1. Market Research
  2. > Software Market Trends
  3. > Analysis of the Global Public Vulnerability Research Market, 2015

Analysis of the Global Public Vulnerability Research Market, 2015

  • October 2016
  • -
  • Frost & Sullivan
  • -
  • 117 pages

Growth of Public Vulnerability Disclosures, the Important Intermediary Between Commercial Threat Analysis and Cyber Grid Threat Reporting

The Frost & Sullivan report analyzes the global public vulnerability research market. The growth of cyber threats such as malware, viruses, ransomware, botnets and more are of great concern to companies and consumers. Uncovering and disclosing vulnerabilities is important for analyzing and countering potential threats.

The vulnerability material that is collected, queried, and segmented provides rich qualitative commentary on the vulnerability research industry and community of contributors, and recognizes the most prolific disclosers of new vulnerabilities.

Research Scope
Total number of public vulnerabilities
Market trends of severity levels
Market trends of applications and classes of applications
Market trends of different vulnerability flaws
In 2015, public vulnerability disclosures increased 43.8% over the previous year. Researchers are covering a wider breadth of applications, such as media players, operating systems, office products, web browsers and many more. There have also been notable changes among the key players. Trend Micro acquired HP TippingPoint and Google Project Zero launched in mid-2014.

The different types of threats which can exploit vulnerabilities are discussed in this report. Frost & Sullivan also conducted competitive analysis of the research institutions involved in disclosing vulnerabilities.

Key Questions this Study Answer
Which institutions have disclosed the most vulnerabilities and what types?
Which applications have had the most public vulnerabilities?
Have severity levels changed?
What are the most likely impacts threats will have on exploitable vulnerabilities?

Table Of Contents

Analysis of the Global Public Vulnerability Research Market, 2015
1.EXECUTIVE SUMMARY
Executive Summary
1.Executive Summary-Key Findings

2.MARKET OVERVIE
Market Overview
1.Market Overview
2.Market Overview (continued)
3.Market Overview (continued)
4.Bug Bounty Programs and Contests
5.Pwn2Own Competition
6.Pwn2Own Competition (continued)
7.Mobile Pwn2Own Competition
8.Market Overview-The Role of MITRE and CVSS Scoring
9.Market Overview-The Role of MITRE and CVSS Scoring (Continued)
10.Market Overview-The Role of MITRE and CVSS Scoring (Continued)
11.Research Methodology
12.Research Methodology (continued)

3.TYPES OF THREATS
Types of Threats
1.Malware
2.Malware (continued)
3.Malware (continued)
4.Malware (continued)
5.Mobile Malware
6.Mobile Malware (continued)
7.Ransomware
8.Bots and Botnets
9.Bots and Botnets (continued)
10.Advanced Persistent Threats (APT)
11.Advanced Persistent Threats (APT) (continued)
12.Web and Phishing Attacks

4.MARKET TRENDS IN PUBLIC VULNERABILITIES
Market Trends in Public Vulnerabilities
1.Vulnerabilities Reported by Year
2.Quarterly Reported Vulnerabilities
3.Market Trends
4.Market Trends (continued)
5.Market Trends (continued)
6.Vulnerability Disclosure
7.Vulnerability Disclosure (continued)
8.Vulnerability Disclosure (continued)
9.Vulnerability Disclosure by Institution Type
10.Vulnerability Disclosure by Institution Type (continued)
11.Vulnerability Disclosure by Organization Type (continued)

5.ANALYSIS OF VULNERABILITIES BY SEVERITY
Analysis of Vulnerabilities by Severity
1.Analysis of Vulnerabilities by Severity
2.Analysis of Vulnerabilities by Severity (continued)
3.Analysis of Vulnerabilities by Severity (continued)
4.Analysis of Vulnerabilities by Severity (continued)
5.Analysis of Vulnerabilities by Severity (continued)
6.Analysis of Vulnerabilities by Severity (continued)
7.Analysis of Vulnerabilities by Severity (continued)
8.Analysis of Vulnerabilities by Severity (continued)
9.Analysis of Vulnerabilities by Severity (continued)

6.COMPARISON OF TARGETED APPLICATIONS
Comparison of Targeted Applications
1.Targeted Applications
2.Analysis of Targeted Applications
3.Top Targeted Class of Applications
4.Disclosing Institutions: Media Player Vulnerabilities
5.Disclosing Institutions: Web Browser Vulnerabilities
6.Disclosing Institutions: Operating System Vulnerabilities
7.Disclosing Institutions: IT Support Tools Vulnerabilities
8.Analysis of Targeted Applications by Class
9.Analysis of Targeted Applications by Type (continued)
10.Targeted Web Browser Type
11.Targeted Web Browser Type (continued)
12.Analysis of Targeted Web Browser Type

7.VULNERABILITY ANALYSIS
Vulnerability Analysis
1.Vulnerability Definitions
2.Vulnerability Definitions (continued)
3.Vulnerabilities Reported by Flaw Type (2014)
4.Vulnerabilities Reported by Flaw Type (2015)
5.Disclosing Institutions: Buffer Errors
6.Disclosing Institutions: Use After Free Errors
7.Disclosing Institutions: Permissions, Privileges, and Access Control Errors
8.Top Impact Type (2014)
9.Top Impact Type (2015)
10.Disclosing Institution: Disruption-of-Service/Unauthorized Modification/Disclosure of information Impacts
11.Analysis of Impact Types

8.COMPETITIVE ANALYSIS
Competitive Analysis
1.Competitive Analysis Vulnerabilities
2.Competitive Analysis Vulnerabilities (continued)
3.Competitive Analysis Vulnerabilities (continued)
4.Competitive Analysis (continued)

9.THE STATUS OF PUBLIC VULNERABILITY REPORTING
The Status Of Public Vulnerability Reporting
1.The Status of Public Vulnerability Reporting-Then, Now, and in the Future
2.The Status of Public Vulnerability Reporting-Then, Now, and in the Future (continued)
3.The Status of Public Vulnerability Reporting-Then, Now, and in the Future (continued)

10.PROFILES OF SECURITY PLATFORM PROVIDERS OFFERING PUBLIC VULNERABILITY DISCLOSURE
Profiles of Security Platform Providers Offering Public Vulnerability Disclosure
1.Core Security
2.FortiGuard Labs (Fortinet)
3.Google Project Zero (Google)
4.Google Project Zero (Google) (continued)
5.Google Project Zero (Google) (continued)
6.High-Tech Bridge
7.IBM X-Force (IBM)
8.IBM X-Force (IBM) (continued)
9.IBM X-Force (IBM) (continued)
10.Secunia (now Flexera)
11.Secunia (now Flexera) (continued)
12.Secunia Research About Often-Targeted Applications (Adobe, Flash, and Microsoft)
13.TippingPoint Zero Day Initiative (Trend Micro)
14.Trend Micro-TippingPoint Zero Day Initiative
15.US-CERT
16.Verisign (Verisign Labs)

11.CONCLUSIONS
Conclusions
1.Conclusions

12.APPENDIX
Appendix
1.Vulnerability Database Sources (for 2015)
2.List of Publications Cited in This Report
3.Legal Disclaimer

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Antennas for Systems and Devices: Technologies and Global Markets

Antennas for Systems and Devices: Technologies and Global Markets

  • $ 6650
  • Industry report
  • January 2017
  • by BCC Research

Use this report to: - Gain information about internet of things (IOT) and its impact on the prospects of antennas. - Learn about various concepts and terminologies related to antennas. - Gain an insight ...

Global Markets for Machine Vision Technologies

Global Markets for Machine Vision Technologies

  • $ 6650
  • Industry report
  • November 2016
  • by BCC Research

Use this report to: - Gain insight through definitions, concepts, and the roles of the machine vision (MV) industry. - Gain information about the history and development of machine vision (MV) in food ...

Mobile Technologies: Global Markets

Mobile Technologies: Global Markets

  • $ 6650
  • Industry report
  • January 2017
  • by BCC Research

Use this report to: - Understand the underlying operating system and the way it shapes the global mobile applications market. - Learn about the various software development kits offered by manufacturers ...


ref:plp2016

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.