User: Guest

  



DOMAIN EXPERT ENGAGEMENTS

Number of executives repeatedly engaged by snail & email outreach*

POOL + OUTREACH

16730

Interactions with Platform & by Email *

INTERACTIONS

1673

Unique # Participated *

PARTICIPANTS

335

Responses Validated *

VALIDATIONS

51

* Platform engagements are dynamic. Stats are published quarterly.


  •  CODE

  •  PAGES

  •  DATE

  •  PRICE

    $

  •  DATA EXHIBITS

    125


TABLE OF CONTENTS


   Pages :    | $

   Study Reliability and Reporting Limitations.....I-1  
   Disclaimers.....I-2
Data Interpretation & Reporting Level.....I-2
  
   Product Definitions and Scope of Study.....I-3  
   Encryption: A Critical Data Leakage Prevention Strategy in the Internet Era.....II-1
Importance of Digital Data .....II-1
Where in an Enterprise, Data Leaks ......II-1
1$100
   Market Opens Up for Next-Gen Tools to Plug Leaks .....II-2
Table 1: Leaking Faucets in an Enterprise (includes corresponding Graph/Chart).....II-2
1$350
   Encryption Software: A Potent Tool to Plug Leaks.....II-3
Market Trends & Issues.....II-3
Growing Awareness Over the Value of Sensitive Digital Data Fuels Investments in
  Encryption.....II-3
1$100
   Rise in Smartphone Theft Throws the Spotlight on Encryption as a BYOD Security
  Measure.....II-4
Snowden Revelations & the Bringing to Light of the Age of NSA Surveillance Spurs the
  Need for Encryption.....II-4
1$100
   Growing Focus on Unifying Endpoint Security Augurs Well for Endpoint Encryption
  s.....II-5
1$100
   The Rise of IoT Turns the Spotlight on the Importance of Encrypting the IoT
  Framework.....II-6
1$100
   Table 2: With Over 387% Growth in Connected Autonomous Things by 2020, the Security Pressure Builds On IoT, Fuelling Opportunities for Encryption Software as a Key Security Component: Breakdown of the Installed Base of IoT Connected Devices (In Million Units) for the Years 2015 & 2020 (includes corresponding Graph/Chart).....II-7
The IoT Phenomenon Spurs Demand for Lightweight Cryptography.....II-7
1$350
   BYOD & CYOD Aggravate the Risk of Data Leakage & Fuel the Business Case for
  Encryption Software.....II-8
Era of “BYOD” ......II-8
Wearables in an Enterprise: The Next Wave of BYOD Spurring Opportunities for
  Encryption.....II-8
1$100
   Surging Security Threats Posed by Moving Data in a BYOD Era .....II-91$100
   Software Encryption Rides the BYOD Wave Balancing BYOD Risks & Rewards.....II-10
Table 3: With a Projected 11.7% Increase in the Share of Corporate-Owned Tablets by 2018, BYOD Goes Mainstream Spurring Opportunities for Data Encryption in a BYOD Environment: Global Percentage Breakdown of Installed Base of Corporate-Owned and Consumer Owned Tablets for the Years 2011, 2014 & 2017P (includes corresponding Graph/Chart).....II-10
1$350
   Table 4: Robust Penetration of BYOD Devices as Measured by the Per Capita Distribution of Connected Devices Per Knowledge Worker in Select Countries for the Year 2012 & 2015 (includes corresponding Graph/Chart).....II-11
Need to Counter Data Leakage in the Cloud Spurs Demand for Encryption
  Software.....II-11
The Age of the Clouds .....II-11
1$350
   Security Threats in the Cloud Drives the Importance of Encrypting Data in the
  Cloud.....II-12
1$100
   Table 5: Robust Spending On Public Cloud Services Drives the Emphasis on Server Side & Client Side Encryption: Global Market for Public Cloud Computing Services (In US$ Million) by Geographic Region for the Years 2015 & 2020 (includes corresponding Graph/Chart).....II-13
Bring Your Own Encryption Catalyzes the Use of Encryption in Cloud
  Applications.....II-13
1$350
   Virtualization Expands the Need for Encryption.....II-14 2$200
   Table 6: Surging Penetration of Virtualization Brings Encryption into the Spotlight to Prevent Information Leakage from VMs: Penetration (In %) of Virtualization Technology and Average Number of Virtual Servers Per Host (x:1) in Select Countries for the Year 2015 (includes corresponding Graph/Chart).....II-16
The Disruptive Ascend of Cloud Computing Gives Rise to Encryption as a Service as
  a Lucrative Business Model.....II-16
The Disruption of Cloud Computing in the New Economy.....II-16
1$350
   Encryption as a Service (EaaS) Grows in Prominence.....II-17
Developed Countries Dominate the Market, Developing Countries to Lead Growth.....II-17
1$100
   Surging Popularity of Self-Encrypting Drives: A Key Threat to Encryption
  Software.....II-18
1$100
   Growing Pressure of Compliance Fuels Market Growth.....II-191$100
   Regulations Governing Data Leakage.....II-20
A Synoptic Review of Key Data Protection Regulations Penalizing Data
  Leakages.....II-20
Payment Card Industry Data Security Standard (PCI DSS).....II-20
1$100
   Listed below is the high-level overview of the PCI DSS requirements:.....II-21
Gramm-Leach-Bliley Act (GLBA).....II-21
1$100
   Sarbanes-Oxley Act (SOX).....II-22
EURO-SOX.....II-22
1$100
   Health Insurance Portability & Accountability Act (HIPAA).....II-23
Data Protection Act (DPA) of 1984 (amended 1998).....II-23
California Senate Bill 1386.....II-23
1$100
   Competition.....II-241$100
   Software-Based Encryption- Defined.....II-25
Types of Encryption Software.....II-25
Software Based Disk Encryption.....II-25
Software Based File/Folder Encryption.....II-25
1$100
   Software Based Database Encryption.....II-26
Software Based Communication Encryption.....II-26
Cloud Encryption.....II-26
Protecting Data at Rest and Data in Motion.....II-26
Protecting Data at Rest.....II-26
1$100
   Securing Data in Motion.....II-27
Benefits of Encryption.....II-27
Ensures Customer Loyalty.....II-27
Enables Use of Cloud.....II-27
Helps Comply with Regulations.....II-27
Drawbacks of Encryption Software.....II-27
1$100
   New Softwares Updates Folder Lock.....II-28
HP Takes Over Voltage Security.....II-28
HP Launches Novel HP Cloud Access Security Protection Platform.....II-28
WowTron Introduces WowTron PDF Encryption.....II-28
Cloudera Acquires Gazzang.....II-28
INSIDE Secure Takes Over Metaforic.....II-28
Sophos Takes Over Mojave.....II-28
1$100
   CipherPoint Enters into Reseller Partnership with DocPoint.....II-29
Data Locker Rolls Out SkyCrypt.....II-29
CRYPTR 2 Broadband IP Encryption Obtains Certification of National Security
  Agency.....II-29
Mitsubishi Electric Develops New Encryption Platform Software.....II-29
Penta Security Launches MyDiamo.....II-29
1$100
   Bloombase (US).....II-30
Check Point Software Technologies Ltd. (Israel).....II-30
Cisco Systems Inc. (US).....II-30
1$100
   Cypherix Encryption Software (US).....II-31
Dekart (Republic of Moldova).....II-31
1$100
   East-Tec (Romania).....II-32
EMC Corporation (US).....II-32
1$100
   Entrust Tech (US).....II-33
Hewlett-Packard (US).....II-33
1$100
   IBM Corporation (US).....II-34
InterCrypto Ltd. (US).....II-34
Jetico Inc. (Finland).....II-34
1$100
   McAfee Inc. (US).....II-351$100
   Microsoft Corporation (US).....II-36
NewSoftwares.Net.Inc. (US).....II-36
PC Dynamics Inc. (US).....II-36
ProofPoint (US).....II-36
1$100
   Ranquel Data Security (Argentina).....II-37
Sophos Ltd. (UK).....II-37
Symantec Corporation (US).....II-37
1$100
   Trend Micro (Japan).....II-38
WebMinds Inc. (US).....II-38
1$100
   Winmagic Inc. (US).....II-39
Zix Corporation (US).....II-39
1$100
   Table 7: World Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....II-401$350
   Table 8: World 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for US, Canada, Japan, Europe, Asia-Pacific, Latin America and Rest of World Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart).....II-411$350
   A. Market Analysis.....III-1
Outlook.....III-1
Recent Industry Activity.....III-1
1$75
   Key Players.....III-27$200
   B. Market Analytics.....III-9
Table 9: US Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-9
1$200
   A. Market Analysis.....III-10
Outlook.....III-10
B. Market Analytics.....III-10
Table 10: Canadian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-10
1$200
   A. Market Analysis.....III-11
Outlook.....III-11
Recent Industry Activity.....III-11
Trend Micro - A Key Player.....III-11
1$75
   B. Market Analytics.....III-12
Table 11: Japanese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-12
1$200
   A. Market Analysis.....III-13
Outlook.....III-13
B. Market Analytics.....III-13
Table 12: European Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-13
1$200
   Table 13: European 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for France, Germany, Italy, UK, Spain, Russia and Rest of Europe Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart).....III-141$200
   A. Market Analysis.....III-15
Outlook.....III-15
B. Market Analytics.....III-15
Table 14: French Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-15
1$200
   A. Market Analysis.....III-16
Outlook.....III-16
B. Market Analytics.....III-16
Table 15: German Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-16
1$200
   A. Market Analysis.....III-17
Outlook.....III-17
B. Market Analytics.....III-17
Table 16: Italian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-17
1$200
   A. Market Analysis.....III-18
Outlook.....III-18
Recent Industry Activity.....III-18
Sophos Ltd. - A Key Player.....III-18
1$75
   B. Market Analytics.....III-19
Table 17: UK Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-19
1$200
   A. Market Analysis.....III-20
Outlook.....III-20
B. Market Analytics.....III-20
Table 18: Spanish Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-20
1$200
   A. Market Analysis.....III-21
Outlook.....III-21
B. Market Analytics.....III-21
Table 19: Russian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-21
1$200
   A. Market Analysis.....III-22
Outlook.....III-22
Key Players.....III-22
1$75
   B. Market Analytics.....III-23
Table 20: Rest of Europe Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-23
1$200
   A. Market Analysis.....III-24
Outlook.....III-24
B. Market Analytics.....III-24
Table 21: Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - China, India, and Rest of Asia-Pacific Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-24
1$200
   Table 22: Asia-Pacific 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for China, India, and Rest of Asia-Pacific Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart).....III-251$200
   A. Market Analysis.....III-26
Outlook.....III-26
B. Market Analytics.....III-26
Table 23: Chinese Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-26
1$200
   A. Market Analysis.....III-27
Outlook.....III-27
B. Market Analytics.....III-27
Table 24: Indian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-27
1$200
   A. Market Analysis.....III-28
Outlook.....III-28
Recent Industry Activity.....III-28
B. Market Analytics.....III-28
Table 25: Rest of Asia-Pacific Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-28
1$200
   A. Market Analysis.....III-29
Outlook.....III-29
B. Market Analytics.....III-29
Table 26: Latin American Recent Past, Current and Future Analysis for Encryption Software by Geographic Region - Brazil and Rest of Latin America Markets Independently Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-29
1$200
   Table 27: Latin American 8-Year Perspective for Encryption Software by Geographic Region - Percentage Breakdown of Revenues for Brazil and Rest of Latin America Markets for Years 2013, 2015 & 2020 (includes corresponding Graph/Chart).....III-301$200
   A. Market Analysis.....III-31
Outlook.....III-31
B. Market Analytics.....III-31
Table 28: Brazilian Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-31
1$200
   A. Market Analysis.....III-32
Outlook.....III-32
Ranquel Data Security (Argentina) - A Key Player.....III-32
B. Market Analytics.....III-32
Table 29: Rest of Latin America Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-32
1$200
   A. Market Analysis.....III-33
Outlook.....III-33
Check Point Software Technologies Ltd. (Israel) - A Key Player.....III-33
1$75
   B. Market Analytics.....III-34
Table 30: Rest of World Recent Past, Current and Future Analysis for Encryption Software Market Analyzed with Annual Revenue Figures in US$ Thousand for Years 2013 through 2020 (includes corresponding Graph/Chart).....III-34
1$200
    
 
 


Sales queries: Sales@StrategyR.com
Research queries: Info411@StrategyR.com