“TABLE OF CONTENTS
1 INTRODUCTION
1.1 OBJECTIVES OF THE STUDY
1.2 MARKET DEFINITION
1.3 MARKET SCOPE
1.3.1 MARKETS COVERED
1.3.2 YEARS CONSIDERED IN THE STUDY
1.3.3 CURRENCY
1.4 LIMITATIONS
1.5 STAKEHOLDERS
2 RESEARCH METHODOLOGY
2.1 RESEARCH DATA
2.1.1 SECONDARY DATA
2.1.1.1 Key data from secondary sources
2.1.2 PRIMARY DATA
2.1.2.1 Key data from primary sources
2.1.2.2 Key industry insights
2.1.2.3 Breakdown of primaries
2.2 MARKET SIZE ESTIMATION
2.2.1 BOTTOM-UP APPROACH
2.2.2 TOP-DOWN APPROACH
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION
2.4 RESEARCH ASSUMPTIONS AND LIMITATIONS
2.4.1 ASSUMPTIONS
2.4.2 LIMITATIONS
3 EXECUTIVE SUMMARY
4 PREMIUM INSIGHTS
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN SECURITY AND VULNERABILITY MANAGEMENT MARKET
4.2 SECURITY AND VULNERABILITY MANAGEMENT: BY TYPE
4.3 SECURITY AND VULNERABILITY MANAGEMENT: SERVICES MARKET
4.4 SECURITY AND VULNERABILITY MANAGEMENT MARKET ACROSS VARIOUS REGIONS
4.5 LIFECYCLE ANALYSIS, BY REGION, 2014
5 MARKET OVERVIEW
5.1 INTRODUCTION
5.2 EVOLUTION
5.3 MARKET SEGMENTATION
5.3.1 SECURITY AND VULNERABILITY MANAGEMENT MARKET
5.4 MARKET DYNAMICS
5.4.1 DRIVERS
5.4.1.1 Enterprises moving to the cloud
5.4.1.2 Increasing government compliance on data privacy
5.4.1.3 Rising threats from cyber attacks
5.4.2 RESTRAINTS
5.4.2.1 Lack of awareness about vulnerability management solutions
5.4.2.2 Deployment cost and scalability
5.4.3 OPPORTUNITIES
5.4.3.1 Growing market of mobility devices and web platforms
5.4.3.2 Evolution of next-generation cyber security solutions
5.4.4 CHALLENGES
5.4.4.1 Concerns about data breaches and regulatory compliance
6 INDUSTRY TRENDS
6.1 INTRODUCTION
6.2 VALUE CHAIN ANALYSIS
6.3 PORTER’S FIVE FORCES ANALYSIS
6.3.1 THREAT FROM NEW ENTRANTS
6.3.2 THREAT OF SUBSTITUTES
6.3.3 BARGAINING POWER OF SUPPLIERS
6.3.4 BARGAINING POWER OF BUYERS
6.3.5 INTENSITY OF COMPETITIVE RIVALRY
6.4 STRATEGIC BENCHMARKING
7 GLOBAL SECURITY AND VULNERABILITY MANAGEMENT MARKET, BY TYPE
7.1 INTRODUCTION
7.2 SOLUTIONS
7.2.1 SECURITY INFORMATION AND EVENT MANAGEMENT
7.2.1.1 Log and event management
7.2.1.2 Firewall security management
7.2.1.3 Patch management
7.2.1.4 Others
7.2.2 POLICY AND COMPLIANCE
7.2.3 FORENSIC AND INCIDENT INVESTIGATION
7.2.4 DEVICE VULNERABILITY ASSESSMENT
7.2.5 APPLICATION VULNERABILITY ASSESSMENT
7.3 SERVICES
7.3.1 CONSULTING
7.3.2 SUPPORT
7.3.3 INTEGRATION
8 GLOBAL SECURITY AND VULNERABILITY MANAGEMENT MARKET, BY END USER
8.1 INTRODUCTION
8.2 SMBS
8.3 ENTERPRISE
9 GLOBAL SECURITY AND VULNERABILITY MANAGEMENT MARKET, BY VERTICAL
9.1 INTRODUCTION
9.2 BFSI
9.3 IT AND TELECOM
9.4 GOVERNMENT AND DEFENSE
9.5 RETAIL
9.6 ENERGY AND UTILITIES
9.7 HEALTHCARE
9.8 OTHERS
10 GEOGRAPHIC ANALYSIS
10.1 INTRODUCTION
10.2 NORTH AMERICA (NA)
10.3 EUROPE
10.4 ASIA-PACIFIC (APAC)
10.5 LATIN AMERICA (LA)
10.6 MIDDLE EAST AND AFRICA (MEA)
11 COMPETITIVE LANDSCAPE
11.1 OVERVIEW
11.2 COMPETITIVE SITUATION AND TRENDS
11.2.1 NEW PRODUCT/SERVICE DEVELOPMENTS
11.2.2 AGREEMENTS, PARTNERSHIPS, AND COLLABORATIONS
11.2.3 MERGERS AND ACQUISITIONS
11.2.4 EXPANSIONS
12 COMPANY PROFILES
(Overview, Products & Services, Strategies & Insights, Developments and MnM View)*
12.1 INTRODUCTION
12.2 EMC CORPORATION
12.3 HEWLETT-PACKARD
12.4 IBM CORPORATION
12.5 QUALYS
12.6 SYMANTEC CORPORATION
12.7 MICROSOFT CORPORATION
12.8 MCAFEE, INC.
12.9 NETIQ CORPORATION
12.10 RAPID7
12.11 TRIPWIRE
*Details on Overview, Products & Services, Strategies & Insights, Developments and MnM View might not be captured in case of unlisted companies.
13 APPENDIX
13.1 INSIGHTS OF INDUSTRY EXPERTS
13.2 DISCUSSION GUIDE
13.3 INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
13.4 AVAILABLE CUSTOMIZATIONS
13.5 RELATED REPORTS
“
“LIST OF TABLES
TABLE 1 ASSUMPTIONS OF THE RESEARCH STUDY
TABLE 2 GLOBAL SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012–2019 ($BILLION)
TABLE 3 RISING THREAT FROM CYBER SECURITY IS MAJORLY PROPELLING THE GROWTH OF THE SECURITY AND VULNERABILITY MANAGEMENT MARKET
TABLE 4 LACK OF AWARENESS ABOUT VULNERABILITY MANAGEMENT SOLUTIONS ARE HAMPERING THE GROWTH OF THE SECURITY AND VULNERABILITY MANAGEMENT MARKET
TABLE 5 EVOLUTION OF NEXT-GENERATION CYBER-SECURITY SOLUTIONS HAS CREATED OPPORTUNITIES FOR THE RISE IN SECURITY AND VULNERABILITY MANAGEMENT MARKET
TABLE 6 CONCERNS ABOUT DATA BREACHES AND REGULATORY COMPLIANCE COULD RESULT IN MAJOR SECURITY AND VULNERABILITY MANAGEMENT CHALLENGES
TABLE 7 SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012-2019 ($MILLION)
TABLE 8 SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SOLUTION TYPE, 2012-2019 ($MILLION)
TABLE 9 SIEM MARKET SIZE, BY TYPE, 2012-2019 ($MILLION)
TABLE 10 LOG AND EVENT MANAGEMENT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 11 FIREWALL SECURITY MANAGEMENT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 12 PATCH MANAGEMENT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 13 OTHER SIEM SOLUTIONS MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 14 POLICY AND COMPLIANCE MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 15 FORENSIC AND INCIDENT INVESTIGATION MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 16 DEVICE VULNERABILITY ASSESSMENT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 17 APPLICATION VULNERABILITY ASSESSMENT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 18 SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SERVICE, 2012-2019 ($MILLION)
TABLE 19 CONSULTING MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 20 SUPPORT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 21 INTEGRATION MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 22 SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY END USER, 2012-2019 ($MILLION)
TABLE 23 SMBS MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 24 ENTERPRISE MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 25 SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE , BY VERTICAL, 2012-2019 ($MILLION)
TABLE 26 BFSI MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 27 IT AND TELECOM MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 28 GOVERNMENT AND DEFENSE MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 29 RETAIL MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 30 ENERGY AND UTILITIES MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 31 HEALTHCARE MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 32 OTHER VERTICALS MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 33 SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY REGION, 2012-2019 ($MILLION)
TABLE 34 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY COUNTRY, 2012–2019 ($MILLION)
TABLE 35 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012–2019 ($MILLION)
TABLE 36 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 37 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SIEM SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 38 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SERVICE, 2012–2019 ($MILLION)
TABLE 39 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY END USER, 2012–2019 ($MILLION)
TABLE 40 NA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY VERTICAL, 2012–2019 ($MILLION)
TABLE 41 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY COUNTRY, 2012–2019 ($MILLION)
TABLE 42 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012–2019 ($MILLION)
TABLE 43 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 44 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SIEM SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 45 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SERVICE, 2012–2019 ($MILLION)
TABLE 46 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY END USER, 2012–2019 ($MILLION)
TABLE 47 EUROPE: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY VERTICAL, 2012–2019 ($MILLION)
TABLE 48 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY COUNTRY, 2012–2019 ($MILLION)
TABLE 49 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012–2019 ($MILLION)
TABLE 50 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 51 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SIEM SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 52 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SERVICE, 2012–2019 ($MILLION)
TABLE 53 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY END USER, 2012–2019 ($MILLION)
TABLE 54 APAC: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY VERTICAL, 2012–2019 ($MILLION)
TABLE 55 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY COUNTRY, 2012–2019 ($MILLION)
TABLE 56 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012–2019 ($MILLION)
TABLE 57 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 58 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SIEM SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 59 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SERVICE, 2012–2019 ($MILLION)
TABLE 60 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY END USER, 2012–2019 ($MILLION)
TABLE 61 LA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY VERTICAL, 2012–2019 ($MILLION)
TABLE 62 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY COUNTRY, 2012–2019 ($MILLION)
TABLE 63 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY TYPE, 2012–2019 ($MILLION)
TABLE 64 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 65 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SIEM SOLUTION TYPE, 2012–2019 ($MILLION)
TABLE 66 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY SERVICE, 2012–2019 ($MILLION)
TABLE 67 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY END USER, 2012–2019 ($MILLION)
TABLE 68 MEA: SECURITY AND VULNERABILITY MANAGEMENT MARKET SIZE, BY VERTICAL, 2012–2019 ($MILLION)
TABLE 69 NEW PRODUCT/SERVICE DEVELOPMENTS, 2012–2014
TABLE 70 AGREEMENTS, PARTNERSHIPS, AND COLLABORATIONS, 2012–2014
TABLE 71 MERGERS AND ACQUISITIONS, 2012–2014
TABLE 72 EXPANSIONS, 2012–2014
“
“LIST OF FIGURES
FIGURE 1 SECURITY AND VULNERABILITY MANAGEMENT MARKET: STAKEHOLDERS
FIGURE 2 RESEARCH DESIGN
FIGURE 3 BOTTOM-UP APPROACH
FIGURE 4 TOP-DOWN APPROACH
FIGURE 5 LIMITATIONS OF THE RESEARCH
FIGURE 6 SECURITY AND VULNERABILITY MANAGEMENT MARKET: BY TYPE(SOLUTIONS), 2014
FIGURE 7 SECURITY AND VULNERABILITY MANAGEMENT MARKET SNAPSHOT (2014 VS. 2019): SIEM SOLUTION CONSTITUTES THE LARGEST MARKET
FIGURE 8 LARGE-SCALE IMPLEMENTATION OF SMARTER SOLUTIONS WILL ACT AS AN ATTRACTIVE MARKET OPPORTUNITY
FIGURE 9 CONSULTING SERVICES TO GROW WITH THE HIGHEST RATE DURING THE FORECAST
FIGURE 10 INTEGRATION SERVICE HAS GAINED LARGEST DEMAND AND MARKET SHARE IN THE YEAR 2014
FIGURE 11 NORTH AMERICA TO BE THE MOST LUCRATIVE SECURITY AND VULNERABILITY MANAGEMENT MARKET IN 2014
FIGURE 12 APAC SECURITY AND VULNERABILITY MANAGEMENT MARKET IS EXPECTED TO BE IN THE HIGH GROWTH PHASE IN THE NEAR FUTURE
FIGURE 13 EVOLUTION OF SECURITY AND VULNERABILITY MANAGEMENT MARKET
FIGURE 14 SECURITY AND VULNERABILITY MANAGEMENT SEGMENTATION
FIGURE 15 GREATER ADOPTION OF CLOUD BY ENTERPRISES WOULD DRIVE THE SECURITY AND VULNERABILITY MANAGEMENT MARKET
FIGURE 16 VALUE CHAIN ANALYSIS
FIGURE 17 PORTER’S FIVE FORCES ANALYSIS: SECURITY AND VULNERABILITY MANAGEMENT MARKET
FIGURE 18 IBM ADOPTED ALL-ROUND STRATEGIES FOR TECHNOLOGY INTEGRATION AND PRODUCT ENHANCEMENT
FIGURE 19 SECURITY AND VULNERABILITY MANAGEMENT SOLUTION TO EXHIBIT THE HIGHEST CAGR DURING THE FORECAST PERIOD
FIGURE 20 APPLICATION VULNERABILITY ASSESSMENT TO REMAIN IN HIGH GROWTH DURING THE FORECAST PERIOD
FIGURE 21 LOG AND EVENT MANAGEMENT CONTINUES TO DOMINATE IN THE SIEM SEGMENT
FIGURE 22 CONSULTING SERVICES SHOW A HIGH GROWTH DURING THE FORECAST
FIGURE 23 SMBS SEGMENT TO EXHIBIT THE HIGHEST CAGR DURING THE FORECAST PERIOD
FIGURE 24 BFSI IS EXPECTED TO SHOW GREATER DEMAND IN THE MARKET DURING THE FORECAST
FIGURE 25 NA TO HAVE MAJOR SHARE OF THE MARKET DURING THE FORECAST PERIOD(2014-2019)
FIGURE 26 THE SOLUTION SNAPSHOT ACROSS REGIONS SHOWS A FAVOURABLE MARKET IN THE APAC REGION
FIGURE 27 NORTH AMERICA MARKET SNAPSHOT: STRICT GOVERNMENT REGULATIONS TO DRIVE HIGHER ADOPTION IN THE MARKET
FIGURE 28 ASIA-PACIFIC MARKET SNAPSHOT: THE RAPAIDLY GROWING INTERNET DEVICES WILL FUEL THE NEED FOR GREATER NETWORK SECURITY
FIGURE 29 COMPANIES ADOPTED NEW PRODUCT/SERVICE DEVELOPMENTS AS THE KEY GROWTH STRATEGIES OVER THE LAST 3 YEARS
FIGURE 30 NEW PRODUCT/SERVICE DEVELOPMENTS WOULD FUEL THE INTENSE COMPETITION IN THE MARKET
FIGURE 31 IBM CONSIDERED AS A FORERUNNER IN PROVIDING COMPREHENSIVE SOLUTIONS PORTFOLIO
FIGURE 32 BATTLE FOR MARKET SHARE: NEW PRODUCT/SERVICE DEVELOPMENTS HAS BEEN SEEN AS THE KEY STRATEGY FOR COMPANY GROWTH
FIGURE 33 GEOGRAPHIC REVENUE MIX OF TOP 5 MARKET PLAYERS
FIGURE 34 EMC: COMPANY SNAPSHOT
FIGURE 35 EMC: SWOT ANALYSIS
FIGURE 36 HEWLETT-PACKARD: COMPANY SNAPSHOT
FIGURE 37 HEWLETT-PACKARD: SWOT ANALYSIS
FIGURE 38 IBM: COMPANY SNAPSHOT
FIGURE 39 IBM: SWOT ANALYSIS
FIGURE 40 QUALYS: COMPANY SNAPSHOT
FIGURE 41 QUALYS: SWOT ANALYSIS
FIGURE 42 SYMANTEC: COMPANY SNAPSHOT
FIGURE 43 SYMANTEC: SWOT ANALYSIS
FIGURE 44 MICROSOFT: COMPANY SNAPSHOT
“