【レポートの概要(一部)】
1. Report Overview
1.1 Cyber Security Market Overview
1.2 Global Cyber Security Market Segmentation
1.3 Why You Should Read This Report
1.4 How This Report Delivers
1.5 Key Questions Answered by This Analytical Report Include:
1.6 Who is This Report For?
1.7 Methodology
1.7.1 Primary Research
1.7.2 Secondary Research
1.7.3 Market Evaluation & Forecasting Methodology
1.8 Frequently Asked Questions (FAQ)
1.9 Associated Visiongain Reports
1.10 About Visiongain
2. Introduction to the Global Cyber Security Market
2.1 Cyber Security Market Structure Overview
2.1.1 Network Security (NetSec) Submarket Definition
2.1.2 Data Security (DataSec) Submarket Definition
2.1.3 Security Operations Management (SecOps) Submarket Definition
2.1.4 Identification Management (IdM) Submarket Definition
2.1.5 Endpoint Security (EndSec) Submarket Definition
2.1.6 Application Security (AppSec) Submarket Definition
2.1.7 Cloud Security (CloudSec) Submarket Definition
2.2 Why is Cybersecurity So Important to Homeland Security?
2.3 What Does the Cyber Threat to Critical Infrastructure Encompass?
2.4 Mechanisms of Cyber Attack
2.5 Types of Cyber Attack
2.6 Methods of Cyber Defence
2.5 Recent Notable Cyber Attacks & Incidents
2.5.1 Conficker
2.5.2 Operation Buckshot Yankee
2.5.3 Aurora
2.5.4 Chinese Diversion of Internet Traffic
2.5.5 Stuxnet
2.5.6 Duqu
2.5.7 RSA
2.5.8 Sony Corporation
2.5.9 Operation Shady RAT
2.5.10 Mitsubishi Heavy Industries
2.5.11 Flame / Operation: Olympic Games
2.5.12 Aramco
2.5.13 The Navy and Marine Corps Intranet (NMCI)
2.5.14 Operation Saffron Rose
2.5.15 Operation Dragonfly
2.5.16 Norwegian Oil and Gas
2.5.17 Sony Pictures Entertainment
2.5.18 Operation Cleaver
3. Global Cyber Security Market 2015-2025
3.1 Global Cyber Security Market 2015-2025
3.2 Regional Cyber Security Market Forecast 2015-2025
3.3 Regional Cyber Security AGR’s% 2015-2025
3.4 Regional Cyber Security Market Share Breakdowns 2015-2025
3.5 Leading 21 National Cyber Security Market Forecast Annual Growth Rates and CAGR’s 2015-2025
3.6 Cumulative Leading 21 National Cyber Security Market Expenditure & Market Share 2015-2025
3.7 Global Cyber Security Market Drivers & Restraints
4. Cyber Security Submarket Forecasts 2015-2025
4.1 Cyber Security Submarket Forecasts & Annual Growth Rates 2015-2025
4.2 Cyber Security Submarket Shares 2015, 2020, 2025
4.3 Cyber Security Network Security (NetSec) Submarket Forecast by Regional Market 2015-2025
4.3.1 Cyber Security Network Security (NetSec) Submarket Forecast by National Market 2015-2025
4.3.2 Cyber Security Network Security (NetSec) Submarket National Shares 2015, 2020, 2025%
4.4 Cyber Security Security Operations (SecOps) Submarket Forecast by Regional Market 2015-2025
4.4.1 Cyber Security Security Operations (SecOps) Submarket Forecast by National Market 2015-2025
4.4.2 Cyber Security Security Operations (SecOps) Submarket National Shares 2015, 2020, 2025%
4.5 Cyber Security Data Security (DataSec) Submarket Forecast By Regional Market 2015-2025
4.5.1 Cyber Security Data Security (DataSec) Submarket Forecast by National Market 2015-2025
4.5.2 Cyber Security Data Security (DataSec) Submarket National Shares 2015, 2020, 2025%
4.6 Cyber Security Identity Management (IdM) Submarket Forecast By Regional Market 2015-2025
4.6.1 Cyber Security Identity Management (IdM) Submarket Forecast by National Market 2015-2025
4.6.2 Cyber Security Identity Management (IdM) Submarket National Shares 2015, 2020, 2025%
4.7 Cyber Security Endpoint Security (EndSec) Submarket Forecast By Regional Market 2015-2025
4.7.1 Cyber Security Endpoint Security (EndSec) Submarket Forecast by National Market 2015-2025
4.7.2 Cyber Security Endpoint Security (EndSec) Submarket National Shares 2015, 2020, 2025%
4.8 Cyber Security Application Security (AppSec) Submarket Forecast By Regional Market 2015-2025
4.8.1 Cyber Security Application Security (AppSec) Submarket Forecast by National Market 2015-2025
4.8.2 Cyber Security Application Security (AppSec) Submarket National Shares 2015, 2020, 2025%
4.9 Cyber Security Cloud Security (CloudSec) Submarket Forecast By Regional Market 2015-2025
4.9.1 Cyber Security Cloud Security (CloudSec) Submarket Forecast by National Market 2015-2025
4.9.2 Cyber Security Cloud Security (CloudSec) Submarket National Shares 2015, 2020, 2025%
5. Leading 21 National Cyber Security Market Forecasts 2015-2025
5.1 Leading 21 National Cyber Security Markets Share Forecast 2015-2025
5.2 Barriers to Entry Analysis of the Leading 21 National Cyber Security Markets
5.3 U.S. Cyber Security Market & Submarket Forecasts 2015-2025
5.3.1 U.S. Cyber Security Submarket Forecasts 2015-2025
5.3.2 U.S. Cyber Security Market Drivers & Restraints
5.3.3 Changing Concerns: Why the focus on Cybersecurity will Continue to Drive U.S. Homeland Security Expenditure Upwards
5.3.4 What are the Different Components of the U.S. Federal Government Spending on Cybersecurity?
5.3.5 What are the Individual U.S. State Authorities Spending on Cyber Security?
5.3.6 A Breakdown of the U.S. National Intelligence Program (NIP) 2011-2013
5.3.7 How is the U.S. Oil and Gas Industry Responding to Increased Cyber Security Threats?
5.3.8 What are Domestic Airlines and the U.S. Federal Aviation Authority Doing to Guard Against a Major Cyber Attack?
5.3.9 What are the Essential Components of the U.S. Cybersecurity Establishment?
5.3.9.1 CNCI
5.3.9.2 US CYBERCOM
5.3.9.3 ARCYBER
5.3.9.4 AFCYBER (24th Air Force)
5.3.9.5 FLTCYBERCOM
5.3.9.6 MARFORCYBER
5.3.9.7 NSA
5.3.9.8 Perfect Citizen
5.3.9.9 DISA
5.3.9.10 DHS
5.3.9.11 National Protection and Programs Directorate
5.3.9.12 Office of Cyber Security and Communications
5.3.9.13 Einstein II
5.3.9.14 DARPA
5.3.9.15 780th Military Intelligence Brigade
5.3.10 Recent U.S. Cyber Security Events
5.3.11 U.S. Cyber Security Market Contracts & Programmes
5.4 Chinese Cyber Security Market & Submarket Forecasts 2015-2025
5.4.1 Chinese Cyber Security Submarket Forecast 2015-2025
5.4.2 Chinese Cyber Security Market Drivers & Restraints
5.4.3 A Breakdown of China’s Domestic Security Budgets From 2008-2014: Transport, Agriculture, Aviation, Maritime, Justice, Customs, and the Supreme People’s Procuratorate
5.4.4 Another Brick in the Great Firewall: How Has China’s Concern for the Control of Information Helped Shape its Defensive Cyber Posture?
5.4.5 A Digital Arms Race: How Strategic Competition with the United States Is Spurring on Chinese Ambitions to Become a Cyber Power
5.4.6 Recent Chinese Cyber Security Events
5.5 Japanese Cyber Security Market & Submarket Forecasts 2015-2025
5.5.1 Japanese Cyber Security Market Submarket Forecast 2015-2025
5.5.2 Japanese Cyber Security Market Drivers & Restraints
5.5.3 What Measures Has Japan Taken To Boost Its Cyber Security Capabilities And What Challenges Remain?
5.5.4 How Much Has the Japanese Military Allocated to Cyber Security In the Past Three Years?
5.5.5 What is the Organisational Structure of Japan’s New Military Cyber Command?
5.5.6 Recent Japanese Cyber Security Events
5.5.7 Japanese Cyber Security Market Contracts & Programmes
5.6 Russian Cyber Security Market & Submarket Forecasts 2015-2025
5.6.1 Russian Cyber Security Market Submarket Forecast 2015-2025
5.6.2 Russian Cyber Security Market Drivers & Restraints
5.6.3 Russian Cybersecurity Policy: How Stage Two Has Built Upon Previous Developments
5.6.4 Recent Russian Cyber Security Events
5.6.5 Russian Cyber Security Market Contracts & Programmes
5.7 Republic of Korea Cyber Security Market & Submarket Forecasts 2015-2025
5.7.1 Republic of Korea Cyber Security Submarket Forecast 2015-2025
5.7.2 Republic of Korea Cyber Security Market Drivers & Restraints
5.7.3 Forward Together: To What Extent Are South Korea’s PPPs Effective?
5.8 Saudi Arabian Cyber Security Market & Submarket Forecasts 2015-2025
5.8.1 Saudi Arabian Cyber Security Market Submarket Forecast 2015-2025
5.8.2 Saudi Arabian Cyber Security Market Drivers & Restraints
5.8.3 Why Does Saudi Arabia Still Invest More in Physical Security Than Cybersecurity?
5.9 Indian Cyber Security Market & Submarket Forecasts 2015-2025
5.9.1 Indian Cyber Security Submarket Forecast 2015-2025
5.9.2 Indian Cyber Security Market Drivers & Restraints
5.9.3 How Have Repeated Blackouts Placed a Renewed Emphasis on Indian Critical Infrastructure Protection?
5.9.4 How Will the Recommendations of the JWG Affect Indian Cyber Security?
5.9.5 Recent Indian Cyber Security Events
5.9.6 Indian Cyber Security Market Contracts & Programmes
5.10 French Cyber Security Market & Submarket Forecasts 2015-2025
5.10.1 French Cyber Security Submarket Forecast 2015-2025
5.10.2 French Cyber Security Market Drivers & Restraints
5.10.3 What is the Current State of French Cybersecurity?
5.10.4 Recent French Cyber Security Events
5.10.5 French Cyber Security Market Contracts & Programmes
5.11 U.K. Cyber Security Market & Submarket Forecasts 2015-2025
5.11.1 U.K. Cyber Security Submarket Forecast 2015-2025
5.11.2 U.K. Cyber Security Market Drivers & Restraints
5.11.3 Recent U.K. Cyber Security Events
5.11.4 U.K. Cyber Security Market Contracts & Programmes
5.12 German Cyber Security Market & Submarket Forecasts 2015-2025
5.12.1 German Cyber Security Submarket Forecast 2015-2025
5.12.2 German Cyber Security Market Drivers & Restraints
5.12.3 Have German Cybersecurity Efforts Acquired New Emphasis?
5.12.4 Recent German Cyber Security Events
5.12.5 German Cyber Security Market Contracts & Programmes
5.13 Israeli Cyber Security Market & Submarket Forecasts 2015-2025
5.13.1 Israeli Cyber Security Submarket Forecast 2015-2025
5.13.2 Israeli Cyber Security Market Drivers & Restraints
5.13.3 Recent Israeli Cyber Security Events
5.13.4 Israeli Cyber Security Market Contracts & Programmes
5.14 Canadian Cyber Security Market & Submarket Forecasts 2015-2025
5.14.1 Canadian Cyber Security Submarket Forecast 2015-2025
5.14.2 Canadian Cyber Security Market Drivers & Restraints
5.14.3 How Does Canada’s Current Cyber Security Strategy Cover Critical Infrastructure?
5.14.4 Access Denied: Why Canada Also Continues to Block the Entry Of Huawei Into Its Markets
5.14.5 How is the Growing Threat of Eco-Terrorism Likely to Influence Canadian Infrastructure Security?
5.14.6 Recent Canadian Cyber Security Events
5.14.7 Canadian Cyber Security Market Contracts & Programmes
5.15 Australian Cyber Security Market & Submarket Forecasts 2015-2025
5.15.1 Australian Cyber Security Submarket Forecast 2015-2025
5.15.2 Australian Cyber Security Market Drivers & Restraints
5.15.3 Why Huawei Technologies Co. Ltd. Is Unlikely To Have Access To The Australian Telecommunications Market In The Near Future
5.15.4 Australian Cyber Security: Stronger Than Acknowledged?
5.15.5 Recent Australian Cyber Security Events
5.15.6 Australian Cyber Security Market Contracts & Programmes
5.16 Italian Cyber Security Market & Submarket Forecasts 2015-2025
5.16.1 Italian Cyber Security Submarket Forecast 2015-2025
5.16.2 Italian Cyber Security Market Drivers & Restraints
5.16.3 Recent Italian Cyber Security Events
5.16.4 Italian Cyber Security Market Contracts & Programmes
5.17 Spanish Cyber Security Market & Submarket Forecasts 2015-2025
5.17.1 Spanish Cyber Security Submarket Forecast 2015-2025
5.17.2 Spanish Cyber Security Market Drivers & Restraints
5.17.3 Recent Spanish Cyber Security Events
5.17.4 Spanish Cyber Security Market Contracts & Programmes
5.18 Brazilian Cyber Security Market & Submarket Forecasts 2015-2025
5.18.1 Brazilian Cyber Security Submarket Forecast 2015-2025
5.18.2 Brazilian Cyber Security Market Drivers & Restraints
5.18.3 Recent Brazilian Cyber Security Events
5.18.4 Brazilian Cyber Security Market Contracts & Programmes
5.19 Turkish Cyber Security Market & Submarket Forecasts 2015-2025
5.19.1 Turkish Cyber Security Submarket Forecast 2015-2025
5.19.2 Turkish Cyber Security Market Drivers & Restraints
5.19.3 Fighting the Three-Headed Monster: ISIS, Assad, and the PKK
5.19.4 Recent Turkish Cyber Security Events
5.19.5 Turkish Cyber Security Market Contracts & Programmes
5.20 UAE Cyber Security Market & Submarket Forecasts 2015-2025
5.20.1 UAE Cyber Security Submarket Forecast 2015-2025
5.20.2 UAE Cyber Security Market Drivers & Restraints
5.20.3 Guarding the Golden Goose: Infrastructure Protection in the United Arab Emirates
5.20.4 Recent UAE Cyber Security Events
5.20.5 UAE Cyber Security Market Contracts & Programmes
5.21 Taiwanese Cyber Security Market & Submarket Forecasts 2015-2025
5.21.1 Taiwanese Cyber Security Submarket Forecast 2015-2025
5.21.2 Taiwanese Cyber Security Market Drivers & Restraints
5.21.3 Recent Taiwanese Cyber Security Events
5.22 Iranian Cyber Security Market & Submarket Forecasts 2015-2025
5.22.1 Iranian Cyber Security Submarket Forecast 2015-2025
5.22.2 Iranian Cyber Security Market Drivers & Restraints
5.23 Nigerian Cyber Security Market & Submarket Forecasts 2015-2025
5.23.1 Nigerian Cyber Security Submarket Forecast 2015-2025
5.23.2 Nigerian Cyber Security Market Drivers & Restraints
5.23.3 What Security Challenges Does Nigeria Currently Face, What Has the Country Done to Respond?
5.23.4 Recent Nigerian Cyber Security Events
5.23.5 Nigerian Cyber Security Market Contracts & Programmes
5.24 Rest of the World Cyber Security Market & Submarket Forecasts 2015-2025
5.24.1 Rest of the World Cyber Security Submarket Forecast 2015-2025
5.24.2 Rest of the World Cyber Security Market Drivers & Restraints
5.24.3 Recent Rest of the World Cyber Security Events
5.24.4 Rest of the World Cyber Security Market Contracts & Programmes
6. STEP Analysis of the Cyber Security Market 2015-2025
7. Expert Opinion
7.1 John Bohlke, Product Manager, DataSoft Corporation
7.1.1 Company Background and History
7.1.2 DataSoft’s Presence in the Market and It’s ‘Nova Network Security System’
7.1.3 The Effects of Increased Cyber Attacks Upon Product Development
7.1.4 Product Features and Advantages
7.1.5 DataSoft’s Future Outlook and Market Plans
7.2 Francis Cianfrocca, CEO & Founder, Evan Birkhead, VP of Marketing, Bayshore Networks, Inc.
7.2.1 Company Background and Trends in Development
7.2.2 Bayshore’s Contribution to the Cyber Security Market
7.2.3 Client Relationships and the Provision of Solutions
7.2.4 The Advantages of Bayshore’s Services & Solutions
7.2.5 Bayshore’s Strong Partnerships with Cisco & BAE Systems
7.2.6 Bayshore’s Plans for Market Expansion & Future Development
7.2.7 Anticipation of Technological Change and Future Challenges
7.2.8 On the Matter of Systems Integration
7.2.9 The Nature of the Current Cyber Threat & It’s Outlook for the Future
7.3 Paul Breo, U.K. Director of Security, CA Technologies, Inc.
7.3.1 Company Background and Trends in Development
7.3.2 CA Technologies’ Market Products and Their Benefits
7.3.3 The Challenges of Systems Integration
7.3.4 The All-Inclusive Nature of CA Technologies’ Solution and It’s Appeal to Multiple Market Verticals
7.3.5 CA Technologies’ Future Outlook and Plans for Development
7.4 Chandler Hall, Product & Program Manager – Commercial Security Products & Technology, Sentar, Inc.
7.4.1 Company Background and Trends in Development
7.4.2 Company Products & Solutions
7.4.3 The Advantages of Sentar’s Solutions
7.4.4 Sentar’s Business Strategy and Thinking on the Future of the Cyber Security Market
7.5 Tom Ayers, President & CEO, N-Dimension Solutions, Inc.
7.5.1 Company Background and Trends in Development
7.5.2 N-Dimension Solutions Contribution to the Cyber Security Market
7.5.3 N-Dimension Solutions’ Development of Products and Solutions
7.5.4 The Advantages of N-Dimension’s Product Range
7.5.5 N-Dimension’s Business Strategy for the Cyber Security Market
7.5.6 N-Dimension’s Views on the Future
7.6 Stephen Gates, Chief Security Evangelist, Corero Network Security, Inc.
7.6.1 Company Background and Commercial History
7.6.2 Corero’s Contribution to the Cyber Security Market
7.6.3 Product Development and Implementation
7.6.4 The Benefit of Using Corero’s Products & Services
7.6.5 Corero’s Business Strategy and Thoughts on the Role of DDoS
7.6.6 Corero’s Plans for the Future
7.6.7 How the Future Cyber Security Environment Will Likely Look
7.7 Jeff Erwin, CEO, Intego, Inc.
7.7.1 Company Background and Commercial History
7.7.2 Intego’s Contribution to the Cyber Security Market
7.7.3 Factors Affecting Product Development
7.7.4 Why Intego’s Products are Superior
7.7.5 Intego’s Business Strategy And Future Plans
8. 20 Notable Companies in the Global Cyber Security Market
8.1 Airbus Group Overview
8.1.1 Airbus Group Organisational Structure
8.1.2 Airbus Group Cyber Security Products
8.1.3 Airbus Group’s Role in the Cyber Security Market
8.1.4 Airbus Group Revenue 2009-2013
8.1.5 Airbus Group’s Regional Revenue 2009-2013
8.1.6 Airbus Group Primary Market Competitors
8.1.7 Airbus Group Regional Emphasis / Focus
8.1.8 Airbus Group Recent M&A Activity
8.2 BAE Systems plc Overview
8.2.1 BAE Systems plc’s Organisational Structure
8.2.2 BAE Systems plc Cyber Security Products
8.2.3 BAE Systems plc Role in the Cyber Security Market
8.2.4 BAE Systems plc’s Revenue 2009-2013
8.2.5 BAE Systems plc’s Regional Revenue 2009-2013
8.2.6 BAE Systems plc’s Primary Market Competitors
8.2.7 BAE Systems plc’s Regional Emphasis / Focus
8.2.8 BAE Systems plc’s M&A Activity
8.3 Boeing Company Overview
8.3.1 Boeing Company Organisational Structure
8.3.2 Boeing Company Cyber Security Products
8.3.3 Boeing Company’s Role in the Cyber Security Market
8.3.4 Boeing Company Revenue 2009-2013
8.3.5 Boeing Company’s Regional Revenue 2009-2013
8.3.6 Boeing Company’s Primary Market Competitors
8.3.7 Boeing Company’s Regional Emphasis / Focus
8.3.8 Boeing Company’s M&A Activity
8.4 Booz Allen Hamilton, Inc. Overview
8.4.1 Booz Allen Hamilton, Inc. Organisational Structure
8.4.2 Booz Allen Hamilton, Inc. Cyber Security Market Products
8.4.3 Booz Allen Hamilton, Inc.’s Role in the Cyber Security Market
8.4.4 Booz Allen Hamilton, Inc.’s Revenue 2009-2013
8.4.5 Booz Allen Hamilton’s Regional Revenue 2009-2013
8.4.6 Booz Allen Hamilton, Inc.’s Primary Market Competitors
8.4.7 Booz Allen Hamilton, Inc.’s Regional Emphasis / Focus
8.4.8 Booz Allen Hamilton, Inc.’s M&A Activity
8.5 Cisco Systems, Inc. Overview
8.5.1 Cisco Systems, Inc. Organisational Structure
8.5.2 Cisco Systems, Inc. Market Products
8.5.3 Cisco Systems, Inc.’s Role in the Cyber Security Market
8.5.4 Cisco Systems, Inc.’s Revenue 2009-2013
8.5.5 Cisco Systems, Inc.’s Regional Revenue 2009-2013
8.5.6 Cisco Systems, Inc.’s Primary Market Competitors
8.5.7 Cisco Systems, Inc.’s Regional Emphasis / Focus
8.5.8 Cisco Systems, Inc.’s M&A Activity
8.6 Computer Sciences Corporation (CSC) Overview
8.6.1 Computer Sciences Corporation’s Organisational Structure
8.6.2 Computer Sciences Corporation’s Cyber Security Products
8.6.3 Computer Sciences Corporation’s Role in the Cyber Security Market
8.6.4 Computer Sciences Corporation’s Revenue 2009-2013
8.6.5 Computer Science Corporation’s Regional Revenue 2009-2013
8.6.6 Computer Sciences Corporation’s Primary Market Competitors
8.6.7 Computer Sciences Corporation’s Regional Emphasis / Focus
8.6.8 Computer Sciences Corporation’s Recent M&A Activity
8.7 Finmeccanica S.p.A. Overview
8.7.1 Finmeccanica S.p.A.’s Organisational Structure
8.7.2 Finmeccanica S.p.A.’s Cyber Security Products
8.7.3 Finmeccanica S.p.A.’s Role in the Cyber Security Market
8.7.4 Finmeccanica S.p.A.’s Revenue 2009-2013
8.7.5 Finmeccanica S.p.A.’s Regional Revenue 2009-2013
8.7.6 Finmeccanica S.p.A.’s Primary Market Competitors
8.7.7 Finmeccanica S.p.A.’s Regional Emphasis / Focus
8.7.8 Finmeccanica S.p.A.’s Recent M&A Activity
8.8 General Dynamics Corporation Overview
8.8.1 General Dynamics Corporation’s Organisational Structure
8.8.2 General Dynamics Corporation’s Cyber Security Products
8.8.3 General Dynamics Corporation’s Role in the Cyber Security Market
8.8.4 General Dynamics Corporation Revenue 2009-2013
8.8.5 General Dynamics Corporation’s Regional Revenue 2009-2013
8.8.6 General Dynamics Corporation’s Primary Market Competitors
8.8.7 General Dynamics Corporation’s Regional Emphasis / Focus
8.8.8 General Dynamics Corporation’s Recent M&A Activity
8.9 Hewlett Packard Company Overview
8.9.1 Hewlett Packard Company’s Organisational Structure
8.9.2 Hewlett Packard Company’s Cyber Security Products
8.9.3 Hewlett Packard Company’s Role in the Cyber Security Market
8.9.4 Hewlett Packard Company’s Revenue 2009-2013
8.9.5 Hewlett Packard Company’s Regional Revenue 2009-2013
8.9.6 Hewlett Packard Company’s Primary Market Competitors
8.9.7 Hewlett Packard Company’s Regional Emphasis / Focus
8.9.8 Hewlett Packard Company’s Recent M&A Activity
8.10 Intel Corporation Overview
8.10.1 Intel Corporation’s Organisational Structure
8.10.2 Intel Corporation’s Cyber Security Products
8.10.3 Intel Corporation’s Role in the Cyber Security Market
8.10.4 Intel Corporation’s Revenue 2009-2013
8.10.5 Intel Corporation’s Regional Revenue 2009-2013
8.10.6 Intel Corporation’s Primary Competitors
8.10.7 Intel Corporation’s Regional Emphasis / Focus
8.10.8 Intel Corporation’s Recent M&A Activity
8.11 Kaspersky Lab Overview
8.11.1 Kaspersky Lab’s Organisational Structure
8.11.2 Kaspersky Lab’s Cyber Security Products
8.11.3 Kaspersky Lab’s Role in the Cyber Security Market
8.11.5 Kaspersky Lab’s Primary Market Competitors
8.11.6 Kaspersky Lab’s Regional Emphasis / Focus
8.11.7 Kaspersky Lab’s Recent M&A Activity
8.12 L-3 Communications Holdings, Inc. Overview
8.12.1 L-3 Communications Holdings, Inc.’s Organisational Structure
8.12.2 L-3 Communications Holdings, Inc.’s Cyber Security Products
8.12.3 L-3 Communications Holdings, Inc.’s Role in the Cyber Security Market
8.12.4 L-3 Communications Holdings, Inc.’s Revenue 2009-2013
8.12.5 L-3 Communications’ Regional Revenue 2009-2013
8.12.6 L-3 Communications Holdings, Inc.’s Primary Competitors
8.12.7 L-3 Communications Holdings, Inc.’s Regional Emphasis / Focus
8.12.8 L-3 Communications Holdings, Inc.’s Recent M&A Activity
8.13 Leidos, Inc. Overview
8.13.1 Leidos, Inc.’s Organisational Structure
8.13.2 Leidos, Inc.’s Cyber Security Products
8.13.3 Leidos, Inc.’s Role in the Cyber Security Market
8.13.4 Leidos, Inc.’s Revenue 2009-2013
8.13.5 Leidos, Inc.’s Regional Revenue 2009-2013
8.13.6 Leidos, Inc.’s Primary Market Competitors
8.13.7 Leidos, Inc.’s Regional Emphasis / Focus
8.13.8 Leidos, Inc.’s Recent M&A Activity
8.14 Lockheed Martin Corporation Overview
8.14.1 Lockheed Martin Corporation’s Organisational Structure
8.14.2 Lockheed Martin Corporation’s Cyber Security Products
8.14.3 Lockheed Martin Corporation’s Role in the Cyber Security Market
8.14.4 Lockheed Martin Corporation’s Revenue 2009-2013
8.14.5 Lockheed Martin Corporation’s Regional Revenue 2009-2013
8.14.6 Lockheed Martin Corporation’s Primary Market Competitors
8.14.7 Lockheed Martin Corporation’s Regional Emphasis / Focus
8.14.8 Lockheed Martin Corporation’s Recent M&A Activity
8.15 Northrop Grumman Corporation Overview
8.15.1 Northrop Grumman Corporation’s Organisational Structure
8.15.2 Northrop Grumman Corporation’s Cyber Security Products
8.15.3 Northrop Grumman Corporation’s Role in the Cyber Security Market
8.15.4 Northrop Grumman Corporation’s Revenue 2009-2013
8.15.5 Northrop Grumman Corporation’s Regional Revenue 2009-2013
8.15.6 Northrop Grumman Corporation’s Primary Market Competitors
8.15.7 Northrop Grumman Corporation’s Regional Emphasis / Focus
8.15.8 Northrop Grumman Corporation’s Recent M&A Activity .
8.16 Raytheon Company Overview
8.16.1 Raytheon Company’s Organisational Structure
8.16.2 Raytheon Company’s Cyber Security Products
8.16.3 Raytheon Company’s Role in the Cyber Security Market
8.16.4 Raytheon Company’s Revenue 2009-2013
8.18.5 Raytheon Company’s Regional Revenue 2009-2013
8.16.6 Raytheon Company’s Primary Market Competitors
8.16.7 Raytheon Company’s Regional Emphasis / Focus
8.16.8 Raytheon Company’s M&A Activity
8.17 Symantec Corporation Overview
8.17.1 Symantec Corporation’s Organisational Structure
8.17.2 Symantec Corporation’s Cyber Security Products
8.17.3 Symantec Corporation’s Role in the Cyber Security Market
8.17.4 Symantec Corporation’s Revenue 2009-2013
8.17.5 Symantec Corporation’s Regional Revenue 2009-2013
8.17.6 Symantec Corporation’s Primary Market Competitors
8.17.7 Symantec Corporation’s Regional Emphasis / Focus
8.17.8 Symantec Corporation’s Recent M&A Activity
8.18 Thales Group Overview
8.18.1 Thales Group’s Organisational Structure
8.18.2 Thales Group’s Cyber Security Products
8.18.3 Thales Group’s Role in the Cyber Security Market
8.18.4 Thales Group’s Revenue 2009-2013
8.18.5 Thales Group’s Regional Revenue 2009-2013
8.18.6 Thales Group’s Primary Market Competitors
8.18.7 Thales Group’s Regional Emphasis / Focus
8.18.8 Thales Group’s M&A Activity
8.19 Trend Micro, Inc. Overview
8.19.1 Trend Micro, Inc.’s Organisational Structure
8.19.2 Trend Micro, Inc.’s Cyber Security Products
8.19.3 Trend Micro, Inc.’s Role in the Cyber Security Market
8.19.4 Trend Micro, Inc.’s Revenue 2009-2013
8.18.5 Trend Micro, Inc.’s Regional Revenue 2009-2013
8.19.6 Trend Micro, Inc.’s Primary Market Competitors
8.19.7 Trend Micro, Inc.’s Regional Emphasis / Focus
8.19.8 Trend Micro, Inc.’s Recent M&A Activity
8.20 Ultra Electronics Holdings plc Overview
8.20.1 Ultra Electronics Holdings plc’s Organisational Structure
8.20.2 Ultra Electronics Holdings plc’s Cyber Security Products
8.20.3 Ultra Electronics Holdings plc’s Role in the Cyber Security Market
8.20.4 Ultra Electronics Holdings plc Revenue 2009-2013
8.20.5 Ultra Electronics’ Regional Revenue 2009-2013
8.20.6 Ultra Electronics Holdings plc’s Primary Market Competitors
8.20.7 Ultra Electronics Holdings plc’s Regional Emphasis / Focus
8.20.8 Ultra Electronics Holdings plc’s M&A Activity
8.21 Other Notable Companies in the Global Cyber Security Market
9. Conclusions
10. Glossary
【レポート販売概要】
■ タイトル:サイバーセキュリティの世界市場:ネットワークセキュリティ、データセキュリティ、セキュリティ運用管理、ID管理、エンドポイントセキュリティ■ 英文:Cyber Security Market 2015-2025 : Leading Companies in Network, Data, Endpoint, Application & Cloud Security, Identity Management & Security Operations
■ 発行日:2015年2月
■ 調査会社:visiongain
■ 商品コード:VGAIN503042
■ 調査対象地域:グローバル
- 園芸用LED照明の世界市場2016-2020About LED Lighting Lighting sources such as incandescent lighting, fluorescent lighting, and tungsten photonic lighting were used. However, the industry is witnessing transition to the latest lighting technology like LED lighting. LED lighting devices provide high-intensity brightness, along with other advantages like low voltage requirements, low radiated heat, high reliability, negligible ultrav …
- 民間航空機用バッテリー及び付属品の世界市場The global commercial aircraft batteries and accessories market is estimated to grow at a CAGR of 7.3% from 2014 to 2019. Although the developing markets (such as the China, India, and Japan) hold larger shares in the global commercial aircraft batteries and accessories market, the Middle East region is expected to grow at the highest CAGR of 8.4% in the forecast period. The growth of the commerci …
- ベビースキンケア製品の世界市場:ベビーオイル、ベビーローション、ベビー用薬用クリームAbout Baby Ointment Baby ointments are divided into three categories that include body massage oils, lotions, and medicinal creams. The body massage oil is used for giving soothing massages that helps improve the general well-being of the baby while improving blood circulation and helping the baby to sleep. Other baby ointments such as lotions and medicinal creams are designed to treat rashes on t …
- 3G/LTE/クラウド/HTML5エコシステムにおけるSoLoMoゲームの市場分析と予測:SoLoMo Gaming in 3G, LTE, Cloud, and HTML5 Ecosystem: Market Analysis & Forecast 2012 – 2017The convergence of Social Local and Mobile (SoLoMo) is a powerful force with big implications for applications of all types and gaming is no exception. SoLoMo Gaming will cause no less than a revitalization of the gaming ecosystem resulting in disruption as new market players assume market share for existing providers. The growth of LTE, smartphone and tablet devices, social media/networking, mobi …
- 鋸刃の世界市場2016-2020About Saw Blades A saw is primarily used to cut through materials such as wood, metal, stone, and concrete. It consists of a blade, chain, or toothed edge that enables smooth cutting operation and is termed as saw blade. Some of the commonly used saw blades are stone cutting, circular, band, hand, chain, and straight saw blades. These saw blades have varying designs based on the required strength …
- 軍事シミュレーション、モデリング、仮想訓練の世界市場2016-2026Military Simulation and Virtual Training – our new study reveals trends, market progress, and predicted revenues Where is the Military Simulation and Virtual Training market heading? If you are involved in this sector you must read this brand new report. Visiongain’s report shows you the potential revenues streams to 2026, assessing data, trends, opportunities and business prospects there. Discove …
- スマートフォン:アンドロイドプラットフォーム(Smartphones: Android Platform)The Mobile Index provides a sophisticated, proprietary algorithm for scoring the top products and services in each of 60+ mobile and wireless categories based on four variables: 1) technology innovation, 2) management strength, 3) market acceptance and 4) financial strength. The Mobile Index service gives enterprises more information than other rating services since it considers four important var …
- ノイズ対策部品の世界市場2017-2021:PCBシールド、ガスケット、EMIフィルタ、積層体/テープAbout Noise Suppression Components Noise is a fluctuation in an electrical signal exhibited by all the electronic circuits. Noise produced by electronic devices varies as it is produced by several different effects. For effective noise suppression in electronic equipment, the design engineers should require a good understanding of the different types of EMI suppression filters and the features so …
- 百日咳(Pertussis)の治療薬パイプライン動向(2015年上半期版)Pertussis - Pipeline Review, H1 2015 Summary Global Markets Direct’s, ‘Pertussis - Pipeline Review, H1 2015’, provides an overview of the Pertussis’s therapeutic pipeline. This report provides comprehensive information on the therapeutic development for Pertussis, complete with comparative analysis at various stages, therapeutics assessment by drug target, mechanism of action (MoA), route of admin …
- 血管形成術用バルーンの世界市場2016-2020About Global Angioplasty Balloon Market The global angioplasty balloon market presents significant opportunities for vendors to grow in untapped countries, particularly those in APAC. The market is highly dynamic and characterized by intense competition, with the presence of many global and local players that develop safe, easy-to-use, cost-effective, and widely available products in the market. T …
- Enteric Diseases in the UK 2014: Market Outlook and Emerging OpportunitiesAbout This ReportThis new 322-page report from Venture Planning Group presents detailed analysis of the UK Enteric Diseases market, including sales forecasts and supplier shares for Campylobacter, Cryptosporidium, E. Coli, Enterovirus, Rhinovirus, Rotavirus, Salmonella, Shigella, Vibrio and Yersinia. The report provides test volume and sales projections for Hospitals, Commercial and Public H …
- Wi-Fiダイレクト:商品カテゴリー、商品、企業動向:Wi-Fi Direct: Market View of Product Categories, Products, and VendorsWiFi Direct allows devices to communicate directly with each other using methods similar to traditional WiFi, except for the use of a central access point. Instead, the devices use a “Software Access Point” (Soft AP). Each device will have a radio transceiver, usually on a chip, which uses software to create an access point within the device itself. As of December 2012 there have 1520 certificatio …
- ポリエーテルエーテルケトン(PEEK)の世界市場分析:製品別(未充填、炭素充填、ガラス充填)、用途別(医療、自動車、航空宇宙、産業、電気・電子)、セグメント予測The global polyether ether ketone (PEEK) market is expected to reach USD 1.03 billion by 2024, according to a new report by Grand View Research, Inc. Increasing high-performance plastics demand as a substitute to metals in automobiles on account of growing need for high efficiency and low weight materials is expected to drive overall industry demand in near future. The stringent environmental regu …
- 医療用シミュレーションの世界市場:製品・サービス別(モデルベースシミュレーション、Webベースシミュレーション、シミュレーショントレーニングサービス)、フィデリティ別(低フィデリティ、中フィデリティ、高フィデリティ)、エンドユーザー別(学術機関・研究センター、病院・診療所、軍事組織)Medical simulation is the virtual duplication of in situ activities or phenomenon, representing the functions and properties of a selective real abstract or process. It is used to train healthcare professionals using advanced healthcare technologies. The global medical simulation market was valued at $1,132 million in 2017 and is estimated to reach $ 3,251 million by 2025, registering a CAGR of 14 …
- 世界の屋内ポジショニング・屋内ナビゲーション(IPIN)市場:ビーコン、プラットフォーム、装置About IPIN Technology In a scenario where people spend more than 80 percent of their time indoors or inside closed establishments, it is very important to have a technology that can help them navigate within large buildings. IPIN system provides a solution for the same. IPIN technologies make use of sensors, magnetic positioning, and BLE technology to accurately track users inside closed spaces. I …