世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

Breach and Attack Simulation Market by Application (Configuration Management, Patch Management, Threat Intelligence), Vertical (BFSI, Healthcare, IT & ITeS, Education, Manufacturing) - Global Forecast to 2029


The global Breach and Attack Simulation market size is projected to grow from USD 729.2 million in 2024 to USD 2,405.4 million by 2029 at a Compound Annual Growth Rate (CAGR) of 27.0% during the fo... もっと見る

 

 

出版社 出版年月 電子版価格 ページ数 図表数 言語
MarketsandMarkets
マーケッツアンドマーケッツ
2024年10月10日 US$4,950
シングルユーザライセンス
ライセンス・価格情報
注文方法はこちら
356 561 英語

日本語のページは自動翻訳を利用し作成しています。


 

Summary

The global Breach and Attack Simulation market size is projected to grow from USD 729.2 million in 2024 to USD 2,405.4 million by 2029 at a Compound Annual Growth Rate (CAGR) of 27.0% during the forecast period.
In the breach and attack simulation market, integration into the existing security solutions, which include SIEM and SOAR, drives the momentum of improving threat detection, response, and remediation. These have streamlined security processes, fastened response times, and vastly improved posture across industries. Finally, integrating AI and ML hardens the breach and attack simulation tools to predict specific vulnerabilities, simulate highly complex attacks, and give real-time feedback. Proactive cybersecurity strategies benefit from efficiency and reducing manual efforts in response to evolving cyber threats. The shift toward automation and AI-driven solutions allows organizations to meet compliance standards and build consumer trust.
"By Professional Services, the Security Posture Assessment will grow at a higher CAGR during the forecast period."
The professional services segment is expected to have the highest CAGR of the breach and attack simulation market due to the absence of in-house capabilities in most organizations, primarily in SMEs. Professional service providers bridge this gap by providing scalable, cost-effective security assessments. Also, solid testing mechanisms among managed service providers would be required to ensure adequate security in diverse client environments. It will thereby propel the use of breach and attack simulation services. Continuous security validation through training and on-demand services from analysts boost the proactive countering of organization vulnerabilities. The threat management segment had the most outstanding revenue share in 2023, reflecting the significant demand for specialty assessment to mitigate the growing cyber threats. Key industry players, including Rapid7, Cymulate, and AttackIQ, are leading in this market.

"By Deployment Mode, the On-Premises segment accounts for the largest market size during the forecast period. "
The on-premises segment of the breach and attack simulation market is a localized, customizable security testing approach with the software hosted in their data centers. Deployment of this type offers better control over sensitive data so that organizations can manage the testing process safely. On-premises breach and attack simulation solutions are also customizable and do not interfere with existing security structures. Hence, it is very suitable for industries to have rigid compliance. Most Vendors, such as Rapid7, Qualys, and Sophos, provide tailor-made on-premises solutions. However, the above solution requires high initial investments in hardware and software with an IT infrastructure. They pose scalability problems and require dedicated IT staff equipped with security-specific skills for maintenance and operation.
"By region, North America is expected to be the largest market during the forecast period."
Higher expenditure on cybersecurity in North America owing to the rise in cyber threats and fraud is quite prolific for the growth of the breach and attack simulation market. The US, for one, increased its cybersecurity budget to USD 20 billion in 2023 and effectively enlisted all its broad adoption of breach and attack simulation tools for proactive security testing. The healthcare sector, susceptible to data breaches, has further pushed demand for breach and attack simulation solutions. For instance, regulatory pressures - such as the Cybersecurity and Infrastructure Security Agency and California Consumer Privacy Act - drive the adoption of breach and attack simulation platforms as a compliance source. The two major leaders, AttackIQ and Cymulate, will fortify their position in this emerging market with complete solutions composed of scenario-based simulations, continuous testing, and vulnerability assessment.
Breakdown of primaries:
In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, other innovation and technology directors, and executives from various key organizations operating in the breach and attack simulation market.
• By Company Type: Tier 1: 55%, Tier 2: 25%, and Tier 3: 20%
• By Designation: Directors: 50%, Managers: 30% and Other: 20%
• By Region: North America: 40%, Europe: 35%, Asia Pacific: 20%, RoW: 5%


Cymulate (US), AttackIQ (US), XM Cyber (Israel), SafeBreach (US), Picus Security (US), Qualys (US), Rapid7 (US), IBM (US), Fortinet (US), Mandiant (US), Keysight Technologies (US), Aujas (US), Cytomate (Qatar), ReliaQuest (US), Detectify (Sweden), Scythe (US), BreachLock (US), CyCognito (US), Skybox Security (US), Aquila I (India), ImmuniWeb (Switzerland), ThreatGen (US), Strobes Security (US), NopSec (US), SimSpace (US), PurpleBox (US), and Kroll (US); are some of the key players in the breach and attack simulation solutions market.
The study includes an in-depth competitive analysis of these key players in the breach and attack simulation market, with their company profiles, recent developments, and key market strategies.
Research Coverage
The report comprehensively segments the breach and attack simulation Market. It provides forecasts regarding its size across various dimensions, including By Offering (Platform & Tools, services), By Deployment Mode (Cloud, On-Premises), By Organization Size (SMEs, Large Enterprises ), By Application (Configuration Management, Patch Management, Threat Intelligence, Other Applications), By Vertical (BFSI, Healthcare, IT & ITES, Telecommunications, Retail & E-Commerce, Manufacturing, Education, Other Verticals), and Region (North America, Europe, Middle East & Africa, Asia Pacific, and Latin America). Additionally, the study encompasses a thorough competitive analysis of key market players, offering insights into their company profiles, product and business offerings, recent developments, and key market strategies.
Key benefits of buying report
The report offers valuable insights to market leaders and new entrants by closely approximating the breach and attack simulation market's revenue figures and subsegments. Stakeholders can leverage this report to better understand the competitive landscape, enabling them to position their businesses more effectively and develop tailored go-to-market strategies. Additionally, stakeholders can grasp the market dynamics and stay informed about key drivers, restraints, challenges, and opportunities shaping the industry landscape.
The report provides insights on the following pointers:
• Analysis of critical drivers (Growing complexity and rising threats of cyberattacks in the digital age, Growing need to adhere to stringent regulations and data privacy laws, Rising Need for Continuous Security Testing, Integration of breach and attack simulation solutions tools with existing security tools), restraints (Lack of Skilled Professionals, High Implementation and Maintenance Costs), opportunities (Integration of breach and attack simulation solutions with Attack Surface Management(ASM), Rapid adoption of cloud-based services, integration of artificial intelligence (AI) and machine learning (ML) into breach and attack simulation solutions, Digital Transformation initiatives), and challenges (Resource allocation and integration complexity, Organizational Resistance and Misconceptions about breach and attack simulation.
• Product Development/Innovation: Detailed insights on upcoming technologies, research development activities, new products, and service launches in the breach and attack simulation market.
• Market Development: Comprehensive information about lucrative markets – the report analyses the breach and attack simulation solutions market across varied regions.
• Market Diversification: Exhaustive information about new products and services, untapped geographies, recent developments, and investments.
• Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players Cymulate (India), AttackIQ (US), XM Cyber (Israel), SafeBreach (Israel), and Picus Security(US).

ページTOPに戻る


Table of Contents

1 INTRODUCTION 38
1.1 STUDY OBJECTIVES 38
1.2 MARKET DEFINITION 38
1.2.1 INCLUSIONS AND EXCLUSIONS 39
1.3 MARKET SCOPE 40
1.3.1 MARKET SEGMENTATION 40
1.3.2 YEARS CONSIDERED 41
1.4 CURRENCY CONSIDERED 41
1.5 STAKEHOLDERS 42
1.6 SUMMARY OF CHANGES 42
2 RESEARCH METHODOLOGY 43
2.1 RESEARCH DATA 43
2.1.1 SECONDARY DATA 45
2.1.2 PRIMARY DATA 45
2.1.2.1 Breakup of primaries 46
2.1.2.2 Key industry insights 46
2.2 MARKET BREAKUP AND DATA TRIANGULATION 47
2.3 MARKET SIZE ESTIMATION 48
2.3.1 TOP-DOWN APPROACH 49
2.3.2 BOTTOM-UP APPROACH 49
2.4 MARKET FORECAST 52
2.5 RESEARCH ASSUMPTIONS 53
2.6 STUDY LIMITATIONS 54
3 EXECUTIVE SUMMARY 55
4 PREMIUM INSIGHTS 59
4.1 ATTRACTIVE OPPORTUNITIES FOR KEY MARKET PLAYERS 59
4.2 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY OFFERING 60
4.3 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY DEPLOYMENT MODE 60
4.4 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY ORGANIZATION SIZE 61
4.5 AUTOMATED BREACH AND ATTACK SIMULATION MARKET,
BY KEY APPLICATION AND REGION 61
4.6 MARKET INVESTMENT SCENARIO 62

5 MARKET OVERVIEW AND INDUSTRY TRENDS 63
5.1 INTRODUCTION 63
5.2 MARKET DYNAMICS 64
5.2.1 DRIVERS 65
5.2.1.1 Growing complexity and rising threats of cyberattacks in digital age 65
5.2.1.2 Surging need for adherence to stringent regulations and data privacy laws 65
5.2.1.3 Rising need for continuous security testing 66
5.2.1.4 Integration of automated breach and attack simulation tools with existing security tools 66
5.2.2 RESTRAINTS 67
5.2.2.1 Lack of skilled professionals 67
5.2.2.2 High implementation and maintenance costs 67
5.2.3 OPPORTUNITIES 68
5.2.3.1 Integration of automated breach and attack simulation with attack surface management 68
5.2.3.2 Rapid adoption of cloud-based services 68
5.2.3.3 Integration of AI and ML into breach and attack simulation solutions 68
5.2.3.4 Digital transformation initiatives 69
5.2.4 CHALLENGES 69
5.2.4.1 Resource allocation and integration complexity 69
5.2.4.2 Organizational resistance and misconceptions about automated breach and attack simulation systems 70
5.3 IMPACT OF GENERATIVE AI (GENAI) ON AUTOMATED BREACH AND ATTACK SIMULATION MARKET 70
5.3.1 TOP USE CASES & MARKET POTENTIAL 70
5.3.1.1 Key use cases 71
5.3.2 TOP USE CASES AND MARKET POTENTIAL IN AUTOMATED BREACH AND ATTACK SIMULATION MARKET 71
5.3.3 IMPACT OF GEN AI ON INTERCONNECTED AND ADJACENT ECOSYSTEMS 73
5.3.3.1 Artificial intelligence and machine learning 73
5.3.3.2 Cloud computing 73
5.3.3.3 Big data analytics 74
5.3.3.4 Internet of Things (IoT) 74
5.3.3.5 Quantum computing 74
5.4 CASE STUDY ANALYSIS 74
5.4.1 CASE STUDY 1: CYMULATE HELPED GLOBAL BANK CORP. STRENGTHEN CYBERSECURITY DEFENSES USING AUTOMATED BREACH AND ATTACK SIMULATION PLATFORM 74
5.4.2 CASE STUDY 2: XM CYBER ASSISTED HEALTHCARE SYSTEMS BY PROVIDING CONTINUOUS VISIBILITY INTO POTENTIAL ATTACK PATHS 75
5.4.3 CASE STUDY 3: SAFEBREACH SUPPORTED RETAIL GIANT IN ENHANCING CYBERSECURITY AND PROTECTING CUSTOMERS USING AUTOMATED BREACH AND ATTACK SIMULATION TOOL 75
5.4.4 CASE STUDY 4: ATTACKIQ ASSISTED NATIONAL SECURITY AGENCY IN STRENGTHENING CYBERSECURITY MEASURES AGAINST EMERGING THREATS 76
5.4.5 CASE STUDY 5: PENTERA SUPPORTED GLOBAL MANUFACTURING CORP. IN BOLSTERING OPERATIONAL TECHNOLOGY SECURITY AND PREVENTING DISRUPTIONS 76
5.4.6 CASE STUDY 6: QUALYS ASSISTED GLOBAL BANK CORP. IN STRENGTHENING CYBERSECURITY AND SAFEGUARDING SENSITIVE DATA 77
5.5 VALUE CHAIN ANALYSIS 77
5.5.1 TECHNOLOGY INFRASTRUCTURE PROVIDERS 78
5.5.2 AUTOMATED BREACH AND ATTACK SIMULATION PROVIDERS 78
5.5.3 APPLICATION PROVIDERS 78
5.5.4 SYSTEM INTEGRATORS 78
5.5.5 END USERS 78
5.6 ECOSYSTEM ANALYSIS 79
5.7 PORTER’S FIVE FORCES ANALYSIS 80
5.7.1 THREAT OF NEW ENTRANTS 82
5.7.2 BARGAINING POWER OF SUPPLIERS 82
5.7.3 BARGAINING POWER OF BUYERS 82
5.7.4 THREAT OF SUBSTITUTES 82
5.7.5 INTENSITY OF COMPETITIVE RIVALRY 83
5.8 PRICING ANALYSIS 83
5.8.1 AVERAGE SELLING PRICE TREND OF KEY PLAYERS, BY SOLUTION 84
5.8.2 INDICATIVE PRICING ANALYSIS, BY OFFERING 85
5.9 TECHNOLOGY ANALYSIS 86
5.9.1 KEY TECHNOLOGIES 86
5.9.1.1 AI/ML 86
5.9.1.2 Graph-based simulation technology 86
5.9.1.3 Big data analytics 86
5.9.1.4 Zero trust 87
5.9.1.5 Behavioral analytics 87
5.9.2 COMPLEMENTARY TECHNOLOGIES 87
5.9.2.1 Cloud security 87
5.9.2.2 Virtual private networks 88
5.9.2.3 Behavioral biometrics 88
5.9.2.4 Natural language processing 88
5.9.3 ADJACENT TECHNOLOGIES 89
5.9.3.1 Quantum computing 89
5.9.3.2 IoT security 89
5.10 PATENT ANALYSIS 89
5.11 TRENDS AND DISRUPTIONS IMPACTING CUSTOMERS’ BUSINESSES 93
5.12 KEY STAKEHOLDERS AND BUYING CRITERIA 95
5.12.1 KEY STAKEHOLDERS IN BUYING PROCESS 95
5.12.2 BUYING CRITERIA 96
5.13 REGULATORY LANDSCAPE 97
5.13.1 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 97
5.14 KEY CONFERENCES & EVENTS, 2024–2025 100
5.15 INVESTMENT AND FUNDING SCENARIO 101
6 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY OFFERING 102
6.1 INTRODUCTION 103
6.1.1 OFFERING: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 103
6.2 PLATFORMS & TOOLS 104
6.2.1 INCREASING NEED FOR CONTINUOUS SECURITY AND SEAMLESS INTEGRATION TO DRIVE MARKET 104
6.2.2 STANDALONE PLATFORMS/SOFTWARE TOOLS 105
6.2.3 INTEGRATED SECURITY PLATFORMS/TOOLS 105
6.2.4 CLOUD-BASED SOLUTIONS 106
6.3 SERVICES 106
6.3.1 GROWING COMPLEXITY OF CYBER THREATS AND SURGING NEED FOR REGULATORY COMPLIANCE TO DRIVE MARKET 106
6.3.2 PROFESSIONAL SERVICES 108
6.3.2.1 Expertise and strategic guidance to propel demand for professional services 108
6.3.2.2 Implementation, Integration, and Consulting 109
6.3.2.3 Security Posture Assessment 110
6.3.2.4 Training, Compliance Reporting, and Auditing 111
6.3.2.5 Support & Maintenance 112
6.3.3 MANAGED SERVICES 113
6.3.3.1 Increasing need for focusing on core business operations while outsourcing complex security functions to accelerate market growth 113
7 AUTOMATED BREACH AND ATTACK SIMULATION MARKET,
BY DEPLOYMENT MODE 115
7.1 INTRODUCTION 116
7.1.1 DEPLOYMENT MODE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 116
7.2 ON-PREMISES 117
7.2.1 PARAMOUNT NEED FOR STRICT REGULATORY COMPLIANCE AND DATA SECURITY TO DRIVE DEMAND FOR ON-PREMISES SOLUTIONS 117
7.3 CLOUD 118
7.3.1 SCALABILITY AND COST-EFFICIENCY TO DRIVE DEMAND FOR CLOUD-BASED BAS SOLUTIONS 118

8 AUTOMATED BREACH AND ATTACK SIMULATION MARKET,
BY ORGANIZATION SIZE 120
8.1 INTRODUCTION 121
8.1.1 ORGANIZATION SIZE: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 121
8.2 SMES 122
8.2.1 SCALABILITY AND AFFORDABILITY OF BAS SOLUTIONS TO DRIVE MARKET 122
8.3 LARGE ENTERPRISES 123
8.3.1 SURGING NEED FOR PROTECTION OF VAST AMOUNTS OF SENSITIVE DATA TO FUEL MARKET GROWTH 123
9 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY APPLICATION 125
9.1 INTRODUCTION 126
9.1.1 APPLICATION: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 126
9.2 CONFIGURATION MANAGEMENT 127
9.2.1 SPIKE IN DEMAND FOR REAL-TIME CONFIGURATION VALIDATION AND COMPLIANCE MANAGEMENT TO BOLSTER MARKET GROWTH 127
9.3 PATCH MANAGEMENT 128
9.3.1 GROWING COMPLEXITY OF IT INFRASTRUCTURES AND INCREASING VOLUME OF SOFTWARE VULNERABILITIES TO DRIVE MARKET 128
9.4 THREAT INTELLIGENCE 129
9.4.1 PROACTIVE RISK MANAGEMENT AND REAL-TIME THREAT DETECTION TO DRIVE DEMAND FOR BAS SOLUTIONS 129
9.5 OTHER APPLICATIONS 130
10 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY VERTICAL 132
10.1 INTRODUCTION 133
10.1.1 VERTICAL: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 134
10.2 BFSI 135
10.2.1 INCREASED NEED FOR ENHANCING CUSTOMER EXPERIENCES AND STREAMLINING OPERATIONS TO DRIVE MARKET 135
10.3 HEALTHCARE 137
10.3.1 SPIKE IN DEMAND FOR SECURING SENSITIVE HEALTH DATA FROM POTENTIAL BREACHES TO BOOST MARKET GROWTH 137
10.4 IT & ITES 138
10.4.1 SURGING NEED FOR ROBUST CYBERSECURITY MEASURES TO FOSTER MARKET GROWTH 138
10.5 TELECOMMUNICATIONS 139
10.5.1 SPIKE IN DEMAND FOR PROTECTION OF EXTENSIVE AND SENSITIVE COMMUNICATION INFRASTRUCTURES FROM RISING CYBER THREATS TO ACCELERATE MARKET GROWTH 139
10.6 RETAIL & ECOMMERCE 140
10.6.1 INCREASING DEMAND FOR IDENTIFICATION OF VULNERABILITIES AND TEST SECURITY CONTROLS IN REAL TIME TO FOSTER MARKET GROWTH 140
10.7 MANUFACTURING 141
10.7.1 INCREASED NEED FOR PROTECTION OF INTELLECTUAL PROPERTY AND COMBAT PIRACY TO DRIVE MARKET 141
10.8 EDUCATION 142
10.8.1 RISING NEED FOR REDUCTION OF OPERATIONAL DISRUPTIONS CAUSED
BY CYBER INCIDENTS TO PROPEL MARKET 142
10.9 OTHER VERTICALS 143
11 AUTOMATED BREACH AND ATTACK SIMULATION MARKET, BY REGION 145
11.1 INTRODUCTION 146
11.2 NORTH AMERICA 147
11.2.1 NORTH AMERICA: MARKET DRIVERS 147
11.2.2 NORTH AMERICA: MACROECONOMIC OUTLOOK 148
11.2.3 US 153
11.2.3.1 Rising complexity of cyber threats and need for continuous security to accelerate market growth 153
11.2.4 CANADA 157
11.2.4.1 Rising cybersecurity attacks and increasing data protection requirements across regulated industries to drive market 157
11.3 EUROPE 162
11.3.1 EUROPE: MARKET DRIVERS 162
11.3.2 EUROPE: MACROECONOMIC OUTLOOK 162
11.3.3 UK 167
11.3.3.1 Increasing cyber threats and need for robust security measures to accelerate market growth 167
11.3.4 GERMANY 172
11.3.4.1 Rising cyber threats, regulatory requirements, and increasing complexity of cyberattacks to bolster market growth 172
11.3.5 FRANCE 176
11.3.5.1 Burgeoning cybersecurity threats and digital transformation to boost market 176
11.3.6 ITALY 181
11.3.6.1 Rising significance of proactive security measures to foster market growth 181
11.3.7 REST OF EUROPE 185
11.4 ASIA PACIFIC 190
11.4.1 ASIA PACIFIC: MARKET DRIVERS 190
11.4.2 ASIA PACIFIC: MACROECONOMIC OUTLOOK 190
11.4.3 CHINA 196
11.4.3.1 Rapid digitalization and rising collaborations with managed service companies to drive market 196
11.4.4 JAPAN 201
11.4.4.1 Rising digital transformation and growing cybersecurity demands to foster market growth 201

11.4.5 INDIA 205
11.4.5.1 Substantial internet penetration, skilled IT workforce, and government support to aid market growth 205
11.4.6 REST OF ASIA PACIFIC 210
11.5 MIDDLE EAST & AFRICA 214
11.5.1 MIDDLE EAST & AFRICA: MARKET DRIVERS 214
11.5.2 MIDDLE EAST & AFRICA: MACROECONOMIC OUTLOOK 214
11.5.3 GCC 219
11.5.3.1 Cloud adoption and integration with other security tools to boost market 219
11.5.3.2 KSA 224
11.5.3.2.1 Fundamental digital transformation and rising need for robust data protection to boost market growth 224
11.5.3.3 UAE 228
11.5.3.3.1 Increasing cyber threats, regulatory demands, and growing cybersecurity awareness to promote market growth 228
11.5.3.4 Rest of GCC 233
11.5.4 SOUTH AFRICA 237
11.5.4.1 Dramatic increase in ransomware attacks to drive market 237
11.5.5 REST OF MIDDLE EAST & AFRICA 241
11.6 LATIN AMERICA 245
11.6.1 LATIN AMERICA: AUTOMATED BREACH AND ATTACK SIMULATION MARKET DRIVERS 246
11.6.2 LATIN AMERICA: MACROECONOMIC OUTLOOK 246
11.6.3 BRAZIL 251
11.6.3.1 Government initiatives and emergent technologies to propel market growth 251
11.6.4 MEXICO 256
11.6.4.1 Stringent regulatory compliance demands to drive market 256
11.6.5 REST OF LATIN AMERICA 260
12 COMPETITIVE LANDSCAPE 265
12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN 265
12.2 REVENUE ANALYSIS 266
12.3 MARKET SHARE ANALYSIS, 2023 267
12.4 BRAND COMPARISON 270
12.5 COMPANY VALUATION AND FINANCIAL METRICS 270
12.5.1 COMPANY VALUATION 270
12.5.2 FINANCIAL METRICS USING EV/EBITDA 271
12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023 271
12.6.1 STARS 272
12.6.2 EMERGING LEADERS 272
12.6.3 PERVASIVE PLAYERS 272
12.6.4 PARTICIPANTS 272
12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2023 274
12.6.5.1 Company footprint 274
12.6.5.2 Regional footprint 274
12.6.5.3 Deployment mode footprint 275
12.6.5.4 Vertical footprint 275
12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023 276
12.7.1 PROGRESSIVE COMPANIES 276
12.7.2 RESPONSIVE COMPANIES 276
12.7.3 DYNAMIC COMPANIES 276
12.7.4 STARTING BLOCKS 276
12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023 278
12.7.5.1 Detailed list of key startups/SMEs 278
12.7.5.2 Competitive benchmarking of key startups/SMEs 279
12.8 COMPETITIVE SCENARIO 281
12.8.1 PRODUCT LAUNCHES & ENHANCEMENTS 281
12.8.2 DEALS 286
13 COMPANY PROFILES 290
13.1 KEY PLAYERS 290
13.1.1 CYMULATE 290
13.1.1.1 Business overview 290
13.1.1.2 Products/Solutions/Services offered 291
13.1.1.3 Recent developments 291
13.1.1.3.1 Product launches & enhancements 291
13.1.1.3.2 Deals 292
13.1.1.3.3 Other developments 292
13.1.1.4 MnM view 293
13.1.1.4.1 Key strengths 293
13.1.1.4.2 Strategic choices 293
13.1.1.4.3 Weaknesses and competitive threats 293
13.1.2 ATTACKIQ 294
13.1.2.1 Business overview 294
13.1.2.2 Products/Solutions/Services offered 294
13.1.2.3 Recent developments 295
13.1.2.3.1 Product launches & enhancements 295
13.1.2.3.2 Deals 296
13.1.2.4 MnM view 297
13.1.2.4.1 Key strengths 297
13.1.2.4.2 Strategic choices 297
13.1.2.4.3 Weaknesses and competitive threats 297

13.1.3 XM CYBER 298
13.1.3.1 Business overview 298
13.1.3.2 Products/Solutions/Services offered 298
13.1.3.3 MnM view 299
13.1.3.3.1 Key strengths 299
13.1.3.3.2 Strategic choices 299
13.1.3.3.3 Weaknesses and competitive threats 299
13.1.4 SAFEBREACH 300
13.1.4.1 Business overview 300
13.1.4.2 Products/Solutions/Services offered 301
13.1.4.3 Recent developments 301
13.1.4.3.1 Product launches & enhancements 301
13.1.4.3.2 Deals 302
13.1.4.4 MnM view 302
13.1.4.4.1 Key strengths 302
13.1.4.4.2 Strategic choices 303
13.1.4.4.3 Weaknesses and competitive threats 303
13.1.5 PICUS SECURITY 304
13.1.5.1 Business overview 304
13.1.5.2 Products/Solutions/Services offered 304
13.1.5.3 Recent developments 305
13.1.5.3.1 Product launches & enhancements 305
13.1.5.4 MnM view 305
13.1.5.4.1 Key strengths 305
13.1.5.4.2 Strategic choices 306
13.1.5.4.3 Weaknesses and competitive threats 306
13.1.6 QUALYS 307
13.1.6.1 Business overview 307
13.1.6.2 Products/Solutions/Services offered 308
13.1.6.3 Recent developments 309
13.1.6.3.1 Product launches & enhancements 309
13.1.6.3.2 Deals 309
13.1.7 RAPID7 310
13.1.7.1 Business overview 310
13.1.7.2 Products/Solutions/Services offered 311
13.1.7.3 Recent developments 312
13.1.7.3.1 Product launches & enhancements 312
13.1.7.3.2 Deals 312

13.1.8 IBM 313
13.1.8.1 Business overview 313
13.1.8.2 Products/Solutions/Services offered 315
13.1.8.3 Recent developments 315
13.1.8.3.1 Product launches & enhancements 315
13.1.8.3.2 Deals 316
13.1.8.3.3 Other developments 316
13.1.9 FORTINET 317
13.1.9.1 Business overview 317
13.1.9.2 Products/Solutions/Services offered 318
13.1.9.3 Recent developments 319
13.1.9.3.1 Product launches & enhancements 319
13.1.10 MANDIANT 320
13.1.10.1 Business overview 320
13.1.10.2 Products/Solutions/Services offered 320
13.1.11 KEYSIGHT TECHNOLOGIES 322
13.1.11.1 Business overview 322
13.1.11.2 Products/Solutions/Services offered 324
13.1.11.3 Recent developments 324
13.1.11.3.1 Product launches & enhancements 324
13.1.11.3.2 Deals 325
13.1.12 AUJAS 326
13.1.12.1 Business overview 326
13.1.12.2 Products/Solutions/Services offered 326
13.2 OTHER PLAYERS 327
13.2.1 CYTOMATE 327
13.2.2 RELIAQUEST 328
13.2.3 DETECTIFY 329
13.2.4 SCYTHE 330
13.2.5 BREACHLOCK 331
13.2.6 CYCOGNITO 332
13.2.7 SKYBOX SECURITY 333
13.2.8 AQUILA I 334
13.2.9 IMMUNIWEB 335
13.2.10 THREATGEN 336
13.2.11 STROBES SECURITY 337
13.2.12 NOPSEC 338
13.2.13 SIMSPACE 339
13.2.14 PURPLEBOX 340
13.2.15 KROLL 341

14 ADJACENT MARKETS 342
14.1 INTRODUCTION 342
14.2 LIMITATIONS 342
14.3 PENETRATION-TESTING-AS-A-SERVICE MARKET 342
14.4 SECURITY AND VULNERABILITY MARKET 345
15 APPENDIX 349
15.1 DISCUSSION GUIDE 349
15.2 KNOWLEDGESTORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL 352
15.3 CUSTOMIZATION OPTIONS 354
15.4 RELATED REPORTS 354
15.5 AUTHOR DETAILS 355

 

ページTOPに戻る

ご注文は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのご注文・お問合せはこちらのフォームから承ります

本レポートと同分野(通信・IT)の最新刊レポート

MarketsandMarkets社のTelecom & IT分野での最新刊レポート

本レポートと同じKEY WORD(bfsi)の最新刊レポート


よくあるご質問


MarketsandMarkets社はどのような調査会社ですか?


マーケッツアンドマーケッツ(MarketsandMarkets)は通信、半導体、医療機器、エネルギーなど、幅広い市場に関する調査レポートを出版しています。また広範な市場を対象としたカスタム調査も行って... もっと見る


調査レポートの納品までの日数はどの程度ですか?


在庫のあるものは速納となりますが、平均的には 3-4日と見て下さい。
但し、一部の調査レポートでは、発注を受けた段階で内容更新をして納品をする場合もあります。
発注をする前のお問合せをお願いします。


注文の手続きはどのようになっていますか?


1)お客様からの御問い合わせをいただきます。
2)見積書やサンプルの提示をいたします。
3)お客様指定、もしくは弊社の発注書をメール添付にて発送してください。
4)データリソース社からレポート発行元の調査会社へ納品手配します。
5) 調査会社からお客様へ納品されます。最近は、pdfにてのメール納品が大半です。


お支払方法の方法はどのようになっていますか?


納品と同時にデータリソース社よりお客様へ請求書(必要に応じて納品書も)を発送いたします。
お客様よりデータリソース社へ(通常は円払い)の御振り込みをお願いします。
請求書は、納品日の日付で発行しますので、翌月最終営業日までの当社指定口座への振込みをお願いします。振込み手数料は御社負担にてお願いします。
お客様の御支払い条件が60日以上の場合は御相談ください。
尚、初めてのお取引先や個人の場合、前払いをお願いすることもあります。ご了承のほど、お願いします。


データリソース社はどのような会社ですか?


当社は、世界各国の主要調査会社・レポート出版社と提携し、世界各国の市場調査レポートや技術動向レポートなどを日本国内の企業・公官庁及び教育研究機関に提供しております。
世界各国の「市場・技術・法規制などの」実情を調査・収集される時には、データリソース社にご相談ください。
お客様の御要望にあったデータや情報を抽出する為のレポート紹介や調査のアドバイスも致します。



詳細検索

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

 

2024/11/21 10:26

156.13 円

165.08 円

200.38 円

ページTOPに戻る