世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

Threat Hunting Market Size, Share, Growth Analysis, By Offering (Tools, Service), Threat Type, Deployment Mode, Organization Size, Vertical (BFSI, Healthcare, IT&ITEs Government) and Region - Global Industry Forecast to 2029


The threat-hunting market is set to grow significantly. It's expected to be worth around USD 3.4 billion in 2024 and increase to about USD 6.9 billion by 2029 at a CAGR of 14.9% during the forecast... もっと見る

 

 

出版社 出版年月 電子版価格 ページ数 図表数 言語
MarketsandMarkets
マーケッツアンドマーケッツ
2024年7月16日 US$4,950
シングルユーザライセンス
ライセンス・価格情報
注文方法はこちら
347 518 英語

日本語のページは自動翻訳を利用し作成しています。


 

Summary

The threat-hunting market is set to grow significantly. It's expected to be worth around USD 3.4 billion in 2024 and increase to about USD 6.9 billion by 2029 at a CAGR of 14.9% during the forecast period. The threat-hunting market is thriving in response to the escalating sophistication and frequency of cyberattacks. The ever-evolving landscape of cyber threats necessitates a more dynamic defense. Traditional security tools need help to keep up with the ever-increasing cunning of attackers who employ novel tactics and exploit previously unknown vulnerabilities. Through a combination of skilled analysts, advanced threat intelligence, and specialized tools, threat hunting empowers organizations to uncover these hidden threats before they can cause significant damage. Businesses are becoming increasingly cognizant of the potential ramifications of cyberattacks, driving them to invest in proactive security solutions. As the threat landscape evolves, the need for threat hunting will only become more critical, ensuring this vital security practice's continued growth and importance.
"By deployment mode, the cloud segment will grow at a higher CAGR during the forecast period."
Cloud environments are highly dynamic and complex, incorporating multiple infrastructure layers, platforms, and services across public, private, and hybrid clouds. This complexity introduces new attack surfaces and vulnerabilities that traditional security measures may need help to detect and mitigate effectively. Cloud environments' increasing complexity, scale, and regulatory scrutiny drive the demand for robust threat-hunting solutions. By addressing the unique security challenges of cloud deployments and leveraging advanced technologies, threat hunting enables organizations to protect sensitive data, maintain compliance with regulatory requirements, and safeguard their digital assets in the evolving threat landscape of cloud computing.
"By Tools, the Network Detection and Response segment will grow at the highest CAGR during the forecast period. "
Network Detection and Response (NDR) is poised to exhibit the highest Compound Annual Growth Rate (CAGR) in the threat-hunting market segmented by tools. NDR solutions are crucial for threat hunting because they monitor real-time network traffic, detect suspicious activities, and provide rapid incident response capabilities. As organizations increasingly recognize the importance of proactive network security and real-time threat detection, the demand for NDR tools is expected to surge. NDR solutions leverage advanced analytics, machine learning, and AI-driven algorithms to identify anomalies and potential threats across complex network environments, enhancing overall cybersecurity resilience.
"By region, North America will have the largest market size during the forecast period."
North America has many large enterprises across various sectors like finance, healthcare, and technology. These organizations hold vast amounts of sensitive data and intellectual property, making them prime cyberattack targets. The United States is often more involved in or directly impacted by geopolitical events. As per the State of Threat Hunting published by census, the US experiences the highest number of cyberattacks globally – twice as many as Europe. This fuels the need for proactive threat hunting to identify and neutralize threats before they can cause significant damage across the region. Also, while there's a global cybersecurity talent shortage, North America has a relatively more extensive pool of skilled professionals than other regions.
Breakdown of primaries:
In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, other innovation and technology directors, and executives from various key organizations operating in the Threat hunting market.
• By company type: Tier 1: 20%, Tier 2: 47%, and Tier 3: 33%
• By designation: C-level: 40%, Managers and another level: 60%
• By Region: North America: 20%, Europe: 35%, Asia Pacific: 45%,

Major vendors in the global Threat hunting market include IBM(US), Kaspersky (Russia), Capgemini (France), CrowdStrike(US), Trustwave(US), Verizon (US), SecureWorks(US), Sangfor (China), Eviden (France), Rapid 7(US), VMware (US), Solidworks (US), Trend Micro (Japan), Cynet (US), Palo Alto Networks (US) Cipher (India), Talatek (US), SOC Prime (US), RSI Security (US), Protected Harbour (US), Mindpoint Group (US), Exponential- E (UK), Redscan (UK), Iron Net Cybersecurity (US), LiveAction (US). The study includes an in-depth competitive analysis of the critical threat hunting market players, company profiles, recent developments, and key market strategies.
Research Coverage
The report comprehensively segments the Threat hunting market. It provides forecasts regarding its size across various dimensions, including offering (tools, services), threat type, organization size (large enterprises and SMEs), deployment mode (cloud and on-premises), vertical (BFSI, IT & ITES, government, energy & utilities, manufacturing, healthcare, retail, and other verticals), and region (North America, Europe, Middle East & Africa, Asia Pacific, and Latin America).
Additionally, the study encompasses a thorough competitive analysis of key market players, offering insights into their company profiles, product and business offerings, recent developments, and key market strategies.
Key benefits of buying report
The report offers valuable insights to market leaders and new entrants by providing close approximations of revenue figures for the Threat hunting market and its subsegments. Stakeholders can leverage this report to understand the competitive landscape better, enabling them to position their businesses more effectively and develop tailored go-to-market strategies. Additionally, stakeholders can grasp the market dynamics and stay informed about key drivers, restraints, challenges, and opportunities shaping the industry landscape.
The report provides insights on the following pointers:
• Analysis of critical drivers (the rise and the speed in the ferocity of cyberattacks, the growing menace of supply chain attacks), restraints (Budget constraints and return on investments), opportunities (The rise of generative AI leading to AI-based threat-hunting tools), and challenges (false positives & unknown assets)
• Product Development/Innovation: Detailed insights on upcoming technologies, research development activities, new products, and service launches in the threat-hunting market.
• Market Development: Comprehensive information about lucrative markets – the report analyses the Threat hunting market across varied regions.
• Market Diversification: Exhaustive information about new products and services, untapped geographies, recent developments, and investments in the threat-hunting market.
• Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players IBM(US), Kaspersky (Russia), Capgemini (France), CrowdStrike(US), Trustwave(US), Verizon (US), SecureWorks(US), Sangfor (China), Eviden (France), Rapid 7(US), VMware (US), Solidworks (US), Trend Micro (Japan), Cynet (US), Palo Alto Networks (US) among others, in the threat hunting market.

ページTOPに戻る


Table of Contents

1 INTRODUCTION 33
1.1 STUDY OBJECTIVES 33
1.2 MARKET DEFINITION 33
1.2.1 INCLUSIONS & EXCLUSIONS 34
1.3 STUDY SCOPE 35
1.3.1 MARKET SEGMENTATION 35
1.4 YEARS CONSIDERED 36
1.5 CURRENCY CONSIDERED 36
1.6 STAKEHOLDERS 37
1.7 RECESSION IMPACT 37
2 RESEARCH METHODOLOGY 39
2.1 RESEARCH DATA 39
2.1.1 SECONDARY DATA 40
2.1.2 PRIMARY DATA 40
2.1.2.1 Breakdown of primary profiles 41
2.1.2.2 Key insights from industry experts 41
2.2 DATA TRIANGULATION 42
2.3 MARKET SIZE ESTIMATION 43
2.3.1 REVENUE ESTIMATES 44
2.3.1.1 Top-down approach 44
2.3.1.2 Bottom-up approach 45
2.4 MARKET FORECAST 46
2.5 RESEARCH ASSUMPTIONS 47
2.6 LIMITATIONS AND RISK ASSESSMENT 48
3 EXECUTIVE SUMMARY 49
4 PREMIUM INSIGHTS 52
4.1 ATTRACTIVE OPPORTUNITIES FOR PLAYERS IN THREAT HUNTING MARKET 52
4.2 THREAT HUNTING MARKET, BY OFFERING 52
4.3 THREAT HUNTING MARKET, BY TOOL 53
4.4 THREAT HUNTING MARKET, BY SERVICE 53
4.5 THREAT HUNTING MARKET, BY ORGANIZATION SIZE 54
4.6 THREAT HUNTING MARKET, BY DEPLOYMENT MODE 54
4.7 THREAT HUNTING MARKET, BY VERTICAL 55
4.8 THREAT HUNTING MARKET, BY REGION 55
4.9 MARKET INVESTMENT SCENARIO 56
5 MARKET OVERVIEW AND INDUSTRY TRENDS 57
5.1 INTRODUCTION 57
5.2 MARKET DYNAMICS 57
5.2.1 DRIVERS 58
5.2.1.1 Increase in frequency and ferocity of cyberattacks 58
5.2.1.2 Spike in prevalence of supply chain attacks 58
5.2.1.3 Use of sophisticated techniques for exploiting cloud vulnerabilities 58
5.2.2 RESTRAINTS 59
5.2.2.1 Budget constraints and increasing complexity of calculating
return on investments 59
5.2.2.2 Integration with existing security infrastructure 59
5.2.3 OPPORTUNITIES 59
5.2.3.1 Growing adoption of AI-based threat-hunting tools 59
5.2.3.2 Integration of robust threat intelligence platforms into
threat-hunting capabilities 60
5.2.4 CHALLENGES 60
5.2.4.1 False positives and presence of unknown assets 60
5.2.4.2 Data overload and alert fatigue 60
5.2.4.3 Lack of skilled security professionals 60
5.3 THREAT HUNTING TECHNOLOGY EVOLUTION 61
5.3.1 EARLY DAYS - REACTIVE HUNTING WITH INDICATORS OF
COMPROMISE (IOCS) 61
5.3.2 RISE OF PROACTIVE HUNTING - UNDERSTANDING ATTACKER BEHAVIOR 61
5.3.3 MODERN ERA - AUTOMATION AND ORCHESTRATION 61
5.4 CASE STUDY ANALYSIS 62
5.4.1 CAPGEMINI HELPED FINANCIAL SERVICES FIRM ESTABLISH SECURITY OPERATIONS CENTER (SOC) CAPABILITY ON AGGRESSIVE DEPLOYMENT SCHEDULE 62
5.4.2 CROWDSTRIKE ASSISTED GLOBAL MANUFACTURING COMPANY
IN IMPROVING WORKFLOW AND INCREASING EFFICIENCY 63
5.4.3 TRUSTWAVE SPIDERLABS’ THREAT HUNTER HELPED PUBLIC UTILITY COMPANY ENHANCE IT SECURITY POSTURE 63
5.5 VALUE CHAIN ANALYSIS 64
5.5.1 OFFERINGS 65
5.5.2 PLANNING AND DESIGNING 65
5.5.3 DEPLOYMENT (IF APPLICABLE) 65
5.5.4 SYSTEM INTEGRATION 65
5.5.5 CONSULTATION 65
5.5.6 ONSITE SUPPORT (IF REQUIRED) 65
5.5.7 END-USER GROUPS 65
5.6 MARKET MAP 66
5.7 PORTER’S FIVE FORCES ANALYSIS 67
5.7.1 THREAT OF NEW ENTRANTS 68
5.7.2 BARGAINING POWER OF SUPPLIERS 68
5.7.3 BARGAINING POWER OF BUYERS 68
5.7.4 THREAT OF SUBSTITUTES 68
5.7.5 INTENSITY OF COMPETITIVE RIVALRY 68
5.8 KEY STAKEHOLDERS & BUYING CRITERIA 69
5.8.1 KEY STAKEHOLDERS IN BUYING PROCESS 69
5.8.2 BUYING CRITERIA 70
5.9 PRICING ANALYSIS 70
5.9.1 INDICATIVE PRICE TREND OF KEY PLAYERS, BY OFFERING 70
5.9.2 INDICATIVE PRICING ANALYSIS, BY OFFERING 71
5.9.3 INDICATIVE PRICING ANALYSIS, BY VENDOR 71
5.10 TECHNOLOGY ANALYSIS 72
5.10.1 KEY TECHNOLOGIES 72
5.10.1.1 Security information and event management 72
5.10.1.2 Endpoint detection and response 72
5.10.1.3 User and entity behavior analytics 72
5.10.1.4 Threat intelligence 72
5.10.1.5 Machine learning and artificial intelligence 73
5.10.2 COMPLEMENTARY TECHNOLOGIES 73
5.10.2.1 Security orchestration, automation, and response 73
5.10.2.2 Network traffic analysis 73
5.10.3 ADJACENT TECHNOLOGIES 73
5.10.3.1 Extended detection and response 73
5.10.3.2 Cloud security posture management 74
5.10.3.3 Vulnerability management 74
5.11 PATENT ANALYSIS 74
5.11.1 KEY PATENTS 76
5.12 TRENDS/DISRUPTIONS IMPACTING CUSTOMERS’ BUSINESSES 76
5.13 REGULATORY LANDSCAPE 77
5.13.1 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 77
5.13.2 REGULATIONS, BY REGION 78
5.14 KEY CONFERENCES & EVENTS 82
5.15 BUSINESS MODEL ANALYSIS 83
5.15.1 SUBSCRIPTION-BASED MODEL 83
5.15.2 PERPETUAL LICENSE MODEL 83
5.15.3 PAY-PER-USE MODEL 83
5.15.4 CONSULTING AND PROFESSIONAL SERVICES MODEL 83
5.15.5 INTEGRATED SOLUTIONS MODEL 83
5.16 INVESTMENT & FUNDING SCENARIO 84

6 THREAT HUNTING MARKET, BY OFFERING 85
6.1 INTRODUCTION 86
6.1.1 OFFERING: THREAT HUNTING MARKET DRIVERS 86
6.2 TOOLS 87
6.2.1 THREAT-HUNTING TOOLS TO REDUCE RISKS OF DATA BREACHES
AND OPERATIONAL DISRUPTIONS 87
6.2.2 ENDPOINT DETECTION AND RESPONSE (EDR) 89
6.2.3 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) 90
6.2.4 NETWORK DETECTION AND RESPONSE (NDR) 91
6.2.5 THREAT INTELLIGENCE PLATFORM 92
6.2.6 OTHER TOOLS 93
6.3 SERVICES 94
6.3.1 THREAT-HUNTING SERVICES TO OFFER CRITICAL SUPPORT IN IDENTIFYING AND MITIGATING POTENTIAL CYBER THREATS 94
6.3.2 PROFESSIONAL SERVICES 96
6.3.3 MANAGED SERVICES 97
7 THREAT HUNTING MARKET, BY ORGANIZATION SIZE 99
7.1 INTRODUCTION 100
7.1.1 ORGANIZATION SIZE: THREAT HUNTING MARKET DRIVERS 100
7.2 SMALL AND MEDIUM ENTERPRISES (SMES) 101
7.2.1 THREAT-HUNTING SOLUTIONS TO FOCUS ON AFFORDABILITY,
EASE OF DEPLOYMENT, AND AUTOMATION 101
7.3 LARGE ENTERPRISES 102
7.3.1 LARGE ENTERPRISES TO PRIORITIZE SCALABILITY, INTEGRATION WITH EXISTING SECURITY FRAMEWORKS, AND COMPLIANCE WITH
REGULATORY REQUIREMENTS 102
8 THREAT HUNTING MARKET, BY DEPLOYMENT MODE 104
8.1 INTRODUCTION 105
8.1.1 DEPLOYMENT MODE: THREAT HUNTING MARKET DRIVERS 105
8.2 ON-PREMISES 106
8.2.1 ON-PREMISES DEPLOYMENT TO ENABLE DIRECT MANAGEMENT OF
SECURITY POLICIES AND REAL-TIME DATA VISIBILITY 106
8.3 CLOUD 107
8.3.1 CLOUD DEPLOYMENT TO PROVIDE AGILITY, COST-EFFICIENCY, AND
GLOBAL ACCESSIBILITY IN CYBERSECURITY OPERATIONS 107
9 THREAT HUNTING MARKET, BY VERTICAL 109
9.1 INTRODUCTION 110
9.1.1 VERTICAL: THREAT HUNTING MARKET DRIVERS 110
9.2 BFSI 112
9.2.1 RISING DEMAND FOR DATA PROTECTION SERVICES IN FINANCIAL INSTITUTIONS TO DRIVE MARKET 112
9.3 IT & ITES 113
9.3.1 GROWING CONCERNS OF FRAUD AND COMPLIANCE TO PROPEL MARKET 113
9.4 GOVERNMENT 114
9.4.1 RISING CONCERNS ABOUT IDENTITY THEFT AND BUSINESS FRAUD
TO FUEL MARKET GROWTH 114
9.5 ENERGY & UTILITIES 115
9.5.1 NEED TO SECURE CRITICAL INFRASTRUCTURE TO FUEL SEGMENT GROWTH 115
9.6 MANUFACTURING 116
9.6.1 MOBILE SECURITY TO BOOST MANAGED SECURITY INFRASTRUCTURE 116
9.7 HEALTHCARE 117
9.7.1 INCREASING NEED TO SECURE CRITICAL PATIENT DATA ACROSS CLOUD ENVIRONMENT TO BOOST MARKET 117
9.8 RETAIL & ECOMMERCE 118
9.8.1 AUTOMATION ACROSS RETAIL CHANNELS FOR CURBING DATA
THEFT TO PROPEL MARKET 118
9.9 OTHER VERTICALS 119
10 THREAT HUNTING MARKET, BY THREAT TYPE 121
10.1 INTRODUCTION 122
10.1.1 THREAT TYPE: ATTACK SURFACE MANAGEMENT MARKET DRIVERS 122
10.2 ADVANCED PERSISTENT THREATS (APTS) 123
10.2.1 DEPLOYMENT OF ADVANCED THREAT INTELLIGENCE MEASURES
TO MITIGATE IMPACT OF ADVANCED PERSISTENT THREATS 123
10.3 MALWARE AND RANSOMWARE 123
10.3.1 SURGING DEMAND FOR EFFECTIVE THREAT-HUNTING STRATEGIES
TO PROPEL MARKET GROWTH 123
10.4 INSIDER THREATS 123
10.4.1 GROWING CONCERNS OVER INSIDER MISUSE AND DATA BREACHES
TO DRIVE MARKET 123
10.5 PHISHING AND SOCIAL ENGINEERING 124
10.5.1 THREAT HUNTING FOR PHISHING AND SOCIAL ENGINEERING TO FOCUS ON IDENTIFYING PHISHING CAMPAIGNS AND MONITORING USER INTERACTIONS 124
10.6 OTHER THREATS 124
11 THREAT HUNTING MARKET, BY REGION 125
11.1 INTRODUCTION 126
11.2 NORTH AMERICA 127
11.2.1 NORTH AMERICA: THREAT HUNTING MARKET DRIVERS 128
11.2.2 NORTH AMERICA: RECESSION IMPACT 128
11.2.3 US 133
11.2.3.1 Growing reliance on advanced analytics to drive market 133
11.2.4 CANADA 137
11.2.4.1 Urgent need for effective cybersecurity measures to accelerate market growth 137
11.3 EUROPE 140
11.3.1 EUROPE: THREAT HUNTING MARKET DRIVERS 140
11.3.2 EUROPE: RECESSION IMPACT 141
11.3.3 UK 145
11.3.3.1 Enhanced cyber threat awareness to drive market 145
11.3.4 GERMANY 148
11.3.4.1 Increasing investments in proactive security solutions to drive market 148
11.3.5 FRANCE 152
11.3.5.1 Growing security concerns and increasing emphasis on national security to boost market 152
11.3.6 ITALY 155
11.3.6.1 Heightened cyber threat awareness to propel market growth 155
11.3.7 REST OF EUROPE 158
11.4 ASIA PACIFIC 162
11.4.1 ASIA PACIFIC: THREAT HUNTING MARKET DRIVERS 162
11.4.2 ASIA PACIFIC: RECESSION IMPACT 163
11.4.3 CHINA 168
11.4.3.1 Rapid digitalization and stringent cybersecurity regulations to
foster market growth 168
11.4.4 JAPAN 171
11.4.4.1 Growing adoption of advanced AI-driven threat-hunting technologies to drive market 171
11.4.5 AUSTRALIA AND NEW ZEALAND 174
11.4.5.1 Increased funding and allocation of resources for threat-hunting initiatives to drive market 174
11.4.6 INDIA 178
11.4.6.1 Growing significance of threat hunting in safeguarding country’s digital infrastructure to aid market growth 178
11.4.7 REST OF ASIA PACIFIC 182
11.5 MIDDLE EAST & AFRICA 186
11.5.1 MIDDLE EAST & AFRICA: THREAT HUNTING MARKET DRIVERS 186
11.5.2 MIDDLE EAST 191
11.5.2.1 Escalating cyberattacks, economic development, and increasing digital adoption to drive market 191
11.5.3 GULF COOPERATION COUNCIL (GCC) 191
11.5.3.1 Surging need for advanced security measures for protection of sensitive data and digital assets to drive market 191
11.5.3.2 KSA 195
11.5.3.2.1 Economic development and regulatory imperatives to boost market 195
11.5.3.3 UAE 198
11.5.3.3.1 Rapid digitalization, strict regulations, and heightened awareness of cyber threats to boost market 198
11.5.3.4 Rest of GCC 202

11.5.4 SOUTH AFRICA 202
11.5.4.1 Regulatory compliance and cyber resilience to propel market 202
11.5.5 REST OF MIDDLE EAST & AFRICA 205
11.6 LATIN AMERICA 209
11.6.1 LATIN AMERICA: THREAT HUNTING MARKET DRIVERS 209
11.6.2 LATIN AMERICA: RECESSION IMPACT 210
11.6.3 BRAZIL 214
11.6.3.1 Rising cyber threats and regulatory compliance to boost market 214
11.6.4 MEXICO 217
11.6.4.1 Surging need for safeguarding evolving digital assets and infrastructure from escalating cyber threats to bolster market 217
11.6.5 REST OF LATIN AMERICA 220
12 COMPETITIVE LANDSCAPE 225
12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN 225
12.2 REVENUE ANALYSIS 227
12.3 MARKET SHARE ANALYSIS 228
12.4 BRAND COMPARISON 230
12.5 COMPANY VALUATION AND FINANCIAL METRICS 231
12.5.1 COMPANY VALUATION 231
12.5.2 FINANCIAL METRICS USING EV/EBIDTA 231
12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023 232
12.6.1 STARS 232
12.6.2 EMERGING LEADERS 232
12.6.3 PERVASIVE PLAYERS 232
12.6.4 PARTICIPANTS 233
12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2023 234
12.6.5.1 Company footprint 234
12.6.5.2 Regional footprint 234
12.6.5.3 Solution footprint 235
12.6.5.4 Vertical footprint 236
12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023 236
12.7.1 PROGRESSIVE COMPANIES 237
12.7.2 RESPONSIVE COMPANIES 237
12.7.3 DYNAMIC COMPANIES 237
12.7.4 STARTING BLOCKS 237
12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023 238
12.7.5.1 Detailed list of key startups/SMEs 238
12.7.5.2 Competitive benchmarking of key startups/SMEs 239
12.8 COMPETITIVE SCENARIO 241
12.8.1 PRODUCT LAUNCHES 241
12.8.2 DEALS 247
13 COMPANY PROFILES 255
13.1 KEY PLAYERS 255
13.1.1 PALO ALTO NETWORKS 255
13.1.1.1 Business overview 255
13.1.1.2 Products/Solutions/Services offered 256
13.1.1.3 Recent developments 258
13.1.1.4 MnM view 261
13.1.1.4.1 Right to win 261
13.1.1.4.2 Strategic choices 261
13.1.1.4.3 Weaknesses and competitive threats 261
13.1.2 CROWDSTRIKE 262
13.1.2.1 Business overview 262
13.1.2.2 Products/Solutions/Services offered 263
13.1.2.3 Recent developments 265
13.1.2.4 MnM view 268
13.1.2.4.1 Right to win 268
13.1.2.4.2 Strategic choices 268
13.1.2.4.3 Weaknesses and competitive threats 268
13.1.3 RAPID7 269
13.1.3.1 Business overview 269
13.1.3.2 Products/Solutions/Services offered 270
13.1.3.3 Recent developments 271
13.1.3.4 MnM view 274
13.1.3.4.1 Key strengths 274
13.1.3.4.2 Strategic choices 274
13.1.3.4.3 Weaknesses and competitive threats 274
13.1.4 VMWARE 275
13.1.4.1 Business overview 275
13.1.4.2 Products/Solutions/Services Offered 276
13.1.4.3 Recent developments 278
13.1.4.4 MnM view 279
13.1.4.4.1 Key strengths 279
13.1.4.4.2 Strategic choices 280
13.1.4.4.3 Weaknesses and competitive threats 280
13.1.5 IBM 281
13.1.5.1 Business overview 281
13.1.5.2 Products/Solutions/Services Offered 282
13.1.5.3 Recent developments 283
13.1.5.4 MnM view 284
13.1.5.4.1 Right to win 284
13.1.5.4.2 Strategic choices 284
13.1.5.4.3 Weaknesses and competitive threats 284
13.1.6 TREND MICRO 285
13.1.6.1 Business overview 285
13.1.6.2 Products/Solutions/Services offered 286
13.1.6.3 Recent developments 286
13.1.7 CAPGEMINI 287
13.1.7.1 Business overview 287
13.1.7.2 Products/Solutions/Services offered 288
13.1.8 KASPERSKY 290
13.1.8.1 Business overview 290
13.1.8.2 Products/Solutions/Services offered 290
13.1.8.3 Recent developments 291
13.1.9 VERIZON 292
13.1.9.1 Business overview 292
13.1.9.2 Products/Solutions/Services offered 293
13.1.10 SECUREWORKS 295
13.1.10.1 Business overview 295
13.1.10.2 Products/Solutions/Services Offered 296
13.1.10.3 Recent developments 298
13.1.11 SANGFOR 300
13.1.11.1 Business overview 300
13.1.11.2 Products/Solutions/Services offered 300
13.1.11.3 Recent developments 301
13.1.12 EVIDEN 303
13.1.12.1 Business overview 303
13.1.12.2 Products/Solutions/Services Offered 303
13.1.12.3 Recent developments 304
13.1.13 SOLARWINDS 306
13.1.13.1 Business overview 306
13.1.13.2 Products/Solutions/Services offered 307
13.1.14 CYNET 309
13.1.14.1 Business overview 309
13.1.14.2 Products/Solutions/Services offered 309
13.1.14.3 Recent developments 311
13.1.15 MANDIANT 313
13.1.16 BINARY DEFENSE 314
13.1.17 SOPHOS 315
13.2 OTHER PLAYERS 316
13.2.1 ESENTIRE 316
13.2.2 DEEPWATCH 317
13.2.3 NETSURION 317
13.2.4 GOSECURE 318
13.2.5 LMNTRIX 318
13.2.6 UNDERDEFENSE 319
13.2.7 ACKCENT 319
13.2.8 CYBEREASON 320
13.2.9 CRITICAL START 320
13.2.10 CYSIV 321
13.2.11 CRITICAL INSIGHT 321
13.2.12 CIPHER MANAGED SECURITY SERVICES 322
13.2.13 TALATEK 323
13.2.14 SOC PRIME 323
13.2.15 RSI SECURITY 324
13.2.16 PROTECTED HARBOR 325
13.2.17 MINDPOINT GROUP 325
13.2.18 EXPONENTIAL-E 326
13.2.19 REDSCAN 327
13.2.20 IRON NET CYBERSECURITY 328
13.2.21 LIVEACTION 329
14 ADJACENT MARKETS 330
14.1 INTRODUCTION TO ADJACENT MARKETS 330
14.2 LIMITATIONS 330
14.3 SECURITY AND VULNERABILITY MANAGEMENT MARKET 331
14.3.1 INCLUSIONS AND EXCLUSIONS 331
14.4 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) MARKET 335
14.4.1 INCLUSIONS AND EXCLUSIONS 335
15 APPENDIX 338
15.1 DISCUSSION GUIDE 338
15.2 KNOWLEDGESTORE: MARKETSANDMARKETS’ SUBSCRIPTION PORTAL 343
15.3 CUSTOMIZATION OPTIONS 345
15.4 RELATED REPORTS 345
15.5 AUTHOR DETAILS 346

 

ページTOPに戻る

ご注文は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのご注文・お問合せはこちらのフォームから承ります

本レポートと同分野(通信・IT)の最新刊レポート

MarketsandMarkets社のTelecom & IT分野での最新刊レポート

本レポートと同じKEY WORD(bfsi)の最新刊レポート


よくあるご質問


MarketsandMarkets社はどのような調査会社ですか?


マーケッツアンドマーケッツ(MarketsandMarkets)は通信、半導体、医療機器、エネルギーなど、幅広い市場に関する調査レポートを出版しています。また広範な市場を対象としたカスタム調査も行って... もっと見る


調査レポートの納品までの日数はどの程度ですか?


在庫のあるものは速納となりますが、平均的には 3-4日と見て下さい。
但し、一部の調査レポートでは、発注を受けた段階で内容更新をして納品をする場合もあります。
発注をする前のお問合せをお願いします。


注文の手続きはどのようになっていますか?


1)お客様からの御問い合わせをいただきます。
2)見積書やサンプルの提示をいたします。
3)お客様指定、もしくは弊社の発注書をメール添付にて発送してください。
4)データリソース社からレポート発行元の調査会社へ納品手配します。
5) 調査会社からお客様へ納品されます。最近は、pdfにてのメール納品が大半です。


お支払方法の方法はどのようになっていますか?


納品と同時にデータリソース社よりお客様へ請求書(必要に応じて納品書も)を発送いたします。
お客様よりデータリソース社へ(通常は円払い)の御振り込みをお願いします。
請求書は、納品日の日付で発行しますので、翌月最終営業日までの当社指定口座への振込みをお願いします。振込み手数料は御社負担にてお願いします。
お客様の御支払い条件が60日以上の場合は御相談ください。
尚、初めてのお取引先や個人の場合、前払いをお願いすることもあります。ご了承のほど、お願いします。


データリソース社はどのような会社ですか?


当社は、世界各国の主要調査会社・レポート出版社と提携し、世界各国の市場調査レポートや技術動向レポートなどを日本国内の企業・公官庁及び教育研究機関に提供しております。
世界各国の「市場・技術・法規制などの」実情を調査・収集される時には、データリソース社にご相談ください。
お客様の御要望にあったデータや情報を抽出する為のレポート紹介や調査のアドバイスも致します。



詳細検索

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

 

2024/12/19 10:26

155.94 円

162.31 円

199.02 円

ページTOPに戻る