User: Guest


Global Market Trajectory & Analytics



Number of executives repeatedly engaged by snail & email outreach*



Interactions with Platform & by Email *



Unique # Participated *



Responses Validated *



* Login to view program details and full enterprise executive list.

  •  DATE

    JUNE 2020



  •  PAGES




  •  PRICE

    USD $5450


Impact of Pandemic & Economic Slowdown

Monitor Market Dynamics!
Early March 2020, we reached out to senior enterprise executives who are driving strategy, business development, marketing, sales, product management, technology and operations at competitive firms worldwide. Our ongoing survey is focused on how this will this affect their business ecosystems. We invite you to participate in our survey and add to collective perspectives. Market movements are tracked for 2020, 2021 and broadly for the period of 2022 through 2025. Critical changes are monitored dynamically for the rest of this year. Updated analytics will reflect new and evolving market realities. Our first update scheduled for May 2020 and another in the Fall. Clients receive complimentary updates during 2020. If your company is a recent client for this project, we may have already reached out to your colleagues to participate in our program. If you're an active player in the space but hasn't yet subscribed to our project, we invite you to participate and share your perspectives. Please sign-up here.

With COVID-19 emerging to be the biggest driver of digital transformation, cybersecurity technologies and services have shot into the spotlight on the back of heightened risks of more sophisticated cyber-attacks. The pandemic is ushering in a new era of cyber security and the global market for Deception Technology, under this scenario, is projected to reach US$4. 6 billion by the year 2027 trailing at a CAGR of 13. 7% over the analysis period. IT landscape today remains irreversibility changed with companies migrating to new operating models; reassessing IT security architectures; resetting security systems to plug-in digital holes; and adopting innovative remote working technologies. Highlighting the acceleration in digital transformation is the fact companies have digitally transformed within weeks to ensure business continuity as lockdowns and restrictions confine billions of people to their homes. Over 60% of companies in North America, Europe and Asia expect to witness a higher velocity of change in digital transformation during the years 2020 through 2023.

In the United States, in the pre-pandemic period only 5% to 7% of the country`s workforce was working from home (WFH) although over 58% held jobs compatible with remote work. However, over 35% to 40% will work from home multiple-days-a-week by the end of 2021. The pandemic is creating a global `Work-At-Home` culture which will very likely last beyond the crisis. Against this backdrop, every company needs a well-thought-out work-at-home and business continuity plan. Digital transformation is now visible in all industrial sectors. Tele health will replace doctor visits by 2025; by 2021 new home constructions will include co-working spaces highlighting the permanence of remote working; supply chain 4.0 will reach 100% adoption by 2025; eCommerce will account for 60% of retail spending by 2020 and block chain & tokenization will be integrated into financial services by 2023. Digital technologies provide productivity, security, efficiency, agility, workforce re-skilling, and customer experience advantages, all of which are vital during times of crisis like the current pandemic. The pandemic is helping test the effectiveness of digital solutions and in the post pandemic world digital innovation will accelerate even further.

As reliance on digital technologies spirals, cybersecurity measures will also witness a parallel increase in focus driving fresh opportunities for deception technology. With organizations across the board opening more number of sites for remote access, there is greater risk of remote connections and remotely-accessed assets coming under threat of cyber attacks. Deception technology is a new and upcoming cybersecurity platform that seeks to prevent damage from cybercriminals who have infiltrated a network. By creating decoys and traps that imitate legitimate corporate assets across the infrastructure, the technology aims at providing early and accurate detection of threats that have bypassed perimeter security controls. Notifications are sent to a centralized deception server, immediately after a trap is triggered, following which the affected decoy and the attack vectors employed by the cybercriminal are recorded. The approach is intended to create a false perception of successful infiltration, enabling the IT department to safely and securely monitor and study the behavior of cyber-criminals. Deception technology relies on diversionary measures that redirect attackers from legitimate organizational assets towards fake assets intended for defense.

The astounding spike in the number of remote and mobile workers over the last couple of months has brought VPN infrastructures are under immense risk. VPN usage has spiked in parallel to the increase in COVID-19 infections. In Italy, USA, Spain, Germany, Iran and France, VPN usage in March 2020 increased by 175.2%, 132.5%, 62.1%, 48.4%, 51.9%, 47.4% respectively. Compromising the VPN infrastructure will give attackers access to internal network and the administrative management infrastructure. Detection via cyber deception offers a cost effective protective overlay providing a `security blanket` level of assurance that allows companies to implement new technologies, expansions, and topology changes without compromising safety. The United States, accounting for over half of global revenues, represents the primary market for deception technology due to high adoption of control and protection technologies against cybercrimes coupled with notable penetration of IoT that creates urgent data security needs.

» Component (Solutions, Services) » Deception Stack (Network Security, Application Security, Data Security, Endpoint Security) » Deployment (On-Premise, Cloud) » Vertical (BFSI, IT & Telecom, Government, Retail, Energy & Utilities, Other Verticals)
» World » United States » Canada » Japan » China » Europe » France » Germany » Italy » United Kingdom » and Rest of Europe » Asia-Pacific » Rest of World


Users of our portal have insider access to our data stacks based on project relevance and engagement status. Tiered access is offered to data stacks, managed based on user status - Opt-in, Active Panelist, Inactive Panelist, Active Client or Inactive Client.

  • A: 
  • B: 
  • C: 
  • D: 
  • E: 


Our robust permission-based engagement strategy requires a one-time double opt-in and/or re-consent for all users. We will re-establish consent once a year from date of last use. Both these practices exceed GDPR mandates.

What we store: Primary coordinates such as email, company address and phone. In-house developed influencer rank.
How we store: Encrypted and additionally secured by firewalls.
How we use your data: Only to contact you directly. We never share your coordinates with any individual or entity outside our company for any reason.
Privacy queries: