SlideShare a Scribd company logo
1 of 12
Prepared by Netscribes Inc.
Proprietary and Confidential, Copyright © 2018, Netscribes, Inc. All Rights Reserved
The content of this document is confidential and meant for the review of the recipient.
Disclaimer: The names or logos of other companies and products mentioned herein are the trademarks of their respective owners
1.1 Market scope and segmentation
Globalcybersecuritymarket
Segments Differentiation
Based on solution
Based on end use industry
• Identity and access management (IAM)
• Encryption
• Governance, risk and compliance
• Unified threat management (UTM)
• Security information and event management (SIEM)
• Aerospace
• Financial services
• Telecommunication
• Healthcare
• Others
Based on region
North America
Europe
Latin America
The Middle East and Africa
Asia-Pacific
19
3
Market definitions
IAM is a collection of technologies and
processes that help in managing digital or
electronic identity.
Identity and access management (IAM)
Encryption is the use of technology to
convert data into an unrecognizable format
so that it cannot be viewed by unauthorized
parties. A secret key or a password is
required to read an encrypted file.
Encryption
UTM is an integration of multiple security
and service features in a single platform
that protects the user from blended
threats.
Unified threat management (UTM)
The cybersecurity market comprises those technologies that protect computers, networks, applications, and data against cyberthreats, i.e., unauthorized access with mala fide intent.
SIEM is an approach to security
management that combines security
information management (SIM) and
security event management (SEM). This
approach allows real-time identification,
monitoring, recording, and analysis of
security events.
Security information and
event management (SIEM)
1.3 Executive summary (2/2)
Overview
Trends
• The global cybersecurity market is expected to expand at a compound annual growth rate (CAGR) of 11.6% during the 2017-2022 period, reaching a
value of USD 173.19 Bn by 2022. The market is primarily driven by the risk and compliance segment, which accounted for the highest revenue in
2016, generating a 50.4% share. This is a result of the large scale adoption of various cybersecurity solutions, as per compliance norms, across
different industrial and commercial sectors.
• Among the applications of cybersecurity systems across various end use industries, the financial sector held the largest market share in 2016, and is
anticipated to maintain its dominance in the coming years.
• Increased reliance on the Internet, coupled with the rapid growth in smartphone usage in the corporate environment are expected
to boost the requirement for cybersecurity in order to provide protection against security breaches.
• Spending on information security products will reach approximately USD 124 Bn by 2019, a large portion of it being spent on
cybersecurity products and solutions. High awareness, especially in the corporate context, is aiding in its fast adoption.
• 5G networks will allow an increasing number of devices to be connected, and will hence require even stricter security features. As a
result, cybersecurity protocols and solutions will need to evolve to keep up with these changes.
• There has been an increase in the adoption of hardware-based authentication that allows cryptographic information to be stored
physically away from the computing devices, thus minimizing chances of cyberattacks.
• Artificial intelligence (AI) and machine learning are enhancing the security standards of cybersecurity solutions. Also, embedded
automation in these products requires minimum manual intervention, further reducing the risks.
• Recent legislations such as General Data Protection Regulation (GDPR) in the European Union (EU), and the Right to Privacy Act in
India are creating greater awareness for protecting private data. Moreover, countries like Israel and Singapore are collaborating to
develop expertise in the cybersecurity space.
• Organizations are creating huge volumes of data from various sources and want to utilize it to their benefit. However, the centralized nature of big data
stores are creating new security challenges, since centralized data stores are highly vulnerable to cyberattacks.
• Threats tend to evolve faster than their solutions. Cybersecurity providers are in a constant race to identify the latest threats and address them. However,
incidents of data loss continue to increase globally.
XX
XX
173.19
2014 2017 2022
4
USD Bn
2.1 Global - market overview
Geography-wise market revenue (USD bn)
NorthAmerica
Europe
Asia-Pacific
LatinAmerica
The
Middle
Eastand
Africa
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
Fig 1: Market attractiveness analysis based on geography
5
CAGR(%)
Note: The size of the circle denotes the
regional revenues in USD Bn
Market attractiveness (based on absolute growth from 2017 to
2022)
North America
Europe
The Middle East
and Africa
Latin America
Asia-Pacific
2.2 Global market drivers
Rapid digitalization coupled with increasing adoption of information and communications technology (ICT) devices
• Rapid digitalization has resulted in the increased adoption of various ICTs, including cloud computing, smart grids, optic Wi-Fi, cognitive technologies, and new payment
models, among others. People, organizations, and governments are using these products to transfer confidential data over the Internet, which increase the chances of
unauthorized access to data. Again, the rapid change in business environments, owing to the adoption of the bring-your-own-device (BYOD) concept, makes it necessary
to have efficient multilayered cybersecurity systems that provide access to corporate information, along with minimizing risk, and maintaining compliance.
• Using cybersecurity solutions to implement security and protective measures regarding data exchange, and to create an environment of digital trust and safety are thus
becoming a necessity.
Spending on information security products continues to increase
• The global expenditure on information security products shows an increasing trend, from USD 101 Bn in 2017 to USD 124 Bn in 2019, as per research estimates. A large
portion of this expense will be for cybersecurity products and solutions. One of the possible reasons for the higher adoption among various sectors is increased
awareness regarding security and its associated issues.
• Data and information loss has resulted in significant financial losses for organizations in the past. Each of these instances becomes a driver for other organizations to
implement cybersecurity platforms or solutions.
6
Cybersecurity will evolve with 5G
• With the advent of the 5G era, more and more devices will be connected using Internet of Things (IoT). The management of data on these devices will become far more
complex than it is today. However, compared to the monolithic networks that we presently have, 5G will have all its functions virtualized. Since, virtualization means
greater mutual authentication between users and networks, 5G will restrict cyberattacks to some extent.
• However, the chances of denial of services attacks (DDoS) will persist. In the 2016 Dyn cyberattack, unsecured IoT devices, such as baby monitors, printers, etc., were
hacked as they were provided with default passwords. The impact might be manifold with 5G. Hence, the expected high adoption of 5G in the next few years will also
necessitate the evolution of cybersecurity technologies.
5G
3.1 Identity and access management (IAM)
Growth drivers
IAM
XX XX XX XX XX XX
XX
XX
42.41
2014 2015 2016 2017 2018 2019 2020 2021 2022
CAGR (2017-2022): XX%
Fig 4: Revenue contribution – IAM
Challenges
Major trendsIn general, the IoT vendors focus less on maintaining privacy,
providing authentication and managing users’ identities.
However, IoT platform product managers and service
providers have started to incorporate various device identities
and access technologies into IoT platforms to simplify security
designs.
IAM is currently carried out in a decentralized manner using
Blockchain technology to prevent changes in personal
information.
The traditional user authentication is rule-based. The next
generation of adaptive access is however based on the
combined rules of machine learning and advanced analytics.
An organization sets a baseline for user behaviour, creating a
user group. Through unsupervised machine learning, the user
behaviour is tracked and corrective action is taken, if any
anomaly is detected.
• With single-factor authentication being no longer acceptable
in the growing digital world, stronger mechanisms such as
multi-factor and biometric authentication are needed to
improve security, which are considered crucial for the growth
of IAM.
• Stolen credentials of employees is the leading facilitator of
system hacking cases and data breach incidents, which is
expected to cost businesses around USD 2 Tn by 2019,
globally. In fact, stolen employee passwords are responsible
for 90% of cyberattacks, according to leading industry and
government reports. These are pushing organizations to
acquire IAM solutions.
• The IoT will connect almost every object to the Internet,
increasing the risk of cyberattacks. IAM solutions help to
create an identity lifecycle for IoT devices, also called Identity
of Things (IDoT), and safeguard the data during the lifecycle. • Application of IAM in the software as a service (SaaS)
model makes it easier for users to access information.
However, it becomes complex with the rapidly
increasing number of applications. Each application
requires different passwords and expiration cycles. This
diminishes user productivity as they spend time trying
to manage, reset and remember the data.
• IAM products are expensive for extending or
integrating with cloud applications.
7
13.1 North America - market overview
Overview
North America
XX XX XX XX XX XX
XX
XX
X
2014 2015 2016 2017 2018 2019 2020 2021 2022
CAGR (2017-2022): XX%
Market drivers
Major trends
2
Hackers are using novel techniques to break into
systems. Advanced technologies such as deception
technology are being used to counter those attacks.
For instance, decoy systems such as Honeypot are
used to imitate the actual system containing
confidential data. This works as an active bait for
hackers, and once they try to hack the decoy
systems, they are blocked from entering other
system applications.
1
• North America held the largest market share in the
cybersecurity market across different regions in 2016,
generating XX% of the global revenue.
• The United States (U.S.) cybersecurity market leads in
terms of overall expenditure on cybersecurity
solutions, and is expected to maintain its superior
position in the coming years.
• Recently, the Defense Secretary of U.S. established a
task force to recommend ways to curb theft of critical
technologies by competing nations.
• Across the U.S., private and public agencies are
implementing cybersecurity systems in order to
safeguard their stakeholders.
• Increasing investment in cybersecurity systems by various
corporate investors such as Intel Capital, Google Ventures,
Qualcomm Ventures, and Juniper Networks, among others, is
another important factor anticipated to augment the growth
of the cybersecurity market in North America. Since 2017,
various corporate investors have invested USD 1.47 Bn in
different cyber security companies across 191 deals.
• The 2019 U.S. budget has proposed an allocation of USD
14.98 Bn for key initiatives and research across different
cybersecurity technologies. This is an increase from USD 13.1
Bn in 2017 and USD 14.4 Bn in 2018.
Managed IT services that help organizations in managing
endpoint security are on the rise in the U.S. The services
include regular updates and patches, installing firewalls,
24/7 monitoring, and troubleshooting, among others. This
is especially beneficial for small and medium businesses
(SMBs), since they don’t have enough expertise to deal
with the cyberattacks.
Fig 64: Revenue contribution – North America
8
Symantec is a leading cybersecurity company that offers security products and solutions to small and medium enterprises. These solutions provide active protection
against malware, advanced business threats, and other cyberattacks. The company provides cybersecurity solutions across verticals such as government, retail, and
other financial services.
Company snapshot
Products/services
14.1 Company overview – Symantec
• In July 2017, Symantec acquired Israel-based Fireglass. Through
this acquisition, the company aimed to integrate its cyber
defense platform, and extend its leadership in e-mail protection,
and secure web gateway on cloud and on-premises.
• On 6 January, 2017, Symantec Corp. announced the takeover of
SurfEasy, Inc., a leading Virtual Private Network (VPN) provider.
The company would be added to Symantec's Consumer Business
Unit to extend VPN to the portfolio of customers’ digital safety
solutions to help consumers protect their information.
Recent initiatives
Global presence
Geographic share of revenue
Growth strategy
Year of establishment: 1982
Headquarters: Mountain View, California,
U.S.
Key people: Daniel H. Schulman
(Chairman)
Traded as: NASDAQ: SYMC
NASDAQ-100 Component
Employee strength: 13,000
Total revenue: USD 4,019 Mn (2017)
Website: www.symantec.com
• Endpoint and hybrid cloud
security
• Information protection
• Messaging security
• Web and cloud security
• Small business security
solutions
The company’s growth strategy involves delivering unified
security analytics platforms that would provide big data
analytics and visibility into real-time global security threats.
Symantec utilizes its analytics platform to provide the best-
in-class consumer and enterprise security products and
cybersecurity services. The company provides holistic
security services from monitoring to incident responses
and even threat intelligence.
59%
25%
16%
Americas
Europe, the
Middle East and
Africa
Asia-Pacific and
Japan
9
Appendix
10
Research methodology
The study begins with identifying the right research question(s). The question depends on what we are going to achieve by conducting the research or what we want
to convey to the prospective customers through this research. Next we identify the logical steps to arrive at the answers to the question(s). These logical steps form
our research objectives. The research objectives provide us a guideline regarding what information we need to conduct analysis. We strongly believe that clear
objectives will lead to clear results about the given market
The next stage of the research is conducted utilizing the secondary sources of information, process called desk/secondary research. Netscribes Inc. has a considerable
volume of information in both quantitative and qualitative forms, across all major industries and its sectors. Also, we conduct in-depth study of the market,
understanding its key stakeholders, drivers, trends, challenges and opportunities globally covering major regions such as North America, Latin America, Europe, Asia
Pacific, and the Middle East and Africa. The key sources consumed for these research include (but not limited to) the following:
 Financial reports published by the key market players
 Government and other official sources including the National Statistics
 National and International trade associations
 Paid databases
 Other reliable sources
The qualitative and quantitative findings from the above stages are brought together by specialists to perform a rigorous analysis. The regional market trends, drivers,
and opportunities obtained during the analysis is compared with regional economic indicators, sector growth rates, population index, etc. to ensure the data
consistency. After ensuring the consistency, these historical and present indicators help us to understand how the market will perform in future. Our proprietary
forecasting model factors in all these indicators to predict the future market accurately.
Primary research complements the secondary research, as and when required, as it helps us to gain insights from the industries directly by communicating with the
senior executives, key opinion leaders and independent consultants who are experts in their industries or specific industry sectors. Such interviews are conducted
across the value chain of the market in question. A survey questionnaire is usually prepared for conducting any primary interview or survey. The questionnaire is
developed with utmost care to fulfil the key research objectives and also to validate the assumptions about the market. This supplements the information otherwise
unaddressed via secondary research. The primary data collection is done by expert interviewers who have specific industry knowledge. Linguists are hired to conduct
interviews in the respondent’s native language. Some of the primary research methods applied at Netscribes include the following:
 In-depth Interviews
 Executive Interviews
 Expert Panels
Appendix
11
About Netscribes Inc.
MBA
28%
Graduates
22%
BE
20%
BCA/MCA
12%
CPA/CA/CFA
8%
Others
10%
Multidisciplinary team
Netscribes provides end-to-end research-driven solutions that help clients meet their growth objectives by collaboratively transforming information into business advantage.
In-house research Data visualizationGlobal coveragePanel expertise Premium databases
We utilize an in-house
resource model to provide
our clients with actionable
insights
Specialized panel of senior
executives, analysts and
practitioners
Extensive experience of
working on various premium
databases
Ability to conduct research
across the globe in multiple
languages
Ability to present complex
data insights in crisp, easy-to-
understand visuals
Global market
intelligence and
content services
provider
Venture-funded by US
based private
equity firm Helix
Investments
700+ member delivery
team across Mumbai,
Kolkata and Gurgaon,
and sales presence in
Singapore and the USA
Revenue composition:
USA: 50%
Europe/MENA: 30%
APAC: 20%
Official ESOMAR
member
Owns:
– Inrea Research
– OnSense
– Research on
Global Markets
12

More Related Content

What's hot

State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021DATAVERSITY
 
A new era for RFID in Retail | Accenture
A new era for RFID in Retail | AccentureA new era for RFID in Retail | Accenture
A new era for RFID in Retail | Accentureaccenture
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
What is Digital Transformation?
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?Lucy Newman
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceaccenture
 
Top 8 digital transformation trends shaping 2021
Top 8 digital transformation trends shaping 2021Top 8 digital transformation trends shaping 2021
Top 8 digital transformation trends shaping 2021run_frictionless
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionDeloitte United States
 
AI: Built to Scale
AI: Built to ScaleAI: Built to Scale
AI: Built to Scaleaccenture
 
BI Consultancy - Data, Analytics and Strategy
BI Consultancy - Data, Analytics and StrategyBI Consultancy - Data, Analytics and Strategy
BI Consultancy - Data, Analytics and StrategyShivam Dhawan
 
Augmented Analytics and Automation in the Age of the Data Scientist
Augmented Analytics and Automation in the Age of the Data ScientistAugmented Analytics and Automation in the Age of the Data Scientist
Augmented Analytics and Automation in the Age of the Data ScientistWhereScape
 
Modern Marketing Data Capabilities.docx
Modern Marketing Data Capabilities.docxModern Marketing Data Capabilities.docx
Modern Marketing Data Capabilities.docxSasikalaKumaravel2
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accentureaccenture
 
Modernizing Our Data Platform
Modernizing Our Data PlatformModernizing Our Data Platform
Modernizing Our Data Platformaccenture
 
The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022accenture
 
Accenture Digital Health Technology Vision 2018
Accenture Digital Health Technology Vision 2018Accenture Digital Health Technology Vision 2018
Accenture Digital Health Technology Vision 2018accenture
 
Unlocking Trapped Value of Innovation Investments​
Unlocking Trapped Value of Innovation Investments​Unlocking Trapped Value of Innovation Investments​
Unlocking Trapped Value of Innovation Investments​accenture
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 

What's hot (20)

State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021
 
A new era for RFID in Retail | Accenture
A new era for RFID in Retail | AccentureA new era for RFID in Retail | Accenture
A new era for RFID in Retail | Accenture
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
What is Digital Transformation?
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experience
 
Top 8 digital transformation trends shaping 2021
Top 8 digital transformation trends shaping 2021Top 8 digital transformation trends shaping 2021
Top 8 digital transformation trends shaping 2021
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
 
AI: Built to Scale
AI: Built to ScaleAI: Built to Scale
AI: Built to Scale
 
BI Consultancy - Data, Analytics and Strategy
BI Consultancy - Data, Analytics and StrategyBI Consultancy - Data, Analytics and Strategy
BI Consultancy - Data, Analytics and Strategy
 
Data monetization pov
Data monetization   povData monetization   pov
Data monetization pov
 
Augmented Analytics and Automation in the Age of the Data Scientist
Augmented Analytics and Automation in the Age of the Data ScientistAugmented Analytics and Automation in the Age of the Data Scientist
Augmented Analytics and Automation in the Age of the Data Scientist
 
Modern Marketing Data Capabilities.docx
Modern Marketing Data Capabilities.docxModern Marketing Data Capabilities.docx
Modern Marketing Data Capabilities.docx
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accenture
 
Modernizing Our Data Platform
Modernizing Our Data PlatformModernizing Our Data Platform
Modernizing Our Data Platform
 
The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022The Industrialist: Trends & Innovations - July 2022
The Industrialist: Trends & Innovations - July 2022
 
Accenture Digital Health Technology Vision 2018
Accenture Digital Health Technology Vision 2018Accenture Digital Health Technology Vision 2018
Accenture Digital Health Technology Vision 2018
 
Unlocking Trapped Value of Innovation Investments​
Unlocking Trapped Value of Innovation Investments​Unlocking Trapped Value of Innovation Investments​
Unlocking Trapped Value of Innovation Investments​
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 

Similar to Global Cybersecurity Market (2017 - 2022)

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 

Similar to Global Cybersecurity Market (2017 - 2022) (20)

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 

More from Research On Global Markets

Laundry Detergent Market In India (2018–2023)
Laundry Detergent Market In India (2018–2023)Laundry Detergent Market In India (2018–2023)
Laundry Detergent Market In India (2018–2023)Research On Global Markets
 
Construction Equipment Market In India (2018–2023)
Construction Equipment Market In India (2018–2023)Construction Equipment Market In India (2018–2023)
Construction Equipment Market In India (2018–2023)Research On Global Markets
 
Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 ) Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 ) Research On Global Markets
 
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...Research On Global Markets
 
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...Research On Global Markets
 
Smart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGMSmart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGMResearch On Global Markets
 
Global Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGMGlobal Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGMResearch On Global Markets
 

More from Research On Global Markets (18)

Global Robo-Advisory Market (2018-2023)
Global Robo-Advisory Market (2018-2023)Global Robo-Advisory Market (2018-2023)
Global Robo-Advisory Market (2018-2023)
 
Global Digital Gaming Market (2018-2023)
Global Digital Gaming Market (2018-2023)Global Digital Gaming Market (2018-2023)
Global Digital Gaming Market (2018-2023)
 
Laundry Detergent Market In India (2018–2023)
Laundry Detergent Market In India (2018–2023)Laundry Detergent Market In India (2018–2023)
Laundry Detergent Market In India (2018–2023)
 
Smartphone Market In India (2018-2023)
Smartphone Market In India (2018-2023)Smartphone Market In India (2018-2023)
Smartphone Market In India (2018-2023)
 
Soap Market In India (2018–2023)
Soap Market In India (2018–2023)Soap Market In India (2018–2023)
Soap Market In India (2018–2023)
 
Global SOC IoT Innovation Trends
Global SOC IoT Innovation TrendsGlobal SOC IoT Innovation Trends
Global SOC IoT Innovation Trends
 
Construction Equipment Market In India (2018–2023)
Construction Equipment Market In India (2018–2023)Construction Equipment Market In India (2018–2023)
Construction Equipment Market In India (2018–2023)
 
Air Care Market In India (2018–2023)
Air Care Market In India (2018–2023)Air Care Market In India (2018–2023)
Air Care Market In India (2018–2023)
 
India Mobile Accessories Market (2018-2023)
India Mobile Accessories Market (2018-2023)India Mobile Accessories Market (2018-2023)
India Mobile Accessories Market (2018-2023)
 
India Bottled Water Market (2018-2023)
India Bottled Water Market (2018-2023)India Bottled Water Market (2018-2023)
India Bottled Water Market (2018-2023)
 
India Foundry Market Report (2018-2023)
India Foundry Market Report (2018-2023) India Foundry Market Report (2018-2023)
India Foundry Market Report (2018-2023)
 
Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 ) Dairy & Milk processing market in india ( 2018 - 2023 )
Dairy & Milk processing market in india ( 2018 - 2023 )
 
Global precision medicine market (2018-2023)
Global precision medicine market (2018-2023)Global precision medicine market (2018-2023)
Global precision medicine market (2018-2023)
 
Global digital gaming market 2017-2022
Global digital gaming market 2017-2022 Global digital gaming market 2017-2022
Global digital gaming market 2017-2022
 
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
Bio-pharmaceuticals Industry in India (2018-2023) - Snippets of the Market Re...
 
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
Power Backup Market in India 2018 - 2023 - Snippets of the Market Research Re...
 
Smart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGMSmart Home Market in India 2018 - Snippets of the Report by ROGM
Smart Home Market in India 2018 - Snippets of the Report by ROGM
 
Global Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGMGlobal Machine Learning Market - Research Report Snapshots by ROGM
Global Machine Learning Market - Research Report Snapshots by ROGM
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Global Cybersecurity Market (2017 - 2022)

  • 1. Prepared by Netscribes Inc. Proprietary and Confidential, Copyright © 2018, Netscribes, Inc. All Rights Reserved The content of this document is confidential and meant for the review of the recipient. Disclaimer: The names or logos of other companies and products mentioned herein are the trademarks of their respective owners
  • 2. 1.1 Market scope and segmentation Globalcybersecuritymarket Segments Differentiation Based on solution Based on end use industry • Identity and access management (IAM) • Encryption • Governance, risk and compliance • Unified threat management (UTM) • Security information and event management (SIEM) • Aerospace • Financial services • Telecommunication • Healthcare • Others Based on region North America Europe Latin America The Middle East and Africa Asia-Pacific 19
  • 3. 3 Market definitions IAM is a collection of technologies and processes that help in managing digital or electronic identity. Identity and access management (IAM) Encryption is the use of technology to convert data into an unrecognizable format so that it cannot be viewed by unauthorized parties. A secret key or a password is required to read an encrypted file. Encryption UTM is an integration of multiple security and service features in a single platform that protects the user from blended threats. Unified threat management (UTM) The cybersecurity market comprises those technologies that protect computers, networks, applications, and data against cyberthreats, i.e., unauthorized access with mala fide intent. SIEM is an approach to security management that combines security information management (SIM) and security event management (SEM). This approach allows real-time identification, monitoring, recording, and analysis of security events. Security information and event management (SIEM)
  • 4. 1.3 Executive summary (2/2) Overview Trends • The global cybersecurity market is expected to expand at a compound annual growth rate (CAGR) of 11.6% during the 2017-2022 period, reaching a value of USD 173.19 Bn by 2022. The market is primarily driven by the risk and compliance segment, which accounted for the highest revenue in 2016, generating a 50.4% share. This is a result of the large scale adoption of various cybersecurity solutions, as per compliance norms, across different industrial and commercial sectors. • Among the applications of cybersecurity systems across various end use industries, the financial sector held the largest market share in 2016, and is anticipated to maintain its dominance in the coming years. • Increased reliance on the Internet, coupled with the rapid growth in smartphone usage in the corporate environment are expected to boost the requirement for cybersecurity in order to provide protection against security breaches. • Spending on information security products will reach approximately USD 124 Bn by 2019, a large portion of it being spent on cybersecurity products and solutions. High awareness, especially in the corporate context, is aiding in its fast adoption. • 5G networks will allow an increasing number of devices to be connected, and will hence require even stricter security features. As a result, cybersecurity protocols and solutions will need to evolve to keep up with these changes. • There has been an increase in the adoption of hardware-based authentication that allows cryptographic information to be stored physically away from the computing devices, thus minimizing chances of cyberattacks. • Artificial intelligence (AI) and machine learning are enhancing the security standards of cybersecurity solutions. Also, embedded automation in these products requires minimum manual intervention, further reducing the risks. • Recent legislations such as General Data Protection Regulation (GDPR) in the European Union (EU), and the Right to Privacy Act in India are creating greater awareness for protecting private data. Moreover, countries like Israel and Singapore are collaborating to develop expertise in the cybersecurity space. • Organizations are creating huge volumes of data from various sources and want to utilize it to their benefit. However, the centralized nature of big data stores are creating new security challenges, since centralized data stores are highly vulnerable to cyberattacks. • Threats tend to evolve faster than their solutions. Cybersecurity providers are in a constant race to identify the latest threats and address them. However, incidents of data loss continue to increase globally. XX XX 173.19 2014 2017 2022 4 USD Bn
  • 5. 2.1 Global - market overview Geography-wise market revenue (USD bn) NorthAmerica Europe Asia-Pacific LatinAmerica The Middle Eastand Africa • 2016-USD XX Bn • 2022-USD XX Bn • 2016-USD XX Bn • 2022-USD XX Bn • 2016-USD XX Bn • 2022-USD XX Bn • 2016-USD XX Bn • 2022-USD XX Bn • 2016-USD XX Bn • 2022-USD XX Bn Fig 1: Market attractiveness analysis based on geography 5 CAGR(%) Note: The size of the circle denotes the regional revenues in USD Bn Market attractiveness (based on absolute growth from 2017 to 2022) North America Europe The Middle East and Africa Latin America Asia-Pacific
  • 6. 2.2 Global market drivers Rapid digitalization coupled with increasing adoption of information and communications technology (ICT) devices • Rapid digitalization has resulted in the increased adoption of various ICTs, including cloud computing, smart grids, optic Wi-Fi, cognitive technologies, and new payment models, among others. People, organizations, and governments are using these products to transfer confidential data over the Internet, which increase the chances of unauthorized access to data. Again, the rapid change in business environments, owing to the adoption of the bring-your-own-device (BYOD) concept, makes it necessary to have efficient multilayered cybersecurity systems that provide access to corporate information, along with minimizing risk, and maintaining compliance. • Using cybersecurity solutions to implement security and protective measures regarding data exchange, and to create an environment of digital trust and safety are thus becoming a necessity. Spending on information security products continues to increase • The global expenditure on information security products shows an increasing trend, from USD 101 Bn in 2017 to USD 124 Bn in 2019, as per research estimates. A large portion of this expense will be for cybersecurity products and solutions. One of the possible reasons for the higher adoption among various sectors is increased awareness regarding security and its associated issues. • Data and information loss has resulted in significant financial losses for organizations in the past. Each of these instances becomes a driver for other organizations to implement cybersecurity platforms or solutions. 6 Cybersecurity will evolve with 5G • With the advent of the 5G era, more and more devices will be connected using Internet of Things (IoT). The management of data on these devices will become far more complex than it is today. However, compared to the monolithic networks that we presently have, 5G will have all its functions virtualized. Since, virtualization means greater mutual authentication between users and networks, 5G will restrict cyberattacks to some extent. • However, the chances of denial of services attacks (DDoS) will persist. In the 2016 Dyn cyberattack, unsecured IoT devices, such as baby monitors, printers, etc., were hacked as they were provided with default passwords. The impact might be manifold with 5G. Hence, the expected high adoption of 5G in the next few years will also necessitate the evolution of cybersecurity technologies. 5G
  • 7. 3.1 Identity and access management (IAM) Growth drivers IAM XX XX XX XX XX XX XX XX 42.41 2014 2015 2016 2017 2018 2019 2020 2021 2022 CAGR (2017-2022): XX% Fig 4: Revenue contribution – IAM Challenges Major trendsIn general, the IoT vendors focus less on maintaining privacy, providing authentication and managing users’ identities. However, IoT platform product managers and service providers have started to incorporate various device identities and access technologies into IoT platforms to simplify security designs. IAM is currently carried out in a decentralized manner using Blockchain technology to prevent changes in personal information. The traditional user authentication is rule-based. The next generation of adaptive access is however based on the combined rules of machine learning and advanced analytics. An organization sets a baseline for user behaviour, creating a user group. Through unsupervised machine learning, the user behaviour is tracked and corrective action is taken, if any anomaly is detected. • With single-factor authentication being no longer acceptable in the growing digital world, stronger mechanisms such as multi-factor and biometric authentication are needed to improve security, which are considered crucial for the growth of IAM. • Stolen credentials of employees is the leading facilitator of system hacking cases and data breach incidents, which is expected to cost businesses around USD 2 Tn by 2019, globally. In fact, stolen employee passwords are responsible for 90% of cyberattacks, according to leading industry and government reports. These are pushing organizations to acquire IAM solutions. • The IoT will connect almost every object to the Internet, increasing the risk of cyberattacks. IAM solutions help to create an identity lifecycle for IoT devices, also called Identity of Things (IDoT), and safeguard the data during the lifecycle. • Application of IAM in the software as a service (SaaS) model makes it easier for users to access information. However, it becomes complex with the rapidly increasing number of applications. Each application requires different passwords and expiration cycles. This diminishes user productivity as they spend time trying to manage, reset and remember the data. • IAM products are expensive for extending or integrating with cloud applications. 7
  • 8. 13.1 North America - market overview Overview North America XX XX XX XX XX XX XX XX X 2014 2015 2016 2017 2018 2019 2020 2021 2022 CAGR (2017-2022): XX% Market drivers Major trends 2 Hackers are using novel techniques to break into systems. Advanced technologies such as deception technology are being used to counter those attacks. For instance, decoy systems such as Honeypot are used to imitate the actual system containing confidential data. This works as an active bait for hackers, and once they try to hack the decoy systems, they are blocked from entering other system applications. 1 • North America held the largest market share in the cybersecurity market across different regions in 2016, generating XX% of the global revenue. • The United States (U.S.) cybersecurity market leads in terms of overall expenditure on cybersecurity solutions, and is expected to maintain its superior position in the coming years. • Recently, the Defense Secretary of U.S. established a task force to recommend ways to curb theft of critical technologies by competing nations. • Across the U.S., private and public agencies are implementing cybersecurity systems in order to safeguard their stakeholders. • Increasing investment in cybersecurity systems by various corporate investors such as Intel Capital, Google Ventures, Qualcomm Ventures, and Juniper Networks, among others, is another important factor anticipated to augment the growth of the cybersecurity market in North America. Since 2017, various corporate investors have invested USD 1.47 Bn in different cyber security companies across 191 deals. • The 2019 U.S. budget has proposed an allocation of USD 14.98 Bn for key initiatives and research across different cybersecurity technologies. This is an increase from USD 13.1 Bn in 2017 and USD 14.4 Bn in 2018. Managed IT services that help organizations in managing endpoint security are on the rise in the U.S. The services include regular updates and patches, installing firewalls, 24/7 monitoring, and troubleshooting, among others. This is especially beneficial for small and medium businesses (SMBs), since they don’t have enough expertise to deal with the cyberattacks. Fig 64: Revenue contribution – North America 8
  • 9. Symantec is a leading cybersecurity company that offers security products and solutions to small and medium enterprises. These solutions provide active protection against malware, advanced business threats, and other cyberattacks. The company provides cybersecurity solutions across verticals such as government, retail, and other financial services. Company snapshot Products/services 14.1 Company overview – Symantec • In July 2017, Symantec acquired Israel-based Fireglass. Through this acquisition, the company aimed to integrate its cyber defense platform, and extend its leadership in e-mail protection, and secure web gateway on cloud and on-premises. • On 6 January, 2017, Symantec Corp. announced the takeover of SurfEasy, Inc., a leading Virtual Private Network (VPN) provider. The company would be added to Symantec's Consumer Business Unit to extend VPN to the portfolio of customers’ digital safety solutions to help consumers protect their information. Recent initiatives Global presence Geographic share of revenue Growth strategy Year of establishment: 1982 Headquarters: Mountain View, California, U.S. Key people: Daniel H. Schulman (Chairman) Traded as: NASDAQ: SYMC NASDAQ-100 Component Employee strength: 13,000 Total revenue: USD 4,019 Mn (2017) Website: www.symantec.com • Endpoint and hybrid cloud security • Information protection • Messaging security • Web and cloud security • Small business security solutions The company’s growth strategy involves delivering unified security analytics platforms that would provide big data analytics and visibility into real-time global security threats. Symantec utilizes its analytics platform to provide the best- in-class consumer and enterprise security products and cybersecurity services. The company provides holistic security services from monitoring to incident responses and even threat intelligence. 59% 25% 16% Americas Europe, the Middle East and Africa Asia-Pacific and Japan 9
  • 10. Appendix 10 Research methodology The study begins with identifying the right research question(s). The question depends on what we are going to achieve by conducting the research or what we want to convey to the prospective customers through this research. Next we identify the logical steps to arrive at the answers to the question(s). These logical steps form our research objectives. The research objectives provide us a guideline regarding what information we need to conduct analysis. We strongly believe that clear objectives will lead to clear results about the given market The next stage of the research is conducted utilizing the secondary sources of information, process called desk/secondary research. Netscribes Inc. has a considerable volume of information in both quantitative and qualitative forms, across all major industries and its sectors. Also, we conduct in-depth study of the market, understanding its key stakeholders, drivers, trends, challenges and opportunities globally covering major regions such as North America, Latin America, Europe, Asia Pacific, and the Middle East and Africa. The key sources consumed for these research include (but not limited to) the following:  Financial reports published by the key market players  Government and other official sources including the National Statistics  National and International trade associations  Paid databases  Other reliable sources The qualitative and quantitative findings from the above stages are brought together by specialists to perform a rigorous analysis. The regional market trends, drivers, and opportunities obtained during the analysis is compared with regional economic indicators, sector growth rates, population index, etc. to ensure the data consistency. After ensuring the consistency, these historical and present indicators help us to understand how the market will perform in future. Our proprietary forecasting model factors in all these indicators to predict the future market accurately. Primary research complements the secondary research, as and when required, as it helps us to gain insights from the industries directly by communicating with the senior executives, key opinion leaders and independent consultants who are experts in their industries or specific industry sectors. Such interviews are conducted across the value chain of the market in question. A survey questionnaire is usually prepared for conducting any primary interview or survey. The questionnaire is developed with utmost care to fulfil the key research objectives and also to validate the assumptions about the market. This supplements the information otherwise unaddressed via secondary research. The primary data collection is done by expert interviewers who have specific industry knowledge. Linguists are hired to conduct interviews in the respondent’s native language. Some of the primary research methods applied at Netscribes include the following:  In-depth Interviews  Executive Interviews  Expert Panels
  • 11. Appendix 11 About Netscribes Inc. MBA 28% Graduates 22% BE 20% BCA/MCA 12% CPA/CA/CFA 8% Others 10% Multidisciplinary team Netscribes provides end-to-end research-driven solutions that help clients meet their growth objectives by collaboratively transforming information into business advantage. In-house research Data visualizationGlobal coveragePanel expertise Premium databases We utilize an in-house resource model to provide our clients with actionable insights Specialized panel of senior executives, analysts and practitioners Extensive experience of working on various premium databases Ability to conduct research across the globe in multiple languages Ability to present complex data insights in crisp, easy-to- understand visuals Global market intelligence and content services provider Venture-funded by US based private equity firm Helix Investments 700+ member delivery team across Mumbai, Kolkata and Gurgaon, and sales presence in Singapore and the USA Revenue composition: USA: 50% Europe/MENA: 30% APAC: 20% Official ESOMAR member Owns: – Inrea Research – OnSense – Research on Global Markets
  • 12. 12

Editor's Notes

  1. https://www.reuters.com/brandfeatures/venture-capital/article?id=11347 https://www.gartner.com/smarterwithgartner/3-market-forces-drive-adoption-of-identity-and-access-management-in-iot/ https://www.identitymanagementinstitute.org/identity-and-access-management-market-analysis/ https://www.identitymanagementinstitute.org/identity-and-access-management-market-analysis/ https://swipx.com/identity-access-management-trends/ https://www.ibm.com/blogs/blockchain/2017/05/its-all-about-trust-blockchain-for-identity-management/ https://www.whitepapers.em360tech.com/wp-content/uploads/Okta-Whitepaper-top-8-IAM-Challenges-FINAL_0.pdf https://www.linkedin.com/pulse/top-10-identity-access-management-challenges-cloud-anirban-mukherji/