+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity - Thematic Intelligence

  • PDF Icon

    Report

  • 73 Pages
  • March 2023
  • Region: Global
  • GlobalData
  • ID: 5775551
The tech industry is experiencing significant upheaval. Big Tech has made mass layoffs to cut costs, and cybersecurity companies are not immune. However, while IT budgets face scrutiny as companies cut discretionary spending, cybersecurity will remain a priority. Cyber risk is higher than ever, and the consequences of attacks are significant. According to Cybersecurity Ventures, global cybercrime will reach $10.5 trillion annually by 2025. Tackling this issue requires investment, and publisher forecasts that cybersecurity revenues will reach $344 billion worldwide by 2030.

Key Highlights

  • State-sponsored cyberattacks are likely to increase in 2023. The Russian invasion of Ukraine, a continuing trade war between the US and China, and high-profile elections are all catalysts for state-sponsored attacks.
  • Attacks on critical national infrastructure and supply chains will also increase in 2023. These are highly effective at causing large-scale disruption and long-lasting financial impact. In February 2023, US chipmaking equipment supplier MKS Instruments was affected by a ransomware attack that cost over $200 million in lost and delayed sales.
  • Remote working has remained popular post-pandemic, causing a distributed workforce and increasing risks. In 2023, more companies will work to adopt a zero-trust architecture and secure distributed endpoints to contain attacks and protect the entire corporate network. Companies like Google have already adopted a zero-trust architecture, while the US federal government is in the midst of a multi-year migration to zero trust. Other companies will follow this lead to support remote working.

Scope

  • This report provides an overview of the cybersecurity theme.
  • It identifies the key trends impacting growth of the theme over the next 12 to 24 months, split into three categories: technology trends, macroeconomic trends, and regulatory trends.
  • It includes comprehensive industry analysis, including market size forecasts for cybersecurity and analysis of patents, company filings, hiring, and social media trends.
  • It contains details of M&A deals driven by the cybersecurity theme, and a timeline highlighting milestones in the development of cybersecurity.
  • The detailed value chain is split into three main areas: hardware, software, and services. The hardware segment includes chip-based security. The software segment includes identity management, network security, endpoint security, threat detection and response, cloud security, data security, email security, application security, unified threat management, and vulnerability management. The services segment includes managed security services, post-breach response services, and risk and compliance services.

Reasons to Buy

  • In a little over a decade, according to the World Economic Forum (WEF) Global Risks Report, cybercrime has moved from being a specialist crime to one of the most significant strategic risks facing the world today. This report provides an invaluable guide to this extremely disruptive theme. It includes comprehensive lists of the leading players across all aspects of the cybersecurity value chain, helping companies identify the right partners.
  • The report also includes a guide to the major threat actors and looks at the main types of cyberattack, from un-targeted attacks like phishing to targeted attacks like distributed denial of service (DDoS).

Table of Contents

  • Executive Summary
  • Players
  • Technology Briefing
  • Threat actors
  • Types of cyberattack
  • Stages of an attack
  • Trends
  • Technology trends
  • Macroeconomic trends
  • Regulatory trends
  • Industry Analysis
  • Market size and growth forecasts
  • Timeline
  • Signals
  • M&A trends
  • Venture financing trends
  • Patent trends
  • Company filing trends
  • Hiring trends
  • Value Chain
  • Cybersecurity hardware
  • Cybersecurity software
  • Cybersecurity services
  • Companies
  • Public companies
  • Private companies
  • Sector Scorecards
  • Enterprise security software sector scorecard
  • IT services sector scorecard
  • Glossary
  • Further Reading
  • Our Thematic Research Methodology
  • About the Publisher
  • Contact the Publisher

Companies Mentioned (Partial List)

A selection of companies mentioned in this report includes, but is not limited to:

  • 1Password
  • Accenture
  • Airbus
  • Akamai
  • Alert Logic
  • Alibaba
  • Amazon
  • AMD
  • Analog Devices
  • AnyVision
  • Appgate
  • Apple
  • Aqua Security
  • Arcon
  • Arm
  • AT&T
  • Atos
  • Aware
  • BAE Systems
  • Baidu
  • Barracuda Networks
  • BeyondTrust
  • BioEnable
  • Blackberry
  • BMC Helix
  • Broadcom
  • BT
  • Cadence Design Systems
  • Capgemini
  • Cato
  • Censornet
  • Check Point Software
  • Checkmarx
  • China Telecom
  • China Unicom
  • CipherCloud
  • Cisco
  • Clear Secure
  • Clearview
  • Cloudcheckr
  • Cloudera
  • Cloudflare
  • CloudPassage
  • CMITech
  • Code42
  • Cognitec
  • Cognizant
  • Contrast Security
  • CrowdStrike
  • CyberArk
  • Cyberbit
  • Cybereason
  • Cynet
  • D3 Security
  • Darktrace
  • Dashlane
  • Delinea
  • Dell
  • Deloitte
  • Deutsche Telekom
  • Duo Security
  • DXC Technology
  • ekey
  • Equifax
  • Ermetic
  • Exabeam
  • Extreme
  • EY
  • Eyelock
  • F5
  • Forcepoint
  • Forescout
  • ForgeRock
  • Fortinet
  • Fortra
  • Foxpass
  • Fugue
  • Fujitsu
  • GitLab
  • Google
  • HCL Technologies
  • Herjavec Group
  • HID Global
  • Hitachi
  • Horizon Robotics
  • HPE
  • Huawei
  • IBM
  • Idemia
  • iFlytek
  • Illumio
  • Impulse
  • Infineon
  • Informatica
  • Infosys
  • Innovatrics
  • Intel
  • Invicti
  • iProov
  • Iris ID
  • IriusRisk
  • Ironscales
  • Ivanti
  • Juniper Networks
  • Kairos
  • KnowBe4
  • KPMG
  • KT
  • Lacework
  • LastPass
  • Lockheed Martin
  • LogMeIn
  • LogMeOnce
  • Logrhythm
  • Lookout
  • Lumen Technologies
  • ManageEngine
  • Marvell
  • Megvii
  • Micro Focus
  • Micron Semiconductor
  • Microsoft
  • Mimecast
  • NCC
  • Netskope
  • Nokia
  • NordPass
  • Northrop Grumman
  • NTT Data
  • NXP
  • NXT-ID
  • Okta
  • Onapsis
  • One Identity
  • OneLogIn
  • OneSpan
  • OneTrust
  • Oracle
  • Orange
  • Orca Security
  • Palantir
  • Palo Alto Networks
  • Perimeter 81
  • Ping Identity
  • Portnox
  • Proofpoint
  • PWC
  • Qualys
  • Rapid7
  • Raytheon Technologies
  • RedSeal
  • Renesas
  • Resolver
  • RSA
  • Ruckus
  • SAIC
  • SailPoint Technologies
  • Samsung Electronics
  • SecureAuth
  • SecureOne
  • Secureworks
  • Securonix
  • SenseTime
  • SentinelOne
  • Siemens
  • Singtel (Trustwave)
  • Skybox Security
  • Skyhigh Security
  • Snyk
  • SonicWall
  • Sophos
  • Splunk
  • ST Microelectronics
  • Sumo Logic
  • Swimlane
  • Synopsys
  • Tanium
  • Tata Consultancy Services
  • Tech Mahindra
  • Tech5
  • Telstra
  • Tenable
  • Tessian
  • Thales
  • ThreatConnect
  • Threatmodeler
  • TitanHQ
  • Trellix
  • Trend Micro
  • TrueFace.AI
  • Untangle
  • Veracode
  • Verizon
  • Versa
  • VMware
  • WatchGuard
  • Wipro
  • Yubico
  • Zscaler