欢迎访问行业研究报告数据库

行业分类

当前位置:首页 > 报告详细信息

找到报告 1 篇 当前为第 1 页 共 1

全球专业化威胁分析和保护市场报告(2014-2018年)

Global Specialized Threat Analysis and Protection Market 2014-2018
加工时间:2013-12-23 信息来源:EMIS 索取原文[73 页]
关键词:信息安全;威胁分析;保护产品;网络;端点保护;身份;访问管理;加密;入侵;检测
摘 要:Specialized threat analysis and protection products are developed to enable network and endpoint protection against advanced threats. To detect malicious activities, specialized threat analysis and protection products mainly use signature-less technology. These products allow reverse engineering and forensic analysis of the detected threat. Specialized threat analysis and protection products primarily include identity and access management, encryption, intrusion detection, and other advanced security software. They help analyze targeted attacks and provide protection against such attacks. With the increase in the criticality of data in organizations, there is an increasing need for specialized threat analysis and protection products.
目 录:

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

03.1 Market Overview

03.2 Product Offerings

04. Market Research Methodology

04.1 Market Research Process

04.2 Research Methodology

05. Introduction

06. Market Description

06.1 Segmentation

06.2 Components

06.2.1 Identity and Access Managemen

06.2.2 Encryption

06.2.3 Intrusion Detection and Prevention

06.2.4 Advanced Security Software

06.3 Detection Method

06.3.1 Sandboxing

06.3.2 Emulation

06.3.3 Big Data Analysis

06.3.4 Containerization

07. Market Landscape

07.1 Market Overview

07.1.1 Product Lifecycle

07.2 Market Size and Forecast

07.3 Five Forces Analysis

08. Geographical Segmentation

09. Buying Criteria

10. Market Growth Drivers

11. Drivers and their Impact

12. Market Challenges

13. Impact of Drivers and Challenges

14. Market Trends

15. Trends and their Impact

16. Vendor Landscape

16.1 Competitive Scenario

16.2 Competitive Analysis 2013

16.3 Other Prominent Vendors

17. Key Vendor Analysis

17.1 Check Point Software Technologies Ltd.

17.1.1 Business Overview

17.1.2 Business Segmentation

17.1.3 SWOT Analysis

17.2 Cisco Systems Inc.

17.2.1 Business Overview

17.2.2 Business Segmentation

17.2.3 SWOT Analysis

17.3 EMC Corp.

17.3.1 Business Overview

17.3.2 Business Segmentation

17.3.3 SWOT Analysis

17.4 Fortinet Inc.

17.4.1 Business Overview

17.4.2 Business Segmentation

17.4.3 SWOT Analysis

17.5 McAfee Inc.

17.5.1 Business Overview

17.5.2 Business Segmentation

17.5.3 SWOT Analysis

17.6 Palo Alto Networks Inc

17.6.1 Business Overview

17.6.2 Business Segmentation

17.6.3 SWOT Analysis

17.7 Symantec Corp.

17.7.1 Business Overview

17.7.2 Business Segmentation

17.7.3 SWOT Analysis

17.8 Trend Micro Inc.

17.8.1 Business Overview

17.8.2 Business Segmentation

17.8.3 SWOT Analysis

18. Other Reports in this Series

© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服