Threat Hunting Market Size, Share, Growth Analysis, By Offering (Tools, Service), Threat Type, Deployment Mode, Organization Size, Vertical (BFSI, Healthcare, IT&ITEs Government) and Region - Global Industry Forecast to 2029
The threat-hunting market is set to grow significantly. It's expected to be worth around USD 3.4 billion in 2024 and increase to about USD 6.9 billion by 2029 at a CAGR of 14.9% during the forecast... もっと見る
日本語のページは自動翻訳を利用し作成しています。
SummaryThe threat-hunting market is set to grow significantly. It's expected to be worth around USD 3.4 billion in 2024 and increase to about USD 6.9 billion by 2029 at a CAGR of 14.9% during the forecast period. The threat-hunting market is thriving in response to the escalating sophistication and frequency of cyberattacks. The ever-evolving landscape of cyber threats necessitates a more dynamic defense. Traditional security tools need help to keep up with the ever-increasing cunning of attackers who employ novel tactics and exploit previously unknown vulnerabilities. Through a combination of skilled analysts, advanced threat intelligence, and specialized tools, threat hunting empowers organizations to uncover these hidden threats before they can cause significant damage. Businesses are becoming increasingly cognizant of the potential ramifications of cyberattacks, driving them to invest in proactive security solutions. As the threat landscape evolves, the need for threat hunting will only become more critical, ensuring this vital security practice's continued growth and importance."By deployment mode, the cloud segment will grow at a higher CAGR during the forecast period." Cloud environments are highly dynamic and complex, incorporating multiple infrastructure layers, platforms, and services across public, private, and hybrid clouds. This complexity introduces new attack surfaces and vulnerabilities that traditional security measures may need help to detect and mitigate effectively. Cloud environments' increasing complexity, scale, and regulatory scrutiny drive the demand for robust threat-hunting solutions. By addressing the unique security challenges of cloud deployments and leveraging advanced technologies, threat hunting enables organizations to protect sensitive data, maintain compliance with regulatory requirements, and safeguard their digital assets in the evolving threat landscape of cloud computing. "By Tools, the Network Detection and Response segment will grow at the highest CAGR during the forecast period. " Network Detection and Response (NDR) is poised to exhibit the highest Compound Annual Growth Rate (CAGR) in the threat-hunting market segmented by tools. NDR solutions are crucial for threat hunting because they monitor real-time network traffic, detect suspicious activities, and provide rapid incident response capabilities. As organizations increasingly recognize the importance of proactive network security and real-time threat detection, the demand for NDR tools is expected to surge. NDR solutions leverage advanced analytics, machine learning, and AI-driven algorithms to identify anomalies and potential threats across complex network environments, enhancing overall cybersecurity resilience. "By region, North America will have the largest market size during the forecast period." North America has many large enterprises across various sectors like finance, healthcare, and technology. These organizations hold vast amounts of sensitive data and intellectual property, making them prime cyberattack targets. The United States is often more involved in or directly impacted by geopolitical events. As per the State of Threat Hunting published by census, the US experiences the highest number of cyberattacks globally – twice as many as Europe. This fuels the need for proactive threat hunting to identify and neutralize threats before they can cause significant damage across the region. Also, while there's a global cybersecurity talent shortage, North America has a relatively more extensive pool of skilled professionals than other regions. Breakdown of primaries: In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, other innovation and technology directors, and executives from various key organizations operating in the Threat hunting market. • By company type: Tier 1: 20%, Tier 2: 47%, and Tier 3: 33% • By designation: C-level: 40%, Managers and another level: 60% • By Region: North America: 20%, Europe: 35%, Asia Pacific: 45%, Major vendors in the global Threat hunting market include IBM(US), Kaspersky (Russia), Capgemini (France), CrowdStrike(US), Trustwave(US), Verizon (US), SecureWorks(US), Sangfor (China), Eviden (France), Rapid 7(US), VMware (US), Solidworks (US), Trend Micro (Japan), Cynet (US), Palo Alto Networks (US) Cipher (India), Talatek (US), SOC Prime (US), RSI Security (US), Protected Harbour (US), Mindpoint Group (US), Exponential- E (UK), Redscan (UK), Iron Net Cybersecurity (US), LiveAction (US). The study includes an in-depth competitive analysis of the critical threat hunting market players, company profiles, recent developments, and key market strategies. Research Coverage The report comprehensively segments the Threat hunting market. It provides forecasts regarding its size across various dimensions, including offering (tools, services), threat type, organization size (large enterprises and SMEs), deployment mode (cloud and on-premises), vertical (BFSI, IT & ITES, government, energy & utilities, manufacturing, healthcare, retail, and other verticals), and region (North America, Europe, Middle East & Africa, Asia Pacific, and Latin America). Additionally, the study encompasses a thorough competitive analysis of key market players, offering insights into their company profiles, product and business offerings, recent developments, and key market strategies. Key benefits of buying report The report offers valuable insights to market leaders and new entrants by providing close approximations of revenue figures for the Threat hunting market and its subsegments. Stakeholders can leverage this report to understand the competitive landscape better, enabling them to position their businesses more effectively and develop tailored go-to-market strategies. Additionally, stakeholders can grasp the market dynamics and stay informed about key drivers, restraints, challenges, and opportunities shaping the industry landscape. The report provides insights on the following pointers: • Analysis of critical drivers (the rise and the speed in the ferocity of cyberattacks, the growing menace of supply chain attacks), restraints (Budget constraints and return on investments), opportunities (The rise of generative AI leading to AI-based threat-hunting tools), and challenges (false positives & unknown assets) • Product Development/Innovation: Detailed insights on upcoming technologies, research development activities, new products, and service launches in the threat-hunting market. • Market Development: Comprehensive information about lucrative markets – the report analyses the Threat hunting market across varied regions. • Market Diversification: Exhaustive information about new products and services, untapped geographies, recent developments, and investments in the threat-hunting market. • Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players IBM(US), Kaspersky (Russia), Capgemini (France), CrowdStrike(US), Trustwave(US), Verizon (US), SecureWorks(US), Sangfor (China), Eviden (France), Rapid 7(US), VMware (US), Solidworks (US), Trend Micro (Japan), Cynet (US), Palo Alto Networks (US) among others, in the threat hunting market. Table of Contents1 INTRODUCTION 331.1 STUDY OBJECTIVES 33 1.2 MARKET DEFINITION 33 1.2.1 INCLUSIONS & EXCLUSIONS 34 1.3 STUDY SCOPE 35 1.3.1 MARKET SEGMENTATION 35 1.4 YEARS CONSIDERED 36 1.5 CURRENCY CONSIDERED 36 1.6 STAKEHOLDERS 37 1.7 RECESSION IMPACT 37 2 RESEARCH METHODOLOGY 39 2.1 RESEARCH DATA 39 2.1.1 SECONDARY DATA 40 2.1.2 PRIMARY DATA 40 2.1.2.1 Breakdown of primary profiles 41 2.1.2.2 Key insights from industry experts 41 2.2 DATA TRIANGULATION 42 2.3 MARKET SIZE ESTIMATION 43 2.3.1 REVENUE ESTIMATES 44 2.3.1.1 Top-down approach 44 2.3.1.2 Bottom-up approach 45 2.4 MARKET FORECAST 46 2.5 RESEARCH ASSUMPTIONS 47 2.6 LIMITATIONS AND RISK ASSESSMENT 48 3 EXECUTIVE SUMMARY 49 4 PREMIUM INSIGHTS 52 4.1 ATTRACTIVE OPPORTUNITIES FOR PLAYERS IN THREAT HUNTING MARKET 52 4.2 THREAT HUNTING MARKET, BY OFFERING 52 4.3 THREAT HUNTING MARKET, BY TOOL 53 4.4 THREAT HUNTING MARKET, BY SERVICE 53 4.5 THREAT HUNTING MARKET, BY ORGANIZATION SIZE 54 4.6 THREAT HUNTING MARKET, BY DEPLOYMENT MODE 54 4.7 THREAT HUNTING MARKET, BY VERTICAL 55 4.8 THREAT HUNTING MARKET, BY REGION 55 4.9 MARKET INVESTMENT SCENARIO 56 5 MARKET OVERVIEW AND INDUSTRY TRENDS 57 5.1 INTRODUCTION 57 5.2 MARKET DYNAMICS 57 5.2.1 DRIVERS 58 5.2.1.1 Increase in frequency and ferocity of cyberattacks 58 5.2.1.2 Spike in prevalence of supply chain attacks 58 5.2.1.3 Use of sophisticated techniques for exploiting cloud vulnerabilities 58 5.2.2 RESTRAINTS 59 5.2.2.1 Budget constraints and increasing complexity of calculating return on investments 59 5.2.2.2 Integration with existing security infrastructure 59 5.2.3 OPPORTUNITIES 59 5.2.3.1 Growing adoption of AI-based threat-hunting tools 59 5.2.3.2 Integration of robust threat intelligence platforms into threat-hunting capabilities 60 5.2.4 CHALLENGES 60 5.2.4.1 False positives and presence of unknown assets 60 5.2.4.2 Data overload and alert fatigue 60 5.2.4.3 Lack of skilled security professionals 60 5.3 THREAT HUNTING TECHNOLOGY EVOLUTION 61 5.3.1 EARLY DAYS - REACTIVE HUNTING WITH INDICATORS OF COMPROMISE (IOCS) 61 5.3.2 RISE OF PROACTIVE HUNTING - UNDERSTANDING ATTACKER BEHAVIOR 61 5.3.3 MODERN ERA - AUTOMATION AND ORCHESTRATION 61 5.4 CASE STUDY ANALYSIS 62 5.4.1 CAPGEMINI HELPED FINANCIAL SERVICES FIRM ESTABLISH SECURITY OPERATIONS CENTER (SOC) CAPABILITY ON AGGRESSIVE DEPLOYMENT SCHEDULE 62 5.4.2 CROWDSTRIKE ASSISTED GLOBAL MANUFACTURING COMPANY IN IMPROVING WORKFLOW AND INCREASING EFFICIENCY 63 5.4.3 TRUSTWAVE SPIDERLABS’ THREAT HUNTER HELPED PUBLIC UTILITY COMPANY ENHANCE IT SECURITY POSTURE 63 5.5 VALUE CHAIN ANALYSIS 64 5.5.1 OFFERINGS 65 5.5.2 PLANNING AND DESIGNING 65 5.5.3 DEPLOYMENT (IF APPLICABLE) 65 5.5.4 SYSTEM INTEGRATION 65 5.5.5 CONSULTATION 65 5.5.6 ONSITE SUPPORT (IF REQUIRED) 65 5.5.7 END-USER GROUPS 65 5.6 MARKET MAP 66 5.7 PORTER’S FIVE FORCES ANALYSIS 67 5.7.1 THREAT OF NEW ENTRANTS 68 5.7.2 BARGAINING POWER OF SUPPLIERS 68 5.7.3 BARGAINING POWER OF BUYERS 68 5.7.4 THREAT OF SUBSTITUTES 68 5.7.5 INTENSITY OF COMPETITIVE RIVALRY 68 5.8 KEY STAKEHOLDERS & BUYING CRITERIA 69 5.8.1 KEY STAKEHOLDERS IN BUYING PROCESS 69 5.8.2 BUYING CRITERIA 70 5.9 PRICING ANALYSIS 70 5.9.1 INDICATIVE PRICE TREND OF KEY PLAYERS, BY OFFERING 70 5.9.2 INDICATIVE PRICING ANALYSIS, BY OFFERING 71 5.9.3 INDICATIVE PRICING ANALYSIS, BY VENDOR 71 5.10 TECHNOLOGY ANALYSIS 72 5.10.1 KEY TECHNOLOGIES 72 5.10.1.1 Security information and event management 72 5.10.1.2 Endpoint detection and response 72 5.10.1.3 User and entity behavior analytics 72 5.10.1.4 Threat intelligence 72 5.10.1.5 Machine learning and artificial intelligence 73 5.10.2 COMPLEMENTARY TECHNOLOGIES 73 5.10.2.1 Security orchestration, automation, and response 73 5.10.2.2 Network traffic analysis 73 5.10.3 ADJACENT TECHNOLOGIES 73 5.10.3.1 Extended detection and response 73 5.10.3.2 Cloud security posture management 74 5.10.3.3 Vulnerability management 74 5.11 PATENT ANALYSIS 74 5.11.1 KEY PATENTS 76 5.12 TRENDS/DISRUPTIONS IMPACTING CUSTOMERS’ BUSINESSES 76 5.13 REGULATORY LANDSCAPE 77 5.13.1 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 77 5.13.2 REGULATIONS, BY REGION 78 5.14 KEY CONFERENCES & EVENTS 82 5.15 BUSINESS MODEL ANALYSIS 83 5.15.1 SUBSCRIPTION-BASED MODEL 83 5.15.2 PERPETUAL LICENSE MODEL 83 5.15.3 PAY-PER-USE MODEL 83 5.15.4 CONSULTING AND PROFESSIONAL SERVICES MODEL 83 5.15.5 INTEGRATED SOLUTIONS MODEL 83 5.16 INVESTMENT & FUNDING SCENARIO 84 6 THREAT HUNTING MARKET, BY OFFERING 85 6.1 INTRODUCTION 86 6.1.1 OFFERING: THREAT HUNTING MARKET DRIVERS 86 6.2 TOOLS 87 6.2.1 THREAT-HUNTING TOOLS TO REDUCE RISKS OF DATA BREACHES AND OPERATIONAL DISRUPTIONS 87 6.2.2 ENDPOINT DETECTION AND RESPONSE (EDR) 89 6.2.3 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) 90 6.2.4 NETWORK DETECTION AND RESPONSE (NDR) 91 6.2.5 THREAT INTELLIGENCE PLATFORM 92 6.2.6 OTHER TOOLS 93 6.3 SERVICES 94 6.3.1 THREAT-HUNTING SERVICES TO OFFER CRITICAL SUPPORT IN IDENTIFYING AND MITIGATING POTENTIAL CYBER THREATS 94 6.3.2 PROFESSIONAL SERVICES 96 6.3.3 MANAGED SERVICES 97 7 THREAT HUNTING MARKET, BY ORGANIZATION SIZE 99 7.1 INTRODUCTION 100 7.1.1 ORGANIZATION SIZE: THREAT HUNTING MARKET DRIVERS 100 7.2 SMALL AND MEDIUM ENTERPRISES (SMES) 101 7.2.1 THREAT-HUNTING SOLUTIONS TO FOCUS ON AFFORDABILITY, EASE OF DEPLOYMENT, AND AUTOMATION 101 7.3 LARGE ENTERPRISES 102 7.3.1 LARGE ENTERPRISES TO PRIORITIZE SCALABILITY, INTEGRATION WITH EXISTING SECURITY FRAMEWORKS, AND COMPLIANCE WITH REGULATORY REQUIREMENTS 102 8 THREAT HUNTING MARKET, BY DEPLOYMENT MODE 104 8.1 INTRODUCTION 105 8.1.1 DEPLOYMENT MODE: THREAT HUNTING MARKET DRIVERS 105 8.2 ON-PREMISES 106 8.2.1 ON-PREMISES DEPLOYMENT TO ENABLE DIRECT MANAGEMENT OF SECURITY POLICIES AND REAL-TIME DATA VISIBILITY 106 8.3 CLOUD 107 8.3.1 CLOUD DEPLOYMENT TO PROVIDE AGILITY, COST-EFFICIENCY, AND GLOBAL ACCESSIBILITY IN CYBERSECURITY OPERATIONS 107 9 THREAT HUNTING MARKET, BY VERTICAL 109 9.1 INTRODUCTION 110 9.1.1 VERTICAL: THREAT HUNTING MARKET DRIVERS 110 9.2 BFSI 112 9.2.1 RISING DEMAND FOR DATA PROTECTION SERVICES IN FINANCIAL INSTITUTIONS TO DRIVE MARKET 112 9.3 IT & ITES 113 9.3.1 GROWING CONCERNS OF FRAUD AND COMPLIANCE TO PROPEL MARKET 113 9.4 GOVERNMENT 114 9.4.1 RISING CONCERNS ABOUT IDENTITY THEFT AND BUSINESS FRAUD TO FUEL MARKET GROWTH 114 9.5 ENERGY & UTILITIES 115 9.5.1 NEED TO SECURE CRITICAL INFRASTRUCTURE TO FUEL SEGMENT GROWTH 115 9.6 MANUFACTURING 116 9.6.1 MOBILE SECURITY TO BOOST MANAGED SECURITY INFRASTRUCTURE 116 9.7 HEALTHCARE 117 9.7.1 INCREASING NEED TO SECURE CRITICAL PATIENT DATA ACROSS CLOUD ENVIRONMENT TO BOOST MARKET 117 9.8 RETAIL & ECOMMERCE 118 9.8.1 AUTOMATION ACROSS RETAIL CHANNELS FOR CURBING DATA THEFT TO PROPEL MARKET 118 9.9 OTHER VERTICALS 119 10 THREAT HUNTING MARKET, BY THREAT TYPE 121 10.1 INTRODUCTION 122 10.1.1 THREAT TYPE: ATTACK SURFACE MANAGEMENT MARKET DRIVERS 122 10.2 ADVANCED PERSISTENT THREATS (APTS) 123 10.2.1 DEPLOYMENT OF ADVANCED THREAT INTELLIGENCE MEASURES TO MITIGATE IMPACT OF ADVANCED PERSISTENT THREATS 123 10.3 MALWARE AND RANSOMWARE 123 10.3.1 SURGING DEMAND FOR EFFECTIVE THREAT-HUNTING STRATEGIES TO PROPEL MARKET GROWTH 123 10.4 INSIDER THREATS 123 10.4.1 GROWING CONCERNS OVER INSIDER MISUSE AND DATA BREACHES TO DRIVE MARKET 123 10.5 PHISHING AND SOCIAL ENGINEERING 124 10.5.1 THREAT HUNTING FOR PHISHING AND SOCIAL ENGINEERING TO FOCUS ON IDENTIFYING PHISHING CAMPAIGNS AND MONITORING USER INTERACTIONS 124 10.6 OTHER THREATS 124 11 THREAT HUNTING MARKET, BY REGION 125 11.1 INTRODUCTION 126 11.2 NORTH AMERICA 127 11.2.1 NORTH AMERICA: THREAT HUNTING MARKET DRIVERS 128 11.2.2 NORTH AMERICA: RECESSION IMPACT 128 11.2.3 US 133 11.2.3.1 Growing reliance on advanced analytics to drive market 133 11.2.4 CANADA 137 11.2.4.1 Urgent need for effective cybersecurity measures to accelerate market growth 137 11.3 EUROPE 140 11.3.1 EUROPE: THREAT HUNTING MARKET DRIVERS 140 11.3.2 EUROPE: RECESSION IMPACT 141 11.3.3 UK 145 11.3.3.1 Enhanced cyber threat awareness to drive market 145 11.3.4 GERMANY 148 11.3.4.1 Increasing investments in proactive security solutions to drive market 148 11.3.5 FRANCE 152 11.3.5.1 Growing security concerns and increasing emphasis on national security to boost market 152 11.3.6 ITALY 155 11.3.6.1 Heightened cyber threat awareness to propel market growth 155 11.3.7 REST OF EUROPE 158 11.4 ASIA PACIFIC 162 11.4.1 ASIA PACIFIC: THREAT HUNTING MARKET DRIVERS 162 11.4.2 ASIA PACIFIC: RECESSION IMPACT 163 11.4.3 CHINA 168 11.4.3.1 Rapid digitalization and stringent cybersecurity regulations to foster market growth 168 11.4.4 JAPAN 171 11.4.4.1 Growing adoption of advanced AI-driven threat-hunting technologies to drive market 171 11.4.5 AUSTRALIA AND NEW ZEALAND 174 11.4.5.1 Increased funding and allocation of resources for threat-hunting initiatives to drive market 174 11.4.6 INDIA 178 11.4.6.1 Growing significance of threat hunting in safeguarding country’s digital infrastructure to aid market growth 178 11.4.7 REST OF ASIA PACIFIC 182 11.5 MIDDLE EAST & AFRICA 186 11.5.1 MIDDLE EAST & AFRICA: THREAT HUNTING MARKET DRIVERS 186 11.5.2 MIDDLE EAST 191 11.5.2.1 Escalating cyberattacks, economic development, and increasing digital adoption to drive market 191 11.5.3 GULF COOPERATION COUNCIL (GCC) 191 11.5.3.1 Surging need for advanced security measures for protection of sensitive data and digital assets to drive market 191 11.5.3.2 KSA 195 11.5.3.2.1 Economic development and regulatory imperatives to boost market 195 11.5.3.3 UAE 198 11.5.3.3.1 Rapid digitalization, strict regulations, and heightened awareness of cyber threats to boost market 198 11.5.3.4 Rest of GCC 202 11.5.4 SOUTH AFRICA 202 11.5.4.1 Regulatory compliance and cyber resilience to propel market 202 11.5.5 REST OF MIDDLE EAST & AFRICA 205 11.6 LATIN AMERICA 209 11.6.1 LATIN AMERICA: THREAT HUNTING MARKET DRIVERS 209 11.6.2 LATIN AMERICA: RECESSION IMPACT 210 11.6.3 BRAZIL 214 11.6.3.1 Rising cyber threats and regulatory compliance to boost market 214 11.6.4 MEXICO 217 11.6.4.1 Surging need for safeguarding evolving digital assets and infrastructure from escalating cyber threats to bolster market 217 11.6.5 REST OF LATIN AMERICA 220 12 COMPETITIVE LANDSCAPE 225 12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN 225 12.2 REVENUE ANALYSIS 227 12.3 MARKET SHARE ANALYSIS 228 12.4 BRAND COMPARISON 230 12.5 COMPANY VALUATION AND FINANCIAL METRICS 231 12.5.1 COMPANY VALUATION 231 12.5.2 FINANCIAL METRICS USING EV/EBIDTA 231 12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023 232 12.6.1 STARS 232 12.6.2 EMERGING LEADERS 232 12.6.3 PERVASIVE PLAYERS 232 12.6.4 PARTICIPANTS 233 12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2023 234 12.6.5.1 Company footprint 234 12.6.5.2 Regional footprint 234 12.6.5.3 Solution footprint 235 12.6.5.4 Vertical footprint 236 12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023 236 12.7.1 PROGRESSIVE COMPANIES 237 12.7.2 RESPONSIVE COMPANIES 237 12.7.3 DYNAMIC COMPANIES 237 12.7.4 STARTING BLOCKS 237 12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023 238 12.7.5.1 Detailed list of key startups/SMEs 238 12.7.5.2 Competitive benchmarking of key startups/SMEs 239 12.8 COMPETITIVE SCENARIO 241 12.8.1 PRODUCT LAUNCHES 241 12.8.2 DEALS 247 13 COMPANY PROFILES 255 13.1 KEY PLAYERS 255 13.1.1 PALO ALTO NETWORKS 255 13.1.1.1 Business overview 255 13.1.1.2 Products/Solutions/Services offered 256 13.1.1.3 Recent developments 258 13.1.1.4 MnM view 261 13.1.1.4.1 Right to win 261 13.1.1.4.2 Strategic choices 261 13.1.1.4.3 Weaknesses and competitive threats 261 13.1.2 CROWDSTRIKE 262 13.1.2.1 Business overview 262 13.1.2.2 Products/Solutions/Services offered 263 13.1.2.3 Recent developments 265 13.1.2.4 MnM view 268 13.1.2.4.1 Right to win 268 13.1.2.4.2 Strategic choices 268 13.1.2.4.3 Weaknesses and competitive threats 268 13.1.3 RAPID7 269 13.1.3.1 Business overview 269 13.1.3.2 Products/Solutions/Services offered 270 13.1.3.3 Recent developments 271 13.1.3.4 MnM view 274 13.1.3.4.1 Key strengths 274 13.1.3.4.2 Strategic choices 274 13.1.3.4.3 Weaknesses and competitive threats 274 13.1.4 VMWARE 275 13.1.4.1 Business overview 275 13.1.4.2 Products/Solutions/Services Offered 276 13.1.4.3 Recent developments 278 13.1.4.4 MnM view 279 13.1.4.4.1 Key strengths 279 13.1.4.4.2 Strategic choices 280 13.1.4.4.3 Weaknesses and competitive threats 280 13.1.5 IBM 281 13.1.5.1 Business overview 281 13.1.5.2 Products/Solutions/Services Offered 282 13.1.5.3 Recent developments 283 13.1.5.4 MnM view 284 13.1.5.4.1 Right to win 284 13.1.5.4.2 Strategic choices 284 13.1.5.4.3 Weaknesses and competitive threats 284 13.1.6 TREND MICRO 285 13.1.6.1 Business overview 285 13.1.6.2 Products/Solutions/Services offered 286 13.1.6.3 Recent developments 286 13.1.7 CAPGEMINI 287 13.1.7.1 Business overview 287 13.1.7.2 Products/Solutions/Services offered 288 13.1.8 KASPERSKY 290 13.1.8.1 Business overview 290 13.1.8.2 Products/Solutions/Services offered 290 13.1.8.3 Recent developments 291 13.1.9 VERIZON 292 13.1.9.1 Business overview 292 13.1.9.2 Products/Solutions/Services offered 293 13.1.10 SECUREWORKS 295 13.1.10.1 Business overview 295 13.1.10.2 Products/Solutions/Services Offered 296 13.1.10.3 Recent developments 298 13.1.11 SANGFOR 300 13.1.11.1 Business overview 300 13.1.11.2 Products/Solutions/Services offered 300 13.1.11.3 Recent developments 301 13.1.12 EVIDEN 303 13.1.12.1 Business overview 303 13.1.12.2 Products/Solutions/Services Offered 303 13.1.12.3 Recent developments 304 13.1.13 SOLARWINDS 306 13.1.13.1 Business overview 306 13.1.13.2 Products/Solutions/Services offered 307 13.1.14 CYNET 309 13.1.14.1 Business overview 309 13.1.14.2 Products/Solutions/Services offered 309 13.1.14.3 Recent developments 311 13.1.15 MANDIANT 313 13.1.16 BINARY DEFENSE 314 13.1.17 SOPHOS 315 13.2 OTHER PLAYERS 316 13.2.1 ESENTIRE 316 13.2.2 DEEPWATCH 317 13.2.3 NETSURION 317 13.2.4 GOSECURE 318 13.2.5 LMNTRIX 318 13.2.6 UNDERDEFENSE 319 13.2.7 ACKCENT 319 13.2.8 CYBEREASON 320 13.2.9 CRITICAL START 320 13.2.10 CYSIV 321 13.2.11 CRITICAL INSIGHT 321 13.2.12 CIPHER MANAGED SECURITY SERVICES 322 13.2.13 TALATEK 323 13.2.14 SOC PRIME 323 13.2.15 RSI SECURITY 324 13.2.16 PROTECTED HARBOR 325 13.2.17 MINDPOINT GROUP 325 13.2.18 EXPONENTIAL-E 326 13.2.19 REDSCAN 327 13.2.20 IRON NET CYBERSECURITY 328 13.2.21 LIVEACTION 329 14 ADJACENT MARKETS 330 14.1 INTRODUCTION TO ADJACENT MARKETS 330 14.2 LIMITATIONS 330 14.3 SECURITY AND VULNERABILITY MANAGEMENT MARKET 331 14.3.1 INCLUSIONS AND EXCLUSIONS 331 14.4 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) MARKET 335 14.4.1 INCLUSIONS AND EXCLUSIONS 335 15 APPENDIX 338 15.1 DISCUSSION GUIDE 338 15.2 KNOWLEDGESTORE: MARKETSANDMARKETS’ SUBSCRIPTION PORTAL 343 15.3 CUSTOMIZATION OPTIONS 345 15.4 RELATED REPORTS 345 15.5 AUTHOR DETAILS 346
ご注文は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。本レポートと同分野(通信・IT)の最新刊レポート
MarketsandMarkets社のTelecom & IT分野での最新刊レポート
本レポートと同じKEY WORD(bfsi)の最新刊レポート
よくあるご質問MarketsandMarkets社はどのような調査会社ですか?マーケッツアンドマーケッツ(MarketsandMarkets)は通信、半導体、医療機器、エネルギーなど、幅広い市場に関する調査レポートを出版しています。また広範な市場を対象としたカスタム調査も行って... もっと見る 調査レポートの納品までの日数はどの程度ですか?在庫のあるものは速納となりますが、平均的には 3-4日と見て下さい。
注文の手続きはどのようになっていますか?1)お客様からの御問い合わせをいただきます。
お支払方法の方法はどのようになっていますか?納品と同時にデータリソース社よりお客様へ請求書(必要に応じて納品書も)を発送いたします。
データリソース社はどのような会社ですか?当社は、世界各国の主要調査会社・レポート出版社と提携し、世界各国の市場調査レポートや技術動向レポートなどを日本国内の企業・公官庁及び教育研究機関に提供しております。
|
詳細検索
2024/12/19 10:26 155.94 円 162.31 円 199.02 円 |