ȸ¿ø°¡ÀÔ | ¿¬¶ôó | »çÀÌÆ®¸Ê | English

      È¸»ç¼Ò°³ | ¸®Æ÷Æ® | Ä¿½ºÅÒ ¸®¼­Ä¡ | °í°´Áö¿ø


·Î±×ÀÎ

Ä«Å×°í¸®

À¯/¹«¼±Åë½Å

Àü±â/ÀüÀÚ

µðÁöÅбâ±â/¹Ìµð¾î/¹æ¼Û

Information Technology

¿¡³ÊÁö

»ý¸í°øÇÐ

È­ÇÐ/½Å¼ÒÀç

ÀÚµ¿Â÷

ȯ°æ

ÀϹݼҺñÀç

¸¶ÄÉÆÃ/±¤°í

±ÝÀ¶

°Ç¼³

±³Åë/¿î¼Û

¼ÒºñÀÚÁ¶»ç

¹æÀ§/Ç×°ø/¿ìÁÖ

½ÄÀ½·á

Áß°ø¾÷

±³À°

±â°è

¹«¿ª

½ºÆ÷Ã÷/·¹Àú

ÇØ¿î/Á¶¼±

ÆмÇ

Á¤ºÎ/Á¤Ã¥

°ø¿¹/±Í±Ý¼Ó

ÄÄÆÛ´Ï ÇÁ·ÎÆÄÀÏ

±âŸ»ê¾÷

 
ÇöÀçÀ§Ä¡ : HOME > ¸®Æ÷Æ® > À¯/¹«¼±Åë½Å > Â÷¼¼´ëÅë½Å
Internet of Things (IoT) Security Market by Technologies (Network, Cloud and Application Security, Identity Access Management, Analytics, UTM, IDS/IPS, Device Management, Encryption), Industry Verticals and Applications - Global Forecast to 2020 
¹ßÇà»ç MarketsandMarkets

¹ßÇàÀÏ 2016-07-01
ºÐ·® 175 pages
¼­ºñ½ºÇüÅ Report
ÆǸŰ¡°Ý

ÀμâÇϱâ

Table of Contents

1 Introduction (Page No. - 17)
1.1 Objectives of the Report
1.2 Market Definition
1.3 Market Scope
1.3.1 Markets Covered
1.3.2 Years Considered in the Report
1.4 Currency
1.5 Limitations
1.6 Stakeholders

2 Research Methodology (Page No. - 20)
2.1 Introduction
2.1.1 Secondary Data
2.1.1.1 Key Data From Secondary Sources
2.1.2 Primary Data
2.1.2.1 Key Data From Primary Sources
2.1.2.2 Key Industry Insights
2.1.2.3 Breakdown of Primaries
2.2 Market Size Estimation
2.2.1 Bottom-Up Approach
2.2.2 Top-Down Approach
2.3 Market Breakdown and Data Triangulation
2.4 Research Assumptions and Limitations

3 Executive Summary (Page No. - 30)

4 Premium Insights (Page No. - 34)
4.1 Attractive Market Opportunities in the IoT Security Market
4.2 IoT Security Overall Market 2016 vs 2021
4.3 Market, By Type, 2016-2021
4.4 Market, Regions vs Verticals, 2016–2021
4.5 Lifecycle Analysis, By Region
4.6 Market Investment Scenario

5 IoT Security Market Overview (Page No. - 39)
5.1 Introduction
5.2 Market Segmentation
5.2.1 By Type
5.2.2 By Solution
5.2.3 By Service
5.2.4 By Application
5.2.5 By Vertical
5.2.6 By Region
5.3 Market Dynamics
5.3.1 Drivers
5.3.1.1 Growing Security Concerns for Critical Infrastructure
5.3.1.2 Need to Adhere to Regulatory Compliances
5.3.1.3 Growth of Social Media
5.3.1.4 Diversified IoT Reach
5.3.2 Restraints
5.3.2.1 Lack of Technical Knowhow About Non-Traditional Infrastructure
5.3.2.2 Lack of Awareness About Internal Threats
5.3.3 Opportunities
5.3.3.1 Benefits of Cloud Security
5.3.3.2 Need for Integrated Security Solutions
5.3.4 Challenges
5.3.4.1 Low Budget and Strategic Implications
5.4 Regulatory Implications
5.4.1 ISO Standards
5.4.2 ISO / Iec Jtc 1
5.4.2.1 ISO / I EC J TC 1 / SWG 5
5.4.2.2 ISO / I EC J TC 1 / SC 31
5.4.2.3 ISO / I EC J TC 1 / SC 27
5.4.2.4 ISO / I EC J TC 1 / Wg 7 Sensors
5.4.3 IEEE
5.4.4 CEN / ISO
5.4.5 CEN/CENelec
5.4.6 ETSI
5.4.7 ITU-T

6 IoT Security Market: Industry Trends (Page No. - 49)
6.1 Introduction
6.2 Value Chain Analysis
6.3 Strategic Benchmarking

7 IoT Security Market: Analysis, By Type (Page No. - 51)
7.1 Introduction
7.2 Network Security
7.3 Endpoint Security
7.4 Application Security
7.5 Cloud Security
7.6 Others

8 IoT Security Market: Analysis, By Solution (Page No. - 58)
8.1 Introduction
8.2 Identity Access Management
8.3 Threat Intelligence
8.4 Encryption
8.5 Unified Threat Management
8.6 Data Loss Protection
8.7 Intrusion Detection/Prevention System
8.8 Distributed Denial of Service Protection
8.9 Network Forensics
8.10 Device Management
8.11 Others

9 IoT Security Market: Analysis, By Service (Page No. - 70)
9.1 Introduction
9.2 Professional Services
9.3 Managed Services

10 IoT Security Market: Analysis, By Application (Page No. - 75)
10.1 Introduction
10.2 Wearables
10.3 Building and Home Automation
10.4 Supply Chain Management
10.5 Patient Information Management
10.6 Energy and Utilities Management
10.7 Customer Information Security
10.8 Asset Optimization
10.9 Manufacturing Process Management
10.10 Communication Technology Management
10.11 Telematics
10.12 Others

11 IoT Security Market: Analysis, By Vertical (Page No. - 88)
11.1 Introduction
11.2 Banking, Financial Services and Insurance (BFSI)
11.3 Retail
11.4 Manufacturing
11.5 Healthcare
11.6 Transportation and Logistics
11.7 Government and Defense
11.8 Energy and Utilities
11.9 Telecom and It
11.10 Others

12 Geographic Analysis (Page No. - 99)
12.1 Introduction
12.2 North America
12.3 Europe
12.4 Asia-Pacific (APAC)
12.5 Middle East and Africa (MEA)
12.6 Latin America

13 Competitive Landscape (Page No. - 130)
13.1 Overview
13.2 Portfolio Comparision
13.3 Competitive Situation and Trends
13.4 New Product Launches
13.5 Partnerships, Agreements, and Collaborations
13.6 Mergers and Acquisitions
13.7 Business Expansion

14 Company Profiles (Page No. - 137)
14.1 Introduction
14.2 Geographic Revenue Mix
14.3 Cisco Systems, Inc.
14.3.1 Business Overview
14.3.2 Products, Solutions and Services Offered
14.3.3 Recent Developments
14.3.4 MnM View
14.3.4.1 Key Strategies
14.3.4.2 SWOT Analysis
14.4 IBM Corporation
14.4.1 Business Overview
14.4.2 Solutions and Services Offered
14.4.3 Recent Developments
14.4.4 MnM View
14.4.4.1 Key Strategies
14.4.4.2 SWOT Analysis
14.5 Infineon Technologies
14.5.1 Business Overview
14.5.2 Products/Solutions and Services Offered
14.5.3 Recent Developments
14.5.4 MnM View
14.5.4.1 Key Strategies
14.5.4.2 SWOT Analysis
14.6 Intel Corporation
14.6.1 Business Overview
14.6.2 Products/Solutions and Services Offered
14.6.3 Recent Developments
14.6.4 MnM View
14.6.4.1 Key Strategies
14.6.4.2 SWOT Analysis
14.7 Symantec Corporation
14.7.1 Business Overview
14.7.2 Products/Solutions and Services Offered
14.7.3 Recent Developments
14.7.4 MnM View
14.7.4.1 Key Strategies
14.7.4.2 SWOT Analysis
14.8 ARM Holdings PLC.
14.8.1 Business Overview
14.8.2 Products/Solutions and Services Offered
14.8.3 Recent Developments
14.9 NXP Semiconductors
14.9.1 Business Overview
14.9.2 Products/Solutions and Services Offered
14.9.3 Recent Developments
14.10 Checkpoint Software Technologies Ltd.
14.10.1 Business Overview
14.10.2 Solutions and Services Offered
14.10.3 Recent Developments
14.11 Trend Micro Inc.
14.11.1 Business Overview
14.11.2 Solutions and Services Offered
14.11.3 Recent Developments
14.12 PTC, Inc.
14.12.1 Business Overview
14.12.2 Solutions and Services Offered
14.12.3 Recent Developments
14.13 Gemalto NV
14.13.1 Business Overview
14.13.2 Solutions and Services Offered
14.13.3 Recent Developments
14.14 Sophos Group PLC
14.14.1 Business Overview
14.14.2 Solutions and Services Offered
14.14.3 Recent Developments
14.15 Inside Secure
14.15.1 Business Overview
14.15.2 Products/Solutions and Services Offered
14.15.3 Recent Developments
14.16 Wurldtech Security Technologies Inc.
14.16.1 Business Overview
14.16.2 Products/Solutions Offered
14.16.3 Recent Developments

15 Appendix (Page No. - 175)
15.1 Insight of Industry Experts
15.2 Discussion Guide
15.3 Introducing RT: Real-Time Market Intelligence
15.4 Available Customizations
15.5 Related Reports


List of Tables (81 Tables)

Table 1 IoT Security Components Market Size and Growth, 2014–2021 (USD Billion)
Table 2 IoT Security Market Size, By Type, 2014–2021 (USD Million)
Table 3 Network Security: Market Size, By Region, 2014–2021 (USD Million)
Table 4 Endpoint Security: Market Size, By Region, 2014–2021 (USD Million)
Table 5 Application Security: Market Size, By Region, 2014–2021 (USD Million)
Table 6 Cloud Security: Market Size, By Region, 2014–2021 (USD Million)
Table 7 Content Security: Market Size, By Region, 2014–2021 (USD Million)
Table 8 IoT Security Market Size, By Solution, 2014–2021 (USD Million)
Table 9 IoT Security Solution Market Size, By Region, 2014–2021 (USD Million)
Table 10 Identity Access Management: Market Size, By Region, 2014–2021 (USD Million)
Table 11 Threat Intelligence: Market Size, By Region, 2014–2021 (USD Million)
Table 12 Encryption: Market Size, By Region, 2014–2021 (USD Million)
Table 13 Unified Threat Management: Market Size, By Region, 2014–2021 (USD Million)
Table 14 Data Loss Protection: Market Size, By Region, 2014–2021 (USD Million)
Table 15 IDS/IPS: Market Size, By Region, 2014–2021 (USD Million)
Table 16 Distributed Denial of Service Protection: Market Size, By Region, 2014–2021 (USD Million)
Table 17 Network Forensics: Market Size, By Region, 2014–2021 (USD Million)
Table 18 Device Management: Market Size, By Region, 2014–2021 (USD Million)
Table 19 Others: Market Size, By Region, 2014–2021 (USD Million)
Table 20 IoT Security Market Size, By Service, 2014-2021 (USD Million)
Table 21 IoT Security Services Market Size, By Region, 2014–2021 (USD Million)
Table 22 Professional Services: Market Size, By Region, 2014–2021 (USD Million)
Table 23 Managed Services: Market Size, By Region, 2014–2021 (USD Million)
Table 24 IoT Security Market Size, By Application, 2014–2021 (USD Million)
Table 25 Wearables: Market Size, By Region, 2014–2021 (USD Million)
Table 26 Building and Home Automation: Market Size, By Region, 2014–2021 (USD Million)
Table 27 Supply Chain Management: Market Size, By Region, 2014–2021 (USD Million)
Table 28 Patient Information Management: Market Size, By Region, 2014–2021 (USD Million)
Table 29 Energy and Utilities Management: Market Size, By Region, 2014–2021 (USD Million)
Table 30 Customer Information Security: Market Size, By Region, 2014–2021 (USD Million)
Table 31 Asset Optimization: IoT Security Market Size, By Region, 2014–2021 (USD Million)
Table 32 Manufacturing Process Management: Market Size, By Region, 2014–2021 (USD Million)
Table 33 Communication Technology Management: Market Size, By Region, 2014–2021 (USD Million)
Table 34 Telematics: Market Size, By Region, 2014–2021 (USD Million)
Table 35 Others: Market Size, By Region, 2014–2021 (USD Million)
Table 36 IoT Security Market Size, By Vertical, 2014-2021 (USD Million)
Table 37 Banking, Financial Services and Insurance: Market Size, By Region, 2014–2021 (USD Million)
Table 38 Retail: Market Size, By Region, 2014–2021 (USD Million)
Table 39 Manufacturing: Market Size, By Region, 2014–2021 (USD Million)
Table 40 Healthcare: Market Size, By Region, 2014–2021 (USD Million)
Table 41 Transportation and Logistics: Market Size, By Region, 2014–2021 (USD Million)
Table 42 Government and Defense: Market Size, By Region, 2014–2021 (USD Million)
Table 43 Energy and Utilities: Market Size, By Region, 2014–2021 (USD Million)
Table 44 Telecom and It: Market Size, By Region, 2014–2021 (USD Million)
Table 45 Others: Market Size, By Region, 2014–2021 (USD Million)
Table 46 IoT Security Market Size, By Region, 2014–2021 (USD Million)
Table 47 North America: Market Size, By Type, 2014–2021 (USD Million)
Table 48 North America: Market Size, By Component, 2014–2021 (USD Million)
Table 49 North America: Market Size, By Solution, 2014–2021 (USD Million)
Table 50 North America: Market Size, By Service, 2014–2021 (USD Million)
Table 51 North America: Market Size, By Application, 2014–2021 (USD Million)
Table 52 North America: Market Size, By Vertical, 2014–2021 (USD Million)
Table 53 Europe: IoT Security Market Size, By Type, 2014–2021 (USD Million)
Table 54 Europe: Market Size, By Component, 2014–2021 (USD Million)
Table 55 Europe: Market Size, By Solution, 2014–2021 (USD Million)
Table 56 Europe: Market Size, By Service, 2014–2021 (USD Million)
Table 57 Europe: Market Size, By Application, 2014–2021 (USD Million)
Table 58 Europe: Market Size, By Vertical, 2014–2021 (USD Million)
Table 59 Asia-Pacific: IoT Security Market Size, By Type, 2014–2021 (USD Million)
Table 60 Asia-Pacific: Market Size, By Component, 2014–2021 (USD Million)
Table 61 Asia-Pacific: Market Size, By Solution, 2014–2021 (USD Million)
Table 62 Asia-Pacific: Market Size, By Service, 2014–2021 (USD Million)
Table 63 Asia-Pacific: Market Size, By Application, 2014–2021 (USD Million)
Table 64 Asia-Pacific: Market Size, By Type, 2014–2021 (USD Million)
Table 65 Asia-Pacific: Market Size, By Vertical, 2014–2021 (USD Million)
Table 66 Middle East and Africa: IoT Security Market Size, By Type, 2014–2021 (USD Million)
Table 67 Middle East and Africa: Market Size, By Component, 2014–2021 (USD Million)
Table 68 Middle East and Africa: Market Size, By Solution, 2014–2021 (USD Million)
Table 69 Middle East and Africa: Market Size, By Service, 2014–2021 (USD Million)
Table 70 Middle East and Africa: Market Size, By Application, 2014–2021 (USD Million)
Table 71 Middle East and Africa: Market Size, By Vertical, 2014–2021 (USD Million)
Table 72 Latin America: IoT Security Market Size, By Component, 2014–2021 (USD Million)
Table 73 Latin America: Market Size, By Solution, 2014–2021 (USD Million)
Table 74 Latin America: Market Size, By Service, 2014–2021 (USD Million)
Table 75 Latin America: Market Size, By Application, 2014–2021 (USD Million)
Table 76 Latin America: Market Size, By Type, 2014–2021 (USD Million)
Table 77 Latin America: Market Size, By Vertical, 2014–2021 (USD Million)
Table 78 New Product Launches, 2014–2016
Table 79 Partnerships, Agreements, and Collaborations, 2014–2016
Table 80 Mergers and Acquisitions, 2014–2016
Table 81 Business Expansion, 2014–2016


List of Figures (56 Figures)

Figure 1 Global IoT Security Market: Research Design
Figure 2 Market Size Estimation Methodology: Bottom-Up Approach
Figure 3 Market Size Estimation Methodology: Top-Down Approach
Figure 4 Market Breakdown and Data Triangulation
Figure 5 Assumptions
Figure 6 Limitations
Figure 7 IoT Security Market Expected to Witness A High Growth During 2016–2021
Figure 8 Top Three Segments for the IoT Security Market in 2016–2021
Figure 9 North America is Expected to Hold the Largest Market Share in 2016
Figure 10 Regulatory Compliance is Driving the Market Towards Growth
Figure 11 Asia-Pacific is Expected to Witness the Highest Growth Rate During the Forecast Period
Figure 12 Cloud Security Market to Grow at the Highest Rate in the IoT Security Market
Figure 13 BFSI is Leading the IoT Security Service Market in Terms of Market Share in 2016
Figure 14 IoT Security Market Segmentation: By Type
Figure 15 Market Segmentation: By Solution
Figure 16 Market Segmentation: By Service
Figure 17 Market Segmentation: By Application
Figure 18 Market Segmentation: By Vertical
Figure 19 Market Segmentation: By Region
Figure 20 Market: Drivers, Restraints, Opportunities, and Challenges
Figure 21 IoT Security: Value Chain Analysis
Figure 22 Companies Adopt Different Strategies to Gain Competitive Advantage
Figure 23 Majority of the Market is Expected to Be Dominated By Network Security During the Forecast Period
Figure 24 IAM is Expected to Lead the IoT Security Solutions Market in Terms of Market Size During the Forecast Period
Figure 25 Majority of the Market is Expected to Be Dominated By Professional Services During the Forecast Period
Figure 26 Customer Information Security Holds the Maximum Opportunity for Growth During the Forecast Period
Figure 27 Majority of the Market is Expected to Be Dominated By BFSI During the Forecast Period
Figure 28 Asia-Pacific: an Attractive Destination for the IoT Security Market, 2016–2021
Figure 29 Asia-Pacific has the Highest Growth Rate From 2015 to 2020
Figure 30 Regional Snapshot: Asia-Pacific as A Hotspot During the Period 2016–2021
Figure 31 North America Market: Snapshot
Figure 32 Asia-Pacific Market: Snapshot
Figure 33 Companies Adopted Partnership, Agreement, and Collaboration as the Key Growth Strategy Between 2014 and 2016
Figure 34 IoT Security Market: Portfolio Comparison
Figure 35 Market Evaluation Framework
Figure 36 Battle for Market Share: New Product Launch Was the Key Strategy Adopted By Companies in the IoT Security Market Between 2014 and 2016
Figure 37 Geographic Revenue Mix of the Top 5 Market Players
Figure 38 Cisco Systems, Inc.: Company Snapshot
Figure 39 Cisco Systems, Inc.: SWOT Analysis
Figure 40 IBM Corporation: Company Snapshot
Figure 41 IBM Corporation: SWOT Analysis
Figure 42 Infineon Technologies: Company Snapshot
Figure 43 Infineon Technologies: SWOT Analysis
Figure 44 Intel Corporation: Company Snapshot
Figure 45 Intel Corporation: SWOT Analysis
Figure 46 Symantec Corporation: Company Snapshot
Figure 47 Symantec Corporation: SWOT Analysis
Figure 48 ARM Holdings PLC.: Company Snapshot
Figure 49 NXP Semiconductors: Company Snapshot
Figure 50 Checkpoint Software Technologies Ltd.: Company Snapshot
Figure 51 Trend Micro Inc.: Company Snapshot
Figure 52 PTC, Inc.: Company Snapshot
Figure 53 Gemalto NV: Company Snapshot
Figure 54 Sophos Group PLC: Company Snapshot
Figure 55 Inside Secure: Company Snapshot
Figure 56 Wurldtech Security Technologies Inc.: Company Snapshot


ȸ»ç¼Ò°³ | °³ÀÎÁ¤º¸º¸È£Á¤Ã¥ | ÀÌ¿ë¾à°ü | ¹è¼Û/°áÁ¦¾È³» | ÀÌ¿ë¾È³»

¼­¿ï½Ã °­³²±¸ ³íÇöµ¿ 210-1 »ï¿øºôµù | ȸ»ç¸í : (ÁÖ)¿¤¾Ø¿¡Ä¡
´ëÇ¥ÀüÈ­ : 02-554-0001 / Æѽº : 02-3444-5501 / À̸ÞÀÏ : sales@landh.co.kr
Copyright ¨Ï 2008 LNH, Inc. All rights reserved.