5359 篇
13900 篇
477512 篇
16241 篇
11751 篇
3910 篇
6517 篇
1246 篇
75519 篇
37553 篇
12135 篇
1653 篇
2849 篇
3405 篇
641 篇
1239 篇
1972 篇
4905 篇
3860 篇
5429 篇
全球欺骗技术市场报告(2016-2020年)
Global Deception Technology Market 2016-2020
The term cyber deception was coined in 1989 by Gene Spafford. He sourced active defenses to identify attacks in the network, slow down attackers while they attempt to infuse virus attacks, learn their techniques, and feed them with fake data. In 1999, the Honeynet Project was launched, with innovation to the deception techniques and ways to understand and learn the behavior and competency of attackers. In 2003, honeypots such as honeyd were introduced that had basic network emulation tools, which waited for inbound network connections and provided limited service emulations. Over a period, the honeypots improved and providers designed honeypots to actively crawl and evaluate potential harmful links.
PART 01: Executive summary
Highlights
Key findings
PART 02: Scope of the report
Market overview
PART 03: Market research methodology
Research methodology
Economic indicators
PART 04: Introduction
Key market highlights
PART 05: Market description
Types of cyber threats
Types of attacks
Cyber attacks by geography
Instances of cyber attacks
Implementation of deception technology solutions
Regulations against cyber threats
Stages of deception
Applications of deception security solutions
PART 06: Product life cycle analysis
PART 07: Market landscape
Market overview
Market size and forecast
PART 08: Five forces analysis
PART 09: Geographical segmentation
Global deception technology by geography
Deception technology market in Americas
Deception technology market in EMEA
Deception technology market in APAC
PART 10: Market attractiveness
Market attractiveness by geography
PART 11: Buying criteria
PART 12: Market opportunities
PART 13: Market drivers
Increase in number of incidents of identity theft
Growing number of network security threats
Increased adoption of BYOD policy among enterprises
Stringent government regulations
PART 14: Impact of drivers
PART 15: Market challenges
Lack of efficient security solutions
Complex IT infrastructure
Challenges associated with compatibility of security
solutions
Adverse impact of traffic on network performance
PART 16: Impact of drivers and challenges
PART 17: Market trends
Increasing reliance on partnership networks
Rise in adoption of hybrid models
Implementing firewall as a disruptive deception
capability
PART 18: Vendor landscape
Competitive scenario
Vendor matrix
Vendor analysis
Other prominent vendors
PART 19: Appendix
Market assumptions
PART 20: Appendix
List of abbreviations
PART 21: Explore Technavio