SlideShare a Scribd company logo
1 of 12
Prepared by Netscribes Inc.
Proprietary and Confidential, Copyright Ā© 2018, Netscribes, Inc. All Rights Reserved
The content of this document is confidential and meant for the review of the recipient.
Disclaimer: The names or logos of other companies and products mentioned herein are the trademarks of their respective owners
1.1 Market scope and segmentation
Globalcybersecuritymarket
Segments Differentiation
Based on solution
Based on end use industry
ā€¢ Identity and access management (IAM)
ā€¢ Encryption
ā€¢ Governance, risk and compliance
ā€¢ Unified threat management (UTM)
ā€¢ Security information and event management (SIEM)
ā€¢ Aerospace
ā€¢ Financial services
ā€¢ Telecommunication
ā€¢ Healthcare
ā€¢ Others
Based on region
North America
Europe
Latin America
The Middle East and Africa
Asia-Pacific
19
3
Market definitions
IAM is a collection of technologies and
processes that help in managing digital or
electronic identity.
Identity and access management (IAM)
Encryption is the use of technology to
convert data into an unrecognizable format
so that it cannot be viewed by unauthorized
parties. A secret key or a password is
required to read an encrypted file.
Encryption
UTM is an integration of multiple security
and service features in a single platform
that protects the user from blended
threats.
Unified threat management (UTM)
The cybersecurity market comprises those technologies that protect computers, networks, applications, and data against cyberthreats, i.e., unauthorized access with mala fide intent.
SIEM is an approach to security
management that combines security
information management (SIM) and
security event management (SEM). This
approach allows real-time identification,
monitoring, recording, and analysis of
security events.
Security information and
event management (SIEM)
1.3 Executive summary (2/2)
Overview
Trends
ā€¢ The global cybersecurity market is expected to expand at a compound annual growth rate (CAGR) of 11.6% during the 2017-2022 period, reaching a
value of USD 173.19 Bn by 2022. The market is primarily driven by the risk and compliance segment, which accounted for the highest revenue in
2016, generating a 50.4% share. This is a result of the large scale adoption of various cybersecurity solutions, as per compliance norms, across
different industrial and commercial sectors.
ā€¢ Among the applications of cybersecurity systems across various end use industries, the financial sector held the largest market share in 2016, and is
anticipated to maintain its dominance in the coming years.
ā€¢ Increased reliance on the Internet, coupled with the rapid growth in smartphone usage in the corporate environment are expected
to boost the requirement for cybersecurity in order to provide protection against security breaches.
ā€¢ Spending on information security products will reach approximately USD 124 Bn by 2019, a large portion of it being spent on
cybersecurity products and solutions. High awareness, especially in the corporate context, is aiding in its fast adoption.
ā€¢ 5G networks will allow an increasing number of devices to be connected, and will hence require even stricter security features. As a
result, cybersecurity protocols and solutions will need to evolve to keep up with these changes.
ā€¢ There has been an increase in the adoption of hardware-based authentication that allows cryptographic information to be stored
physically away from the computing devices, thus minimizing chances of cyberattacks.
ā€¢ Artificial intelligence (AI) and machine learning are enhancing the security standards of cybersecurity solutions. Also, embedded
automation in these products requires minimum manual intervention, further reducing the risks.
ā€¢ Recent legislations such as General Data Protection Regulation (GDPR) in the European Union (EU), and the Right to Privacy Act in
India are creating greater awareness for protecting private data. Moreover, countries like Israel and Singapore are collaborating to
develop expertise in the cybersecurity space.
ā€¢ Organizations are creating huge volumes of data from various sources and want to utilize it to their benefit. However, the centralized nature of big data
stores are creating new security challenges, since centralized data stores are highly vulnerable to cyberattacks.
ā€¢ Threats tend to evolve faster than their solutions. Cybersecurity providers are in a constant race to identify the latest threats and address them. However,
incidents of data loss continue to increase globally.
XX
XX
173.19
2014 2017 2022
4
USD Bn
2.1 Global - market overview
Geography-wise market revenue (USD bn)
NorthAmerica
Europe
Asia-Pacific
LatinAmerica
The
Middle
Eastand
Africa
ā€¢ 2016-USD XX Bn
ā€¢ 2022-USD XX Bn
ā€¢ 2016-USD XX Bn
ā€¢ 2022-USD XX Bn
ā€¢ 2016-USD XX Bn
ā€¢ 2022-USD XX Bn
ā€¢ 2016-USD XX Bn
ā€¢ 2022-USD XX Bn
ā€¢ 2016-USD XX Bn
ā€¢ 2022-USD XX Bn
Fig 1: Market attractiveness analysis based on geography
5
CAGR(%)
Note: The size of the circle denotes the
regional revenues in USD Bn
Market attractiveness (based on absolute growth from 2017 to
2022)
North America
Europe
The Middle East
and Africa
Latin America
Asia-Pacific
2.2 Global market drivers
Rapid digitalization coupled with increasing adoption of information and communications technology (ICT) devices
ā€¢ Rapid digitalization has resulted in the increased adoption of various ICTs, including cloud computing, smart grids, optic Wi-Fi, cognitive technologies, and new payment
models, among others. People, organizations, and governments are using these products to transfer confidential data over the Internet, which increase the chances of
unauthorized access to data. Again, the rapid change in business environments, owing to the adoption of the bring-your-own-device (BYOD) concept, makes it necessary
to have efficient multilayered cybersecurity systems that provide access to corporate information, along with minimizing risk, and maintaining compliance.
ā€¢ Using cybersecurity solutions to implement security and protective measures regarding data exchange, and to create an environment of digital trust and safety are thus
becoming a necessity.
Spending on information security products continues to increase
ā€¢ The global expenditure on information security products shows an increasing trend, from USD 101 Bn in 2017 to USD 124 Bn in 2019, as per research estimates. A large
portion of this expense will be for cybersecurity products and solutions. One of the possible reasons for the higher adoption among various sectors is increased
awareness regarding security and its associated issues.
ā€¢ Data and information loss has resulted in significant financial losses for organizations in the past. Each of these instances becomes a driver for other organizations to
implement cybersecurity platforms or solutions.
6
Cybersecurity will evolve with 5G
ā€¢ With the advent of the 5G era, more and more devices will be connected using Internet of Things (IoT). The management of data on these devices will become far more
complex than it is today. However, compared to the monolithic networks that we presently have, 5G will have all its functions virtualized. Since, virtualization means
greater mutual authentication between users and networks, 5G will restrict cyberattacks to some extent.
ā€¢ However, the chances of denial of services attacks (DDoS) will persist. In the 2016 Dyn cyberattack, unsecured IoT devices, such as baby monitors, printers, etc., were
hacked as they were provided with default passwords. The impact might be manifold with 5G. Hence, the expected high adoption of 5G in the next few years will also
necessitate the evolution of cybersecurity technologies.
5G
3.1 Identity and access management (IAM)
Growth drivers
IAM
XX XX XX XX XX XX
XX
XX
42.41
2014 2015 2016 2017 2018 2019 2020 2021 2022
CAGR (2017-2022): XX%
Fig 4: Revenue contribution ā€“ IAM
Challenges
Major trendsIn general, the IoT vendors focus less on maintaining privacy,
providing authentication and managing usersā€™ identities.
However, IoT platform product managers and service
providers have started to incorporate various device identities
and access technologies into IoT platforms to simplify security
designs.
IAM is currently carried out in a decentralized manner using
Blockchain technology to prevent changes in personal
information.
The traditional user authentication is rule-based. The next
generation of adaptive access is however based on the
combined rules of machine learning and advanced analytics.
An organization sets a baseline for user behaviour, creating a
user group. Through unsupervised machine learning, the user
behaviour is tracked and corrective action is taken, if any
anomaly is detected.
ā€¢ With single-factor authentication being no longer acceptable
in the growing digital world, stronger mechanisms such as
multi-factor and biometric authentication are needed to
improve security, which are considered crucial for the growth
of IAM.
ā€¢ Stolen credentials of employees is the leading facilitator of
system hacking cases and data breach incidents, which is
expected to cost businesses around USD 2 Tn by 2019,
globally. In fact, stolen employee passwords are responsible
for 90% of cyberattacks, according to leading industry and
government reports. These are pushing organizations to
acquire IAM solutions.
ā€¢ The IoT will connect almost every object to the Internet,
increasing the risk of cyberattacks. IAM solutions help to
create an identity lifecycle for IoT devices, also called Identity
of Things (IDoT), and safeguard the data during the lifecycle. ā€¢ Application of IAM in the software as a service (SaaS)
model makes it easier for users to access information.
However, it becomes complex with the rapidly
increasing number of applications. Each application
requires different passwords and expiration cycles. This
diminishes user productivity as they spend time trying
to manage, reset and remember the data.
ā€¢ IAM products are expensive for extending or
integrating with cloud applications.
7
13.1 North America - market overview
Overview
North America
XX XX XX XX XX XX
XX
XX
X
2014 2015 2016 2017 2018 2019 2020 2021 2022
CAGR (2017-2022): XX%
Market drivers
Major trends
2
Hackers are using novel techniques to break into
systems. Advanced technologies such as deception
technology are being used to counter those attacks.
For instance, decoy systems such as Honeypot are
used to imitate the actual system containing
confidential data. This works as an active bait for
hackers, and once they try to hack the decoy
systems, they are blocked from entering other
system applications.
1
ā€¢ North America held the largest market share in the
cybersecurity market across different regions in 2016,
generating XX% of the global revenue.
ā€¢ The United States (U.S.) cybersecurity market leads in
terms of overall expenditure on cybersecurity
solutions, and is expected to maintain its superior
position in the coming years.
ā€¢ Recently, the Defense Secretary of U.S. established a
task force to recommend ways to curb theft of critical
technologies by competing nations.
ā€¢ Across the U.S., private and public agencies are
implementing cybersecurity systems in order to
safeguard their stakeholders.
ā€¢ Increasing investment in cybersecurity systems by various
corporate investors such as Intel Capital, Google Ventures,
Qualcomm Ventures, and Juniper Networks, among others, is
another important factor anticipated to augment the growth
of the cybersecurity market in North America. Since 2017,
various corporate investors have invested USD 1.47 Bn in
different cyber security companies across 191 deals.
ā€¢ The 2019 U.S. budget has proposed an allocation of USD
14.98 Bn for key initiatives and research across different
cybersecurity technologies. This is an increase from USD 13.1
Bn in 2017 and USD 14.4 Bn in 2018.
Managed IT services that help organizations in managing
endpoint security are on the rise in the U.S. The services
include regular updates and patches, installing firewalls,
24/7 monitoring, and troubleshooting, among others. This
is especially beneficial for small and medium businesses
(SMBs), since they donā€™t have enough expertise to deal
with the cyberattacks.
Fig 64: Revenue contribution ā€“ North America
8
Symantec is a leading cybersecurity company that offers security products and solutions to small and medium enterprises. These solutions provide active protection
against malware, advanced business threats, and other cyberattacks. The company provides cybersecurity solutions across verticals such as government, retail, and
other financial services.
Company snapshot
Products/services
14.1 Company overview ā€“ Symantec
ā€¢ In July 2017, Symantec acquired Israel-based Fireglass. Through
this acquisition, the company aimed to integrate its cyber
defense platform, and extend its leadership in e-mail protection,
and secure web gateway on cloud and on-premises.
ā€¢ On 6 January, 2017, Symantec Corp. announced the takeover of
SurfEasy, Inc., a leading Virtual Private Network (VPN) provider.
The company would be added to Symantec's Consumer Business
Unit to extend VPN to the portfolio of customersā€™ digital safety
solutions to help consumers protect their information.
Recent initiatives
Global presence
Geographic share of revenue
Growth strategy
Year of establishment: 1982
Headquarters: Mountain View, California,
U.S.
Key people: Daniel H. Schulman
(Chairman)
Traded as: NASDAQ: SYMC
NASDAQ-100 Component
Employee strength: 13,000
Total revenue: USD 4,019 Mn (2017)
Website: www.symantec.com
ā€¢ Endpoint and hybrid cloud
security
ā€¢ Information protection
ā€¢ Messaging security
ā€¢ Web and cloud security
ā€¢ Small business security
solutions
The companyā€™s growth strategy involves delivering unified
security analytics platforms that would provide big data
analytics and visibility into real-time global security threats.
Symantec utilizes its analytics platform to provide the best-
in-class consumer and enterprise security products and
cybersecurity services. The company provides holistic
security services from monitoring to incident responses
and even threat intelligence.
59%
25%
16%
Americas
Europe, the
Middle East and
Africa
Asia-Pacific and
Japan
9
Appendix
10
Research methodology
The study begins with identifying the right research question(s). The question depends on what we are going to achieve by conducting the research or what we want
to convey to the prospective customers through this research. Next we identify the logical steps to arrive at the answers to the question(s). These logical steps form
our research objectives. The research objectives provide us a guideline regarding what information we need to conduct analysis. We strongly believe that clear
objectives will lead to clear results about the given market
The next stage of the research is conducted utilizing the secondary sources of information, process called desk/secondary research. Netscribes Inc. has a considerable
volume of information in both quantitative and qualitative forms, across all major industries and its sectors. Also, we conduct in-depth study of the market,
understanding its key stakeholders, drivers, trends, challenges and opportunities globally covering major regions such as North America, Latin America, Europe, Asia
Pacific, and the Middle East and Africa. The key sources consumed for these research include (but not limited to) the following:
ļ¶ Financial reports published by the key market players
ļ¶ Government and other official sources including the National Statistics
ļ¶ National and International trade associations
ļ¶ Paid databases
ļ¶ Other reliable sources
The qualitative and quantitative findings from the above stages are brought together by specialists to perform a rigorous analysis. The regional market trends, drivers,
and opportunities obtained during the analysis is compared with regional economic indicators, sector growth rates, population index, etc. to ensure the data
consistency. After ensuring the consistency, these historical and present indicators help us to understand how the market will perform in future. Our proprietary
forecasting model factors in all these indicators to predict the future market accurately.
Primary research complements the secondary research, as and when required, as it helps us to gain insights from the industries directly by communicating with the
senior executives, key opinion leaders and independent consultants who are experts in their industries or specific industry sectors. Such interviews are conducted
across the value chain of the market in question. A survey questionnaire is usually prepared for conducting any primary interview or survey. The questionnaire is
developed with utmost care to fulfil the key research objectives and also to validate the assumptions about the market. This supplements the information otherwise
unaddressed via secondary research. The primary data collection is done by expert interviewers who have specific industry knowledge. Linguists are hired to conduct
interviews in the respondentā€™s native language. Some of the primary research methods applied at Netscribes include the following:
ļ¶ In-depth Interviews
ļ¶ Executive Interviews
ļ¶ Expert Panels
Appendix
11
About Netscribes Inc.
MBA
28%
Graduates
22%
BE
20%
BCA/MCA
12%
CPA/CA/CFA
8%
Others
10%
Multidisciplinary team
Netscribes provides end-to-end research-driven solutions that help clients meet their growth objectives by collaboratively transforming information into business advantage.
In-house research Data visualizationGlobal coveragePanel expertise Premium databases
We utilize an in-house
resource model to provide
our clients with actionable
insights
Specialized panel of senior
executives, analysts and
practitioners
Extensive experience of
working on various premium
databases
Ability to conduct research
across the globe in multiple
languages
Ability to present complex
data insights in crisp, easy-to-
understand visuals
Global market
intelligence and
content services
provider
Venture-funded by US
based private
equity firm Helix
Investments
700+ member delivery
team across Mumbai,
Kolkata and Gurgaon,
and sales presence in
Singapore and the USA
Revenue composition:
USA: 50%
Europe/MENA: 30%
APAC: 20%
Official ESOMAR
member
Owns:
ā€“ Inrea Research
ā€“ OnSense
ā€“ Research on
Global Markets
12

More Related Content

What's hot

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
Ā 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
Ā 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
Ā 
User security awareness
User security awarenessUser security awareness
User security awarenessK. A. M Lutfullah
Ā 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
Ā 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
Ā 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
Ā 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
Ā 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptxMohammedYaseen638128
Ā 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
Ā 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
Ā 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & SecurityEryk Budi Pratama
Ā 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Ā 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowPECB
Ā 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
Ā 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draftEquinix
Ā 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
Ā 

What's hot (20)

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Ā 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
Ā 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Ā 
User security awareness
User security awarenessUser security awareness
User security awareness
Ā 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
Ā 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
Ā 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
Ā 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Ā 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
Ā 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Ā 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
Ā 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
Ā 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Ā 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Ā 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Ā 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Ā 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
Ā 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Ā 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draft
Ā 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Ā 

Similar to Global Cybersecurity Market (2017 - 2022)

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
Ā 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
Ā 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
Ā 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
Ā 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
Ā 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
Ā 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
Ā 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
Ā 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
Ā 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
Ā 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018Confederation of Indian Industry
Ā 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
Ā 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Cigniti Technologies Ltd
Ā 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
Ā 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
Ā 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
Ā 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
Ā 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
Ā 

Similar to Global Cybersecurity Market (2017 - 2022) (20)

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
Ā 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Ā 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Ā 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
Ā 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
Ā 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
Ā 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Ā 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
Ā 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
Ā 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
Ā 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Ā 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Ā 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
Ā 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
Ā 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
Ā 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Ā 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Ā 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
Ā 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Ā 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Ā 

More from Research On Global Markets

Global Digital Gaming Market (2018-2023)
Global Digital Gaming Market (2018-2023)Global Digital Gaming Market (2018-2023)
Global Digital Gaming Market (2018-2023)Research On Global Markets
Ā 
Laundry Detergent Market In India (2018ā€“2023)
Laundry Detergent Market In India (2018ā€“2023)Laundry Detergent Market In India (2018ā€“2023)
Laundry Detergent Market In India (2018ā€“2023)Research On Global Markets
Ā 
Construction Equipment Market In India (2018ā€“2023)
Construction Equipment Market In India (2018ā€“2023)Construction Equipment Market In India (2018ā€“2023)
Construction Equipment Market In India (2018ā€“2023)Research On Global Markets
Ā 
Air Care Market In India (2018ā€“2023)
Air Care Market In India (2018ā€“2023)Air Care Market In India (2018ā€“2023)
Air Care Market In India (2018ā€“2023)Research On Global Markets
Ā 
India Mobile Accessories Market (2018-2023)
India Mobile Accessories Market (2018-2023)India Mobile Accessories Market (2018-2023)
India Mobile Accessories Market (2018-2023)Research On Global Markets
Ā 
India Foundry Market Report (2018-2023)
India Foundry Market Report (2018-2023) India Foundry Market Report (2018-2023)
India Foundry Market Report (2018-2023) Research On Global Markets
Ā 
Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 ) Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 ) Research On Global Markets
Ā 
Global precision medicine market (2018-2023)
Global precision medicine market (2018-2023)Global precision medicine market (2018-2023)
Global precision medicine market (2018-2023)Research On Global Markets
Ā 
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...Research On Global Markets
Ā 
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...Research On Global Markets
Ā 
Smart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGMSmart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGMResearch On Global Markets
Ā 
Global Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGMGlobal Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGMResearch On Global Markets
Ā 

More from Research On Global Markets (18)

Global Robo-Advisory Market (2018-2023)
Global Robo-Advisory Market (2018-2023)Global Robo-Advisory Market (2018-2023)
Global Robo-Advisory Market (2018-2023)
Ā 
Global Digital Gaming Market (2018-2023)
Global Digital Gaming Market (2018-2023)Global Digital Gaming Market (2018-2023)
Global Digital Gaming Market (2018-2023)
Ā 
Laundry Detergent Market In India (2018ā€“2023)
Laundry Detergent Market In India (2018ā€“2023)Laundry Detergent Market In India (2018ā€“2023)
Laundry Detergent Market In India (2018ā€“2023)
Ā 
Smartphone Market In India (2018-2023)
Smartphone Market In India (2018-2023)Smartphone Market In India (2018-2023)
Smartphone Market In India (2018-2023)
Ā 
Soap Market In India (2018ā€“2023)
Soap Market In India (2018ā€“2023)Soap Market In India (2018ā€“2023)
Soap Market In India (2018ā€“2023)
Ā 
Global SOC IoT Innovation Trends
Global SOC IoT Innovation TrendsGlobal SOC IoT Innovation Trends
Global SOC IoT Innovation Trends
Ā 
Construction Equipment Market In India (2018ā€“2023)
Construction Equipment Market In India (2018ā€“2023)Construction Equipment Market In India (2018ā€“2023)
Construction Equipment Market In India (2018ā€“2023)
Ā 
Air Care Market In India (2018ā€“2023)
Air Care Market In India (2018ā€“2023)Air Care Market In India (2018ā€“2023)
Air Care Market In India (2018ā€“2023)
Ā 
India Mobile Accessories Market (2018-2023)
India Mobile Accessories Market (2018-2023)India Mobile Accessories Market (2018-2023)
India Mobile Accessories Market (2018-2023)
Ā 
India Bottled Water Market (2018-2023)
India Bottled Water Market (2018-2023)India Bottled Water Market (2018-2023)
India Bottled Water Market (2018-2023)
Ā 
India Foundry Market Report (2018-2023)
India Foundry Market Report (2018-2023) India Foundry Market Report (2018-2023)
India Foundry Market Report (2018-2023)
Ā 
Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 ) Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 )
Ā 
Global precision medicine market (2018-2023)
Global precision medicine market (2018-2023)Global precision medicine market (2018-2023)
Global precision medicine market (2018-2023)
Ā 
Global digital gaming market 2017-2022
Global digital gaming market 2017-2022 Global digital gaming market 2017-2022
Global digital gaming market 2017-2022
Ā 
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Ā 
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Ā 
Smart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGMSmart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGM
Ā 
Global Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGMGlobal Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGM
Ā 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
Ā 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
Ā 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Ā 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 

Global Cybersecurity Market (2017 - 2022)

  • 1. Prepared by Netscribes Inc. Proprietary and Confidential, Copyright Ā© 2018, Netscribes, Inc. All Rights Reserved The content of this document is confidential and meant for the review of the recipient. Disclaimer: The names or logos of other companies and products mentioned herein are the trademarks of their respective owners
  • 2. 1.1 Market scope and segmentation Globalcybersecuritymarket Segments Differentiation Based on solution Based on end use industry ā€¢ Identity and access management (IAM) ā€¢ Encryption ā€¢ Governance, risk and compliance ā€¢ Unified threat management (UTM) ā€¢ Security information and event management (SIEM) ā€¢ Aerospace ā€¢ Financial services ā€¢ Telecommunication ā€¢ Healthcare ā€¢ Others Based on region North America Europe Latin America The Middle East and Africa Asia-Pacific 19
  • 3. 3 Market definitions IAM is a collection of technologies and processes that help in managing digital or electronic identity. Identity and access management (IAM) Encryption is the use of technology to convert data into an unrecognizable format so that it cannot be viewed by unauthorized parties. A secret key or a password is required to read an encrypted file. Encryption UTM is an integration of multiple security and service features in a single platform that protects the user from blended threats. Unified threat management (UTM) The cybersecurity market comprises those technologies that protect computers, networks, applications, and data against cyberthreats, i.e., unauthorized access with mala fide intent. SIEM is an approach to security management that combines security information management (SIM) and security event management (SEM). This approach allows real-time identification, monitoring, recording, and analysis of security events. Security information and event management (SIEM)
  • 4. 1.3 Executive summary (2/2) Overview Trends ā€¢ The global cybersecurity market is expected to expand at a compound annual growth rate (CAGR) of 11.6% during the 2017-2022 period, reaching a value of USD 173.19 Bn by 2022. The market is primarily driven by the risk and compliance segment, which accounted for the highest revenue in 2016, generating a 50.4% share. This is a result of the large scale adoption of various cybersecurity solutions, as per compliance norms, across different industrial and commercial sectors. ā€¢ Among the applications of cybersecurity systems across various end use industries, the financial sector held the largest market share in 2016, and is anticipated to maintain its dominance in the coming years. ā€¢ Increased reliance on the Internet, coupled with the rapid growth in smartphone usage in the corporate environment are expected to boost the requirement for cybersecurity in order to provide protection against security breaches. ā€¢ Spending on information security products will reach approximately USD 124 Bn by 2019, a large portion of it being spent on cybersecurity products and solutions. High awareness, especially in the corporate context, is aiding in its fast adoption. ā€¢ 5G networks will allow an increasing number of devices to be connected, and will hence require even stricter security features. As a result, cybersecurity protocols and solutions will need to evolve to keep up with these changes. ā€¢ There has been an increase in the adoption of hardware-based authentication that allows cryptographic information to be stored physically away from the computing devices, thus minimizing chances of cyberattacks. ā€¢ Artificial intelligence (AI) and machine learning are enhancing the security standards of cybersecurity solutions. Also, embedded automation in these products requires minimum manual intervention, further reducing the risks. ā€¢ Recent legislations such as General Data Protection Regulation (GDPR) in the European Union (EU), and the Right to Privacy Act in India are creating greater awareness for protecting private data. Moreover, countries like Israel and Singapore are collaborating to develop expertise in the cybersecurity space. ā€¢ Organizations are creating huge volumes of data from various sources and want to utilize it to their benefit. However, the centralized nature of big data stores are creating new security challenges, since centralized data stores are highly vulnerable to cyberattacks. ā€¢ Threats tend to evolve faster than their solutions. Cybersecurity providers are in a constant race to identify the latest threats and address them. However, incidents of data loss continue to increase globally. XX XX 173.19 2014 2017 2022 4 USD Bn
  • 5. 2.1 Global - market overview Geography-wise market revenue (USD bn) NorthAmerica Europe Asia-Pacific LatinAmerica The Middle Eastand Africa ā€¢ 2016-USD XX Bn ā€¢ 2022-USD XX Bn ā€¢ 2016-USD XX Bn ā€¢ 2022-USD XX Bn ā€¢ 2016-USD XX Bn ā€¢ 2022-USD XX Bn ā€¢ 2016-USD XX Bn ā€¢ 2022-USD XX Bn ā€¢ 2016-USD XX Bn ā€¢ 2022-USD XX Bn Fig 1: Market attractiveness analysis based on geography 5 CAGR(%) Note: The size of the circle denotes the regional revenues in USD Bn Market attractiveness (based on absolute growth from 2017 to 2022) North America Europe The Middle East and Africa Latin America Asia-Pacific
  • 6. 2.2 Global market drivers Rapid digitalization coupled with increasing adoption of information and communications technology (ICT) devices ā€¢ Rapid digitalization has resulted in the increased adoption of various ICTs, including cloud computing, smart grids, optic Wi-Fi, cognitive technologies, and new payment models, among others. People, organizations, and governments are using these products to transfer confidential data over the Internet, which increase the chances of unauthorized access to data. Again, the rapid change in business environments, owing to the adoption of the bring-your-own-device (BYOD) concept, makes it necessary to have efficient multilayered cybersecurity systems that provide access to corporate information, along with minimizing risk, and maintaining compliance. ā€¢ Using cybersecurity solutions to implement security and protective measures regarding data exchange, and to create an environment of digital trust and safety are thus becoming a necessity. Spending on information security products continues to increase ā€¢ The global expenditure on information security products shows an increasing trend, from USD 101 Bn in 2017 to USD 124 Bn in 2019, as per research estimates. A large portion of this expense will be for cybersecurity products and solutions. One of the possible reasons for the higher adoption among various sectors is increased awareness regarding security and its associated issues. ā€¢ Data and information loss has resulted in significant financial losses for organizations in the past. Each of these instances becomes a driver for other organizations to implement cybersecurity platforms or solutions. 6 Cybersecurity will evolve with 5G ā€¢ With the advent of the 5G era, more and more devices will be connected using Internet of Things (IoT). The management of data on these devices will become far more complex than it is today. However, compared to the monolithic networks that we presently have, 5G will have all its functions virtualized. Since, virtualization means greater mutual authentication between users and networks, 5G will restrict cyberattacks to some extent. ā€¢ However, the chances of denial of services attacks (DDoS) will persist. In the 2016 Dyn cyberattack, unsecured IoT devices, such as baby monitors, printers, etc., were hacked as they were provided with default passwords. The impact might be manifold with 5G. Hence, the expected high adoption of 5G in the next few years will also necessitate the evolution of cybersecurity technologies. 5G
  • 7. 3.1 Identity and access management (IAM) Growth drivers IAM XX XX XX XX XX XX XX XX 42.41 2014 2015 2016 2017 2018 2019 2020 2021 2022 CAGR (2017-2022): XX% Fig 4: Revenue contribution ā€“ IAM Challenges Major trendsIn general, the IoT vendors focus less on maintaining privacy, providing authentication and managing usersā€™ identities. However, IoT platform product managers and service providers have started to incorporate various device identities and access technologies into IoT platforms to simplify security designs. IAM is currently carried out in a decentralized manner using Blockchain technology to prevent changes in personal information. The traditional user authentication is rule-based. The next generation of adaptive access is however based on the combined rules of machine learning and advanced analytics. An organization sets a baseline for user behaviour, creating a user group. Through unsupervised machine learning, the user behaviour is tracked and corrective action is taken, if any anomaly is detected. ā€¢ With single-factor authentication being no longer acceptable in the growing digital world, stronger mechanisms such as multi-factor and biometric authentication are needed to improve security, which are considered crucial for the growth of IAM. ā€¢ Stolen credentials of employees is the leading facilitator of system hacking cases and data breach incidents, which is expected to cost businesses around USD 2 Tn by 2019, globally. In fact, stolen employee passwords are responsible for 90% of cyberattacks, according to leading industry and government reports. These are pushing organizations to acquire IAM solutions. ā€¢ The IoT will connect almost every object to the Internet, increasing the risk of cyberattacks. IAM solutions help to create an identity lifecycle for IoT devices, also called Identity of Things (IDoT), and safeguard the data during the lifecycle. ā€¢ Application of IAM in the software as a service (SaaS) model makes it easier for users to access information. However, it becomes complex with the rapidly increasing number of applications. Each application requires different passwords and expiration cycles. This diminishes user productivity as they spend time trying to manage, reset and remember the data. ā€¢ IAM products are expensive for extending or integrating with cloud applications. 7
  • 8. 13.1 North America - market overview Overview North America XX XX XX XX XX XX XX XX X 2014 2015 2016 2017 2018 2019 2020 2021 2022 CAGR (2017-2022): XX% Market drivers Major trends 2 Hackers are using novel techniques to break into systems. Advanced technologies such as deception technology are being used to counter those attacks. For instance, decoy systems such as Honeypot are used to imitate the actual system containing confidential data. This works as an active bait for hackers, and once they try to hack the decoy systems, they are blocked from entering other system applications. 1 ā€¢ North America held the largest market share in the cybersecurity market across different regions in 2016, generating XX% of the global revenue. ā€¢ The United States (U.S.) cybersecurity market leads in terms of overall expenditure on cybersecurity solutions, and is expected to maintain its superior position in the coming years. ā€¢ Recently, the Defense Secretary of U.S. established a task force to recommend ways to curb theft of critical technologies by competing nations. ā€¢ Across the U.S., private and public agencies are implementing cybersecurity systems in order to safeguard their stakeholders. ā€¢ Increasing investment in cybersecurity systems by various corporate investors such as Intel Capital, Google Ventures, Qualcomm Ventures, and Juniper Networks, among others, is another important factor anticipated to augment the growth of the cybersecurity market in North America. Since 2017, various corporate investors have invested USD 1.47 Bn in different cyber security companies across 191 deals. ā€¢ The 2019 U.S. budget has proposed an allocation of USD 14.98 Bn for key initiatives and research across different cybersecurity technologies. This is an increase from USD 13.1 Bn in 2017 and USD 14.4 Bn in 2018. Managed IT services that help organizations in managing endpoint security are on the rise in the U.S. The services include regular updates and patches, installing firewalls, 24/7 monitoring, and troubleshooting, among others. This is especially beneficial for small and medium businesses (SMBs), since they donā€™t have enough expertise to deal with the cyberattacks. Fig 64: Revenue contribution ā€“ North America 8
  • 9. Symantec is a leading cybersecurity company that offers security products and solutions to small and medium enterprises. These solutions provide active protection against malware, advanced business threats, and other cyberattacks. The company provides cybersecurity solutions across verticals such as government, retail, and other financial services. Company snapshot Products/services 14.1 Company overview ā€“ Symantec ā€¢ In July 2017, Symantec acquired Israel-based Fireglass. Through this acquisition, the company aimed to integrate its cyber defense platform, and extend its leadership in e-mail protection, and secure web gateway on cloud and on-premises. ā€¢ On 6 January, 2017, Symantec Corp. announced the takeover of SurfEasy, Inc., a leading Virtual Private Network (VPN) provider. The company would be added to Symantec's Consumer Business Unit to extend VPN to the portfolio of customersā€™ digital safety solutions to help consumers protect their information. Recent initiatives Global presence Geographic share of revenue Growth strategy Year of establishment: 1982 Headquarters: Mountain View, California, U.S. Key people: Daniel H. Schulman (Chairman) Traded as: NASDAQ: SYMC NASDAQ-100 Component Employee strength: 13,000 Total revenue: USD 4,019 Mn (2017) Website: www.symantec.com ā€¢ Endpoint and hybrid cloud security ā€¢ Information protection ā€¢ Messaging security ā€¢ Web and cloud security ā€¢ Small business security solutions The companyā€™s growth strategy involves delivering unified security analytics platforms that would provide big data analytics and visibility into real-time global security threats. Symantec utilizes its analytics platform to provide the best- in-class consumer and enterprise security products and cybersecurity services. The company provides holistic security services from monitoring to incident responses and even threat intelligence. 59% 25% 16% Americas Europe, the Middle East and Africa Asia-Pacific and Japan 9
  • 10. Appendix 10 Research methodology The study begins with identifying the right research question(s). The question depends on what we are going to achieve by conducting the research or what we want to convey to the prospective customers through this research. Next we identify the logical steps to arrive at the answers to the question(s). These logical steps form our research objectives. The research objectives provide us a guideline regarding what information we need to conduct analysis. We strongly believe that clear objectives will lead to clear results about the given market The next stage of the research is conducted utilizing the secondary sources of information, process called desk/secondary research. Netscribes Inc. has a considerable volume of information in both quantitative and qualitative forms, across all major industries and its sectors. Also, we conduct in-depth study of the market, understanding its key stakeholders, drivers, trends, challenges and opportunities globally covering major regions such as North America, Latin America, Europe, Asia Pacific, and the Middle East and Africa. The key sources consumed for these research include (but not limited to) the following: ļ¶ Financial reports published by the key market players ļ¶ Government and other official sources including the National Statistics ļ¶ National and International trade associations ļ¶ Paid databases ļ¶ Other reliable sources The qualitative and quantitative findings from the above stages are brought together by specialists to perform a rigorous analysis. The regional market trends, drivers, and opportunities obtained during the analysis is compared with regional economic indicators, sector growth rates, population index, etc. to ensure the data consistency. After ensuring the consistency, these historical and present indicators help us to understand how the market will perform in future. Our proprietary forecasting model factors in all these indicators to predict the future market accurately. Primary research complements the secondary research, as and when required, as it helps us to gain insights from the industries directly by communicating with the senior executives, key opinion leaders and independent consultants who are experts in their industries or specific industry sectors. Such interviews are conducted across the value chain of the market in question. A survey questionnaire is usually prepared for conducting any primary interview or survey. The questionnaire is developed with utmost care to fulfil the key research objectives and also to validate the assumptions about the market. This supplements the information otherwise unaddressed via secondary research. The primary data collection is done by expert interviewers who have specific industry knowledge. Linguists are hired to conduct interviews in the respondentā€™s native language. Some of the primary research methods applied at Netscribes include the following: ļ¶ In-depth Interviews ļ¶ Executive Interviews ļ¶ Expert Panels
  • 11. Appendix 11 About Netscribes Inc. MBA 28% Graduates 22% BE 20% BCA/MCA 12% CPA/CA/CFA 8% Others 10% Multidisciplinary team Netscribes provides end-to-end research-driven solutions that help clients meet their growth objectives by collaboratively transforming information into business advantage. In-house research Data visualizationGlobal coveragePanel expertise Premium databases We utilize an in-house resource model to provide our clients with actionable insights Specialized panel of senior executives, analysts and practitioners Extensive experience of working on various premium databases Ability to conduct research across the globe in multiple languages Ability to present complex data insights in crisp, easy-to- understand visuals Global market intelligence and content services provider Venture-funded by US based private equity firm Helix Investments 700+ member delivery team across Mumbai, Kolkata and Gurgaon, and sales presence in Singapore and the USA Revenue composition: USA: 50% Europe/MENA: 30% APAC: 20% Official ESOMAR member Owns: ā€“ Inrea Research ā€“ OnSense ā€“ Research on Global Markets
  • 12. 12

Editor's Notes

  1. https://www.reuters.com/brandfeatures/venture-capital/article?id=11347 https://www.gartner.com/smarterwithgartner/3-market-forces-drive-adoption-of-identity-and-access-management-in-iot/ https://www.identitymanagementinstitute.org/identity-and-access-management-market-analysis/ https://www.identitymanagementinstitute.org/identity-and-access-management-market-analysis/ https://swipx.com/identity-access-management-trends/ https://www.ibm.com/blogs/blockchain/2017/05/its-all-about-trust-blockchain-for-identity-management/ https://www.whitepapers.em360tech.com/wp-content/uploads/Okta-Whitepaper-top-8-IAM-Challenges-FINAL_0.pdf https://www.linkedin.com/pulse/top-10-identity-access-management-challenges-cloud-anirban-mukherji/