中国のITセキュリティ市場2015-2019

◆英語タイトル:IT Security Market in China 2015-2019
◆商品コード:IRTNTR5643
◆発行会社(リサーチ会社):Technavio
◆発行日:2015年4月15日
◆ページ数:98
◆レポート形式:英語 / pdf
◆納品方法:Eメール
◆調査対象地域:中国
◆産業分野:IT
◆販売価格オプション(消費税別)
Single User(1名使用)USD3,000 ⇒換算¥330,000見積依頼/購入/質問フォーム
Five UserUSD3,500 ⇒換算¥385,000見積依頼/購入/質問フォーム
Enterprise License(全社内共有可)USD4,500 ⇒換算¥495,000見積依頼/購入/質問フォーム
販売価格オプションの説明はこちらでご利用ガイドはこちらでご確認いただけます。
※お支払金額は「換算金額(日本円)+消費税+配送料(Eメール納品は無料)」です。
※本体価格が¥30,000未満のレポートにつきましては、ハンドリングチャージ¥5,000が別途かかります。
※Eメールによる納品の場合、通常ご注文当日~2日以内に納品致します。
※レポート納品後、納品日+5日以内に請求書を発行し、お客様宛に郵送いたしますので、請求書発行日より2ヶ月以内に銀行振込にて支払をお願いします。
※上記の日本語題名はH&Iグローバルリサーチが翻訳したものです。英語版原本には日本語表記はありません。
※為替レートは適宜修正・更新しております。リアルタイム更新ではありません。
※弊社H&Iグローバルリサーチ株式会社はTechnavio社の日本における正規代理店です。同社発行の市場リサーチレポート及びリサーチサービスに関するお問い合わせは弊社までお願い致します。Technavio社の概要及び新刊レポートはこちらでご確認いただけます。

当調査レポートでは、中国のITセキュリティ市場について調査・分析し、エグゼクティブサマリー、市場概観、業界の構造分析、中国のITセキュリティ市場規模及び予測、製品別分析、購買基準、市場成長要因、市場の課題、市場動向、競争状況、主要企業(ベンダー)分析などの情報をお届けいたします。

・エグゼクティブサマリー
・市場概観
・業界の構造分析
・中国のITセキュリティ市場:市場規模及び予測
・中国のITセキュリティ市場:製品別分析
・購買基準
・市場成長要因
・市場の課題
・市場動向
・競争状況
・主要企業(ベンダー)分析
...

※上記の和訳は最新内容ではない場合があります。
【レポートの概要】

About IT Security
IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.

TechNavio’s analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.

[Covered in this Report]
The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:
• Hardware: Integrated Firewall/VPN, UTM, Content Management, IPS, IDS, and VPN
• Services
• Software

The major end-users listed in the market are described below:
• SMEs: This segment includes organizations that have less than 10,000 employees and generate revenue of less than US$100 million
• Large Enterprises: This segment includes organizations that have more than 10,000 employees and generate revenue of more than US$100 million
• Government Organizations: This segment includes all government agencies and institutions that are funded and managed by government authorities

TechNavio’s report, IT Security Market in China 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

[Key Vendors]
• CA Technologies
• Check Point Software
• Cisco Systems
• Emc²• IBm
• Juniper Networks
• Symantec

[Other Prominent Vendors]
• Dell SonicWALL
• Fortinet
• F-Secure
• McAfee
• Sophos
• TrendMicro

[Market Driver]
• Increased Dependency on Internet
• For a full, detailed list, view our report

[Market Challenge]
• High Implementation Cost
• For a full, detailed list, view our report

[Market Trend]
• Increased Demand for Cloud-based Security Solutions
• For a full, detailed list, view our report

[Key Questions Answered in this Report]
• What will the market size be in 2019 and what will the growth rate be?
• What are the key market trends?
• What is driving this market?
• What are the challenges to market growth?
• Who are the key vendors in this market space?
• What are the market opportunities and threats faced by the key vendors?
• What are the strengths and weaknesses of the key vendors?

【レポートの目次】

01. Executive Summary

02.List of Abbreviations

03.Scope of the Report
03.1 Market Overview
03.2 Product Offerings

04.Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology

05.Introduction

06.Market Description
06.1 Types of Threat
06.1.1 Trojan
06.1.2 Virus
06.1.3 Worms
06.1.4 Adware
06.1.5 Keylogger
06.1.6 Backdoor
06.1.7 Exploit
06.1.8 Dropper
06.1.9 Phishing
06.1.10 Cookies
06.1.11 Bluesnarfing
06.1.12 Boot Sector Virus
06.1.13 Browser Hijackers
06.1.14 Mousetrapping
06.1.15 Obfuscated Spam
06.1.16 Crimeware
06.2 Components of IT Security
06.3 Advantages of IT Security

07.Market Landscape
07.1 Market Overview
07.1.1 Market Structure
07.1.2 Market Size and Forecast
07.2 China in IT Security Market in APAC Region
07.3 Five Forces Analysis

08.BYOD Implementation: Market Opportunities

09.Product Lifecycle Analysis

10.Market Segmentation by Product
10.1 Segmentation of IT Security Market in China by Product 2014
10.2 Segmentation of IT Security Market in China by Product 2014-2019
10.3 IT Security Hardware Market in China
10.3.1 Market Size and Forecast
10.3.2 Segmentation of IT Security Hardware Market in China by Product
10.3.3 Segmentation of IT Security Hardware Market in China by Product 2014-2019
10.3.4 Integrated Firewall/VPN Market in China
10.3.5 UTM Market in China
10.3.6 IPS Market in China
10.3.7 Content Management Market in China
10.3.8 VPN Market in China
10.3.9 IDS Market in China
10.4 IT Security Services Market in China
10.4.1 Market Size and Forecast
10.5 IT Security Software Market in China
10.5.1 Market Size and Forecast

11.Market Attractiveness
11.1 Market Attractiveness by Product

12.Buying Criteria

13.Market Growth Drivers

14.Drivers and their Impact

15.Market Challenges

16.Impact of Drivers and Challenges

17.Market Trends

18.Trends and their Impact

19.Vendor Landscape
19.1 Competitive Scenario
19.2 Vendor Analysis 2014
19.2.1 Vendor Comparison based on Application Offered
19.2.2 Key News
19.2.3 Mergers and Acquisitions
19.3 Other Prominent Vendors

20.Key Vendor Analysis
20.1 CA Technologies
20.1.1 Key Facts
20.1.2 Business Overview
20.1.3 Business Segmentation by Revenue 2013
20.1.4 Business Segmentation by Revenue 2012 and 2013
20.1.5 Geographical Segmentation by Revenue 2013
20.1.6 Business Strategy
20.1.7 Recent Developments
20.1.8 SWOT Analysis
20.2 Check Point Software
20.2.1 Key Facts
20.2.2 Business Overview
20.2.3 Business Strategy
20.2.4 Recent Developments
20.2.5 SWOT Analysis
20.3 Cisco Systems
20.3.1 Key Facts
20.3.2 Business Overview
20.3.3 Business Segmentation by Revenue
20.3.4 Geographical Segmentation by Revenue
20.3.5 Business Strategy
20.3.6 Key Information
20.3.7 SWOT Analysis
20.4 Emc²
20.4.1 Key Facts
20.4.2 Business Overview
20.4.3 Business Segmentation by Revenue 2013
20.4.4 Business Segmentation by Revenue 2012 and 2013
20.4.5 Geographical Segmentation by Revenue 2013
20.4.6 Business Strategy
20.4.7 Recent Developments
20.4.8 SWOT Analysis
20.5 IBM
20.5.1 Key Facts
20.5.2 Business Description
20.5.3 Business Segmentation
20.5.4 Revenue Segmentation by Business Segment
20.5.5 Revenue Segmentation by Business Operation
20.5.6 Revenue Comparison of Business Segments 2012 and 2013
20.5.7 Revenue Segmentation by Geography
20.5.8 Business Strategy
20.5.9 Key Developments
20.5.10 SWOT Analysis
20.6 Juniper Networks
20.6.1 Key Facts
20.6.2 Business Overview
20.6.3 Business Segmentation
20.6.4 Business Segmentation by Revenue 2012 and 2013
20.6.5 Sales by Geography 2013
20.6.6 Business Strategy
20.6.7 Recent Developments
20.6.8 SWOT Analysis
20.7 Symantec
20.7.1 Key Facts
20.7.2 Business Overview
20.7.3 Business Segmentation by Revenue 2013
20.7.4 Business Segmentation by Revenue 2013 and 2014
20.7.5 Geographical Segmentation by Revenue 2013
20.7.6 Business Strategy
20.7.7 Recent Developments
20.7.8 SWOT Analysis

21.Other Reports in this Series

[List of Exhibits]

Exhibit 1: Market Research Methodology
Exhibit 2: Components of IT Security
Exhibit 3: Market Structure
Exhibit 4: Segmentation by Hardware
Exhibit 5: IT Security Market in China 2014-2019 (US$ billion)
Exhibit 6: China in IT Security Market in APAC Region 2014
Exhibit 7: Adoption of BYOD Across Countries
Exhibit 8: Adoption of BYOD in Enterprises across Countries (million units)
Exhibit 9: Average Number of BYOD Devices in Enterprises in China
Exhibit 10: Product Lifecycle Analysis
Exhibit 11: Segmentation of IT Security Market in China by Product 2014
Exhibit 12: Segmentation of IT Security Market in China by Product 2014-2019
Exhibit 13: IT Security Hardware Market in China 2014-2019 (US$ billion)
Exhibit 14: Segmentation of IT Security Hardware Market in China by Product 2014
Exhibit 15: Segmentation of IT Security Hardware Market in China by Product 2014-2019
Exhibit 16: Integrated Firewall/VPN Market in China 2014-2019 (US$ billion)
Exhibit 17: UTM Market in China 2014-2019 (US$ billion)
Exhibit 18: IPS Market in China 2014-2019 (US$ billion)
Exhibit 19: Content Management Market in China 2014-2019 (US$ billion)
Exhibit 20: VPN Market in China 2014-2019 (US$ billion)
Exhibit 21: IDS Market in China 2014-2019 (US$ billion)
Exhibit 22: IT Security Services Market in China 2014-2019 (US$ billion)
Exhibit 23: IT Security Software Market in China 2014-2019 (US$ billion)
Exhibit 24: Market Attractiveness by Product
Exhibit 25: Vendor Comparison based on Application Offered
Exhibit 26: CA Technologies: Business Segmentation by Revenue 2013
Exhibit 27: CA Technologies: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 28: CA Technologies: Geographical Segmentation by Revenue 2013
Exhibit 29: Business Segmentation of Cisco Systems by Revenue 2013
Exhibit 30: Business Segmentation of Cisco Systems by Revenue 2011-2013 (US$ billion)
Exhibit 31: Geographical Segmentation of Cisco Systems by Revenue 2013
Exhibit 32: Emc²: Business Segmentation by Revenue 2013
Exhibit 33: Emc²: Business Segmentation by Revenue 2012 and 2013 (US$ million)
Exhibit 34: EMC² : Geographical Segmentation by Revenue 2013
Exhibit 35: IBM: Business Segmentation
Exhibit 36: IBM: Revenue Segmentation by Business 2013
Exhibit 37: IBM: Revenue Segmentation 2013
Exhibit 38: IBM: Revenue Comparison of Business Segments 2012 and 2013 (US$ million)
Exhibit 39: IBM: Revenue Segmentation by Geography 2013
Exhibit 40: Juniper Networks: Business Segmentation 2013
Exhibit 41: Juniper Networks: Business Segmentation by Revenue2012 and 2013 (US$ billion)
Exhibit 42: Juniper Networks: Sales by Geography 2013
Exhibit 43: Symantec: Business Segmentation by Revenue 2013
Exhibit 44: Symantec: Business Segmentation by Revenue 2013 and 2014 (US$ million)
Exhibit 45: Symantec: Geographical Segmentation by Revenue 2013



【掲載企業】

CA Technologies Inc., Check Point Software Technologies Ltd., Cisco Systems Inc., Emc² Corp., IBM Corp., Juniper Networks Inc. and Symantec Corp., Dell SonicWall, Fortinet, F-Secure, McAfee, Sophos, TrendMicro

【レポートのキーワード】

中国、ITセキュリティ、ITセキュリティサービス、ITセキュリティソフトウェア、ITセキュリティ装置

【リサーチ方法】

一次資料による調査(業界専門家、ベンダー、代理店、顧客等を対象にしたデプスインタビュー調査など)及び二次資料による調査(Technavio独自のプラットフォーム、産業書籍、企業報告書、ニュース記事、アナリストレポート、貿易協会、政府機関発行データなど)

【免責事項】
http://www.globalresearch.jp/disclaimer

★リサーチレポート[ 中国のITセキュリティ市場2015-2019(IT Security Market in China 2015-2019)]についてメールでお問い合わせはこちらでお願いします。


◆H&Iグローバルリサーチのお客様(例)◆