Cover Image
Market Research Report

The Future of Cybercrime & Security: Threat Analytics, Impact Assessment & Leading Vendors 2018-2023

Published by Juniper Research Product code 677119
Published Content info
Delivery time: 1-2 business days
Price
Back to Top
The Future of Cybercrime & Security: Threat Analytics, Impact Assessment & Leading Vendors 2018-2023
Published: August 8, 2018 Content info:
Description

Overview

‘The Future of Cybercrime & Security ’ provides a thorough examination of the current market environment and threat landscape for cybersecurity. The research presents need-to-know information on the state of cybersecurity legislation, key player strategies and overall trends affecting the market, focusing on the following areas:

  • Endpoint & Network Security
  • Cloud Security & Identity & Access Management
  • IoT & Device Security

The research includes:

  • Market Trends & Opportunities (PDF)
  • 5 Year Market Sizing & Forecast spreadsheet (Excel)

Key Features

  • Threat Landscape: See what the main cyber threats are facing enterprises and consumers in 2018 and beyond, for the following key sectors:
    • Banking & Finance
    • Consumer Devices
    • IoT
  • Market Dynamics: Strategic assessment of the current market landscape, examining future developments across the cybersecurity market, including segment by segment analysis.
  • Regulatory Guide: Examination of the range of cybersecurity legislation in place across 13 territories, and an analysis of their implications and future development.
  • Juniper Leaderboards & Vendor Analysis: Key player capability and capacity assessment for 48 enterprise cybersecurity providers, split by:
    • Endpoint Security Leaderboard
    • Cloud Cybersecurity Leaderboard
    • Identity & Access Management Leaderboard
  • Market Sizing: 5 year forecasts for both the cost of cybersecurity data breaches and levels of enterprise cybersecurity spending.

Key Questions

  • 1. How are the key players in cybersecurity players reacting to the latest market developments?
  • 2. What are the main threats cybersecurity must address in future?
  • 3. What are the strategies of the leading players in key cybersecurity segments?
  • 4. What are governments doing to support greater cybersecurity?
  • 5. What is the cost of criminal data breaches and how will this change in future?

Companies Referenced

  • Listed in Cybersecurity Providers Leaderboards: Alert Logic, AlienVault, Avast, Barkly, Carbon Black, Centrify, CipherCloud, CloudFlare, Cyberark, Cylance, DarkTrace, Duo, FireEye, Forcepoint, IBM, Illumio, Lookout, Minerva, Netskope, Okta, Oracle, Paladion, Palo Alto Networks, Ping Identity, Qualys, RSA, SailPoint, SecureWorks, SentinelOne, SentryBay, SonicWall, Sophos, Symantec, Tanium, Trend Micro, Twistlock, Webroot, Zscaler.
  • Mentioned: AT&T, Brazilian Internet Committee, Cisco, Google, IEC, INAI (National Institute for Transparency, Access to Information and Personal Data Protection), ISO, Kaspersky, LightCyber, National Data Protection Authority, Netscout, NetWatcher, NexusGuard, NIST (National Institute of Standards and Technology), OECD, Office of the Privacy Commissioner of Canada, PPC (Personal Information Protection Commission), Sift Security, Verizon, WTO (World Trade Organisation).

Data & Interactive Forecast

Juniper's ‘The Future of Cybercrime & Security ’ forecast suite includes:

  • Cybersecurity spend forecast splits for 8 key regions and 9 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Data breach volume and value forecast splits for 8 key regions and 9 countries:
    • Canada
    • China
    • France
    • Germany
    • Japan
    • Russia
    • UK
    • US
  • Interactive Scenario tool allowing user the ability to manipulate Juniper's data for 10 different metrics.
  • Access to the full set of forecast data of 28 tables and over 3,700 datapoints.

Juniper Research's highly granular interactive Excels enable clients to manipulate Juniper's forecast data and charts to test their own assumptions using the Interactive Scenario Tool, and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

Table of Contents

1. Cybercrime & Cybersecurity: Key Takeaways

  • 1.1. Cybercrime Key Takeaways
    • Figure 1.1: Kaspersky Mobile Malware Prevalence Map
  • 1.2. Cybersecurity Key Takeaways

2. Cybercrime Trends & Outlook

  • 2.1. Introduction
  • 2.2. Definitions & Typology
    • 2.2.1. Incident Types
    • 2.2.2. Attack Types
      • i. DoS & DDoS
      • ii. Phishing
      • iii. Trojans
      • iv. Keylogging
      • v. MITM Attacks
      • vi. Scrapers & Skimmers
      • vii. Ransomware
      • viii. Botnets
      • ix. Cryptojacking
    • 2.2.3. Motivations
  • 2.3. Cybercrime Trends
    • 2.3.1. Peak Ransomware
      • i. DDoS Ransoms
        • Figure 2.1: DDoS Attack Frequency & Average Size
    • 2.3.2. Cryptojacking Emerges, Cryptocurrencies Change
      • Case Study: Rakhni Ransom/Miner Variant
    • 2.3.3. DDoS Switches it Up & Downsizes
      • Figure 2.3: Top 10 Multi-Vector DDoS Attack Combinations
    • 2.3.4. Fileless & Userless Malware Comes of Age
    • 2.3.5. Social Media Platforms are a Malicious Actor Toolbox
      • i. The AI Element
    • 2.3.6. Malvertising
    • 2.3.7. AI Attacks Anticipated
  • 2.4. Juniper Cybercrime Threat Assessments
    • 2.4.1. Financial Threat Assessments
      • i. Banking
        • Figure 2.2: Rakhni Variant Miner/Crypter Observed Attack Geography
        • Figure 2.4: Juniper Research 2018 Banking Cybercrime Threat Landscape Assessment
        • Figure 2.5: Juniper Research Banking Cybercrime Future Threat Landscape
      • ii. Payments & Money Transfer
        • Figure 2.6: Juniper Research 2018 Payments & Money Transfer Cybercrime Threat Landscape Assessment
        • Figure 2.7: Juniper Research Payments Cybercrime Future Threat Landscape
      • iii. Mobile Wallets
        • Figure 2.8: Juniper Research 2018 Mobile Wallets Cybercrime Threat Landscape Assessment
        • Figure 2.9: Juniper Research Mobile Wallets Cybercrime Future Threat Landscape
    • 2.4.2. Device Threat Assessment
      • i. Smartphones
        • Figure 2.10: Juniper Research 2018 Smartphone Cybercrime Threat Landscape Assessment
        • Figure 2.11: Juniper Research Smartphone Cybercrime Future Threat Landscape
      • ii. IoT Devices
        • Figure 2.12: Juniper Research 2018 IoT Cybercrime Threat Landscape Assessment
        • Figure 2.13: Forecast - Juniper Research IoT Cybercrime Threat Landscape
  • 2.5. Cybercime Breach Forecast
    • 2.5.1. Methodology
      • Figure 2.14: Criminal Data Breach Forecast Methodology
      • i. Forecast Assumptions & Limitations of Analysis
  • 2.6. Cybercrime Breaches Forecasts
    • 2.6.1. Breaches Volume
      • Figure & Table 2.15: Total Number of Criminal Data Breaches per annum, Split by 8 Key Regions 2018-2023
    • 2.6.2. Breaches Value
      • Figure & Table 2.16: Cost of Criminal Data Breaches per annum ($m), Split by 8 Key Regions 2018-2023

3. Cybersecurity Trends

  • 3.1. Introduction
    • 3.1.1. Definitions
  • 3.2. Cybersecurity Trends
    • 3.2.1. Patchwork Approach Still a Problem
      • Figure 3.1: Cybersecurity Alerts Investigation Actions (%)
    • 3.2.2. Deception Technologies on the Increase
      • i. Cybersecurity Vaccines
    • 3.2.3. Mandated Cybersecurity & Regulation
      • i. From Fines to a Liability Shift?
    • 3.2.4. Automation Enables Threat Hunting
  • 3.3. Cybersecurity Market Forecasts
    • 3.3.1. Cybersecurity Spend Forecast Methodology
      • Figure 3.2: Cybersecurity Spend Forecast Methodology
      • i. Forecast Assumptions & Limitations of Analysis
    • 3.3.2. Cybersecurity Market Spend Forecast
      • Figure & Table 3.3: Total Cybersecurity Spend per annum ($m), Split by 8 Key Regions 2018-2023
  • 3.4. Regulatory Environment
    • 3.4.1. North America
      • i. US
      • ii. Canada
    • 3.4.2. Latin America
      • i. Argentina
      • ii. Brazil
      • iii. Mexico
    • 3.4.3. Europe
      • i. EU
      • ii. Germany
      • iii. Russia
      • iv. Turkey
      • v. UK
    • 3.4.4. Asia Pacific
      • i. China
      • ii. India
      • iii. Japan

4. Cybersecurity Sector Outlook & Competitive Analysis

  • 4.1. Cybersecurity Market Sectors Outlook
    • 4.1.1. Cloud Security
    • 4.1.2. IAM (Identity & Access Management)
    • 4.1.3. Endpoint Security
    • 4.1.4. Threat Intelligence
  • 4.2. Cybersecurity Market Sectors Competitive Analysis
    • 4.2.1. Vendor Assessment Criteria
      • Table 4.1: Cybersecurity Vendor Assessment Criteria
    • 4.2.2. Cloud Security Providers Leaderboard
      • Figure 4.2: Juniper Leaderboard for Cloud Security Providers
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.3. Identity & Access Management Leaderboard
      • Figure 4.3: Juniper Leaderboard for Identity & Access Management Providers
      • i. Established Leaders
      • ii. Leading Challengers
    • 4.2.4. Endpoint Security Leaderboard
      • i. Established Leaders
        • Figure 4.4: Juniper Leaderboard for Endpoint Security Providers
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 4.2.5. Limitations & Interpretation
Back to Top