世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

サイバー犯罪とセキュリティの今後:脅威の分析、影響評価&主要ベンダ 2018-2023年

The Future of Cybercrime & Security

Threat Analytics, Impact Assessment & Leading Vendors 2018-2023

 

出版社 出版年月電子版価格 ページ数
Juniper Research
ジュニパーリサーチ社
2018年8月GBP2,990
企業ライセンス(PDF+Excel)
55

サマリー

このレポートは世界のサイバーセキュリティ市場を調査し、主要企業の戦略や市場動向を掲載しています。

主な掲載内容

脅威の背景:市場ごとの分析

  • バンキング&金融
  • 消費者デバイス
  • IoT

ベンダ分析:48のサイバーセキュリティ事業者の評価

  • エンドポイントセキュリティー
  • クラウドセキュリティ
  • 認証&アクセス管理


Overview

The Future of Cybercrime & Security provides a thorough examination of the current market environment and threat landscape for cybersecurity. The research presents need-to-know information on the state of cybersecurity legislation, key player strategies and overall trends affecting the market, focusing on the following areas:

  • Endpoint & Network Security
  • Cloud Security & Identity & Access Management
  • IoT & Device Security

Key Features

  • Threat Landscape: See what the main cyber threats are facing enterprises and consumers in 2018 and beyond, for the following key sectors:
    • Banking & Finance
    • Consumer Devices
    • IoT
  • Market Dynamics: Strategic assessment of the current market landscape, examining future developments across the cybersecurity market, including segment by segment analysis.
  • Regulatory Guide: Examination of the range of cybersecurity legislation in place across 13 territories, and an analysis of their implications and future development.
  • Juniper Leaderboards & Vendor Analysis: Key player capability and capacity assessment for 48 enterprise cybersecurity providers, split by:
    • Endpoint Security Leaderboard
    • Cloud Cybersecurity Leaderboard
    • Identity & Access Management Leaderboard
  • Market Sizing: 5-year forecasts for both the cost of cybersecurity data breaches and levels of enterprise cybersecurity spending.

Key Questions

  1. How are the key players in cybersecurity players reacting to the latest market developments?
  2. What are the main threats cybersecurity must address in future?
  3. How much and where will cybersecurity spending increase in the coming years?
  4. What are governments doing to support greater cybersecurity?
  5. What is the cost of criminal data breaches and how will this change in future?

Companies Referenced

Listed in Cybersecurity Providers Leaderboards: Alert Logic, AlienVault, Avast, Barkly, Carbon Black, Centrify, CipherCloud, CloudFlare, Cyberark, Cylance, DarkTrace, Duo, FireEye, Forcepoint, IBM, Illumio, Lookout, Minerva, Netskope, Okta, Oracle, Paladion, Palo Alto Networks, Ping Identity, Qualys, RSA, SailPoint, SecureWorks, SentinelOne, SentryBay, SonicWall, Sophos, Symantec, Tanium, Trend Micro, Twistlock, Webroot, Zscaler.
 
Mentioned: AT&T, Brazilian Internet Committee, Cisco, Google, IEC, INAI (National Institute for Transparency, Access to Information and Personal Data Protection), ISO, Kaspersky, LightCyber, National Data Protection Authority, Netscout, NetWatcher, NexusGuard, NIST (National Institute of Standards and Technology), OECD, Office of the Privacy Commissioner of Canada, PPC (Personal Information Protection Commission), Sift Security, Verizon, WTO (World Trade Organisation).

Data & Interactive Forecast

Juniper’s The Future of Cybercrime & Security forecast suite includes:

  • Cybersecurity spend forecast splits for 8 key regions and 9 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Data breach volume and value forecast splits for 8 key regions and 9 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Interactive Scenario tool allowing user the ability to manipulate Juniper’s data for 10 different metrics.
  • Access to the full set of forecast data of 28 tables and over 3,700 datapoints.

Juniper Research’s highly granular interactive Excels enable clients to manipulate Juniper’s forecast data and charts to test their own assumptions using the Interactive Scenario Tool, and compare select markets side by side in customised charts and tables. IFxls greatly increase clients’ ability to both understand a particular market and to integrate their own views into the model.



目次

Table of Contents

1. Cybercrime & Cybersecurity: Key Takeaways

1.1 Cybercrime Key Takeaways. 5
Figure 1.1: Kaspersky Mobile Malware Prevalence Map . 6
1.2 Cybersecurity Key Takeaways . 6

2. Cybercrime Trends & Outlook

2.1 Introduction . 9
2.2 Definitions & Typology . 9
2.2.1 Incident Types . 9
2.2.2 Attack Types. 9
i. DoS & DDoS . 9
ii. Phishing . 9
iii. Trojans . 10
iv. Keylogging . 10
v. MITM Attacks . 10
vi. Scrapers & Skimmers . 10
vii. Ransomware . 10
viii. Botnets . 10
ix. Cryptojacking . 10
2.2.3 Motivations . 11
2.3 Cybercrime Trends . 11
2.3.1 Peak Ransomware . 11
i. DDoS Ransoms . 11
Figure 2.1: DDoS Attack Frequency & Average Size . 12
2.3.2 Cryptojacking Emerges, Cryptocurrencies Change . 12
Case Study: Rakhni Ransom/Miner Variant . 13
Figure 2.2: Rakhni Variant Miner/Crypter Observed Attack Geography . 13
2.3.3 DDoS Switches it Up & Downsizes . 13
Figure 2.3: Top 10 Multi-Vector DDoS Attack Combinations . 14
2.3.4 Fileless & Userless Malware Comes of Age . 14
2.3.5 Social Media Platforms are a Malicious Actor Toolbox . 14
i. The AI Element . 15
2.3.6 Malvertising . 15
2.3.7 AI Attacks Anticipated . 15
2.4 Juniper Cybercrime Threat Assessments . 15
2.4.1 Financial Threat Assessments . 15
i. Banking . 16
Figure 2.4: Juniper Research 2018 Banking Cybercrime Threat Landscape Assessment . 16
Figure 2.5: Juniper Research Banking Cybercrime Future Threat Landscape . 17
ii. Payments & Money Transfer . 17
Figure 2.6: Juniper Research 2018 Payments & Money Transfer Cybercrime
Threat Landscape Assessment . 18
Figure 2.7: Juniper Research Payments Cybercrime Future Threat Landscape . 19
iii. Mobile Wallets . 19
Figure 2.8: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape Assessment . 19
Figure 2.9: Juniper Research Mobile Wallets Cybercrime Future Threat Landscape . 20
2.4.2 Device Threat Assessment . 20
i. Smartphones . 20
Figure 2.10: Juniper Research 2018 Smartphone Cybercrime Threat Landscape Assessment . 21
Figure 2.11: Juniper Research Smartphone Cybercrime Future Threat Landscape . 21
ii. IoT Devices . 21
Figure 2.12: Juniper Research 2018 IoT Cybercrime Threat Landscape Assessment . 22
Figure 2.13: Forecast - Juniper Research IoT Cybercrime Threat Landscape . 22
2.5 Cybercime Breach Forecast . 24
2.5.1 Methodology. 24
Figure 2.14: Criminal Data Breach Forecast Methodology . 24
i. Forecast Assumptions & Limitations of Analysis . 25
2.6 Cybercrime Breaches Forecasts . 26
2.6.1 Breaches Volume . 26
Figure & Table 2.15: Total Number of Criminal Data Breaches per annum, Split by
8 Key Regions 2018-2023 . 26
2.6.2 Breaches Value . 27
Figure & Table 2.16: Cost of Criminal Data Breaches per annum ($m), Split by 8
Key Regions 2018-2023 . 27

3. Cybersecurity Trends

3.1 Introduction . 29
3.1.1 Definitions . 29
3.2 Cybersecurity Trends . 29
3.2.1 Patchwork Approach Still a Problem . 29
Figure 3.1: Cybersecurity Alerts Investigation Actions (%) . 30
3.2.2 Deception Technologies on the Increase . 30
i. Cybersecurity Vaccines . 30
3.2.3 Mandated Cybersecurity & Regulation . 31
i. From Fines to a Liability Shift? . 31
3.2.4 Automation Enables Threat Hunting . 31
3.3 Cybersecurity Market Forecasts . 32
3.3.1 Cybersecurity Spend Forecast Methodology . 32
Figure 3.2: Cybersecurity Spend Forecast Methodology . 32
i. Forecast Assumptions & Limitations of Analysis . 33
3.3.2 Cybersecurity Market Spend Forecast . 34
Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key
Regions 2018-2023 . 34
3.4 Regulatory Environment . 35
3.4.1 North America . 35
i. US . 35
ii. Canada . 36
3.4.2 Latin America . 36
i. Argentina . 36
ii. Brazil . 36
iii. Mexico . 37
3.4.3 Europe . 37
i. EU . 37
ii. Germany . 38
iii. Russia . 38
iv. Turkey . 39
v. UK . 39



 

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る