About IT Security
IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.
TechNavio's analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.
Covered in this Report
The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:
• Hardware: Integrated Firewall/VPN, UTM, Content Management, IPS, IDS, and VPN
• Services
• Software
The major end-users listed in the market are described below:
• SMEs: This segment includes organizations that have less than 10,000 employees and generate revenue of less than US$100 million
• Large Enterprises: This segment includes organizations that have more than 10,000 employees and generate revenue of more than US$100 million
• Government Organizations: This segment includes all government agencies and institutions that are funded and managed by government authorities
TechNavio's report, IT Security Market in China 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.
Key Vendors
• CA Technologies
• Check Point Software
• Cisco Systems
• Emc²
• IBM
• Juniper Networks
• Symantec
Other Prominent Vendors
• Dell SonicWALL
• Fortinet
• F-Secure
• McAfee
• Sophos
• TrendMicro
Market Driver
• Increased Dependency on Internet
• For a full, detailed list, view our report
Market Challenge
• High Implementation Cost
• For a full, detailed list, view our report
Market Trend
• Increased Demand for Cloud-based Security Solutions
• For a full, detailed list, view our report
Key Questions Answered in this Report
• What will the market size be in 2019 and what will the growth rate be?
• What are the key market trends?
• What is driving this market?
• What are the challenges to market growth?
• Who are the key vendors in this market space?
• What are the market opportunities and threats faced by the key v
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Types of Threats
06.1.1 Trojan
06.1.2 Virus
06.1.3 Worms
06.1.4 Adware
06.1.5 Keylogger
06.1.6 Backdoor
06.1.7 Exploit
06.1.8 Dropper
06.1.9 Phishing
06.1.10 Cookies
06.1.11 Bluesnarfing
06.1.12 Boot Sector Virus
06.1.13 Browser Hijackers
06.1.14 Mousetrapping
06.1.15 Obfuscated Spam
06.1.16 Crimeware
06.2 Components of IT Security
06.3 Advantages of IT Security
07. Market Landscape
07.1 Market Overview
07.1.1 Market Structure
07.1.2 Market Size and Forecast
07.2 Share of China in IT Security Market in APAC Region
07.3 Five Forces Analysis
08. BYOD Implementation: Market Opportunities
09. Product Lifecycle Analysis by Products
10. Market Segmentation by Products
10.1 IT Security Market in China by Products 2014
10.2 IT Security Market in China by Products 2014-2019
10.3 IT Security Hardware Market in China
10.3.1 Market Size and Forecast
10.3.2 Market Segmentation by Product
10.3.3 Integrated Firewall/VPN Market in China
10.3.4 UTM Market in China
10.3.5 IPS Market in China
10.3.6 Content Management Market in China
10.3.7 VPN Market in China
10.3.8 IDS Market in China
10.4 IT Security Services Market in China
10.4.1 Market Size and Forecast
10.5 IT Security Software Market in China
10.5.1 Market Size and Forecast
11. Market Attractiveness
11.1 Market Attractiveness by Products
12. Buying Criteria
13. Market Growth Drivers
14. Drivers and their Impact
15. Market Challenges
16. Impact of Drivers and Challenges
17. Market Trends
18. Trends and their Impact
19. Vendor Landscape
19.1 Competitive Scenario
19.2 Vendor Analysis 2014
19.2.1 Comparison of Vendors based on Applications Offered
19.2.2 Key News
19.2.3 Mergers and Acquisitions
19.3 Other Prominent Vendors
20. Key Vendor Analysis
20.1 CA Technologies
20.1.1 Key Facts
20.1.2 Business Overview
20.1.3 Business Segmentation by Revenue 2013
20.1.4 Business Segmentation by Revenue 2012 and 2013
20.1.5 Geographical Segmentation by Revenue 2013
20.1.6 Business Strategy
20.1.7 Recent Developments
20.1.8 SWOT Analysis
20.2 Check Point Software
20.2.1 Key Facts
20.2.2 Business Overview
20.2.3 Business Strategy
20.2.4 Recent Developments
20.2.5 SWOT Analysis
20.3 Cisco Systems
20.3.1 Key Facts
20.3.2 Business Overview
20.3.3 Business Segmentation by Revenue
20.3.4 Geographical Segmentation by Revenue
20.3.5 Business Strategy
20.3.6 Key Information
20.3.7 SWOT Analysis
20.4 Emc²
20.4.1 Key Facts
20.4.2 Business Overview
20.4.3 Business Segmentation by Revenue 2013
20.4.4 Business Segmentation by Revenue 2012 and 2013
20.4.5 Geographical Segmentation by Revenue 2013
20.4.6 Business Strategy
20.4.7 Recent Developments
20.4.8 SWOT Analysis
20.5 IBM
20.5.1 Key Facts
20.5.2 Business Description
20.5.3 Business Segmentation
20.5.4 Revenue Segmentation by Business Segment
20.5.5 Revenue Segmentation by Business Operation
20.5.6 Revenue Comparison of Business Segments 2012 and 2013
20.5.7 Revenue Segmentation by Geography
20.5.8 Business Strategy
20.5.9 Key Developments
20.5.10 SWOT Analysis
20.6 Juniper Networks
20.6.1 Key Facts
20.6.2 Business Overview
20.6.3 Business Segmentation
20.6.4 Business Segmentation by Revenue 2012 and 2013
20.6.5 Sales by Geography 2013
20.6.6 Business Strategy
20.6.7 Recent Developments
20.6.8 SWOT Analysis
20.7 Symantec
20.7.1 Key Facts
20.7.2 Business Overview
20.7.3 Business Segmentation by Revenue 2013
20.7.4 Business Segmentation by Revenue 2013 and 2014
20.7.5 Geographical Segmentation by Revenue 2013
20.7.6 Business Strategy
20.7.7 Recent Developments
20.7.8 SWOT Analysis
21. Other Reports in this Series
List of Exhibits:
Exhibit 1: Market Research Methodology
Exhibit 2: Components of IT Security
Exhibit 3: Market Structure
Exhibit 4: Hardware-based Segmentation
Exhibit 5: IT Security Market in China 2014-2019 (US$ billion)
Exhibit 6: Share of China in IT Security Market in APAC Region 2014
Exhibit 7: Country-wise Adoption of BYOD
Exhibit 8: Country-wise Adoption of BYOD in Workplaces (million units)
Exhibit 9: Average Number of BYOD Devices in Workplaces in China
Exhibit 10: Product Lifecycle Analysis by Products
Exhibit 11: IT Security Market in China by Products 2014
Exhibit 12: IT Security Market in China by Products 2014-2019 (percentage)
Exhibit 13: IT Security Hardware Market in China 2014-2019 (US$ billion)
Exhibit 14: Segmentation of IT Security Hardware Market in China by Product 2014
Exhibit 15: IT Security Market in China by Hardware 2014-2019 (percentage)
Exhibit 16: Integrated Firewall/VPN Market in China 2014-2019 (US$ billion)
Exhibit 17: UTM Market in China 2014-2019 (US$ billion)
Exhibit 18: IPS Market in China 2014-2019 (US$ billion)
Exhibit 19: Content Management Market in China 2014-2019 (US$ billion)
Exhibit 20: VPN Market in China 2014-2019 (US$ billion)
Exhibit 21: IT Security Market in China by IDS 2014-2019 (US$ billion)
Exhibit 22: IT Security Services Market in China 2014-2019 (US$ billion)
Exhibit 23: IT Security Software Market in China 2014-2019 (US$ billion)
Exhibit 24: Market Attractiveness by Products
Exhibit 25: Comparison of Vendors based on Applications Offered
Exhibit 26: CA Technologies: Business Segmentation by Revenue 2013
Exhibit 27: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 28: CA Technologies: Geographical Segmentation by Revenue 2013
Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2013
Exhibit 30: Business Segmentation of Cisco Systems by Revenue 2011-2013 (US$ billion)
Exhibit 31: Geographical Segmentation of Cisco Systems by Revenue 2013
Exhibit 32: Emc²: Business Segmentation by Revenue 2013
Exhibit 33: Emc²: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 34: EMC² : Geographical Segmentation by Revenue 2013
Exhibit 35: IBM: Business Segmentation
Exhibit 36: IBM: Revenue Segmentation by Business 2013
Exhibit 37: IBM: Revenue Segmentation 2013
Exhibit 38: IBM: Revenue Comparison of Business Segments 2012 and 2013 (US$ million)
Exhibit 39: IBM: Revenue Segmentation by Geography 2013
Exhibit 40: Juniper Networks: Business Segmentation 2013
Exhibit 41: Juniper Networks: Business Segmentation by Revenue 2012 and 2013 (US$ billion)
Exhibit 42: Juniper Networks: Sales by Geography 2013
Exhibit 43: Symantec: Business Segmentation by Revenue 2013
Exhibit 44: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
Exhibit 45: Symantec: Geographical Segmentation by Revenue 2013
Contact us at the Consulting WP office nearest to you or submit a business inquiry online.
Subscribe to Our Newsletter
Published On : December 2019
$ 3600
Published On : November 2019
$ 3600
Published On : November 2019
$ 3600
Published On : November 2019
$ 3600
$ 3950