The Future of Information Security - Markets & Technologies Outlook - 2012-2018

Large and medium sized businesses, as well as governments, are exposed to the greatest risk from breaches of Information Security. This new report examines, analyses, and predicts the evolution of technologies, markets, and outlays (expenditures) for Information Security (InfoSec) infrastructure products over the next six years.

This multi-scenario report presents an overview of the markets for ten product categories in three regions across the entire span of the Information Security infrastructure market.

Who will benefit from this report:

  • C- level Executives
  • Business Developers
  • Decision and Policy Makers
  • Investors and Entrepreneurs

The report explores, analyses and forecasts:

  • Global Information Security Market Forecast by Region
  • Global Information Security Market Forecast by Capability Groupings:
    •  Consumer Market
    •  ID & Access Management Market
    •  Enterprise Firewall Market
    •  Endpoint Protection Market
    •  Security & Vulnerability Management Market
    •  Unified Threat Management Market
    •  Intrusion Detection & Prevention Market
    •  Secure Web Gateway Market
    •  Security Information Event Management Market
    •  Data Loss Prevention Market

Going beyond analysis and forecast, this report highlights specific Business Outlook and Opportunities.

Table of Content

1. Introduction
1.1. Scope of This Report
1.2. Language Disclaimer and Further Information
1.3. Methodology
1.4. Basic Scenario Assumptions
1.4.1. Scenario I – Cyber Mess
1.4.2. Scenario II – Cyber Hostilities
1.5. Who is This Report For?
1.5.1. C-Level Executives
1.5.2. Business Developers
1.5.3. Decision and Policy Makers
1.5.4. Investors and Entrepreneurs

2. Executive Summary
2.1. What is Information Security
2.2. Major Findings/Conclusions
2.2.1. Major Findings
2.2.2. Major Conclusions
2.2.3. Important Tables and Graphs

3. Current Technologies
3.1. Elements of Information Security
3.1.1. The Customer Base
3.1.2. The Information Security Environment
3.1.3. The Threat Landscape
3.1.3.1. Adware
3.1.3.2. Attack Toolkit
3.1.3.3. Botnet
3.1.3.4. Crimeware
3.1.3.5. CyberExtortion
3.1.3.6. Denial of Service
3.1.3.7. DNS Hack
3.1.3.8. Hackers and Crackers
3.1.3.9. Insider Threat
3.1.3.10. Malware
3.1.3.11. Phishing and Spear Phishing
3.1.3.12. Rootkit
3.1.3.13. ScareWare
3.1.3.14. Sidejacking
3.1.3.15. Spam
3.1.3.16. Spyware
3.1.3.17. Trojans
3.1.3.18. Virus
3.1.3.19. Worms
3.1.3.20. Zombies
3.1.4. Core Information Security Capabilities
3.1.4.1. Unique Capabilities
3.1.4.2. Common Capabilities
3.1.4.3. Support Capabilities
3.1.4.4. Secure Content and Threat Management
3.2. Endpoint Protection
3.3. Unified Threat Management
3.4. Data Loss Prevention and Intrusion Detection and Prevention
3.5. Security and Vulnerability Management
3.6. Security Information and Event Management
3.7. Enterprise Firewall
3.8. Secure Web Gateway
3.9. Identity and Access Management
3.10. Consumer Security Software

4. Current Markets and Uses
4.1. Large Enterprise Market
4.2. Small and Medium Business Market
4.3. Government Market
4.4. Consumer Market

5. Current Vendors/Products
5.1. A Note on Appliances, Virtualization, and the Cloud
5.2. Endpoint Protection
5.3. Unified Threat Management
5.4. Data Loss Prevention
5.5. Intrusion Detection and Prevention
5.6. Security and Vulnerability Management
5.7. Security Information and Event Management
5.8. Enterprise Firewall
5.9. Secure Web Gateway
5.10. Identity & Access Management
5.11. Consumer Security Software

6. Global Information Security Market Forecast by Region – 2012 – 2018
6.1. Americas Information Security Market Forecast by Capability Groupings– 2012 – 2018
6.2. Europe – Middle East – Africa (EMEA) Information Security Market Forecast by Capability Groupings – 2012 – 2018
6.3. Asia-Pacific Information Security Market Forecast by Capability Groupings – 2012 – 2018

7. Global Information Security Market Forecast by Capability Groupings – 2012 – 2018
7.1. Global Outlook by Groupings
7.2. Consumer Market Forecast by Region – 2012 – 2018
7.2.1. Forecast Assumptions
7.3. ID & Access Management Market Forecast by Region – 2012 – 2018
7.3.1. Forecast Assumptions
7.4. Enterprise Firewall Market Forecast by Region – 2012 – 2018
7.4.1. Forecast Assumptions
7.5. Endpoint Protection Market Forecast by Region – 2012 – 2018
7.5.1. Forecast Assumptions
7.6. Security & Vulnerability Management Market Forecast by Region – 2012 – 2018
7.6.1. Forecast Assumptions
7.7. Unified Threat Management Market Forecast by Region – 2012 – 2018
7.7.1. Forecast Assumptions
7.8. Intrusion Detection & Prevention Market Forecast by Region – 2012 – 2018
7.8.1. Forecast Assumptions
7.9. Secure Web Gateway Market Forecast by Region – 2012 – 2018
7.9.1. Forecast Assumptions
7.10. Security Information Event Management Market Forecast by Region – 2012 – 2018
7.10.1. Forecast Assumptions
7.11. Data Loss Prevention Market Forecast by Region – 2012 – 2018
7.11.1. Forecast Assumptions

8. Service and Maintenance

9. Scenario II Considerations

10. Technology Outlook
10.1. Market Considerations and Trends
10.1.1. Red Ocean, Blue Ocean
10.1.2. Trends in the Threat Landscape
10.1.3. Technology Trends
10.2. Consumer Security Software
10.2.1. Drivers
10.2.2. Inhibitors
10.2.3. SWOT Analysis
10.3. Identity & Access Management
10.3.1. Drivers
10.3.2. Inhibitors
10.3.3. SWOT Analysis
10.4. Enterprise Firewall
10.4.1. Drivers
10.4.2. Inhibitors
10.4.3. SWOT Analysis
10.5. Endpoint Protection
10.5.1. Drivers
10.5.2. Inhibitors
10.5.3. SWOT Analysis
10.6. Security and Vulnerability Management
10.6.1. Drivers
10.6.2. Inhibitors
10.6.3. SWOT Analysis
10.7. Unified Threat Management
10.7.1. Drivers
10.7.2. Inhibitors
10.7.3. SWOT Analysis
10.8. Data Loss Prevention
10.8.1. Drivers
10.8.2. Inhibitors
10.8.3. SWOT Analysis
10.9. Intrusion Detection and Prevention
10.9.1. Drivers
10.9.2. Inhibitors
10.9.3. SWOT Analysis
10.10. Secure Web Gateway
10.10.1. Drivers
10.10.2. Inhibitors
10.10.3. SWOT Analysis
10.11. Security Information and Event Management
10.11.1. Drivers
10.11.2. Inhibitors
10.11.3. SWOT Analysis

11. Business Outlook and Opportunities
11.1. Target Customer Groups
11.1.1. Customer Group Opportunities
11.2. Cyberwar
11.2.1. Offensive Drivers
11.2.2. Offensive Inhibitors
11.2.3. Defensive Drivers
11.2.4. Defensive Inhibitors
11.3. Cloud Security
11.3.1. Drivers
11.3.2. Inhibitors
11.4. Mobile Device Security
11.5. Scenario 0 – Economic Malaise
11.6. Scenario I – Cyber Mess
11.7. Scenario II – Cyber Hostilities

Appendices

Definitions

Glossary

Acronyms

Information Security Laws and Regulations

List of Figures

Figure 1 – Global Information Security Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 2 – Americas Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 3 – EMEA Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 4 – Asia-Pacific Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 5 – Global Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 6 – Conceptual Diagram of the Elements of a Network
 Figure 7 – Endpoint Protection
 Figure 8 – Unified Threat Management
 Figure 9 – Data Loss Prevention
 Figure 10 – Security and Vulnerability Management
 Figure 11 – Security Information and Event Management
 Figure 12 – Enterprise Firewall
 Figure 13 – Secure Web Gateway
 Figure 14 – Identity & Access Management
 Figure 15 – Consumer Security Software
 Figure 16 – Global Internet Penetration
 Figure 17 – Global Information Security Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 18 – Global Information Security Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 19 – Americas Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 20 – Americas Information Security Market Forecast Share by Capability Groupings by [%] – 2012, 2015 and 2018
 Figure 21 – Americas Information Security Market Forecast Behavior by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 22 – EMEA Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 23 – EMEA Information Security Market Forecast Share by Capability Groupings by [%] – 2012, 2015 and 2018
 Figure 24 – EMEA Information Security Market Forecast Behavior by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 25 – Asia-Pacific Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 26 – Asia-Pacific Information Security Market Forecast Share by Capability Groupings by [%] – 2012, 2015 and 2018
 Figure 27 – Asia-Pacific Information Security Market Forecast Behavior by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 28 – Global Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 29 – Global Information Security Market Forecast Share by Capability Groupings by [%] – 2012, 2015 and 2018
 Figure 30 – Global Information Security Market Forecast Behavior by Capability Groupings by [$Billion] – 2012 – 2018
 Figure 31 – Global Consumer Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 32 – Global Consumer Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 33 – Global Consumer Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 34 – Global ID & Access Management Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 35 – Global ID & Access Management Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 36 – Global ID & Access Management Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 37 – Global Enterprise Firewall Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 38 – Global Enterprise Firewall Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 39 – Global Enterprise Firewall Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 40 – Global Endpoint Protection Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 41 – Global Endpoint Protection Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 42 – Global Endpoint Protection Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 43 – Global Security & Vulnerability Management Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 44 – Global Security & Vulnerability Management Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 45 – Global Security & Vulnerability Management Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 46 – Global Unified Threat Management Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 47 – Global Unified Threat Management Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 48 – Global Unified Threat Management Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 49 – Global Intrusion Detection & Prevention Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 50 – Global Intrusion Detection & Prevention Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 51 – Global Intrusion Detection & Prevention Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 52 – Global Secure Web Gateway Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 53 – Global Secure Web Gateway Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 54 – Global Secure Web Gateway Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 55 – Global Security Information Event Management Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 56 – Global Security Information Event Management Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 57 – Global Security Information Event Management Market Forecast Behavior by Region by [$Billion] – 2012 – 2018
 Figure 58 – Global Data Loss Prevention Market Forecast by Region by [$Billion] – 2012 – 2018
 Figure 59 – Global Data Loss Prevention Market Forecast Share by Region by [%] – 2012, 2015 and 2018
 Figure 60 – Global Data Loss Prevention Market Forecast Behavior by Region by [$Millions] – 2012 – 2018
 Figure 61 – The Technology Effectiveness Life Cycle
 Figure 62 – The Consumer Environment
 Figure 63 – The Identity & Access Management environment
 Figure 64 – The Enterprise Firewall environment
 Figure 65 – The Endpoint Protection environment
 Figure 66 – The Security and Vulnerability Management environment
 Figure 67 – The Unified Threat Management environment
 Figure 68 – The Data Loss Prevention environment
 Figure 69 – The Intrusion Detection and Prevention environment
 Figure 70 – The Secure Web Gateway Environment
 Figure 71 – The Security Information and Event Management environment


List of Tables

Table 1 – Global Information Security Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 2 – Americas Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Table 3 – EMEA Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Table 4 – Asia-Pacific Information Security Market Forecast by Capability Groupings by [$Millions] – 2012 – 2018
 Table 5 – Global Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Table 6 – Core Information Security Capabilities
 Table 7 – Unique Information Security Capabilities
 Table 8 – Common Information Security Capabilities
 Table 9 – Support Information Security Capabilities
 Table 10 – Endpoint Protection – Vendors
 Table 11 – Unified Threat Management – Vendors
 Table 12 – Data Loss Prevention – Vendors
 Table 13 – Intrusion Detection and Prevention – Vendors
 Table 14 – Security and Vulnerability Management – Vendors
 Table 15 – Security Information and Event Management – Vendors
 Table 16 – Secure Web Gateway – Vendors
 Table 17 – Secure Web Gateway – Vendors
 Table 18 – Identity & Access Management – Vendors
 Table 19 – Consumer Security Software – Vendors
 Table 20 – Global Information Security Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 21 – Global Information Security Market Forecast Share by Region by [%] – 2012 – 2018
 Table 22 – Americas Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Table 23 – Americas Information Security Market Forecast Share by Solutions by [%] – 2012 – 2018
 Table 24 – EMEA Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Table 25 – EMEA Information Security Market Forecast Share by Solutions by [%] – 2012 – 2018
 Table 26 – Asia-Pacific Information Security Market Forecast by Capability Groupings by [$Million] – 2012 – 2018
 Table 27 – Asia-Pacific Information Security Market Forecast Share by Solutions by [%] – 2012 – 2018
 Table 28 – Global Information Security Market Forecast by Capability Groupings by [$Billion] – 2012 – 2018
 Table 29 – Global Information Security Market Forecast Share by Solutions by [%] – 2012 – 2018
 Table 30 – Global Consumer Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 31 – Global Consumer Market Forecast Share by Region by [%] – 2012 – 2018
 Table 32 – Global ID & Access Management Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 33 – Global ID & Access Management Market Forecast Share by Region by [%] – 2012 – 2018
 Table 34 – Global Enterprise Firewall Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 35 – Global Enterprise Firewall Market Forecast Share by Region by [%] – 2012 – 2018
 Table 36 – Global Endpoint Protection Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 37 – Global Endpoint Protection Market Forecast Share by Region by [%] – 2012 – 2018
 Table 38 – Global Security & Vulnerability Management Market Forecast by Region by [$Billion] – 2012 – 2018
 Table 39 – Global Security & Vulnerability Management Market Forecast Share by Region by [%] – 2012 – 2018
 Table 40 – Global Unified Threat Management Market Forecast by Region by [$Million] – 2012 – 2018
 Table 41 – Global Unified Threat Management Market Forecast Share by Region by [%] – 2012 – 2018
 Table 42 – Global Intrusion Detection & Prevention Market Forecast by Region by [$Millions] – 2012 – 2018
 Table 43 – Global Intrusion Detection & Prevention Market Forecast Share by Region by [%] – 2012 – 2018
 Table 44 – Global Secure Web Gateway Market Forecast by Region by [$Millions] – 2012 – 2018
 Table 45 – Global Secure Web Gateway Market Forecast Share by Region by [%] – 2012 – 2018
 Table 46 – Global Security Information Event Management Market Forecast by Region by [$Millions] – 2012 – 2018
 Table 47 – Global Security Information Event Management Market Forecast Share by Region by [%] – 2012 – 2018
 Table 48 – Global Data Loss Prevention Market Forecast by Region by [$Millions] – 2012 – 2018
 Table 49 – Global Data Loss Prevention Market Forecast Share by Region by [%] – 2012 – 2018

License description Price in US$
1-User PDF License US $2,995.00
5-User PDF License US $3,995.00
Site PDF License US $5,995.00
Enterprise PDF License US $7,995.00

Single User License: This license allows for use of a report by one person. This person may use the report on any computer, and may print out the report, but may not share the report (or any information contained therein) with any other person or persons. Unless a Departmental License, a Site License or a Global Site License is purchased, a Single User License must be purchased for every person that wishes to use the report within the same enterprise. Customers who infringe these license terms are liable for a Global Site license fee.

5-User License: This license allows for use of a report by five people within the same enterprise location. Each of these people may use the report on any computer, and may print out the report, but may not share the report (or any information contained therein) with any other person or persons. Customers who infringe these license terms are liable for a Global Site license fee.

Site License: This license allows for use of a report by an unlimited number of people within the same enterprise location. Each of these people may use the report on any computer, and may print out the report, but may not share the report (or any information contained therein) with any person or persons outside of the enterprise location. Customers who infringe these license terms are liable for a Global Site license fee.

Global Site License: This license allows for use of a report by an unlimited number of people within the same enterprise worldwide. Each of these people may use the report on any computer, and may print out the report, but may not share the report (or any information contained therein) with any other person or persons outside of the enterprise.

Sample Request

Report Code: MF130167
Published: January 1, 2013
Pages: 178 (US Letter)
1-User PDF License $2,995.00
5-User PDF License $3,995.00
Site PDF License $5,995.00
Enterprise PDF License $7,995.00
Request more info

Have a question?

If you have any questions contact us by email or by phone +31 (0)20 486 7590