User: Guest

  



DOMAIN EXPERT ENGAGEMENTS

Number of executives repeatedly engaged by snail & email outreach*

POOL + OUTREACH

9385

Interactions with Platform & by Email *

INTERACTIONS

1314

Unique # Participated *

PARTICIPANTS

282

Responses Validated *

VALIDATIONS

53

* Platform engagements are dynamic. Stats are published quarterly.


  •  CODE

  •  PAGES

  •  DATE

  •  PRICE

    $

  •  DATA EXHIBITS

    125


TABLE OF CONTENTS


   Pages :    | $

   Study Reliability and Reporting Limitations.....I-1  
   Disclaimers.....I-2
Data Interpretation & Reporting Level.....I-2
  
   Service Definitions and Scope of Study.....I-3  
   Digital Assets in Organizations – Vulnerable as Ever.....II-11$100
   Rise in IT Security Breaches Presses the Panic Button for Organizations.....II-2
A Look at Common Security Threats for Information Assets in Organizations.....II-2
1$100
   Damages Caused by Security Breaches.....II-3
Proprietary Information Destruction.....II-3
1$100
   Disruption in Systems Performance.....II-4
Data/Application Damage or Corruption.....II-4
Types of Internal IT Security Breaches in Organizations - Ranked in the Order of
  Frequency of Occurrence.....II-4
Types of External Security Breaches in Organizations - Ranked in the Order of
  Frequency of Occurrence.....II-4
1$100
   Top IT Security Breaches Between 2013 & Early 2014.....II-5
IT Security Deployments Become a ‘Norm’ Rather than an Option among
  Organizations.....II-5
2$200
   List of Major Security Concerns & Top IT Security Practices in Enterprises
  Worldwide.....II-7
Factors Influencing Implementation of Information Security Solutions by Enterprises
  Worldwide - Ranked in Order of Influence.....II-7
Cloud Technology: Optimally Positioned to Provide IT Security as ‘Service’.....II-7
2$200
   Cloud Based Security Services Market – A Review.....II-91$100
   High Information Security Risks During Periods of Economic Slowdown Magnify Business
  Case for Efficient Information Security Solutions.....II-10
1$100
   Weak Economy in 2012-2014 Establishes Cloud Based Security Services as a Mainstream
  Security Standard among Organizations.....II-11
1$100
   Market Outlook.....II-121$100
   Competition.....II-13
Select Players in the Cloud Based Security Services Market by Segment.....II-13
Novel Approaches to Security – A Competitive Differentiator.....II-13
1$100
   Growing Collaborations among CSPs and Security Solution Providers.....II-14
Expanding Market for Cloud Based Security Attracts New Entrants.....II-14
1$100
   List of Select New Entrants into the Cloud Based Security Market (2012-2013).....II-151$100
   Use of Advanced IT Platforms Makes Digital Assets in Organizations Highly Vulnerable
  to Security Threats.....II-16
Cloud IT Deployments As Vulnerable As Traditional IT Deployments – Case for Adoption of
  Cloud-Based Security Services.....II-16
1$100
   A Look into Some of the Most Common Security Threats for Cloud Environments.....II-17
Abuse of Cloud Services.....II-17
1$100
   Account or Service Traffic Hijacking.....II-18
Data Breaches.....II-18
Data Loss.....II-18
Denial of Service.....II-18
1$100
   Insecure APIs.....II-19
Insufficient Due Diligence.....II-19
Malicious Insiders.....II-19
Shared Technology.....II-19
1$100
   Escalating Number of DDoS Attacks Prompt Advanced Security Solutions – A Case in
  Point.....II-20
Table 1: Attacks on Cloud Hosting Provider by Incident Classes (2014): Percentage Breakdown of Average Frequency of Attacks for Brute Force, Malware/Botnet, Web App Attack, and Others (includes corresponding Graph/Chart).....II-20
1$350
   Table 2: Select High-Profile Corporate Data Security Breaches in the Recent Past (includes corresponding Graph/Chart).....II-211$350
   Table 3: Attacks on US Cloud Infrastructure by Country of Origin (2014) (includes corresponding Graph/Chart).....II-22

Table 4: Attacks on Cloud Infrastructure in Europe by Country of Origin (2014) (includes corresponding Graph/Chart).....II-22

Table 5: Attacks on Cloud Infrastructure in Asia by Country of Origin (2014) (includes corresponding Graph/Chart).....II-22
1$350
   Organizations Increasingly Move to Cloud Based IT Deployments – Key Opportunity
  Indicator for Cloud Based Security Services.....II-23
1$100
   Opportunity indicators:.....II-24
Table 6: Growing Proliferation of Cloud Computing: Percentage Share Breakdown of Cloud IT Spending As a Percentage of Total IT Infrastructure Spending 2015 & 2019 (includes corresponding Graph/Chart).....II-24
1$350
   Table 7: Cannibalization of Traditional IT by Cloud Computing: Percentage Share Breakdown of On-Premise IT Spending Displaced by Cloud Computing for the Years 2008, 2014 & 2020 (includes corresponding Graph/Chart).....II-25

Table 8: World Cloud Computing Spending (2014): Percentage Share Breakdown of Expenditure in $US by End-Use Industrial Sectors (includes corresponding Graph/Chart).....II-25

Table 9: World Cloud Computing Spending (2014): Percentage Share Breakdown of Expenditure in $US by Customer Size (includes corresponding Graph/Chart).....II-25
1$350
   Public Cloud Service Deployments – A Ready Made Market for Cloud Based Security
  Services.....II-26
1$100
   Table 10: Level of Security Concern in Public Cloud Hosting (includes corresponding Graph/Chart).....II-27
Cloud Security Services Designed for Hybrid Cloud Models to Grow in Demand.....II-27
1$350
   Anticipated Rise in Cloud Regulations to Promote Opportunities.....II-28
ISO to Issue ISO 27017 and 27018.....II-28
1$100
   Growing Use of Internet Enabled Mobile Devices in Organizations Lends Traction to
  Information Security Market.....II-29
Growing BYOD Phenomenon Entails Need for Advanced Security Solutions.....II-29
1$100
   Key Factors Encouraging BYOD/COPE/COBO Trend among Enterprises Ranked by
  Importance Attached by Enterprises.....II-30
Enterprise Mobility Makes Enterprise Digital Assets Highly Vulnerable to Security
  Attacks – Drives Demand for Cloud Based IT Security Services.....II-30
1$100
   Table 11: Global Workforce Population (2009 & 2014): Percentage Share Breakdown of Employees by Nature of Work (includes corresponding Graph/Chart).....II-31

Table 12: Global Mobile Workforce Population (2009 & 2014): Breakdown of Number of Mobile Employees in Million by Region/Country (includes corresponding Graph/Chart).....II-31
1$350
   Table 13: Global Mobile Workforce Population (2014): Penetration of Mobile Employees by Region/Country (includes corresponding Graph/Chart).....II-32
Financial Services – A Key End Use Market for Cloud Based IT Security
  Solutions.....II-32
1$350
   Major External & Internal Breaches in Financial Services Sector.....II-33
Table 14: Leading Targets of Fraud (2013): Percentage Breakdown of Number of Breaches by Type of Asset (includes corresponding Graph/Chart).....II-33
1$350
   Implementation of Information Security Policy - Industries Ranked by Level of
  Implementation.....II-34
Top Security Initiatives by Sector.....II-34
Regulatory Compliance: A High Priority for Financial Institutions.....II-34
Telecommunication and IT Sectors – Laden with Opportunities for Cloud-based Security
  Solutions.....II-34
1$100
   Security Solutions in Telecom Industry.....II-35
Overbilling Attack: A Business Case for Cloud-Based Security Solutions in Telecom
  Industry.....II-35
Healthcare Sector Signals Robust Opportunities for Advanced IT Security – Business Case
  for Cloud-based Security Solutions.....II-35
1$100
   Robust Opportunities Emerge from Government Sector.....II-36
Increasing Number of SMBs Augurs Well for the Market.....II-36
1$100
   Table 15: Percentage of Companies with Less than 10 Employees in Select Countries (includes corresponding Graph/Chart).....II-37
Developed Economies Dominate, Emerging Economies to Usher in Future Prospects.....II-37
1$350
   Cloud Based Secure Email Gateway – The Largest Revenue Contributor.....II-38
Cloud Based Identity & Access Management – The Fastest Growing Service Segment.....II-38
1$100
   Cloud Encryption Offers New Growth Avenue for Players.....II-39
Cloud Based Security Market – Teeming with Challenges.....II-39
1$100
   Cloud Computing: A Definition.....II-40
Risks, Concerns, & Challenges in Cloud Computing.....II-40
Cloud Based Security Services.....II-40
1$100
   Cloud Based Security Service Segments.....II-41
Identity Access Management (IAM) System.....II-41
Need for IAM.....II-41
Secure Web Gateway.....II-41
Secure E-mail Gateway.....II-41
1$100
   Other Segments.....II-42
Security Information And Event Management (SIEM).....II-42
Cloud Vulnerability Management.....II-42
Data Loss Prevention (DLP).....II-42
1$100
   Cloud Security Controls.....II-43
Deterrent controls.....II-43
Preventive Controls.....II-43
Detective Controls.....II-43
Corrective Controls.....II-43
1$100
   Zscaler Rolls Out Zscaler Fall 2014.....II-44
Webroot Launches BrightCloud IP Reputation Service for LogRhythm.....II-44
Trend Micro Unveils Novel Initiatives for AWS.....II-44
Webroot Launches BreachLogic™ Endpoint Agent and BrightCloud® Security
  Services.....II-44
SafeNet Announces Availability of SafeNet Authentication Service for Microsoft
  Windows® Server 2012 R2 AD FS.....II-44
Panda Security Rolls Out PCOP Version 7.1.....II-44
1$100
   Alert Logic Introduces Alert Logic Cloud Defender.....II-45
Alert Logic Expands Security Portfolio for Microsoft Azure Cloud Platform.....II-45
Instart Logic Rolls Out Instart Logic Security Suite.....II-45
Skyfence Unveils New Cloud Security Solution.....II-45
Imperva Unveils SecureSphere WAF for Amazon Web Services.....II-45
Zscaler Rolls Out Zscaler for APTs.....II-45
Trend Micro Rolls Out Trend Micro™ Deep Security Program Updates.....II-45
1$100
   Gemalto Takes Over SafeNet.....II-46
Tata Communications Partners SafeNet to Offer Cloud-Based Multi-Factor Authentication
  Managed Service.....II-46
Webroot Inks Partnership Agreement with Softwerx.....II-46
Fonix Mobile Selects Alert Logic’s Alert Logic Threat Manager.....II-46
Mailprotector Expands Operations across EMEA and the UK.....II-46
RSA Takes over Symplified.....II-46
1$100
   IBM Takes Over Lighthouse Security Group.....II-47
Cisco to Take Over Neohapsis.....II-47
Microsoft Takes Over Aorato.....II-47
Trustwave Takes Over Cenzic.....II-47
Imperva Takes Over Skyfence and Incapsula.....II-47
InterCloud Systems to Takeover VaultLogix.....II-47
Dell to Expand its Worldwide Agreement with Accenture.....II-47
1$100
   Alert Logic Bags Contract from RigNet for Threat Manager and ActiveWatch
  Services.....II-48
First Point Becomes Platinum Partner of SafeNet.....II-48
Webroot Signs Strategic Partnership with VeliQ.....II-48
1$100
   Barracuda Networks Inc. (US).....II-49
Blue Coat Systems Inc. (US).....II-49
CA Inc. (US).....II-49
1$100
   Cisco Systems Inc. (US).....II-50
Covisint (US).....II-50
Echoworx (Canada).....II-50
IBM Corporation (US).....II-50
1$100
   McAfee, Inc. (US).....II-511$100
   nCrypted Cloud (US).....II-52
Okta Inc. (US).....II-52
Panda Security (Spain).....II-52
1$100
   Ping Identity (US).....II-53
Proofpoint Inc (US).....II-53
RSA Security LLC (US).....II-53
Sophos Ltd. (UK).....II-53
1$100
   Symantec Corporation (US).....II-54
Vormetric Inc. (US).....II-54
Websense Inc. (US).....II-54
1$100
   Zscaler (US).....II-551$100
   Table 16: World Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....II-561$350
   Table 17: World 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for US, Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin America and Rest of World Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....II-571$350
   Table 18: World Recent Past, Current & Future Analysis for Cloud Based Security Services by Segment - Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Other Services Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....II-581$350
   Table 19: World 8-Year Perspective for Cloud Based Security Services by Segment - Percentage Breakdown of Revenue for Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Other Services Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....II-591$350
   A. Market Analysis.....III-1
Huge Adoption of Cloud IT Architecture Makes US a Lucrative Market for Cloud
  Based Security Services.....III-1
1$75
   Service Launches.....III-22$150
   Strategic Corporate Developments.....III-41$75
   Key Players.....III-58$395
   B. Market Analytics.....III-13
Table 20: US Recent Past, Current & Future Analysis for Cloud Based Security Services by Segment - Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-13
1$200
   Table 21: US 8-Year Perspective for Cloud Based Security Services by Segment - Percentage Breakdown of Revenue for Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....III-141$200
   A. Market Analysis.....III-15
Echoworx – Key Player.....III-15
B. Market Analytics.....III-15
Table 22: Canadian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-15
1$200
   A. Market Analysis.....III-16
Service Launches.....III-16
Trend Micro Incorporated – Key Player.....III-16
1$75
   B. Market Analytics.....III-17
Table 23: Japanese Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-17
1$200
   A. Market Analysis.....III-18
Euro Debt Crisis Compels Organizations to Seek Low Cost IT Security Options – Favors
  Cloud Based Security Services.....III-18
European Government Increasingly Takes to Cloud IT Deployments – Drives Demand
  for Cloud Based IT Security Services.....III-18
1$75
   B. Market Analytics.....III-19
Table 24: European Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-19
1$200
   Table 25: European 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for France, Germany, Italy, UK, Spain, Russia, and Rest of Europe Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....III-201$200
   Table 26: European Recent Past, Current & Future Analysis for Cloud Based Security Services by Segment - Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-211$200
   Table 27: European 8-Year Perspective for Cloud Based Security Services by Segment - Percentage Breakdown of Revenue for Identity & Access Management (IAM), Secure Web Gateway, Secure Email Gateway, and Others Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....III-221$200
   Market Analysis.....III-23
Table 28: French Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-23
1$200
   Market Analysis.....III-24
Table 29: German Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-24
1$200
   Market Analysis.....III-25
Table 30: Italian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-25
1$200
   A. Market Analysis.....III-26
Strategic Corporate Developments.....III-26
Sophos Ltd. – Key Player.....III-26
1$75
   B. Market Analytics.....III-27
Table 31: UK Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-27
1$200
   A. Market Analysis.....III-28
Service Launch.....III-28
Panda Security – Key Player.....III-28
1$75
   B. Market Analytics.....III-29
Table 32: Spanish Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-29
1$200
   Market Analysis.....III-30
Table 33: Russian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-30
1$200
   A. Market Analysis.....III-31
Strategic Corporate Development.....III-31
1$75
   B. Market Analytics.....III-32
Table 34: Rest of Europe Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-32
1$200
   A. Market Analysis.....III-33
Robust Growth in Cloud Computing Presents a Ready Made Opportunity for Cloud Based
  IT Security Services.....III-33
1$75
   B. Market Analytics.....III-34
Table 35: Asia-Pacific Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - Australia, China, India, South Korea, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-34
1$200
   Table 36: Asia-Pacific 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for Australia, China, India, South Korea, and Rest of Asia-Pacific Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....III-351$200
   A. Market Analysis.....III-36
Strategic Corporate Development.....III-36
1$75
   B. Market Analytics.....III-37
Table 37: Australian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-37
1$200
   Market Analysis.....III-38
Table 38: Chinese Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-38
1$200
   A. Market Analysis.....III-39
Service Launch.....III-39
1$75
   B. Market Analytics.....III-40
Table 39: Indian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-40
1$200
   Market Analysis.....III-41
Table 40: South Korean Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-41
1$200
   Market Analysis.....III-42
Table 41: Rest of Asia-Pacific Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-42
1$200
   Market Analysis.....III-43
Table 42: Latin American Recent Past, Current & Future Analysis for Cloud Based Security Services by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-43
1$200
   Table 43: Latin American 8-Year Perspective for Cloud Based Security Services by Geographic Region - Percentage Breakdown of Revenue for Brazil and Rest of Latin America Markets for Years 2013, 2015 and 2020 (includes corresponding Graph/Chart).....III-441$200
   Market Analysis.....III-45
Table 44: Brazilian Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-45
1$200
   Market Analysis.....III-46
Table 45: Rest of Latin America Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-46
1$200
   A. Market Analysis.....III-47
Strategic Corporate Developments.....III-47
1$75
   B. Market Analytics.....III-48
Table 46: Rest of World Recent Past, Current & Future Analysis for Cloud Based Security Services Market Analyzed with Annual Revenue Figures in US$ Million for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-48
1$200
    
 
 


Sales queries: Sales@StrategyR.com
Research queries: Info411@StrategyR.com