Shopping Cart 0
Cart Subtotal
USD 0

Cybersecurity - Thematic Research

Restricted to one authorized user; Open on 1 PC/ mobile / Tablet only.
Print Option: Yes
Copy Option: No
Deliverable Format : PDF Via Email

Single User License
USD 1950

Restricted to one authorized user; Open on 1 PC/ mobile / Tablet only.
Print Option: Yes
Copy Option: No
Deliverable Format : PDF Via Email

Site License
USD 3900

Multiple Users within the Company/ Enterprise
Print Option: Yes
Copy Option: Yes
Deliverable Format : Excel, PDF Via Email

Corporate User License
USD 5850
  • Details
  • Table Of Content
  • Licence Rights
  • Section Purchase
  • Products and Companies

Details

Cybersecurity-Thematic Research

 

Summary

 

In today's digital economy, it is essential that companies of every stripe can collect, store and adequately protect customer data and proprietary secrets. Failure to do so will significantly damage a company's brand and reduce the quality of the product it produces, with concomitant impact on revenues and profitability.

 

Cybersecurity has therefore become a critical business function, yet it remains a non-core competence for a significant number of boards. Chief information security officers (CISOs) have become increasingly common in recent years (recent research suggests that nearly two-thirds of large US companies now have a CISO position), but the majority do not report directly to the CEO, reducing their effectiveness.

 

The frequency of cyberattacks is only likely to accelerate over the coming years, therefore it is vital that senior executives have a full understanding of the inherent risks and implications.

 

Scope

 

- This report focuses on cybersecurity technologies and recent advances in technology areas like machine learning that are enabling a move towards active detection of threats.

- It discusses that the rise in spending on cybersecurity tools over the coming years.

- It identifies the winners in the two high-growth security areas, artificial intelligence (AI) and unified threat management (UTM).

 

Reasons to buy

 

- The report focuses on the big players in the cybersecurity industry and where do they sit in the value chain.

- It identifies the main trends in the cybersecurity industry over the next 12 to 24 months.

- It gives an industry analysis, discussing the nature of the threats, the investment landscape, and today's cybersecurity paradigm.

- It discusses how cybersecurity fits into the big data value chain.

- The report uses a scorecard approach to identify leading companies in a sector.

- It provides a technology briefing about the cybersecurity framework, which consists of three main components-the core, implementation tiers, and profiles.

READ MORE

Table Of Content

Scope

Table of Contents

PLAYERS 4

TRENDS 5

Technology trends 5

Macroeconomic trends 6

Regulatory trends 7

INDUSTRY ANALYSIS 8

Market size and growth forecasts 10

Mergers and acquisitions 11

Timeline 13

VALUE CHAIN 14

Network security 15

Unified threat management 16

Artificial intelligence 16

Behavioral analytics 17

Security information and event management 17

Endpoint security 18

Mobile security 18

Identity management 18

Data security 19

Application security 19

Email security 20

Cloud security 20

Managed security services 21

Post-breach consultancy services 21

COMPANIES SECTION 22

Public Companies 22

Private companies 26

CYBERSECURITY SECTOR SCORECARD 28

Who's who in the cybersecurity sector 28

Thematic screen 29

Valuation screen 30

Risk screen 31

TECHNOLOGY BRIEFING 32

The NIST Cybersecurity Framework 32

GLOSSARY 33

APPENDIX: OUR THEMATIC RESEARCH METHODOLOGY 36

Licence Rights

Single User License:
Report can be used by individual purchaser only

Site License:
Report can be shared by unlimited users within one corporate location, e.g. a regional office

Corporate User License: 
Report can be shared globally by unlimited users within the purchasing corporation e.g. all employees of a single company

Section Purchase

To know more information on Purchase by Section, please send a mail to support@kenresearch.com

Products and Companies


Companies

Ahnlab

Airbus

Akamai

BAE Systems

Barracuda Networks

Check Point Software Technologies

Cisco Systems

CyberArk Software

F5 Networks

FireEye

Fortinet

F-Secure

Gemalto

IBM

Intel

Juniper Networks

Micro Focus

Microsoft

Palo Alto Networks

Proofpoint

Qualys

Rapid7

Raytheon

Secureworks

Sophos

Splunk

Symantec

Trend Micro

AlienVault

Avira

Bayshore Networks

Carbon Black

Cloudflare

Darktrace

Dell

HackerOne

Huawei Technologies

Illusive Networks

Kaspersky Lab

Palantir Technologies

Tanium

The Herjavec Group

WhiteHat Security

ZeroFOX