The global cybersecurity market is expected to witness high adoption, owing to rapid digitalization, higher spending on information security, and the advent of 5G. Various industrial and commercial sectors are implementing cybersecurity solutions to safeguard their data. The market is anticipated to expand at a compound annual growth rate (CAGR) of 11.6% during the period of 2017 to 2022. Read More: https://www.researchonglobalmarkets.com/global-cybersecurity-market.html
2. 1.1 Market scope and segmentation
Globalcybersecuritymarket
Segments Differentiation
Based on solution
Based on end use industry
• Identity and access management (IAM)
• Encryption
• Governance, risk and compliance
• Unified threat management (UTM)
• Security information and event management (SIEM)
• Aerospace
• Financial services
• Telecommunication
• Healthcare
• Others
Based on region
North America
Europe
Latin America
The Middle East and Africa
Asia-Pacific
19
3. 3
Market definitions
IAM is a collection of technologies and
processes that help in managing digital or
electronic identity.
Identity and access management (IAM)
Encryption is the use of technology to
convert data into an unrecognizable format
so that it cannot be viewed by unauthorized
parties. A secret key or a password is
required to read an encrypted file.
Encryption
UTM is an integration of multiple security
and service features in a single platform
that protects the user from blended
threats.
Unified threat management (UTM)
The cybersecurity market comprises those technologies that protect computers, networks, applications, and data against cyberthreats, i.e., unauthorized access with mala fide intent.
SIEM is an approach to security
management that combines security
information management (SIM) and
security event management (SEM). This
approach allows real-time identification,
monitoring, recording, and analysis of
security events.
Security information and
event management (SIEM)
4. 1.3 Executive summary (2/2)
Overview
Trends
• The global cybersecurity market is expected to expand at a compound annual growth rate (CAGR) of 11.6% during the 2017-2022 period, reaching a
value of USD 173.19 Bn by 2022. The market is primarily driven by the risk and compliance segment, which accounted for the highest revenue in
2016, generating a 50.4% share. This is a result of the large scale adoption of various cybersecurity solutions, as per compliance norms, across
different industrial and commercial sectors.
• Among the applications of cybersecurity systems across various end use industries, the financial sector held the largest market share in 2016, and is
anticipated to maintain its dominance in the coming years.
• Increased reliance on the Internet, coupled with the rapid growth in smartphone usage in the corporate environment are expected
to boost the requirement for cybersecurity in order to provide protection against security breaches.
• Spending on information security products will reach approximately USD 124 Bn by 2019, a large portion of it being spent on
cybersecurity products and solutions. High awareness, especially in the corporate context, is aiding in its fast adoption.
• 5G networks will allow an increasing number of devices to be connected, and will hence require even stricter security features. As a
result, cybersecurity protocols and solutions will need to evolve to keep up with these changes.
• There has been an increase in the adoption of hardware-based authentication that allows cryptographic information to be stored
physically away from the computing devices, thus minimizing chances of cyberattacks.
• Artificial intelligence (AI) and machine learning are enhancing the security standards of cybersecurity solutions. Also, embedded
automation in these products requires minimum manual intervention, further reducing the risks.
• Recent legislations such as General Data Protection Regulation (GDPR) in the European Union (EU), and the Right to Privacy Act in
India are creating greater awareness for protecting private data. Moreover, countries like Israel and Singapore are collaborating to
develop expertise in the cybersecurity space.
• Organizations are creating huge volumes of data from various sources and want to utilize it to their benefit. However, the centralized nature of big data
stores are creating new security challenges, since centralized data stores are highly vulnerable to cyberattacks.
• Threats tend to evolve faster than their solutions. Cybersecurity providers are in a constant race to identify the latest threats and address them. However,
incidents of data loss continue to increase globally.
XX
XX
173.19
2014 2017 2022
4
USD Bn
5. 2.1 Global - market overview
Geography-wise market revenue (USD bn)
NorthAmerica
Europe
Asia-Pacific
LatinAmerica
The
Middle
Eastand
Africa
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
• 2016-USD XX Bn
• 2022-USD XX Bn
Fig 1: Market attractiveness analysis based on geography
5
CAGR(%)
Note: The size of the circle denotes the
regional revenues in USD Bn
Market attractiveness (based on absolute growth from 2017 to
2022)
North America
Europe
The Middle East
and Africa
Latin America
Asia-Pacific
6. 2.2 Global market drivers
Rapid digitalization coupled with increasing adoption of information and communications technology (ICT) devices
• Rapid digitalization has resulted in the increased adoption of various ICTs, including cloud computing, smart grids, optic Wi-Fi, cognitive technologies, and new payment
models, among others. People, organizations, and governments are using these products to transfer confidential data over the Internet, which increase the chances of
unauthorized access to data. Again, the rapid change in business environments, owing to the adoption of the bring-your-own-device (BYOD) concept, makes it necessary
to have efficient multilayered cybersecurity systems that provide access to corporate information, along with minimizing risk, and maintaining compliance.
• Using cybersecurity solutions to implement security and protective measures regarding data exchange, and to create an environment of digital trust and safety are thus
becoming a necessity.
Spending on information security products continues to increase
• The global expenditure on information security products shows an increasing trend, from USD 101 Bn in 2017 to USD 124 Bn in 2019, as per research estimates. A large
portion of this expense will be for cybersecurity products and solutions. One of the possible reasons for the higher adoption among various sectors is increased
awareness regarding security and its associated issues.
• Data and information loss has resulted in significant financial losses for organizations in the past. Each of these instances becomes a driver for other organizations to
implement cybersecurity platforms or solutions.
6
Cybersecurity will evolve with 5G
• With the advent of the 5G era, more and more devices will be connected using Internet of Things (IoT). The management of data on these devices will become far more
complex than it is today. However, compared to the monolithic networks that we presently have, 5G will have all its functions virtualized. Since, virtualization means
greater mutual authentication between users and networks, 5G will restrict cyberattacks to some extent.
• However, the chances of denial of services attacks (DDoS) will persist. In the 2016 Dyn cyberattack, unsecured IoT devices, such as baby monitors, printers, etc., were
hacked as they were provided with default passwords. The impact might be manifold with 5G. Hence, the expected high adoption of 5G in the next few years will also
necessitate the evolution of cybersecurity technologies.
5G
7. 3.1 Identity and access management (IAM)
Growth drivers
IAM
XX XX XX XX XX XX
XX
XX
42.41
2014 2015 2016 2017 2018 2019 2020 2021 2022
CAGR (2017-2022): XX%
Fig 4: Revenue contribution – IAM
Challenges
Major trendsIn general, the IoT vendors focus less on maintaining privacy,
providing authentication and managing users’ identities.
However, IoT platform product managers and service
providers have started to incorporate various device identities
and access technologies into IoT platforms to simplify security
designs.
IAM is currently carried out in a decentralized manner using
Blockchain technology to prevent changes in personal
information.
The traditional user authentication is rule-based. The next
generation of adaptive access is however based on the
combined rules of machine learning and advanced analytics.
An organization sets a baseline for user behaviour, creating a
user group. Through unsupervised machine learning, the user
behaviour is tracked and corrective action is taken, if any
anomaly is detected.
• With single-factor authentication being no longer acceptable
in the growing digital world, stronger mechanisms such as
multi-factor and biometric authentication are needed to
improve security, which are considered crucial for the growth
of IAM.
• Stolen credentials of employees is the leading facilitator of
system hacking cases and data breach incidents, which is
expected to cost businesses around USD 2 Tn by 2019,
globally. In fact, stolen employee passwords are responsible
for 90% of cyberattacks, according to leading industry and
government reports. These are pushing organizations to
acquire IAM solutions.
• The IoT will connect almost every object to the Internet,
increasing the risk of cyberattacks. IAM solutions help to
create an identity lifecycle for IoT devices, also called Identity
of Things (IDoT), and safeguard the data during the lifecycle. • Application of IAM in the software as a service (SaaS)
model makes it easier for users to access information.
However, it becomes complex with the rapidly
increasing number of applications. Each application
requires different passwords and expiration cycles. This
diminishes user productivity as they spend time trying
to manage, reset and remember the data.
• IAM products are expensive for extending or
integrating with cloud applications.
7
8. 13.1 North America - market overview
Overview
North America
XX XX XX XX XX XX
XX
XX
X
2014 2015 2016 2017 2018 2019 2020 2021 2022
CAGR (2017-2022): XX%
Market drivers
Major trends
2
Hackers are using novel techniques to break into
systems. Advanced technologies such as deception
technology are being used to counter those attacks.
For instance, decoy systems such as Honeypot are
used to imitate the actual system containing
confidential data. This works as an active bait for
hackers, and once they try to hack the decoy
systems, they are blocked from entering other
system applications.
1
• North America held the largest market share in the
cybersecurity market across different regions in 2016,
generating XX% of the global revenue.
• The United States (U.S.) cybersecurity market leads in
terms of overall expenditure on cybersecurity
solutions, and is expected to maintain its superior
position in the coming years.
• Recently, the Defense Secretary of U.S. established a
task force to recommend ways to curb theft of critical
technologies by competing nations.
• Across the U.S., private and public agencies are
implementing cybersecurity systems in order to
safeguard their stakeholders.
• Increasing investment in cybersecurity systems by various
corporate investors such as Intel Capital, Google Ventures,
Qualcomm Ventures, and Juniper Networks, among others, is
another important factor anticipated to augment the growth
of the cybersecurity market in North America. Since 2017,
various corporate investors have invested USD 1.47 Bn in
different cyber security companies across 191 deals.
• The 2019 U.S. budget has proposed an allocation of USD
14.98 Bn for key initiatives and research across different
cybersecurity technologies. This is an increase from USD 13.1
Bn in 2017 and USD 14.4 Bn in 2018.
Managed IT services that help organizations in managing
endpoint security are on the rise in the U.S. The services
include regular updates and patches, installing firewalls,
24/7 monitoring, and troubleshooting, among others. This
is especially beneficial for small and medium businesses
(SMBs), since they don’t have enough expertise to deal
with the cyberattacks.
Fig 64: Revenue contribution – North America
8
9. Symantec is a leading cybersecurity company that offers security products and solutions to small and medium enterprises. These solutions provide active protection
against malware, advanced business threats, and other cyberattacks. The company provides cybersecurity solutions across verticals such as government, retail, and
other financial services.
Company snapshot
Products/services
14.1 Company overview – Symantec
• In July 2017, Symantec acquired Israel-based Fireglass. Through
this acquisition, the company aimed to integrate its cyber
defense platform, and extend its leadership in e-mail protection,
and secure web gateway on cloud and on-premises.
• On 6 January, 2017, Symantec Corp. announced the takeover of
SurfEasy, Inc., a leading Virtual Private Network (VPN) provider.
The company would be added to Symantec's Consumer Business
Unit to extend VPN to the portfolio of customers’ digital safety
solutions to help consumers protect their information.
Recent initiatives
Global presence
Geographic share of revenue
Growth strategy
Year of establishment: 1982
Headquarters: Mountain View, California,
U.S.
Key people: Daniel H. Schulman
(Chairman)
Traded as: NASDAQ: SYMC
NASDAQ-100 Component
Employee strength: 13,000
Total revenue: USD 4,019 Mn (2017)
Website: www.symantec.com
• Endpoint and hybrid cloud
security
• Information protection
• Messaging security
• Web and cloud security
• Small business security
solutions
The company’s growth strategy involves delivering unified
security analytics platforms that would provide big data
analytics and visibility into real-time global security threats.
Symantec utilizes its analytics platform to provide the best-
in-class consumer and enterprise security products and
cybersecurity services. The company provides holistic
security services from monitoring to incident responses
and even threat intelligence.
59%
25%
16%
Americas
Europe, the
Middle East and
Africa
Asia-Pacific and
Japan
9
10. Appendix
10
Research methodology
The study begins with identifying the right research question(s). The question depends on what we are going to achieve by conducting the research or what we want
to convey to the prospective customers through this research. Next we identify the logical steps to arrive at the answers to the question(s). These logical steps form
our research objectives. The research objectives provide us a guideline regarding what information we need to conduct analysis. We strongly believe that clear
objectives will lead to clear results about the given market
The next stage of the research is conducted utilizing the secondary sources of information, process called desk/secondary research. Netscribes Inc. has a considerable
volume of information in both quantitative and qualitative forms, across all major industries and its sectors. Also, we conduct in-depth study of the market,
understanding its key stakeholders, drivers, trends, challenges and opportunities globally covering major regions such as North America, Latin America, Europe, Asia
Pacific, and the Middle East and Africa. The key sources consumed for these research include (but not limited to) the following:
Financial reports published by the key market players
Government and other official sources including the National Statistics
National and International trade associations
Paid databases
Other reliable sources
The qualitative and quantitative findings from the above stages are brought together by specialists to perform a rigorous analysis. The regional market trends, drivers,
and opportunities obtained during the analysis is compared with regional economic indicators, sector growth rates, population index, etc. to ensure the data
consistency. After ensuring the consistency, these historical and present indicators help us to understand how the market will perform in future. Our proprietary
forecasting model factors in all these indicators to predict the future market accurately.
Primary research complements the secondary research, as and when required, as it helps us to gain insights from the industries directly by communicating with the
senior executives, key opinion leaders and independent consultants who are experts in their industries or specific industry sectors. Such interviews are conducted
across the value chain of the market in question. A survey questionnaire is usually prepared for conducting any primary interview or survey. The questionnaire is
developed with utmost care to fulfil the key research objectives and also to validate the assumptions about the market. This supplements the information otherwise
unaddressed via secondary research. The primary data collection is done by expert interviewers who have specific industry knowledge. Linguists are hired to conduct
interviews in the respondent’s native language. Some of the primary research methods applied at Netscribes include the following:
In-depth Interviews
Executive Interviews
Expert Panels
11. Appendix
11
About Netscribes Inc.
MBA
28%
Graduates
22%
BE
20%
BCA/MCA
12%
CPA/CA/CFA
8%
Others
10%
Multidisciplinary team
Netscribes provides end-to-end research-driven solutions that help clients meet their growth objectives by collaboratively transforming information into business advantage.
In-house research Data visualizationGlobal coveragePanel expertise Premium databases
We utilize an in-house
resource model to provide
our clients with actionable
insights
Specialized panel of senior
executives, analysts and
practitioners
Extensive experience of
working on various premium
databases
Ability to conduct research
across the globe in multiple
languages
Ability to present complex
data insights in crisp, easy-to-
understand visuals
Global market
intelligence and
content services
provider
Venture-funded by US
based private
equity firm Helix
Investments
700+ member delivery
team across Mumbai,
Kolkata and Gurgaon,
and sales presence in
Singapore and the USA
Revenue composition:
USA: 50%
Europe/MENA: 30%
APAC: 20%
Official ESOMAR
member
Owns:
– Inrea Research
– OnSense
– Research on
Global Markets