Managed Security Services (MSS) refers to the remote monitoring and management of IT security functions by third-party service providers in order to effectively protect the sensitive data of the organizations. The task of information security is becoming more complex with the growth of the business in terms of size and structure, and utilization of mobile devices, social media, cloud services and big data. Rising number of security attacks and malicious practices by organized cyber criminals have been creating concerns among of all sectors of businesses. Research Beam Model: Research Beam Product ID: 20956 5370 USD New
Global Managed Security Services Market (Deployment Modes, Organization Size, Applications, Verticals and Geographies) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Reports, Opportunities, Segmentation, Forecast 2013 - 2020
 
 

Global Managed Security Services Market (Deployment Modes, Organization Size, Applications, Verticals and Geographies) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Reports, Opportunities, Segmentation, Forecast 2013 - 2020

  • Category : ICT & Media
  • Published On : May   2015
  • Pages : 125
  • Publisher : Allied Market Research
 
 
 

Managed Security Services (MSS) refers to the remote monitoring and management of IT security functions by third-party service providers in order to effectively protect the sensitive data of the organizations. The task of information security is becoming more complex with the growth of the business in terms of size and structure, and utilization of mobile devices, social media, cloud services and big data. Rising number of security attacks and malicious practices by organized cyber criminals have been creating concerns among of all sectors of businesses. Additionally, increased complexities in network infrastructure and lack of capital and skilled IT professionals are proving to be major hindrances in data security management. In such scenario, the outsourcing of security task to managed security service providers has emerged as a lucrative option for the organizations. Managed security services may either be delivered by setting up necessary security infrastructure on-site in the organization, or completely controlled by the service provider from remote location. 

The trend of BYOD adoption at workplaces to improve the productivity by allowing the employee to access corporate data via personal devices has been rising, thereby increasing the need for data security. Lack of capital resources and skilled IT staff has been diverting organizations from in-house security management. Additionally, compliance requirements for data security are stimulating the organizations to outsource the data security tasks. However, reluctance to share sensitive data and varying customer demands regarding security package are the major challenges for the market. Further, the growing awareness and concerns about data breaches would create the opportunities for MSSPs in the future. 

The global managed security services market is segmented on the basis of deployment mode, organization size, application, verticals and geography. Application segment include managed IPS/IDS, Distributed Denial of Services (DDoS), Unified threat management (UTM), firewall management, and endpoint security. Deployment mode includes cloud-based and on-premise or customer-premise equipment deployment mode. The organizations are divided into small- and medium-sized businesses and large businesses. Verticals segment includes BFSI, telecom and IT, retail, healthcare, manufacturing sectors and other. Key players in MSS market include IBM, HP, Cisco Systems Inc., Dell SecureWorks, AT&T, Computer Science Corp., Symantec Corp., Fortinet Inc., Check Point Software Technologies Ltd. and BT Group. 

KEY BENEFITS

  • This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market
  • The report provides information regarding key drivers, restraints and opportunities with impact analysis
  • Porter’s five forces analysis and a SWOT analysis of the key market players are provided to illustrate the business strategies adopted by them
  • The value chain analysis of the industry provides a clear view of key intermediaries involved and elaborates their roles and value addition at every stage in the chain
  • The quantitative analysis of the market through 2013–2020 is provided to elaborate the market potential

Key Market Segments:
The market is segmented on the basis of deployment mode, organization size, application, verticals and geography.
Deployment Mode:

  • Hosted or cloud-based MSS
  • On-premise or customer-premise equipment (CPE) MSS

Organization Size:

  • Small- and Medium-sized businesses
  • Large businesses

Applications:

  • Managed IPS and IDS
  • Distributed Denial of Services (DDoS)
  • Unified threat management (UTM)
  • Secured information and event management (SIEM)
  • Firewall management
  • Endpoint Security
  • Others

Verticals:

  • Banking Financial Services and Insurance (BFSI)
  • Healthcare
  • Manufacturing
  • Retail
  • Telecom & IT
  • Others

Geography:

  • North America
  • Europe
  • Asia-Pacific
  • Latin America, Middle East and Africa (LAMEA)

Key Players:

  • IBM Corporation
  • HP
  • Cisco Systems Inc.
  • Dell SecureWorks
  • AT&T
  • Computer Science Corp.
  • Symantec Corp.
  • Fortinet Inc.
  • Check Point Software Technologies Ltd. 
  • BT Group

CHAPTER 1 INTRODUCTION

1.1 Report description
1.2 Key benefits
1.3 Key market segments
1.4 Research methodology

1.4.1 Secondary research
1.4.2 Primary research
1.4.3 Analyst tools and models

CHAPTER 2 EXECUTIVE SUMMARY

2.1 CXO perspective
2.2 Market beyond: What to expect by 2025

2.2.1 Moderate case scenario
2.2.2 Optimistic case scenario
2.2.3 Diminishing case scenario

CHAPTER 3 MARKET OVERVIEW

3.1 Market definition and scope
3.2 Key findings

3.2.1 Top impacting factors
3.2.2 Top investment pockets
3.2.3 Top winning strategies

3.3 Porter’s  five forces analysis

3.3.1 Plenty of suppliers lowers the bargaining power of suppliers
3.3.2 Demand of customized solutions keeps buyers bargaining power at moderate level
3.3.3 Lack of capital and IT resources for in-house security management lowers the threat of substitute
3.3.4 Technological and policy requirement lowers the threat of new entrants
3.3.5 Presence of strong players intensifies the rivalry

3.4 Value chain analysis
3.5 Market share analysis
3.6 Market dynamics

3.6.1 Drivers

3.6.1.1 Increasing cyber crime activities
3.6.1.2 Cost effectiviness
3.6.1.3 Stringent government regulations
3.6.1.4 Growing trend of mobile devices at workplaces
3.6.1.5 Rise in electronic data

3.6.2 Restraints

3.6.2.1 Hesitation to share sensitive data
3.6.2.2 Demand of customized services

3.6.3 Opportunities

3.6.3.1 Growing awareness about data security
3.6.3.2 Growing importance of e-business

CHAPTER 4 GLOBAL MSS MARKET  BY DEPLOYMENT MODE

4.1 Introduction

4.1.1 Market size and forecast

4.2 Hosted or cloud based managed security services

4.2.1 Key market trends
4.2.2 Competitive scenario
4.2.3 Key growth factors and opportunities
4.2.4 Market size and forecast

4.3 On-premise or Customer Premise Equipment (CPE) managed security services

4.3.1 Key market trends
4.3.2 Competitive scenario
4.3.3 Key growth factors and opportunities
4.3.4 Market size and forecast

CHAPTER 5 GLOBAL MSS MARKET BY ORGANIZATION SIZE

5.1 Introduction

5.1.1 Market size and forecast

5.2 Small and medium sized business

5.2.1 Key market trends
5.2.2 Competitive scenario
5.2.3 Key growth factors and opportunities
5.2.4 Market size and forecast

5.3 Large businesses

5.3.1 Key market trends
5.3.2 Competitive scenario
5.3.3 Key growth factors and opportunities
5.3.4 Market size and forecast

CHAPTER 6 GLOBAL MSS MARKET  BY APPLICATION

6.1 Introduction

6.1.1 Market size and forecast

6.2 Managed Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS)

6.2.1 Market size and forecast

6.3 Distributed Denial of Services (DDoS)

6.3.1 Market size and forecast

6.4 Unified Threat Management (UTM)

6.4.1 Market size and forecast

6.5 Secured Information and Event Management (SIEM)

6.5.1 Market size and forecast

6.6 Endpoint security

6.6.1 Market size and forecast

6.7 Firewall management

6.7.1 Market size and forecast

6.8 Others

6.8.1 Market size and forecast

CHAPTER 7 GLOBAL MSS MARKET BY  VERTICALS

7.1 Introduction

7.1.1 Market size and forecast

7.2 Banking, Financial Services and Insurance (BFSI)

7.2.1 Market size and forecast

7.3 Healthcare

7.3.1 Market size and forecast

7.4 Manufacturing

7.4.1 Market size and forecast

7.5 Retail

7.5.1 Market size and forecast

7.6 Telecom and information technology

7.6.1 Market size and forecast

7.7 Others

7.7.1 Market size and forecast

CHAPTER 8 GLOBAL MSS MARKET BY GEOGRAPHY

8.1 North America

8.1.1 Key market trends
8.1.2 Competitive scenario
8.1.3 Key growth factors and opportunities
8.1.4 Market size and forecast

8.2 Europe

8.2.1 Key market trends
8.2.2 Competitive scenario
8.2.3 Key growth factors and opportunities
8.2.4 Market size and forecast

8.3 Asia Pacific

8.3.1 Key Market trends
8.3.2 Competitive scenario
8.3.3 Key growth factors and opportunities
8.3.4 Market size and forecast

8.4 Latin America, Middle East and Africa (LAMEA)

8.4.1 Key market trends
8.4.2 Competitive scenario
8.4.3 Key growth factors and opportunities
8.4.4 Market size and forecast

CHAPTER 9 COMPANY PROFILES

9.1 International Business Machines Corporation (IBM)

9.1.1 Company overview
9.1.2 Company Snapshot
9.1.1 Business Performance
9.1.2 Strategic Moves and Developments
9.1.3 SWOT Analysis and Strategic Conclusion of IBM Corp.

9.2 Hewlett Packard

9.2.1 Company Overview
9.2.2 Company Snapshot
9.2.3 Business performance
9.2.4 Strategic Moves and Developments
9.2.5 SWOT Analysis and Strategic Conclusion of Hewlett Packard

9.3 AT&T Inc.

9.3.1 Company overview
9.3.2 Company snapshot
9.3.3 Business performance
9.3.4 Strategic moves and developments
9.3.5 SWOT analysis and strategic conclusion of AT&T Inc.

9.4 Computer Science Corporation (CSC)

9.4.1 Company overview
9.4.2 Company snapshot
9.4.3 Business performance
9.4.4 Strategic moves and developments
9.4.5 SWOT analysis and strategic conclusion of CSC

9.5 Symantec Corporation

9.5.1 Company overview
9.5.2 Company snapshot
9.5.3 Business performance
9.5.4 Strategic moves and developments
9.5.5 SWOT analysis and strategic conclusion of Symantec Corp.

9.6 Dell SecureWorks Inc.

9.6.1 Company overview
9.6.2 Company snapshot
9.6.3 Business performance
9.6.4 Strategic moves and developments
9.6.5 SWOT analysis and strategic conclusion of Dell SecureWorks

9.7 Cisco Systems Inc.

9.7.1 Company overview
9.7.2 Company snapshot
9.7.3 Business performance
9.7.4 Strategic moves and developments
9.7.5 SWOT analysis and strategic conclusion of Cisco Systems Inc.

9.8 Fortinet Inc.

9.8.1 Company overview
9.8.2 Company snapshot
9.8.3 Business performance
9.8.4 Strategic moves and developments
9.8.5 SWOT analysis and strategic conclusion of Fortinet Inc.

9.9 Check Point Software Technologies Ltd.

9.9.1 Company  overview
9.9.2 Company snapshot
9.9.3 Business performance
9.9.4 Strategic moves and developments
9.9.5 SWOT analysis and strategic conclusion of Check Point Software Technologies Ltd.

9.10 BT Group

9.10.1 Company  overview
9.10.2 Company snapshot
9.10.3 Business performance
9.10.4 Strategic moves and developments
9.10.5 SWOT analysis and strategic conclusion of BT Group

LIST OF TABLES

TABLE 1  GLOBAL MSS MARKET REVENUE BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 2  GLOBAL MSS MARKET REVENUE MODERATE GROWTH SCENARIO, 2020 – 2025 ($MILLION)
TABLE 3  GLOBAL MSS MARKET REVENUE RAPID GROWTH SCENARIO, 2020 – 2025 ($MILLION)
TABLE 4  GLOBAL MSS MARKET REVENUE DIMINISHING GROWTH SCENARIO, 2020 – 2025 ($MILLION)
TABLE 5  TOTAL NET COST OF CYBERCRIME IN USA AND WORLDWIDE
TABLE 6  COST COMPARISON OF IN-HOUSE SIEM AND MSSP SECURITY SOLUTIONS, 2014
TABLE 7  DIFFERENCE BETWEEN ON-PREMISE AND CLOUD BASED MANAGED SECURITY SERVICES
TABLE 8  GLOBAL MSS MARKET REVENUE BY DEPLOYMENT MODE, 2013-2020 ($MILLION)
TABLE 9  GLOBAL HOSTED OR CLOUD BASED MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 10  GLOBAL ON-PREMISE OR CUSTOMER PREMISE EQUIPMENT MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 11  GLOBAL MSS MARKET BY ORGANIZATION SIZE, 2013-2020 ($MILLION)
TABLE 12  GLOBAL SMALL AND MEDIUM SIZED BUSINESSES MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 13  GLOBAL LARGE BUSINESSES MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 14  GLOBAL MSS MARKET BY APPLICATION, 2013-2020 ($MILLION)
TABLE 15  GLOBAL MANAGED IPS/IDS MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 16  GLOBAL DDOS MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 17  GLOBAL UTM MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 18  GLOBAL SIEM MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 19  GLOBAL ENDPOINT SECURITY MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 20  GLOBAL FIREWALL MANAGEMENT MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 21  GLOBAL OTHER APPLICATIONS MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 22  GLOBAL MSS MARKET BY VERTICALS, 2013-2020 ($MILLION)
TABLE 23  SECURITY LOSS IN VARIOUS BANKS IN INDIA
TABLE 24  GLOBAL BFSI SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 25  GLOBAL HEALTHCARE SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 26  GLOBAL MANUFACTURING SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 27  GLOBAL RETAIL SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 28  GLOBAL TELECOM AND IT SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 29  GLOBAL OTHER SECTOR MSS MARKET BY GEOGRAPHY, 2013-2020 ($MILLION)
TABLE 30  MSS MARKET IN NORTH AMERICA, 2013-2020 ($MILLION)
TABLE 31  MSS MARKET IN EUROPE, 2013-2020 ($MILLION)
TABLE 32  MSS MARKET IN ASIA PACIFIC, 2013-2020 ($MILLION)
TABLE 33  MSS MARKET IN LAMEA, 2013-2020 ($MILLION)
TABLE 34  IBM CORPORATION SNAPSHOT
TABLE 35  HEWLETT PACKARD SNAPSHOT
TABLE 36  AT&T INC. SNAPSHOT
TABLE 37  CSC SNAPSHOT
TABLE 38  SYMANTEC CORP. SNAPSHOT
TABLE 39  DELL SECUREWORKS SNAPSHOT
TABLE 40  CISCO SYSTEMS INC. SNAPSHOT
TABLE 41  FORTINET INC. SNAPSHOT
TABLE 42  CHECK POINT SOFTWARE TECHNOLOGIES LTD.  SNAPSHOT
TABLE 43  BT GROUP  SNAPSHOT

LIST OF FIGURES

FIG. 1  TOP IMPACTING FACTORS, MODERATE GROWTH SCENARIO (2020-2025)
FIG. 2  TOP IMPACTING FACTORS, RAPID GROWTH SCENARIO (2020-2025)
FIG. 3  TOP IMPACTING FACTORS, DIMINISHING GROWTH SCENARIO (2020-2025)
FIG. 4  TOP FACTORS IMPACTING GLOBAL MSS MARKET
FIG. 5  TOP INVESTMENT POCKETS
FIG. 6  TOP WINNING STRATEGIES
FIG. 7  PORTER’S FIVE FORCES ANALYSIS
FIG. 8  VALUE CHAIN ANALYSIS
FIG. 9  MARKET SHARE ANALYSIS, 2013
FIG. 10  AVERAGE ANNUALIZED COST DUE TO CYBERCRIME BY INDUSTRY SECTOR IN US $, 2011
FIG. 11  MALWARE TARGETING ANDROID IN 2011 AND 2012
FIG. 12  GROWING E-COMMERCE MARKET
FIG. 13  USE OF CLOUD COMPUTING SERVICES AMONG EUROPEAN ENTERPRISES, 2014
FIG. 14  APPLICATIOINS LEAST FREQUENTLY TRANSFERRED FROM ON-PREMISE TO CLOUD, 2011(% OF COMPANIES)
FIG. 15  WORLDWIDE SMB IT SPENDING VS WORLDWIDE CORPORATE IT SPENDING
FIG. 16  E-COMMERCE SPENDING IN 2011 COMPARED TO 2010 IN UNITED STATES, $ MILLION
FIG. 17  COST OF DATA BREACH (U. S.) BY CAUSE OVER TIME
FIG. 18  REVENUE GENERATED BY IBM CORP., 2013-2011, $ MILLION
FIG. 19  REVENUE OF IBM CORP. BY BUSINESS SEGMENT, 2013
FIG. 20  REVENUE OF IBM CORP. BY GEOGRAPHY, 2013
FIG. 21  SWOT ANALYSIS OF IBM
FIG. 22  REVENUE GENERATED BY HEWLETT PACKARD, 2013-2011, $ MILLION
FIG. 23  REVENUE OF HEWLETT PACKARD BY BUSINESS SEGMENT, 2013
FIG. 24  REVENUE OF HEWLETT PACKARD BY GEOGRAPHY, 2013
FIG. 25  SWOT ANALYSIS OF HEWLETT PACKARD
FIG. 26  REVENUE GENERATED BY AT&T INC., 2011-2013, $ MILLION
FIG. 27  REVENUE OF AT&T INC. BY BUSINESS SEGMENT, 2013
FIG. 28  SWOT ANALYSIS OF AT&T INC.
FIG. 29  REVENUE GENERATED BY CSC, 2012-2014, $ MILLION
FIG. 30  REVENUE OF CSC BY BUSINESS SEGMENT, 2014
FIG. 31  REVENUE OF CSC BY GEOGRAPHY, 2014
FIG. 32  SWOT ANALYSIS OF CSC
FIG. 33  REVENUE GENERATED BY SYMANTEC CORP., 2012-2014, $ MILLION
FIG. 34  REVENUE OF SYMANTEC CORP. BY BUSINESS SEGMENT, 2014
FIG. 35  REVENUE OF SYMANTEC CORP. BY GEOGRAPHY, 2014
FIG. 36  SWOT ANALYSIS OF SYMANTEC CORP.
FIG. 37  REVENUE GENERATED BY DELL SECUREWORKS, 2011-2013, $ MILLION
FIG. 38  REVENUE OF DELL SECUREWORKS BY BUSINESS SEGMENT, 2013
FIG. 39  REVENUE OF DELL SECUREWORKS BY GEOGRAPHY, 2013
FIG. 40  SWOT ANALYSIS OF DELL SECUREWORKS
FIG. 41  REVENUE GENERATED BY CISCO SYSTEMS INC., 2011-2013, $ MILLION
FIG. 42  REVENUE OF CISCO SYSTEMS INC. BY BUSINESS SEGMENT, 2013
FIG. 43  REVENUE OF CISCO SYSTEMS INC. BY GEOGRAPHY, 2013
FIG. 44  SWOT ANALYSIS OF CISCO SYSTEMS INC.
FIG. 45  REVENUE GENERATED BY FORTINET INC., 2011-2013, $ MILLION
FIG. 46  REVENUE OF FORTINET INC. BY BUSINESS SEGMENT, 2013
FIG. 47  REVENUE OF FORTINET INC. BY GEOGRAPHY, 2013
FIG. 48  SWOT ANALYSIS OF FORTINET INC.
FIG. 49  REVENUE GENERATED BY CHECK POINT SOFTWARE TECHNOLOGIES LTD., 2011-2013, $ MILLION
FIG. 50  REVENUE OF CHECK POINT SOFTWARE TECHNOLOGIES LTD. BY BUSINESS SEGMENT, 2013
FIG. 51  SWOT ANALYSIS OF CHECK POINT SOFTWARE TECHNOLOGIES LTD.
FIG. 52  REVENUE GENERATED BY BT GROUP, 2011-2013, $ MILLION
FIG. 53  REVENUE OF BT GROUP BY BUSINESS SEGMENT, 2013
FIG. 54  SWOT ANALYSIS OF BT GROUP

PURCHASE OPTIONS
 
 

How can we help you?

Contact us at the Consulting WP office nearest to you or submit a business inquiry online.


  Contact
 

Subscribe to Our Newsletter

 
 
REQUEST SAMPLE    ASK FOR DISCOUNT