1. Market Research
  2. > IT Services
  3. > Hosting Market Trends
  4. > Data Center Security: Global Markets

Data Center Security: Global Markets

  • November 2015
  • -
  • BCC Research
  • -
  • 162 pages

This BCC Research report presents an opportunity for all stakeholders in the data center and data center security markets to understand various growth drivers, key trends, growing markets and technologies. Includes forecast from 2015-2020.

Use this report to:

Learn about the ever changing data center security market and the growth opportunities it presents.
Understand various growth drivers, key trends, growing markets and technologies for data center security.
Receive information about the top seven industries that are key users of data center security solutions, along with other industries that are expected to be strong users in the future.
Learn about the demand in the Americas, EMEA and Asia-Pacific regions for data center security solutions.

Highlights

The global market for data center security products reached $5.6 billion in 2014. The demand is expected to increase from nearly $6.4 billion in 2015 to $12.1 billion in 2020, with a compound annual growth rate (CAGR) of 13.8% from 2015-2020.
The identity and access management (IAM) segment of this market is expected to grow from $2.5 billion in 2015 to nearly $5.2 billion by 2020, a CAGR of 15.2% through 2020.
The intrusion detection system (IDS) and intrusion prevention system (IPS) segment should total $1.1 billion in 2015 and $2.1 billion in 2020, demonstrating a CAGR of 13.2% for the five year period.

REPORT OBJECTIVE

The objective of this report—Data Center Security: Global Markets—is to describe the ever changing data center security market and the growth opportunity it presents. To indicate the growth opportunity presented by the data center security market to various stakeholders and participants, the report forecasts market demand from 2015
through 2020 with historical data for 2014. The report presents an opportunity for all stakeholders in the data center and data center security markets to understand various growth drivers, key trends, growing markets and technologies.

DEFINITION AND SCOPE OF REPORT

BCC Research defines data center security as a computer or cyber security applied todata centers, where the data centers can be in physical form or can be virtualized (software-defined data centers). The security applied can be either as software form, hardware form, or can be a mix of software and hardware. Further, for the purpose of this report, security is defined as all forms of processes and mechanisms by which data center equipment, information and services are protected from intended or unintended (and unauthorized) access and change or destruction.
For calculating the market size, the report has considered the following forms of security:

Intrusion detection system and intrusion prevention system.
Distributed denial of service (DDoS) protection systems.
Unified threat management solutions.
Identity and access management solutions.
Security information and event management solutions.

segmentation, we have considered data center software security, data center hardware security as well as data center security services. However, services that are not directly related to implementation or maintenance such as education and training, and consulting services are out of the scope of this report. Further, hardware security
that are not part of cyber security, such as closed circuit television (CCTV) and biometric access control are out of scope of this report.

The analysis starts with introducing the reader to how the data center security industry has evolved over time and how cloud and virtualization has affected the market.

Building on that understanding, the study proceeds to identify the following forces driving the market:

Primary forces are the forces having a direct impact on the data center security space. Secondary forces are the forces that, albeit important, have an indirect impact.
Key funding and financing in this space, which shows strong support (especially the new entrants).
Some key challenges that may hinder the growth of this market.
Key trends visible in the market.
The top seven industries that are key users of data center security solutions, along with some other industries that are expected to be strong users in the future.
Demand in the Americas, EMEA and Asia-Pacific for data center security solutions.



Table Of Contents

Data Center Security: Global Markets
DATA CENTER SECURITY: GLOBAL MARKETS
SAS025A
November 2015
Ritam Biswas
Project Analyst
ISBN: 1-62296-184-6
@bccresearch.com
CHAPTER 1 INTRODUCTION 2
REPORT OBJECTIVE 2
DEFINITION AND SCOPE OF REPORT 2
REASONS FOR DOING THE STUDY 3
INTENDED AUDIENCE 3
METHODOLOGY 3
INFORMATION SOURCES 4
ANALYST'S CREDENTIALS 4
RELATED BCC RESEARCH REPORTS 5
BCC RESEARCH WEBSITE 5
DISCLAIMER 5
CHAPTER 2 SUMMARY 7
SUMMARY TABLE GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE,
THROUGH 2020 ($ MILLIONS) 8
SUMMARY FIGURE GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE,
2014-2020 ($ MILLIONS) 8
CHAPTER 3 OVERVIEW 12
EVER CHANGING DATA CENTER MARKET 12
DATA CENTER AS A SERVICE (DCAAS) 12
SOFTWARE-DEFINED DATA CENTER (SDDC) 13
EMERGENCE OF NEW DATA CENTERS AROUND THE WORLD 14
NEED FOR SECURITY 15
TABLE 1 KEY DDOS ATTACKS, 2014 AND 2015 16
INTRODUCTION TO IT SECURITY 17
CRITICAL INFRASTRUCTURE SECURITY 17
STUXNET WORM 18
MOTIVATION FOR IT SECURITY ATTACKS 18
IT SECURITY SERVICES 19
MANAGED SECURITY SERVICE 19
SECURITY-AS-A-SERVICE 20
CHANGE IN CYBER SECURITY LANDSCAPE 21
IMPACT OF INTERNET OF THINGS (IOT) ON THE DATA CENTER AND IT SECURITY
MARKETS 21
IMPACT OF BRING YOUR OWN DEVICE (BYOD) ON THE DATA CENTER AND IT
SECURITY MARKETS 23
DATA CENTER SECURITY: INTRODUCTION 24
LAYERED SECURITY APPROACH FOR DATA CENTERS 24
DATA CENTER SECURITY IN DETAIL 25
TABLE 2 SECURITY TECHNOLOGIES IN A DATA CENTER SECURITY SOLUTION 25
ADVENT OF CLOUD AND VIRTUALIZATION AND EMERGENCE OF NEW FORMS OF
SECURITY THREATS IN THE DATA CENTER SPACE 26
GROWTH FORECAST FOR DATA CENTER SECURITY SOLUTIONS 27
MARKET CHANGES OVER THE YEARS 28
EMERGENCE OF SOCIAL NETWORKING COMPANIES AND THEIR IMPACT ON
THE DATA CENTER SECURITY MARKET 28
DATA CENTER SECURITY MARKET FORCES 29
TABLE 3 MAJOR MARKET FORCES AND THEIR EFFECTS 29
INCREASING INSIDER THREAT AND INFORMATION LEAKAGE 29
TABLE 4 TOP CAUSES OF DATA BREACHES, 2013 (%) 30
TABLE 5 TOP TYPES OF INFORMATION BREACHED 30
TABLE 6 KEY INSIDER DATA THEFTS, 2011-2015 31
RISE IN COMPLEXITY OF THREATS 32
CYBERCRIME-AS-A-SERVICE 33
GROWTH IN DDOS ATTACKS 33
TABLE 7 KEY DDOS ATTACKS, 2014 AND 2015 34
Operation Ababil 34
INCREASE IN ATTACKS ON GOVERNMENT DEPARTMENTS 35
TABLE 8 KEY ATTACKS ON GOVERNMENT DEPARTMENTS AND WEBSITES,
2012-2015 35
TABLE 9 MOST FREQUENTLY ATTACKED COUNTRIES 36
GROWING CRITICALITY OF THE INFORMATION STORED IN DATA CENTERS 37
INCREASING SPENDING ON IT SECURITY 37
GROWING STRINGENT REGULATORY REQUIREMENTS 38
TABLE 10 KEY SECTORS WITH HIGH LEVEL OF CONTROL 39
MIGRATION TO THE CLOUD 40
INCREASE IN ONLINE TRANSACTIONS 40
KEY STRATEGIES IN THE DATA CENTER SECURITY SPACE 40
KEY BUYING CRITERIA 41
DEPLOYMENT STRATEGIES 42
Large, High-Performance Appliances 42
Protection of Servers at the Hypervisor Level 42
Protection of Individual Server Instances 42
DATA CENTER SECURITY GOVERNANCE AND FRAMEWORK 42
CHAPTER 4 MARKET BY TYPE OF TECHNOLOGY 45
TABLE 11 GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE OF
TECHNOLOGY, 2015 AND 2020 (%) 45
TABLE 12 KEY DDOS MITIGATION AND SECURITY PROVIDERS 46
IDS AND IPS TECHNOLOGY FOR DATA CENTER SECURITY MARKET 46
TABLE 13 GLOBAL MARKET FOR IDS AND IPS TECHNOLOGY FOR DATA CENTER
SECURITY BY REGION, THROUGH 2020 ($ MILLIONS) 47
TABLE 14 KEY IDS AND IPS TECHNOLOGY PROVIDERS 49
DDOS TECHNOLOGY FOR DATA CENTER SECURITY MARKET 50
TABLE 15 GLOBAL MARKET FOR DDOS TECHNOLOGY FOR DATA CENTER SECURITY
BY REGION, THROUGH 2020 ($ MILLIONS) 51
TABLE 16 KEY DDOS MITIGATION PROVIDERS 52
UNIFIED THREAT MANAGEMENT (UTM) TECHNOLOGY FOR DATA CENTER
SECURITY MARKET 54
TABLE 17 GLOBAL MARKET FOR UTM TECHNOLOGY FOR DATA CENTER SECURITY
BY REGION, THROUGH 2020 ($ MILLIONS) 54
TABLE 18 KEY UTM TECHNOLOGY PROVIDERS 55
IDENTITY AND ACCESS MANAGEMENT (IAM) TECHNOLOGY FOR DATA CENTER
SECURITY MARKET 56
FIGURE 1 COMPARISON OF VARIOUS STAGES OF IAM TECHNOLOGY 56
TABLE 19 GLOBAL MARKET FOR IAM TECHNOLOGY FOR DATA CENTER SECURITY
BY REGION, THROUGH 2020 ($ MILLIONS) 57
TABLE 20 KEY IAM TECHNOLOGY PROVIDERS 57
SECURITY IDENTITY AND EVENT MANAGEMENT (SIEM) TECHNOLOGY FOR DATA
CENTER SECURITY MARKET 59
TABLE 21 GLOBAL MARKET FOR SIEM TECHNOLOGY FOR DATA CENTER SECURITY
BY REGION, THROUGH 2020 ($ MILLIONS) 59
TABLE 22 KEY SIEM TECHNOLOGY PROVIDERS 60
MARKET SEGMENTATION-TRADITIONAL DATA CENTER SECURITY VS.
CLOUD/SOFTWARE-DEFINED DATA CENTER SECURITY 60
TABLE 23 GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE,
2014-2020 (%) 61
FIGURE 2 GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($
MILLIONS) 61
CHAPTER 5 MARKET BY APPLICATION 64
SEGMENTATION BY INDUSTRY 64
TABLE 24 GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH
2020 ($ MILLIONS) 64
FIGURE 3 GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, 2014-2020
($ MILLIONS) 65
FINANCIAL SERVICES SECTOR OUTLOOK 65
FIGURE 4 AVERAGE ANNUALIZED COST GROWTH OF CYBER CRIME FOR A
FINANCIAL SERVICES COMPANY, 2011-2013 (%) 66
TABLE 25 LIST OF HIGH PROFILE DATA LOSS CASES AMONG FINANCIAL SERVICES
ORGANIZATIONS, 2012-2014 66
TABLE 26 IMPORTANCE OF KEY SECURITY SOLUTIONS IN FINANCIAL SERVICE
SECTOR 67
TABLE 27 GLOBAL MARKET FOR FINANCIAL SERVICES SECTOR BY TECHNOLOGY,
THROUGH 2020 ($ MILLIONS) 68
BANKING SECTOR 68
TABLE 28 MAPPING OF ATTACKERS AND VARIOUS ATTACKS AND IMPACT ON
BANKING SECTOR 69
RETAIL AND E-COMMERCE SECTOR OUTLOOK 69
TABLE 29 INTERNET USER PENETRATION FOR KEY COUNTRIES AS PERCENTAGE OF
POPULATION, 2014 (NO./%) 70
TABLE 30 GLOBAL MARKET FOR RETAIL AND E-COMMERCE SECTOR BY
TECHNOLOGY, THROUGH 2020 ($ MILLIONS) 71
HEALTH CARE SECTOR OUTLOOK 72
TABLE 31 IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE HEALTHCARE
SECTOR 72
TABLE 32 GLOBAL MARKET FOR HEALTHCARE SECTOR BY TECHNOLOGY,
THROUGH 2020 ($ MILLIONS) 73
GOVERNMENT SECTOR OUTLOOK 73
TABLE 33 IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE GOVERNMENT
SECTOR 74
TABLE 34 GLOBAL MARKET FOR GOVERNMENT SECTOR BY TECHNOLOGY,
THROUGH 2020 ($ MILLIONS) 74
TABLE 35 KEY ATTACKS ON DATA CENTERS IN THE GOVERNMENT SPACE 75
OTHER SECTORS 75
TABLE 36 GLOBAL MARKET FOR ENERGY AND UTILITIES SECTOR BY TECHNOLOGY,
THROUGH 2020 ($ MILLIONS) 76
TABLE 37 GLOBAL MARKET FOR TELECOM SECTOR BY TECHNOLOGY, THROUGH
2020 ($ MILLIONS) 77
TABLE 38 GLOBAL MARKET FOR INFORMATION TECHNOLOGY SECTOR BY
TECHNOLOGY, THROUGH 2020 ($ MILLIONS) 78
GROWING ACCEPTANCE AMONG MID-SIZED ORGANIZATIONS 78
TABLE 39 KEY MID-SIZED COMPANIES ACCEPTING DATA CENTER SECURITY
SOLUTIONS 79
CHAPTER 6 INDUSTRY STRUCTURE 81
KEY STAKEHOLDERS IN THE MARKET 81
KEY TRENDS IN THE DATA CENTER SECURITY MARKET 82
EMERGENCE OF CONVERGED SOLUTIONS 82
CONSOLIDATION IN THE DATA CENTER SECURITY MARKET 82
TABLE 40 KEY ACQUISITIONS AND MERGERS IN THE DATA CENTER SECURITY AND
RELATED SPACE 83
VENTURE CAPITAL FUNDING AND INVESTMENTS IN THE DATA CENTER
SECURITY SPACE 85
TABLE 41 FUNDING IN THE DATA CENTER SECURITY AND RELATED SPACE 85
REGULATORY FRAMEWORKS AND THEIR EFFECTS ON THE DATA CENTER
SECURITY MARKET 86
SARBANES-OXLEY ACT (SARBOX, SOX) 86
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) 86
THE GRAMM-LEACH-BLILEY ACT (GLB) ACT OF 1999 87
FAIR AND ACCURATE CREDIT TRANSACTION ACT (FACTA), INCLUDING RED
FLAGS RULE 87
FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 87
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) 87
EUROPEAN UNION DATA PROTECTION DIRECTIVE 87
BANK SECRECY ACT 88
CALIFORNIA SENATE BILL 1386 88
PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS
ACT (PIPEDA) 88
INFORMATION SECURITY MANAGEMENT SYSTEM COMPLIANCE (ISO
27001/27002) 88
HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL
HEALTH ACT 88
LAW ON THE PROTECTION OF PERSONAL DATA HELD BY PRIVATE PARTIES 89
CHAPTER 7 PATENT ANALYSIS 91
TABLE 42 LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET
(NUMBER) 91
FIGURE 5 LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (%) 92
TABLE 43 NUMBER OF PATENTS BY TECHNOLOGIES AND SUB-TECHNOLOGIES 93
CHAPTER 8 INTERNATIONAL 96
GEOGRAPHIC SEGMENTATION 96
TABLE 44 GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, THROUGH
2020 ($ MILLIONS) 96
FIGURE 6 GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, 2014-2020
($ MILLIONS) 96
THE AMERICAS 97
TABLE 45 KEY U.S. GOVERNMENT DATA BREACHES 98
Key Growth Sectors in the U.S. 98
TABLE 46 AMERICAS MARKET FOR DATA CENTER SECURITY BY INDUSTRY,
THROUGH 2020 ($ MILLIONS) 99
Government/Public Sector 99
Financial Services 100
Retail and e-Commerce 100
Healthcare 101
EUROPE, MIDDLE EAST AND AFRICA 101
TABLE 47 KEY EUROPEAN GOVERNMENT DATA BREACHES, 2014 AND 2015 101
TABLE 48 EMEA MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH
2020 ($ MILLIONS) 102
Key Growth Sectors in the U.K. 102
Healthcare 103
Government 103
Key Growth Sectors in Germany 103
Key Growth Sectors and Technologies in Switzerland 104
Key Growth Sectors in the Nordic region 104
KEY GROWTH SECTORS AND TECHNOLOGIES IN THE MIDDLE EAST 105
Oil and Gas 105
Government/Public Sector 106
Financial Services 106
ASIA-PACIFIC 107
TABLE 49 ASIA-PACIFIC MARKET FOR DATA CENTER SECURITY BY INDUSTRY,
THROUGH 2020 ($ MILLIONS) 108
Key Growth Sectors in India 108
Financial Services 109
Government Sector 109
Key Growth Sectors in South Korea 109
Government Sector 109
CHAPTER 9 VENDOR PROFILES 112
KEY PLAYERS IN THE DATA CENTER SECURITY MARKET AND THE COMPETITIVE
SCENARIO 112
CISCO 112
Business Overview 112
Key Data Center and Related Solutions 112
Key Clients in the Data Center Security Space 113
Strengths 113
Weaknesses 113
CHECK POINT SOFTWARE TECHNOLOGIES 114
Business Overview 114
Key Data Center and Related Solutions 114
Strengths 115
Weaknesses 115
DELL 115
Business Overview 115
Key Data Center and Related Solutions 115
Strengths 116
Weaknesses 116
FORTINET 116
Business Overview 116
Key Data Center and Related Solutions 116
Key Clients in the Data Center Security Space 117
Strengths 117
Weaknesses 117
IBM 118
Business Overview 118
Key Data Center and Related Solutions 118
Strengths 119
Weaknesses 119
MCAFEE 119
Business Overview 119
Key Data Center and Related Solutions 120
Key Clients in the Data Center Security Space 120
Strengths 120
Weaknesses 121
JUNIPER NETWORKS 121
Business Overview 121
Key Data Center and Related Solutions 121
Key Clients in the Data Center Security Space 121
Strengths 122
Weaknesses 122
SYMANTEC 122
Business Overview 122
Key Data Center and Related Solutions 123
Strengths 123
Weaknesses 123
A10 NETWORKS 124
Key Data Center and Related Solutions 124
Key Clients in the Data Center Security Space 124
Strengths 124
Weaknesses 125
ALLOT COMMUNICATIONS 125
Business Overview 125
Key Data Center and Related Solutions 125
Strengths 125
Weaknesses 126
ARBOR NETWORKS 126
Business Overview 126
Key Data Center and Related Solutions 126
Key Clients in the Data Center Security Space 126
SAS025A - Data Center Security: Global Markets
Strengths 127
Weaknesses 127
CORERO NETWORK SECURITY 127
Business Overview 127
Key Data Center and Related Solutions 127
Strengths 128
Weaknesses 128
F5 NETWORKS 128
Business Overview 128
Key Data Center and Related Solutions 128
Key Clients in the Data Center Security Space 129
Strengths 129
Weaknesses 129
FIREEYE 129
Business Overview 129
Key Data Center and Related Solutions 130
Key Clients in the Data Center Security Space 130
Strengths 130
Weaknesses 130
IMPERVA 130
Business Overview 130
Key Data Center and Related Solutions 130
Key Clients in the Data Center Security Space 131
Strengths 131
Weaknesses 131
KASPERSKY 131
Business Overview 131
Key Data Center and Related Solutions 132
Strengths 132
Weaknesses 132
PALO ALTO NETWORKS 132
Business Overview 132
Key Data Center and Related Solutions 133
Strengths 133
Weaknesses 133
TREND MICRO 134
Business Overview 134
Key Data Center and Related Solutions 134
Key Clients in the Data Center Security Space 134
Strengths 134
Weaknesses 135
VARMOUR 135
Business Overview 135
Strengths 135
Weaknesses 135
CHAPTER 10 COMPANY PROFILES 137
OTHER PARTICIPANTS IN THE DATA CENTER SECURITY MARKET 137
A10 NETWORKS 137
ABB 137
AKAMAI TECHNOLOGIES INC. 138
ALLOT COMMUNICATIONS 138
ANDRISOFT 139
ARBOR NETWORKS 139
ATandT 140
BIT9 140
BLACK LOTUS 141
BLOCKDOS 141
BMC SOFTWARE 141
BROCADE COMMUNICATIONS SYSTEMS INC. 142
CHECK POINT SOFTWARE TECHNOLOGIES 142
CISCO 143
CLEVERSAFE INC. 144
CLOUDFLARE 144
COMMVAULT SYSTEMS INC. 145
CORERO NETWORK SECURITY 145
CORESITE 146
CYBEROAM 146
DELL INC. 147
DIGITAL REALTY 148
DOSARREST INTERNET SECURITY 148
EMC 148
EQUINIX 149
ESOLUTIONS GROUP 150
EXPEDIENT 150
EXTREME NETWORKS 150
F5 NETWORKS INC. 151
FIREEYE 151
FOGO DATA CENTERS 152
FORTINET INC. 152
GLOBAL SWITCH 153
HEWLETT-PACKARD 153
HITACHI DATA SYSTEMS 154
IBM 154
IMPERVA 155
INTEL 156
INTEROUTE 156
IXIA 157
JUNIPER NETWORKS 157
KASPERSKY LAB 158
LEVEL 3 COMMUNICATIONS 158
LIMELIGHT NETWORKS 159
NARUS 159
NETAPP 160
NETCETERA 160
NEUSTAR 161
NTT 161
NUTANIX 162
ORACLE 162
PALO ALTO NETWORKS 163
PROLEXIC TECHNOLOGIES 163
RACKSPACE 164
RADWARE 164
SAFENET 165
SCHNEIDER ELECTRIC 165
SIX DEGREES GROUP 166
STAMINUS 166
STRATOSCALE 167
SUNGARD AVAILABILITY SERVICES 167
SYMANTEC 168
TELECITY GROUP 168
TREND MICRO 169
VARMOUR 169
VERISIGN INC. 170
VMWARE 170
CHAPTER 11 APPENDIX ABBREVIATIONS 173

LIST OF TABLES

SUMMARY TABLE GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE,
THROUGH 2020 ($ MILLIONS) 8
TABLE 1 KEY DDOS ATTACKS, 2014 AND 2015 16
TABLE 2 SECURITY TECHNOLOGIES IN A DATA CENTER SECURITY SOLUTION 25
TABLE 3 MAJOR MARKET FORCES AND THEIR EFFECTS 29
TABLE 4 TOP CAUSES OF DATA BREACHES, 2013 (%) 30
TABLE 5 TOP TYPES OF INFORMATION BREACHED 30
TABLE 6 KEY INSIDER DATA THEFTS, 2011-2015 31
TABLE 7 KEY DDOS ATTACKS, 2014 AND 2015 34
TABLE 8 KEY ATTACKS ON GOVERNMENT DEPARTMENTS AND WEBSITES, 2012-2015 35
TABLE 9 MOST FREQUENTLY ATTACKED COUNTRIES 36
TABLE 10 KEY SECTORS WITH HIGH LEVEL OF CONTROL 39
TABLE 11 GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE OF
TECHNOLOGY, 2015 AND 2020 (%) 45
TABLE 12 KEY DDOS MITIGATION AND SECURITY PROVIDERS 46
TABLE 13 GLOBAL MARKET FOR IDS AND IPS TECHNOLOGY FOR DATA CENTER
SECURITY BY REGION, THROUGH 2020 ($ MILLIONS) 47
TABLE 14 KEY IDS AND IPS TECHNOLOGY PROVIDERS 49
TABLE 15 GLOBAL MARKET FOR DDOS TECHNOLOGY FOR DATA CENTER SECURITY
BY REGION, THROUGH 2020 ($ MILLIONS) 51
TABLE 16 KEY DDOS MITIGATION PROVIDERS 52
TABLE 17 GLOBAL MARKET FOR UTM TECHNOLOGY FOR DATA CENTER SECURITY BY
REGION, THROUGH 2020 ($ MILLIONS) 54
TABLE 18 KEY UTM TECHNOLOGY PROVIDERS 55
TABLE 19 GLOBAL MARKET FOR IAM TECHNOLOGY FOR DATA CENTER SECURITY BY
REGION, THROUGH 2020 ($ MILLIONS) 57
TABLE 20 KEY IAM TECHNOLOGY PROVIDERS 57
TABLE 21 GLOBAL MARKET FOR SIEM TECHNOLOGY FOR DATA CENTER SECURITY
BY REGION, THROUGH 2020 ($ MILLIONS) 59
TABLE 22 KEY SIEM TECHNOLOGY PROVIDERS 60
TABLE 23 GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE,
2014-2020 (%) 61
TABLE 24 GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH
2020 ($ MILLIONS) 64
TABLE 25 LIST OF HIGH PROFILE DATA LOSS CASES AMONG FINANCIAL SERVICES
ORGANIZATIONS, 2012-2014 66
TABLE 26 IMPORTANCE OF KEY SECURITY SOLUTIONS IN FINANCIAL SERVICE
SECTOR 67
TABLE 27 GLOBAL MARKET FOR FINANCIAL SERVICES SECTOR BY TECHNOLOGY,
THROUGH 2020 ($ MILLIONS) 68
TABLE 28 MAPPING OF ATTACKERS AND VARIOUS ATTACKS AND IMPACT ON
BANKING SECTOR 69
TABLE 29 INTERNET USER PENETRATION FOR KEY COUNTRIES AS PERCENTAGE OF
POPULATION, 2014 (NO./%) 70
TABLE 30 GLOBAL MARKET FOR RETAIL AND E-COMMERCE SECTOR BY
TECHNOLOGY, THROUGH 2020 ($ MILLIONS) 71
TABLE 31 IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE HEALTHCARE SECTOR 72
TABLE 32 GLOBAL MARKET FOR HEALTHCARE SECTOR BY TECHNOLOGY, THROUGH
2020 ($ MILLIONS) 73
TABLE 33 IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE GOVERNMENT SECTOR 74
TABLE 34 GLOBAL MARKET FOR GOVERNMENT SECTOR BY TECHNOLOGY, THROUGH
2020 ($ MILLIONS) 74
TABLE 35 KEY ATTACKS ON DATA CENTERS IN THE GOVERNMENT SPACE 75
TABLE 36 GLOBAL MARKET FOR ENERGY AND UTILITIES SECTOR BY TECHNOLOGY,
THROUGH 2020 ($ MILLIONS) 76
TABLE 37 GLOBAL MARKET FOR TELECOM SECTOR BY TECHNOLOGY, THROUGH
2020 ($ MILLIONS) 77
TABLE 38 GLOBAL MARKET FOR INFORMATION TECHNOLOGY SECTOR BY
TECHNOLOGY, THROUGH 2020 ($ MILLIONS) 78
TABLE 39 KEY MID-SIZED COMPANIES ACCEPTING DATA CENTER SECURITY
SOLUTIONS 79
TABLE 40 KEY ACQUISITIONS AND MERGERS IN THE DATA CENTER SECURITY AND
RELATED SPACE 83
TABLE 41 FUNDING IN THE DATA CENTER SECURITY AND RELATED SPACE 85
TABLE 42 LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET
(NUMBER) 91
TABLE 43 NUMBER OF PATENTS BY TECHNOLOGIES AND SUB-TECHNOLOGIES 93
TABLE 44 GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, THROUGH
2020 ($ MILLIONS) 96
TABLE 45 KEY U.S. GOVERNMENT DATA BREACHES 98
TABLE 46 AMERICAS MARKET FOR DATA CENTER SECURITY BY INDUSTRY,
THROUGH 2020 ($ MILLIONS) 99
TABLE 47 KEY EUROPEAN GOVERNMENT DATA BREACHES, 2014 AND 2015 101
TABLE 48 EMEA MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH
2020 ($ MILLIONS) 102
TABLE 49 ASIA-PACIFIC MARKET FOR DATA CENTER SECURITY BY INDUSTRY,
THROUGH 2020 ($ MILLIONS) 108

LIST OF FIGURES

SUMMARY FIGURE GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE,
2014-2020 ($ MILLIONS) 8
FIGURE 1 COMPARISON OF VARIOUS STAGES OF IAM TECHNOLOGY 56
FIGURE 2 GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($
MILLIONS) 61
FIGURE 3 GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, 2014-2020
($ MILLIONS) 65
FIGURE 4 AVERAGE ANNUALIZED COST GROWTH OF CYBER CRIME FOR A FINANCIAL
SERVICES COMPANY, 2011-2013 (%) 66
FIGURE 5 LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (%) 92
FIGURE 6 GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, 2014-2020 ($
MILLIONS) 96

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Managed Services Market by Data Center, Infrastructure, Networking, Information, Mobility, Communications, and Security - Global Forecast to 2021

Managed Services Market by Data Center, Infrastructure, Networking, Information, Mobility, Communications, and Security - Global Forecast to 2021

  • $ 7150
  • Industry report
  • September 2016
  • by MarketsandMarkets

“Managed services projected to grow at a CAGR of 10.8%” The managed services market size is estimated to grow from USD 145.33 billion in 2016 to USD 242.45 billion by 2021, at a Compound Annual Growth ...

Data Center Infrastructure Management Market, Information Technology, Telecom, Health Care, Retail) - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2016 - 2024

Data Center Infrastructure Management Market, Information Technology, Telecom, Health Care, Retail) - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2016 - 2024

  • $ 5795
  • Industry report
  • August 2016
  • by Transparency Market Research

Data center infrastructure management (DCIM) is a suite of solutions allowing efficient monitoring and management of a datacenter in terms of the optimization of data center space, power consumption, and ...

Data Center Liquid Cooling Market by Type of Solution, Service, Data Center Type, Industries, and Region - Global Forecast to 2021

Data Center Liquid Cooling Market by Type of Solution, Service, Data Center Type, Industries, and Region - Global Forecast to 2021

  • $ 5650
  • Industry report
  • November 2016
  • by MarketsandMarkets

“Growing need for eco-friendly data center cooling solutions is one of the drivers driving the data center liquid cooling market” The global data center liquid cooling size is estimated to grow from ...

Global Data Center Ups Market

October 2016 $ 4250

ref:plp2015

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.