Cybersecurity - Thematic Research

Cybersecurity - Thematic Research

Summary

Today, organizations are plagued by cyberattacks that are advanced, persistent, and which can wreck both operations and reputation.

Companies manage an array of assets, including infrastructure, applications, managed and unmanaged endpoints, mobile devices, and cloud services, all of which can be attacked. Attack types include phishing (the most popular) and ransomware (becoming the most lucrative).

The need for security, along with the idea that innovation is critical to counter the evolving threat landscape, will drive cybersecurity spending despite COVID-19’s economic impact. Companies worldwide are expected to spend $115bn on security in 2020, according to GlobalData figures. The global security industry will be worth nearly $238bn by 2030, having grown at a compound annual growth rate (CAGR) of 6.4% between 2019 and 2030.

Scope

  • This report provides an overview of the cybersecurity theme.
  • It identifies the key trends impacting growth of the theme over the next 12 to 24 months, split into three categories: technology trends, macroeconomic trends, and regulatory trends.
  • It includes a comprehensive industry analysis, including up-to-date forecasts for global security revenues to 2030.
  • The value chain breaks down the cybersecurity organizational stack and identifies the leading vendors across 22 technology segments, including cloud security, network security, mobile security, and managed security services.
Reasons to Buy
  • We are currently in the third wave of the cybersecurity industry, and it is the most challenging in terms of technology and scale. The enterprise attack surface, already massive, is growing rapidly with the forced move to greater remote working in 2020.
  • To counter this, cyber-aware organizations must adopt cybersecurity measures that allow them to be resilient, vigilant, and secure, that keep their employees and partners identified and trusted, and allow the organization to remain risk-aware. In general, organizations fail to understand the landscape they are trying to defend. Consequently, defensive decisions aren’t taken, and actions are not prioritized, leaving enterprises open to compromise.
  • This report is an invaluable guide to the cybersecurity theme, providing detailed analysis of the leading vendors and insights how companies can tackle the threats they face.


  • Introduction
    • Cybersecurity is an unrelenting battle
    • Artificial intelligence-based tools are becoming indispensable
    • Greater challenges will drive greater investment
    • Winners and losers
  • Players
    • Table Figure 1: Who are the big players in the cybersecurity industry and where do they sit in the value chain?
  • Technology briefing
    • Table Figure 2: CSPM tools enable organizations to identify and remediate cloud security risks
    • Table Figure 3: DevSecOps introduces security earlier in the lifecycle of application development
  • Trends
    • Technology trends
      • Table Technology Trends
    • Macroeconomic trends
      • Table Macroeconomic trends
    • Regulatory trends
      • Table Regulatory Trends
  • Industry analysis
    • The third wave of cybersecurity
      • A need for vigilance and resilience
      • Predictive risk assessments
    • Market size and growth forecasts
      • Table Figure 4: By 2030, Global Security Revenues will have Reached Nearly $238bn
    • AI technologies are changing cybersecurity
      • Table AI Technologies are Changing Cybersecurity
      • Moving towards the edge
    • Understanding the malware threat
      • The rise and rise of ransomware
      • The organizational cost of an insider threat
      • Operational technology and critical national infrastructure attacks
      • The need to secure remote workers post COVID-19
      • Cybercrime isa global affair
        • Table Top 10 Global Attackers by Country of Origin
      • Solving the cyber skills shortage
    • Mergers and acquisitions
      • Table M&A transactions associated with the cybersecurity theme since January 2018
    • Venture funding for cybersecurity companies
      • Table Funding Rounds for Cybersecurity Companies Since June 2019
    • Timeline
      • Table Figure 5: The cybersecurity story
  • Value chain
    • Table Figure 6: The cybersecurity value chain
    • The cyber-aware organization
      • Table Figure 7: The cyber-aware organization
    • The cybersecurity organizational stack
    • The cybersecurity technology stack
      • Incident response
        • Table Figure 8: Leaders and challengers in incident response
      • Security orchestration, automation, and response (SOAR)
        • Table Figure 9: Leaders and challengers in security orchestration, automation, and response
      • Security information and event management (SIEM)
        • Table Figure 10: Leaders and challengers in security information and event management
      • Threat management, intelligence, and hunting
        • Table Figure 11: Leaders and challengers in threat management, intelligence, and hunting
      • Unified threat management
        • Table Figure 12: Leaders and challengers in unified threat management
      • Behavioral analytics
        • Table Figure 13: Leaders and challengers in behavioral analytics
      • Cloud security
        • Table Figure 14: Leaders and challengers in cloud security
      • Email security
        • Table Figure 15: Leaders and challengers in email security
      • Network security
        • Table Figure 16: Leaders and challengers in network security
      • Application security
        • Table Figure 17: Leaders and challengers in application security
      • DevSecOps
        • Table Figure 18: Leaders and challengers in DevSecOps
      • Mobile security
        • Table Figure 19: Leaders and challengers in mobile security
      • Endpoint security tools
        • Table Figure 20: Leaders and challengers in endpoint security tools
      • IoT security
        • Table Figure 21: Leaders and challengers in IoT security
      • Single sign-on and access management
        • Table Figure 22: Leaders and challengers in single sign-on and access management
      • Adaptive authentication and authorization
        • Table Figure 23: Leaders and challengers in adaptive authentication and authorization
      • Identity and access management
        • Table Figure 24: Leaders and challengers in identity and access management
      • Vulnerability management
        • Table Figure 25: Leaders and challengers in vulnerability management
      • Privileged access management
        • Table Figure 26: Leaders and challengers in privileged access management
      • Data loss prevention
        • Table Figure 27: Leaders and challengers in data loss prevention
      • Managed security services
        • Table Figure 28: Leaders and challengers in managed security services
      • Post-breach response services
        • Table Figure 29: Leaders and challengers in post-breach response services
  • Companies
    • Public companies
      • Table Competitive Position in the Cybersecurity - Public Companies
    • Private companies
      • Table Competitive Position in the Cybersecurity – Private Companies
  • Sector scorecards
    • Enterprise security sector scorecard
      • Who's who
        • Table Figure 30: Who does what in the enterprise security space?
      • Thematic screen
        • Table Figure 31: Enterprise Security - The thematic screen ranks companies on the basis of overall leadership in the 10themes that matter most to their industry, generating a leading indicator of future performance.
      • Valuation screen
        • Table Figure 32: Enterprise Security - Our valuation screen ranks our universe of companies within a sector based on selected valuation metrics.
      • Risk screen
        • Table Figure 33: Enterprise Security - Our risk screen ranks companies within a particular sector on the basis of overall investment risk.
    • IT services sector scorecard
      • Who's who
        • Table Figure 34: Who does what in the IT services space?
      • Thematic screen
        • Table Figure 35: IT Services - The thematic screen ranks companies on the basis of overall leadership in the 10themes that matter most to their industry, generating a leading indicator of future performance.
      • Valuation screen
        • Table Figure 36: IT Services - Our valuation screen ranks our universe of companies within a sector based on selected valuation metrics.
      • Risk screen
        • Table Figure 37: IT Services - Our risk screen ranks companies within a particular sector on the basis of overall investment risk.
  • Glossary
    • Table Glossary
  • Further reading
    • GlobalData reports
  • Appendix: Our thematic research methodology
    • Viewing the world's data by themes makes it easier to make important decisions
    • Traditional research does a poor job of picking winners and losers
    • That is why we developed our "thematic engine"
    • How do we create our sector scorecards?
      • Table Figure 38: Our five-step approach for generating a sector scorecard
    • What is in our sector scorecards?
    • How do we score companies in our thematic screen?
    • How our research reports fit into our overall thematic research ecosystem
    • About GlobalData
    • Contact us
    • Research
    • Client Services
    • Disclaimer

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook