Enjoy complimentary customisation on priority with our Enterprise License!
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Types of Threats
06.1.1 Trojan
06.1.2 Virus
06.1.3 Worms
06.1.4 Adware
06.1.5 Keylogger
06.1.6 Backdoor
06.1.7 Exploit
06.1.8 Botnet
06.1.9 Dropper
06.1.10 Phishing
06.1.11 Cookies
06.1.12 Bluesnarfing
06.1.13 Bluejacking
06.1.14 DDoS
06.1.15 Boot Sector Virus
06.1.16 Browser Hijackers
06.1.17 Mousetrapping
06.1.18 Obfuscated Spam
06.1.19 Pharming
06.1.20 Crimeware
06.1.21 SQL Injection
06.2 Components of IT Security
06.2.1 Network Security
06.2.2 Access Control
06.2.3 Business Continuity
06.2.4 Compliance
06.2.5 Confidentiality
06.2.6 Risk Assessment
06.3 Implementation of IT Security Solutions
06.3.1 On-Premise
06.3.2 Cloud-based
06.3.3 Hybrid
06.4 Regulations Against IT Security Threats
07. Market Landscape
07.1 Market Overview
07.2 Market Size and Forecast
07.3 Types of Threat
07.4 Segments Attacked by Threats
07.5 Share of Japan in Global Market
07.5.1 IT Security Market in Japan by Global Share of Attacks
07.5.2 IT Security Market in Japan by Global Share of IT Security Spending
07.6 Five Forces Analysis
08. Buying Criteria
09. Market Growth Drivers
10. Drivers and their Impact
11. Market Challenges
12. Impact of Drivers and Challenges
13. Market Trends
14. Trends and their Impact
15. Vendor Landscape
15.1 Competitive Scenario
15.2 Competitive Analysis 2013
15.3 Prominent Vendors
16. Key Vendor Analysis
16.1 Check Point Software Technologies Ltd.
16.1.1 Business Overview
16.1.2 Business Segmentation
16.1.3 SWOT Analysis
16.2 Cisco Systems Inc.
16.2.1 Business Overview
16.2.2 Business Segmentation
16.2.3 SWOT Analysis
16.3 Fortinet Inc.
16.3.1 Business Overview
16.3.2 Business Segmentation
16.3.3 SWOT Analysis
16.4 Juniper Networks Inc.
16.4.1 Business Overview
16.4.2 Business Segmentation
16.4.3 SWOT Analysis
16.5 McAfee Inc.
16.5.1 Business Overview
16.5.2 Business Segmentation
16.5.3 SWOT Analysis
16.6 Symantec Corp.
16.6.1 Business Overview
16.6.2 Business Segmentation
16.6.3 SWOT Analysis
16.7 Trend Micro Inc.
16.7.1 Business Overview
16.7.2 Business Segmentation
16.7.3 SWOT Analysis
17. Other Reports in this Series
Get lifetime access to our
Technavio Insights
Quick Report Overview:
Quick Report Overview:
Cookie Policy
The Site uses cookies to record users' preferences in relation to the functionality of accessibility. We, our Affiliates, and our Vendors may store and access cookies on a device, and process personal data including unique identifiers sent by a device, to personalise content, tailor, and report on advertising and to analyse our traffic. By clicking “I’m fine with this”, you are allowing the use of these cookies. Please refer to the help guide of your browser for further information on cookies, including how to disable them. Review our Privacy & Cookie Notice.