This report analyzes the Japan IT security market and provides market forecasts for the period from 2017 to 2021. Cyberattacks that cross national borders are becoming more sophisticated. These include zero-day attacks that target unknown vulnerabilities and attacks that use polymorphic malware that employs algorithms that use available encryption keys to create encrypted self-copies that change with each infection. With these more sophisticated cyberattacks, it is difficult to completely prevent security violations, but even if they occur, users need to quickly detect and respond to these security violations. Therefore, there will be demand for analysis of data logs and threat data from security devices and other sources and for building of threat intelligence algorithms that compile data made available for security threat prediction/foresight and advanced threat defense systems. However, it is difficult for user companies to build threat intelligence algorithms by themselves."Security product suppliers and service providers should promote products and services such as threat intelligence data feed services and threat intelligence sharing platforms. By employing threat intelligence algorithms that are built using threat intelligence sharing platforms, user companies can detect critical security threats in their early stages, thereby mitigating risks. Furthermore, by sharing threat intelligence data among their group companies, user companies will be able to mitigate security risks within the group and enhance their responses to supply chain risks," states Tsuneo Tosaka, software and security research manager, IDC Japan.
Please Note: Extended description available upon request.