世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

サイバー犯罪とセキュリティの未来

The Future of Cybercrime & Security

 

出版社 出版年月電子版価格 ページ数
Juniper Research
ジュニパーリサーチ社
2019年8月GBP2,250
企業ライセンス(PDF+Excel)
63

サマリー

このレポートは世界のサイバーセキュリティ市場を調査し、主要企業の戦略や市場動向を掲載しています。

主な掲載内容

ベンダ分析:54のサイバーセキュリティ事業者の評価

  • エンドポイントセキュリティー企業19社
  • クラウドセキュリティプロバイダ15社
  • 認証&アクセス管理プロバイダ14社
  • セキュリティ啓発とトレーニングプロバイダ6社


Overview

Juniper Research’s The Future of Cybercrime & Security market research provides a comprehensive analysis of the threat landscape and state of enterprise cybersecurity; presenting cybercrime, legislation and security market trends to allow industry players to understand and prepare for the future of this vital industry.

The research suite includes:

  1. Market Trends & Opportunities:
    • Key trends and the future direction of cybercrime: Breakdown of threats and market developments by segment.
    • Legislation Analysis: Recent and future cybersecurity legislation and an assessment of the impact of government actions, alongside trends in the cybersecurity investment space.
  2. Strategic Analysis: Sector analysis and Juniper Research’s Leaderboard assessment for the following players:
    • Endpoint Security:
      • Avast
      • Barkly
      • Carbon Black
      • Cylance
      • DarkTrace
      • FireEye
      • IBM
      • Lookout
      • Minerva
      • Paladion
      • Palo Alto Networks
      • SentinelOne
      • SentryBay
      • SonicWall
      • Sophos
      • Symantec
      • Tanium
      • Trend Micro
      • Webroot
    • Cloud Cybersecurity providers:
      • Alert Logic
      • AlienVault (part of AT&T)
      • CipherCloud
      • CloudFlare
      • Cyberark
      • DarkTrace
      • Forcepoint
      • IBM
      • Illumio
      • Netskope
      • Palo Alto Networks
      • Qualys
      • SecureWorks
      • Trend Micro
      • Zscaler
    • Identity & Access Management providers:
      • Akamai
      • Avoco Secure
      • Centrify
      • Cyberark
      • Duo
      • Evernym
      • Forgerock
      • IBM
      • Okta
      • Oracle
      • Ping Identity
      • RSA
      • SailPoint
      • Yoti
    • Security Awareness Training providers:
      • KnowB4
      • Cofense
      • Proofpoint
      • The Defence Works
      • SANS Institute
      • Infosec Institute
  3. Interactive Forecast Excel: Highly granular dataset comprising of more than 3,700 datapoints allied to regional and sector analysis tools. Includes regional and key country level analysis together with 5-year forecasts for the cybersecurity market:
    • Cost of data breaches
    • Average breach cost
    • Average breach size
    • Number of breaches and level of breach reporting
    • Cybersecurity spend levels for small, medium and large businesses


目次

Table of Contents

1. The Outlook for Cybercrime & Financial Services

1.1 Introduction . 5
1.2 Key Takeaways . 5

2. Cybercrime Trends

2.1 Introduction . 8
2.2 Definitions & Typology . 8
2.2.1 Incident Types . 8
2.2.2 Attack Types. 8
i. DoS & DDoS . 8
ii. Phishing . 9
iii. Trojans . 9
iv. Keylogging . 9
v. MITM Attacks . 9
vi. Scrapers & Skimmers . 10
vii. Ransomware . 10
viii. Botnets . 10
ix. Cryptojacking . 10
x. Quantum Computing . 11
2.2.3 Motivations . 11
2.3 Cybercrime Trends . 11
Figure 2.1: DDoS Attack Trends . 12
Case Study: Smarter Botnets Take on Businesses . 13
Figure 2.2: Multi-Vector DDoS Attacks . 14
2.4 Juniper Cybercrime Threat Assessments . 16
2.4.1 Financial Threat Assessments . 16
i. Banking . 16
Figure 2.3: Juniper Research 2019 Banking Cybercrime Threat Landscape
Assessment . 17
Figure 2.4: Juniper Research Banking Cybercrime Future Threat Landscape . 18
ii. Payments & Money Transfer . 19
Figure 2.5: Juniper Research 2019 Payments & Money Transfer Cybercrime
Threat Landscape Assessment . 19
Figure 2.6: Juniper Research Payments & Money Transfer Cybercrime Future
Threat Landscape . 20
iii. Mobile Wallets . 20
Figure 2.7: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape
Assessment . 21
Figure 2.8: Juniper Research Mobile Wallets Cybercrime Future Threat
Landscape . 22
2.4.2 Device Threat Assessment . 23
i. Smartphones . 23
Figure 2.9: Juniper Research 2019 Smartphone Cybercrime Threat Landscape
Assessment . 23
Figure 2.10: Juniper Research Smartphone Cybercrime Future Threat
Landscape . 24
ii. IoT Devices . 25
Figure 2.11: Juniper Research 2019 IoT Cybercrime Threat Landscape
Assessment . 25
Figure 2.12: Forecast - Juniper Research IoT Cybercrime Threat Landscape . 26
2.5 Cybercrime Breach Forecast . 27
2.5.1 Methodology. 27
Figure 2.13: Criminal Data Breach Forecast Methodology . 27
i. Forecast Assumptions & Limitations of Analysis . 28
2.6 Cybercrime Breaches Forecasts . 30
2.6.1 Breaches Volume . 30
Figure & Table 2.14: Total Number of Criminal Data Breaches per annum, Split by
8 Key Regions, 2019-2024 . 30
2.6.2 Data Breaches Value . 31
Figure & Table 2.15: Cost of Criminal Data Breaches per annum ($m), Split by 8
Key Regions 2019-2024 . 31

3. Cybersecurity Trends

3.1 Introduction . 33
3.1.1 Definitions . 33
3.2 Cybersecurity Trends . 33
Figure 3.1: Threats & Alerts Investigation Rate . 34
3.3 Cybersecurity Market Forecasts . 37
3.3.1 Cybersecurity Spend Forecast Methodology. 37
Figure 3.2: Cybersecurity Spend Forecast Methodology . 37
3.3.2 Forecast Assumptions & Limitations of Analysis . 38
3.3.3 Cybersecurity Market Spend Forecast . 39
Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key
Regions 2019-2024 . 39
3.4 Regulatory Environment . 40
3.4.1 North America . 40
i. US . 40
ii. Canada . 41
3.4.2 Latin America . 41
i. Argentina . 41
ii. Brazil . 41
iii. Mexico . 42
3.4.3 Europe . 42
i. EU . 42
ii. Germany . 43
iii. Russia . 44
iv. Turkey . 44
v. UK . 45
3.4.4 Asia Pacific . 45
i. China . 45
ii. Japan . 46
iii. India . 46

4. Cybersecurity Sector Outlook & Competitive Analysis

4.1 Cybersecurity Market Sectors Outlook . 49
4.1.1 Cloud Security . 49
4.1.2 IAM (Identity & Access Management) . 49
4.1.3 Endpoint Security . 50
4.1.4 Threat Intelligence . 51
4.1.5 Security Awareness Training . 52
4.2 Cybersecurity Market Sectors Competitive Analysis . 52
4.2.1 Vendor Assessment Criteria . 52
Table 4.1: Cybersecurity Vendor Assessment Criteria . 53
4.2.2 Cloud Security Providers Leaderboard . 54
Figure 4.2: Juniper Research Leaderboard for Cloud Security Providers . 54
i. Established Leaders . 54
ii. Leading Challengers . 55
iii. Disruptors & Emulators . 56
4.2.3 Identity & Access Management Leaderboard . 56
Figure 4.3: Juniper Research Leaderboard for IAM Providers . 56
i. Established Leaders . 57
ii. Leading Challengers . 57
iii. Disrupters & Emulators . 58
4.2.4 Endpoint Security Leaderboard . 59
Figure 4.4: Juniper Leaderboard for Endpoint Security Providers . 59
i. Established Leaders . 59
ii. Leading Challengers . 60
iii. Disruptors & Emulators . 61
4.2.5 Security Awareness Training Vendors . 62
Figure 4.5: Juniper Leaderboard for Security Awareness Training Vendors . 62
i. Established Leaders . 62
ii. Leading Challengers . 63
iii. Disruptors & Emulators . 63
4.2.6 Limitations & Interpretation . 63

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る