▶ 調査レポート

脅威インテリジェンスの世界市場2021-2026:成長・動向・新型コロナの影響・市場予測

• 英文タイトル:Threat Intelligence Market - Growth, Trends, COVID-19 Impact, and Forecasts (2021 - 2026)

Mordor Intelligenceが調査・発行した産業分析レポートです。脅威インテリジェンスの世界市場2021-2026:成長・動向・新型コロナの影響・市場予測 / Threat Intelligence Market - Growth, Trends, COVID-19 Impact, and Forecasts (2021 - 2026) / MRC2103B164資料のイメージです。• レポートコード:MRC2103B164
• 出版社/出版日:Mordor Intelligence / 2021年1月
• レポート形態:英文、PDF、120ページ
• 納品方法:Eメール(受注後2-3営業日)
• 産業分類:情報&通信技術
• 販売価格(消費税別)
  Single User¥629,000 (USD4,250)▷ お問い合わせ
  Team User¥703,000 (USD4,750)▷ お問い合わせ
  Corporate License¥1,110,000 (USD7,500)▷ お問い合わせ
• ご注文方法:お問い合わせフォーム記入又はEメールでご連絡ください。
• お支払方法:銀行振込(納品後、ご請求書送付)
レポート概要
本書では、脅威インテリジェンスの世界市場を調査対象とし、イントロダクション、調査手法、エグゼクティブサマリー、市場動向、種類別(ソリューション、サービス)分析、展開別(オンプレミス、クラウド)分析、産業別(金融、IT・通信、小売、製造、医療)分析、地域別分析、競争状況、投資分析、市場機会・将来動向などを整理いたしました。
・イントロダクション
・調査手法
・エグゼクティブサマリー
・市場動向
・脅威インテリジェンスの世界市場規模:種類別(ソリューション、サービス)
・脅威インテリジェンスの世界市場規模:展開別(オンプレミス、クラウド)
・脅威インテリジェンスの世界市場規模:産業別(金融、IT・通信、小売、製造、医療)
・脅威インテリジェンスの世界市場規模:地域別
・競争状況
・投資分析
・市場機会・将来動向

The threat intelligence market was valued at USD 5.28 billion in 2020 and is expected to reach USD 13.9 billion by 2026, with a CAGR of 12.9%, during the forecast period (2021 – 2026). In the past few years, there has been a paradigm shift between attack source, targets, destination attack profiles, and different types of technologies. While the attack types and targets can be revealing, attack sources continue to be problematic because of the difficulties in assigning attribution for a specific attack.

– Threat intelligence market is primarily driven by increasing uniqueness in the attacking techniques leaving the data vulnerable. Also, the rise in volumes of data generated by different enterprises is the key factor driving the market.
– According to IBM Cost of Data Breach Study, 2018 report, 48 percent of all breaches were caused by malicious or criminal attacks. Human Error accounted for 27%, and system glitch recorded 25% of the root cause of data breach.

Key Market Trends

Retail Segment is Expected to Occupy a Significant Share

Retail is witnessing huge data generation through various channel modes, such as social sites, blogs, and data generated from different apps. Much of the unstructured data produced is left unused, which provides valuable information.
– The digital transformation is not limited to the E-commerce channel, as more number of connected devices have made their way into physical stores in the form of kiosks, point-of-sale (POS) systems, and handheld devices, with all of them being designed to collect and access customer information.
– According to IBM, retail experienced 11% of total attacks in 2018. To cope up with the cyber threats, retailers have started making significant investments in the threat intelligence domain to determine the impact of these security and data attacks, thus predicting and disarming them.

North America to Hold Largest Market Share

– The BFSI sector in the United States has more than 1 exabyte of stored data. These data generate from various sources, such as credit/debit card histories, customer bank visits, banking volumes, call logs, account transactions, and web interactions.
– Due to the high availability of adequate infrastructure, the presence of numerous global financial institutions increased adoption of IoT devices and internet users is expected to drive the growth of threat intelligence solutions in the North America region.
– According to the FBI Internet Crime report 2017, more than 2.14 million complaints related to data loss has been issued. Further, Banks and Capital Market firms are using threat intelligence solutions to cope with data breaches and fraud.

Competitive Landscape

The threat intelligence market is dominated by few major players with more secure software solutions being launched. McAfee, Symantec Corporation and Anomali, Inc. are few among others with dedicated solutions offerings for threat intelligence.

– In March 2019, Saudi Telecom Company (STC) signed an agreement with Anomali, a US-based cybersecurity company, to support with high-quality information on sources of threats and cyber attacks, boosting the demand in telecom segment.
– In March 2019, SlashNext announced its real-time phishing threat intelligence service. Users can get real-time, API access to a continuously updated list of phishing URLs, domains, and IPs as fast as they are discovered.

Reasons to Purchase this report:

– The market estimate (ME) sheet in Excel format
– 3 months of analyst support

レポート目次

1 INTRODUCTION

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET DYNAMICS
4.1 Market Overview
4.2 Industry Value Chain Analysis
4.3 Industry Attractiveness – Porter’s Five Force Analysis
4.3.1 Threat of New Entrants
4.3.2 Bargaining Power of Buyers/Consumers
4.3.3 Bargaining Power of Suppliers
4.3.4 Threat of Substitute Products
4.3.5 Intensity of Competitive Rivalry
4.4 Introduction to Market Drivers and Restraints
4.5 Market Drivers
4.5.1 Growing Incidences of Security Breaches and Cyber Crime
4.5.2 Evolution of Next-generation Security Solutions
4.6 Market Restraints
4.6.1 Low Data Security Budget and High Installation Cost of Solution

5 MARKET SEGMENTATION
5.1 By Type
5.1.1 Solutions
5.1.2 Services
5.2 By Deployment
5.2.1 On Premise
5.2.2 Cloud
5.3 By End-user Industries
5.3.1 Banking, Financial Services, and Insurance (BFSI)
5.3.2 IT and Telecom
5.3.3 Retail
5.3.4 Manufacturing
5.3.5 Healthcare
5.3.6 Other End-user Industries
5.4 Geography
5.4.1 North America
5.4.1.1 United States
5.4.1.2 Canada
5.4.2 Europe
5.4.2.1 United Kingdom
5.4.2.2 Germany
5.4.2.3 France
5.4.2.4 Rest of Europe
5.4.3 Asia-Pacific
5.4.3.1 China
5.4.3.2 Japan
5.4.3.3 India
5.4.3.4 Australia
5.4.3.5 Rest of Asia-Pacific
5.4.4 Latin America
5.4.4.1 Mexico
5.4.4.2 Brazil
5.4.4.3 Rest of Latin America
5.4.5 Middle East & Africa
5.4.5.1 United Arab Emirates
5.4.5.2 South Africa
5.4.5.3 Rest of Middle-East & Africa

6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Juniper Networks, Inc.
6.1.2 AlienVault, Inc.
6.1.3 Farsight Security, Inc.
6.1.4 Trend Micro Incorporated
6.1.5 LogRhythm, Inc.
6.1.6 F-Secure Corporation
6.1.7 Check Point Software Technologies Ltd
6.1.8 Dell Inc.
6.1.9 IBM Corporation
6.1.10 Webroot Inc.
6.1.11 Fortinet, Inc.
6.1.12 Broadcom Inc. (Symantec Corporation)
6.1.13 McAfee, LLC
6.1.14 LookingGlass Cyber Solutions, Inc.
6.1.15 FireEye, Inc.

7 INVESTMENT ANALYSIS

8 MARKET OPPORTUNITIES AND FUTURE TRENDS