1 Introduction (Page No. – 14)
1.1 Objectives of the Study
1.2 Market Definition
1.3 Market Scope
1.3.1 Markets Covered
1.3.2 Years Considered for the Study
1.4 Currency
1.5 Limitations
1.6 Stakeholders
2 Research Methodology (Page No. – 17)
2.1 Research Data
2.1.1 Secondary Data
2.1.1.1 Key Data From Secondary Sources
2.1.2 Primary Data
2.1.2.1 Key Data From Primary Sources
2.1.2.2 Key Industry Insights
2.1.2.3 Breakdown of Primary Interviews
2.2 Market Size Estimation
2.2.1 Bottom-Up Approach
2.2.2 Top-Down Approach
2.3 Market Breakdown and Data Triangulation
2.4 Research Assumptions
3 Executive Summary (Page No. – 25)
4 Premium Insights (Page No. – 30)
4.1 Attractive Market Opportunities in The Market
4.2 Advanced Persistent Threat Protection Market, By Component
4.3 Advanced Persistent Threat Protection Global Market
4.4 Lifecycle Analysis, By Region
5 Advanced Persistent Threat Protection Market Overview (Page No. – 33)
5.1 Introduction
5.2 Market Evolution
5.3 Market Segmentation
5.3.1 By Solution
5.3.2 By Service
5.3.3 By Deployment
5.3.4 By Organization Size
5.3.5 By Vertical
5.3.6 By Region
5.4 Market Dynamics
5.4.1 Drivers
5.4.1.1 Rise in the Number of Targeted and Advanced Attacks
5.4.1.2 Strict Government Regulations for Cybersecurity
5.4.1.3 Rise in Cloud Adoption Across Enterprises
5.4.2 Restraints
5.4.2.1 Lack of Knowledge Across Enterprises Regarding Apts
5.4.2.2 Shortage of Cybersecurity Talent
5.4.3 Opportunities
5.4.3.1 Emergence of Threat Intelligence Solutions to Mitigate Apts
5.4.3.2 Advanced and Emerging Managed Security Services
5.4.4 Challenges
5.4.4.1 Diverse Nature of Sophisticated Threats
5.4.4.2 Implementation of Technology for Apt Protection
5.5 Regulatory Implications
5.6 Innovation Spotlight
6 Advanced Persistent Threat Protection Market: Industry Trends (Page No. – 42)
6.1 Introduction
6.2 Value Chain Analysis
6.3 Strategic Benchmarking
6.3.1 Strategic Benchmarking: Technology Integration and Product Enhancement
6.3.2 Strategic Benchmarking: Mergers, Acquisitions, and Strategic Agreements
6.4 Demand Overview
7 Advanced Persistent Threat Protection Market Analysis, By Solution (Page No. – 47)
7.1 Introduction
7.2 Security Information and Event Management (SIEM)
7.3 Endpoint Protection
7.4 Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
7.5 Sandboxing
7.6 Next Generation Firewall
7.7 Forensics Analysis
7.8 Others
8 Advanced Persistent Threat Protection Market Analysis, By Service (Page No. – 55)
8.1 Introduction
8.2 Managed Services
8.3 Professional Services
9 Market Analysis, By Deployment (Page No. – 59)
9.1 Introduction
9.2 Cloud
9.3 On-Premises
10 Market Analysis, By Organization Size (Page No. – 63)
10.1 Introduction
10.2 Small and Medium Businesses (SMBS)
10.3 Large Enterprises
11 Advanced Persistent Threat Protection Market Analysis, By Vertical (Page No. – 67)
11.1 Introduction
11.2 Government and Defense
11.3 Banking, Financial Services, and Insurance (BFSI)
11.4 IT and Telecom
11.5 Healthcare
11.6 Retail
11.7 Energy and Utilities
11.8 Manufacturing
11.9 Transportation
11.10 Education
11.11 Others
12 Geographic Analysis (Page No. – 77)
12.1 Introduction
12.1.1 Regional Regulations
12.2 North America
12.3 Europe
12.4 Asia-Pacific (APAC)
12.5 Middle East and Africa (MEA)
12.6 Latin America
13 Competitive Landscape (Page No. – 100)
13.1 Overview
13.2 Competitive Situation & Trends
13.2.1 New Product Launches
13.2.2 Agreements, Partnerships, Collaborations, and Joint Ventures, 2011-2014
13.2.3 Mergers & Acquisitions
13.2.4 Expansions
13.2.5 Local vs External Supplier Presence
13.2.6 Supplier Overview
14 Company Profiles (Page No. – 107)
14.1 Introduction
14.2 Symantec
14.2.1 Business Overview
14.2.2 Recent Developments
14.2.3 Products and Services Offered
14.2.4 MnM View
14.2.4.1 Key Strategies
14.2.4.2 SWOT Analysis
14.3 Trend Micro, Inc.
14.3.1 Business Overview
14.3.2 Recent Developments
14.3.3 Products and Services Offered
14.3.4 MnM View
14.3.4.1 Key Strategies
14.3.4.2 SWOT Analysis
14.4 Fireeye, Inc.
14.4.1 Business Overview
14.4.2 Recent Developments
14.4.3 Products and Services Offered
14.4.4 MnM View
14.4.4.1 Key Strategies
14.4.4.2 SWOT Analysis
14.5 Fortinet, Inc.
14.5.1 Business Overview
14.5.2 Recent Developments
14.5.3 Products and Services Offered
14.5.4 MnM View
14.5.4.1 Key Strategies
14.5.4.2 SWOT Analysis
14.6 Intel Security
14.6.1 Business Overview
14.6.2 Recent Developments
14.6.3 Products and Services Offered
14.6.4 MnM View
14.6.4.1 Key Strategies
14.6.4.2 SWOT Analysis
14.7 Palo Alto Networks
14.7.1 Business Overview
14.7.2 Recent Developments
14.7.3 Products and Services Offered
14.8 Blue Coat Systems
14.8.1 Business Overview
14.8.2 Recent Developments
14.8.3 Products and Services Offered
14.9 Webroot, Inc.
14.9.1 Business Overview
14.9.2 Recent Developments
14.9.3 Products and Services Offered
14.10 Dell Secureworks
14.10.1 Business Overview
14.10.2 Recent Developments
14.10.3 Products and Services Offered
14.11 Websense, Inc.
14.11.1 Business Overview
14.11.2 Recent Developments
14.11.3 Products and Services Offered
15 Other Significant Vendors (Page No. – 131)
15.1 Logrhythm
15.1.1 Business Overview
15.1.2 Solutions and Services Offered
15.1.3 Key Strategies
15.2 Invincea
15.2.1 Business Overview
15.2.2 Solutions Offered
15.2.3 Key Strategies
15.3 Reversinglabs
15.3.1 Business Overview
15.3.2 Services Offered
15.3.3 Key Strategies
15.4 Panda Security
15.4.1 Business Overview
15.4.2 Solutions Offered
15.4.3 Key Strategies
15.5 Digital Guardian
15.5.1 Business Overview
15.5.2 Products Offered
15.5.3 Key Strategies
16 Appendix (Page No. – 135)
16.1 Industry Experts
16.2 Discussion Guide
16.3 Introduction RT: Real-Time Market Intelligence
16.4 Available Customizations
16.5 Related Reports
Table 1 Advanced Persistent Threat Protection Market Size and Growth, 2013-2020 (USD Million, Y-O-Y %)
Table 2 Drivers: Impact Analysis
Table 3 Restraints: Impact Analysis
Table 4 Opportunities: Impact Analysis
Table 5 Challenges: Impact Analysis
Table 6 Innovation Spotlight: Latest Technology Innovations
Table 7 Market Size, By Solution, 2013-2020 (USD Million)
Table 8 SIEM: Market Size, By Region, 2013-2020 (USD Million)
Table 9 Endpoint Protection: Market Size, By Region, 2013-2020 (USD Million)
Table 10 IDS/IPS: Market Size, By Region, 2013-2020 (USD Million)
Table 11 Sandboxing: Market Size, By Region, 2013-2020 (USD Million)
Table 12 Next Generation Firewall: Market Size, By Region, 2013-2020 (USD Million)
Table 13 Forensics Analysis: Market Size, By Region, 2013-2020 (USD Million)
Table 14 Others: Market Size, By Region, 2013-2020 (USD Million)
Table 15 Advanced Persistent Threat Protection Market Size, By Service, 2013-2020 (USD Million)
Table 16 Managed Services: Market Size, By Region, 2013-2020 (USD Million)
Table 17 Professional Services: Market Size, By Region, 2013-2020 (USD Million)
Table 18 Market Size, By Deployment, 2013-2020 (USD Million)
Table 19 Cloud: Market Size, By Region, 2013-2020 (USD Million)
Table 20 On-Premises: Market Size, By Region, 2013-2020 (USD Million)
Table 21 Market Size, By Organization Size, 2013-2020 (USD Million)
Table 22 SMBS: Market Size, By Region, 2013-2020 (USD Million)
Table 23 Large Enterprises: Market Size, By Region, 2013-2020 (USD Million)
Table 24 Advanced Persistent Threat Protection Security Market Size, By Vertical, 2013-2020 (USD Million)
Table 25 Government and Defense: Market Size, By Region, 2013-2020 (USD Million)
Table 26 BFSI: Market Size, By Region, 2013-2020 (USD Million)
Table 27 IT and Telecom: Market Size, By Region, 2013-2020 (USD Million)
Table 28 Healthcare: Market Size, By Region, 2013-2020 (USD Million)
Table 29 Retail: Market Size, By Region, 2013-2020 (USD Million)
Table 30 Energy and Utilities: Market Size, By Region, 2013-2020 (USD Million)
Table 31 Manufacturing: Market Size, By Region, 2013-2020 (USD Million)
Table 32 Transportation: Market Size, By Region, 2013-2020 (USD Million)
Table 33 Education: Market Size, By Region, 2013-2020 (USD Million)
Table 34 Others: Market Size, By Region, 2013-2020 (USD Million)
Table 35 Regional Regulations for Cybersecurity
Table 36 Advanced Persistent Threat Protection Market Size, By Region, 2013-2020 (USD Million)
Table 37 North America: Market Size, By Component, 2013-2020 (USD Million)
Table 38 North America: Market Size, By Solution, 2013-2020 (USD Million)
Table 39 North America: Market Size, By Service, 2013-2020 (USD Million)
Table 40 North America: Market Size, By Deployment, 2013-2020 (USD Million)
Table 41 North America: Market Size, By Organization Size, 2013-2020 (USD Million)
Table 42 North America: Market Size, By Vertical, 2013-2020 (USD Million)
Table 43 Europe: Market Size, By Component, 2013-2020 (USD Million)
Table 44 Europe: Market Size, By Solution, 2013-2020 (USD Million)
Table 45 Europe: Market Size, By Service, 2013-2020 (USD Million)
Table 46 Europe: Market Size, By Deployment, 2013-2020 (USD Million)
Table 47 Europe: Market Size, By Organization Size, 2013-2020 (USD Million)
Table 48 Europe: Market Size, By Vertical, 2013-2020 (USD Million)
Table 49 Asia-Pacific: Market Size, By Component, 2013-2020 (USD Million)
Table 50 Asia-Pacific: Market Size, By Solution, 2013-2020 (USD Million)
Table 51 Asia-Pacific: Market Size, By Service, 2013-2020 (USD Million)
Table 52 Asia-Pacific: Market Size, By Deployment, 2013-2020 (USD Million)
Table 53 Asia-Pacific: Market Size, By Organization Size, 2013-2020 (USD Million)
Table 54 Asia-Pacific: Market Size, By Vertical, 2013-2020 (USD Million)
Table 55 Middle East and Africa: Market Size, By Component, 2013-2020 (USD Million)
Table 56 Middle East and Africa: Market Size, By Solution, 2013-2020 (USD Million)
Table 57 Middle East and Africa: Market Size, By Service, 2013-2020 (USD Million)
Table 58 Middle East and Africa: Market Size, By Deployment, 2013-2020 (USD Million)
Table 59 Middle East and Africa: Market Size, By Organization Size, 2013-2020 (USD Million)
Table 60 Middle East and Africa: Market Size, By Vertical, 2013-2020 (USD Million)
Table 61 Latin America: Market Size, By Component, 2013-2020 (USD Million)
Table 62 Latin America: Market Size, By Solution, 2013-2020 (USD Million)
Table 63 Latin America: Market Size, By Service, 2013-2020 (USD Million)
Table 64 Latin America: Market Size, By Deployment, 2013-2020 (USD Million)
Table 65 Latin America: Market Size, By Organization Size, 2013-2020 (USD Million)
Table 66 Latin America: Market Size, By Vertical, 2013-2020 (USD Million)
Table 67 New Product Launches, 2011-2015
Table 68 Agreements, Partnerships, Collaborations, and Joint Ventures
Table 69 Mergers and Acquisitions, 2010-2014
Table 70 Expansions, 2010-2014
List of Figures (53 Figures)
Figure 1 Global Advanced Persistent Threat Protection Market: Research Design
Figure 2 Breakdown of Primary Interviews: By Company Type, Designation, and Region
Figure 3 Market Size Estimation Methodology: Bottom-Up Approach
Figure 4 Market Size Estimation Methodology: Top-Down Approach
Figure 5 Data Triangulation
Figure 6 Services are Estimated to Grow at the Highest CAGR During the Forecast Period
Figure 7 Forensic Analysis to Grow at the Highest CAGR From 2015 to 2020
Figure 8 Professional Services to Grow at the Highest CAGR During the Forecast Period
Figure 9 Cloud Deployment to Grow at the Highest CAGR During the Forecast Period
Figure 10 Small and Medium Businesses to Grow at the Highest CAGR From 2015 to 2020
Figure 11 Government & Defense Sector to Exhibit the Highest Adoption Rate From 2015 to 2020
Figure 12 North America is Estimated to Hold the Largest Share of the Advanced Persistent Threat Protection Market in 2015
Figure 13 Rise in Number of Advanced and Targeted Threats Will Propel the Market
Figure 14 Service Component to Grow at the Highest Rate During the Forecast Period
Figure 15 SIEM to Hold the Largest Share of This Market, By Solution
Figure 16 Asia-Pacific to Grow at the Highest Rate During the Forecast Period
Figure 17 Evolution of the Market
Figure 18 Market, By Solution
Figure 19 Market, By Service
Figure 20 Market, By Deployment
Figure 21 Market, By Organization Size
Figure 22 Market, By Vertical
Figure 23 Market, By Region
Figure 24 Drivers, Restraints, Opportunities, and Challenges of the Advanced Persistent Threat Protection Market
Figure 25 Value Chain Analysis
Figure 26 Strategic Benchmarking: Technology Integration and Product Enhancement
Figure 27 Strategic Benchmarking: Mergers, Acquisitions, and Strategic Agreements
Figure 28 Demand Overview: Number of Cyber Attacks, By Vertical, Q3, 2014 –Q2, 2015
Figure 29 Forensic Analysis is Expected to Grow at the Highest CAGR During the Forecast Period
Figure 30 Professional Services to Grow at the Highest CAGR During the Forecast Period
Figure 31 Cloud-Based Deployment Estimated to Grow at the Highest CAGR During the Forecast Period
Figure 32 SMBS to Grow at the Highest CAGR During the Forecast Period
Figure 33 Government and Defense Vertical to Exhibit the Highest Adoption During the Forecast Period
Figure 34 North America is Expected to Hold the Largest Share in the Global Market
Figure 35 Regional Snapshot: Asia-Pacific is the Emerging Region in the Market
Figure 36 Asia-Pacific: an Emerging Region in the Advanced Persistent Threat Protection Market
Figure 37 North America Market Snapshot: Presence of Major Security Vendors is an Important Factor Contributing Towards the Growth
Figure 38 Asia-Pacific Market Snapshot: Rise in Number of Advanced Attacks is A Major Factor Contributing Towards the Growth of the Market
Figure 39 Companies Adopted New Product Launch as the Key Growth Strategy During the Period of 2011-2015
Figure 40 Fireeye Success Factors Grew at the Highest Growth Rate Between 2012 and 2014
Figure 41 Battle for Market Share: New Product Launches is the Key Strategy of the Leading Market Players
Figure 42 Geographical Mix of Top Players
Figure 43 Geographic Revenue Mix of Top Players
Figure 44 Symantec: Company Snapshot
Figure 45 Symantec: SWOT Analysis
Figure 46 Trend Micro, Inc.: Company Snapshot
Figure 47 Trend Micro: SWOT Analysis
Figure 48 Fireeye, Inc.: Company Snapshot
Figure 49 Fireeye, Inc.: SWOT Analysis
Figure 50 Fortinet, Inc.: Company Snapshot
Figure 51 Fortinet, Inc.: SWOT Analysis
Figure 52 Intel Security: SWOT Analysis
Figure 53 Palo Alto Networks: Company Snapshot
【レポートのキーワード】
持続的標的型攻撃(APT)、APT攻撃、APT対策、セキュリティ、SIEM、侵入検知、サンドボックス、次世代ファイアウォール、法医学分析