Welcome!

@BigDataExpo Authors: Elizabeth White, Pat Romanski, Liz McMillan, Scott Allen, Sanjay Zalavadia

News Feed Item

Managed Security Services Market (CPE, Cloud/Hosted and Hybrid) - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2013 - 2019

LONDON, April 1, 2014 /PRNewswire/ -- Reportbuyer.com just published a new market research report:

Managed Security Services Market (CPE, Cloud/Hosted and Hybrid) - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2013 - 2019

Managed Security Services Market (CPE, Cloud/Hosted and Hybrid) - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2013 - 2019

This report analyzes managed security services market on a global basis, covering further detailed information into various sub-segments. It also provides cross-sectional analysis of the market based on parameters such as geography, industry verticals, applications, and mode of delivery. The analysis provides market estimates in terms of revenue, and forecast for the period 2013 – 2019.

The global managed security services market is driven be growing demand from SMBs (small and medium businesses) and large enterprises too, which are looking for risk transfer and cost reduction on business support activities. Amidst growing preference for e-commerce and digital data generation, businesses are pushed to safeguard their intellectual assets, of which data security is a key concern. Thus, depending on regional regulations and extent of network security, the global market is witnessing varying growth patterns worldwide. These variations exist in terms of applications desired and delivery model preferred. This report is thereby produced to give a detailed overview of the ongoing trends in the market. It includes review of market dynamics with focus on market drivers, growth challenges (restraints), and opportunities. The value chain analysis and Porter's five forces analysis included in the report further help in assessing the market situation and competitiveness. Market attractiveness analysis highlights key industry segments and their comparative attractiveness against other segments.

Apart from the detailed sub-segment analysis as illustrated below, this report also provides company profiles of the key market players. The competitive profiling of these players includes company and financial overview, business strategies adopted by them, and their recent developments which can help in assessing competition in the market. Some of the major companies included in this report include International Business Machines Corporation (IBM), AT&T Inc., Trustwave Holdings, Inc., Dell SecureWorks, Inc., Fujitsu Ltd., Symantec Corporation, Hewlett-Packard Company (HP), and EMC Corporation, among others.

The report analyzes the global managed security services market in terms of revenue (USD million).

The market has been segmented as follows:

Managed Security Services Market, By Industry Verticals:
BFSI (Banking, Finance Services, and Insurance)
Government and utilities
Manufacturing
Telecom and IT
Healthcare
Retail
Others (Education, Research and development, and Hospitality)

Managed Security Services Market, By Applications:
Network security
Access control
Business continuity
Compliance
Confidentiality
Risk assessment

Managed Security Services Market, By Mode of Delivery:
Customer premises equipment (CPE) based
Hosted or Cloud based
Hybrid

Managed Security Services Market, By Geography:
North America
Europe
Asia Pacific
Rest of the World (RoW)

Table of Contents

Chapter 1 Preface
1.1 Report description and scope
1.1.1 Market segmentation
1.2 Research methodology

Chapter 2 Executive Summary
2.1 Global managed security services market snapshot, 2012 & 2019
2.2 Global managed security services market, 2011 – 2019 (USD million)

Chapter 3 Global Managed Security Services Market Overview
3.1 Introduction
3.1.1 Drivers
3.1.1.1 Rise in digital information generation and need to secure it
3.1.1.2 Growing trend of BYOD
3.1.1.3 Stringent governance (data protection laws) and compliance standards
3.1.1.4 Outsourcing as an cost effective approach
3.1.1.5 Increasing demand for IT management from SMBs
3.1.1.6 Rise in demand for incident response plans
3.1.2 Restraints

3.1.2.1 Reluctance to share confidential information
3.1.2.2 Multiple customers, divisions and business needs at varying levels
3.1.3 Opportunities
3.1.3.1 SIEM (Security Information and Event Management)
3.1.3.2 Preference for MSSPs with scalable Big Data analytics
3.1.3.3 Back door security services for MSSPs
3.2 Value chain analysis
3.3 Porter's five forces analysis
3.3.1 Bargaining power of suppliers
3.3.2 Bargaining power of buyers
3.3.3 Threat from substitutes
3.3.4 Threat of new entrants
3.3.5 Degree of competition
3.4 Market attractiveness analysis
3.5 Competitive analysis
3.5.1 Market share of key players, 2012 (%)

Chapter 4 Global Managed Security Services Market, by Applications
4.1 Global managed security service market overview, by applications, 2012 & 2019 (%)
4.2 Network security managed security services market, 2011 – 2019 (USD million)
4.3 Access control managed security services market, 2011 – 2019 (USD million)
4.4 Business continuity managed security services market, 2011 – 2019 (USD million)
4.5 Compliance managed security services market, 2011 – 2019 (USD million)
4.6 Confidentiality managed security services market, 2011 – 2019 (USD million)
4.7 Risk assessment managed security services market, 2011 – 2019 (USD million)

Chapter 5 Global Managed Security Services Market, by Delivery Models
5.1 Global managed security service market overview, by delivery models, 2012 & 2019 (%)
5.2 Consumer premise equipment based managed security services market, 2011 – 2019 (USD million)
5.3 Cloud or hosted based managed security services market, 2011 – 2019 (USD million)
5.4 Hybrid managed security services market, 2011 – 2019 (USD million)

Chapter 6 Global Managed Security Service Market, by Industry Verticals
6.1 Global managed security service market overview, by industry verticals, 2012 & 2019 (%)
6.2 BFSI managed security services market, 2011 – 2019 (USD million)
6.3 Government and utilities managed security services market, 2011 – 2019 (USD million)
6.4 Manufacturing managed security services market, 2011 – 2019 (USD million)
6.5 Telecom and IT managed security services market, 2011 – 2019 (USD million)
6.6 Healthcare managed security services market, 2011 – 2019 (USD million)
6.7 Retail managed security services market, 2011 – 2019 (USD million)
6.8 Others managed security services market, 2011 – 2019 (USD million)

Chapter 7 Global Managed Security Service Market, by Geography
7.1 Global managed security service market overview, by geography, 2012 & 2019 (%)
7.2 North America managed security services market, 2011 – 2019 (USD million)
7.3 Europe managed security services market, 2011 – 2019 (USD million)
7.4 Asia Pacific managed security services market, 2011 – 2019 (USD million)
7.5 Rest of the World managed security services market, 2011 – 2019 (USD million)

Chapter 8 Company profiles
8.1 AT&T Inc.
8.1.1 Company overview
8.1.2 Financial overview

8.1.3 Business strategy
8.1.4 Recent developments
8.2 Dell SecureWorks Inc.
8.2.1 Company overview
8.2.2 Financial overview
8.2.3 Business strategy
8.2.4 Recent developments
8.3 Fujitsu Ltd.
8.3.1 Company overview
8.3.2 Financial overview
8.3.3 Business strategy
8.3.4 Recent developments
8.4 International Business Machines (IBM) Corporation
8.4.1 Company overview
8.4.2 Financial overview
8.4.3 Business strategy
8.4.4 Recent developments
8.5 Symantec Corporation
8.5.1 Company overview
8.5.2 Financial overview

8.5.3 Business strategy
8.5.4 Recent developments
8.6 Trustwave Holdings Inc.
8.6.1 Company overview
8.6.2 Financial overview
8.6.3 Business strategy
8.6.4 Recent developments
8.7 Hewlett-Packard Company
8.7.1 Company overview
8.7.2 Financial overview
8.7.3 Business strategy
8.7.4 Recent developments
8.8 EMC Corporation
8.8.1 Company overview
8.8.2 Financial overview
8.8.3 Business strategy
8.8.4 Recent developments

List of Figures

FIG. 1 Global managed security services market, 2011 – 2019 (USD million) and Y-o-Y growth (%)
FIG. 2 Value chain analysis
FIG. 3 Porter's five forces analysis
FIG. 4 Market attractiveness analysis, by industry verticals, 2012
FIG. 5 Market share of key players, 2012 (%)
FIG. 6 Global managed security service market overview, by applications, 2012 & 2019 (%)
FIG. 7 Network security managed security services market, 2011 – 2019 (USD million)
FIG. 8 Access control managed security services market, 2011 – 2019 (USD million)
FIG. 9 Business continuity managed security services market, 2011 – 2019 (USD million)
FIG. 10 Compliance managed security services market, 2011 – 2019 (USD million)
FIG. 11 Confidentiality managed security services market, 2011 – 2019 (USD million)
FIG. 12 Risk assessment managed security services market, 2011 – 2019 (USD million)
FIG. 13 Global managed security service market overview, by delivery models, 2012 & 2019 (%)
FIG. 14 Consumer premise equipment based managed security services market, 2011 – 2019 (USD million)

FIG. 15 Cloud or hosted based managed security services market, 2011 – 2019 (USD million)
FIG. 16 Hybrid managed security services market, 2011 – 2019 (USD million)
FIG. 17 Global managed security services market overview, by industry verticals, 2012 & 2019 (%)
FIG. 18 BFSI managed security services market, 2011 – 2019 (USD million)
FIG. 19 Government and utilities managed security services market, 2011 – 2019 (USD million)
FIG. 20 Manufacturing managed security services market, 2011 – 2019 (USD million)
FIG. 21 Telecom and IT managed security services market, 2011 – 2019 (USD million)
FIG. 22 Healthcare managed security services market, 2011 – 2019 (USD million)
FIG. 23 Retail managed security services market, 2011 – 2019 (USD million)
FIG. 24 Others managed security services market, 2011 – 2019 (USD million)
FIG. 25 Global managed security services market overview, by geography, 2012 & 2019 (%)
FIG. 26 North America managed security services market, 2011 – 2019 (USD million)
FIG. 27 Europe managed security services market, 2011 – 2019 (USD million)
FIG. 28 Asia Pacific managed security services market, 2011 – 2019 (USD million)
FIG. 29 Rest of the World managed security services market, 2011 – 2019 (USD million)
FIG. 30 AT&T Inc. annual revenues, 2010 – 2012 (USD billion)
FIG. 31 Dell SecureWorks, Inc. annual revenues, 2010 – 2012 (USD billion)
FIG. 32 Fujitsu Ltd. annual revenues, 2010 – 2012 (USD billion)
FIG. 33 IBM annual revenues, 2010 – 2012 (USD billion)
FIG. 34 Symantec Corporation annual revenues, 2010 – 2012 (USD billion)
FIG. 35 Hewlett-Packard Company annual revenues, 2010 – 2012 (USD billion)
FIG. 36 EMC Corporation annual revenues, 2010 – 2012 (USD billion)

List of Tables

TABLE 1 Managed security services market segmentation
TABLE 2 Managed security services market snapshot, 2012 & 2019
TABLE 3 Impact analysis of drivers
TABLE 4 Impact analysis of restraints

Read the full report:
Managed Security Services Market (CPE, Cloud/Hosted and Hybrid) - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2013 - 2019
http://www.reportbuyer.com/business_government/security/security_services/managed_security_services_market_cpe_cloud_hosted_hybrid_global_industry_analysis_size_share_growth_trends_forecast_2013_2019.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Services

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com  
Email: [email protected]  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors ...
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Commvault; Dave Landa, Chief Operating Officer at kintone; William Morrish, General Manager Product Sales at Interou...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...