Global Information Security Products And Services Industry

PR Newswire
Share
Thursday, November 29th 2012
Advanced

NEW YORK, Nov. 29, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Global Information Security Products And Services Industry

http://www.reportlinker.com/p01048478/Global-Information-Security-Produc...

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware, and Information Security Services. The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software. The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances. The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management Services, Education & Training, and Response Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2010 through 2018. A six-year historic analysis is also provided for these markets.The report profiles 385 companies including many key and niche players such as ActivIdentity Corporation, AuthenTec, Check Point Software, Technologies Ltd., Cisco Systems Inc., Clearswift Ltd., CA Technologies, Inc., Crossbeam Systems, Inc., Entrust, Inc., F-Secure Corporation, Fortinet Inc., Fujitsu Ltd., Hewlett-Packard Development Company, L.P, IBM Corporation, Juniper Networks, Inc., Keyware Technologies NV, Lumension Security, Inc., McAfee, Inc., Norman ASA, Novell, Inc., Ping Identity Corp., Proofpoint, Inc., EMC Corporation, SafeNet, Inc., Secui.com Co., Ltd., SonicWALL, Inc., Sophos Plc, Utimaco Safeware AG, Stonesoft Corporation, Symantec Corporation, Technology Nexus AB, Thales Group, Trend Micro Incorporated, Trustwave, Verizon Business, WatchGuard Technologies, Inc., and WebSense, Inc. Leading Global Information Security Research Institutes Center for Education and Research in Information- Assurance and Security, and Information Security Group. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based upon search engine sources in the public domain.

I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITIONSStudy Reliability and Reporting Limitations I-1Disclaimers I-2Data Interpretation & Reporting Level I-2Quantitative Techniques & Analytics I-3Product Definitions and Scope of Study I-3Information Security Software I-4Identity & Access Management (I&AM) I-5Public Key Infrastructure (PKI) I-5Web Single Sign-On I-5Host Single Sign-On I-5User Provisioning I-5Directory Services I-5Legacy Authorization I-6Advanced Authentication I-6Secure Content Management (SCM) I-6Antivirus Software I-6Web/Content Filtering I-6Messaging Security (E-mail Scanning) I-6Intrusion Detection/Prevention (IDP) I-6Security & Vulnerability Management I-7Firewall/VPN Software I-7Other Security Software I-7Information Security Hardware I-7Hardware Authentication I-7Tokens I-7Smart Cards I-8Biometrics I-8Threat Management Security Appliances I-8Firewall/VPN Appliances I-8SCM Appliances I-8Intrusion Detection/Prevention Appliances I-8Unified Threat Management (UTM) Appliances I-8Information Security Services I-9Consulting Services I-9Education and Training Services I-9Implementation Services I-9Management Services I-9Response Services I-9II. EXECUTIVE SUMMARY

1. INDUSTRY OVERVIEW II-1

Corporate Information Assets - Vulnerable as Ever II-1

Growing Instances of IT Security Breaches - A Serious Cause

for Concern II-2