Summary
このレポートは世界のサイバーセキュリティ市場を調査し、主要企業の戦略や市場動向を掲載しています。
主な掲載内容
ベンダ分析:54のサイバーセキュリティ事業者の評価
-
エンドポイントセキュリティー企業19社
-
クラウドセキュリティプロバイダ15社
-
認証&アクセス管理プロバイダ14社
-
セキュリティ啓発とトレーニングプロバイダ6社
Overview
Juniper Research’s The Future of Cybercrime & Security market research provides a comprehensive analysis of the threat landscape and state of enterprise cybersecurity; presenting cybercrime, legislation and security market trends to allow industry players to understand and prepare for the future of this vital industry.
The research suite includes:
-
Market Trends & Opportunities:
-
Key trends and the future direction of cybercrime: Breakdown of threats and market developments by segment.
-
Legislation Analysis: Recent and future cybersecurity legislation and an assessment of the impact of government actions, alongside trends in the cybersecurity investment space.
-
Strategic Analysis: Sector analysis and Juniper Research’s Leaderboard assessment for the following players:
-
Endpoint Security:
-
Avast
-
Barkly
-
Carbon Black
-
Cylance
-
DarkTrace
-
FireEye
-
IBM
-
Lookout
-
Minerva
-
Paladion
-
Palo Alto Networks
-
SentinelOne
-
SentryBay
-
SonicWall
-
Sophos
-
Symantec
-
Tanium
-
Trend Micro
-
Webroot
-
Cloud Cybersecurity providers:
-
Alert Logic
-
AlienVault (part of AT&T)
-
CipherCloud
-
CloudFlare
-
Cyberark
-
DarkTrace
-
Forcepoint
-
IBM
-
Illumio
-
Netskope
-
Palo Alto Networks
-
Qualys
-
SecureWorks
-
Trend Micro
-
Zscaler
-
Identity & Access Management providers:
-
Akamai
-
Avoco Secure
-
Centrify
-
Cyberark
-
Duo
-
Evernym
-
Forgerock
-
IBM
-
Okta
-
Oracle
-
Ping Identity
-
RSA
-
SailPoint
-
Yoti
-
Security Awareness Training providers:
-
KnowB4
-
Cofense
-
Proofpoint
-
The Defence Works
-
SANS Institute
-
Infosec Institute
-
Interactive Forecast Excel: Highly granular dataset comprising of more than 3,700 datapoints allied to regional and sector analysis tools. Includes regional and key country level analysis together with 5-year forecasts for the cybersecurity market:
-
Cost of data breaches
-
Average breach cost
-
Average breach size
-
Number of breaches and level of breach reporting
-
Cybersecurity spend levels for small, medium and large businesses
ページTOPに戻る
Table of Contents
Table of Contents
1. The Outlook for Cybercrime & Financial Services
1.1 Introduction . 5
1.2 Key Takeaways . 5
2. Cybercrime Trends
2.1 Introduction . 8
2.2 Definitions & Typology . 8
2.2.1 Incident Types . 8
2.2.2 Attack Types. 8
i. DoS & DDoS . 8
ii. Phishing . 9
iii. Trojans . 9
iv. Keylogging . 9
v. MITM Attacks . 9
vi. Scrapers & Skimmers . 10
vii. Ransomware . 10
viii. Botnets . 10
ix. Cryptojacking . 10
x. Quantum Computing . 11
2.2.3 Motivations . 11
2.3 Cybercrime Trends . 11
Figure 2.1: DDoS Attack Trends . 12
Case Study: Smarter Botnets Take on Businesses . 13
Figure 2.2: Multi-Vector DDoS Attacks . 14
2.4 Juniper Cybercrime Threat Assessments . 16
2.4.1 Financial Threat Assessments . 16
i. Banking . 16
Figure 2.3: Juniper Research 2019 Banking Cybercrime Threat Landscape
Assessment . 17
Figure 2.4: Juniper Research Banking Cybercrime Future Threat Landscape . 18
ii. Payments & Money Transfer . 19
Figure 2.5: Juniper Research 2019 Payments & Money Transfer Cybercrime
Threat Landscape Assessment . 19
Figure 2.6: Juniper Research Payments & Money Transfer Cybercrime Future
Threat Landscape . 20
iii. Mobile Wallets . 20
Figure 2.7: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape
Assessment . 21
Figure 2.8: Juniper Research Mobile Wallets Cybercrime Future Threat
Landscape . 22
2.4.2 Device Threat Assessment . 23
i. Smartphones . 23
Figure 2.9: Juniper Research 2019 Smartphone Cybercrime Threat Landscape
Assessment . 23
Figure 2.10: Juniper Research Smartphone Cybercrime Future Threat
Landscape . 24
ii. IoT Devices . 25
Figure 2.11: Juniper Research 2019 IoT Cybercrime Threat Landscape
Assessment . 25
Figure 2.12: Forecast - Juniper Research IoT Cybercrime Threat Landscape . 26
2.5 Cybercrime Breach Forecast . 27
2.5.1 Methodology. 27
Figure 2.13: Criminal Data Breach Forecast Methodology . 27
i. Forecast Assumptions & Limitations of Analysis . 28
2.6 Cybercrime Breaches Forecasts . 30
2.6.1 Breaches Volume . 30
Figure & Table 2.14: Total Number of Criminal Data Breaches per annum, Split by
8 Key Regions, 2019-2024 . 30
2.6.2 Data Breaches Value . 31
Figure & Table 2.15: Cost of Criminal Data Breaches per annum ($m), Split by 8
Key Regions 2019-2024 . 31
3. Cybersecurity Trends
3.1 Introduction . 33
3.1.1 Definitions . 33
3.2 Cybersecurity Trends . 33
Figure 3.1: Threats & Alerts Investigation Rate . 34
3.3 Cybersecurity Market Forecasts . 37
3.3.1 Cybersecurity Spend Forecast Methodology. 37
Figure 3.2: Cybersecurity Spend Forecast Methodology . 37
3.3.2 Forecast Assumptions & Limitations of Analysis . 38
3.3.3 Cybersecurity Market Spend Forecast . 39
Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key
Regions 2019-2024 . 39
3.4 Regulatory Environment . 40
3.4.1 North America . 40
i. US . 40
ii. Canada . 41
3.4.2 Latin America . 41
i. Argentina . 41
ii. Brazil . 41
iii. Mexico . 42
3.4.3 Europe . 42
i. EU . 42
ii. Germany . 43
iii. Russia . 44
iv. Turkey . 44
v. UK . 45
3.4.4 Asia Pacific . 45
i. China . 45
ii. Japan . 46
iii. India . 46
4. Cybersecurity Sector Outlook & Competitive Analysis
4.1 Cybersecurity Market Sectors Outlook . 49
4.1.1 Cloud Security . 49
4.1.2 IAM (Identity & Access Management) . 49
4.1.3 Endpoint Security . 50
4.1.4 Threat Intelligence . 51
4.1.5 Security Awareness Training . 52
4.2 Cybersecurity Market Sectors Competitive Analysis . 52
4.2.1 Vendor Assessment Criteria . 52
Table 4.1: Cybersecurity Vendor Assessment Criteria . 53
4.2.2 Cloud Security Providers Leaderboard . 54
Figure 4.2: Juniper Research Leaderboard for Cloud Security Providers . 54
i. Established Leaders . 54
ii. Leading Challengers . 55
iii. Disruptors & Emulators . 56
4.2.3 Identity & Access Management Leaderboard . 56
Figure 4.3: Juniper Research Leaderboard for IAM Providers . 56
i. Established Leaders . 57
ii. Leading Challengers . 57
iii. Disrupters & Emulators . 58
4.2.4 Endpoint Security Leaderboard . 59
Figure 4.4: Juniper Leaderboard for Endpoint Security Providers . 59
i. Established Leaders . 59
ii. Leading Challengers . 60
iii. Disruptors & Emulators . 61
4.2.5 Security Awareness Training Vendors . 62
Figure 4.5: Juniper Leaderboard for Security Awareness Training Vendors . 62
i. Established Leaders . 62
ii. Leading Challengers . 63
iii. Disruptors & Emulators . 63
4.2.6 Limitations & Interpretation . 63