About Threat Intelligence Threat intelligence is a security service given by security vendors to thwart advanced attacks such as APT, advanced malware, and other new breeds of sophisticated threats that have unknown signatures and are slow and adaptive. These new breeds of cyber-attacks are immune to traditional security solutions and hence the need for a proactive, intelligent system to prevent attacks. Threat intelligence service is largely given as a service through cloud by vendors that range from ICT vendors, security vendors, and MSSP providers. The service offerings typically are of three types: TIS Managed Security Services, TIS Information Feeds and Publications, and TIS Consultative Services. As the number of cyber-attacks continue to increase, the level of awareness in organizations across geographies also rises. As organizations realize that in-house security teams are not competent enough, considering the level of sophistication in attacks by hackers, this leads to increased look-up to vendors that give solutions not only just to detect but also prevent any possible attack. TechNavio's analysts forecast the Global Threat Intelligence... Research Beam Model: Research Beam Product ID: 170136 2500 USD New
Global Threat Intelligence Security Market 2014-2018
 
 

Global Threat Intelligence Security Market 2014-2018

  • Category : ICT & Media
  • Published On : September   2014
  • Pages : 75
  • Publisher : Technavio
 
 
 
About Threat Intelligence
Threat intelligence is a security service given by security vendors to thwart advanced attacks such as APT, advanced malware, and other new breeds of sophisticated threats that have unknown signatures and are slow and adaptive. These new breeds of cyber-attacks are immune to traditional security solutions and hence the need for a proactive, intelligent system to prevent attacks. Threat intelligence service is largely given as a service through cloud by vendors that range from ICT vendors, security vendors, and MSSP providers. The service offerings typically are of three types: TIS Managed Security Services, TIS Information Feeds and Publications, and TIS Consultative Services. As the number of cyber-attacks continue to increase, the level of awareness in organizations across geographies also rises. As organizations realize that in-house security teams are not competent enough, considering the level of sophistication in attacks by hackers, this leads to increased look-up to vendors that give solutions not only just to detect but also prevent any possible attack.
TechNavio's analysts forecast the Global Threat Intelligence Security Market to grow at a CAGR of 14.2 percent over the period 2013-2018.
Covered in this Report
This report covers the present scenario and the growth prospects of the Global Threat Intelligence Security market for the period 2013-2018. To calculate the market size, the report considers revenue generated from the security services provided by TIS vendors. It also presents the vendor landscape and corresponding detailed analysis of the top four vendors in the market. In addition, the report discusses the major drivers that influence the growth of the Global Threat Intelligence Security market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends that are emerging in the market.
Key Regions
• Americas
• EMEA
• APAC
Key Vendors
• IBM
• McAfee
• Symantec
• Trend Micro
Other Prominent Vendors

• Accenture
• Arbor Networks
• Cyveillance
• Dell SecureWorks
• Deloitte
• Ernest & Young
• HP
• Juniper Networks
• Secunia
• Webroot


Market Driver
• Rise in Number of Sophisticated Threats
• For a full, detailed list, view our report
Market Challenge
• Shortage of Security Talent
• For a full, detailed list, view our report
Market Trend
• Enhancements in Threat Intelligence Process
• For a full, detailed list, view our report
Key Questions Answered in this Report
• What will the market size be in 2018 and what will the growth rate be?
• What are the key market trends?
• What is driving this market?
• What are the challenges to market growth?
• Who are the key vendors in this market space?
• What are the market opportunities and threats faced by the key vendors?
• What are the strengths and weaknesses of the key vendors?
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Service Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1.1 Threat Intelligence System
07. Market Landscape
07.1 Market Overview
07.2 Key Assumptions
07.2.1 Product Life Cycle of TIS Service Offerings
07.3 Global Threat Intelligence Security Market
07.3.1 Market Size and Forecast
07.4 Five Forces Analysis
08. Market Segmentation by Offerings
08.1 Global TIS Managed Security Services Market
08.1.1 Market Size and forecast
08.2 Global TIS Information Feeds and Publications Market
08.2.1 Market Size and Forecast
08.3 Global TIS Consultative Services Market
08.3.1 Market Size and Forecast
09. Geographical Segmentation
10. Buying Criteria
11. Market Growth Drivers
12. Drivers and their Impact
13. Market Challenges
14. Impact of Drivers and Challenges
15. Market Trends
16. Trends and their Impact
17. Vendor Landscape
17.1 Competitive Scenarios
17.2 Market Share Analysis 2013
17.3 Other Prominent Vendors
18. Key Vendor Analysis
18.1 IBM
18.1.1 Key Facts
18.1.2 Business Overview
18.1.3 Business Segmentation
18.1.4 Business Segmentation by Revenue 2013
18.1.5 Business Segmentation by Operation in 2013
18.1.6 Business Segmentation by Revenue 2012 and 2013
18.1.7 Geographical Segmentation by Revenue 2013
18.1.8 Business Strategy
18.1.9 Recent Developments
18.1.10 SWOT Analysis
18.2 McAfee
18.2.1 Key Facts
18.2.2 Business Overview
18.2.3 Product Segmentation
18.2.4 Key Locations
18.2.5 Business Strategy
18.2.6 Recent Developments
18.2.7 SWOT Analysis
18.3 Symantec
18.3.1 Key Facts
18.3.2 Business Overview
18.3.3 Business Segmentation by Revenue 2013
18.3.4 Business Segmentation by Revenue 2013 and 2014
18.3.5 Geographical Segmentation by Revenue 2013
18.3.6 Business Strategy
18.3.7 Recent Developments
18.3.8 SWOT Analysis
18.4 Trend Micro
18.4.1 Key Facts
18.4.2 Business Overview
18.4.3 Geographical Segmentation by Revenue 2012 and 2013
18.4.4 Geographical Segmentation by Revenue 2013
18.4.5 Business Strategy
18.4.6 Recent Developments
18.4.7 SWOT Analysis
19. Other Reports in this Series



List of Exhibits
Exhibit 1: Market Research Methodology
Exhibit 2: Threat Intelligence System Framework
Exhibit 3: Overview of Global Threat Intelligence Security Market
Exhibit 4: Product Life Cycle of TIS Service Offerings
Exhibit 5: Global Threat Intelligence Security Market 2013-2018 (US$ million)
Exhibit 6: Global Threat Intelligence Security Market by Type of Offerings 2013
Exhibit 7: Global Threat Intelligence Security Market by Type of Offerings 2013-2018
Exhibit 8: Global TIS Managed Security Services Market 2013-2018 (US$ million)
Exhibit 9: Global TIS Information Feeds and Publications Market 2013-2018 (US$ million)
Exhibit 10: Global TIS Consultative Services Market 2013-2018 (US$ million)
Exhibit 11: Global Threat Intelligence Security Market by Geographical Segmentation 2013
Exhibit 12: Global Threat Intelligence Security Market by Geographical Segmentation 2013-2018
Exhibit 13: Global Threat Intelligence Security Market by Geographical Segmentation 2013-2018 (US$ million)
Exhibit 14: IBM: Business Segmentation
Exhibit 15: IBM: Business Segmentation by Revenue 2013
Exhibit 16: IBM: Business Segmentation by Operation in 2013
Exhibit 17: IBM: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 18: IBM: Geographical Segmentation by Revenue 2013
Exhibit 19: McAfee: Product Segmentation 2013
Exhibit 20: McAfee: Key Locations
Exhibit 21: Symantec: Business Segmentation by Revenue 2013
Exhibit 22: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
Exhibit 23: Symantec: Geographical Segmentation by Revenue 2013
Exhibit 24: Trend Micro: Geographical Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 25: Trend Micro: Geographical Segmentation by Revenue 2013


PURCHASE OPTIONS
 
 
 

How can we help you?

Contact us at the Consulting WP office nearest to you or submit a business inquiry online.


  Contact
 

Subscribe to Our Newsletter

 
 
REQUEST SAMPLE    ASK FOR DISCOUNT