SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community




TMCNet:  Global Cloud Based Security Services Industry

[November 26, 2015]

Global Cloud Based Security Services Industry

LONDON, Nov. 26, 2015 /PRNewswire/ -- This report analyzes the worldwide markets for Cloud Based Security Services in US$ Million. Market estimates at Global level and in the US and European markets are provided by the following Segments: Identity Access Management (IAM) System, Secure Web Gateway, Secure E-mail Gateway, and Others. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 79 companies including many key and niche players such as -

Barracuda Networks Inc.
Blue Coat Systems Inc.
CA Inc.
Cisco Systems Inc.
Covisint

Download the full report: https://www.reportbuyer.com/product/3101167/

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS

Study Reliability and Reporting Limitations I-1 Disclaimers.............. I-2 Data Interpretation & Reporting Level I-2 Quantitative Techniques & Analytics I-3 Service Definitions and Scope of Study I-3 Cloud Based Security Services I-3 Cloud Based Security Service Segments I-3 Identity Access Management (IAM) System I-3 Secure Web Gateway..............I-4 Secure E-mail Gateway..............I-4 Other Segments.............. I-4

II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW.............. II-1 Digital Assets in Organizations - Vulnerable as Ever II-1 Rise in IT Security Breaches Presses the Panic Button for Organizations.............. II-2 A Look at Common Security Threats for Information Assets in Organizations.............. II-2 Damages Caused by Security Breaches II-3 Proprietary Information Destruction II-3 Disruption in Systems Performance II-4 Data/Application Damage or Corruption II-4 Types of Internal IT Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence II-4 Types of External Security Breaches in Organizations - Ranked in the Order of Frequency of Occurrence II-4 Top IT Security Breaches Between 2013 & Early 2014 II-5 IT Security Deployments Become a 'Norm' Rather than an Option among Organizations..............II-5 List of Major Security Concerns & Top IT Security Practices in Enterprises Worldwide..............II-7 Factors Influencing Implementation of Information Security Solutions by Enterprises Worldwide - Ranked in Order of Influence.............. II-7 Cloud Technology: Optimally Positioned to Provide IT Security as 'Service'.............. II-7 Cloud Based Security Services Market - A Review II-9 High Information Security Risks During Periods of Economic Slowdown Magnify Business Case for Efficient Information Security Solutions..............II-10 Weak Economy in 2012-2014 Establishes Cloud Based Security Services as a Mainstream Security Standard among Organizations.............. II-11 Market Outlook.............. II-12 Competition.............. II-13 Select Players in the Cloud Based Security Services Market by Segment.............. II-13 Novel Approaches to Security - A Competitive Differentiator II-13 Growing Collaborations among CSPs and Security Solution Providers.............. II-14 Expanding Market for Cloud Based Security Attracts New Entrants II-14 List of Select New Entrants into the Cloud Based Security Market (2012-2013)..............II-15

2. NOTEWORTHY TRENDS, GROWTH DRIVERS & ISSUES II-16 Use of Advanced IT Platforms Makes Digital Assets in Organizations Highly Vulnerable to Security Threats II-16 Cloud IT Deployments As Vulnerable As Traditional IT Deployments - Case for Adoption of Cloud-Based Security Services.............. II-16 A Look into Some of the Most Common Security Threats for Cloud Environments..............II-17 Abuse of Cloud Services..............II-17 Account or Service Traffic Hijacking II-18 Data Breaches.............. II-18 Data Loss.............. II-18 Denial of Service.............. II-18 Insecure APIs.............. II-19 Insufficient Due Diligence..............II-19 Malicious Insiders..............II-19 Shared Technology.............. II-19 Escalating Number of DDoS Attacks Prompt Advanced Security Solutions - A Case in Point..............II-20 Table 1: Attacks on Cloud Hosting Provider by Incident Classes (2014): Percentage Breakdown of Average Frequency of Attacks for Brute Force, Malware/Botnet, Web App Attack, and Others (includes corresponding Graph/Chart) II-20

Table 2: Select High-Profile Corporate Data Security Breaches in the Recent Past (includes corresponding Graph/Chart).............. II-21

Table 3: Attacks on US Cloud Infrastructure by Country of Origin (2014) (includes corresponding Graph/Chart) II-22

Table 4: Attacks on Cloud Infrastructure in Europe by Country of Origin (2014) (includes corresponding Graph/Chart).............. II-22

Table 5: Attacks on Cloud Infrastructure in Asia by Country of Origin (2014) (includes corresponding Graph/Chart) II-22 Organizations Increasingly Move to Cloud Based IT Deployments - Key Opportunity Indicator for Cloud Based Security Services.............. II-23 Opportunity indicators:..............II-24 Table 6: Growing Proliferation of Cloud Computing: Percentage Share Breakdown of Cloud IT Spending As a Percentage of Total IT Infrastructure Spending 2015 & 2019 (includes corresponding Graph/Chart) II-24

Table 7: Cannibalization of Traditional IT by Cloud Computing: Percentage Share Breakdown of On-Premise IT Spending Displaced by Cloud Computing for the Years 2008, 2014 & 2020 (includes corresponding Graph/Chart) II-25

Table 8: World Cloud Computing Spending (2014): Percentage Share Breakdown of Expenditure in $US by End-Use Industrial Sectors (includes corresponding Graph/Chart) II-25

Table 9: World Cloud Computing Spending (2014): Percentage Share Breakdown of Expenditure in $US by Customer Size (includes corresponding Graph/Chart) II-25 Public Cloud Service Deployments - A Ready Made Market for Cloud Based Security Services..............II-26 Table 10: Level of Security Concern in Public Cloud Hosting (includes corresponding Graph/Chart) II-27 Cloud Security Services Designed for Hybrid Cloud Models to Grow in Demand.............. II-27 Anticipated Rise in Cloud Regulations to Promote Opportunities II-28 ISO to Issue ISO 27017 and 27018 II-28 Growing Use of Internet Enabled Mobile Devices in Organizations Lends Traction to Information Security Market II-29 Growing BYOD Phenomenon Entails Need for Advanced Security Solutions.............. II-29 Key Factors Encouraging BYOD/COPE/COBO Trend among Enterprises Ranked by Importance Attached by Enterprises II-30 Enterprise Mobility Makes Enterprise Digital Assets Highly Vulnerable to Security Attacks - Drives Demand for Cloud Based IT Security Services..............II-30 Table 11: Global Workforce Population (2009 & 2014): Percentage Share Breakdown of Employees by Nature of Work (includes corresponding Graph/Chart) II-31

Table 12: Global Mobile Workforce Population (2009 & 2014): Breakdown of Number of Mobile Employees in Million by Region/Country (includes corresponding Graph/Chart) II-31

Table 13: Global Mobile Workforce Population (2014): Penetration of Mobile Employees by Region/Country (includes corresponding Graph/Chart)..............II-32 Financial Services - A Key End Use Market for Cloud Based IT Security Solutions.............. II-32 Major External & Internal Breaches in Financial Services Sector II-33 Table 14: Leading Targets of Fraud (2013): Percentage Breakdown of Number of Breaches by Type of Asset (includes corresponding Graph/Chart)..............II-33 Implementation of Information Security Policy - Industries Ranked by Level of Implementation II-34 Top Security Initiatives by Sector II-34 Regulatory Compliance: A High Priority for Financial Institutions.............. II-34 Telecommunication and IT Sectors - Laden with Opportunities for Cloud-based Security Solutions II-34 Security Solutions in Telecom Industry II-35 Overbilling Attack: A Business Case for Cloud-Based Security Solutions in Telecom Industry..............II-35 Healthcare Sector Signals Robust Opportunities for Advanced IT Security - Business Case for Cloud-based Security Solutions II-35 Robust Opportunities Emerge from Government Sector II-36 Increasing Number of SMBs Augurs Well for the Market II-36 Table 15: Percentage of Companies with Less than 10 Employees in Select Countries (includes corresponding Graph/Chart) II-37 Developed Economies Dominate, Emerging Economies to Usher in Future Prospects............. II-37 Cloud Based Secure Email Gateway - The Largest Revenue Contributor.............. II-38 Cloud Based Identity & Access Management - The Fastest Growing Service Segment.............. II-38 Cloud Encryption Offers New Growth Avenue for Players II-39 Cloud Based Security Market - Teeming with Challenges II-39





3. SERVICE OVERVIEW.............. II-40 Cloud Computing: A Definition..............II-40 Risks, Concerns, & Challenges in Cloud Computing II-40 Cloud Based Security Services..............II-40 Cloud Based Security Service Segments II-41 Identity Access Management (IAM) System II-41 Need for IAM.............. II-41 Secure Web Gateway.............. II-41 Secure E-mail Gateway..............II-41 Other Segments.............. II-42 Security Information And Event Management (SIEM) II-42 Cloud Vulnerability Management II-42 Data Loss Prevention (DLP)..............II-42 Cloud Security Controls..............II-43 Deterrent controls.............. II-43 Preventive Controls..............II-43 Detective Controls.............. II-43 Corrective Controls..............II-43

4. SERVICE INTRODUCTIONS/LAUNCHES..............II-44 Zscaler Rolls Out Zscaler Fall 2014 II-44 Webroot Launches BrightCloud IP Reputation Service for LogRhythm II-44 Trend Micro Unveils Novel Initiatives for AWS II-44 Webroot Launches BreachLogic™ Endpoint Agent and BrightCloud® Security Services..............II-44 SafeNet Announces Availability of SafeNet Authentication Service for Microsoft Windows® Server 2012 R2 AD FS II-44 Panda Security Rolls Out PCOP Version 7.1 II-44 Alert Logic Introduces Alert Logic Cloud Defender II-45 Alert Logic Expands Security Portfolio for Microsoft Azure Cloud Platform.............. II-45 Instart Logic Rolls Out Instart Logic Security Suite II-45 Skyfence Unveils New Cloud Security Solution II-45 Imperva Unveils SecureSphere WAF for Amazon Web Services II-45 Zscaler Rolls Out Zscaler for APTs II-45 Trend Micro Rolls Out Trend Micro™ Deep Security Program Updates II-45

5. RECENT INDUSTRY ACTIVITY..............II-46 Gemalto Takes Over SafeNet..............II-46 Tata Communications Partners SafeNet to Offer Cloud-Based Multi-Factor Authentication Managed Service II-46 Webroot Inks Partnership Agreement with Softwerx II-46 Fonix Mobile Selects Alert Logic's Alert Logic Threat Manager II-46 Mailprotector Expands Operations across EMEA and the UK II-46 RSA Takes over Symplified..............II-46 IBM Takes Over Lighthouse Security Group II-47 Cisco to Take Over Neohapsis..............II-47 Microsoft Takes Over Aorato..............II-47 Trustwave Takes Over Cenzic..............II-47 Imperva Takes Over Skyfence and Incapsula II-47 InterCloud Systems to Takeover VaultLogix II-47 Dell to Expand its Worldwide Agreement with Accenture II-47 Alert Logic Bags Contract from RigNet for Threat Manager and ActiveWatch Services..............II-48 First Point Becomes Platinum Partner of SafeNet II-48 Webroot Signs Strategic Partnership with VeliQ II-48

6. FOCUS ON SELECT GLOBAL PLAYERS..............II-49 Barracuda Networks Inc. (US)..............II-49 Blue Coat Systems Inc. (US)..............II-49 CA Inc. (US).............. II-49 Cisco Systems Inc. (US)..............II-50 Covisint (US).............. II-50 Echoworx (Canada).............. II-50 IBM Corporation (US)..............II-50 McAfee, Inc. (US).............. II-51 nCrypted Cloud (US).............. II-52 Okta Inc. (US).............. II-52 Panda Security (Spain)..............II-52 Ping Identity (US)..............II-53 Proofpoint Inc (US).............. II-53 RSA Security LLC (US)..............II-53 Sophos Ltd. (UK).............. II-53 Symantec Corporation (US)..............II-54 Vormetric Inc. (US).............. II-54 Websense Inc. (US)..............II-54 Zscaler (US).............. II-55

7. GLOBAL MARKET PERSPECTIVE..............II-56 Table 16: World Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) II-56

Table 17: World 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart) II-57

Table 18: World Recent Past, Current & Future Analysis for Cloud Based Security Services by Segment - Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Other Services Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) II-58

Table 19: World 8-Year Perspective for Cloud Based Security Services by Segment - Percentage Breakdown of Revenue for Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Other Services Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart) II-59

III. MARKET

1. THE UNITED STATES.............. III-1 A.Market Analysis.............. III-1 Huge Adoption of Cloud IT Architecture Makes US a Lucrative Market for Cloud Based Security Services III-1 Service Launches..............III-2 Strategic Corporate Developments III-4 Key Players.............. III-5 B.Market Analytics..............III-13 Table 20: US Recent Past, Current & Future Analysis for Cloud Based Security Services by Segment - Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-13

Table 21: US 8-Year Perspective for Cloud Based Security Services by Segment - Percentage Breakdown of Revenue for Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart) III-14

2. CANADA.............. III-15 A.Market Analysis.............. III-15 Echoworx - Key Player..............III-15 B.Market Analytics..............III-15 Table 22: Canadian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-15

3. JAPAN.............. III-16 A.Market Analysis.............. III-16 Service Launches..............III-16 Trend Micro Incorporated - Key Player III-16 B.Market Analytics..............III-17 Table 23: Japanese Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-17

4. EUROPE.............. III-18 A.Market Analysis.............. III-18 Euro Debt Crisis Compels Organizations to Seek Low Cost IT Security Options - Favors Cloud Based Security Services III-18 European Government Increasingly Takes to Cloud IT Deployments - Drives Demand for Cloud Based IT Security Services.............. III-18 B.Market Analytics..............III-19 Table 24: European Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart)..............III-19

Table 25: European 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart) III-20

Table 26: European Recent Past, Current & Future Analysis for Cloud Based Security Services by Segment - Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-21

Table 27: European 8-Year Perspective for Cloud Based Security Services by Segment - Percentage Breakdown of Revenue for Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart) III-22

4a. FRANCE.............. III-23 Market Analysis.............. III-23 Table 28: French Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-23

4b. GERMANY.............. III-24 Market Analysis.............. III-24 Table 29: German Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-24

4c. ITALY.............. III-25 Market Analysis.............. III-25 Table 30: Italian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-25

4d. THE UNITED KINGDOM..............III-26 A.Market Analysis.............. III-26 Strategic Corporate Developments III-26 Sophos Ltd. - Key Player..............III-26 B.Market Analytics..............III-27 Table 31: UK Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-27

4e. SPAIN.............. III-28 A.Market Analysis.............. III-28 Service Launch.............. III-28 Panda Security - Key Player..............III-28 B.Market Analytics..............III-29 Table 32: Spanish Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-29

4f. RUSSIA.............. III-30 Market Analysis.............. III-30 Table 33: Russian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-30

4g. REST OF EUROPE.............. III-31 A.Market Analysis.............. III-31 Strategic Corporate Development III-31 B.Market Analytics..............III-32 Table 34: Rest of Europe Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-32

5. ASIA-PACIFIC.............. III-33 A.Market Analysis.............. III-33 Robust Growth in Cloud Computing Presents a Ready Made Opportunity for Cloud Based IT Security Services III-33 B.Market Analytics..............III-34 Table 35: Asia-Pacific Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - Australia, China, India, South Korea, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-34

Table 36: Asia-Pacific 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for Australia, China, India, South Korea, and Rest of Asia-Pacific Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart) III-35

5a. AUSTRALIA.............. III-36 A.Market Analysis.............. III-36 Strategic Corporate Development III-36 B.Market Analytics..............III-37 Table 37: Australian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-37

5b. CHINA.............. III-38 Market Analysis.............. III-38 Table 38: Chinese Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-38

5c. INDIA.............. III-39 A.Market Analysis.............. III-39 Service Launch.............. III-39 B.Market Analytics..............III-40 Table 39: Indian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-40

5d. SOUTH KOREA.............. III-41 Market Analysis.............. III-41 Table 40: South Korean Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-41

5e. REST OF ASIA-PACIFIC..............III-42 Market Analysis.............. III-42 Table 41: Rest of Asia-Pacific Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-42

6. LATIN AMERICA.............. III-43 Market Analysis.............. III-43 Table 42: Latin American Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).............. III-43

Table 43: Latin American 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for Brazil and Rest of Latin America Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart)..............III-44

6a. BRAZIL.............. III-45 Market Analysis.............. III-45 Table 44: Brazilian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-45

6b. REST OF LATIN AMERICA..............III-46 Market Analysis.............. III-46 Table 45: Rest of Latin America Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-46

7. REST OF WORLD.............. III-47 A.Market Analysis.............. III-47 Strategic Corporate Developments III-47 B.Market Analytics..............III-48 Table 46: Rest of World Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart) III-48

IV. COMPETITIVE LANDSCAPE

Total Companies Profiled: 79 (including Divisions/Subsidiaries - 80)

The United States (62) Canada (1) Japan (1) Europe (12) - France (1) - Germany (1) - The United Kingdom (3) - Spain (4) - Rest of Europe (3) Asia-Pacific (Excluding Japan) (1) Middle East (3)
Download the full report: https://www.reportbuyer.com/product/3101167/

About Reportbuyer
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
http://www.reportbuyer.com

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/global-cloud-based-security-services-industry-300184893.html

SOURCE ReportBuyer


[ Back To Mobile World Congress's Homepage ]




Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy