Global Information Security Products and Services Industry

  • July 2014
  • -
  • Global Industry Analysts
  • -
  • 644 pages

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware, and Information Security Services. The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software. The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances. The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management Services, Education & Training, and Response Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2013 through 2020. A seven-year historic analysis is also provided for these markets. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based on public domain information including company URLs. The report profiles 313 companies including many key and niche players such as -

ActivID® IT Security Solutions
Blue Coat Systems Inc.
CA Technologies Inc.
Cisco Systems, Inc.
EMC Corporation

Table Of Contents




I. INTRODUCTION, METHODOLOGY and PRODUCT DEFINITIONS
Study Reliability and Reporting Limitations I-1
Disclaimers I-2
Data Interpretation and Reporting Level I-2
Quantitative Techniques and Analytics I-2
Product Definitions and Scope of Study I-3
Information Security Software I-4
Identity and Access Management (IandAM) I-5
Public Key Infrastructure (PKI) I-5
Web Single Sign-On I-5
Host Single Sign-On I-5
User Provisioning I-5
Directory Services I-5
Legacy Authorization I-5
Advanced Authentication I-6
Secure Content Management (SCM) I-6
Antivirus Software I-6
Web/Content Filtering I-6
Messaging Security (E-mail Scanning) I-6
Intrusion Detection/Prevention (IDP) I-6
Security and Vulnerability Management I-6
Firewall/VPN Software I-7
Other Security Software I-7
Information Security Hardware I-7
Hardware Authentication Products I-7
Tokens I-7
Smart Cards I-7
Biometrics I-8
Threat Management Security Appliances I-8
Firewall/VPN Appliances I-8
SCM Appliances I-8
Intrusion Detection/Prevention Appliances I-8
Unified Threat Management (UTM) Appliances I-8
Information Security Services I-8
Consulting Services I-9
Education and Training Services I-9
Implementation Services I-9
Management Services I-9
Response Services I-9


II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW II-1
Corporate Information Assets - Vulnerable as Ever II-1
Growing Instances of IT Security Breaches - A Serious Cause
for Concern II-2
A Look at Common Security Threats for Enterprise Information
Assets II-2
Damages Caused by Security Breaches II-3
Proprietary Information Destruction II-3
Disruption in Systems Performance II-4
Data/Application Damage or Corruption II-4
Types of Internal IT Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-4
Types of External Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-4
Top IT Security Breaches Between 2013 and Early 2014 II-5
Information Security - High on Priority List for Enterprises II-5
Factors Affecting Implementation of Information Security
Solutions by Enterprises Worldwide - Ranked in Order of
Influence II-7
Increased Use of Internet Drives Focus on Cyber Security II-7
Key Statistical Findings II-9
Table 1: Number of Internet Users (in Million) and
Penetration Percentage for Years 2001, 2011 and 2013 (includes
corresponding Graph/Chart) II-9

Table 2: Global Internet Market (2013): Percentage Share
Breakdown of Number of Internet Users by Country (includes
corresponding Graph/Chart) II-10
Top Priority Malicious Elements Threatening Cyber Security in
Enterprises: On a Scale 1 - 10 (10 - High Priority; 1 - Low
Priority) II-10
Key Focus Areas for Enterprises in Implementation of Cyber
Security in their Premises: Ranked in Order of Relative
Importance II-10
Key Focus Areas for Information Security in Enterprises II-11
Network Security - Keeping Security Threats at Bay II-11
Security of Internal Network Infrastructure - A Key
Necessity for Any Business II-11
Enterprise Endpoint Security Gains Prominence II-12
General Trends Underpinning Need for Endpoint Security
Solutions in Organizations II-13
Growth in Adoption of Mobile End-Points in Enterprises Make
Enterprise Endpoint Security a Major Necessity II-13
Content Security - Fast Gaining Prominence II-13
Application Security too Finds Traction II-14
Server Security Concerns Brings Focus on Server Security
Solutions II-14
Periods of Economic Slowdown Increases Information Security
Risks - Magnifies the Business Case for Efficient Security
Solutions II-15
Impact of Economic Recession on Global Enterprises II-16
Market Outlook II-17
Developing Regions to Lend Traction to Information Security
Market II-17

2. NOTEWORTHY TRENDS, GROWTH DRIVERS and ISSUES II-18
Rise in Magnitude of Cyber Crime to Drive Adoption of
Information Security Products and Services II-18
Table 3: Breakdown of Number of Cyber Attacks Reported in
October 2013 by Source Nation (includes corresponding
Graph/Chart) II-20

Table 4: Percentage Share Breakdown of Number of Cyber
Attacks by Nature of Attack as of 2013 (includes
corresponding Graph/Chart) II-20
Types of External IT Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-20
Types of Internal IT Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-21
Increasing Prevalence of Malware to Drive Demand for
Information Security Products and Services II-21
Table 5: World Anti-Malware Market (2014): Percentage Share
Breakdown of Revenues by Type - Corporate Endpoint Security,
IDS and IPS, Messaging Security, and Web Security (includes
corresponding Graph/Chart) II-22
APTs Emerge as a New Sophisticated Threat - Create Business
Case for Information Security Solutions II-22
Emergence of Fake QR Codes and TecTiles Drive Demand for
Security Solutions II-22
Growing Use of Advanced Digital Platforms Make Enterprises
Highly Vulnerable to Security Threats II-23
Security Threats from Virtualization and Cloud Infrastructure
Deployments to Drive Demand for Information Security
Solutions II-23
Table 6: Global IT Market (2013): Percentage Share Breakdown
of Spending by Segment (includes corresponding Graph/Chart) II-25

Table 7: Global Cloud Computing Services Market (2013 and
2015P): Breakdown of Annual Revenue Figures in US$ Million
by Region (includes corresponding Graph/Chart) II-25

Table 8: Global Virtualization Software Market (2013):
Percentage Share Breakdown of Revenue by Geographic Region
(includes corresponding Graph/Chart) II-25
Growing Use of Internet Enabled Mobile Handsets Lends
Traction to Information Security Market II-26
Enterprise Mobility Makes Enterprise Information Assets
Highly Vulnerable to Cyber Attacks II-26
Table 9: Global Smartphones market: Annual Sales Figures
(in Million Units) for Years 2013, 2016 and 2018 (includes
corresponding Graph/Chart) II-28

Table 10: Global Smartphones Market (2013): Penetration for
Select Countries (as a Percentage of Mobile Phone Users)
(includes corresponding Graph/Chart) II-28

Table 11: Global Worker Population (2013 and 2017):
Percentage Share Breakdown of Number of Workers by Nature
of Work (includes corresponding Graph/Chart) II-29

Table 12: Global Mobile Worker Population (2013 and 2017):
Percentage Share Breakdown of Number of Mobile Workers by
Nature of Work (includes corresponding Graph/Chart) II-29

Table 13: Global Mobile Workforce (2013): Percentage Share
Breakdown of Number of Mobile Workers by Region (includes
corresponding Graph/Chart) II-30
Growing BYOD Phenomenon Drives Adoption of Information
Security Solutions II-30
Industry Still Underprepared to Tackle Mobile Security Concerns II-31
Information Security Solutions Focusing on Smartphone
Security Gains Rapid Adoption II-31
Security for Converged Data and Voice Environments II-31
VoIP Security for Expanding VoIP II-31
Threat from Social Networking Sites Drives Demand for
Information Security Solutions II-32
IP4 to IPv6 Transition to Boost Adoption of Information
Security Solutions and Services II-33
Regulatory Compliance Requirements Continue to Drive Demand
for Information Security Solutions II-34
Governments and Regulatory Authorities Continue to Implement
Strict Privacy Regulations II-34
Avoiding Unnecessary Costs - Key Rationale for Adoption of IT
Security Solutions II-35
Growing Commoditization of Security Products Brings Down
Prices - Boosts Order Influx Rates II-35
Small and Mid-Sized Businesses - A Lucrative Market Segment II-35

3. FOCUS ON SELECT PRODUCT MARKETS II-36
Information Security Software Market II-36
Secure Content Management Solutions Anchors Information
Security Software Market II-36
Antivirus Accounts for Lion’s Share in SCM Market II-36
Low Footprint Anti-Virus Grow in Prominence among SMBs II-37
Top 10 Anti Virus Software Solutions for 2011 II-37
Web Filtering Software Finds Steady Growth Prospects II-37
Increasing Web 2.0 and E-Mail Threats Boost Demand for
Content Filtering Products II-38
Messaging Security - The Fastest Growing Secure Content
Management Solution II-39
E-mail Encryption Gathers Steam II-39
Table 14: Principal Factors Influencing Installation of
Web/E-mail Monitoring in Organizations (includes
corresponding Graph/Chart) II-40
Identity and Access Management Software Solutions II-40
Table 15: Global Identity and Access Management Market
(2013): Percentage Share Breakdown of Revenues by Operating
Environment (includes corresponding Graph/Chart) II-41
IAM: A Key Security Initiative for Enterprises II-42
An Integral Part of Corporate Strategy II-42
Legacy Authorization - A Declining Market II-43
Compliance Requirements Boost Security and Vulnerability
Management Market II-43
Table 16: Global Vulnerability Assessment Market (2013):
Percentage Share Breakdown of Revenues for Device
Vulnerability Assessment and Application Scanners (includes
corresponding Graph/Chart) II-44
Small and Mid-Sized Businesses - An Under- Penetrated
Segment for SVM II-44
Diverse Delivery Systems for SVM Products II-44
Firewall/VPN Software - The Traditional But Mature Market
Segment II-44
Next Generation Firewall (NGFW) - An Emerging Technology II-45
SSL VPN - A Nascent Market II-45
Encryption for Data Protection II-46
Growing Significance of Data Loss Protection II-46
Key Trends in Information Security Software Market II-46
Growing Adoption of SaaS Business Model Drives Strong Growth
Prospects for Software Vendors II-46
Growing Prominence of Identity-as-a-Service (IaaS) - A Case
in Point II-47
Increased Use of Open Source Tools - A Key Trend in
Information Security Software Market II-48
Information Security Hardware II-48
Threat Management Security Appliances - The Predominant
Information Security Hardware Category II-49
Unified Threat Management (UTM) Appliances - A Whip on
Blended Security Threats II-49
XTMs Emerge as More Potential Tool II-50
Steady Growth in Secure Content Management Appliances Market II-50
Intrusion Detection and Prevention Systems - A Review of
Opportunities II-50
Hardware Authentication - A Trivial but Key Revenue
Contributor for Information Security Hardware Market II-51
Market Overview of Authentication Tokens II-51
Trends in Authentication Tokens Market II-52
Smart Cards Market - A Review II-53
Telecom Sector to Remain Major Driver of Smart Card Demand II-53
Need for Tamper-Free System Drives Adoption of Smart Cards
in the Transportation Sector II-53
Demand for Banking and Payment Smart Cards Continue to Grow II-53
Biometrics - An Emerging Authentication Module II-54
Table 17: World Biometrics Market (2012): Percentage Share
Breakdown of Revenues by Technology (includes corresponding
Graph/Chart) II-55

Table 18: World Biometrics Market (2012): Percentage Share
Breakdown of Revenue by End-Use Sector (includes
corresponding Graph/Chart) II-55
Rapid Growth of Biometric Surveillance II-55
World Biometrics Market (2011-2015): Analysis of Demand in
Commercial Sector by Application Areas - Enterprise
Security, Information Transactions and Financial
Transactions II-56
Information Security Services - Primary Revenue Contributor II-56
Dearth of Trained Staff and In-House Infrastructure to Boost
Market Prospects for Information Security Services II-56
Managed Security Services Continue to Gain Acceptance II-57
Hosted Security Services: Growing in Demand II-58

4. REVIEW OF SELECT END-USE MARKETS II-59
Financial Services - A Key End Use Market for Information
Security Solutions II-59
Major External and Internal Breaches in Financial Services Sector II-59
Table 19: Leading Targets of Fraud (2013): Percentage
Breakdown of Number of Breaches by Type of Asset (includes
corresponding Graph/Chart) II-59
Implementation of Information Security Policy - Industries
Ranked by Level of Implementation II-60
Top Security Initiatives by Sector II-60
Advanced IT Security Solutions Gain Traction in Financial Sector II-60
Regulatory Compliance: A High Priority for Financial
Institutions II-61
Need to Sustain Customer Trust - A Business Case for
Informaiton Security Solutions in the Financial Sector II-61
Key Barriers in Information Security for Financial Services
Sector II-61
Telecommunication and IT II-62
DOS Attacks Threaten Mobile Network Security - Drive Demand
for Cyber Security Solutions in Telecom Industry II-62
Overbilling Attack: A Business Case for Cyber Security
Solutions in Telecom Industry II-62
VPN to Make Telecommunication Networks More Safer II-62
Opportunities for Wireless Network Security in Telecom Industry II-63
Table 20: Worldwide Mobile Data Traffic by Device Type
(2013, 2015 and 2018) - Percentage Share Breakdown of Monthly
Data Traffic Volume for Laptops, Non-Smartphones,
Smartphones, Tablets, and Others (includes corresponding
Graph/Chart) II-63

Table 21: Worldwide Mobile Data Traffic by Application
(2013, 2015 and 2018) - Percentage Share Breakdown of Monthly
Data Traffic Volume for Data, File Sharing, M2M, and Video
(includes corresponding Graph/Chart) II-64

Table 22: Worldwide Mobile Networks (2013 and 2018):
Percentage Share Breakdown of Number of Connections by Type
of Network Technology (includes corresponding Graph/Chart) II-64
Production Systems Also Adopt Information Security Solutions II-65
IT Security Solutions Find Increased Demand in Healthcare Sector II-65

5. KEY ISSUES/CHALLENGES and THE WAY FORWARD II-66
Major Restraints to Efficient Information Security in
Enterprises Worldwide II-66
Inadequate Budget - the Key Constraint II-66
High Cost of Ownership - A Major Drawback for Biometric
Solutions II-67
Lack of Alignment between Business Objectives and Security II-67
External Threats More Recognized than Internal Threats II-67
Most Organizations Continue to Remain Reactive Rather than
Proactive II-67
Growing Sophistication and Complexity of Security Threats - A
Challenge to Reckon With for Information Security Solution
Providers II-67
Stealthier Infiltration Methods Pose Challenges for
Information Security II-68
Advanced Security Solutions - The Need of the Hour II-69
Security Analytics to See Light in the Enterprise Security Sector II-69
Big Data Analytics Set to Storm the Information Security Market II-70
Artificial intelligence Gains Widespread Acceptance II-70
Convergence Gains Strength II-70
Vendors Come Up with Integrated Solutions to Stay Ahead II-71

6. COMPETITIVE LANDSCAPE II-72
Information Security Market - Highly Competitive II-72
Security Software Market Witnesses Consolidation Trend II-72
Convergence of Product Portfolio - A Key Competitive Ploy II-72
What Does it Take to Survive in the Marketplace? II-73
Key Market Share Findings: II-73
Table 23: Leading Vendors in the Global Security Software
Market (2012): Percentage Share Breakdown of Revenues for
CA, IBM, McAfee, Symantec, Trend Micro, and Others (includes
corresponding Graph/Chart) II-73

Table 24: Leading Players in Global Identity and Access
Management Market (2013): Percentage Share Breakdown of
Revenues for CA, EMC, IBM, Oracle, SafeNet, Symantec, and
Others (includes corresponding Graph/Chart) II-74

Table 25: Leading Players in Global Messaging Security
Market (2013): Percentage Share Breakdown of Revenues for
Cisco, Google, McAfee, Microsoft, Symantec, TrendMicro, and
Others (includes corresponding Graph/Chart) II-74

Table 26: Leading Players in Global Security and
Vulnerability Management Market (2012): Percentage Share
Breakdown of Revenues for EMC, HP, IBM, McAfee, Rapid and
Others (includes corresponding Graph/Chart) II-74

Table 27: Leading Players in Global Vulnerability Management
Market (2012): Percentage Share Breakdown of Revenues for
HP, IBM, McAfee, Qualys, Rapid and Others (includes
corresponding Graph/Chart) II-75

Table 28: Leading Players in Global Content Security Gateway
Market (2013): Percentage Share Breakdown of Revenues for
Blue Coat, Cisco, McAfee, Symantec, Trend Micro, Websense,
and Others (includes corresponding Graph/Chart) II-75

Table 29: Leading Players in Global Web Security Market
(2013): Percentage Share Breakdown of Revenues for
Barracuda, Blue Coat, Cisco, Trend Micro, Websense, and
Others (includes corresponding Graph/Chart) II-75

Table 30: Leading Players in Global Firewall Market (2013):
Percentage Share Breakdown of Revenues for Checkpoint,
Cisco, Juniper Networks, Microsoft, and Others (includes
corresponding Graph/Chart) II-76

Table 31: Leading Players in Global VPN Market (2013) -
Percentage Share Breakdown of Revenues for Checkpoint,
Cisco, Citrix, F5 Networks, Juniper Networks, Microsoft,
SafeNet, and Others (includes corresponding Graph/Chart) II-76

Table 32: Leading Players in Global Intrusion
Detection/Prevention Market (2013) - Percentage Share
Breakdown of Revenues for Arbor Networks, Checkpoint, Cisco,
HP, IBM, McAfee, Sourcefire, and Others (includes
corresponding Graph/Chart) II-76

Table 33: Leading Players in Global Unified Threat
Management Market (2013): Percentage Share Breakdown of
Revenues for Checkpoint, Cisco, Dell, Fortinet, Juniper
Networks, Palo Alto Networks, WatchGuard, and Others
(includes corresponding Graph/Chart) II-77

Table 34: Leading Vendors in Global Antivirus Market (Jan
2014): Percentage Share Breakdown of Revenues for Avast,
AVG, Avira, ESET, Kaspersky, Microsoft, Symantec, and Others
(includes corresponding Graph/Chart) II-77

7. PRODUCT/SERVICE OVERVIEW II-78
Information Security - An Introduction II-78
Organizational Security Strata II-78
Managing Information Security II-78
Measures to Ensure Information Security: II-79
Information Security Projects in Organizations - Ranked in
the Order of Relative Importance II-79
Key Product Segments II-79
Information Security Software II-81
Identity and Access Management (IandAM) II-81
Key Functionalities of Identity and Access Management Solutions II-81
Authentication II-81
Authorization II-82
Administration II-82
PKI (Public Key Infrastructure) II-82
Benefits of PKI II-83
Glitches with PKI II-83
Single Sign-On (SSO) II-83
Web Single Sign-On II-83
Host Single Sign-On II-83
User Provisioning II-84
Directory Services II-84
Legacy Authorization II-84
Advanced Authentication II-84
Secure Content Management (SCM) II-84
Antivirus Software II-84
Web/Content Filtering II-85
Messaging Security (E-mail Scanning) II-85
Intrusion Detection/Prevention (IDP) II-86
Security and Vulnerability Management II-86
Firewall/VPN II-87
Firewalls II-87
Major Firewall Types II-87
Packet Filter Firewall II-87
Stateful Packet Inspection Firewall II-88
Application Layer Gateways or Proxies II-88
Available Forms of Firewalls II-88
Software Firewalls II-88
Hardware Firewalls II-88
Virtual Private Networks (VPNs) II-88
Key Components of a VPN II-89
VPN Gateways II-89
Security Servers II-89
Keys II-89
Network II-89
Available Forms of VPN II-89
VPN Software II-89
VPN Hardware II-89
Types of VPN II-89
Remote-access VPN II-89
Site-to-Site VPN II-89
Technologies Supporting Delivery of VPN Services II-90
Internet Protocol Security (IPSec) II-90
Point-to-Point Tunneling Protocol (PPTP) II-90
Layer 2 Tunneling Protocol (L2TP) II-90
Secure Socket Layer (SSL) II-90
Multi Protocol Label Switching (MPLS) II-90
Firewall/VPN - The Need for Integration II-91
Encryption II-91
Other Security Software II-91
Information Security Hardware II-91
Hardware Authentication Products II-91
Tokens II-92
Smart Cards II-92
Biometrics II-92
Threat Management Security Appliances II-92
Firewall/VPN Appliances II-93
SCM Appliances II-93
Intrusion Detection/Prevention Appliances II-93
Intrusion Detection System (IDS) II-93
Types of IDS II-93
Network based and Host based IDS II-93
Misuse Detection and Anomaly Detection II-94
Passive System and Reactive System II-94
Intrusion Prevention System (IPS) II-94
Unified Threat Management (UTM) Appliances - The Viable
Solution II-94
Benefits of UTM Appliances II-94
Information Security Services II-95
Information Security Services Life Cycle II-95
Stages of Information Security Life Cycle II-95
Initiation II-95
Assessment II-95
Solution II-95
Implementation II-96
Operations II-96
Closeout II-96
Security Policy II-96
Program Policies II-96
Issue-Specific Policies II-96
System-Specific Policies II-96
Security Services Management Tools II-96
Metrics II-97
Service Agreements II-97
Types of Information Security Services II-97
Consulting Services II-97
Education and Training Services II-97
Implementation Services II-97
Management Services II-98
Response Services II-98
Types of Delivery Models II-98
Software Licenses II-98
Appliance Based Devices II-98
Hosted Services (Security- as- a-Service Solutions) II-99
Complete Outsourcing Models II-99
Hybrid Model II-99

8. PRODUCT/SERVICE INNOVATIONS/ INTRODUCTIONS II-100
HP Releases New Security Metrics Services II-100
CA Technologies Launches New Mobility and API Solutions II-100
Parsons Launches Enhanced Cybersecurity Product II-100
Watchful Software Introduces New Version of RightsWATCH
information protection solution II-100
Brekeke Software Launches New Version of PBX and SIP Server II-100
Dell Releases Server Protection Services II-100
Nowell Introduces Advanced Security and Risk Analytics
Software Platform II-100
Ping Identity Releases New Generation Identity Gateway II-100
CSC Launches New ATD Solution II-101
Toshiba's Digital Products Division Introduces Smart Client
Manager 2.0 II-101
docTrackr Releases New Solution for Gmail II-101
LockPath Introduces New SIEM Solution II-101
SecureAuth Releases New Cloud-Hosted Authentication Solution II-101
McAfee Launches New Access and Identity Management Solutions II-101
Intego Launches New Range of Mac Security and Antivirus Products II-101
BitSight Technologies Releases New Range of Cybersecurity
Solutions II-101
Bkav Launches New Internet Security Products II-102
VanDyke Software Introduces New SecureCRT 7.2 and SecureFX 7.2
Platforms II-102
AVG Releases new AVG AntiVirus for Mac II-102
Kaspersky Introduces New Virtual Networking and Security Solution II-102
GWAVA Releases New GWAVA messaging security version II-102
TeleMate.Net Introduces New Improved NetSpective Web Filter
Version II-102
EdgeWave Releases Advanced Secure Web Gateway II-102
ZyXEL Introduces New new ZyWALL series of ultra-fast gigabit
firewall / VPN devices II-102
Tripwire Launches Enhanced Tripwire IP360 II-102
Fortinet Launches New Operating System II-103
HP Introduces New Big Data Tools II-103
Cyberoam Releases Advanced Firewall Appliances II-103
Prolifics Launches New Identity Intelligence-branded solution II-103
RSA Launches New VRM Software Solution II-103
AFORE Releases Enhanced Data Encryption Solutions II-103
ForgeRock Launches New IRM Platform II-103
Cisco Releases New Range of IT Security Products II-103

9. RECENT INDUSTRY ACTIVITY II-104
Sophos Takes Over Cyberoam Technologies II-104
Agio Acquires Secure Enterprise Computing II-104
EMC Takes Over Aveska II-104
Click Security Acquires VisibleRisk II-104
MDT Takes Over CUsource II-104
Trustwave Takes Over Application Security II-104
HyTrust Takes Over HighCloud Security II-105
Akamai Technologies to Acquire Prolexic II-105
Openwave Messaging Takes Over Critical Path II-105
Datacard Group to Acquire Entrust II-105
Vision Computer Solutions Enters into an Agreement with
Awareness Technologies II-105
Global Payout and ImageWare Systems Ink a Pact II-105

10. FOCUS ON SELECT PLAYERS II-106
ActivID® IT Security Solutions (US) II-106
Blue Coat Systems Inc. (US) II-106
CA Technologies Inc. (USA) II-106
Check Point Software Technologies Ltd. (Israel) II-107
Cisco Systems, Inc. (USA) II-107
Clearswift Ltd. (UK) II-108
EMC Corporation (US) II-108
Entrust (US) II-109
F-Secure Corporation (Finland) II-109
Fortinet, Inc. (US) II-110
Fujitsu Ltd. (Japan) II-110
Hewlett-Packard Development Company, L.P. (US) II-111
IBM Corporation (US) II-111
Juniper Networks, Inc. (US) II-112
Lumension Security, Inc. (US) II-112
McAfee, Inc. (US) II-112
Stonesoft Corporation (Finland) II-113
Nexus (Sweden) II-113
Norman ASA (Norway) II-113
Novell, Inc. (US) II-114
Ping Identity Corp. (US) II-114
Proofpoint, Inc. (US) II-114
SafeNet, Inc. (US) II-115
SonicWALL, Inc. (US) II-115
Sophos Plc (UK) II-116
Symantec Corporation (US) II-116
Thales Group (France) II-117
Trend Micro Incorporated (Japan) II-117
Trustwave (US) II-118
Verizon Business (US) II-118
WatchGuard Technologies, Inc. (US) II-119
WebSense, Inc. (US) II-119
Leading Global Information Security Research Institutes II-120
Center for Education and Research in Information Assurance
and Security (CERIAS) (USA) II-120
Information Security Group (UK) II-120

11. GLOBAL MARKET PERSPECTIVE II-121
Table 35: World Recent Past, Current and Future Analysis for
Information Security Products and Services by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2013
through 2020 (includes corresponding Graph/Chart) II-121

Table 36: World Historic Review for Information Security
Products and Services by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-122

Table 37: World 15-Year Perspective for Information Security
Products and Services by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-123
Information Security Software Market by Product Group/Segment II-124
Information Security Software II-124
Table 38: World Recent Past, Current and Future Analysis for
Information Security Software by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2013 through
2020 (includes corresponding Graph/Chart) II-124

Table 39: World Historic Review for Information Security
Software by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-125

Table 40: World Recent Past, Current and Future Analysis for
Information Security Software by Product Group/Segment -
Identity and Access Management, Secure Content Management,
Intrusion Detection/ Prevention, Security and Vulnerability
Management, Firewall/VPN and Other Security Software Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2013 through 2020 (includes corresponding
Graph/Chart) II-126

Table 41: World Historic Review for Information Security
Software by Product Group/Segment - Identity and Access
Management, Secure Content Management, Intrusion
Detection/Prevention, Security and Vulnerability Management,
Firewall/VPN and Other Security Software Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2006 through 2012 (includes corresponding
Graph/Chart) II-127

Table 42: World 15-Year Perspective for Information Security
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
for Years 2006, 2014 and 2020 (includes corresponding
Graph/Chart) II-128

Table 43: World 15-Year Perspective for Information Security
Software by Product Group/Segment - Percentage Breakdown of
Revenues for Identity and Access Management, Secure Content
Management, Intrusion Detection/Prevention, Security and
Vulnerability Management, Firewall/VPN and Other Security
Software Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-129

Table 44: World Recent Past, Current and Future Analysis for
Identity and Access Management Software by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2013
through 2020 (includes corresponding Graph/Chart) II-130

Table 45: World Historic Review for Identity and Access
Management Software by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-131

Table 46: World Recent Past, Current and Future Analysis for
Identity and Access Management Software by Product Segment -
PKI, Web Single Sign-On, Host Single Sign-On, User
Provisioning, Directory Services, Legacy Authorization, and
Advanced Authentication Software Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2013
through 2020 (includes corresponding Graph/Chart) II-132

Table 47: World Historic Review for Identity and Access
Management Software by Product Segment - PKI, Web Single
Sign-On, Host Single Sign-On, User Provisioning, Directory
Services, Legacy Authorization, and Advanced Authentication
Software Markets Independently Analyzed with Annual Revenues
in US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-133

Table 48: World 15-Year Perspective for Identity and Access
Management Software by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-134

Table 49: World 15-Year Perspective for Identity and Access
Management Software by Product Segment - Percentage Breakdown
of Revenues for PKI, Web Single Sign-On, Host Single Sign-On,
User Provisioning, Directory Services, Legacy Authorization,
and Advanced Authentication Software Markets for Years 2006,
2014 and 2020 (includes corresponding Graph/Chart) II-135

Table 50: World Recent Past, Current and Future Analysis for
Secure Content Management Software by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2013 through
2020 (includes corresponding Graph/Chart) II-136

Table 51: World Historic Review for Secure Content Management
Software by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-137

Table 52: World Recent Past, Current and Future Analysis for
Secure Content Management Software by Product Segment -
Antivirus, Web Filtering and Messaging Security Software
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2013 through 2020 (includes corresponding
Graph/Chart) II-138

Table 53: World Historic Review for Secure Content Management
Software by Product Segment - Antivirus, Web Filtering and
Messaging Security Software Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2006 through
2012 (includes corresponding Graph/Chart) II-139

Table 54: World 15-Year Perspective for Secure Content
Management Software by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-140

Table 55: World 15-Year Perspective for Secure Content
Management Software by Product Group/Segment - Percentage
Breakdown of Revenues for Antivirus, Web Filtering and
Messaging Security Software Markets for Years 2006, 2014 and
2020 (includes corresponding Graph/Chart) II-141

Table 56: World Recent Past, Current and Future Analysis for
Intrusion Detection/ Prevention Software by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2013
through 2020 (includes corresponding Graph/Chart) II-142

Table 57: World Historic Review for Intrusion Detection/
Prevention Software by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-143

Table 58: World 15-Year Perspective for Intrusion
Detection/Prevention Software by Geographic Region -
Percentage Breakdown of Revenues for US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-144

Table 59: World Recent Past, Current and Future Analysis for
Security and Vulnerability Management Software by Geographic
Region - US, Canada, Japan, Europe, Asia-Pacific (excluding
Japan), Latin America, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2013 through 2020 (includes corresponding
Graph/Chart) II-145

Table 60: World Historic Review for Security and Vulnerability
Management Software by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-146

Table 61: World 15-Year Perspective for Security and
Vulnerability Management Software by Geographic Region -
Percentage Breakdown of Revenues for US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-147

Table 62: World Recent Past, Current and Future Analysis for
Firewall/VPN Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin America,
and Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2013 through 2020 (includes
corresponding Graph/Chart) II-148

Table 63: World Historic Review for Firewall/VPN Software by
Geographic Region - US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2006 through 2012 (includes corresponding
Graph/Chart) II-149

Table 64: World 15-Year Perspective for Firewall/ VPN
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
for Years 2006, 2014 and 2020 (includes corresponding
Graph/Chart) II-150

Table 65: World Recent Past, Current and Future Analysis for
Other Security Software by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin America,
and Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2013 through 2020 (includes
corresponding Graph/Chart) II-151

Table 66: World Historic Review for Other Security Software
by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-152

Table 67: World 15-Year Perspective for Other Security
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
for Years 2006, 2014 and 2020 (includes corresponding
Graph/Chart) II-153
Information Security Hardware II-154
Table 68: World Recent Past, Current and Future Analysis for
Information Security Hardware by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2013 through
2020 (includes corresponding Graph/Chart) II-154

Table 69: World Historic Review for Information Security
Hardware by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-155

Table 70: World Recent Past, Current and Future Analysis for
Information Security Hardware by Product Segment - Hardware
Authentication and Threat Management Security Appliance
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2013 through 2020 (includes corresponding
Graph/Chart) II-156

Table 71: World Historic Review for Information Security
Hardware by Product Segment - Hardware Authentication and
Threat Management Security Appliance Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2006
through 2012 (includes corresponding Graph/Chart) II-157

Table 72: World 15-Year Perspective for Information Security
Hardware by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
for Years 2006, 2014 and 2020 (includes corresponding
Graph/Chart) II-158

Table 73: World 15-Year Perspective for Information Security
Hardware by Product Group/Segment - Percentage Breakdown of
Revenues for Hardware Authentication and Threat Management
Security Appliance Markets for Years 2006, 2014 and 2020
(includes corresponding Graph/Chart) II-159

Table 74: World Recent Past, Current and Future Analysis for
Hardware Authentication by Geographic Region - US, Canada,
Japan, Europe, Asia-Pacific (excluding Japan), Latin America,
and Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2013 through 2020 (includes
corresponding Graph/Chart) II-160

Table 75: World Historic Review for Hardware Authentication
by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-161

Table 76: World Recent Past, Current and Future Analysis for
Hardware Authentication by Product Segment - Tokens, Smart
Cards, and Biometrics Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2013 through 2020
(includes corresponding Graph/Chart) II-162

Table 77: World Historic Review for Hardware Authentication
by Product Segment - Tokens, Smart Cards, and Biometrics
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2006 through 2012 (includes corresponding
Graph/Chart) II-163

Table 78: World 15-Year Perspective for Hardware
Authentication by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America, and Rest of World Markets
for Years 2006, 2014 and 2020 (includes corresponding
Graph/Chart) II-164

Table 79: World 15-Year Perspective for Hardware
Authentication by Product Group/ Segment - Percentage
Breakdown of Revenues for Tokens, Smart Cards, and Biometrics
Markets for Years 2006, 2014 and 2020 (includes corresponding
Graph/Chart) II-165

Table 80: World Recent Past, Current and Future Analysis for
Threat Management Security Appliances by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2013
through 2020 (includes corresponding Graph/Chart) II-166

Table 81: World Historic Review for Threat Management
Security Appliances by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2012 (includes
corresponding Graph/Chart) II-167

Table 82: World Recent Past, Current and Future Analysis for
Threat Management Security Appliances by Product Segment -
Firewall/VPN, Secure Content Management, Intrusion
Detection/Prevention and Unified Threat Management Security
Appliances Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2013 through 2020 (includes
corresponding Graph/Chart) II-168

Table 83: World Historic Review for Threat Management
Security Appliances by Product Segment - Firewall/VPN, Secure
Content Management, Intrusion Detection/ Prevention and
Unified Threat Management Security Appliances Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2006 through 2012 (includes corresponding
Graph/Chart) II-169

Table 84: World 15-Year Perspective for Threat Management
Security Appliances by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets for Years 2006, 2014 and 2020 (includes
corresponding Graph/Chart) II-170

Table 85: World 15-Year Perspective for Threat Management
Security Appliances by Product Group/Segment - Percentage
Breakdown of Revenues for Firewall/VPN, Secure Content
Management, Intrusion Detection/Prevention and Unified Threat
Management Security Appliances Markets for Years 2006, 2014 and
2020 (includes corresponding Graph/Chart) II-171
Information Security Services II-172
Table 86: World Recen

View This Report »

Find all the market research you need - instantly, in one place.

+1.2 Million Research Documents & Statistics +200,000 Trusted Public Sources 350 Industries With Global Coverage

24/7 Customer Support

Talk to Amrita

+1 718 303 2019

Purchase Reports From Reputable Market Research Publishers

Analysis of the Global SSL Certification Market

Analysis of the Global SSL Certification Market

  • $ 6 000
  • Industry report
  • September 2014
  • by Frost & Sullivan

Elegantly Solving the Multiple Domain Problem SSL certificates are an encryption technology used to secure communications between end users and Web sites. Certificate Authorities (CAs) also provide scan ...

Analysis of the Global Web Application Firewall Market

Analysis of the Global Web Application Firewall Market

  • $ 6 000
  • Industry report
  • October 2014
  • by Frost & Sullivan

Prospects for a Crucial but Undervalued Security Technology The Web Application Firewall (WAF) is an essential security tool for protecting Web applications and Web sites that are of ever-growing importance ...

Analysis of the Global Face Biometrics Market : 3D-face Recognition Augmenting Short Term Growth Especially in Government Applications

Analysis of the Global Face Biometrics Market : 3D-face Recognition Augmenting Short Term Growth Especially in Government Applications

  • $ 6 000
  • Industry report
  • November 2014
  • by Frost & Sullivan

Key Findings •The global market for face biometrics across government and commercial applications is at the growth phase of the Gaussian curve. It is expected to grow at a compound annual growth rate ...


ReportLinker is an award-winning market research solution that finds, filters and organizes the latest industry data so you get all the market research you need - quickly, in one place.