• Japanese
  • Korean
  • Chinese
Cover Image

Global Defense Survey 2012

Synopsis

Product Synopsis

"Global Defense Survey 2012: Cyber Warfare in the Defense Industry, Threats, Opportunities, Demand and Key Markets"is a new report by ICD Research and Strategic Defence Intelligence that analyzes how defense buyers' and suppliers' cyber security budgets, countermeasure strategies and practices, and business planning are set to change in 2012-2013.This report aims to present a critical appraisal of cyber warfare in the current context, to analyze what cyber warfare means, the perception of cyber warfare, how it impacts and how the industry can safeguard itself from this emerging danger. In addition, this report identifies certain specific programs intended to combat cyber-attacks anda few notable companies that have contributed positively to the industry in combating the situation. This report provides the current size of cyber security budgets and how spending by both buyers and suppliers will change in 2012-2013. This report not only grants access to the opinions and strategies of business decision makers and competitors, but also examines their actions surrounding business priorities.The report provides access to information categorized by region, company type and sizes.

Introduction and Landscape

Why was the report written?

This report is the result of an extensive survey drawn from ICD Research and Strategic Defence Intelligence's exclusive panel of 206leading global defense industry executives. The report provides data and analysis on global defense industry buyers' and suppliers' spend on cyber warfare products and services, countermeasure strategies, and practices and business planning within the global defense industry to combat cyber threats.This report includes key topics such as sources of cyber-attacks, key countries where cyber-attacksoriginate, major cyber warfare programs, potential regions for growth in demand of cyber security products and services, cyber security implementation challenges and key cyber security solution providers. Most secondary research reports are based on general industry drivers and do not understand the industry executives' attitude and changing behaviours, creating a gap in presenting the business outlook of the defense cyber security industry. In an effort to bridge this gap, ICD Research and Strategic Defence Intelligence created this primary-research based report by gathering the opinions of multiple stake holders in the value-chain of the global defense industry.

What is the current market landscape and what is changing?

Of respondents from both buyer and supplier organizations across the global defense industry, more than 80% view cyber warfare as a key segment to witness growth.

What are the key drivers behind recent market changes?

The expected growth in the global defense cyber warfare market is mainly due to increase in the incidences of cyber-attacks, a rise in awareness levels, and enhanced government spending, despite a decrease in defense budgets.

What makes this report unique and essential to read?

"Global Defense Survey 2012: Cyber Warfare in the Defense Industry, Threats, Opportunities, Demand and Key Markets " is a new report by ICD Research and Strategic Defence Intelligence that analyzes how defense companies perceive cyber warfare, and how key countermeasure techniques, growth regions, cyber security budgetary allocation and business planning are set to change in 2012-2013.This report provides the current size of the cyber security budgets of global defense industry buyers and suppliers and how spending will changein 2012-2013. In addition, the report also identifies future growth in the cyber security market and potential regions that are expected to register growth. The report also provides access to information categorized by region, company type and sizes."

Key Features and Benefits

To project industry trends and revenue growth expectations in 2012 and understand business confidence to make informed business decisions.

Drive revenues by understanding future product investment areas and key growth regions.

Uncover key challenges and opportunities and identify key actions required to maintain and win buyer business.

Formulate effective sales and marketing strategies by identifying how the cyber security budgets ofcompanies are changing and the direction of spend in the future. Better promote your business by aligning your capabilities and business practices with your customer's changing needs.

Secure stronger customer relationships by understanding the exact need in terms of products and services of industry buyers and suppliers.

Key Market Issues

Throughout the global defense industry, an average of 43% of respondents from defense buyer companies and 47% from supplier companies expect cyber warfare to be the key segment to register growth in 2012. A further 48% of respondents from buyers and 39% from supplier companies consider cyber warfare to be a key segment for growth in 2012 along with few other important areas.

Survey results show 77% of respondents, from both buyer and supplier segments, consider cyber warfare a real threat to act upon due to its ability to exploit the information systems and cause more harm than conventional weapons. Conversely, an average 19% of respondents consider that cyber warfare is overhyped and is politicized considering a huge market opportunity for security related products and services.

Global defense industry respondents identify the US and China as the top spenders in cyber security products and services, followed by Russia and the UK.Additionally, defense suppliers also expect the US, the UK, Germany and China to be the top spenders in terms of cyber security products and services.

According to the survey, the average size of the global, annual cyber security budgets of respondents from defense organizations in 2012 is estimated at US$3.4 million. At the same time, the average size of global annual cyber security budgets among defense contractors is US$2.0 million, compared to US$0.4 million for other service providers.

Survey results reveal that defense organizations' cyber security budgets are expected to rise by an average of 6% over the next 12 months, whereas respondents from defense contractor companies and other service providers, on average, expect to increase their total cyber security budget by 8.6% and 4.6% respectively over the next 12 months.

Key Highlights

Survey results show that 54% of respondents from defense buyer organizations expect the demand for 'anti-virus, anti-spyware and anti-adware' to increase, while 54% and 50% of respondents expect an increase in demand for 'encryption technology' and 'firewalls and intrusion detection software' respectively. Similarly, defense suppliers also expect 'anti-virus, anti-spyware and anti-adware' and 'firewalls and intrusion detection software' to register the highest demand in the next 12 months.

57% of respondents from defense organizations consider 'lack of awareness' a key barrier in combating cyber attacks, followed by 'lack of understanding in transfer technology, skills and intelligence among agencies' and 'diverse and continuously evolving threats'. Similarly, supplier respondents consider 'diverse and continuously evolving threats', 'dynamic nature of cyber crime' and 'lack of awareness' the key barriers in combating cyber attacks.

57% of respondents from defense organizations believe that cyber attacks on their organizations originate from 'foreign hackers' followed by 'organized cyber crime groups' and 'domestic hackers' as identified by 43% and 28% respectively. Similar to buyers' responses, defense suppliers also identify 'foreign hackers' and 'organized cyber crime groups' as major sources of cyber-attacks.

Survey results show that 83% of buyer respondents agree that cyber-attacks affect organizations in terms of 'security breach and data leak'.Additionally, 43% of respondents from defense organizations expect cyber-attacks to 'create confusion and miscommunication in the company'Similarly, 91% and 74% of respondents from defense contractor organizations agree that cyber attacks affect organizations in terms of 'security breach and data leak'.

On average, 58% of respondents from the defense industry take help from external security agencies to combat cyber threats. In particular, 39% of respondents from defense organizations take assistance from external consultants to counter cyber-attacks on a case-to-case basis, whereas 71% of respondents from defense contractors and 51% from other service provider companies expect to seek external help in confronting cyber-attacks.

Table of Contents

1 Introduction

  • 1.1 What is this Report About?
  • 1.2 Definitions
  • 1.3 Summary Methodology

1) Online Survey

2) Secondary Research

3) Data Analysis and Report Writing

4) Quality Control

  • 1.4 About Strategic Defence Intelligence (www.strategicdefenceintelligence.com)
  • 1.5 Profile of survey respondents
    • 1.5.1 Profile of buyer respondents
    • 1.5.2 Profile of supplier respondents

2 Executive Summary

3 Cyber Warfare: Global Defense Industry Overview

  • 3.1 Global Defense Industry: Perception of Cyber Warfare
    • 3.1.1 Perception of cyber warfare - buyers
    • 3.1.2 Perception of cyber warfare- region
    • 3.1.3 Perception of cyber warfare- turnover
  • 3.2 Global Defense Industry: Growth of Cyber Warfare
    • 3.2.1 Growth of cyber warfare -company type
    • 3.2.2 Growth of cyber warfare -region
    • 3.2.3 Growth of cyber warfare - turnover
  • 3.3 Cyber Warfare: Myth or Reality?
    • 3.3.1 Reality of cyber warfare -company type
    • 3.3.2 Reality of cyber warfare - region
    • 3.3.3 Reality of cyber warfare - Region

4 Global Defense Industry: Cyber Warfare Dynamics

  • 4.1 Frequency of Cyber Warfare
    • 4.1.1 Frequency of cyber warfare - buyers
    • 4.1.2 Frequency of cyber warfare - suppliers
    • 4.1.3 Frequency of cyber warfare - region
    • 4.1.4 Frequency of cyber warfare - turnover
  • 4.2 Global Defense Industry: Prime Cyber-attack Techniques
    • 4.2.1 Prime cyber-attack techniques - buyers
    • 4.2.2 Prime cyber-attack techniques - suppliers
    • 4.2.3 Prime cyber warfare techniques - respondents from IT department
  • 4.3 Global Defense Industry: Potential Sources of Cyber-attacks
    • 4.3.1 Potential sources of cyber-attacks - buyers
    • 4.3.2 Potential sources of cyber-attacks - suppliers
    • 4.3.3 Potential sources of cyber-attacks - region
    • 4.3.4 Potential sources of cyber-attacks - turnover
  • 4.4 Global Defense Industry: Key Origins of Cyber-attacks
    • 4.4.1 Key origins of cyber-attacks-buyers
    • 4.4.2 Key origins of cyber-attacks - suppliers
    • 4.4.3 Key origins of cyber-attacks - region
    • 4.4.4 Key origins of cyber-attacks - turnover

5 Global Defense Industry: Cyber Warfare and Security

  • 5.1 Global Defense Industry: Organizational Impact of Cyber Warfare
    • 5.1.1 Organizational impact of cyber warfare - buyers
    • 5.1.2 Organizational impact of cyber warfare - suppliers
    • 5.1.3 Organizational impact of cyber warfare - region
    • 5.1.4 Organizational impact of cyber warfare - turnover
  • 5.2 Global Defense Industry: Key Barriers to Cyber Security
    • 5.2.1 Key barriers to cyber security - buyers
    • 5.2.2 Key barriers to cyber security - suppliers
    • 5.2.3 Key barriers to cyber security - region
    • 5.2.4 Key barriers to cyber security - turnover
    • 5.2.5 Key barriers to cyber security - respondents from IT department
  • 5.3 Global Defense Industry: Organizational Monitoring of Cyber Security
    • 5.3.1 Organizational monitoring of cyber security- buyers
    • 5.3.2 Organizational monitoring of cyber security - suppliers
    • 5.3.3 Organizational monitoring of cyber security - region
    • 5.3.4 Organizational monitoring of cyber security - turnover

6 Global Defense Industry: Cyber Warfare Countermeasures

  • 6.1 Global Defense Industry: Primary Countermeasures of Cyber Warfare
    • 6.1.1 Primary countermeasures of cyber warfare- buyers
    • 6.1.2 Primary countermeasures of cyber warfare: - suppliers
    • 6.1.3 Primary countermeasures of cyber warfare: -region
    • 6.1.4 Primary countermeasures of cyber warfare: - turnover
  • 6.2 Global Defense Industry: External Support to Prevent Cyber-attacks
    • 6.2.1 Use of external support to prevent cyber-attacks- buyers
    • 6.2.2 Use of external support to prevent cyber-attacks -suppliers
    • 6.2.3 Use of external support to prevent cyber-attacks - region
    • 6.2.4 Use of external support to prevent cyber-attacks - turnover

7 Global Cyber Security Industry: Change in Budgets

  • 7.1 Global Defense Industry: Annual Cyber Security Budgets
    • 7.1.1 Annual cyber security budgets- buyers
    • 7.1.2 Annual cyber security budgets - suppliers
    • 7.1.3 Annual cyber security budget - region
    • 7.1.4 Annual cyber security budgets - turnover
    • 7.1.5 Annual cyber security budgets - by senior level respondents
  • 7.2 Global Defense Industry: Planned Change in Cyber Security Budgets
    • 7.2.1 Planned change in cyber security budget-buyers
    • 7.2.2 Planned change in cyber security budgets - suppliers
    • 7.2.3 Planned change in cyber security budgets - region
    • 7.2.4 Planned change in cyber security budgets - turnover
    • 7.2.5 Planned change in cyber security budgets - by senior level respondent

8 Global Cyber Security Industry: Product Demand

  • 8.1 Global Defense Industry: Key Markets for Cyber Security Products
    • 8.1.1 Key markets for cyber security products - buyers
    • 8.1.2 Key markets for cyber security products - suppliers
    • 8.1.3 Key markets for cyber security products- region
    • 8.1.4 Key markets for cyber security products - turnover
  • 8.2 Global Defense Industry: Global Demand of Cyber Security Products
    • 8.2.1 Global demand of cyber security products - buyers
    • 8.2.2 Global demand of cyber security products - suppliers
    • 8.2.3 Global demand of cyber security products - region
    • 8.2.4 Global demand of cyber security products - turnover

9 Global Defense Industry: Major Cyber Warfare Programs

  • 9.1 Cyber Defense Weaponry Program
  • 9.2 Reseau IP de la Force AeroNavale (RIFAN) Stage Two
  • 9.3 Cyber Weapons Program
  • 9.4 Cyber Genome Program
  • 9.5 Einstein Intrusion Detection System Program
  • 9.6 National Cyber Range Program
  • 9.7 Cyberspace science, research, engineering and technology integration program
  • 9.8 Cyber Insider Threat Program

10 Global Defense Industry: Competitive Landscape and Strategic Insights

  • 10.1 Lockheed Martin Corporation
    • 10.1.1 Lockheed Martin Corporation: overview
    • 10.1.2 Lockheed Martin Corporation: products and services
    • 10.1.3 Lockheed Martin Corporation: recent announcements and strategic initiatives
    • 10.1.4 Lockheed Martin Corporation: alliances
    • 10.1.5 Lockheed Martin Corporation: recent contract wins
    • 10.1.6 Lockheed Martin Corporation.: financial analysis
  • 10.2 Panda Security
    • 10.2.1 Panda Security: overview
    • 10.2.2 Panda Security: products and services
    • 10.2.3 Panda Security: recent announcements and strategic initiatives
    • 10.2.4 Panda Security: alliances
    • 10.2.5 Panda Security: recent contract wins
    • 10.2.6 Panda Security: financial analysis
  • 10.3 Booz Allen Hamilton
    • 10.3.1 Booz Allen Hamilton: Overview
    • 10.3.2 Booz Allen Hamilton: products and services
    • 10.3.3 Booz Allen Hamilton: recent announcements and strategic initiatives
    • 10.3.4 Booz Allen Hamilton: alliances
    • 10.3.5 Booz Allen Hamilton: recent contract wins
    • 10.3.6 Booz Allen Hamilton: financial analysis

10.4 CACI

    • 10.4.1 CACI: Overview
    • 10.4.2 CACI: products and services
    • 10.4.3 CACI: recent announcements and strategic initiatives
    • 10.4.4 CACI: alliances
    • 10.4.5 CACI: recent contract wins
    • 10.4.6 CACI: financial analysis
  • 10.5 NetCentrics
    • 10.5.1 NetCentrics: Overview
    • 10.5.2 NetCentrics: products and services
    • 10.5.3 NetCentrics: recent announcements and strategic initiatives
    • 10.5.4 NetCentrics: alliances
    • 10.5.5 NetCentrics: recent contract wins
    • 10.5.6 NetCentrics: financial analysis
  • 10.6 Check Point Software Technologies
    • 10.6.1 Check Point Software Technologies: overview
    • 10.6.2 Check Point Software Technologies: products and services
    • 10.6.3 Check Point Software Technologies: recent announcements and strategic initiatives
    • 10.6.4 Check Point Software Technologies: alliances
    • 10.6.5 Check Point Software Technologies: recent contract wins
    • 10.6.6 Check Point Software Technologies: financial analysis
  • 10.7 General Dynamics
    • 10.7.1 General Dynamics: Overview
    • 10.7.2 General Dynamics: products and services
    • 10.7.3 General Dynamics: recent announcements and strategic initiatives
    • 10.7.4 General Dynamics: alliances
    • 10.7.5 General Dynamics: recent contract wins
    • 10.7.6 General Dynamics: financial analysis
  • 10.8 ManTech International Corporation
    • 10.8.1 ManTech International Corporation: Overview
    • 10.8.2 ManTech International Corporation: products and services
    • 10.8.3 ManTech International Corporation: recent announcements and strategic initiatives
    • 10.8.4 ManTech International Corporation: alliances
    • 10.8.5 ManTech International Corporation: recent contract wins
    • 10.8.6 ManTech International Corporation: financial analysis
  • 10.9 BAE Systems Detica
    • 10.9.1 BAE Systems Detica: overview
    • 10.9.2 BAE Systems Detica: products and services
    • 10.9.3 BAE Systems Detica: recent announcements and strategic initiatives
    • 10.9.4 BAE Systems Detica: alliances
    • 10.9.5 BAE Systems Detica: recent contract wins
    • 10.9.6 BAE Systems Detica: financial analysis
  • 10.1 Dynamic Research Corporation
    • 10.10.1 Dynamic Research Corporation: overview
    • 10.10.2 Dynamic Research Corporation: products and services
    • 10.10.3 Dynamic Research Corporation: recent announcements and strategic initiatives
    • 10.10.4 Dynamic Research Corporation: alliances
    • 10.10.5 Dynamic Research Corporation: recent contract wins
    • 10.10.6 Dynamic Research Corporation: financial analysis

10.11 KEYW

    • 10.11.1 KEYW: overview
    • 10.11.2 KEYW: products and services
    • 10.11.3 KEYW: recent announcements and strategic initiatives
    • 10.11.4 KEYW: Alliances
    • 10.11.5 KEYW: Recent Contract Wins
    • 10.11.6 KEYW: financial analysis
  • 10.12 Layer 7 Technologies
    • 10.12.1 Layer 7 Technologies: overview
    • 10.12.2 Layer 7 Technologies: products and services
    • 10.12.3 Layer 7 Technologies: recent announcements and strategic initiatives
    • 10.12.4 Layer 7 Technologies: alliances
    • 10.12.5 Layer 7 Technologies: recent contract wins
    • 10.12.6 Layer 7 Technologies: financial analysis
  • 10.13 Camber Corporation
    • 10.13.1 Camber Corporation: overview
    • 10.13.2 Camber Corporation: products and services
    • 10.13.3 Camber Corporation: recent announcements and strategic initiatives
    • 10.13.4 Camber Corporation: alliances
    • 10.13.5 Camber Corporation: recent contract wins
    • 10.13.6 Camber Corporation: financial analysis
  • 10.14 Defense Group Inc.
    • 10.14.1 Defense Group Inc.: overview
    • 10.14.2 Defense Group Inc.: products and services
    • 10.14.3 Defense Group Inc.: recent announcements and strategic initiatives
    • 10.14.4 Defense Group Inc.: alliances
    • 10.14.5 Defense Group Inc.: recent contract wins
    • 10.14.6 Defense Group Inc.: financial analysis
  • 10.15 Northrop Grumman Corporation
    • 10.15.1 Northrop Grumman Corporation: overview
    • 10.15.2 Northrop Grumman Corporation: products and services
    • 10.15.3 Northrop Grumman Corporation: recent announcements and strategic initiatives
    • 10.15.4 Northrop Grumman Corporation: alliances
    • 10.15.5 Northrop Grumman Corporation: recent contract wins
    • 10.15.6 Northrop Grumman Corporation: financial analysis
  • 10.16 Raytheon
    • 10.16.1 Raytheon: Overview
    • 10.16.2 Raytheon: products and services
    • 10.16.3 Raytheon: recent announcements and strategic initiatives
    • 10.16.4 Raytheon: alliances
    • 10.16.5 Raytheon: recent contract wins
    • 10.16.6 Raytheon: financial analysis
  • 10.17 Thales
    • 10.17.1 Thales: overview
    • 10.17.2 Thales: products and services
    • 10.17.3 Thales: recent announcements and strategic initiatives
    • 10.17.4 Thales: alliances
    • 10.17.5 Thales: recent contract wins
    • 10.17.6 Thales: financial analysis
  • 10.18 Usmax Corporation
    • 10.18.1 Usmax Corporation: Overview
    • 10.18.2 Usmax Corporation: products and services
    • 10.18.3 Usmax Corporation: recent announcements and strategic initiatives
    • 10.18.4 Usmax Corporation: alliances
    • 10.18.5 Usmax Corporation: recent contract wins
    • 10.18.6 Usmax Corporation: financial analysis

10.19 CRGT

    • 10.19.1 CRGT: overview
    • 10.19.2 CRGT: products and services
    • 10.19.3 CRGT: recent announcements and strategic initiatives
    • 10.19.4 CRGT: alliances
    • 10.19.5 CRGT: recent contract wins
    • 10.19.6 CRGT: financial analysis
  • 10.2 Digital Management Inc
    • 10.20.1 Digital Management Inc: overview
    • 10.20.2 Digital Management Inc: products and services
    • 10.20.3 Digital Management Inc: recent announcements and strategic initiatives
    • 10.20.4 Digital Management Inc: alliances
    • 10.20.5 Digital Management Inc: recent contract wins
    • 10.20.6 Digital Management Inc: financial analysis

11 Appendix

  • 11.1 Full survey results
  • 11.2 Methodology
  • 11.3 Contact us
  • 11.4 About SDI
  • 11.5 Disclaimer

List of Tables

  • Table 1: Total Global Defense Industry Survey Respondents by Company Type, 2012
  • Table 2: Global Defense Industry Buyer Respondents by Region (%), 2012
  • Table 3: Global Defense Industry Buyer Respondents by Job Role (%), 2012
  • Table 4: Global Defense Industry Supplier Respondents by Job Role (%), 2012
  • Table 5: Global Defense Industry Supplier Respondents by Global Company Turnover (%), 2012
  • Table 6: Global Defense Industry Supplier Respondents by Region (%), 2012
  • Table 7: Global Defense Industry: Perception of Cyber Warfare by Company Type (%), 2012
  • Table 8: Global Defense Industry: Perception of Cyber Warfare by Region (%), 2012
  • Table 9: Global Defense Industry: Perception of Cyber Warfare by Turnover (%), 2012
  • Table 10: Global Defense Industry: Growth in Cyber Warfare by Company Type (%), 2012
  • Table 11: Global Defense Industry: Growth in Cyber Warfare by Region (%), 2012
  • Table 12: Global Defense Industry: Growth in Cyber Warfare by Turnover (%), 2012
  • Table 13: Global Defense Industry: Reality of Cyber Warfare by Company Type (%), 2012
  • Table 14: Global Defense Industry: Reality of Cyber Warfare by Region (%), 2012
  • Table 15: Global Defense Industry: Reality of Cyber Warfare by Turnover (%), 2012
  • Table 16: Global Defense Industry Buyers: Frequency of Cyber Warfare (%), 2012
  • Table 17: Global Defense Industry Suppliers: Frequency of Cyber Warfare (%), 2012
  • Table 18: Global Defense Industry: Frequency of Cyber Warfare by Region (%), 2012
  • Table 19: Global Defense Industry: Frequency of Cyber Warfare by Turnover (%), 2012
  • Table 20: Key Cyber-Attack Techniques -Global Defense Organizations (%), 2012
  • Table 21: Global Defense Industry Suppliers: Key Cyber-Attack Techniques (%), 2012
  • Table 22: Global Defense Industry: Key Cyber-attack Techniques - IT Department Respondents (%), 2012
  • Table 23: Potential Sources of Cyber-Attacks-Global Defense Organizations (%), 2012
  • Table 24: Global Defense Industry Suppliers : Potential Sources of Cyber-attacks (%), 2012
  • Table 25: Global Defense Industry: Potential Sources of Cyber-attacks by Region (%), 2012
  • Table 26: Global Defense Industry: Potential Sources of Cyber-attacks by Turnover (%), 2012
  • Table 27: Key Origins of Cyber-attacks-Global Defense Organizations (%), 2012
  • Table 28: Global Defense Industry Suppliers: Key Origins of Cyber-attacks (%), 2012
  • Table 29: Global Defense Industry: Key Origins of Cyber-attacks by Region (%), 2012
  • Table 30: Global Defense Industry: Key Origins of Cyber-attacks by Turnover (%), 2012
  • Table 31: Impact of Cyber Warfare - Global Defense Organizations (%), 2012
  • Table 32: Global Defense Industry Suppliers: Impact of Cyber Warfare (%), 2012
  • Table 33: Global Defense Industry: Impact of Cyber Warfare by Region (%), 2012
  • Table 34: Global Defense Industry: Impact of Cyber Warfare by Turnover (%), 2012
  • Table 35: Key Barriers to Cyber Security -Global Defense Organizations (%), 2012
  • Table 36: Global Defense Industry Suppliers: Key Barriers to Cyber Security (%), 2012
  • Table 37: Global Defense Industry: Key Barriers to Cyber Security Measures by Region (%), 2012
  • Table 38: Global Defense Industry: Key Barriers to Cyber Security Measures by Turnover (%), 2012
  • Table 39: Global Defense Industry: Key Barriers to Cyber Security- IT Department Respondents (%), 2012
  • Table 40: Monitoring Cyber Security: Global Defense Organizations (%), 2012
  • Table 41: Setting Up Cyber Security Cells: Global Defense Organizations (%), 2012
  • Table 42: Global Defense Industry Suppliers: Monitoring Cyber Security (%), 2012
  • Table 43: Global Defense Industry Suppliers: Setting Up of Cyber Security Cells(%), 2012
  • Table 44: Global Defense Industry: Monitoring of Cyber Security by Region (%), 2012
  • Table 45: Global Defense Industry: Monitoring of Cyber Security by Turnover (%), 2012
  • Table 46: Primary Countermeasures of Cyber Warfare - Global Defense Organizations (%), 2012
  • Table 47: Global Defense Contractors: Primary Countermeasures of Cyber Warfare (%), 2012
  • Table 48: Global Defense Industry Other Service Providers: Primary Countermeasures of Cyber Warfare (%), 2012
  • Table 49: Global Defense Industry: Primary Countermeasures by Region (%), 2012
  • Table 50: Global Defense Industry Buyers: Use of External Support to Prevent Cyber-attacks (%), 2012
  • Table 51: In-House Cyber Security Cells vs. Using External Consultants - Buyers (%), 2012
  • Table 52: Global Defense Industry Suppliers: Use of External Support in Countermeasure (%), 2012
  • Table 53: Global Defense Industry Suppliers: In-House Cyber Security Cells vs. Using External Consultants (%), 2012
  • Table 54: Global Defense Industry: Use of External Support in Countermeasure by Region (%), 2012
  • Table 55: Global Defense Industry: Use of External Support in Countermeasure by Turnover(%), 2012
  • Table 56: Global Defense Organizations: Annual Cyber Security Budgets(%), 2012
  • Table 57: Global Defense Industry Suppliers: Annual Cyber Security Budgets (%), 2012
  • Table 58: Global Defense Industry: Annual Cyber Security Budgets by Region (%), 2012
  • Table 59: Global Defense Industry: Annual Cyber Security Budgets by Turnover (%), 2012
  • Table 60: Global Defense Industry: Annual Cyber Security Budgets by Senior Level (%), 2012
  • Table 61: Planned Change in Cyber Security Budgets -Global Defense Organizations (%), 2012
  • Table 62: Global Defense Industry Suppliers: Planned Change in Cyber Security Budgets(%), 2012
  • Table 63: Global Defense Industry: Planned Change in Cyber Security Budgets by Region (%), 2012
  • Table 64: Global Defense Industry: Planned Change in Cyber Security Budgets by Turnover (%), 2012
  • Table 65: Planned Change in Cyber Security Budgets by Senior Level Respondents(%), 2012
  • Table 66: Key Markets for Cyber Security Products: Global Defense Organizations (%), 2012
  • Table 67: Global Defense Industry Suppliers: Key Markets for Cyber Security Products (%), 2012
  • Table 68: Global Defense Industry: Key Markets for Cyber Security Products by Region (%), 2012
  • Table 69: Global Defense Industry: Key Markets for Cyber Security Products by Turnover (%), 2012
  • Table 70: Demand for Cyber Security Products - Global Defense Organizations (%), 2012
  • Table 71: Global Defense Industry: Demand for Cyber Security Products - Suppliers (%), 2012
  • Table 72: Global Defense Industry: Demand for Cyber Security Products - Region (%), 2012
  • Table 73: Global Defense Industry: Demand for Cyber Security Products - Turnover (%), 2012
  • Table 74: Program Details - Cyber Defense Weaponry Program
  • Table 75: Program Details - RIFAN Stage Two
  • Table 76: Program Details - Cyber Weapons Program
  • Table 77: Program Details - Cyber Genome Program
  • Table 78: Program Details - Einstein Intrusion Detection System Program
  • Table 79: Program Details - National Cyber Range Program
  • Table 80: Program Details - Cyberspace Science, Research, Engineering And Technology Integration Program
  • Table 81: Program Details - Cyber Insider Threat Program
  • Table 82: Lockheed Martin: Alliances
  • Table 83: Lockheed Martin: Recent Contract Wins
  • Table 84: Panda Security: Alliances
  • Table 85: Panda Security: Recent Contract Wins
  • Table 86: Booz Allen Hamilton: Alliances
  • Table 87: Booz Allen Hamilton: Recent Contract Wins
  • Table 88: CACI: Alliances
  • Table 89: CACI: Recent Contract Wins
  • Table 90: NetCentrics: Alliances
  • Table 91: NetCentrics: Recent Contract Wins
  • Table 92: Check Point Software Technologies: Alliances
  • Table 93: General Dynamics: Alliances
  • Table 94: General Dynamics: Recent Contract Wins
  • Table 95: ManTech International Corporation: Alliances
  • Table 96: ManTech International Corporation: Recent Contract Wins
  • Table 97:BAE Systems Detica: Recent Contract Wins
  • Table 98: Dynamic Research Corporation: Alliances
  • Table 99: Dynamic Research Corporation: Recent Contract Wins
  • Table 100: KEYW: Alliances
  • Table 101: KEYW: Recent Contract Wins
  • Table 102: Layer 7 Technologies: Alliances
  • Table 103: Camber Corporation: Alliances
  • Table 104: Northrop Grumman Corporation: Alliances
  • Table 105:Northrop Grumman Corporation: Recent Contract Wins
  • Table 106: Raytheon: Alliances
  • Table 107: Raytheon: Recent Contract Wins
  • Table 108: Thales: Alliances
  • Table 109:Thales: Recent Contract Wins
  • Table 110: Usmax Corporation: Alliances
  • Table 111: Usmax Corporation: Recent Contract Wins
  • Table 112: CRGT: Alliances
  • Table 113: CRGT: Recent Contract Wins
  • Table 114: Digital Management Inc: Alliances
  • Table 115: Digital Management Inc: Recent Contract Wins
  • Table 116: Full Survey Results

List of Figures

  • Figure 1: Global Defense Industry: Perception of Cyber Warfare by Company Type (%), 2012
  • Figure 2: Global Defense Industry: Perception of Cyber Warfare by Region (%), 2012
  • Figure 3: Global Defense Industry: Perception of Cyber Warfare by Turnover (%), 2012
  • Figure 4: Global Defense Industry: Growth in Cyber Warfare by Company Type (%), 2012
  • Figure 5: Global Defense Industry: Growth in Cyber Warfare by Region (%), 2012
  • Figure 6: Global Defense Industry: Growth in Cyber Warfare by Turnover (%), 2012
  • Figure 7: Global Defense Industry: Reality of Cyber Warfare by Company Type (%), 2012
  • Figure 8: Global Defense Industry Buyers: Frequency of Cyber Warfare (%), 2012
  • Figure 9: Global Defense Industry Suppliers: Frequency of Cyber Warfare (%), 2012
  • Figure 10: Global Defense Industry: Frequency of Cyber Warfare by Region (%), 2012
  • Figure 11: Global Defense Industry: Frequency of Cyber Warfare by Turnover (%), 2012
  • Figure 12: Global Defense Industry: Key Cyber-Attack Techniques - Defense Organizations (%), 2012
  • Figure 13: Global Defense Industry Suppliers: Key Cyber-Attack Techniques (%), 2012
  • Figure 14: Global Defense Industry: Key Cyber-attack Techniques - IT Department Respondents (%), 2012
  • Figure 15: Potential Sources of Cyber-Attacks - Global Defense Organizations (%), 2012
  • Figure 16: Global Defense Industry Suppliers : Potential Sources of Cyber-attacks (%), 2012
  • Figure 17: Global Defense Industry: Potential Sources of Cyber-attacks by Region (%), 2012
  • Figure 18: Global Defense Industry: Potential Sources of Cyber-attacks by Turnover (%), 2012
  • Figure 19:Key Origins of Cyber-attacks-Global Defense Organizations (%), 2012
  • Figure 20: Global Defense Industry Suppliers: Key Origins of Cyber-attacks (%), 2012
  • Figure 21: Impact of Cyber Warfare - Global Defense Organizations (%), 2012
  • Figure 22: Global Defense Industry Suppliers: Impact of Cyber Warfare (%), 2012
  • Figure 23: Global Defense Industry: Impact of Cyber Warfare by Region (%), 2012
  • Figure 24: Global Defense Industry: Impact of Cyber Warfare by Turnover (%), 2012
  • Figure 25Key Barriers to Cyber Security - Global Defense Organizations (%), 2012
  • Figure 26: Global Defense Industry Suppliers: Key Barriers to Cyber Security (%), 2012
  • Figure 27: Global Defense Industry: Key Barriers to Cyber Security Measures by Turnover (%), 2012
  • Figure 28: Global Defense Industry: Key Barriers to Cyber Security - IT Department Respondents(%), 2012
  • Figure 29: Monitoring Cyber Security: Global Defense Organizations (%), 2012
  • Figure 30: Global Defense Industry Suppliers: Monitoring Cyber Security (%), 2012
  • Figure 31: Global Defense Industry: Monitoring of Cyber Security by Region (%), 2012
  • Figure 32: Global Defense Industry: Monitoring of Cyber Security by Turnover (%), 2012
  • Figure 33: Primary Countermeasures of Cyber Warfare - Global Defense Organizations (%), 2012
  • Figure 34: Global Defense Contractors: Primary Countermeasures of Cyber Warfare (%), 2012
  • Figure 35: Global Defense Industry Other Service Providers: Primary Countermeasures of Cyber Warfare (%), 2012
  • Figure 36: Global Defense Industry: Primary Countermeasures by Region (%), 2012
  • Figure 37: Global Defense Industry: Primary Countermeasures by Turnover (%), 2012
  • Figure 38: Global Defense Industry Buyers: Use of External Support in Countermeasure (%), 2012
  • Figure 39: Global Defense Industry Suppliers: Use of External Support in Countermeasure (%), 2012
  • Figure 40: Global Defense Industry: Use of External Support in Countermeasure by Turnover(%), 2012
  • Figure 41: Global Defense Organizations: Annual Cyber Security Budgets(%), 2012
  • Figure 42: Global Defense Industry Suppliers: Annual Cyber Security Budgets (%), 2012
  • Figure 43: Global Defense Industry: Annual Cyber Security Budgets by Region (%), 2012
  • Figure 44: Global Defense Industry: Annual Cyber Security Budgets by Turnover (%), 2012
  • Figure 45: Global Defense Industry: Annual Cyber Security Budgets by Senior Level (%), 2012
  • Figure 46:Planned Change in Cyber Security Budgets -Global Defense Organizations (%), 2012
  • Figure 47: Global Defense Industry Suppliers: Planned Change in Cyber Security Budgets(%), 2012
  • Figure 48: Global Defense Industry: Planned Change in Cyber Security Budgets by Region (%), 2012
  • Figure 49: Global Defense Industry: Planned Change in Cyber Security Budgets by Turnover (%), 2012
  • Figure 50: Planned Change in Cyber Security Budgets by Senior Level Respondents(%), 2012
  • Figure 51: Key Markets for Cyber Security Products: Global Defense Organizations (%), 2012
  • Figure 52: Global Defense Industry Suppliers: Key Markets for Cyber Security Products (%), 2012
  • Figure 53: Global Defense Industry: Key Markets for Cyber Security Products by Region (%), 2012
  • Figure 54: Demand for Cyber Security Products - Global Defense Organizations (%), 2012
  • Figure 55: Global Defense Industry: Demand for Cyber Security Products - Suppliers (%), 2012
  • Figure 56: Global Defense Industry: Demand for Cyber Security Products - Region (%), 2012
  • Figure 57: Global Defense Industry: Demand for Cyber Security Products - Turnover (%), 2012
  • Figure 58: Lockheed Martin Corporation: Revenue Trend Analysis (US$ billion), 2006-2010
  • Figure 59: Lockheed Martin Corporation - Operating Profit (US$ million), 2006-2010
  • Figure 60: Lockheed Martin Corporation - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 61: Booz Allen Hamilton- Revenue Trend Analysis (US$ billion), 2008-2011
  • Figure 62: Booz Allen Hamilton - Operating Profit (US$ million), 2008-2011
  • Figure 63: Booz Allen Hamilton - Net Profit Trend Analysis (US$ million), 2008-2011
  • Figure 64: CACI - Revenue Trend Analysis (US$ billion), 2007-2011
  • Figure 65: CACI - Operating Profit (US$ million), 2007-2011
  • Figure 66: CACI - Net Profit Trend Analysis (US$ million), 2007-2011
  • Figure 67: Check Point Software Technologies - Revenue Trend Analysis (US$ million), 2006-2010
  • Figure 68: Check Point Software Technologies - Operating Profit (US$ million), 2006-2010
  • Figure 69: Check Point Software Technologies - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 70: General Dynamics - Revenue Trend Analysis (US$ billion), 2006-2010
  • Figure 71: General Dynamics - Operating Profit (US$ million), 2006-2010
  • Figure 72: General Dynamics - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 73: ManTech International Corporation - Revenue Trend Analysis (US$ billion), 2006-2010
  • Figure 74: ManTech International Corporation - Operating Profit (US$ million), 2006-2010
  • Figure 75: ManTech International Corporation - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 76: BAE Systems Detica - Revenue Trend Analysis (GBP billion), 2006-2010
  • Figure 77: BAE Systems Detica - Operating Profit (GBP million), 2006-2010
  • Figure 78:BAE Systems Detica- Net Profit Trend Analysis (GBP million), 2006-2010
  • Figure 79: Dynamic Research Corporation - Revenue Trend Analysis (US$ million), 2006-2010
  • Figure 80: Dynamic Research Corporation - Operating Profit (US$ million), 2006-2010
  • Figure 81: Dynamic Research Corporation - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 82: KEYW - Revenue Trend Analysis (US$ million), 2006-2010
  • Figure 83: KEYW - Operating Profit (US$ million), 2006-2010
  • Figure 84: KEYW - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 85: Northrop Grumman Corporation- Revenue Trend Analysis (US$ billion), 2006-2010
  • Figure 86: Northrop Grumman Corporation- Operating Profit (US$ million), 2006-2010
  • Figure 87:Northrop Grumman Corporation- Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 88: Raytheon - Revenue Trend Analysis (US$ billion), 2006-2010
  • Figure 89: Raytheon - Operating Profit (US$ million), 2006-2010
  • Figure 90: Raytheon - Net Profit Trend Analysis (US$ million), 2006-2010
  • Figure 91: Thales - Revenue Trend Analysis (EUR billion), 2006-2010
  • Figure 92: Thales - Operating Profit (EUR million), 2006-2010
  • Figure 93: Thales - Net Profit Trend Analysis (EUR million), 2006-2010
Show More
RELATED REPORTS
* Defense Business Confidence Report Q3 2014
  • Published:
  • Aug 22, 2014
  • USD 1950
  • 59 Pages

* Future of the Myanmarese Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • Jul 24, 2014
  • USD 1250
  • 75 Pages

* Future of the Vietnamese Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • Jul 23, 2014
  • USD 1250
  • 99 Pages

* Future of the Chinese Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • Jul 09, 2014
  • USD 1250
  • 133 Pages

* Future of the Indonesian Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • Jun 24, 2014
  • USD 1250
  • 122 Pages

* Altimeter System and Pitot Tube Market for Aerospace and Defense Industry, by Product, by Platform, by Geography (North America, Europe, Asia-Pacific, the Middle-East, Latin America, ROW) - Forecasts & Analysis to 2014 - 2020
  • Published:
  • Jun 18, 2014
  • USD 4650
  • 229 Pages

* Future of the Thai Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • May 30, 2014
  • USD 1250
  • 137 Pages

* Future of the Malaysian Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • May 15, 2014
  • USD 1250
  • 136 Pages

* Future of the Indian Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • Mar 31, 2014
  • USD 1250
  • 177 Pages

* Future of the US Defense Industry - Market Attractiveness, Competitive Landscape and Forecasts to 2019
  • Published:
  • Feb 28, 2014
  • USD 1250
  • 221 Pages

Browse more Military & Defense Market Research Reports

Pricing
Get Notified
Email me when related reports are published