Market Research Logo

Data Center Security: Global Markets

Data Center Security: Global Markets

The global market for data center security products reached $5.6 billion in 2014. The market is expected to increase from nearly $6.4 billion in 2015 to $12.1 billion in 2020, with a compound annual growth rate (CAGR) of 13.8% for 2015-2020.

This report provides:
An overview of the global markets and technologies for data center security.
Analyses of global market trends, with data from 2014, estimates for 2015, and projections of compound annual growth rates (CAGRs) through 2020.
A look at key trends in the market including industry trends, growth in mega data centers, increased spending in security solutions, global IT spending trends, and virtualized data center trends.
Analysis of the market's dynamics, specifically growth drivers which include increasing data traffic and network connections, rising virtualization in data centers, new sophisticated threats and cyber attacks, government regulations and compliance requirements, as well as others.
Information on existing data center security providers and new and emerging data center security providers as well as discussion about the mergers and acquisitions in this space and how this is changing the data center security landscape.


DEFINITION AND SCOPE OF REPORT

BCC Research defines data center security as a computer or cyber security applied to data centers, where the data centers can be in physical form or can be virtualized (software-defined data centers). The security applied can be either as software form, hardware form, or can be a mix of software and hardware. Further, for the purpose of this report, security is defined as all forms of processes and mechanisms by which data center equipment, information and services are protected from intended or unintended (and unauthorized) access and change or destruction.

For calculating the market size, the report has considered the following forms of security:
Intrusion detection system and intrusion prevention system.
Distributed denial of service (DDoS) protection systems.
Unified threat management solutions.
Identity and access management solutions.
Security information and event management solutions.

Further, for calculating the market and various other figures such as market segmentation, we have considered data center software security, data center hardware security as well as data center security services. However, services that are not directly related to implementation or maintenance such as education and training, and consulting services are out of the scope of this report. Further, hardware security that are not part of cyber security, such as closed circuit television (CCTV) and biometric access control are out of scope of this report.

The analysis starts with introducing the reader to how the data center security industry has evolved over time and how cloud and virtualization has affected the market. Building on that understanding, the study proceeds to identify the following forces driving the market:
Primary forces are the forces having a direct impact on the data center security space. Secondary forces are the forces that, albeit important, have an indirect impact.
Key funding and financing in this space, which shows strong support (especially the new entrants).
Some key challenges that may hinder the growth of this market.
Key trends visible in the market.
The top seven industries that are key users of data center security solutions, along with some other industries that are expected to be strong users in the future.
Demand in the Americas, EMEA and Asia-Pacific for data center security solutions.

CHAPTER 1 INTRODUCTION
REPORT OBJECTIVE
DEFINITION AND SCOPE OF REPORT
REASONS FOR DOING THE STUDY
INTENDED AUDIENCE
METHODOLOGY
INFORMATION SOURCES
ANALYST'S CREDENTIALS
RELATED BCC RESEARCH REPORTS
BCC RESEARCH WEBSITE
DISCLAIMER
CHAPTER 2 SUMMARY
SUMMARY TABLE GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, THROUGH 2020 ($ MILLIONS)
SUMMARY FIGURE GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($ MILLIONS)
CHAPTER 3 OVERVIEW
EVER CHANGING DATA CENTER MARKET
DATA CENTER AS A SERVICE (DCAAS)
SOFTWARE-DEFINED DATA CENTER (SDDC)
EMERGENCE OF NEW DATA CENTERS AROUND THE WORLD
NEED FOR SECURITY
TABLE 1 KEY DDOS ATTACKS, 2014 AND 2015
INTRODUCTION TO IT SECURITY
CRITICAL INFRASTRUCTURE SECURITY
STUXNET WORM
MOTIVATION FOR IT SECURITY ATTACKS
IT SECURITY SERVICES
MANAGED SECURITY SERVICE
SECURITY-AS-A-SERVICE
CHANGE IN CYBER SECURITY LANDSCAPE
IMPACT OF INTERNET OF THINGS (IOT) ON THE DATA CENTER AND IT SECURITY MARKETS
IMPACT OF BRING YOUR OWN DEVICE (BYOD) ON THE DATA CENTER AND IT SECURITY MARKETS
DATA CENTER SECURITY: INTRODUCTION
LAYERED SECURITY APPROACH FOR DATA CENTERS
DATA CENTER SECURITY IN DETAIL
TABLE 2 SECURITY TECHNOLOGIES IN A DATA CENTER SECURITY
SOLUTION
ADVENT OF CLOUD AND VIRTUALIZATION AND EMERGENCE OF NEW FORMS OF SECURITY THREATS IN THE DATA CENTER SPACE
GROWTH FORECAST FOR DATA CENTER SECURITY SOLUTIONS
MARKET CHANGES OVER THE YEARS
EMERGENCE OF SOCIAL NETWORKING COMPANIES AND THEIR IMPACT ON THE DATA CENTER SECURITY MARKET
DATA CENTER SECURITY MARKET FORCES
TABLE 3 MAJOR MARKET FORCES AND THEIR EFFECTS
INCREASING INSIDER THREAT AND INFORMATION LEAKAGE
TABLE 4 TOP CAUSES OF DATA BREACHES, 2013 (%)
TABLE 5 TOP TYPES OF INFORMATION BREACHED
TABLE 6 KEY INSIDER DATA THEFTS, 2011-2015
RISE IN COMPLEXITY OF THREATS
CYBERCRIME-AS-A-SERVICE
GROWTH IN DDOS ATTACKS
TABLE 7 KEY DDOS ATTACKS, 2014 AND 2015
Operation Ababil
INCREASE IN ATTACKS ON GOVERNMENT DEPARTMENTS
TABLE 8 KEY ATTACKS ON GOVERNMENT DEPARTMENTS AND WEBSITES, 2012-2015
TABLE 9 MOST FREQUENTLY ATTACKED COUNTRIES
GROWING CRITICALITY OF THE INFORMATION STORED IN DATA CENTERS
INCREASING SPENDING ON IT SECURITY
GROWING STRINGENT REGULATORY REQUIREMENTS
TABLE 10 KEY SECTORS WITH HIGH LEVEL OF CONTROL
MIGRATION TO THE CLOUD
INCREASE IN ONLINE TRANSACTIONS
KEY STRATEGIES IN THE DATA CENTER SECURITY SPACE
KEY BUYING CRITERIA
DEPLOYMENT STRATEGIES
Large, High-Performance Appliances
Protection of Servers at the Hypervisor Level
Protection of Individual Server Instances
DATA CENTER SECURITY GOVERNANCE AND FRAMEWORK
CHAPTER 4 MARKET BY TYPE OF TECHNOLOGY
TABLE 11 GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE OF TECHNOLOGY, 2015 AND 2020 (%)
TABLE 12 KEY DDOS MITIGATION AND SECURITY PROVIDERS
IDS AND IPS TECHNOLOGY FOR DATA CENTER SECURITY MARKET
TABLE 13 GLOBAL MARKET FOR IDS AND IPS TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
TABLE 14 KEY IDS AND IPS TECHNOLOGY PROVIDERS
DDOS TECHNOLOGY FOR DATA CENTER SECURITY MARKET
TABLE 15 GLOBAL MARKET FOR DDOS TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
TABLE 16 KEY DDOS MITIGATION PROVIDERS
UNIFIED THREAT MANAGEMENT (UTM) TECHNOLOGY FOR DATA CENTER
SECURITY MARKET
TABLE 17 GLOBAL MARKET FOR UTM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
TABLE 18 KEY UTM TECHNOLOGY PROVIDERS
IDENTITY AND ACCESS MANAGEMENT (IAM) TECHNOLOGY FOR DATA CENTER
SECURITY MARKET
FIGURE 1 COMPARISON OF VARIOUS STAGES OF IAM TECHNOLOGY
TABLE 19 GLOBAL MARKET FOR IAM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
TABLE 20 KEY IAM TECHNOLOGY PROVIDERS
SECURITY IDENTITY AND EVENT MANAGEMENT (SIEM) TECHNOLOGY FOR DATA
CENTER SECURITY MARKET
TABLE 21 GLOBAL MARKET FOR SIEM TECHNOLOGY FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
TABLE 22 KEY SIEM TECHNOLOGY PROVIDERS
MARKET SEGMENTATION-TRADITIONAL DATA CENTER SECURITY VS. CLOUD/SOFTWARE-DEFINED DATA CENTER SECURITY
TABLE 23 GLOBAL MARKET SHARE FOR DATA CENTER SECURITY BY TYPE, 2014-2020 (%)
FIGURE 2 GLOBAL MARKET FOR DATA CENTER SECURITY BY TYPE, 2014-2020 ($ BILLIONS)
CHAPTER 5 MARKET BY APPLICATION
SEGMENTATION BY INDUSTRY
TABLE 24 GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
FIGURE 3 GLOBAL MARKET FOR DATA CENTER SECURITY BY INDUSTRY, 2014-2020 ($ MILLIONS)
FINANCIAL SERVICES SECTOR OUTLOOK
FIGURE 4 AVERAGE ANNUALIZED COST GROWTH OF CYBER CRIME FOR A FINANCIAL SERVICES COMPANY, 2011-2013 (%)
TABLE 25 LIST OF HIGH PROFILE DATA LOSS CASES AMONG FINANCIAL SERVICES ORGANIZATIONS, 2012-2014
TABLE 26 IMPORTANCE OF KEY SECURITY SOLUTIONS IN FINANCIAL
SERVICE SECTOR
TABLE 27 GLOBAL MARKET FOR FINANCIAL SERVICES SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
BANKING SECTOR
TABLE 28 MAPPING OF ATTACKERS AND VARIOUS ATTACKS AND IMPACT ON BANKING SECTOR
RETAIL AND E-COMMERCE SECTOR OUTLOOK
TABLE 29 INTERNET USER PENETRATION FOR KEY COUNTRIES AS PERCENTAGE OF POPULATION, 2014 (NO./%)
TABLE 30 GLOBAL MARKET FOR RETAIL AND E-COMMERCE SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
HEALTH CARE SECTOR OUTLOOK
TABLE 31 IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE HEALTHCARE SECTOR
TABLE 32 GLOBAL MARKET FOR HEALTHCARE SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
GOVERNMENT SECTOR OUTLOOK
TABLE 33 IMPORTANCE OF KEY SECURITY SOLUTIONS IN THE GOVERNMENT SECTOR
TABLE 34 GLOBAL MARKET FOR GOVERNMENT SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
TABLE 35 KEY ATTACKS ON DATA CENTERS IN THE GOVERNMENT SPACE
OTHER SECTORS
TABLE 36 GLOBAL MARKET FOR ENERGY AND UTILITIES SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
TABLE 37 GLOBAL MARKET FOR TELECOM SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
TABLE 38 GLOBAL MARKET FOR INFORMATION TECHNOLOGY SECTOR BY TECHNOLOGY, THROUGH 2020 ($ MILLIONS)
GROWING ACCEPTANCE AMONG MID-SIZED ORGANIZATIONS
TABLE 39 KEY MID-SIZED COMPANIES ACCEPTING DATA CENTER
SECURITY SOLUTIONS
CHAPTER 6 INDUSTRY STRUCTURE
KEY STAKEHOLDERS IN THE MARKET
KEY TRENDS IN THE DATA CENTER SECURITY MARKET
EMERGENCE OF CONVERGED SOLUTIONS
CONSOLIDATION IN THE DATA CENTER SECURITY MARKET
TABLE 40 KEY ACQUISITIONS AND MERGERS IN THE DATA CENTER
SECURITY AND RELATED SPACE
VENTURE CAPITAL FUNDING AND INVESTMENTS IN THE DATA CENTER
SECURITY SPACE
TABLE 41 FUNDING IN THE DATA CENTER SECURITY AND RELATED SPACE
REGULATORY FRAMEWORKS AND THEIR EFFECTS ON THE DATA CENTER
SECURITY MARKET
SARBANES-OXLEY ACT (SARBOX, SOX)
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)
THE GRAMM-LEACH-BLILEY ACT (GLB) ACT OF 1999
FAIR AND ACCURATE CREDIT TRANSACTION ACT (FACTA), INCLUDING RED
FLAGS RULE
FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
EUROPEAN UNION DATA PROTECTION DIRECTIVE
BANK SECRECY ACT
CALIFORNIA SENATE BILL 1386
PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA)
INFORMATION SECURITY MANAGEMENT SYSTEM COMPLIANCE (ISO 27001/27002)
HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL
HEALTH ACT
LAW ON THE PROTECTION OF PERSONAL DATA HELD BY PRIVATE PARTIES
CHAPTER 7 PATENT ANALYSIS
TABLE 42 LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (NUMBER)
FIGURE 5 LEADING PATENT HOLDERS IN THE NETWORK SECURITY MARKET (%)
TABLE 43 NUMBER OF PATENTS BY TECHNOLOGIES AND SUB-TECHNOLOGIES
CHAPTER 8 INTERNATIONAL
GEOGRAPHIC SEGMENTATION
TABLE 44 GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, THROUGH 2020 ($ MILLIONS)
FIGURE 6 GLOBAL MARKET FOR DATA CENTER SECURITY BY REGION, 2014-2020 ($ MILLIONS)
THE AMERICAS
TABLE 45 KEY U.S. GOVERNMENT DATA BREACHES
Key Growth Sectors in the U.S.
TABLE 46 AMERICAS MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
Government/Public Sector
Financial Services
Retail and e-Commerce
Healthcare
EUROPE, MIDDLE EAST AND AFRICA
TABLE 47 KEY EUROPEAN GOVERNMENT DATA BREACHES, 2014 AND 2015
TABLE 48 EMEA MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
Key Growth Sectors in the U.K.
Healthcare
Government
Key Growth Sectors in Germany
Key Growth Sectors and Technologies in Switzerland
Key Growth Sectors in the Nordic region
KEY GROWTH SECTORS AND TECHNOLOGIES IN THE MIDDLE EAST
Oil and Gas
Government/Public Sector
Financial Services
ASIA-PACIFIC
TABLE 49 ASIA-PACIFIC MARKET FOR DATA CENTER SECURITY BY INDUSTRY, THROUGH 2020 ($ MILLIONS)
Key Growth Sectors in India
Financial Services
Government Sector
Key Growth Sectors in South Korea
Government Sector
CHAPTER 9 VENDOR PROFILES
KEY PLAYERS IN THE DATA CENTER SECURITY MARKET AND THE COMPETITIVE SCENARIO
CISCO
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
CHECK POINT SOFTWARE TECHNOLOGIES
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
DELL
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
FORTINET
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
IBM
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
MCAFEE
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
JUNIPER NETWORKS
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
SYMANTEC
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
A10 NETWORKS
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
ALLOT COMMUNICATIONS
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
ARBOR NETWORKS
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
CORERO NETWORK SECURITY
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
F5 NETWORKS
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
FIREEYE
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
IMPERVA
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
KASPERSKY
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
PALO ALTO NETWORKS
Business Overview
Key Data Center and Related Solutions
Strengths
Weaknesses
TREND MICRO
Business Overview
Key Data Center and Related Solutions
Key Clients in the Data Center Security Space
Strengths
Weaknesses
VARMOUR
Business Overview
Strengths
Weaknesses
CHAPTER 10 COMPANY PROFILES
OTHER PARTICIPANTS IN THE DATA CENTER SECURITY MARKET
A10 NETWORKS
ABB
AKAMAI TECHNOLOGIES INC.
ALLOT COMMUNICATIONS
ANDRISOFT
ARBOR NETWORKS
AT&T
BIT9
BLACK LOTUS
BLOCKDOS
BMC SOFTWARE
BROCADE COMMUNICATIONS SYSTEMS INC.
CHECK POINT SOFTWARE TECHNOLOGIES
CISCO
CLEVERSAFE INC.
CLOUDFLARE
COMMVAULT SYSTEMS INC.
CORERO NETWORK SECURITY
CORESITE
CYBEROAM
DELL INC.
DIGITAL REALTY
DOSARREST INTERNET SECURITY
EMC
EQUINIX
ESOLUTIONS GROUP
EXPEDIENT
EXTREME NETWORKS
F5 NETWORKS INC.
FIREEYE
FOGO DATA CENTERS
FORTINET INC.
GLOBAL SWITCH
HEWLETT-PACKARD
HITACHI DATA SYSTEMS
IBM
IMPERVA
INTEL
INTEROUTE
IXIA
JUNIPER NETWORKS
KASPERSKY LAB
LEVEL 3 COMMUNICATIONS
LIMELIGHT NETWORKS
NARUS
NETAPP
NETCETERA
NEUSTAR
NTT
NUTANIX
ORACLE
PALO ALTO NETWORKS
PROLEXIC TECHNOLOGIES
RACKSPACE
RADWARE
SAFENET
SCHNEIDER ELECTRIC
SIX DEGREES GROUP
STAMINUS
STRATOSCALE
SUNGARD AVAILABILITY SERVICES
SYMANTEC
TELECITY GROUP
TREND MICRO
VARMOUR
VERISIGN INC.
VMWARE
CHAPTER 11 APPENDIX ABBREVIATIONS

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report