SlideShare a Scribd company logo
1 of 6
Download to read offline
Global Cybersecurity Overview
2
662.00
421.00 471.00 514.00
783.00 781.00
16.20 22.90
17.50
92.00 85.61
169.07
0
50
100
150
200
0
500
1000
2010 2011 2012 2013 2014 2015
Data Breaches Records Exposed (Million)
Global Number of Data Breaches and Records Exposed
Business
39.95%
Healthcare
35.47%
Banking
9.09%
Government
8.07%
Education
7.43%
Global Percent Share of Data Breaches,
By End User Sector, 2015
US China Germany
Britain Brazil Spain
Italy
Countries with Highest Cybercrime Rates
Source: Identity Theft Resource Centre
Source: Identity Theft Resource Centre
Regional Cybersecurity Market
Snapshot
North America
Largest Regional Share 44%.
APAC 11% (CAGR)
Fastest Growing Region
MEA (6% Revenue share)
Rapid Cloud Adoption Driving the
Market of Cybersecurity
Tech Savvy Business
and Digitized Economy
Well Established Cloud,
IoT and Enterprise
Mobility Markets
Increasing Technology,
Internet and Smartphone
Penetration
Oil Rich Economy
Digitization Plans by
Government
North
America
Europe
APAC
MEA
Overview of Cybersecurity
Spear Phishing
Ransomware Attacks
Web-based Attacks
Malware
❑ Network Security
❑ Data Security
❑ Endpoint Security
❑ Cloud Security
❑ Wireless Security
❑ Data Loss Prevention
Common Types of Cyberattacks
Cybersecurity – Market Overview
• According to International Telecommunication Union (ITU), cyber security can be defined as the
collection of tools, policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies that can be used to
protect cyber environment and organization’s and user’s assets
South
America
Brazil is paving the path for
Cybersecurity market in this
region. Presence of all
Leading players
2
Cybersecurity – Segmentation
Use Cases by Major End User Sectors expected to Drive Cybersecurity Market
(CAGR mentioned is for 2018 – 2023)
BFSI CAGR~12.5%
IT & Telecom
CAGR~9%
Government
CAGR~8%
Healthcare CAGR~13%
Others*
Mobile and E-Governance
Centralized Information
Management & Storage
Regulatory & Compliance
Management
Identity Access Management
Vulnerability Management
Risk Prediction & Mitigation
Unified Endpoint Management
Patient Privacy Protection
Data Leak Prevention
IPS/IDS
Cloud Secured Mobile Diagnosis
Physical Security
IT & Network Infrastructure
Management
Legal & Regulatory Compliance
Education -Mobile Education
Defense - Border Management
Advanced Threat Investigation
Manufacturing- Remote
Monitoring
Large Enterprises ,
25.00%
SMEs & Start Ups,
75.00%
Leading Players are,
1. Intel
2. Check Point
3. Cisco
4. Palo Alto
5. Fortinet
6. RSA Security
7. Trend Micro
8. FireEye
9. Thales
Company Market Share Segmentation, 2017 Revenue Size
Large enterprises are acquiring the smaller companies in order to make their
presence in the market, with which it is expected that the market share for
SMEs & Start Ups will decline during the forecast period.
2
Cybersecurity – Segmentation
Segmentation of Security Type, 2017 (Revenue Size)
35.00%
18.00%
15.00%
14.00%
11.00%
7.00% 2017
Network Security
Content Security
End Point
Security
Wireless Security
Application
Security
Cloud Security
With the
introduction of
GDPR it is
expected that
the market will
grow in double
digits during
the forecast
period.
2
Cybersecurity –Trends & Challenges
Artificial Intelligence (AI) Powered Cybersecurity
Fusion of AI (Machine Learning (ML)) in cybersecurity offers an intelligent platform,
embedded with not just analytical and predictive capabilities, but also risk assessment,
vulnerability management and threat detection capabilities, thereby boosting the demand
for ‘smart cybersecurity’ solutions, globally. Companies like Apple, Cisco, IBM, etc., have
been leading the race.
Rise of Cyber Risk Insurance
With increasing incidences of data breaches and cybercrimes, adoption of cyber risk
assurance has also gone up. The insurance, which is also referred as Cyber Liability
Insurance Coverage (CLIC), helps organizations to recover the cost involved in the security
or breach incident. This is going to experience a double digit growth rate.
Emergence of Quantum Cryptography
Quantum cryptography is more reliable when compared to classical methods of
encryptions. In quantum cryptography the data cannot be copied or read, eavesdropping is
intently realized and is estimated to become the most secure channel for communication.
With increasing intensity of cyber attacks, it is expected that in nearing future Quantum
Cryptography will help in data encryption and its security.
Blockchain to Boost Cybersecurity Market
A distributed ledger technology that is revolutionizing the cybersecurity market. Blockchain
is immutable, meaning something that cannot be changed or manipulated over time. Thus,
in the context of blockchain, once data (transaction’s information) has been written on a
blockchain, it enters in the distributed ledger, and there can be no alterations, not even by
the system administrator. Also, there is a time stamp on every transaction which is fed to
the blockchain, which the process of auditing.
Demand for Cloud Security to Skyrocket
Demand for cloud security is likely to grow at the fastest pace in India cybersecurity market
till 2023, majorly due to the Digital India momentum initiated by the government coupled
with increasing adoption of SMAC technologies.
Growing IoT
Network
The Hackers are
Getting Smarter
from Data Theft
to Data
Manipulation
Rise of State
Sponsored
Attacks
Quantum
Computers
Market Challenges
With the growing IoT network
and the launch of IPV6
(Internet Protocol version 6)
The IPV6 uses a 128-bit
address, which can provide
7.9×1028 times more IP
address as compared to the
existing IPv4. Increasing end
nodes, has been pushing the
IoT ecosystem & it also poses
a potential threat, as they
became a vanilla target for the
hackers.
AI technology was majorly
seen as a tool for human
augmentation, but in the
wrong hands it can be
deadlier than nuclear
weapons. With increase in
cybersecurity measures,
hackers are finding new
ways to counter and step
up their game in order to
successfully execute
cyberattacks.
These types of attacks are
sponsored by government
and are specifically tailored
for disrupting the function
of government by
meddling with voters
mindset.
This takes targeting to a
whole new level, instead of
pushing products by
targeting the consumer,
state sponsored cyber
attacks leverages this
concept to incept malicious
ideas and brainwash the
voters by showing content
that appeals to emotional
quotient of the voters.
Quantum computers
are 3,600 times
faster than a
supercomputer and
approximately 100
million times than a
personnel computer.
They can beat
classical encryption in
a matter of seconds.
This is by far the
greatest emerging
threat in terms of
cybersecurity.
Market Trends
Thank - You

More Related Content

What's hot

Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial ServicesAppian
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
QTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicQTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicMichelle Belnap
 
When Technology Turns Tumultuous: 2017 Tech Predictions
When Technology Turns Tumultuous: 2017 Tech PredictionsWhen Technology Turns Tumultuous: 2017 Tech Predictions
When Technology Turns Tumultuous: 2017 Tech PredictionsJacob Parker-Bowles
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Top strategic predictions for 2016 and beyond
Top strategic predictions for 2016 and beyondTop strategic predictions for 2016 and beyond
Top strategic predictions for 2016 and beyondInvisibits
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...Agile Testing Alliance
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
5 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 20215 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 2021CompunnelDigital1
 
iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]Haider Iqbal
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015Marcos Ortiz Valmaseda
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Impact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look atImpact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look atVivek Mishra
 

What's hot (20)

SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial Services
 
Forbes Article
Forbes ArticleForbes Article
Forbes Article
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
QTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicQTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographic
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
When Technology Turns Tumultuous: 2017 Tech Predictions
When Technology Turns Tumultuous: 2017 Tech PredictionsWhen Technology Turns Tumultuous: 2017 Tech Predictions
When Technology Turns Tumultuous: 2017 Tech Predictions
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Top strategic predictions for 2016 and beyond
Top strategic predictions for 2016 and beyondTop strategic predictions for 2016 and beyond
Top strategic predictions for 2016 and beyond
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
5 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 20215 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 2021
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Impact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look atImpact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look at
 

Similar to Global Cyber Security Overview | TechSci Research

Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkAppian
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfRosalie Lauren
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecRapidSSLOnline.com
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 

Similar to Global Cyber Security Overview | TechSci Research (20)

Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdf
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 

More from TechSci Research

India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...
India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...
India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...TechSci Research
 
Saudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdf
Saudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdfSaudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdf
Saudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdfTechSci Research
 
Global Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdf
Global Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdfGlobal Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdf
Global Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdfTechSci Research
 
Middle East Facility Management Market_2027.pdf
Middle East Facility Management Market_2027.pdfMiddle East Facility Management Market_2027.pdf
Middle East Facility Management Market_2027.pdfTechSci Research
 
Final Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptx
Final Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptxFinal Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptx
Final Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptxTechSci Research
 
Global Industrial Valves Market_2018-2028F.pptx
Global Industrial Valves Market_2018-2028F.pptxGlobal Industrial Valves Market_2018-2028F.pptx
Global Industrial Valves Market_2018-2028F.pptxTechSci Research
 
Turkey Medical Tourism Market 2027_Sample.pptx
Turkey Medical Tourism Market 2027_Sample.pptxTurkey Medical Tourism Market 2027_Sample.pptx
Turkey Medical Tourism Market 2027_Sample.pptxTechSci Research
 
Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...
Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...
Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...TechSci Research
 
India Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdf
India Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdfIndia Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdf
India Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdfTechSci Research
 
India Facility Management Market.pptx
India Facility Management Market.pptxIndia Facility Management Market.pptx
India Facility Management Market.pptxTechSci Research
 
Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...
Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...
Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...TechSci Research
 
Saudi Arabia Ceramic Tiles Market, 2027
Saudi Arabia Ceramic Tiles Market, 2027Saudi Arabia Ceramic Tiles Market, 2027
Saudi Arabia Ceramic Tiles Market, 2027TechSci Research
 
Indonesia Elevator Market, 2027.pdf
Indonesia Elevator Market, 2027.pdfIndonesia Elevator Market, 2027.pdf
Indonesia Elevator Market, 2027.pdfTechSci Research
 
Global Offshore Oil and Gas Rigs Market Forecast 2027
Global Offshore Oil and Gas Rigs Market Forecast 2027Global Offshore Oil and Gas Rigs Market Forecast 2027
Global Offshore Oil and Gas Rigs Market Forecast 2027TechSci Research
 
India Water Heater Market, Forecast and Opportunities, 2028_Report.pptx
India Water Heater Market, Forecast and Opportunities, 2028_Report.pptxIndia Water Heater Market, Forecast and Opportunities, 2028_Report.pptx
India Water Heater Market, Forecast and Opportunities, 2028_Report.pptxTechSci Research
 
UAE Landscaping Market Forecast and Opportunities 2027.pdf
UAE Landscaping Market Forecast and Opportunities 2027.pdfUAE Landscaping Market Forecast and Opportunities 2027.pdf
UAE Landscaping Market Forecast and Opportunities 2027.pdfTechSci Research
 
Global Offshore Oil and Gas Rigs Market, Forecast 2027
Global Offshore Oil and Gas Rigs Market, Forecast 2027Global Offshore Oil and Gas Rigs Market, Forecast 2027
Global Offshore Oil and Gas Rigs Market, Forecast 2027TechSci Research
 
Saudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdf
Saudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdfSaudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdf
Saudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdfTechSci Research
 
Saudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdf
Saudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdfSaudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdf
Saudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdfTechSci Research
 
Middle East and Africa Electric Three-Wheeler Market, 2027.pdf
Middle East and Africa Electric Three-Wheeler Market, 2027.pdfMiddle East and Africa Electric Three-Wheeler Market, 2027.pdf
Middle East and Africa Electric Three-Wheeler Market, 2027.pdfTechSci Research
 

More from TechSci Research (20)

India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...
India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...
India Passenger Car Cabin Air Filter Market, Forecast and Opportunities, 2027...
 
Saudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdf
Saudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdfSaudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdf
Saudi Arabia Spare Parts Market, Forecast and Opportunities, 2027.pdf
 
Global Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdf
Global Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdfGlobal Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdf
Global Offshore Wind Turbine Market, Forecast and Opportunities, 2027.pdf
 
Middle East Facility Management Market_2027.pdf
Middle East Facility Management Market_2027.pdfMiddle East Facility Management Market_2027.pdf
Middle East Facility Management Market_2027.pdf
 
Final Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptx
Final Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptxFinal Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptx
Final Report_Malaysia Elevators and Escalators Market, 2017-2027F.pptx
 
Global Industrial Valves Market_2018-2028F.pptx
Global Industrial Valves Market_2018-2028F.pptxGlobal Industrial Valves Market_2018-2028F.pptx
Global Industrial Valves Market_2018-2028F.pptx
 
Turkey Medical Tourism Market 2027_Sample.pptx
Turkey Medical Tourism Market 2027_Sample.pptxTurkey Medical Tourism Market 2027_Sample.pptx
Turkey Medical Tourism Market 2027_Sample.pptx
 
Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...
Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...
Saudi Arabia Automotive Lead Acid Battery Market Forecast and Opportunities 2...
 
India Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdf
India Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdfIndia Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdf
India Cryogenic Tanker Market, Forecast and Opportunities, 2028.pdf
 
India Facility Management Market.pptx
India Facility Management Market.pptxIndia Facility Management Market.pptx
India Facility Management Market.pptx
 
Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...
Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...
Interview With Dr Karthik Anantharaman From Apollo Hospitals on India E Pharm...
 
Saudi Arabia Ceramic Tiles Market, 2027
Saudi Arabia Ceramic Tiles Market, 2027Saudi Arabia Ceramic Tiles Market, 2027
Saudi Arabia Ceramic Tiles Market, 2027
 
Indonesia Elevator Market, 2027.pdf
Indonesia Elevator Market, 2027.pdfIndonesia Elevator Market, 2027.pdf
Indonesia Elevator Market, 2027.pdf
 
Global Offshore Oil and Gas Rigs Market Forecast 2027
Global Offshore Oil and Gas Rigs Market Forecast 2027Global Offshore Oil and Gas Rigs Market Forecast 2027
Global Offshore Oil and Gas Rigs Market Forecast 2027
 
India Water Heater Market, Forecast and Opportunities, 2028_Report.pptx
India Water Heater Market, Forecast and Opportunities, 2028_Report.pptxIndia Water Heater Market, Forecast and Opportunities, 2028_Report.pptx
India Water Heater Market, Forecast and Opportunities, 2028_Report.pptx
 
UAE Landscaping Market Forecast and Opportunities 2027.pdf
UAE Landscaping Market Forecast and Opportunities 2027.pdfUAE Landscaping Market Forecast and Opportunities 2027.pdf
UAE Landscaping Market Forecast and Opportunities 2027.pdf
 
Global Offshore Oil and Gas Rigs Market, Forecast 2027
Global Offshore Oil and Gas Rigs Market, Forecast 2027Global Offshore Oil and Gas Rigs Market, Forecast 2027
Global Offshore Oil and Gas Rigs Market, Forecast 2027
 
Saudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdf
Saudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdfSaudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdf
Saudi Arabia Automotive Aftermarket, Forecast and Opportunities, 2027_Report.pdf
 
Saudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdf
Saudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdfSaudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdf
Saudi Arabia Electric Vehicle Charging Infrastructure Market 2027.pdf
 
Middle East and Africa Electric Three-Wheeler Market, 2027.pdf
Middle East and Africa Electric Three-Wheeler Market, 2027.pdfMiddle East and Africa Electric Three-Wheeler Market, 2027.pdf
Middle East and Africa Electric Three-Wheeler Market, 2027.pdf
 

Recently uploaded

How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirtrahman018755
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appscristianmanaila2
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsrahman018755
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebJie Liau
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsrahman018755
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.Tortogel
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 

Recently uploaded (16)

How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 

Global Cyber Security Overview | TechSci Research

  • 2. 2 662.00 421.00 471.00 514.00 783.00 781.00 16.20 22.90 17.50 92.00 85.61 169.07 0 50 100 150 200 0 500 1000 2010 2011 2012 2013 2014 2015 Data Breaches Records Exposed (Million) Global Number of Data Breaches and Records Exposed Business 39.95% Healthcare 35.47% Banking 9.09% Government 8.07% Education 7.43% Global Percent Share of Data Breaches, By End User Sector, 2015 US China Germany Britain Brazil Spain Italy Countries with Highest Cybercrime Rates Source: Identity Theft Resource Centre Source: Identity Theft Resource Centre Regional Cybersecurity Market Snapshot North America Largest Regional Share 44%. APAC 11% (CAGR) Fastest Growing Region MEA (6% Revenue share) Rapid Cloud Adoption Driving the Market of Cybersecurity Tech Savvy Business and Digitized Economy Well Established Cloud, IoT and Enterprise Mobility Markets Increasing Technology, Internet and Smartphone Penetration Oil Rich Economy Digitization Plans by Government North America Europe APAC MEA Overview of Cybersecurity Spear Phishing Ransomware Attacks Web-based Attacks Malware ❑ Network Security ❑ Data Security ❑ Endpoint Security ❑ Cloud Security ❑ Wireless Security ❑ Data Loss Prevention Common Types of Cyberattacks Cybersecurity – Market Overview • According to International Telecommunication Union (ITU), cyber security can be defined as the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect cyber environment and organization’s and user’s assets South America Brazil is paving the path for Cybersecurity market in this region. Presence of all Leading players
  • 3. 2 Cybersecurity – Segmentation Use Cases by Major End User Sectors expected to Drive Cybersecurity Market (CAGR mentioned is for 2018 – 2023) BFSI CAGR~12.5% IT & Telecom CAGR~9% Government CAGR~8% Healthcare CAGR~13% Others* Mobile and E-Governance Centralized Information Management & Storage Regulatory & Compliance Management Identity Access Management Vulnerability Management Risk Prediction & Mitigation Unified Endpoint Management Patient Privacy Protection Data Leak Prevention IPS/IDS Cloud Secured Mobile Diagnosis Physical Security IT & Network Infrastructure Management Legal & Regulatory Compliance Education -Mobile Education Defense - Border Management Advanced Threat Investigation Manufacturing- Remote Monitoring Large Enterprises , 25.00% SMEs & Start Ups, 75.00% Leading Players are, 1. Intel 2. Check Point 3. Cisco 4. Palo Alto 5. Fortinet 6. RSA Security 7. Trend Micro 8. FireEye 9. Thales Company Market Share Segmentation, 2017 Revenue Size Large enterprises are acquiring the smaller companies in order to make their presence in the market, with which it is expected that the market share for SMEs & Start Ups will decline during the forecast period.
  • 4. 2 Cybersecurity – Segmentation Segmentation of Security Type, 2017 (Revenue Size) 35.00% 18.00% 15.00% 14.00% 11.00% 7.00% 2017 Network Security Content Security End Point Security Wireless Security Application Security Cloud Security With the introduction of GDPR it is expected that the market will grow in double digits during the forecast period.
  • 5. 2 Cybersecurity –Trends & Challenges Artificial Intelligence (AI) Powered Cybersecurity Fusion of AI (Machine Learning (ML)) in cybersecurity offers an intelligent platform, embedded with not just analytical and predictive capabilities, but also risk assessment, vulnerability management and threat detection capabilities, thereby boosting the demand for ‘smart cybersecurity’ solutions, globally. Companies like Apple, Cisco, IBM, etc., have been leading the race. Rise of Cyber Risk Insurance With increasing incidences of data breaches and cybercrimes, adoption of cyber risk assurance has also gone up. The insurance, which is also referred as Cyber Liability Insurance Coverage (CLIC), helps organizations to recover the cost involved in the security or breach incident. This is going to experience a double digit growth rate. Emergence of Quantum Cryptography Quantum cryptography is more reliable when compared to classical methods of encryptions. In quantum cryptography the data cannot be copied or read, eavesdropping is intently realized and is estimated to become the most secure channel for communication. With increasing intensity of cyber attacks, it is expected that in nearing future Quantum Cryptography will help in data encryption and its security. Blockchain to Boost Cybersecurity Market A distributed ledger technology that is revolutionizing the cybersecurity market. Blockchain is immutable, meaning something that cannot be changed or manipulated over time. Thus, in the context of blockchain, once data (transaction’s information) has been written on a blockchain, it enters in the distributed ledger, and there can be no alterations, not even by the system administrator. Also, there is a time stamp on every transaction which is fed to the blockchain, which the process of auditing. Demand for Cloud Security to Skyrocket Demand for cloud security is likely to grow at the fastest pace in India cybersecurity market till 2023, majorly due to the Digital India momentum initiated by the government coupled with increasing adoption of SMAC technologies. Growing IoT Network The Hackers are Getting Smarter from Data Theft to Data Manipulation Rise of State Sponsored Attacks Quantum Computers Market Challenges With the growing IoT network and the launch of IPV6 (Internet Protocol version 6) The IPV6 uses a 128-bit address, which can provide 7.9×1028 times more IP address as compared to the existing IPv4. Increasing end nodes, has been pushing the IoT ecosystem & it also poses a potential threat, as they became a vanilla target for the hackers. AI technology was majorly seen as a tool for human augmentation, but in the wrong hands it can be deadlier than nuclear weapons. With increase in cybersecurity measures, hackers are finding new ways to counter and step up their game in order to successfully execute cyberattacks. These types of attacks are sponsored by government and are specifically tailored for disrupting the function of government by meddling with voters mindset. This takes targeting to a whole new level, instead of pushing products by targeting the consumer, state sponsored cyber attacks leverages this concept to incept malicious ideas and brainwash the voters by showing content that appeals to emotional quotient of the voters. Quantum computers are 3,600 times faster than a supercomputer and approximately 100 million times than a personnel computer. They can beat classical encryption in a matter of seconds. This is by far the greatest emerging threat in terms of cybersecurity. Market Trends