A Compelling Vision

MessageLabs Journal

Subscribe to MessageLabs Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get MessageLabs Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


NEW YORK, April 16, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Global Cyber Security Industry

http://www.reportlinker.com/p0552759/Global-Cyber-Security-Industry.html...

This report analyzes the worldwide markets for Cyber Security in US$ million by the following Product Segments - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2009 through 2017. Also, a six-year historic analysis is provided for these markets. The report profiles 128 companies including many key and niche players such as AVG Technologies, BitDefender® LLC, CA Technologies, Inc., Check Point Software Technologies Ltd., Cisco Systems, Inc., IronPort, F-Secure Corporation, IBM Corporation, BigFix, Inc., IBM Internet Security Systems, Juniper Networks, Inc., Kaspersky Lab, McAfee, Inc., Microsoft Corporation, Panda Security, SafeNet, Inc., Sophos PLC, Utimaco Safeware AG, Symantec Corporation, MessageLabs Ltd., Trend Micro Incorporated., and WebSense, Inc. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based upon search engine sources in the public domain.

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

Study Reliability and Reporting Limitations I-1

Disclaimers I-2

Data Interpretation & Reporting Level I-3

Quantitative Techniques & Analytics I-3

Product Definitions and Scope of Study I-3

1. Application Security I-3

2. Content Security I-4

3. Data Security I-4

4. Endpoint Security I-4

5. Network Security I-4

6. Identity & Access Management I-4

7. Risk & Compliance Management I-4

8. Security Operations I-4

9. Consulting Services I-5

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW II-1

A Curtain Raiser II-1

Internet & the Modern Enterprise II-2

Magnitude of Cyber Crime II-3

Cyber Crime Trends At a Glance II-3

Table 1: World Malware on the Web (2010): Percentage Share

Breakdown of Leading Countries Hosting Malware on the Web

(includes corresponding Graph/Chart) II-4

Table 2: Percentage Share Breakdown of Leading Spam Relaying

Countries for the year 2010 (includes corresponding

Graph/Chart) II-5

Flurry of Social Networking Sites Foster Cyber Crime Activities II-5

Use of Cloud Services Spur Cyber Crime II-6

The Rise of Mobile Devices and Applications Bring Mobile

Computing Devices Under Attack II-6

Virtualization - Enhancing Security Concerns II-6

Stealthier Infiltration Methods - A Key Challenge II-7

Web Evolution Gives New Opportunities to Malware Writers II-8

Trojan: Fastest Growing Data-Stealing Malware II-8

Malware, Botnets, Scareware on the Rise II-8

Hactivism II-9

Current Market Conditions II-9

Recession Ups Cyber Crime Attacks II-9

Recession Magnifies the Business Case for Cyber Security II-10

Security - Scoring High on Corporate Agenda II-11

Regulatory Compliance Requirements Propel Cyber Security Market II-11

Competitive Landscape II-12

Consolidation Wave in Cyber Security Market II-12

Prime Market Stimulators & Inhibitors in a Capsule II-12

Market Drivers II-12

Market Growth Inhibitors II-13

Market Drivers & Trends II-13

Rising Internet Usage, Security Concerns Offer Opportunity

For Rapid Growth II-13

Spate of Security Breaches Creates Need for Advanced

Encryption Solutions II-13

Development of Advanced Security Solutions will Stimulate

Rapid Growth II-14

Integrated Security Appliances Gather Momentum II-14

Vendors Provide Integrated Solutions to Stay Ahead II-14

Internet Filtering Solutions: Protection at the Gateway II-15

Protecting Remote Work II-15

Low Footprint Anti-Virus - Prolonging Usable Life of PCs II-15

Availability of Low-priced or Free Competitive Products II-15

2. CYBER SECURITY - SEGMENTAL OVERVIEW II-16

Application Security Market II-16

Content Security Market II-16

Demand for Messaging Security (E-mail Scanning) Will Continue

to Rise II-16

Key Statistics II-17

Table 3: Global Web Security Market (2011E): Percentage Share

Breakdown of Revenues by Platform - Software, Appliance, and

SaaS (includes corresponding Graph/Chart) II-17

Table 4: Leading Vendors in the Global Web Security Market

(2010): Percentage Share Breakdown of Revenues for Websense,

Trend Micro, Microsoft, McAfee, Blue Coat, and Others

(includes corresponding Graph/Chart) II-17

Table 5: Leading Vendors in the Global Web Security Software

Market (2010): Percentage Share Breakdown of Revenues for

Websense, Trend Micro, Microsoft, McAfee, Check Point, and

Others (includes corresponding Graph/Chart) II-17

Table 6: Leading Vendors in the Global Web Security SaaS

Market (2010): Percentage Share Breakdown of Revenues for

Cisco/ScanSafe, Websense, Symantec, Trend Micro, Webroot, and

Others (includes corresponding Graph/Chart) II-18

Data Security Market II-18

PKI: A Promising Market II-18

E-mail Encryption Gathers Steam II-18

Endpoint Security Market II-19

Key Statistics II-19

Table 7: Leading Vendors in the Global Anti-Virus Software

Market (2010): Percentage Share Breakdown of Revenues for

Symantec, McAfee, Trend Micro, Kaspersky Lab, and Others

(includes corresponding Graph/Chart) II-19

Network Security Market II-20

UTM Appliances - A Whip on Blended Security Threats II-20

VPN Market on an Upswing II-20

Table 8: Leading Vendors in the Global Intrusion

Detection/Prevention Market (2010) - Percentage Share

Breakdown of Revenues for IBM Internet Security Systems,

Cisco Systems, McAfee Inc, Hewlett-Packard/TippingPoint,

Juniper Networks and Others (includes corresponding

Graph/Chart) II-21

Table 9: Leading Vendors in the Global Market for Network

Hardware Intrusion Detection/Prevention Software (2010) -

Percentage Share Breakdown of Revenues for IBM Internet

Security Systems, Cisco Systems,

Hewlett-Packard/TippingPoint, McAfee Inc, Juniper Networks,

and Others (includes corresponding Graph/Chart) II-21

Table 10: Leading Vendors in the Global Market for Host

Intrusion Detection/Prevention Software (2010) - Percentage

Share Breakdown of Revenues for Cisco, IBM Internet Security

Systems, McAfee, Symantec, and Others (includes

corresponding Graph/Chart) II-22

Identity & Access Management Solutions II-22

Need for Identity and Access Management II-22

Table 11: Global Identity and Access Management Market

(2009): Percentage Share Breakdown of Revenues by Operating

Environment (includes corresponding Graph/Chart) II-23

IAM: A Key Security Initiative for Enterprises II-23

An Integral Part of Corporate Strategy II-24

Growing Prominence of Identity-as-a-Service (IaaS) II-25

Risk & Compliance Management Market II-25

Security Operations Market II-25

Security Technologies Find Favor Among Organizations II-25

Compliance Requirements Boost Vulnerability Management Market II-26

Small and Mid-Sized Businesses - An Under-Penetrated Segment

for SVM II-26

Diverse Delivery Systems for SVM Products II-27

3. KEY END-USE MARKETS II-28

Banking and Finance II-28

Top Security Initiatives by Sector II-28

Regulatory Compliance: A High Priority for Financial

Institutions II-29

Growing Significance of Data Loss Prevention II-29

Lack of Alignment Between Business Objectives and Security II-29

Convergence Gains Strength II-29

Key Barriers in Cyber Security for Financial Services Sector II-30

Government Agencies II-30

Enterprises II-30

Rise in Deployments of SSL-Encrypted Application II-30

Telecommunication and IT II-31

VPN - An Alternative to WAN II-31

4. PRODUCT OVERVIEW II-32

Cyber Crime: An Introduction II-32

Cyber Crimes against Individuals II-32

Cyber Crimes against Property II-32

Cyber Crimes against Government II-32

Types of Cyber Crimes II-33

Methods of Committing Cyber Crime II-34

Cyber Security II-35

Application Security II-35

Content Security II-36

Data Security II-36

Endpoint Security II-36

Network Security II-36

Identity & Access Management II-37

Risk & Compliance Management II-37

Security Operations II-38

Consulting Services II-38

5. PRODUCT & SERVICE LAUNCHES II-39

AVG Technologies Launches AVG LinkScanner for Mac OS II-39

Webroot Unveils Prevyx 3.0 Anti-Malware Solution II-39

Kaspersky Lab Introduces Kaspersky Anti-Virus 2011 for Mac II-39

eScan Unveils eScan 11 Information Security Solution II-40

Sophos Introduces Anti-Virus Home Edition for Mac II-40

Kaspersky Lab Launches Anti-Malware Protection System II-40

AVG Unveils AVG Anti-Virus 2011 Business Edition and AVG

Internet Security 2011 Business Edition II-41

Panda Security Introduces Panda Antivirus for Mac II-41

GFI Software Unveils GFI VIPRE Antivirus Premium Lifetime Edition II-42

Celestix Networks Launches MSA 1500i Threat Management Gateway

Appliance II-42

ESET Unveils ESET Cybersecurity and ESET NOD32 Antivirus

Business Edition for Mac OS X II-42

Trend Micro™ Introduces Titanium Security 2011 Security Software II-43

Apple Unveils Anti-Malware Update to Snow Leopard II-44

Max Secure Software Introduces Max Secure Anti Virus Pro Software II-44

Keniu.com Unveils Free Anti-Virus Product II-44

McAfee Launches VirusScan Mobile Anti-Malware Solution II-44

Coranti Introduces 2010 Multi-Core Anti-Virus and Anti-Virus Beta II-45

RSA Security Unveils CyberCrime Intelligence Service II-45

Limewire Integrates LimeWire Pro Service with AVG Anti-Malware

Protection II-45

TrustPort Launches Anti-Virus Software in India II-46

Trend Micro Introduces Internet Security Pro Package for

Windows 7 II-46

Immunet Unveils Immunet Protect Free 2.0 Anti-Virus Software II-46

GFI Software Unveils Latest Version of GFI WebMonitor 2009 II-47

GFI Software Unveils GFI MAX MailProtection and GFI MAX MailEdge II-47

Microsoft Launches Microsoft Security Essentials Anti-Malware

Service II-48

Symantec Introduces Cyber Crime Detection Technologies II-49

SecureWorks Introduces Managed Web Application Firewall Service II-49

Avira Antivir Unveils Avira AntiVir9 II-49

ESET Introduces Server Security v3.0.12 II-49

ESET Introduces New Antivirus II-49

Kerio Introduces New VPN Client for Linux and Mac OS X II-50

ESET Introduces Version 4 of ESET Smart Security and ESET

NOD32 Antivirus II-50

AVG Technologies Launches AVG Identity Protection II-50

Trend Micro Introduces TrendTM Smart Surfing for Mac OS X II-51

AVG Launches New Linux Anti-Malware Solution II-51

Akamai Technologies Introduces Web Application Firewall

Managed Service II-51

Microsoft to Unveil Microsoft Security Essentials II-52

Kaspersky Lab Introduces Kaspersky Anti-Virus for Mac OS II-52

Panda Security Introduces Advanced Security Tools II-52

Symantec Unveils Norton 2010 Range of Security Products II-53

M86 Security Launches WebMarshal 6.5 II-53

Trend Micro Rolls Out Internet Security Products II-54

Microsoft to Introduce Microsoft Security Essentials Antivirus II-55

Kaspersky Lab Introduces Kaspersky Anti-Virus 2010 and

Kaspersky Internet Security 2010™ II-55

BitDefender Unveils Anti-Virus Scanner Software II-56

Norman Launches New Technology for Malware Detection II-56

MicroWorld Introduces MailScan 6.1 II-57

F-Secure Introduces Client Security 9 II-57

AVG Launches AVG Link Scanner II-57

PC Tools Unveils iAntiVirus Version 1.0 II-58

ESET Introduces ESET Personal Firewall Module II-58

Trend Micro Introduces Threat Management Services II-59

AVG Unveils AVG 9.0 II-59

6. PRODUCT INTRODUCTIONS/INNOVATIONS - A HISTORIC PERSPECTIVE BUILDER II-61

MXI Security™ Offers Anti-Phishing Solution to Combat Online

Security Threats II-61

PGP and Lumension Jointly Launch PGP EndPoint II-61

Check Point Extends Capabilities of Check Point Integrity II-61

McAfee Attaches Endpoint Encryption into McAfee Total Protection II-61

SECUDE International Unveils FinallySecure™ 9.1 II-61

Senforce Technologies® Improves Endpoint Security Suite with

Encryption Solution II-62

Recipero Limited Introduces CheckMEND across the US II-62

Trend Micro Unveils New Range of Client Security Products II-62

Intrepidus Group Unveils PhishMe II-63

Trend Micro Launches Worry-Free Business Security 5.1 II-63

Trend Micro Unveils Trend MicroTM Message Archiver II-63

ESET Introduces ESET Mobile Anti-Virus II-64

Vere Software Introduces WebCase Internet Forensic Software II-64

McAfee Unveils Anti-Theft Protection II-64

Trend Micro Introduces Email Encryption Solution Portfolio II-64

7. RECENT INDUSTRY ACTIVITY II-66

AVG Technologies Acquires DroidSecurity II-66

Raytheon Company Takes Over Trusted Computer Solutions II-66

Webroot Software Purchases Prevyx II-66

Intel Signs Definitive Agreement to Purchase McAfee II-67

IBM Takes Over BigFix II-67

Emsi Software Purchases Online Armor Software from Tall Emu II-67

AVG Technologies Enters into Collaboration with Google II-67

Imperva Establishes Hacker Intelligence Initiative II-68

Microsoft Establishes Internet Fraud Alert Group II-68

immixGroup Bags Contract from US Department of Homeland Security II-68

Tech Data and BitDefender® Ink an Agreement II-69

Avira Acquires CleanPort II-69

F-Secure Inks Agreement with 3 Italia II-69

K7 Computing Enters into Strategic Collaboration with Proxma II-70

FaceTime Communications Signs Licensing Agreement with Sunbelt

Software II-70

Cisco® Collaborates with Trend Micro to Introduce Home Network

Defender II-70

Marshal8e6 Pockets Avinti II-70

Trend Micro to Buy Third Brigade II-71

AVG Takes Over Sana Security II-71

RSA Teams Up with Trend Micro II-71

Trend Micro Enters into Partnership with Sago Networks II-72

Cisco Systems Acquires ScanSafe II-72

McAfee Acquires Solidcore Systems II-73

AvePoint Enters into Partnership with Trend Micro II-73

Kaspersky Lab and Juniper Networks Extend Partnership II-74

Aladdin Knowledge Systems Merges with Investor Group II-74

8. STRATEGIC CORPORATE DEVELOPMENTS - A HISTORIC PERSPECTIVE BUILDER II-75

Alternative Technology, Aladdin Knowledge Systems Ink Agreement II-75

Seagate Technology, WinMagic Enter Into Partnership II-75

Actebis Peacock, Seagate, SECUDE Introduce Full Disk

Encryption Technology II-75

Seagate, McAfee, and Dell to Develop Data Encryption Solution II-76

Concordia University Establishes National Cyber Forensics

Training Alliance Canada II-76

IT Companies Form Consortium for World IT Security II-76

Paradigm Establishes Cyber Forensics Training Academy II-76

Marshall Merges with 8e6 Technologies to Form Marshal8e6 II-77

Sophos Acquires Majority Stake in Utimaco Safeware II-77

Axway Takes Over Tumbleweed Communications II-77

Thales Acquires nCipher for £50.7 Million II-77

McAfee Acquires Secure Computing II-78

KONGSBERG Purchases AchillesTM Satellite System II-78

Aladdin Knowledge Systems Introduces Attack Intelligence

Research Center II-78

GRISOFT Renamed as AVG Technologies II-78

Microsoft Takes Over Komoku II-79

Trend Micro Takes Over Identum II-79

Trustwave Acquires Creduware II-79

McAfee Acquires ScanAlert Inc, and Reconnex Inc. II-80

McAfee Purchases SafeBoot Holding II-80

9. FOCUS ON SELECT PLAYERS II-81

AVG Technologies (Czech Republic) II-81

BitDefender® LLC (USA) II-81

CA Technologies, Inc. (USA) II-81

Check Point Software Technologies Ltd. (Israel) II-82

Cisco Systems, Inc. (USA) II-83

IronPort (USA) II-83

F-Secure Corporation (Finland) II-83

IBM Corporation (USA) II-84

BigFix, Inc. (USA) II-84

IBM Internet Security Systems (USA) II-85

Juniper Networks, Inc. (USA) II-85

Kaspersky Lab (Russia) II-86

McAfee, Inc. (USA) II-86

Microsoft Corporation (USA) II-87

Panda Security (Spain) II-87

SafeNet, Inc (USA) II-87

Sophos PLC (UK) II-88

Utimaco Safeware AG (Germany) II-88

Symantec Corporation (USA) II-89

MessageLabs Ltd (UK) II-89

Trend Micro Incorporated (USA) II-89

WebSense, Inc. (USA) II-90

10. GLOBAL MARKET PERSPECTIVE II-91

Table 12: World Recent Past, Current & Future Analysis for

Cyber Security by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-91

Table 13: World Historic Review for Cyber Security by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-92

Table 14: World 15-Year Perspective for Cyber Security by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-93

Table 15: World Recent Past, Current & Future Analysis for

Application Security by Geographic Region - US, Canada,

Europe, Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-94

Table 16: World Historic Review for Application Security by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-95

Table 17: World 15-Year Perspective for Application Security

by Geographic Region - Percentage Breakdown of Revenues for

US, Canada, Europe, Asia-Pacific, Latin America and Rest of

World Markets for Years 2003, 2011 & 2017 (includes

corresponding Graph/Chart) II-96

Table 18: World Recent Past, Current & Future Analysis for

Content Security by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-97

Table 19: World Historic Review for Content Security by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-98

Table 20: World 15-Year Perspective for Content Security by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-99

Table 21: World Recent Past, Current & Future Analysis for

Data Security by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-100

Table 22: World Historic Review for Data Security by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-101

Table 23: World 15-Year Perspective for Data Security by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-102

Table 24: World Recent Past, Current & Future Analysis for

Endpoint Security by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-103

Table 25: World Historic Review for Endpoint Security by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-104

Table 26: World 15-Year Perspective for Endpoint Security by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-105

Table 27: World Recent Past, Current & Future Analysis for

Network Security by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-106

Table 28: World Historic Review for Network Security by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-107

Table 29: World 15-Year Perspective for Network Security by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-108

Table 30: World Recent Past, Current & Future Analysis for

Identity & Access Management by Geographic Region - US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) II-109

Table 31: World Historic Review for Identity & Access

Management by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2003 through 2008 (includes corresponding Graph/Chart) II-110

Table 32: World 15-Year Perspective for Identity & Access

Management by Geographic Region - Percentage Breakdown of

Revenues for US, Canada, Europe, Asia-Pacific, Latin America

and Rest of World Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) II-111

Table 33: World Recent Past, Current & Future Analysis for

Risk & Compliance Management by Geographic Region - US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) II-112

Table 34: World Historic Review for Risk & Compliance

Management by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2003 through 2008 (includes corresponding Graph/Chart) II-113

Table 35: World 15-Year Perspective for Risk & Compliance

Management by Geographic Region - Percentage Breakdown of

Revenues for US, Canada, Europe, Asia-Pacific, Latin America

and Rest of World Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) II-114

Table 36: World Recent Past, Current & Future Analysis for

Consulting Services by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-115

Table 37: World Historic Review for Consulting Services by

Geographic Region - US, Canada, Europe, Asia- Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-116

Table 38: World 15-Year Perspective for Consulting Services by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-117

Table 39: World Recent Past, Current & Future Analysis for

Security Operations by Geographic Region - US, Canada, Europe,

Asia-Pacific, Latin America and Rest of World Markets

Independently Analyzed with Annual Revenues in US$ Million for

Years 2009 through 2017 (includes corresponding Graph/Chart) II-118

Table 40: World Historic Review for Security Operations by

Geographic Region - US, Canada, Europe, Asia-Pacific, Latin

America and Rest of World Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2003 through 2008

(includes corresponding Graph/Chart) II-119

Table 41: World 15-Year Perspective for Security Operations by

Geographic Region - Percentage Breakdown of Revenues for US,

Canada, Europe, Asia-Pacific, Latin America and Rest of World

Markets for Years 2003, 2011 & 2017 (includes corresponding

Graph/Chart) II-120

III. MARKET

1. THE UNITED STATES III-1

A.Market Analysis III-1

Rising Cybercrime Activities in the US III-1

Banking/Financial Institutions: A Key End Use Industry III-1

Identity Theft: A Growing Menace in the US III-1

Regulatory Environment III-2

Key Statistics III-2

Table 42: Cyber Security Breaches in the US (2010):

Percentage Share Breakdown by User Group (includes

corresponding Graph/Chart) III-2

B.Market Analytics III-3

Table 43: US Recent Past, Current & Future Analysis for

Cyber Security by Segment - Application Security, Content

Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-3

Table 44: US Historic Review for Cyber Security by Segment -

Application Security, Content Security, Data Security,

Endpoint Security, Network Security, Identity & Access

Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-4

Table 45: US 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-5

2. CANADA III-6

A.Market Analysis III-6

Market Overview III-6

B.Market Analytics III-7

Table 46: Canadian Recent Past, Current & Future Analysis

for Cyber Security by Segment - Application Security,

Content Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-7

Table 47: Canadian Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-8

Table 48: Canadian 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-9

3. JAPAN III-10

A.Market Analysis III-10

Cyber Security Market - A Primer III-10

Regulatory Environment III-10

Competitive Scenario III-10

B.Market Analytics III-11

Table 49: Japanese Recent Past, Current & Future Analysis

for Cyber Security by Segment - Application Security,

Content Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-11

Table 50: Japanese Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-12

Table 51: Japanese 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-13

4. EUROPE III-14

A.Market Analysis III-14

Market Overview III-14

Regulatory Environment III-14

B.Market Analytics III-15

Table 52: European Recent Past, Current & Future Analysis

for Cyber Security by Geographic Region - France, Germany,

Italy, UK, and Rest of Europe Markets Independently Analyzed

with Annual Revenues in US$ Million for Years 2009 through

2017 (includes corresponding Graph/Chart) III-15

Table 53: European Recent Past, Current & Future Analysis

for Cyber Security by Segment - Application Security,

Content Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-16

Table 54: European Historic Review for Cyber Security by

Geographic Region - France, Germany, Italy, UK, and Rest of

Europe Markets Independently Analyzed with Annual Revenues

in US$ Million for Years 2003 through 2008 (includes

corresponding Graph/Chart) III-17

Table 55: European Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-18

Table 56: European 15-Year Perspective for Cyber Security by

Geographic Region - Percentage Breakdown of Revenues for

France, Germany, Italy, UK, and Rest of Europe Markets for

Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-19

Table 57: European 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-20

4a. FRANCE III-21

A.Market Analysis III-21

Market Overview III-21

B.Market Analytics III-22

Table 58: French Recent Past, Current & Future Analysis for

Cyber Security by Segment - Application Security, Content

Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-22

Table 59: French Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-23

Table 60: French 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-24

4b. GERMANY III-25

A.Market Analysis III-25

Market Overview III-25

B.Market Analytics III-26

Table 61: German Recent Past, Current & Future Analysis for

Cyber Security by Segment - Application Security, Content

Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-26

Table 62: German Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-27

Table 63: German 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-28

4c. ITALY III-29

A.Market Analysis III-29

Market Overview III-29

B.Market Analytics III-30

Table 64: Italian Recent Past, Current & Future Analysis for

Cyber Security by Segment - Application Security, Content

Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-30

Table 65: Italian Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-31

Table 66: Italian 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-32

4d. THE UNITED KINGDOM III-33

A.Market Analysis III-33

Market Overview III-33

B.Market Analytics III-34

Table 67: UK Recent Past, Current & Future Analysis for

Cyber Security by Segment - Application Security, Content

Security, Data Security, Endpoint Security, Network

Security, Identity & Access Management, Risk & Compliance

Management, Security Operations, and Consulting Services

Markets Independently Analyzed with Annual Revenues in US$

Million for Years 2009 through 2017 (includes corresponding

Graph/Chart) III-34

Table 68: UK Historic Review for Cyber Security by Segment -

Application Security, Content Security, Data Security,

Endpoint Security, Network Security, Identity & Access

Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-35

Table 69: UK 15-Year Perspective for Cyber Security by

Segment - Percentage Breakdown of Revenues for Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets for Years 2003, 2011 & 2017

(includes corresponding Graph/Chart) III-36

4e. REST OF EUROPE III-37

A.Market Analysis III-37

Russia III-37

Market Overview III-37

Russian Antivirus Market - An Insight III-37

Table 70: Leading Vendors in the Russian Anti-Virus

Software Market (2010): Percentage Share Breakdown of

Value Sales for Kaspersky Lab, Eset, Symantec, DrWeb,

Trend Micro, and Others (includes corresponding

Graph/Chart) III-37

B.Market Analytics III-38

Table 71: Rest of Europe Recent Past, Current & Future

Analysis for Cyber Security by Segment - Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2009 through 2017

(includes corresponding Graph/Chart) III-38

Table 72: Rest of Europe Historic Review for Cyber Security

by Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-39

Table 73: Rest of Europe 15-Year Perspective for Cyber

Security by Segment - Percentage Breakdown of Revenues for

Application Security, Content Security, Data Security,

Endpoint Security, Network Security, Identity & Access

Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets for Years 2003,

2011 & 2017 (includes corresponding Graph/Chart) III-40

5. ASIA-PACIFIC III-41

A.Market Analysis III-41

Market Overview III-41

Focus on Select Regional Markets III-41

China III-41

Regulatory Overview III-42

Table 74: Chinese Network Security Market (2010):

Percentage Share Breakdown of Value Sales by Leading

Companies - Beijing Topsec Network Security Technology Co

Ltd., Beijing Rising International Software Co Ltd.,

Cisco Systems, Symantec, Neusoft Corporation, Trend

Micro, Juniper Networks, Check Point, and Others

(includes corresponding Graph/Chart) III-43

India III-43

Market Overview III-43

Impact of Cyber Crimes on Indian Companies III-44

The Indian Security Market III-45

Indian Anti-Virus Market III-45

Select Key Players III-46

MicroWorld Technologies, Inc. III-46

Quick Heal Technologies (P) Ltd. III-46

B.Market Analytics III-47

Table 75: Asia-Pacific Recent Past, Current & Future

Analysis for Cyber Security by Segment - Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2009 through 2017

(includes corresponding Graph/Chart) III-47

Table 76: Asia-Pacific Historic Review for Cyber Security by

Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-48

Table 77: Asia-Pacific 15-Year Perspective for Cyber

Security by Segment - Percentage Breakdown of Revenues for

Application Security, Content Security, Data Security,

Endpoint Security, Network Security, Identity & Access

Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets for Years 2003,

2011 & 2017 (includes corresponding Graph/Chart) III-49

6. LATIN AMERICA III-50

A.Market Analysis III-50

Network Security Market Shows Steady Growth III-50

Competitive Landscape III-50

Table 78: Latin American Network Security Market (2010):

Percentage Value Share Breakdown by Country/Region -

Brazil, Mexico, and Rest of Latin America (includes

corresponding Graph/Chart) III-50

Table 79: Latin American Network Security Market (2010):

Percentage Breakdown of Value Sales by Leading Company for

Check Point, Cisco, Juniper, IBM ISS, McAfee, SonicWALL

Inc, Enterasys Networks Inc, Aker Security Solutions, and

Others (includes corresponding Graph/Chart) III-51

Table 80: Latin American IDS/IPS Market (2010): Percentage

Breakdown of Value Sales by Leading Company for IBM ISS,

Cisco, McAfee, Check Point, Enterasys Networks Inc, and

Others (includes corresponding Graph/Chart) III-51

End-Use Market III-51

Table 81: Latin American Network Security Market (2010):

Percentage Breakdown of Value Sales by End-Use Segment -

Banking and Finance, Government, Telecom & Technology,

Manufacturing, Retail, and Others (includes corresponding

Graph/Chart) III-52

B.Market Analytics III-53

Table 82: Latin America Recent Past, Current & Future

Analysis for Cyber Security by Segment - Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2009 through 2017

(includes corresponding Graph/Chart) III-53

Table 83: Latin America Historic Review for Cyber Security

by Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-54

Table 84: Latin America 15-Year Perspective for Cyber

Security by Segment - Percentage Breakdown of Revenues for

Application Security, Content Security, Data Security,

Endpoint Security, Network Security, Identity & Access

Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets for Years 2003,

2011 & 2017 (includes corresponding Graph/Chart) III-55

7. REST OF WORLD III-56

A.Market Analysis III-56

Security Software Market in Gulf States on the Rise III-56

B.Market Analytics III-57

Table 85: Rest of World Recent Past, Current & Future

Analysis for Cyber Security by Segment - Application

Security, Content Security, Data Security, Endpoint

Security, Network Security, Identity & Access Management,

Risk & Compliance Management, Security Operations, and

Consulting Services Markets Independently Analyzed with

Annual Revenues in US$ Million for Years 2009 through 2017

(includes corresponding Graph/Chart) III-57

Table 86: Rest of World Historic Review for Cyber Security

by Segment - Application Security, Content Security, Data

Security, Endpoint Security, Network Security, Identity &

Access Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets Independently

Analyzed with Annual Revenues in US$ Million for Years 2003

through 2008 (includes corresponding Graph/Chart) III-58

Table 87: Rest of World 15-Year Perspective for Cyber

Security by Segment - Percentage Breakdown of Revenues for

Application Security, Content Security, Data Security,

Endpoint Security, Network Security, Identity & Access

Management, Risk & Compliance Management, Security

Operations, and Consulting Services Markets for Years 2003,

2011 & 2017 (includes corresponding Graph/Chart) III-59

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 128 (including Divisions/Subsidiaries - 149)

------------------------------------------

Region/Country Players

------------------------------------------

The United States 73

Canada 4

Japan 3

Europe 37

France 3

Germany 5

The United Kingdom 11

Spain 1

Rest of Europe 17

Asia-Pacific (Excluding Japan) 30

Middle East 2

To order this report:

Security Systems Industry: Global Cyber Security Industry

More  Market Research Report

Check our  Industry Analysis and Insights

CONTACT:
Nicolas Bombourg
Reportlinker
Email: [email protected]
US: (805)652-2626
Intl: +1 805-652-2626

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.