世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

サイバー犯罪とセキュリティの未来


The Future of Cybercrime & Security

このレポートは世界のサイバーセキュリティ市場を調査し、主要企業の戦略や市場動向を掲載しています。 主な掲載内容 ベンダ分析:54のサイバーセキュリティ事業者の評価 エンドポイント... もっと見る

 

 

出版社 出版年月 電子版価格 ページ数 言語
Juniper Research
ジュニパーリサーチ社
2019年8月27日 GBP2,250
企業ライセンス(PDF+Excel)
ライセンス・価格情報
注文方法はこちら
63 英語

 

サマリー

このレポートは世界のサイバーセキュリティ市場を調査し、主要企業の戦略や市場動向を掲載しています。

主な掲載内容

ベンダ分析:54のサイバーセキュリティ事業者の評価

  • エンドポイントセキュリティー企業19社
  • クラウドセキュリティプロバイダ15社
  • 認証&アクセス管理プロバイダ14社
  • セキュリティ啓発とトレーニングプロバイダ6社


Overview

Juniper Research’s The Future of Cybercrime & Security market research provides a comprehensive analysis of the threat landscape and state of enterprise cybersecurity; presenting cybercrime, legislation and security market trends to allow industry players to understand and prepare for the future of this vital industry.

The research suite includes:

  1. Market Trends & Opportunities:
    • Key trends and the future direction of cybercrime: Breakdown of threats and market developments by segment.
    • Legislation Analysis: Recent and future cybersecurity legislation and an assessment of the impact of government actions, alongside trends in the cybersecurity investment space.
  2. Strategic Analysis: Sector analysis and Juniper Research’s Leaderboard assessment for the following players:
    • Endpoint Security:
      • Avast
      • Barkly
      • Carbon Black
      • Cylance
      • DarkTrace
      • FireEye
      • IBM
      • Lookout
      • Minerva
      • Paladion
      • Palo Alto Networks
      • SentinelOne
      • SentryBay
      • SonicWall
      • Sophos
      • Symantec
      • Tanium
      • Trend Micro
      • Webroot
    • Cloud Cybersecurity providers:
      • Alert Logic
      • AlienVault (part of AT&T)
      • CipherCloud
      • CloudFlare
      • Cyberark
      • DarkTrace
      • Forcepoint
      • IBM
      • Illumio
      • Netskope
      • Palo Alto Networks
      • Qualys
      • SecureWorks
      • Trend Micro
      • Zscaler
    • Identity & Access Management providers:
      • Akamai
      • Avoco Secure
      • Centrify
      • Cyberark
      • Duo
      • Evernym
      • Forgerock
      • IBM
      • Okta
      • Oracle
      • Ping Identity
      • RSA
      • SailPoint
      • Yoti
    • Security Awareness Training providers:
      • KnowB4
      • Cofense
      • Proofpoint
      • The Defence Works
      • SANS Institute
      • Infosec Institute
  3. Interactive Forecast Excel: Highly granular dataset comprising of more than 3,700 datapoints allied to regional and sector analysis tools. Includes regional and key country level analysis together with 5-year forecasts for the cybersecurity market:
    • Cost of data breaches
    • Average breach cost
    • Average breach size
    • Number of breaches and level of breach reporting
    • Cybersecurity spend levels for small, medium and large businesses


ページTOPに戻る


目次

Table of Contents

1. The Outlook for Cybercrime & Financial Services

1.1 Introduction . 5
1.2 Key Takeaways . 5

2. Cybercrime Trends

2.1 Introduction . 8
2.2 Definitions & Typology . 8
2.2.1 Incident Types . 8
2.2.2 Attack Types. 8
i. DoS & DDoS . 8
ii. Phishing . 9
iii. Trojans . 9
iv. Keylogging . 9
v. MITM Attacks . 9
vi. Scrapers & Skimmers . 10
vii. Ransomware . 10
viii. Botnets . 10
ix. Cryptojacking . 10
x. Quantum Computing . 11
2.2.3 Motivations . 11
2.3 Cybercrime Trends . 11
Figure 2.1: DDoS Attack Trends . 12
Case Study: Smarter Botnets Take on Businesses . 13
Figure 2.2: Multi-Vector DDoS Attacks . 14
2.4 Juniper Cybercrime Threat Assessments . 16
2.4.1 Financial Threat Assessments . 16
i. Banking . 16
Figure 2.3: Juniper Research 2019 Banking Cybercrime Threat Landscape
Assessment . 17
Figure 2.4: Juniper Research Banking Cybercrime Future Threat Landscape . 18
ii. Payments & Money Transfer . 19
Figure 2.5: Juniper Research 2019 Payments & Money Transfer Cybercrime
Threat Landscape Assessment . 19
Figure 2.6: Juniper Research Payments & Money Transfer Cybercrime Future
Threat Landscape . 20
iii. Mobile Wallets . 20
Figure 2.7: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape
Assessment . 21
Figure 2.8: Juniper Research Mobile Wallets Cybercrime Future Threat
Landscape . 22
2.4.2 Device Threat Assessment . 23
i. Smartphones . 23
Figure 2.9: Juniper Research 2019 Smartphone Cybercrime Threat Landscape
Assessment . 23
Figure 2.10: Juniper Research Smartphone Cybercrime Future Threat
Landscape . 24
ii. IoT Devices . 25
Figure 2.11: Juniper Research 2019 IoT Cybercrime Threat Landscape
Assessment . 25
Figure 2.12: Forecast - Juniper Research IoT Cybercrime Threat Landscape . 26
2.5 Cybercrime Breach Forecast . 27
2.5.1 Methodology. 27
Figure 2.13: Criminal Data Breach Forecast Methodology . 27
i. Forecast Assumptions & Limitations of Analysis . 28
2.6 Cybercrime Breaches Forecasts . 30
2.6.1 Breaches Volume . 30
Figure & Table 2.14: Total Number of Criminal Data Breaches per annum, Split by
8 Key Regions, 2019-2024 . 30
2.6.2 Data Breaches Value . 31
Figure & Table 2.15: Cost of Criminal Data Breaches per annum ($m), Split by 8
Key Regions 2019-2024 . 31

3. Cybersecurity Trends

3.1 Introduction . 33
3.1.1 Definitions . 33
3.2 Cybersecurity Trends . 33
Figure 3.1: Threats & Alerts Investigation Rate . 34
3.3 Cybersecurity Market Forecasts . 37
3.3.1 Cybersecurity Spend Forecast Methodology. 37
Figure 3.2: Cybersecurity Spend Forecast Methodology . 37
3.3.2 Forecast Assumptions & Limitations of Analysis . 38
3.3.3 Cybersecurity Market Spend Forecast . 39
Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key
Regions 2019-2024 . 39
3.4 Regulatory Environment . 40
3.4.1 North America . 40
i. US . 40
ii. Canada . 41
3.4.2 Latin America . 41
i. Argentina . 41
ii. Brazil . 41
iii. Mexico . 42
3.4.3 Europe . 42
i. EU . 42
ii. Germany . 43
iii. Russia . 44
iv. Turkey . 44
v. UK . 45
3.4.4 Asia Pacific . 45
i. China . 45
ii. Japan . 46
iii. India . 46

4. Cybersecurity Sector Outlook & Competitive Analysis

4.1 Cybersecurity Market Sectors Outlook . 49
4.1.1 Cloud Security . 49
4.1.2 IAM (Identity & Access Management) . 49
4.1.3 Endpoint Security . 50
4.1.4 Threat Intelligence . 51
4.1.5 Security Awareness Training . 52
4.2 Cybersecurity Market Sectors Competitive Analysis . 52
4.2.1 Vendor Assessment Criteria . 52
Table 4.1: Cybersecurity Vendor Assessment Criteria . 53
4.2.2 Cloud Security Providers Leaderboard . 54
Figure 4.2: Juniper Research Leaderboard for Cloud Security Providers . 54
i. Established Leaders . 54
ii. Leading Challengers . 55
iii. Disruptors & Emulators . 56
4.2.3 Identity & Access Management Leaderboard . 56
Figure 4.3: Juniper Research Leaderboard for IAM Providers . 56
i. Established Leaders . 57
ii. Leading Challengers . 57
iii. Disrupters & Emulators . 58
4.2.4 Endpoint Security Leaderboard . 59
Figure 4.4: Juniper Leaderboard for Endpoint Security Providers . 59
i. Established Leaders . 59
ii. Leading Challengers . 60
iii. Disruptors & Emulators . 61
4.2.5 Security Awareness Training Vendors . 62
Figure 4.5: Juniper Leaderboard for Security Awareness Training Vendors . 62
i. Established Leaders . 62
ii. Leading Challengers . 63
iii. Disruptors & Emulators . 63
4.2.6 Limitations & Interpretation . 63

 

ページTOPに戻る


 

Summary

このレポートは世界のサイバーセキュリティ市場を調査し、主要企業の戦略や市場動向を掲載しています。

主な掲載内容

ベンダ分析:54のサイバーセキュリティ事業者の評価

  • エンドポイントセキュリティー企業19社
  • クラウドセキュリティプロバイダ15社
  • 認証&アクセス管理プロバイダ14社
  • セキュリティ啓発とトレーニングプロバイダ6社


Overview

Juniper Research’s The Future of Cybercrime & Security market research provides a comprehensive analysis of the threat landscape and state of enterprise cybersecurity; presenting cybercrime, legislation and security market trends to allow industry players to understand and prepare for the future of this vital industry.

The research suite includes:

  1. Market Trends & Opportunities:
    • Key trends and the future direction of cybercrime: Breakdown of threats and market developments by segment.
    • Legislation Analysis: Recent and future cybersecurity legislation and an assessment of the impact of government actions, alongside trends in the cybersecurity investment space.
  2. Strategic Analysis: Sector analysis and Juniper Research’s Leaderboard assessment for the following players:
    • Endpoint Security:
      • Avast
      • Barkly
      • Carbon Black
      • Cylance
      • DarkTrace
      • FireEye
      • IBM
      • Lookout
      • Minerva
      • Paladion
      • Palo Alto Networks
      • SentinelOne
      • SentryBay
      • SonicWall
      • Sophos
      • Symantec
      • Tanium
      • Trend Micro
      • Webroot
    • Cloud Cybersecurity providers:
      • Alert Logic
      • AlienVault (part of AT&T)
      • CipherCloud
      • CloudFlare
      • Cyberark
      • DarkTrace
      • Forcepoint
      • IBM
      • Illumio
      • Netskope
      • Palo Alto Networks
      • Qualys
      • SecureWorks
      • Trend Micro
      • Zscaler
    • Identity & Access Management providers:
      • Akamai
      • Avoco Secure
      • Centrify
      • Cyberark
      • Duo
      • Evernym
      • Forgerock
      • IBM
      • Okta
      • Oracle
      • Ping Identity
      • RSA
      • SailPoint
      • Yoti
    • Security Awareness Training providers:
      • KnowB4
      • Cofense
      • Proofpoint
      • The Defence Works
      • SANS Institute
      • Infosec Institute
  3. Interactive Forecast Excel: Highly granular dataset comprising of more than 3,700 datapoints allied to regional and sector analysis tools. Includes regional and key country level analysis together with 5-year forecasts for the cybersecurity market:
    • Cost of data breaches
    • Average breach cost
    • Average breach size
    • Number of breaches and level of breach reporting
    • Cybersecurity spend levels for small, medium and large businesses


ページTOPに戻る


Table of Contents

Table of Contents

1. The Outlook for Cybercrime & Financial Services

1.1 Introduction . 5
1.2 Key Takeaways . 5

2. Cybercrime Trends

2.1 Introduction . 8
2.2 Definitions & Typology . 8
2.2.1 Incident Types . 8
2.2.2 Attack Types. 8
i. DoS & DDoS . 8
ii. Phishing . 9
iii. Trojans . 9
iv. Keylogging . 9
v. MITM Attacks . 9
vi. Scrapers & Skimmers . 10
vii. Ransomware . 10
viii. Botnets . 10
ix. Cryptojacking . 10
x. Quantum Computing . 11
2.2.3 Motivations . 11
2.3 Cybercrime Trends . 11
Figure 2.1: DDoS Attack Trends . 12
Case Study: Smarter Botnets Take on Businesses . 13
Figure 2.2: Multi-Vector DDoS Attacks . 14
2.4 Juniper Cybercrime Threat Assessments . 16
2.4.1 Financial Threat Assessments . 16
i. Banking . 16
Figure 2.3: Juniper Research 2019 Banking Cybercrime Threat Landscape
Assessment . 17
Figure 2.4: Juniper Research Banking Cybercrime Future Threat Landscape . 18
ii. Payments & Money Transfer . 19
Figure 2.5: Juniper Research 2019 Payments & Money Transfer Cybercrime
Threat Landscape Assessment . 19
Figure 2.6: Juniper Research Payments & Money Transfer Cybercrime Future
Threat Landscape . 20
iii. Mobile Wallets . 20
Figure 2.7: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape
Assessment . 21
Figure 2.8: Juniper Research Mobile Wallets Cybercrime Future Threat
Landscape . 22
2.4.2 Device Threat Assessment . 23
i. Smartphones . 23
Figure 2.9: Juniper Research 2019 Smartphone Cybercrime Threat Landscape
Assessment . 23
Figure 2.10: Juniper Research Smartphone Cybercrime Future Threat
Landscape . 24
ii. IoT Devices . 25
Figure 2.11: Juniper Research 2019 IoT Cybercrime Threat Landscape
Assessment . 25
Figure 2.12: Forecast - Juniper Research IoT Cybercrime Threat Landscape . 26
2.5 Cybercrime Breach Forecast . 27
2.5.1 Methodology. 27
Figure 2.13: Criminal Data Breach Forecast Methodology . 27
i. Forecast Assumptions & Limitations of Analysis . 28
2.6 Cybercrime Breaches Forecasts . 30
2.6.1 Breaches Volume . 30
Figure & Table 2.14: Total Number of Criminal Data Breaches per annum, Split by
8 Key Regions, 2019-2024 . 30
2.6.2 Data Breaches Value . 31
Figure & Table 2.15: Cost of Criminal Data Breaches per annum ($m), Split by 8
Key Regions 2019-2024 . 31

3. Cybersecurity Trends

3.1 Introduction . 33
3.1.1 Definitions . 33
3.2 Cybersecurity Trends . 33
Figure 3.1: Threats & Alerts Investigation Rate . 34
3.3 Cybersecurity Market Forecasts . 37
3.3.1 Cybersecurity Spend Forecast Methodology. 37
Figure 3.2: Cybersecurity Spend Forecast Methodology . 37
3.3.2 Forecast Assumptions & Limitations of Analysis . 38
3.3.3 Cybersecurity Market Spend Forecast . 39
Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key
Regions 2019-2024 . 39
3.4 Regulatory Environment . 40
3.4.1 North America . 40
i. US . 40
ii. Canada . 41
3.4.2 Latin America . 41
i. Argentina . 41
ii. Brazil . 41
iii. Mexico . 42
3.4.3 Europe . 42
i. EU . 42
ii. Germany . 43
iii. Russia . 44
iv. Turkey . 44
v. UK . 45
3.4.4 Asia Pacific . 45
i. China . 45
ii. Japan . 46
iii. India . 46

4. Cybersecurity Sector Outlook & Competitive Analysis

4.1 Cybersecurity Market Sectors Outlook . 49
4.1.1 Cloud Security . 49
4.1.2 IAM (Identity & Access Management) . 49
4.1.3 Endpoint Security . 50
4.1.4 Threat Intelligence . 51
4.1.5 Security Awareness Training . 52
4.2 Cybersecurity Market Sectors Competitive Analysis . 52
4.2.1 Vendor Assessment Criteria . 52
Table 4.1: Cybersecurity Vendor Assessment Criteria . 53
4.2.2 Cloud Security Providers Leaderboard . 54
Figure 4.2: Juniper Research Leaderboard for Cloud Security Providers . 54
i. Established Leaders . 54
ii. Leading Challengers . 55
iii. Disruptors & Emulators . 56
4.2.3 Identity & Access Management Leaderboard . 56
Figure 4.3: Juniper Research Leaderboard for IAM Providers . 56
i. Established Leaders . 57
ii. Leading Challengers . 57
iii. Disrupters & Emulators . 58
4.2.4 Endpoint Security Leaderboard . 59
Figure 4.4: Juniper Leaderboard for Endpoint Security Providers . 59
i. Established Leaders . 59
ii. Leading Challengers . 60
iii. Disruptors & Emulators . 61
4.2.5 Security Awareness Training Vendors . 62
Figure 4.5: Juniper Leaderboard for Security Awareness Training Vendors . 62
i. Established Leaders . 62
ii. Leading Challengers . 63
iii. Disruptors & Emulators . 63
4.2.6 Limitations & Interpretation . 63

 

ページTOPに戻る

ご注文は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのご注文・お問合せはこちらのフォームから承ります

本レポートと同分野(セキュリティ)の最新刊レポート


よくあるご質問


Juniper Research社はどのような調査会社ですか?


ジュニパーリサーチ社(Juniper Research)は2001年の創立以来、モバイルとデジタル技術を専門に調査・出版事... もっと見る


調査レポートの納品までの日数はどの程度ですか?


在庫のあるものは速納となりますが、平均的には 3-4日と見て下さい。
但し、一部の調査レポートでは、発注を受けた段階で内容更新をして納品をする場合もあります。
発注をする前のお問合せをお願いします。


注文の手続きはどのようになっていますか?


1)お客様からの御問い合わせをいただきます。
2)見積書やサンプルの提示をいたします。
3)お客様指定、もしくは弊社の発注書をメール添付にて発送してください。
4)データリソース社からレポート発行元の調査会社へ納品手配します。
5) 調査会社からお客様へ納品されます。最近は、pdfにてのメール納品が大半です。


お支払方法の方法はどのようになっていますか?


納品と同時にデータリソース社よりお客様へ請求書(必要に応じて納品書も)を発送いたします。
お客様よりデータリソース社へ(通常は円払い)の御振り込みをお願いします。
請求書は、納品日の日付で発行しますので、翌月最終営業日までの当社指定口座への振込みをお願いします。振込み手数料は御社負担にてお願いします。
お客様の御支払い条件が60日以上の場合は御相談ください。
尚、初めてのお取引先や個人の場合、前払いをお願いすることもあります。ご了承のほど、お願いします。


データリソース社はどのような会社ですか?


当社は、世界各国の主要調査会社・レポート出版社と提携し、世界各国の市場調査レポートや技術動向レポートなどを日本国内の企業・公官庁及び教育研究機関に提供しております。
世界各国の「市場・技術・法規制などの」実情を調査・収集される時には、データリソース社にご相談ください。
お客様の御要望にあったデータや情報を抽出する為のレポート紹介や調査のアドバイスも致します。



詳細検索

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

 

2024/11/21 10:26

156.13 円

165.08 円

200.38 円

ページTOPに戻る