欢迎访问行业研究报告数据库

行业分类

当前位置:首页 > 报告详细信息

找到报告 1 篇 当前为第 1 页 共 1

全球电信行业安全软件市场报告(2015-2019年)

Global Security Software Market in the Telecom Industry 2015-2019

加工时间:2015-06-14 信息来源:EMIS 索取原文[91 页]
关键词:安全软件;数据保护;数据合规性;数据架构;数据管理;数据丢失防护;加密;端点监测;身份;访问管理;网络监控;入侵检测;漏洞扫描
摘 要:Security software focuses on data protection, data compliance, data architecture, email and web security, data governance, data loss prevention, SIEM, and identity and access management. It has several capabilities such as encryption, endpoint monitoring, identity and access management, network monitoring, intrusion detection, vulnerability scanning, and application and messaging security.
目 录:

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

03.1 Market Overview

03.2 Product Offerings

04. Market Research Methodology

04.1 Market Research Process

04.2 Research Methodology

05. Introduction

06. Market Insights

06.1 Types of Threat

06.1.1 Trojan

06.1.2 Virus

06.1.3 Worms

06.1.4 Backdoor

06.1.5 Exploit

06.1.6 Dropper

06.1.7 Phishing

06.1.8 Cookies

06.1.9 Bluesnarfing

06.1.10 Boot Sector Virus

06.2 Need for Security Software in Telecom Industry

06.3 Regulations for Telecom Industry

06.4 Benefits of Security Software in Telecom Industry

07. Emerging Technologies: Telecom Industry

07.1 Small Cells Technology

07.2 4G Deployment and LTE-A

07.3 VoLTE

07.4 SDN

08. Cyber-attacks in Telecom Industry

09. Market Landscape

09.1 Market Overview

09.2 Product Life Cycle Analysis

09.2.1 Product Life Cycle for Security Software Market in Telecom

Industry

09.3 Global Security Software Market

09.3.1 Market Size and Forecast

09.4 Market Share of Telecom Industry in Global

Security Software Market

09.5 Global Security Software Market in Telecom

Industry

09.5.1 Market Size and Forecast

09.6 Five Forces Analysis

10. Challenges: Emergence of Security Services

10.1 Managed Security Services

10.2 SaaS Security Services

11. Geographical Segmentation

11.1 Global Security Software Market in Telecom

Industry by Geography

11.2 Global Security Software Market in Telecom

Industry by Geography 2014-2019 ($ billions)

11.2.1 Security Software Market in Telecom Industry in Americas

11.2.2 Security Software Market in Telecom Industry in EMEA

11.2.3 Security Software Market in Telecom Industry in APAC

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

19.1 Competitive Scenario

19.2 News Updates

19.2.1 Key News

19.2.2 Mergers and Acquisitions

19.3 Major Vendors 2014

19.4 Description of Major Vendors

19.4.1 Emc2

19.4.2 IBM

19.4.3 McAfee

19.4.4 Symantec

19.4.5 TrendMicro

19.5 Vendor Comparison by Geographical Presence

2014

19.6 Other Prominent Vendors

20. Description of Other Prominent Vendors

20.1 AVG Technologies

20.1.1 Strengths

20.1.2 Weakness

20.2 CA Technologies

20.2.1 Strengths

20.2.2 Weakness

20.3 Check Point Software Technologies

20.3.1 Strengths

20.3.2 Weakness

20.4 Cisco Systems

20.4.1 Strengths

20.4.2 Weakness

20.5 Fortinet

20.5.1 Strengths

20.5.2 Weakness

20.6 F-Secure

20.6.1 Strengths

20.6.2 Weakness

20.7 Kaspersky Lab

20.7.1 Strengths

20.7.2 Weakness

20.8 Panda Security

20.8.1 Strengths

20.8.2 Weakness

20.9 Sophos

20.9.1 Strengths

20.9.2 Weakness

20.10 Tripwire

20.10.1 Strengths

20.10.2 Weakness

21. Market Takeaways

22. Key Vendor Analysis

22.1 Emc2

22.1.1 Key Facts

22.1.2 Business Overview

22.1.3 Business Segmentation by Revenue 2013

22.1.4 Business Segmentation by Revenue 2012 and 2013

22.1.5 Geographical Segmentation by Revenue 2013

22.1.6 Business Strategy

22.1.7 Recent Developments

22.1.8 SWOT Analysis

22.2 IBM

22.2.1 Key Facts

22.2.2 Business Description

22.2.3 Business Segmentation

22.2.4 Revenue Segmentation by Business Segment

22.2.5 Revenue Segmentation by Business Operation

22.2.6 Revenue Comparison of Business Segments 2012 and 2013

22.2.7 Revenue Segmentation by Geography

22.2.8 Business Strategy

22.2.9 Key Developments

22.2.10 SWOT Analysis

22.3 McAfee

22.3.1 Key facts

22.3.2 Business overview

22.3.3 Product segmentation

22.3.4 Key locations

22.3.5 Business strategy

22.3.6 Recent developments

22.3.7 SWOT Analysis

22.4 Symantec

22.4.1 Key Facts

22.4.2 Business Overview

22.4.3 Business Segmentation by Revenue 2013

22.4.4 Business Segmentation by Revenue 2013 and 2014

22.4.5 Geographical Segmentation by Revenue 2013

22.4.6 Business Strategy

22.4.7 Recent Developments

22.4.8 SWOT Analysis

22.5 Trend Micro

22.5.1 Key facts

22.5.2 Business overview

22.5.3 Geographical segmentation by revenue 2012 and 2013

22.5.4 Geographical segmentation by revenue 2013

22.5.5 Business strategy

22.5.6 Recent developments

22.5.7 SWOT analysis

23. Other Reports in this Series


© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服