欢迎访问行业研究报告数据库

行业分类

当前位置:首页 > 报告详细信息

找到报告 1 篇 当前为第 1 页 共 1

全球欺骗技术市场报告(2016-2020年)

Global Deception Technology Market 2016-2020

加工时间:2016-12-20 信息来源:EMIS 索取原文[55 页]
关键词:网络欺骗;主动防御;识别;网络中的攻击;减慢;攻击者
摘 要:

The term cyber deception was coined in 1989 by Gene Spafford. He sourced active defenses to identify attacks in the network, slow down attackers while they attempt to infuse virus attacks, learn their techniques, and feed them with fake data. In 1999, the Honeynet Project was launched, with innovation to the deception techniques and ways to understand and learn the behavior and competency of attackers. In 2003, honeypots such as honeyd were introduced that had basic network emulation tools, which waited for inbound network connections and provided limited service emulations. Over a period, the honeypots improved and providers designed honeypots to actively crawl and evaluate potential harmful links.


目 录:

PART 01: Executive summary

Highlights

Key findings

PART 02: Scope of the report

Market overview

PART 03: Market research methodology

Research methodology

Economic indicators

PART 04: Introduction

Key market highlights

PART 05: Market description

Types of cyber threats

Types of attacks

Cyber attacks by geography

Instances of cyber attacks

Implementation of deception technology solutions

Regulations against cyber threats

Stages of deception

Applications of deception security solutions

PART 06: Product life cycle analysis

PART 07: Market landscape

Market overview

Market size and forecast

PART 08: Five forces analysis

PART 09: Geographical segmentation

Global deception technology by geography

Deception technology market in Americas

Deception technology market in EMEA

Deception technology market in APAC

PART 10: Market attractiveness

Market attractiveness by geography

PART 11: Buying criteria

PART 12: Market opportunities

PART 13: Market drivers

Increase in number of incidents of identity theft

Growing number of network security threats

Increased adoption of BYOD policy among enterprises

Stringent government regulations

PART 14: Impact of drivers

PART 15: Market challenges

Lack of efficient security solutions

Complex IT infrastructure

Challenges associated with compatibility of security

solutions

Adverse impact of traffic on network performance

PART 16: Impact of drivers and challenges

PART 17: Market trends

Increasing reliance on partnership networks

Rise in adoption of hybrid models

Implementing firewall as a disruptive deception

capability

PART 18: Vendor landscape

Competitive scenario

Vendor matrix

Vendor analysis

Other prominent vendors

PART 19: Appendix

Market assumptions

PART 20: Appendix

List of abbreviations

PART 21: Explore Technavio 


© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服