Cover Image
Market Research Report

Cybersecurity in Retail - Thematic Research

Published by GlobalData Product code 579892
Published Content info 49 Pages
Delivery time: 1-2 business days
Back to Top
Cybersecurity in Retail - Thematic Research
Published: May 31, 2018 Content info: 49 Pages

Retailers are preparing to ride the digital wave - contextualizing and implementing new technologies such as cloud, mobility, big data analytics (BDA), and the Internet of Things (IoT) - to best align with future business objectives. Technology, however, is a double-edged sword: the more they go digital, the more they expose themselves to emerging cyber risks. They need to plan now on how to mitigate their vulnerabilities and enhance their security. There is a significant market opportunity, and vendors can in turn leverage their ecosystems to offer end-to-end security solutions, exploiting technology such as artificial intelligence (AI) and forensics.

The biggest threat to retailers is that the personal consumer data they hold could be accessed by criminals unless state of the art defenses are implemented. Many large retailers have already had their servers compromised and even when there is no clear evidence that the data leak has led to individual customers being targeted with fraudulent use of their financial data, the leak itself is very damaging to the retailer's reputation. Building trust with shoppers, reassuring them that their data is safe, is of paramount importance. Those retailers that abuse that trust will struggle to recover from the reputational damage that data leaks cause.

By 2021 the global cybersecurity market is expected to be worth more than $140 billion, up from $114 billion in 2017. However, the key issue is that retail companies need "better" rather than "more" security. Forward-thinking retailers need to pivot toward a holistic cybersecurity approach to shore up their current position. This approach will also ensure strong future-proofing elements to acknowledge ongoing changes in line with wider growth strategies.

However achieving a comprehensive cybersecurity approach requires involving people, processes, and technology that are relevant to detection, prediction, prevention, and rapid response.

In the report "Cybersecurity in Retail - Thematic Research", we analyze the 12 most important cybersecurity technologies and conclude that the most important ones in terms of driving the cybersecurity industry's revenues over the next two years are network security appliances, cloud security, and AI.


  • This report focuses on the impact of cybersecurity in retail, and how retailers prepare to ride the digital wave to best align with future business objectives.
  • It discusses how forward-thinking retailers will pivot toward a holistic cybersecurity approach to shore up their current position.
  • It indicates the winners in high-growth cyber technology cycles such as network security appliances, cloud security, and AI over the next two years.

Reasons to buy

  • The report focuses on the big players in the cybersecurity industry and where do they sit in the value chain.
  • It identifies the main trends in the cybersecurity industry over the next 12 to 24 months.
  • It provides an industry analysis, emphasizing that the types of cybercrime, the motivations for these crimes, the assets targeted, and remedies differ.
  • It discusses the technologies that will drive growth in the cybersecurity industry over the next two years.
  • It offers a technology briefing about the NIST cybersecurity framework, which is used voluntarily by many companies around the world.
Table of Contents
Product Code: GDRT-TR-S006

Table of Contents

  • TRENDS 5
  • Changing nature of cyber threats 5
  • Evolution of cybersecurity technologies 6
  • Industry growth drivers 7
  • Corporate governance trends 8
  • Cybersecurity trends in retail 9
  • Impact of cybersecurity on retail 15
  • Retail case studies - major security breaches 16
  • Barnes & Noble 16
  • Key recommendations for retailers 18
  • Key recommendations for IT vendors 19
  • Market size and growth forecasts 20
  • M&A 21
  • Timeline 23
  • Network security 25
  • Unified threat management (UTM) 26
  • Artificial Intelligence (AI) 26
  • Deception-based cyber defenses (subset of AI) 27
  • Behavioral analytics (subset of AI) 27
  • SIEM 28
  • Endpoint security 28
  • Mobile security (subset of endpoint security) 29
  • Identity access management (IAM) 30
  • Data security 30
  • Application security 31
  • Email security 31
  • Cloud security 32
  • Managed security services 33
  • Post-breach consultancy services 33
  • Public companies 35
  • Private companies 39
  • Retail companies 41
  • The NIST framework 42
Back to Top