Cover Image
Market Research Report
Product code
1031968

Global Cyber Security Technology Industry Analysis 2018-2025

Published: | Westlands Advisory Ltd | 102 Pages | Delivery time: 1-2 business days

Price

Back to Top
Global Cyber Security Technology Industry Analysis 2018-2025
Published: October 13, 2021
Westlands Advisory Ltd
Content info: 102 Pages
Delivery time: 1-2 business days
  • ALL
  • Description
  • Table of Contents
Description

Research for WA's second edition of the "Cyber Security Industry Technology Analysis" began in April 2021 building on the analysis from the previous year and data collection from April 2019 The research process included updating WA's industry database holds financial and product data for over 2 000 cyber security vendors and service providers Data was generated through using secondary information sources, analyst briefings from leading vendors, informal meetings with smaller start ups and attendance at a wide range of industry events from exhibitions to specialist cyber security shows.

The data analysis began in February July 2021 and was concluded in September 2021 The analysis is the second edition of WA's analysis of the global cyber security market.

Research Goal:

  • Global Cyber Security Market Size by Technology
  • Global Cyber Security Market Forecast 2018 2025 by Technology & Service

Supporting Goals:

  • Identification of over 95% of the industry supply base
  • Evaluation of historical expenditure and growth of technology and services from 2017 to 2020.
  • Evaluation of technology and service lifecycle maturity
  • Identification of the industry forces influencing cyber expenditure and the statistical relationship between them
  • Application of industry forces and lifecycle analysis to an industry forecast model

Summary

  • Investment in cyber security increased in 2020. Expenditure on products and services reached $139.8bn.
  • Expenditure on all technology categories increased due to the strong underlying industry forces influencing security investme nt. These include Growing Risk, High Digital Investment, the Strengthening Regulatory Environment, Business Models and Innovation Trend s.
  • The security threat and risk is expected to remain high throughout the forecast period and will result in continued investmen t i n security technology and services. WA expects investment to almost double by 2025, reaching $260bn.
  • High growth segments include the Internet of Things, Operational Technology Security and Cloud Security. However, all securit y t echnology segments and services are expected to attract higher investment.
  • Zero Trust implementation has now become a mainstream security architecture framework. Although the principles are widely kno wn, implementation is not widespread. WA expects further investment in identity and authentication technologies as organisations transform their security architecture.
  • Vendors are expected to continue the trend of increasing the number of security functionalities that can be offered in integr ate d platforms. This includes technologies ranging from identity to protection, detection and response.
  • The high growth SD WAN market will result in an increasing number of vendors bringing cloud security services together in a single platform, including cloud firewalls , web gateways and security policy enforcement.
Table of Contents

Table of Contents

  • 3. Content Slide Number
  • 4. Market Summary
    • 5. Summary
    • 6. Industry Forces Analysis (1)
    • 7. Industry Forces Analysis (2)
    • 8. Industry Forces Analysis (3)
    • 9. Technology Summary (1)
    • 10. Technology Summary (2)
    • 11. Cyber Security Market Outlook 2018-2025
    • 12. Cyber Security Technology Outlook 2018-2025 (1)
    • 13. Cyber Security Technology Outlook 2018-2025 (2)
  • 14. Network & Infrastructure Protection
    • 15. Network & Infrastructure Protection Introduction
    • 16. Network & Infrastructure Protection Market Guide (1)
    • 17. Network & Infrastructure Protection Market Guide (2)
    • 18. Network & Infrastructure Protection Market Guide (3)
    • 19. Network & Infrastructure Protection Market Guide (4)
    • 20. Network & Infrastructure Protection Outlook
    • 21. Network & Infrastructure Protection Lifecycle
    • 22. Network & Infrastructure Protection Ecosystem
    • 23. Network & Infrastructure Protection: Secure SD-WAN (1)
    • 24. Network & Infrastructure Protection: Secure SD-WAN (2)
    • 25. Network & Infrastructure Protection: ZTNA
  • 26. Enterprise Endpoint Security
    • 27. Enterprise Endpoint Security Introduction
    • 28. Enterprise Endpoint Security Market Guide
    • 29. Enterprise Endpoint Security Outlook
    • 30. Enterprise Endpoint Security Lifecycle
    • 31. Enterprise Endpoint Security Ecosystem
  • 32. Mobile Security
    • 33. Mobile Security Introduction
    • 34. Mobile Security Market Guide
    • 35. Mobile Security Outlook
    • 36. Mobile Security Lifecycle
    • 37. Mobile Security Ecosystem
  • 38. Cloud Security
    • 39. Cloud Computing Introduction
    • 40. Cloud Security Introduction
    • 41. Cloud Security Market Guide (1)
    • 42. Cloud Security Market Guide (2)
    • 43. Cloud Security Outlook
    • 44. Cloud Security Lifecycle
    • 45. Cloud Security Ecosystem
  • 46. Application Security
    • 47. Application Security Introduction
    • 48. Application Security Market Guide (1)
    • 49. Application Security Market Guide (2)
    • 50. Application Security Outlook
    • 51. Application Security Lifecycle
    • 52. Application Security Ecosystem
  • 53. Data Security
    • 54. Data Security Introduction
    • 55. Data Security Market Guide (1)
    • 56. Data Security Market Guide (2)
    • 57. Data Security Outlook
    • 58. Data Security Lifecycle
    • 59. Data Security Ecosystem
  • 60. Identity & Access Management
    • 61. IAM Introduction
    • 62. IAM Market Guide (1)
    • 63. IAM Market Guide (2)
    • 64. IAM Outlook
    • 65. IAM Lifecycle
    • 66. IAM Ecosystem
    • 67. Risk & Compliance
    • 68. Risk & Compliance Introduction
    • 69. Risk & Compliance Market Guide (1)
    • 70. Risk & Compliance Market Guide (2)
    • 71. Risk & Compliance Market Guide (3)
    • 72. Risk & Compliance Market Guide (4)
    • 73. Risk & Compliance Market Outlook
    • 74. Risk & Compliance Market Lifecycle
    • 75. Risk & Compliance Market Ecosystem
  • 76. Operational Technology Security
    • 77. Operational Technology Introduction
    • 78. Operational Technology Market Guide (1)
    • 79. Operational Technology Market Guide (2)
    • 80. Operational Technology Market Guide (3)
    • 81. Operational Technology Outlook
    • 82. Operational Technology Lifecycle
    • 83. Operational Technology Ecosystem
  • 84. Internet of Things Security
    • 85. Internet of Things Security Introduction
    • 86. Internet of Things Security Market Guide
    • 87. Internet of Things Security Outlook
    • 88. Internet of Things Security Lifecycle
    • 89. Internet of Things Security Ecosystem
  • 90. Security Operations & Threat Intelligence
    • 91. Security Operations & TI Introduction
    • 92. Security Operations & TI Market Guide (1)
    • 93. Security Operations & TI Market Guide (2)
    • 94. Security Operations & TI Market Guide (3)
    • 95. Security Operations & TI Outlook
    • 96. Security Operations & TI Lifecycle
    • 97. Security Operations & TI Ecosystem
  • 98. Appendix