1. Market Research
  2. > Computer Security Market Trends
  3. > Global Cyber Security Industry Report 2015

Global Cyber Security Industry Report 2015

  • September 2015
  • -
  • QY Research Group
  • -
  • 158 pages

Summary

The Global Cyber Security Industry Report 2015 is a professional and in-depth study on the current state of the Cyber Security industry.

The report provides a basic overview of the industry including definitions, classifications, applications and industry chain structure. The Cyber Security market analysis is provided for the international markets including development trends, competitive landscape analysis, and key regions development status.

Development policies and plans are discussed as well as manufacturing processes and cost structures are also analyzed.
This report also states the market Status of Cyber Security, its application and its different types.
The report focuses on global major leading industry players providing information such as company profiles, product, revenue and contact information.

With 172 tables and figures the report provides key statistics on the state of the industry and is a valuable source of guidance and direction for companies and individuals interested in the market.

Table Of Contents

Global Cyber Security Industry Report 2015
Table of Contents

1 Industry Overview 1
1.1 Definition and Specifications of Cyber Security 1
1.1.1 Firewall 1
1.1.2 IDS 2
1.1.3 Unified Threat Management 5
1.1.4 Data Loss Protection 5
1.1.5 Risk and Compliance Management 6
1.1.6 Identity and Access Management 7
1.1.7 Web Filtering 9
1.1.8 Other 10
1.2 Classification of Cyber Security 10
1.2.1 Network Security 11
1.2.2 Application Security 12
1.2.3 Endpoint Security 13
1.2.4 Cloud Security 13
1.2.5 Content Security 14
1.2.6 Wireless Security 15
1.3 Applications of Cyber Security 15
1.3.1 Defense and Military 16
1.3.2 BFSI (Banking, Financial Services and Insurance) 19
1.3.3 Public Utilities 20
1.3.4 Healthcare 20
1.4 Industry Chain Structure of Cyber Security 21
1.5 Industry Regional Overview of Cyber Security 31
1.5.1 USA 31
1.5.2 Europe 32
1.5.3 Japan 32
1.5.4 China 32
1.6 Industry Policy Analysis of Cyber Security 33
1.7 Industry News Analysis of Cyber Security 34
2 Manufacturing Cost Structure Analysis of Cyber Security 36
2.1 RandD costs 36
2.2 Labor Cost Analysis of Cyber Security 37
2.3 Other Costs Analysis of Cyber Security 38
2.4 Manufacturing Cost Structure Analysis of Cyber Security 39
2.5 Standards of Cyber Security 40
3 Technical Data and Manufacturing Plants Analysis 41
3.1 Capacity and Commercial Production Date of Global Key Manufacturers in 2014 41
3.2 Regional Markets Distribution of Global Key Cyber Security Manufacturers in 2014 42
3.3 RandD Status and Technology Source of Global Cyber Security Key Manufacturers in 2014 43
4 Production Analysis of Cyber Security by Regions, Technology, and Applications 47
4.1 Global Revenue of Cyber Security by Regions in 2010-2015 47
4.1.1 Global Cyber Security Market Analysis in 2010-2015 47
4.1.2 US Cyber Security Market Analysis 51
4.1.3 EU Cyber Security Market Analysis 52
4.1.4 Japan Cyber Security Market Analysis 53
4.1.5 China Cyber Security Market Analysis 54
4.1.6 Russia Cyber Security Market Analysis 55
4.1.5 Other Regions Cyber Security Market Analysis 56
4.2 Cyber Security Product Market Analysis by Product Type 57
4.3 Cyber Security Product Market Analysis by Application 58
5 Main Type of Cyber Security Market Status 2010-2015 62
5.1 Global Main Type of Cyber Security Market Status 2010-2015 62
5.2 China Main Type of Cyber Security Market Status 2010-2015 63
6 Analysis of Cyber Security Market Status 2010-2015 64
6.1 Revenue of Cyber Security 2010-2015 64
6.2 Revenue Market Share Analysis of Cyber Security 2010-2015 66
7 Analysis of Cyber Security Industry Key Manufacturers 72
7.1 Cisco 72
7.1.1 Company Profile 72
7.1.2 Cisco Cyber Security Product 73
7.1.3 Cisco Revenue and Market Share Analysis 74
7.1.4 Contact Information 75
7.2 Oracle 75
7.2.1 Company Profile 75
7.2.2 Oracle Cyber Security Product 76
7.2.3 Oracle Revenue and Market Share Analysis 77
7.2.4 Contact Information 78
7.3 Dell 78
7.3.1 Company Profile 78
7.3.2 Dell Cyber Security Product 79
7.3.3 Dell Revenue and Market Share Analysis 79
7.3.4 Contact Information 80
7.4 Symantec 80
7.4.1 Company Profile 80
7.4.2 Symantec Cyber Security Product 81
7.4.3 Symantec Revenue and Market Share Analysis 82
7.4.4 Contact Information 83
7.5 Huawei 83
7.5.1 Company Profile 83
7.5.2 Huawei Cyber Security Product 83
7.5.3 Huawei Revenue and Market Share Analysis 85
7.5.4 Contact Information 86
7.6 Intel 86
7.6.1 Company Profile 86
7.6.2 Intel Cyber Security Product 87
7.6.3 Intel Revenue and Market Share Analysis 88
7.6.4 Contact Information 88
7.7 Check Point 89
7.7.1 Company Profile 89
7.7.2 Check Point Cyber Security Product 90
7.7.3 Check Point Revenue and Market Share Analysis 91
7.7.4 Contact Information 91
7.8 Trend Micro 92
7.8.1 Company Profile 92
7.8.2 Trend Micro Cyber Security Product 93
7.8.3 Trend Micro Revenue and Market Share Analysis 93
7.8.4 Contact Information 94
7.9 IBM 94
7.9.1 Company Profile 94
7.9.2 IBM Cyber Security Product 95
7.9.3 IBM Revenue and Market Share Analysis 97
7.9.4 Contact Information 97
7.10 HP 98
7.10.1 Company Profile 98
7.10.2 HP Cyber Security Product 98
7.10.3 HP Revenue and Market Share Analysis 99
7.10.4 Contact Information 100
7.11 Microsoft 100
7.11.1 Company Profile 100
7.11.2 Microsoft Cyber Security Product 101
7.11.3 Microsoft Revenue and Market Share Analysis 102
7.11.4 Contact Information 103
7.12 Juniper 103
7.12.1 Company Profile 103
7.12.2 Juniper Cyber Security Product 104
7.12.3 Juniper Revenue and Market Share Analysis 105
7.12.4 Contact Information 106
7.13 EMC 106
7.13.1 Company Profile 106
7.13.2 EMC Cyber Security Product 107
7.13.3 EMC Revenue and Market Share Analysis 108
7.13.4 Contact Information 108
7.14 Fortinet 109
7.14.1 Company Profile 109
7.14.2 Fortinet Cyber Security Product 110
7.14.3 Fortinet Revenue and Market Share Analysis 111
7.14.4 Contact Information 111
7.15 Kaspersky 112
7.15.1 Company Profile 112
7.15.2 Kaspersky Cyber Security Product 113
7.15.3 Kaspersky Revenue and Market Share Analysis 113
7.15.4 Contact Information 114
7.16 ESET 114
7.16.1 Company Profile 114
7.16.2 ESET Cyber Security Product 115
7.16.3 ESET Revenue and Market Share Analysis 115
7.16.4 Contact Information 116
7.17 Quantum 116
7.17.1 Company Profile 116
7.17.2 Quantum Cyber Security Product 117
7.17.3 Quantum Revenue and Market Share Analysis 118
7.17.4 Contact Information 118
7.18 Avast 119
7.18.1 Company Profile 119
7.18.2 Avast Cyber Security Product 120
7.18.3 Avast Revenue and Market Share Analysis 120
7.18.4 Contact Information 121
7.19 Hillstone Networks 121
7.19.1 Company Profile 121
7.19.2 Hillstone Networks Cyber Security Product 122
7.19.3 Hillstone Networks Revenue and Market Share Analysis 124
7.18.4 Contact Information 125
7.20 NSFOUS 125
7.20.1 Company Profile 125
7.20.2 NSFOUS Cyber Security Product 126
7.20.3 NSFOUS Revenue and Market Share Analysis 127
7.20.4 Contact Information 127
8 Development Trend of Cyber Security Industry 2015-2020 129
8.1 Revenue Overview of Cyber Security in 2016-2021 129
8.2 Revenue Market Share Analysis of Cyber Security in 2016-2021 133
8.3 Global Revenue of Cyber Security by Regions in 2016-2021 135
8.4 Cyber Security Product Market Forecast by Application 138
9 Downstream of Cyber Security Market Analysis 142
9.1 Cyber Security Product Market Analysis by Application 142
9.2 Downstream of Cyber Security Market Share by Application 143
10 Conclusion of the Global Cyber Security Industry Report 2015 146



List of Tables and Figures
Figure Feature of Firewall 2
Figure Feature of Firewall 4
Figure of Unified Threat Management 5
Figure Feature of Data Loss Protection 6
Figure Feature of Risk and Compliance Management 7
Figure Identity Management 8
Table Classification of Cyber Security 10
Table Classes of Common Application Security Threats / Attacks 12
Figure Compares the Characteristics of Software Products to Those of Physical Products Throughout the Supply Chain Life Cycle. 24
Figure Assigns Threats to Constituents 25
Figure Combination of Systems 26
Figure Supply China Security Risk Management by Phase 27
Figure Supply Chain Risk by Phases of the SDLC 28
Figure Oversight Manufacture and Assurance in the SDLC 29
Figure Supply Chain Risk by Origin of Software 30
Figure Global number of cyber security incidents from 2009 to 2014 (in millions) 31
Table Industry Policy List of Cyber Security 33
Table Industry News List of Cyber Security 34
Figure Main Companies Operating Expenditure as % of Sales 36
Table 2014 Global Average Wage (USD/ Month) by Country 37
Figure 2014 China Cyber Security Software Product Manufacturing Cost Structure Analysis 39
Figure 2014 China Cyber Security Hardware Product Manufacturing Cost Structure Analysis 39
Table Revenue (Million) and Commercial Production Date of Global Cyber Security Key Manufacturers in 2014 41
Table Regional Markets Distribution of Global Key Cyber Security Manufacturers in 2014 42
Table RandD Status and Technology Source of Global Cyber Security Key Manufacturers in 2014 43
Table Cyber Security Revenue (Billion USD) of Global Major Regions in 2010-2015 47
Figure Market Share of Global Major Regions Cyber Security Industry Revenue in 2010 48
Figure Market Share of Global Major Regions Cyber Security Industry Revenue in 2011 48
Figure Market Share of Global Major Regions Cyber Security Industry Revenue in 2012 49
Figure Market Share of Global Major Regions Cyber Security Industry Revenue in 2013 49
Figure Market Share of Global Major Regions Cyber Security Industry Revenue in 2014 50
Figure Market Share of Global Major Regions Cyber Security Industry Revenue in 2015 50
Figure Global Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 51
Figure US Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 51
Figure EU Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 52
Figure Japan Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 53
Figure China Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 54
Figure Russia Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 55
Figure Other Region Cyber Security Market Revenue (Billion USD) and Growth Rate in 2010-2015 56
Figure Market Share of Global Cyber Security Industry Revenue by Product in 2014 57
Figure Market Share of China Cyber Security Industry Revenue by Product in 2014 58
Table Global Cyber Security Product Market Analysis by Application in 2010-2015 58
Figure Global Cyber Security Product Market Analysis by Application in 2010 59
Figure Global Cyber Security Product Market Analysis by Application in 2011 59
Figure Global Cyber Security Product Market Analysis by Application in 2012 60
Figure Global Cyber Security Product Market Analysis by Application in 2013 60
Figure Global Cyber Security Product Market Analysis by Application in 2014 61
Figure Global Cyber Security Product Market Analysis by Application in 2015 61
Table Global 2010-2015Main Type of Cyber Security Revenue (Billion) 62
Table Global 2010-2015 Main Type of Cyber Security Revenue Share 62
Figure Global 2014 Main Type of Cyber Security Revenue Share 62
Table China 2010-2015Main Type of Cyber Security Revenue (Billion) 63
Table China 2010-2015Main Type of Cyber Security Revenue Share 63
Figure China 2014 Main Type of Cyber Security Revenue Share 63
Table Global and Major Suppliers Revenue of Cyber Security 2010-2015 (Million USD) 64
Table Global Revenue Market Share of Major Cyber Security Suppliers 2010-2015 64
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2010 66
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2011 67
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2012 68
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2013 69
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2014 70
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2015 71
Table Cisco Cyber Security Company Profile 72
Table Cyber Security Product of Cisco 73
Figure Revenue (Million USD) and Growth Rate of Cisco 2010-2015 74
Figure Cyber Security Revenue (Million USD) and Global Market Share of Cisco 2010-2015 75
Table Oracle Cyber Security Company Profile 75
Table Oracle Cyber Security Product of Oracle 76
Figure Revenue (Million USD) and Growth Rate of Oracle 2010-2015 77
Figure Cyber Security Revenue (Million USD) and Global Market Share of Oracle 2010-2015 77
Table Dell Cyber Security Company Profile 78
Table Dell Cyber Security Product of Dell 79
Figure Revenue (Million USD) and Growth Rate of Dell 2010-2015 79
Figure Cyber Security Revenue (Million USD) and Global Market Share of Dell 2010-2015 80
Table Symantec Cyber Security Company Profile 80
Table Cyber Security Product of Symantec 81
Figure Revenue (Million USD) and Growth Rate of Symantec 2010-2015 82
Figure Cyber Security Revenue (Million USD) and Global Market Share of Symantec 2010-2015 82
Table Huawei Cyber Security Company Profile 83
Table Huawei Cyber Security Product of Huawei 83
Figure Revenue (Million USD) and Growth Rate of Huawei 2010-2015 85
Figure Cyber Security Revenue (Million USD) and Global Market Share of Huawei 2010-2015 85
Table Intel Cyber Security Company Profile 86
Table Intel Cyber Security Product of Intel 87
Figure Revenue (Million USD) and Growth Rate of Intel 2010-2015 88
Figure Cyber Security Revenue (Million USD) and Global Market Share of Intel 2010-2015 88
Table Check Point Cyber Security Company Profile 89
Table Check Point Cyber Security Product of Check Point 90
Figure Revenue (Million USD) and Growth Rate of Check Point 2010-2015 91
Figure Cyber Security Revenue (Million USD) and Global Market Share of Check Point 2010-2015 91
Table Trend Micro Cyber Security Company Profile 92
Table Trend Micro Cyber Security Product of Trend Micro 93
Figure Revenue (Million USD) and Growth Rate of Trend Micro 2010-2015 93
Figure Cyber Security Revenue (Million USD) and Global Market Share of Trend Micro 2010-2015 94
Table IBM Cyber Security Company Profile 94
Table Cyber Security Product of IBM 95
Figure Revenue (Million USD) and Growth Rate of IBM 2010-2015 97
Figure Cyber Security Revenue (Million USD) and Global Market Share of IBM 2010-2015 97
Table HP Cyber Security Company Profile 98
Table HP Cyber Security Product of HP 98
Figure Revenue (Million USD) and Growth Rate of HP 2010-2015 99
Figure Cyber Security Revenue (Million USD) and Global Market Share of HP 2010-2015 100
Table Microsoft Cyber Security Company Profile 100
Table Microsoft Cyber Security Product of Microsoft 101
Figure Revenue (Million USD) and Growth Rate of Microsoft 2010-2015 102
Figure Cyber Security Revenue (Million USD) and Global Market Share of Microsoft 2010-2015 103
Table Juniper Cyber Security Company Profile 103
Table Juniper Cyber Security Product of Juniper 104
Figure Revenue (Million USD) and Growth Rate of Juniper 2010-2015 105
Figure Cyber Security Revenue (Million USD) and Global Market Share of Juniper 2010-2015 106
Table EMC Cyber Security Company Profile 106
Table EMC Cyber Security Product of EMC 107
Figure Revenue (Million USD) and Growth Rate of EMC 2010-2015 108
Figure Cyber Security Revenue (Million USD) and Global Market Share of EMC 2010-2015 108
Table Fortinet Cyber Security Company Profile 109
Table Fortinet Cyber Security Product of Fortinet 110
Figure Revenue (Million USD) and Growth Rate of Fortinet 2010-2015 111
Figure Cyber Security Revenue (Million USD) and Global Market Share of Fortinet 2010-2015 111
Table Kaspersky Cyber Security Company Profile 112
Table Cyber Security Product of Kaspersky 113
Figure Revenue (Million USD) and Growth Rate of Kaspersky 2010-2015 113
Figure Cyber Security Revenue (Million USD) and Global Market Share of Kaspersky 2010-2015 114
Table ESET Cyber Security Company Profile 114
Table ESET Cyber Security Product of ESET 115
Figure Revenue (Million USD) and Growth Rate of ESET 2010-2015 115
Figure Cyber Security Revenue (Million USD) and Global Market Share of ESET 2010-2015 116
Table Quantum Cyber Security Company Profile 116
Table Quantum Cyber Security Product of Quantum 117
Figure Revenue (Million USD) and Growth Rate of Quantum 2010-2015 118
Figure Cyber Security Revenue (Million USD) and Global Market Share of Quantum 2010-2015 118
Table Avast Cyber Security Company Profile 119
Table Avast Cyber Security Product of Avast 120
Figure Revenue (Million USD) and Growth Rate of Avast 2010-2015 120
Figure Cyber Security Revenue (Million USD) and Global Market Share of Avast 2010-2015 121
Table Hillstone Networks Cyber Security Company Profile 121
Table Hillstone Networks Cyber Security Product of Hillstone Networks 122
Figure Revenue (Million USD) and Growth Rate of Hillstone Networks 2010-2015 124
Figure Cyber Security Revenue (Million USD) and Global Market Share of Hillstone Networks 2010-2015 124
Table NSFOUS Cyber Security Company Profile 125
Table NSFOUS Cyber Security Product of NSFOUS 126
Figure Revenue (Million USD) and Growth Rate of NSFOUS 2010-2015 127
Figure Cyber Security Revenue (Million USD) and Global Market Share of NSFOUS 2010-2015 127
Figure Global Revenue ( Billion USD) and Growth Rate of Cyber Security in 2016-2021 129
Figure US Revenue (Billion USD) and Growth Rate of Cyber Security in 2016-2021 130
Figure EU Revenue (Billion USD) and Growth Rate of Cyber Security in 2016-2021 130
Figure Japan Revenue (Billion USD) and Growth Rate of Cyber Security in 2016-2021 131
Figure China Revenue (Billion USD) and Growth Rate of Cyber Security in 2016-2021 131
Figure Russia Revenue (Billion USD) and Growth Rate of Cyber Security in 2016-2021 132
Figure Other Regions Revenue (Billion USD) and Growth Rate of Cyber Security in 2016-2021 132
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2016 133
Figure Global Revenue Market Share of Major Cyber Security Suppliers in 2021 134
Table Cyber Security Revenue (Billion USD) of Global Major Regions in 2016-2021 135
Figure Cyber Security Revenue (Billion USD) of Global Major Regions in 2016 135
Figure Cyber Security Revenue (Billion USD) of Global Major Regions in 2017 136
Figure Cyber Security Revenue (Billion USD) of Global Major Regions in 2018 136
Figure Cyber Security Revenue (Billion USD) of Global Major Regions in 2019 137
Figure Cyber Security Revenue (Billion USD) of Global Major Regions in 2020 137
Figure Cyber Security Revenue (Billion USD) of Global Major Regions in 2021 138
Table Global Cyber Security Product Market Analysis by Application in 2016-2021 138
Figure Global Cyber Security Product Market Analysis by Application in 2016 139
Figure Global Cyber Security Product Market Analysis by Application in 2017 139
Figure Global Cyber Security Product Market Analysis by Application in 2018 140
Figure Global Cyber Security Product Market Analysis by Application in 2019 140
Figure Global Cyber Security Product Market Analysis by Application in 2020 141
Figure Global Cyber Security Product Market Analysis by Application in 2021 141
Table Global Cyber Security Product Market Revenue (Billion USD) Analysis by Application in 2010-2015 142
Figure Global Cyber Security Product Market Analysis by Application in 2010 143
Figure Global Cyber Security Product Market Analysis by Application in 2011 143
Figure Global Cyber Security Product Market Analysis by Application in 2012 144
Figure Global Cyber Security Product Market Analysis by Application in 2013 144
Figure Global Cyber Security Product Market Analysis by Application in 2014 145
Figure Global Cyber Security Product Market Analysis by Application in 2015 145

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Analysis of the India Secure Content Management Market

Analysis of the India Secure Content Management Market

  • $ 4950
  • Industry report
  • September 2016
  • by Frost & Sullivan

Targeted and Ransomware Attacks are Driving the SCM Market The Indian SCM market grew strongly at 11.7% year-on-year in 2015 with the web security segment growing at 12.4% and the email security segment ...

Japan Cybersecurity Products and Services Forecast,  2016-2020

Japan Cybersecurity Products and Services Forecast, 2016-2020

  • $ 4500
  • Industry report
  • November 2016
  • by IDC

This IDC study is a translation of the Japanese document IDC #JPJ40602016 that categorizes the Japan cybersecurity solutions market into security products and security services segment, and provides the ...

Business Strategy: Taking the Next Cybersecurity Step -- Utilizing the NIST Baldrige Cybersecurity Excellence Builder

Business Strategy: Taking the Next Cybersecurity Step -- Utilizing the NIST Baldrige Cybersecurity Excellence Builder

  • $ 4500
  • Industry report
  • October 2016
  • by IDC

This IDC Government Insights report discusses the NIST Cybersecurity Framework and the draft Baldrige Cybersecurity Excellence Builder. The report examines how the frameworks are used and the value of ...


ref:plp2015

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.