You are on page 1of 4

Cyber Security:

North American Markets


December 2018

BCC Research Staff


Report Code: IFT174A
Additional segmentations and data sets available upon request. Email custom@bccresearch.com.

Table of Contents
Chapter 1: Introduction ......................................................................................... 1
Introduction .................................................................................................................................................. 1
Study Goals and Objectives........................................................................................................................... 1
Reasons for Doing This Study ........................................................................................................................ 1
Scope of the Report ...................................................................................................................................... 2
Research Methodology ................................................................................................................................. 2
Intended Audience ........................................................................................................................................ 3
Geographic Breakdown................................................................................................................................. 3
Analyst’s Credentials ..................................................................................................................................... 7
BCC Custom Research ................................................................................................................................... 7
Related BCC Research Reports...................................................................................................................... 7

Chapter 2: Summary and Highlights ....................................................................... 9


Overview ....................................................................................................................................................... 9

Chapter 3: Market Overview ................................................................................ 12


Market Definitions ...................................................................................................................................... 12
Malware .................................................................................................................................................. 12
Phishing ................................................................................................................................................... 12
Password Attacks .................................................................................................................................... 12
Denial-of-Service Attacks ........................................................................................................................ 12
Man in the Middle (MITM) ...................................................................................................................... 13
Drive-by Downloads ................................................................................................................................ 13
Malvertising ............................................................................................................................................. 13
Rogue Software ....................................................................................................................................... 13
Data Breaches.......................................................................................................................................... 13
Current Trends ............................................................................................................................................ 14
Preventive Measures for Organizations with BYOD ................................................................................ 15
Life Cycle Analysis.................................................................................................................................... 15
Market Drivers ............................................................................................................................................ 16
Surge in Demand for Cloud-based Enterprise Applications .................................................................... 16
Increasing Digitalization and IT Security Spending.................................................................................. 17
Increased Demand for Disaster Recovery Service................................................................................... 17
Market Restraints ....................................................................................................................................... 18
Use of Pirated Products ........................................................................................................................... 18
Market Opportunities ................................................................................................................................. 18
Rising Uptake in IoT Applications in Smart City Projects......................................................................... 18

Chapter 4: Market Breakdown by Type................................................................ 20


Types of Cyber Security............................................................................................................................... 20
Network Security ..................................................................................................................................... 20
Endpoint Security .................................................................................................................................... 21
Wireless Security ..................................................................................................................................... 21
Content Security ...................................................................................................................................... 22
Cloud Security.......................................................................................................................................... 23
Application Security................................................................................................................................. 24
Market Size and Forecast ............................................................................................................................ 24

Chapter 5: Market Breakdown by Solution .......................................................... 28


Cyber Security Solutions ............................................................................................................................. 28
Antivirus and Anti-malware..................................................................................................................... 28
Encryption ............................................................................................................................................... 29
Risk and Compliance Management ......................................................................................................... 31
Identity and Access Management ........................................................................................................... 31
Firewall .................................................................................................................................................... 32
Disaster Recovery .................................................................................................................................... 33
Data Loss Protection................................................................................................................................ 33
Other Solutions........................................................................................................................................ 34
Market Size and Forecast ............................................................................................................................ 36

Chapter 6: Market Breakdown by Industry Vertical ............................................ 39


Cyber Security Market Verticals ................................................................................................................. 39
Banking, Financial Services and Insurance (BFSI) .................................................................................... 39
Defense and Intelligence ......................................................................................................................... 40
Telecom and IT ........................................................................................................................................ 40
Government ............................................................................................................................................ 41
Retail........................................................................................................................................................ 41
Healthcare ............................................................................................................................................... 42
Other Industry Verticals .......................................................................................................................... 42
Market Size and Forecast ............................................................................................................................ 44

Chapter 7: Market Breakdown by Country........................................................... 48


Cyber Security Market by Country .............................................................................................................. 48
U.S. .......................................................................................................................................................... 48
Canada ..................................................................................................................................................... 48
Mexico ..................................................................................................................................................... 49
Market Size and Forecast ............................................................................................................................ 49

Chapter 8: Competitive Analysis .......................................................................... 52


Value Chain Analysis ................................................................................................................................... 52
Market Share Analysis................................................................................................................................. 52
Key Market Developments ......................................................................................................................... 54

Chapter 9: Company Profiles ............................................................................... 57


About BCC Research ........................................................................................... 63
About BCC Research.................................................................................................................................... 64
BCC Membership ........................................................................................................................................ 64

Additional segmentations and data sets available upon request. Email custom@bccresearch.com
List of Tables
Summary Table: North American Cyber Security Market, by Industry Vertical, Through 2023 ($ Millions)
.................................................................................................................................................................... 10
Table 1 Major Security Breaches in the North American Region ............................................................... 14
Table 2 North American Cyber Security Market, by Type, Through 2023 ($ Millions) ............................... 25
Table 3 North American Cyber Security Market, by Solution, Through 2023 ($ Millions) ......................... 36
Table 4 North American Cyber Security Market, by Industry Vertical, Through 2023 ($ Millions) ............ 45
Table 5 North American Cyber Security Market, by Country, Through 2023 ($ Millions) .......................... 50
Table 6 Key Developmental Strategies Used by Companies in the North American Cyber Security
Market, January 2016-September 2018 ..................................................................................................... 54

You might also like