Breach and Attack Simulation Market by Application (Configuration Management, Patch Management, Threat Intelligence), Vertical (BFSI, Healthcare, IT & ITeS, Education, Manufacturing) - Global Forecast to 2029
The global Breach and Attack Simulation market size is projected to grow from USD 729.2 million in 2024 to USD 2,405.4 million by 2029 at a Compound Annual Growth Rate (CAGR) of 27.0% during the fo... もっと見る
日本語のページは自動翻訳を利用し作成しています。
SummaryThe global Breach and Attack Simulation market size is projected to grow from USD 729.2 million in 2024 to USD 2,405.4 million by 2029 at a Compound Annual Growth Rate (CAGR) of 27.0% during the forecast period.In the breach and attack simulation market, integration into the existing security solutions, which include SIEM and SOAR, drives the momentum of improving threat detection, response, and remediation. These have streamlined security processes, fastened response times, and vastly improved posture across industries. Finally, integrating AI and ML hardens the breach and attack simulation tools to predict specific vulnerabilities, simulate highly complex attacks, and give real-time feedback. Proactive cybersecurity strategies benefit from efficiency and reducing manual efforts in response to evolving cyber threats. The shift toward automation and AI-driven solutions allows organizations to meet compliance standards and build consumer trust. "By Professional Services, the Security Posture Assessment will grow at a higher CAGR during the forecast period." The professional services segment is expected to have the highest CAGR of the breach and attack simulation market due to the absence of in-house capabilities in most organizations, primarily in SMEs. Professional service providers bridge this gap by providing scalable, cost-effective security assessments. Also, solid testing mechanisms among managed service providers would be required to ensure adequate security in diverse client environments. It will thereby propel the use of breach and attack simulation services. Continuous security validation through training and on-demand services from analysts boost the proactive countering of organization vulnerabilities. The threat management segment had the most outstanding revenue share in 2023, reflecting the significant demand for specialty assessment to mitigate the growing cyber threats. Key industry players, including Rapid7, Cymulate, and AttackIQ, are leading in this market. "By Deployment Mode, the On-Premises segment accounts for the largest market size during the forecast period. " The on-premises segment of the breach and attack simulation market is a localized, customizable security testing approach with the software hosted in their data centers. Deployment of this type offers better control over sensitive data so that organizations can manage the testing process safely. On-premises breach and attack simulation solutions are also customizable and do not interfere with existing security structures. Hence, it is very suitable for industries to have rigid compliance. Most Vendors, such as Rapid7, Qualys, and Sophos, provide tailor-made on-premises solutions. However, the above solution requires high initial investments in hardware and software with an IT infrastructure. They pose scalability problems and require dedicated IT staff equipped with security-specific skills for maintenance and operation. "By region, North America is expected to be the largest market during the forecast period." Higher expenditure on cybersecurity in North America owing to the rise in cyber threats and fraud is quite prolific for the growth of the breach and attack simulation market. The US, for one, increased its cybersecurity budget to USD 20 billion in 2023 and effectively enlisted all its broad adoption of breach and attack simulation tools for proactive security testing. The healthcare sector, susceptible to data breaches, has further pushed demand for breach and attack simulation solutions. For instance, regulatory pressures - such as the Cybersecurity and Infrastructure Security Agency and California Consumer Privacy Act - drive the adoption of breach and attack simulation platforms as a compliance source. The two major leaders, AttackIQ and Cymulate, will fortify their position in this emerging market with complete solutions composed of scenario-based simulations, continuous testing, and vulnerability assessment. Breakdown of primaries: In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, other innovation and technology directors, and executives from various key organizations operating in the breach and attack simulation market. • By Company Type: Tier 1: 55%, Tier 2: 25%, and Tier 3: 20% • By Designation: Directors: 50%, Managers: 30% and Other: 20% • By Region: North America: 40%, Europe: 35%, Asia Pacific: 20%, RoW: 5% Cymulate (US), AttackIQ (US), XM Cyber (Israel), SafeBreach (US), Picus Security (US), Qualys (US), Rapid7 (US), IBM (US), Fortinet (US), Mandiant (US), Keysight Technologies (US), Aujas (US), Cytomate (Qatar), ReliaQuest (US), Detectify (Sweden), Scythe (US), BreachLock (US), CyCognito (US), Skybox Security (US), Aquila I (India), ImmuniWeb (Switzerland), ThreatGen (US), Strobes Security (US), NopSec (US), SimSpace (US), PurpleBox (US), and Kroll (US); are some of the key players in the breach and attack simulation solutions market. The study includes an in-depth competitive analysis of these key players in the breach and attack simulation market, with their company profiles, recent developments, and key market strategies. Research Coverage The report comprehensively segments the breach and attack simulation Market. It provides forecasts regarding its size across various dimensions, including By Offering (Platform & Tools, services), By Deployment Mode (Cloud, On-Premises), By Organization Size (SMEs, Large Enterprises ), By Application (Configuration Management, Patch Management, Threat Intelligence, Other Applications), By Vertical (BFSI, Healthcare, IT & ITES, Telecommunications, Retail & E-Commerce, Manufacturing, Education, Other Verticals), and Region (North America, Europe, Middle East & Africa, Asia Pacific, and Latin America). Additionally, the study encompasses a thorough competitive analysis of key market players, offering insights into their company profiles, product and business offerings, recent developments, and key market strategies. Key benefits of buying report The report offers valuable insights to market leaders and new entrants by closely approximating the breach and attack simulation market's revenue figures and subsegments. Stakeholders can leverage this report to better understand the competitive landscape, enabling them to position their businesses more effectively and develop tailored go-to-market strategies. Additionally, stakeholders can grasp the market dynamics and stay informed about key drivers, restraints, challenges, and opportunities shaping the industry landscape. The report provides insights on the following pointers: • Analysis of critical drivers (Growing complexity and rising threats of cyberattacks in the digital age, Growing need to adhere to stringent regulations and data privacy laws, Rising Need for Continuous Security Testing, Integration of breach and attack simulation solutions tools with existing security tools), restraints (Lack of Skilled Professionals, High Implementation and Maintenance Costs), opportunities (Integration of breach and attack simulation solutions with Attack Surface Management(ASM), Rapid adoption of cloud-based services, integration of artificial intelligence (AI) and machine learning (ML) into breach and attack simulation solutions, Digital Transformation initiatives), and challenges (Resource allocation and integration complexity, Organizational Resistance and Misconceptions about breach and attack simulation. • Product Development/Innovation: Detailed insights on upcoming technologies, research development activities, new products, and service launches in the breach and attack simulation market. • Market Development: Comprehensive information about lucrative markets – the report analyses the breach and attack simulation solutions market across varied regions. • Market Diversification: Exhaustive information about new products and services, untapped geographies, recent developments, and investments. • Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players Cymulate (India), AttackIQ (US), XM Cyber (Israel), SafeBreach (Israel), and Picus Security(US). Table of Contents1 INTRODUCTION 381.1 STUDY OBJECTIVES 38 1.2 MARKET DEFINITION 38 1.2.1 INCLUSIONS AND EXCLUSIONS 39 1.3 MARKET SCOPE 40 1.3.1 MARKET SEGMENTATION 40 1.3.2 YEARS CONSIDERED 41 1.4 CURRENCY CONSIDERED 41 1.5 STAKEHOLDERS 42 1.6 SUMMARY OF CHANGES 42 2 RESEARCH METHODOLOGY 43 2.1 RESEARCH DATA 43 2.1.1 SECONDARY DATA 45 2.1.2 PRIMARY DATA 45 2.1.2.1 Breakup of primaries 46 2.1.2.2 Key industry insights 46 2.2 MARKET BREAKUP AND DATA TRIANGULATION 47 2.3 MARKET SIZE ESTIMATION 48 2.3.1 TOP-DOWN APPROACH 49 2.3.2 BOTTOM-UP APPROACH 49 2.4 MARKET FORECAST 52 2.5 RESEARCH ASSUMPTIONS 53 2.6 STUDY LIMITATIONS 54 3 EXECUTIVE SUMMARY 55 4 PREMIUM INSIGHTS 59 4.1 ATTRACTIVE OPPORTUNITIES FOR KEY MARKET PLAYERS 59 4.2 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY OFFERING 60 4.3 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY DEPLOYMENT MODE 60 4.4 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY ORGANIZATION SIZE 61 4.5 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY KEY APPLICATION AND REGION 61 4.6 MARKET INVESTMENT SCENARIO 62 5 MARKET OVERVIEW AND INDUSTRY TRENDS 63 5.1 INTRODUCTION 63 5.2 MARKET DYNAMICS 64 5.2.1 DRIVERS 65 5.2.1.1 Growing complexity and rising threats of cyberattacks in digital age 65 5.2.1.2 Surging need for adherence to stringent regulations and data privacy laws 65 5.2.1.3 Rising need for continuous security testing 66 5.2.1.4 Integration of automated breach and attack simulation tools with existing security tools 66 5.2.2 RESTRAINTS 67 5.2.2.1 Lack of skilled professionals 67 5.2.2.2 High implementation and maintenance costs 67 5.2.3 OPPORTUNITIES 68 5.2.3.1 Integration of automated breach and attack simulation with attack surface management 68 5.2.3.2 Rapid adoption of cloud-based services 68 5.2.3.3 Integration of AI and ML into breach and attack simulation solutions 68 5.2.3.4 Digital transformation initiatives 69 5.2.4 CHALLENGES 69 5.2.4.1 Resource allocation and integration complexity 69 5.2.4.2 Organizational resistance and misconceptions about automated breach and attack simulation systems 70 5.3 IMPACT OF GENERATIVE AI (GENAI) ON AUTOMATED BREACH AND ATTACK SIMULATION MARKET 70 5.3.1 TOP USE CASES & MARKET POTENTIAL 70 5.3.1.1 Key use cases 71 5.3.2 TOP USE CASES AND MARKET POTENTIAL IN AUTOMATED BREACH AND ATTACK SIMULATION MARKET 71 5.3.3 IMPACT OF GEN AI ON INTERCONNECTED AND ADJACENT ECOSYSTEMS 73 5.3.3.1 Artificial intelligence and machine learning 73 5.3.3.2 Cloud computing 73 5.3.3.3 Big data analytics 74 5.3.3.4 Internet of Things (IoT) 74 5.3.3.5 Quantum computing 74 5.4 CASE STUDY ANALYSIS 74 5.4.1 CASE STUDY 1: CYMULATE HELPED GLOBAL BANK CORP. STRENGTHEN CYBERSECURITY DEFENSES USING AUTOMATED BREACH AND ATTACK SIMULATION PLATFORM 74 5.4.2 CASE STUDY 2: XM CYBER ASSISTED HEALTHCARE SYSTEMS BY PROVIDING CONTINUOUS VISIBILITY INTO POTENTIAL ATTACK PATHS 75 5.4.3 CASE STUDY 3: SAFEBREACH SUPPORTED RETAIL GIANT IN ENHANCING CYBERSECURITY AND PROTECTING CUSTOMERS USING AUTOMATED BREACH AND ATTACK SIMULATION TOOL 75 5.4.4 CASE STUDY 4: ATTACKIQ ASSISTED NATIONAL SECURITY AGENCY IN STRENGTHENING CYBERSECURITY MEASURES AGAINST EMERGING THREATS 76 5.4.5 CASE STUDY 5: PENTERA SUPPORTED GLOBAL MANUFACTURING CORP. IN BOLSTERING OPERATIONAL TECHNOLOGY SECURITY AND PREVENTING DISRUPTIONS 76 5.4.6 CASE STUDY 6: QUALYS ASSISTED GLOBAL BANK CORP. IN STRENGTHENING CYBERSECURITY AND SAFEGUARDING SENSITIVE DATA 77 5.5 VALUE CHAIN ANALYSIS 77 5.5.1 TECHNOLOGY INFRASTRUCTURE PROVIDERS 78 5.5.2 AUTOMATED BREACH AND ATTACK SIMULATION PROVIDERS 78 5.5.3 APPLICATION PROVIDERS 78 5.5.4 SYSTEM INTEGRATORS 78 5.5.5 END USERS 78 5.6 ECOSYSTEM ANALYSIS 79 5.7 PORTER’S FIVE FORCES ANALYSIS 80 5.7.1 THREAT OF NEW ENTRANTS 82 5.7.2 BARGAINING POWER OF SUPPLIERS 82 5.7.3 BARGAINING POWER OF BUYERS 82 5.7.4 THREAT OF SUBSTITUTES 82 5.7.5 INTENSITY OF COMPETITIVE RIVALRY 83 5.8 PRICING ANALYSIS 83 5.8.1 AVERAGE SELLING PRICE TREND OF KEY PLAYERS, BY SOLUTION 84 5.8.2 INDICATIVE PRICING ANALYSIS, BY OFFERING 85 5.9 TECHNOLOGY ANALYSIS 86 5.9.1 KEY TECHNOLOGIES 86 5.9.1.1 AI/ML 86 5.9.1.2 Graph-based simulation technology 86 5.9.1.3 Big data analytics 86 5.9.1.4 Zero trust 87 5.9.1.5 Behavioral analytics 87 5.9.2 COMPLEMENTARY TECHNOLOGIES 87 5.9.2.1 Cloud security 87 5.9.2.2 Virtual private networks 88 5.9.2.3 Behavioral biometrics 88 5.9.2.4 Natural language processing 88 5.9.3 ADJACENT TECHNOLOGIES 89 5.9.3.1 Quantum computing 89 5.9.3.2 IoT security 89 5.10 PATENT ANALYSIS 89 5.11 TRENDS AND DISRUPTIONS IMPACTING CUSTOMERS’ BUSINESSES 93 5.12 KEY STAKEHOLDERS AND BUYING CRITERIA 95 5.12.1 KEY STAKEHOLDERS IN BUYING PROCESS 95 5.12.2 BUYING CRITERIA 96 5.13 REGULATORY LANDSCAPE 97 5.13.1 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 97 5.14 KEY CONFERENCES & EVENTS, 2024–2025 100 5.15 INVESTMENT AND FUNDING SCENARIO 101 6 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY OFFERING 102 6.1 INTRODUCTION 103 6.1.1 OFFERING: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 103 6.2 PLATFORMS & TOOLS 104 6.2.1 INCREASING NEED FOR CONTINUOUS SECURITY AND SEAMLESS INTEGRATION TO DRIVE MARKET 104 6.2.2 STANDALONE PLATFORMS/SOFTWARE TOOLS 105 6.2.3 INTEGRATED SECURITY PLATFORMS/TOOLS 105 6.2.4 CLOUD-BASED SOLUTIONS 106 6.3 SERVICES 106 6.3.1 GROWING COMPLEXITY OF CYBER THREATS AND SURGING NEED FOR REGULATORY COMPLIANCE TO DRIVE MARKET 106 6.3.2 PROFESSIONAL SERVICES 108 6.3.2.1 Expertise and strategic guidance to propel demand for professional services 108 6.3.2.2 Implementation, Integration, and Consulting 109 6.3.2.3 Security Posture Assessment 110 6.3.2.4 Training, Compliance Reporting, and Auditing 111 6.3.2.5 Support & Maintenance 112 6.3.3 MANAGED SERVICES 113 6.3.3.1 Increasing need for focusing on core business operations while outsourcing complex security functions to accelerate market growth 113 7 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY DEPLOYMENT MODE 115 7.1 INTRODUCTION 116 7.1.1 DEPLOYMENT MODE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 116 7.2 ON-PREMISES 117 7.2.1 PARAMOUNT NEED FOR STRICT REGULATORY COMPLIANCE AND DATA SECURITY TO DRIVE DEMAND FOR ON-PREMISES SOLUTIONS 117 7.3 CLOUD 118 7.3.1 SCALABILITY AND COST-EFFICIENCY TO DRIVE DEMAND FOR CLOUD-BASED BAS SOLUTIONS 118 8 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY ORGANIZATION SIZE 120 8.1 INTRODUCTION 121 8.1.1 ORGANIZATION SIZE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 121 8.2 SMES 122 8.2.1 SCALABILITY AND AFFORDABILITY OF BAS SOLUTIONS TO DRIVE MARKET 122 8.3 LARGE ENTERPRISES 123 8.3.1 SURGING NEED FOR PROTECTION OF VAST AMOUNTS OF SENSITIVE DATA TO FUEL MARKET GROWTH 123 9 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY APPLICATION 125 9.1 INTRODUCTION 126 9.1.1 APPLICATION: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 126 9.2 CONFIGURATION MANAGEMENT 127 9.2.1 SPIKE IN DEMAND FOR REAL-TIME CONFIGURATION VALIDATION AND COMPLIANCE MANAGEMENT TO BOLSTER MARKET GROWTH 127 9.3 PATCH MANAGEMENT 128 9.3.1 GROWING COMPLEXITY OF IT INFRASTRUCTURES AND INCREASING VOLUME OF SOFTWARE VULNERABILITIES TO DRIVE MARKET 128 9.4 THREAT INTELLIGENCE 129 9.4.1 PROACTIVE RISK MANAGEMENT AND REAL-TIME THREAT DETECTION TO DRIVE DEMAND FOR BAS SOLUTIONS 129 9.5 OTHER APPLICATIONS 130 10 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY VERTICAL 132 10.1 INTRODUCTION 133 10.1.1 VERTICAL: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 134 10.2 BFSI 135 10.2.1 INCREASED NEED FOR ENHANCING CUSTOMER EXPERIENCES AND STREAMLINING OPERATIONS TO DRIVE MARKET 135 10.3 HEALTHCARE 137 10.3.1 SPIKE IN DEMAND FOR SECURING SENSITIVE HEALTH DATA FROM POTENTIAL BREACHES TO BOOST MARKET GROWTH 137 10.4 IT & ITES 138 10.4.1 SURGING NEED FOR ROBUST CYBERSECURITY MEASURES TO FOSTER MARKET GROWTH 138 10.5 TELECOMMUNICATIONS 139 10.5.1 SPIKE IN DEMAND FOR PROTECTION OF EXTENSIVE AND SENSITIVE COMMUNICATION INFRASTRUCTURES FROM RISING CYBER THREATS TO ACCELERATE MARKET GROWTH 139 10.6 RETAIL & ECOMMERCE 140 10.6.1 INCREASING DEMAND FOR IDENTIFICATION OF VULNERABILITIES AND TEST SECURITY CONTROLS IN REAL TIME TO FOSTER MARKET GROWTH 140 10.7 MANUFACTURING 141 10.7.1 INCREASED NEED FOR PROTECTION OF INTELLECTUAL PROPERTY AND COMBAT PIRACY TO DRIVE MARKET 141 10.8 EDUCATION 142 10.8.1 RISING NEED FOR REDUCTION OF OPERATIONAL DISRUPTIONS CAUSED BY CYBER INCIDENTS TO PROPEL MARKET 142 10.9 OTHER VERTICALS 143 11 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY REGION 145 11.1 INTRODUCTION 146 11.2 NORTH AMERICA 147 11.2.1 NORTH AMERICA: MARKET DRIVERS 147 11.2.2 NORTH AMERICA: MACROECONOMIC OUTLOOK 148 11.2.3 US 153 11.2.3.1 Rising complexity of cyber threats and need for continuous security to accelerate market growth 153 11.2.4 CANADA 157 11.2.4.1 Rising cybersecurity attacks and increasing data protection requirements across regulated industries to drive market 157 11.3 EUROPE 162 11.3.1 EUROPE: MARKET DRIVERS 162 11.3.2 EUROPE: MACROECONOMIC OUTLOOK 162 11.3.3 UK 167 11.3.3.1 Increasing cyber threats and need for robust security measures to accelerate market growth 167 11.3.4 GERMANY 172 11.3.4.1 Rising cyber threats, regulatory requirements, and increasing complexity of cyberattacks to bolster market growth 172 11.3.5 FRANCE 176 11.3.5.1 Burgeoning cybersecurity threats and digital transformation to boost market 176 11.3.6 ITALY 181 11.3.6.1 Rising significance of proactive security measures to foster market growth 181 11.3.7 REST OF EUROPE 185 11.4 ASIA PACIFIC 190 11.4.1 ASIA PACIFIC: MARKET DRIVERS 190 11.4.2 ASIA PACIFIC: MACROECONOMIC OUTLOOK 190 11.4.3 CHINA 196 11.4.3.1 Rapid digitalization and rising collaborations with managed service companies to drive market 196 11.4.4 JAPAN 201 11.4.4.1 Rising digital transformation and growing cybersecurity demands to foster market growth 201 11.4.5 INDIA 205 11.4.5.1 Substantial internet penetration, skilled IT workforce, and government support to aid market growth 205 11.4.6 REST OF ASIA PACIFIC 210 11.5 MIDDLE EAST & AFRICA 214 11.5.1 MIDDLE EAST & AFRICA: MARKET DRIVERS 214 11.5.2 MIDDLE EAST & AFRICA: MACROECONOMIC OUTLOOK 214 11.5.3 GCC 219 11.5.3.1 Cloud adoption and integration with other security tools to boost market 219 11.5.3.2 KSA 224 11.5.3.2.1 Fundamental digital transformation and rising need for robust data protection to boost market growth 224 11.5.3.3 UAE 228 11.5.3.3.1 Increasing cyber threats, regulatory demands, and growing cybersecurity awareness to promote market growth 228 11.5.3.4 Rest of GCC 233 11.5.4 SOUTH AFRICA 237 11.5.4.1 Dramatic increase in ransomware attacks to drive market 237 11.5.5 REST OF MIDDLE EAST & AFRICA 241 11.6 LATIN AMERICA 245 11.6.1 LATIN AMERICA: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 246 11.6.2 LATIN AMERICA: MACROECONOMIC OUTLOOK 246 11.6.3 BRAZIL 251 11.6.3.1 Government initiatives and emergent technologies to propel market growth 251 11.6.4 MEXICO 256 11.6.4.1 Stringent regulatory compliance demands to drive market 256 11.6.5 REST OF LATIN AMERICA 260 12 COMPETITIVE LANDSCAPE 265 12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN 265 12.2 REVENUE ANALYSIS 266 12.3 MARKET SHARE ANALYSIS, 2023 267 12.4 BRAND COMPARISON 270 12.5 COMPANY VALUATION AND FINANCIAL METRICS 270 12.5.1 COMPANY VALUATION 270 12.5.2 FINANCIAL METRICS USING EV/EBITDA 271 12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023 271 12.6.1 STARS 272 12.6.2 EMERGING LEADERS 272 12.6.3 PERVASIVE PLAYERS 272 12.6.4 PARTICIPANTS 272 12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2023 274 12.6.5.1 Company footprint 274 12.6.5.2 Regional footprint 274 12.6.5.3 Deployment mode footprint 275 12.6.5.4 Vertical footprint 275 12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023 276 12.7.1 PROGRESSIVE COMPANIES 276 12.7.2 RESPONSIVE COMPANIES 276 12.7.3 DYNAMIC COMPANIES 276 12.7.4 STARTING BLOCKS 276 12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023 278 12.7.5.1 Detailed list of key startups/SMEs 278 12.7.5.2 Competitive benchmarking of key startups/SMEs 279 12.8 COMPETITIVE SCENARIO 281 12.8.1 PRODUCT LAUNCHES & ENHANCEMENTS 281 12.8.2 DEALS 286 13 COMPANY PROFILES 290 13.1 KEY PLAYERS 290 13.1.1 CYMULATE 290 13.1.1.1 Business overview 290 13.1.1.2 Products/Solutions/Services offered 291 13.1.1.3 Recent developments 291 13.1.1.3.1 Product launches & enhancements 291 13.1.1.3.2 Deals 292 13.1.1.3.3 Other developments 292 13.1.1.4 MnM view 293 13.1.1.4.1 Key strengths 293 13.1.1.4.2 Strategic choices 293 13.1.1.4.3 Weaknesses and competitive threats 293 13.1.2 ATTACKIQ 294 13.1.2.1 Business overview 294 13.1.2.2 Products/Solutions/Services offered 294 13.1.2.3 Recent developments 295 13.1.2.3.1 Product launches & enhancements 295 13.1.2.3.2 Deals 296 13.1.2.4 MnM view 297 13.1.2.4.1 Key strengths 297 13.1.2.4.2 Strategic choices 297 13.1.2.4.3 Weaknesses and competitive threats 297 13.1.3 XM CYBER 298 13.1.3.1 Business overview 298 13.1.3.2 Products/Solutions/Services offered 298 13.1.3.3 MnM view 299 13.1.3.3.1 Key strengths 299 13.1.3.3.2 Strategic choices 299 13.1.3.3.3 Weaknesses and competitive threats 299 13.1.4 SAFEBREACH 300 13.1.4.1 Business overview 300 13.1.4.2 Products/Solutions/Services offered 301 13.1.4.3 Recent developments 301 13.1.4.3.1 Product launches & enhancements 301 13.1.4.3.2 Deals 302 13.1.4.4 MnM view 302 13.1.4.4.1 Key strengths 302 13.1.4.4.2 Strategic choices 303 13.1.4.4.3 Weaknesses and competitive threats 303 13.1.5 PICUS SECURITY 304 13.1.5.1 Business overview 304 13.1.5.2 Products/Solutions/Services offered 304 13.1.5.3 Recent developments 305 13.1.5.3.1 Product launches & enhancements 305 13.1.5.4 MnM view 305 13.1.5.4.1 Key strengths 305 13.1.5.4.2 Strategic choices 306 13.1.5.4.3 Weaknesses and competitive threats 306 13.1.6 QUALYS 307 13.1.6.1 Business overview 307 13.1.6.2 Products/Solutions/Services offered 308 13.1.6.3 Recent developments 309 13.1.6.3.1 Product launches & enhancements 309 13.1.6.3.2 Deals 309 13.1.7 RAPID7 310 13.1.7.1 Business overview 310 13.1.7.2 Products/Solutions/Services offered 311 13.1.7.3 Recent developments 312 13.1.7.3.1 Product launches & enhancements 312 13.1.7.3.2 Deals 312 13.1.8 IBM 313 13.1.8.1 Business overview 313 13.1.8.2 Products/Solutions/Services offered 315 13.1.8.3 Recent developments 315 13.1.8.3.1 Product launches & enhancements 315 13.1.8.3.2 Deals 316 13.1.8.3.3 Other developments 316 13.1.9 FORTINET 317 13.1.9.1 Business overview 317 13.1.9.2 Products/Solutions/Services offered 318 13.1.9.3 Recent developments 319 13.1.9.3.1 Product launches & enhancements 319 13.1.10 MANDIANT 320 13.1.10.1 Business overview 320 13.1.10.2 Products/Solutions/Services offered 320 13.1.11 KEYSIGHT TECHNOLOGIES 322 13.1.11.1 Business overview 322 13.1.11.2 Products/Solutions/Services offered 324 13.1.11.3 Recent developments 324 13.1.11.3.1 Product launches & enhancements 324 13.1.11.3.2 Deals 325 13.1.12 AUJAS 326 13.1.12.1 Business overview 326 13.1.12.2 Products/Solutions/Services offered 326 13.2 OTHER PLAYERS 327 13.2.1 CYTOMATE 327 13.2.2 RELIAQUEST 328 13.2.3 DETECTIFY 329 13.2.4 SCYTHE 330 13.2.5 BREACHLOCK 331 13.2.6 CYCOGNITO 332 13.2.7 SKYBOX SECURITY 333 13.2.8 AQUILA I 334 13.2.9 IMMUNIWEB 335 13.2.10 THREATGEN 336 13.2.11 STROBES SECURITY 337 13.2.12 NOPSEC 338 13.2.13 SIMSPACE 339 13.2.14 PURPLEBOX 340 13.2.15 KROLL 341 14 ADJACENT MARKETS 342 14.1 INTRODUCTION 342 14.2 LIMITATIONS 342 14.3 PENETRATION-TESTING-AS-A-SERVICE MARKET 342 14.4 SECURITY AND VULNERABILITY MARKET 345 15 APPENDIX 349 15.1 DISCUSSION GUIDE 349 15.2 KNOWLEDGESTORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL 352 15.3 CUSTOMIZATION OPTIONS 354 15.4 RELATED REPORTS 354 15.5 AUTHOR DETAILS 355
ご注文は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。本レポートと同分野(通信・IT)の最新刊レポート
MarketsandMarkets社のTelecom & IT分野での最新刊レポート
本レポートと同じKEY WORD(bfsi)の最新刊レポート
よくあるご質問MarketsandMarkets社はどのような調査会社ですか?マーケッツアンドマーケッツ(MarketsandMarkets)は通信、半導体、医療機器、エネルギーなど、幅広い市場に関する調査レポートを出版しています。また広範な市場を対象としたカスタム調査も行って... もっと見る 調査レポートの納品までの日数はどの程度ですか?在庫のあるものは速納となりますが、平均的には 3-4日と見て下さい。
注文の手続きはどのようになっていますか?1)お客様からの御問い合わせをいただきます。
お支払方法の方法はどのようになっていますか?納品と同時にデータリソース社よりお客様へ請求書(必要に応じて納品書も)を発送いたします。
データリソース社はどのような会社ですか?当社は、世界各国の主要調査会社・レポート出版社と提携し、世界各国の市場調査レポートや技術動向レポートなどを日本国内の企業・公官庁及び教育研究機関に提供しております。
|
詳細検索
2024/11/21 10:26 156.13 円 165.08 円 200.38 円 |