IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. Research Beam Model: Research Beam Product ID: 221002 2500 USD New
IT Security Market in China 2015-2019
 
 

IT Security Market in China 2015-2019

  • Category : ICT & Media
  • Published On : April   2015
  • Pages : 93
  • Publisher : Technavio
 
 
 

About IT Security

IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.



TechNavio's analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.



Covered in this Report

The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:



• Hardware: Integrated Firewall/VPN, UTM, Content Management, IPS, IDS, and VPN

• Services

• Software



The major end-users listed in the market are described below:

• SMEs: This segment includes organizations that have less than 10,000 employees and generate revenue of less than US$100 million

• Large Enterprises: This segment includes organizations that have more than 10,000 employees and generate revenue of more than US$100 million

• Government Organizations: This segment includes all government agencies and institutions that are funded and managed by government authorities

TechNavio's report, IT Security Market in China 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.



Key Vendors

• CA Technologies

• Check Point Software

• Cisco Systems

• Emc²

• IBM

• Juniper Networks

• Symantec



Other Prominent Vendors

 • Dell SonicWALL

• Fortinet

• F-Secure

• McAfee

• Sophos

• TrendMicro

 

Market Driver

• Increased Dependency on Internet

• For a full, detailed list, view our report



Market Challenge

• High Implementation Cost

• For a full, detailed list, view our report



Market Trend

• Increased Demand for Cloud-based Security Solutions

• For a full, detailed list, view our report



Key Questions Answered in this Report

• What will the market size be in 2019 and what will the growth rate be?

• What are the key market trends?

• What is driving this market?

• What are the challenges to market growth?

• Who are the key vendors in this market space?

• What are the market opportunities and threats faced by the key v


01. Executive Summary



02. List of Abbreviations



03. Scope of the Report



03.1 Market Overview



03.2 Product Offerings



04. Market Research Methodology



04.1 Market Research Process



04.2 Research Methodology



05. Introduction



06. Market Description



06.1 Types of Threats



06.1.1 Trojan



06.1.2 Virus



06.1.3 Worms



06.1.4 Adware



06.1.5 Keylogger



06.1.6 Backdoor



06.1.7 Exploit



06.1.8 Dropper



06.1.9 Phishing



06.1.10 Cookies



06.1.11 Bluesnarfing



06.1.12 Boot Sector Virus



06.1.13 Browser Hijackers



06.1.14 Mousetrapping



06.1.15 Obfuscated Spam



06.1.16 Crimeware



06.2 Components of IT Security



06.3 Advantages of IT Security



07. Market Landscape



07.1 Market Overview



07.1.1 Market Structure



07.1.2 Market Size and Forecast



07.2 Share of China in IT Security Market in APAC Region



07.3 Five Forces Analysis



08. BYOD Implementation: Market Opportunities



09. Product Lifecycle Analysis by Products



10. Market Segmentation by Products



10.1 IT Security Market in China by Products 2014



10.2 IT Security Market in China by Products 2014-2019



10.3 IT Security Hardware Market in China



10.3.1 Market Size and Forecast



10.3.2 Market Segmentation by Product



10.3.3 Integrated Firewall/VPN Market in China



10.3.4 UTM Market in China



10.3.5 IPS Market in China



10.3.6 Content Management Market in China



10.3.7 VPN Market in China



10.3.8 IDS Market in China



10.4 IT Security Services Market in China



10.4.1 Market Size and Forecast



10.5 IT Security Software Market in China



10.5.1 Market Size and Forecast



11. Market Attractiveness



11.1 Market Attractiveness by Products



12. Buying Criteria



13. Market Growth Drivers



14. Drivers and their Impact



15. Market Challenges



16. Impact of Drivers and Challenges



17. Market Trends



18. Trends and their Impact



19. Vendor Landscape



19.1 Competitive Scenario



19.2 Vendor Analysis 2014



19.2.1 Comparison of Vendors based on Applications Offered



19.2.2 Key News



19.2.3 Mergers and Acquisitions



19.3 Other Prominent Vendors



20. Key Vendor Analysis



20.1 CA Technologies



20.1.1 Key Facts



20.1.2 Business Overview



20.1.3 Business Segmentation by Revenue 2013



20.1.4 Business Segmentation by Revenue 2012 and 2013



20.1.5 Geographical Segmentation by Revenue 2013



20.1.6 Business Strategy



20.1.7 Recent Developments



20.1.8 SWOT Analysis



20.2 Check Point Software



20.2.1 Key Facts



20.2.2 Business Overview



20.2.3 Business Strategy



20.2.4 Recent Developments



20.2.5 SWOT Analysis



20.3 Cisco Systems



20.3.1 Key Facts



20.3.2 Business Overview



20.3.3 Business Segmentation by Revenue



20.3.4 Geographical Segmentation by Revenue



20.3.5 Business Strategy



20.3.6 Key Information



20.3.7 SWOT Analysis



20.4 Emc²



20.4.1 Key Facts



20.4.2 Business Overview



20.4.3 Business Segmentation by Revenue 2013



20.4.4 Business Segmentation by Revenue 2012 and 2013



20.4.5 Geographical Segmentation by Revenue 2013



20.4.6 Business Strategy



20.4.7 Recent Developments



20.4.8 SWOT Analysis



20.5 IBM



20.5.1 Key Facts



20.5.2 Business Description



20.5.3 Business Segmentation



20.5.4 Revenue Segmentation by Business Segment



20.5.5 Revenue Segmentation by Business Operation



20.5.6 Revenue Comparison of Business Segments 2012 and 2013



20.5.7 Revenue Segmentation by Geography



20.5.8 Business Strategy



20.5.9 Key Developments



20.5.10 SWOT Analysis



20.6 Juniper Networks



20.6.1 Key Facts



20.6.2 Business Overview



20.6.3 Business Segmentation



20.6.4 Business Segmentation by Revenue 2012 and 2013



20.6.5 Sales by Geography 2013



20.6.6 Business Strategy



20.6.7 Recent Developments



20.6.8 SWOT Analysis



20.7 Symantec



20.7.1 Key Facts



20.7.2 Business Overview



20.7.3 Business Segmentation by Revenue 2013



20.7.4 Business Segmentation by Revenue 2013 and 2014



20.7.5 Geographical Segmentation by Revenue 2013



20.7.6 Business Strategy



20.7.7 Recent Developments



20.7.8 SWOT Analysis



21. Other Reports in this Series





List of Exhibits:

Exhibit 1: Market Research Methodology

Exhibit 2: Components of IT Security

Exhibit 3: Market Structure

Exhibit 4: Hardware-based Segmentation

Exhibit 5: IT Security Market in China 2014-2019 (US$ billion)

Exhibit 6: Share of China in IT Security Market in APAC Region 2014

Exhibit 7: Country-wise Adoption of BYOD

Exhibit 8: Country-wise Adoption of BYOD in Workplaces (million units)

Exhibit 9: Average Number of BYOD Devices in Workplaces in China

Exhibit 10: Product Lifecycle Analysis by Products

Exhibit 11: IT Security Market in China by Products 2014

Exhibit 12: IT Security Market in China by Products 2014-2019 (percentage)

Exhibit 13: IT Security Hardware Market in China 2014-2019 (US$ billion)

Exhibit 14: Segmentation of IT Security Hardware Market in China by Product 2014

Exhibit 15: IT Security Market in China by Hardware 2014-2019 (percentage)

Exhibit 16: Integrated Firewall/VPN Market in China 2014-2019 (US$ billion)

Exhibit 17: UTM Market in China 2014-2019 (US$ billion)

Exhibit 18: IPS Market in China 2014-2019 (US$ billion)

Exhibit 19: Content Management Market in China 2014-2019 (US$ billion)

Exhibit 20: VPN Market in China 2014-2019 (US$ billion)

Exhibit 21: IT Security Market in China by IDS 2014-2019 (US$ billion)

Exhibit 22: IT Security Services Market in China 2014-2019 (US$ billion)

Exhibit 23: IT Security Software Market in China 2014-2019 (US$ billion)

Exhibit 24: Market Attractiveness by Products

Exhibit 25: Comparison of Vendors based on Applications Offered

Exhibit 26: CA Technologies: Business Segmentation by Revenue 2013

Exhibit 27: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)

Exhibit 28: CA Technologies: Geographical Segmentation by Revenue 2013

Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2013

Exhibit 30: Business Segmentation of Cisco Systems by Revenue 2011-2013 (US$ billion)

Exhibit 31: Geographical Segmentation of Cisco Systems by Revenue 2013

Exhibit 32: Emc²: Business Segmentation by Revenue 2013

Exhibit 33: Emc²: Business Segmentation by Revenue  2012 and 2013 (US$ million)

Exhibit 34: EMC² : Geographical Segmentation by Revenue 2013

Exhibit 35: IBM: Business Segmentation

Exhibit 36: IBM: Revenue Segmentation by Business 2013

Exhibit 37: IBM: Revenue Segmentation 2013

Exhibit 38: IBM: Revenue Comparison of Business Segments 2012 and 2013 (US$ million)

Exhibit 39: IBM: Revenue Segmentation by Geography 2013

Exhibit 40: Juniper Networks: Business Segmentation 2013

Exhibit 41: Juniper Networks: Business Segmentation by Revenue  2012 and 2013 (US$ billion)

Exhibit 42: Juniper Networks: Sales by Geography  2013

Exhibit 43: Symantec: Business Segmentation by Revenue 2013

Exhibit 44: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)

Exhibit 45: Symantec: Geographical Segmentation by Revenue 2013



PURCHASE OPTIONS
 
 
 

How can we help you?

Contact us at the Consulting WP office nearest to you or submit a business inquiry online.


  Contact
 

Subscribe to Our Newsletter

 
 
REQUEST SAMPLE    ASK FOR DISCOUNT