure 36: Dell Technology Inc.: SWOT Analysis
Figure 37: Fortinet Inc.: Sales Share, by Business Segment, 2019
Figure 38: Fortinet Inc.: Sales Share, by Region, 2019
Figure 39: Fortinet Inc. SWOT Analysis
Figure 40: HP: Sales Share, by Business Segment, 2019
Figure 41: HP: Sales Share, by Region, 2019
Figure 42: HP: SWOT Analysis
Figure 43: IBM Corp.: Sales Share, by Business Segment, 2019
Figure 44: IBM Corp.: Sales Share, by Region, 2019
Figure 45: IBM SWOT Analysis
Figure 46: Intel Corp.: Sales Share, by Business Segment, 2019
Figure 47: Intel Corp.: Sales Share, by Region, 2019
Figure 48: Intel Corp.: SWOT Analysis
Figure 49: Kaspersky Lab: SWOT Analysis
Figure 50: Lockheed Martin: Sales Share, by Business Segment, 2019
Figure 51: Lockheed Martin: Sales Share, by Region, 2019
Figure 52: Lockheed Martin: SWOT Analysis
Figure 53: Northrop Grumman Corp.: Sales Share, by Business Segment, 2018
Figure 54: Northrop Grumman Corp.: Sales Share, by Region, 2019
Figure 55: Northrop Grumman Corp.: SWOT Analysis
Figure 56: Palo Alto Networks Inc.: Sales Share, by Business Segment, 2019
Figure 57: Palo Alto Networks Inc.: Sales Share, by Region, 2019
Figure 58: Palo Alto Networks Inc.: SWOT Analysis
Figure 59: Sophos PLC: Sales Share, by Business Segment, 2019
Figure 60: Sophos PLC: Sales Share, by Region, 2019
Figure 61: Sophos PLC: SWOT Analysis
Figure 62: Symantec Corp.: Sales Share, by Business Segment, 2018
Figure 63: Symantec Corp.: Sales Share, by Region, 2019
Figure 64: Symantec Corp.: SWOT Analysis
Figure 65: Thales Group: Sales Share, by Region, 2019
Figure 66: Thales Group: SWOT Analysis
Figure 67: Trend Micro: Sales Share, by Region, 2019
Figure 68: Trend Micro: SWOT Analysis

Note: Product cover images may vary from those shown

Loading
LOADING...

FEATURED COMPANIES

  • BAE Systems Inc.
  • Cisco Systems Inc.
  • Fortinet Inc.
  • Kaspersky Lab
  • Northrop Grumman Corp.
  • Sophos Plc
  • MORE

Cyber security challenges are growing along with the expansion of the internet—actually, the hacking world is growing faster. Cyber security is the process of protecting internet-connected systems, including hardware, software and data, from cyberattack. Security which is designed to maintain the confidentiality, integrity and availability of data is a subset of cyber security.

Cyber security involves protecting information and systems from major cyber threats. These threats take many forms. As a result, keeping pace with cyber security strategy and operations can be a challenge, particularly in government and enterprise networks where, in their most innovative form, cyber threats often take aim at secret, political and military assets of a nation, or its people.

Some of the common threats are:

  • Cyber terrorism: The innovative use of information technology by terrorist groups to further their political agenda. This can include attacks on networks, computer systems and telecommunication infrastructures.
  • Cyber warfare: This involves nation-states using information technology to cause other national networks damage. In the U.S. and other countries, cyber warfare has been acknowledged as the fifth domain of warfare. Cyber warfare attacks are primarily executed by hackers who are well-trained in the use of computer networks and operate under the favorable support of nation-states. Rather than closing a target’s key networks, a cyber warfare attack may compromise valuable data, degrade communications, impair such infrastructural services as transportation and medical services, or interrupt commerce.
  • Cyber espionage: The practice of using information technology to obtain secret information without permission from its owners or holders. This is most often used to gain strategic, economic and military advantage, and is conducted using cracking techniques and malware.

Version 1.1 of the Framework for Improving Critical Infrastructure was released by National Institute of Standards and Technology (NIST), U.S. in April 2018. The voluntary cyber security framework, developed for use in the banking, communications, defense and energy industries, can be adopted by all sectors, including federal and state governments. President Donald Trump issued an executive order mandating that federal agencies adopt the NIST Cyber security Framework (NIST CSF) in May 2017.

In terms of region, Asia-Pacific is the emerging cyber security market, while the U.S. and western Europe markets are mature. Some of the part of Asia-Pacific including Japan, India and China are showing moderate cyber security market maturity.

Note: Product cover images may vary from those shown
  • BAE Systems Inc.
  • Barracuda Networks Inc.
  • Booz Allen Hamilton Holding Corp.
  • Check Point Software Technologies
  • Cisco Systems Inc.
  • Computer Science Corp.
  • Dell Inc. (Sonicwall Inc.)
  • Fortinet Inc.
  • Hewlett Packard Enterprise Co.
  • Intel Corp.
  • International Business Machine (IBM) Corp.
  • Kaspersky Lab
  • Lockheed Martin
  • Northrop Grumman Corp.
  • Palo Alto Networks Inc.
  • Sophos Plc
  • Symantec Corp. (Norton Lifelock Inc.)
  • Thales Group
  • Trend Micro
Note: Product cover images may vary from those shown
Adroll
adroll