TMCnet News

Global Cyber Security Industry
[April 16, 2012]

Global Cyber Security Industry


NEW YORK, April 16, 2012 /PRNewswire via COMTEX/ -- Reportlinker.com announces that a new market research report is available in its catalogue: Global Cyber Security Industry http://www.reportlinker.com/p0552759/Global-Cyber-Security-Industry.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_ This report analyzes the worldwide markets for Cyber Security in US$ million by the following Product Segments - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2009 through 2017. Also, a six-year historic analysis is provided for these markets. The report profiles 128 companies including many key and niche players such as AVG Technologies, BitDefender® LLC, CA Technologies, Inc., Check Point Software Technologies Ltd., Cisco Systems, Inc., IronPort, F-Secure Corporation, IBM Corporation, BigFix, Inc., IBM Internet Security Systems, Juniper Networks, Inc., Kaspersky Lab, McAfee, Inc., Microsoft Corporation, Panda Security, SafeNet, Inc., Sophos PLC, Utimaco Safeware AG, Symantec Corporation, MessageLabs Ltd., Trend Micro Incorporated., and WebSense, Inc. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based upon search engine sources in the public domain.



I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONS Study Reliability and Reporting Limitations I-1 Disclaimers I-2 Data Interpretation & Reporting Level I-3 Quantitative Techniques & Analytics I-3 Product Definitions and Scope of Study I-3 1. Application Security I-3 2. Content Security I-4 3. Data Security I-4 4. Endpoint Security I-4 5. Network Security I-4 6. Identity & Access Management I-4 7. Risk & Compliance Management I-4 8. Security Operations I-4 9. Consulting Services I-5 II. EXECUTIVE SUMMARY 1. INDUSTRY OVERVIEW II-1 A Curtain Raiser II-1 Internet & the Modern Enterprise II-2 Magnitude of Cyber Crime II-3 Cyber Crime Trends At a Glance II-3 Table 1: World Malware on the Web (2010): Percentage Share Breakdown of Leading Countries Hosting Malware on the Web (includes corresponding Graph/Chart) II-4 Table 2: Percentage Share Breakdown of Leading Spam Relaying Countries for the year 2010 (includes corresponding Graph/Chart) II-5 Flurry of Social Networking Sites Foster Cyber Crime Activities II-5 Use of Cloud Services Spur Cyber Crime II-6 The Rise of Mobile Devices and Applications Bring Mobile Computing Devices Under Attack II-6 Virtualization - Enhancing Security Concerns II-6 Stealthier Infiltration Methods - A Key Challenge II-7 Web Evolution Gives New Opportunities to Malware Writers II-8 Trojan: Fastest Growing Data-Stealing Malware II-8 Malware, Botnets, Scareware on the Rise II-8 Hactivism II-9 Current Market Conditions II-9 Recession Ups Cyber Crime Attacks II-9 Recession Magnifies the Business Case for Cyber Security II-10 Security - Scoring High on Corporate Agenda II-11 Regulatory Compliance Requirements Propel Cyber Security Market II-11 Competitive Landscape II-12 Consolidation Wave in Cyber Security Market II-12 Prime Market Stimulators & Inhibitors in a Capsule II-12 Market Drivers II-12 Market Growth Inhibitors II-13 Market Drivers & Trends II-13 Rising Internet Usage, Security Concerns Offer Opportunity For Rapid Growth II-13 Spate of Security Breaches Creates Need for Advanced Encryption Solutions II-13 Development of Advanced Security Solutions will Stimulate Rapid Growth II-14 Integrated Security Appliances Gather Momentum II-14 Vendors Provide Integrated Solutions to Stay Ahead II-14 Internet Filtering Solutions: Protection at the Gateway II-15 Protecting Remote Work II-15 Low Footprint Anti-Virus - Prolonging Usable Life of PCs II-15 Availability of Low-priced or Free Competitive Products II-15 2. CYBER SECURITY - SEGMENTAL OVERVIEW II-16 Application Security Market II-16 Content Security Market II-16 Demand for Messaging Security (E-mail Scanning) Will Continue to Rise II-16 Key Statistics II-17 Table 3: Global Web Security Market (2011E): Percentage Share Breakdown of Revenues by Platform - Software, Appliance, and SaaS (includes corresponding Graph/Chart) II-17 Table 4: Leading Vendors in the Global Web Security Market (2010): Percentage Share Breakdown of Revenues for Websense, Trend Micro, Microsoft, McAfee, Blue Coat, and Others (includes corresponding Graph/Chart) II-17 Table 5: Leading Vendors in the Global Web Security Software Market (2010): Percentage Share Breakdown of Revenues for Websense, Trend Micro, Microsoft, McAfee, Check Point, and Others (includes corresponding Graph/Chart) II-17 Table 6: Leading Vendors in the Global Web Security SaaS Market (2010): Percentage Share Breakdown of Revenues for Cisco/ScanSafe, Websense, Symantec, Trend Micro, Webroot, and Others (includes corresponding Graph/Chart) II-18 Data Security Market II-18 PKI: A Promising Market II-18 E-mail Encryption Gathers Steam II-18 Endpoint Security Market II-19 Key Statistics II-19 Table 7: Leading Vendors in the Global Anti-Virus Software Market (2010): Percentage Share Breakdown of Revenues for Symantec, McAfee, Trend Micro, Kaspersky Lab, and Others (includes corresponding Graph/Chart) II-19 Network Security Market II-20 UTM Appliances - A Whip on Blended Security Threats II-20 VPN Market on an Upswing II-20 Table 8: Leading Vendors in the Global Intrusion Detection/Prevention Market (2010) - Percentage Share Breakdown of Revenues for IBM Internet Security Systems, Cisco Systems, McAfee Inc, Hewlett-Packard/TippingPoint, Juniper Networks and Others (includes corresponding Graph/Chart) II-21 Table 9: Leading Vendors in the Global Market for Network Hardware Intrusion Detection/Prevention Software (2010) - Percentage Share Breakdown of Revenues for IBM Internet Security Systems, Cisco Systems, Hewlett-Packard/TippingPoint, McAfee Inc, Juniper Networks, and Others (includes corresponding Graph/Chart) II-21 Table 10: Leading Vendors in the Global Market for Host Intrusion Detection/Prevention Software (2010) - Percentage Share Breakdown of Revenues for Cisco, IBM Internet Security Systems, McAfee, Symantec, and Others (includes corresponding Graph/Chart) II-22 Identity & Access Management Solutions II-22 Need for Identity and Access Management II-22 Table 11: Global Identity and Access Management Market (2009): Percentage Share Breakdown of Revenues by Operating Environment (includes corresponding Graph/Chart) II-23 IAM: A Key Security Initiative for Enterprises II-23 An Integral Part of Corporate Strategy II-24 Growing Prominence of Identity-as-a-Service (IaaS) II-25 Risk & Compliance Management Market II-25 Security Operations Market II-25 Security Technologies Find Favor Among Organizations II-25 Compliance Requirements Boost Vulnerability Management Market II-26 Small and Mid-Sized Businesses - An Under-Penetrated Segment for SVM II-26 Diverse Delivery Systems for SVM Products II-27 3. KEY END-USE MARKETS II-28 Banking and Finance II-28 Top Security Initiatives by Sector II-28 Regulatory Compliance: A High Priority for Financial Institutions II-29 Growing Significance of Data Loss Prevention II-29 Lack of Alignment Between Business Objectives and Security II-29 Convergence Gains Strength II-29 Key Barriers in Cyber Security for Financial Services Sector II-30 Government Agencies II-30 Enterprises II-30 Rise in Deployments of SSL-Encrypted Application II-30 Telecommunication and IT II-31 VPN - An Alternative to WAN II-31 4. PRODUCT OVERVIEW II-32 Cyber Crime: An Introduction II-32 Cyber Crimes against Individuals II-32 Cyber Crimes against Property II-32 Cyber Crimes against Government II-32 Types of Cyber Crimes II-33 Methods of Committing Cyber Crime II-34 Cyber Security II-35 Application Security II-35 Content Security II-36 Data Security II-36 Endpoint Security II-36 Network Security II-36 Identity & Access Management II-37 Risk & Compliance Management II-37 Security Operations II-38 Consulting Services II-38 5. PRODUCT & SERVICE LAUNCHES II-39 AVG Technologies Launches AVG LinkScanner for Mac OS II-39 Webroot Unveils Prevyx 3.0 Anti-Malware Solution II-39 Kaspersky Lab Introduces Kaspersky Anti-Virus 2011 for Mac II-39 eScan Unveils eScan 11 Information Security Solution II-40 Sophos Introduces Anti-Virus Home Edition for Mac II-40 Kaspersky Lab Launches Anti-Malware Protection System II-40 AVG Unveils AVG Anti-Virus 2011 Business Edition and AVG Internet Security 2011 Business Edition II-41 Panda Security Introduces Panda Antivirus for Mac II-41 GFI Software Unveils GFI VIPRE Antivirus Premium Lifetime Edition II-42 Celestix Networks Launches MSA 1500i Threat Management Gateway Appliance II-42 ESET Unveils ESET Cybersecurity and ESET NOD32 Antivirus Business Edition for Mac OS X II-42 Trend Micro(TM) Introduces Titanium Security 2011 Security Software II-43 Apple Unveils Anti-Malware Update to Snow Leopard II-44 Max Secure Software Introduces Max Secure Anti Virus Pro Software II-44 Keniu.com Unveils Free Anti-Virus Product II-44 McAfee Launches VirusScan Mobile Anti-Malware Solution II-44 Coranti Introduces 2010 Multi-Core Anti-Virus and Anti-Virus Beta II-45 RSA Security Unveils CyberCrime Intelligence Service II-45 Limewire Integrates LimeWire Pro Service with AVG Anti-Malware Protection II-45 TrustPort Launches Anti-Virus Software in India II-46 Trend Micro Introduces Internet Security Pro Package for Windows 7 II-46 Immunet Unveils Immunet Protect Free 2.0 Anti-Virus Software II-46 GFI Software Unveils Latest Version of GFI WebMonitor 2009 II-47 GFI Software Unveils GFI MAX MailProtection and GFI MAX MailEdge II-47 Microsoft Launches Microsoft Security Essentials Anti-Malware Service II-48 Symantec Introduces Cyber Crime Detection Technologies II-49 SecureWorks Introduces Managed Web Application Firewall Service II-49 Avira Antivir Unveils Avira AntiVir9 II-49 ESET Introduces Server Security v3.0.12 II-49 ESET Introduces New Antivirus II-49 Kerio Introduces New VPN Client for Linux and Mac OS X II-50 ESET Introduces Version 4 of ESET Smart Security and ESET NOD32 Antivirus II-50 AVG Technologies Launches AVG Identity Protection II-50 Trend Micro Introduces TrendTM Smart Surfing for Mac OS X II-51 AVG Launches New Linux Anti-Malware Solution II-51 Akamai Technologies Introduces Web Application Firewall Managed Service II-51 Microsoft to Unveil Microsoft Security Essentials II-52 Kaspersky Lab Introduces Kaspersky Anti-Virus for Mac OS II-52 Panda Security Introduces Advanced Security Tools II-52 Symantec Unveils Norton 2010 Range of Security Products II-53 M86 Security Launches WebMarshal 6.5 II-53 Trend Micro Rolls Out Internet Security Products II-54 Microsoft to Introduce Microsoft Security Essentials Antivirus II-55 Kaspersky Lab Introduces Kaspersky Anti-Virus 2010 and Kaspersky Internet Security 2010(TM) II-55 BitDefender Unveils Anti-Virus Scanner Software II-56 Norman Launches New Technology for Malware Detection II-56 MicroWorld Introduces MailScan 6.1 II-57 F-Secure Introduces Client Security 9 II-57 AVG Launches AVG Link Scanner II-57 PC Tools Unveils iAntiVirus Version 1.0 II-58 ESET Introduces ESET Personal Firewall Module II-58 Trend Micro Introduces Threat Management Services II-59 AVG Unveils AVG 9.0 II-59 6. PRODUCT INTRODUCTIONS/INNOVATIONS - A HISTORIC PERSPECTIVE BUILDER II-61 MXI Security(TM) Offers Anti-Phishing Solution to Combat Online Security Threats II-61 PGP and Lumension Jointly Launch PGP EndPoint II-61 Check Point Extends Capabilities of Check Point Integrity II-61 McAfee Attaches Endpoint Encryption into McAfee Total Protection II-61 SECUDE International Unveils FinallySecure(TM) 9.1 II-61 Senforce Technologies® Improves Endpoint Security Suite with Encryption Solution II-62 Recipero Limited Introduces CheckMEND across the US II-62 Trend Micro Unveils New Range of Client Security Products II-62 Intrepidus Group Unveils PhishMe II-63 Trend Micro Launches Worry-Free Business Security 5.1 II-63 Trend Micro Unveils Trend MicroTM Message Archiver II-63 ESET Introduces ESET Mobile Anti-Virus II-64 Vere Software Introduces WebCase Internet Forensic Software II-64 McAfee Unveils Anti-Theft Protection II-64 Trend Micro Introduces Email Encryption Solution Portfolio II-64 7. RECENT INDUSTRY ACTIVITY II-66 AVG Technologies Acquires DroidSecurity II-66 Raytheon Company Takes Over Trusted Computer Solutions II-66 Webroot Software Purchases Prevyx II-66 Intel Signs Definitive Agreement to Purchase McAfee II-67 IBM Takes Over BigFix II-67 Emsi Software Purchases Online Armor Software from Tall Emu II-67 AVG Technologies Enters into Collaboration with Google II-67 Imperva Establishes Hacker Intelligence Initiative II-68 Microsoft Establishes Internet Fraud Alert Group II-68 immixGroup Bags Contract from US Department of Homeland Security II-68 Tech Data and BitDefender® Ink an Agreement II-69 Avira Acquires CleanPort II-69 F-Secure Inks Agreement with 3 Italia II-69 K7 Computing Enters into Strategic Collaboration with Proxma II-70 FaceTime Communications Signs Licensing Agreement with Sunbelt Software II-70 Cisco® Collaborates with Trend Micro to Introduce Home Network Defender II-70 Marshal8e6 Pockets Avinti II-70 Trend Micro to Buy Third Brigade II-71 AVG Takes Over Sana Security II-71 RSA Teams Up with Trend Micro II-71 Trend Micro Enters into Partnership with Sago Networks II-72 Cisco Systems Acquires ScanSafe II-72 McAfee Acquires Solidcore Systems II-73 AvePoint Enters into Partnership with Trend Micro II-73 Kaspersky Lab and Juniper Networks Extend Partnership II-74 Aladdin Knowledge Systems Merges with Investor Group II-74 8. STRATEGIC CORPORATE DEVELOPMENTS - A HISTORIC PERSPECTIVE BUILDER II-75 Alternative Technology, Aladdin Knowledge Systems Ink Agreement II-75 Seagate Technology, WinMagic Enter Into Partnership II-75 Actebis Peacock, Seagate, SECUDE Introduce Full Disk Encryption Technology II-75 Seagate, McAfee, and Dell to Develop Data Encryption Solution II-76 Concordia University Establishes National Cyber Forensics Training Alliance Canada II-76 IT Companies Form Consortium for World IT Security II-76 Paradigm Establishes Cyber Forensics Training Academy II-76 Marshall Merges with 8e6 Technologies to Form Marshal8e6 II-77 Sophos Acquires Majority Stake in Utimaco Safeware II-77 Axway Takes Over Tumbleweed Communications II-77 Thales Acquires nCipher for £50.7 Million II-77 McAfee Acquires Secure Computing II-78 KONGSBERG Purchases AchillesTM Satellite System II-78 Aladdin Knowledge Systems Introduces Attack Intelligence Research Center II-78 GRISOFT Renamed as AVG Technologies II-78 Microsoft Takes Over Komoku II-79 Trend Micro Takes Over Identum II-79 Trustwave Acquires Creduware II-79 McAfee Acquires ScanAlert Inc, and Reconnex Inc. II-80 McAfee Purchases SafeBoot Holding II-80 9. FOCUS ON SELECT PLAYERS II-81 AVG Technologies (Czech Republic) II-81 BitDefender® LLC (USA) II-81 CA Technologies, Inc. (USA) II-81 Check Point Software Technologies Ltd. (Israel) II-82 Cisco Systems, Inc. (USA) II-83 IronPort (USA) II-83 F-Secure Corporation (Finland) II-83 IBM Corporation (USA) II-84 BigFix, Inc. (USA) II-84 IBM Internet Security Systems (USA) II-85 Juniper Networks, Inc. (USA) II-85 Kaspersky Lab (Russia) II-86 McAfee, Inc. (USA) II-86 Microsoft Corporation (USA) II-87 Panda Security (Spain) II-87 SafeNet, Inc (USA) II-87 Sophos PLC (UK) II-88 Utimaco Safeware AG (Germany) II-88 Symantec Corporation (USA) II-89 MessageLabs Ltd (UK) II-89 Trend Micro Incorporated (USA) II-89 WebSense, Inc. (USA) II-90 10. GLOBAL MARKET PERSPECTIVE II-91 Table 12: World Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-91 Table 13: World Historic Review for Cyber Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-92 Table 14: World 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-93 Table 15: World Recent Past, Current & Future Analysis for Application Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-94 Table 16: World Historic Review for Application Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-95 Table 17: World 15-Year Perspective for Application Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-96 Table 18: World Recent Past, Current & Future Analysis for Content Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-97 Table 19: World Historic Review for Content Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-98 Table 20: World 15-Year Perspective for Content Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-99 Table 21: World Recent Past, Current & Future Analysis for Data Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-100 Table 22: World Historic Review for Data Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-101 Table 23: World 15-Year Perspective for Data Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-102 Table 24: World Recent Past, Current & Future Analysis for Endpoint Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-103 Table 25: World Historic Review for Endpoint Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-104 Table 26: World 15-Year Perspective for Endpoint Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-105 Table 27: World Recent Past, Current & Future Analysis for Network Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-106 Table 28: World Historic Review for Network Security by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-107 Table 29: World 15-Year Perspective for Network Security by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-108 Table 30: World Recent Past, Current & Future Analysis for Identity & Access Management by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-109 Table 31: World Historic Review for Identity & Access Management by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-110 Table 32: World 15-Year Perspective for Identity & Access Management by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-111 Table 33: World Recent Past, Current & Future Analysis for Risk & Compliance Management by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-112 Table 34: World Historic Review for Risk & Compliance Management by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-113 Table 35: World 15-Year Perspective for Risk & Compliance Management by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-114 Table 36: World Recent Past, Current & Future Analysis for Consulting Services by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-115 Table 37: World Historic Review for Consulting Services by Geographic Region - US, Canada, Europe, Asia- Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-116 Table 38: World 15-Year Perspective for Consulting Services by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-117 Table 39: World Recent Past, Current & Future Analysis for Security Operations by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) II-118 Table 40: World Historic Review for Security Operations by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) II-119 Table 41: World 15-Year Perspective for Security Operations by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) II-120 III. MARKET 1. THE UNITED STATES III-1 A.Market Analysis III-1 Rising Cybercrime Activities in the US III-1 Banking/Financial Institutions: A Key End Use Industry III-1 Identity Theft: A Growing Menace in the US III-1 Regulatory Environment III-2 Key Statistics III-2 Table 42: Cyber Security Breaches in the US (2010): Percentage Share Breakdown by User Group (includes corresponding Graph/Chart) III-2 B.Market Analytics III-3 Table 43: US Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-3 Table 44: US Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-4 Table 45: US 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-5 2. CANADA III-6 A.Market Analysis III-6 Market Overview III-6 B.Market Analytics III-7 Table 46: Canadian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-7 Table 47: Canadian Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-8 Table 48: Canadian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-9 3. JAPAN III-10 A.Market Analysis III-10 Cyber Security Market - A Primer III-10 Regulatory Environment III-10 Competitive Scenario III-10 B.Market Analytics III-11 Table 49: Japanese Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-11 Table 50: Japanese Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-12 Table 51: Japanese 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-13 4. EUROPE III-14 A.Market Analysis III-14 Market Overview III-14 Regulatory Environment III-14 B.Market Analytics III-15 Table 52: European Recent Past, Current & Future Analysis for Cyber Security by Geographic Region - France, Germany, Italy, UK, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-15 Table 53: European Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-16 Table 54: European Historic Review for Cyber Security by Geographic Region - France, Germany, Italy, UK, and Rest of Europe Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-17 Table 55: European Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-18 Table 56: European 15-Year Perspective for Cyber Security by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, and Rest of Europe Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-19 Table 57: European 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-20 4a. FRANCE III-21 A.Market Analysis III-21 Market Overview III-21 B.Market Analytics III-22 Table 58: French Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-22 Table 59: French Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-23 Table 60: French 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-24 4b. GERMANY III-25 A.Market Analysis III-25 Market Overview III-25 B.Market Analytics III-26 Table 61: German Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-26 Table 62: German Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-27 Table 63: German 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-28 4c. ITALY III-29 A.Market Analysis III-29 Market Overview III-29 B.Market Analytics III-30 Table 64: Italian Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-30 Table 65: Italian Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-31 Table 66: Italian 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-32 4d. THE UNITED KINGDOM III-33 A.Market Analysis III-33 Market Overview III-33 B.Market Analytics III-34 Table 67: UK Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-34 Table 68: UK Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-35 Table 69: UK 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-36 4e. REST OF EUROPE III-37 A.Market Analysis III-37 Russia III-37 Market Overview III-37 Russian Antivirus Market - An Insight III-37 Table 70: Leading Vendors in the Russian Anti-Virus Software Market (2010): Percentage Share Breakdown of Value Sales for Kaspersky Lab, Eset, Symantec, DrWeb, Trend Micro, and Others (includes corresponding Graph/Chart) III-37 B.Market Analytics III-38 Table 71: Rest of Europe Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-38 Table 72: Rest of Europe Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-39 Table 73: Rest of Europe 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-40 5. ASIA-PACIFIC III-41 A.Market Analysis III-41 Market Overview III-41 Focus on Select Regional Markets III-41 China III-41 Regulatory Overview III-42 Table 74: Chinese Network Security Market (2010): Percentage Share Breakdown of Value Sales by Leading Companies - Beijing Topsec Network Security Technology Co Ltd., Beijing Rising International Software Co Ltd., Cisco Systems, Symantec, Neusoft Corporation, Trend Micro, Juniper Networks, Check Point, and Others (includes corresponding Graph/Chart) III-43 India III-43 Market Overview III-43 Impact of Cyber Crimes on Indian Companies III-44 The Indian Security Market III-45 Indian Anti-Virus Market III-45 Select Key Players III-46 MicroWorld Technologies, Inc. III-46 Quick Heal Technologies (P) Ltd. III-46 B.Market Analytics III-47 Table 75: Asia-Pacific Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-47 Table 76: Asia-Pacific Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-48 Table 77: Asia-Pacific 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-49 6. LATIN AMERICA III-50 A.Market Analysis III-50 Network Security Market Shows Steady Growth III-50 Competitive Landscape III-50 Table 78: Latin American Network Security Market (2010): Percentage Value Share Breakdown by Country/Region - Brazil, Mexico, and Rest of Latin America (includes corresponding Graph/Chart) III-50 Table 79: Latin American Network Security Market (2010): Percentage Breakdown of Value Sales by Leading Company for Check Point, Cisco, Juniper, IBM ISS, McAfee, SonicWALL Inc, Enterasys Networks Inc, Aker Security Solutions, and Others (includes corresponding Graph/Chart) III-51 Table 80: Latin American IDS/IPS Market (2010): Percentage Breakdown of Value Sales by Leading Company for IBM ISS, Cisco, McAfee, Check Point, Enterasys Networks Inc, and Others (includes corresponding Graph/Chart) III-51 End-Use Market III-51 Table 81: Latin American Network Security Market (2010): Percentage Breakdown of Value Sales by End-Use Segment - Banking and Finance, Government, Telecom & Technology, Manufacturing, Retail, and Others (includes corresponding Graph/Chart) III-52 B.Market Analytics III-53 Table 82: Latin America Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-53 Table 83: Latin America Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-54 Table 84: Latin America 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-55 7. REST OF WORLD III-56 A.Market Analysis III-56 Security Software Market in Gulf States on the Rise III-56 B.Market Analytics III-57 Table 85: Rest of World Recent Past, Current & Future Analysis for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2009 through 2017 (includes corresponding Graph/Chart) III-57 Table 86: Rest of World Historic Review for Cyber Security by Segment - Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets Independently Analyzed with Annual Revenues in US$ Million for Years 2003 through 2008 (includes corresponding Graph/Chart) III-58 Table 87: Rest of World 15-Year Perspective for Cyber Security by Segment - Percentage Breakdown of Revenues for Application Security, Content Security, Data Security, Endpoint Security, Network Security, Identity & Access Management, Risk & Compliance Management, Security Operations, and Consulting Services Markets for Years 2003, 2011 & 2017 (includes corresponding Graph/Chart) III-59 IV. COMPETITIVE LANDSCAPE Total Companies Profiled: 128 (including Divisions/Subsidiaries - 149) Region/Country Players The United States 73 Canada 4 Japan 3 Europe 37 France 3 Germany 5 The United Kingdom 11 Spain 1 Rest of Europe 17 Asia-Pacific (Excluding Japan) 30 Middle East 2 To order this report: Security Systems Industry: Global Cyber Security Industry More Market Research Report Check our Industry Analysis and Insights CONTACT: Nicolas BombourgReportlinkerEmail: [email protected]: (805)652-2626Intl: +1 805-652-2626 SOURCE Reportlinker

[ Back To TMCnet.com's Homepage ]