Welcome!

Mobile IoT Authors: Pat Romanski, Jonathan Fries, Liz McMillan, Elizabeth White, Sematext Blog

News Feed Item

'Global Cyber Security Market to be Worth $68.34bn in 2013' Says Visiongain Report

LONDON, January 8, 2013 /PRNewswire/ --

Visiongain's analysis indicates that the global cyber security market is set to be worth $68.34bn in 2013, as exceedingly high-demand continues for information security systems across governments, global militaries, and the private sector.

The visiongain author of the Global Cyber Security Market 2013-2023 report comments that: 'Cyber security is one of the strongest growth markets in the defence & security industry at present. It is important to emphasise that, uniquely, the playing field is currently very level internationally (in terms of capability); and this is almost certain to provide a major stimulus to spending in years to come, as threats evolve and militaries place increased emphasis on modernised, network-centric warfare. Moreover, the cyber security market transcends traditional defence expenditure: the private sector remains very insecure in regard to the cyber threat and the increase importance of safeguarding intellectual property is certain to ensure that higher spending is necessary across all areas of industry and commerce. Lastly, the threat to national infrastructure cannot be discounted as a major area of spending. Taken altogether, cyber security represents a major growth market which will reward both vendors and purchasers.'

The Global Cyber Security Market 2013-2023 report has 348 pages and contains 222 tables, charts and graphs that illustrate and clarify trends and market projections within the cyber security market. Visiongain provides a range of forecasts for the period 2013-2023, as well as for 4 market sectors (government, military, critical infrastructure, and private sector) of the cyber security market. In addition, the 13 leading national cyber security systems markets are forecast and analysed by visiongain over the period 2013-2023 as well as 'Rest of the World' market. Furthermore, there are seven submarkets: network security, security operations, data security, identity and access, endpoint security, application security, and cloud security. The report also provides profiles of 17 leading companies operating within the market, including 6 interviews with Lockheed Martin Corporation, IBM Corporation, QinetiQ, Tempest Security Intelligence, Lacoon Mobile Security and ISC8 Inc.

The Global Cyber Security Market 2013-2023 report will be of impressive value to current, and future, investors into the cyber security industry, as well as to companies and research centres who wish to broaden their knowledge of the cyber security market. The report includes an extended (and critical) focus on national cyber security policies, and the comparison with other states is likely to be of interest to government agencies.

For further information concerning the visiongain's the Global Cyber Security Market 2013-2023 report please visit http://www.visiongain.com/Report/951/Global-Cyber-Security-Market-2013-2023

Companies Listed

ACS
Advanced C4 Systems Inc.
Advanced Micro Devices
Airbus
ALEX-AS, J.V.
Anagran
Apple
Applied Visions, Inc
ArcSight
ARINC
Assured Information Security, Inc
Astrium
AT&T
ATR
AVAST Software
AVG Technologies
BAE Systems
BAE Systems Australia
BAE Systems Detica
BAE Systems Electronic Systems (ES)
BAE Systems India
BAE Systems Land & Armaments (L&A)
BAE Systems Maritime
BAE Systems Military Air & Information (MA&I)
BAE Systems Regional Aircraft
BAE Systems Saudi Arabia
BAE Systems Shared Services
BAE Systems Support Solutions
Blue Screen IT Ltd
Boeing Defense, Space and Security
Boeing Information Solutions
Boeing Network & Space Systems
Bombardier
Booz Allen Hamilton Inc.
BreakingPoint Systems
British Gas
British Telecom (BT)
Business Computers Management Consulting Group, LLC
Business Integra Technology Solutions, Inc.
CACI, Inc.
Camber Corporation
Cassidian CyberSecurity
China Telecom
Cisco Systems, Inc.
CloudShield Technologies, Inc.
Columbia University
Computer Science Corporation
Corero Network Security
Creative Computing Solutions
CrySyS Lab
Cubic XD
Danaher Corporation
Defense Systems Engineering & Support
Def-Logix
Dell Corporation
Detica Group plc
Detica NetReveal
Dynamic Network Enterprises, Inc.
EADS Cassidian
EADS Group
El Al Israel Airlines Ltd
EMC Corporation
EmeSec Inc.
ETI
Eurocopter
Exelis, Inc.
Experian
Finmeccanica
Foreground Security
Fortify Software
F-Secure Corporation
Fujitsu
Galois
General Dynamics Advanced Information Systems
General Dynamics Corporation
Georgia Tech Research Corp
Global Info Tek, Inc.
Google
Group-IB
Gulfstream
Harris Corporation
Harris Government Communications Systems
Harris Integrated Network Solutions
Henggeler Computer Consultants, Inc.
Hewlett Packard Corporation (HP)
HighAction, LLC
Honeywell, Inc.
HP Enterprise Business
HP Mobility Global Business
HP Software
HRL Laboratories, LLC
Huawei Technologies Ltd
i2
IBM Global Business Services (GBS)
IBM Global Financing
IBM Global Technology Services (GTS)
IBM Integrated Supply Chain (ISC)
IBM Research
IBM Software
ICL
IHI Corporation
Imagine One StraCon Venture, LLC
In-Q-Tel
Intel Corporation
IBM Corporation
International Computer Science Institute
ISC8, Inc.
ISHPI Information Technologies, Inc.
ITT Advanced Engineering & Sciences Division
Ivincea
Jupiter Networks
Kaspersky Labs
Kawasaki Heavy Industries
Kestrel Technology, LLC
KEYW
Kratos Defense & Security Solutions, Inc.
KT Corporation
L-3 Communications
L-3 Services, Inc.
L-3 STRATIS
Lacoon Mobile Security
LETA Group
LGS Innovations
LiveOffice
Lockheed Martin Aeronautics
Lockheed Martin Corporation
Lockheed Martin Electronic Systems (ES)
Lockheed Martin Information Systems & Global Solutions (IS&GS)
Lockheed Martin Space Systems
Lockheed Martin's Information Systems & Global Solutions Division
M5 Network Security Pty Ltd
MacAuley-Brown
ManTech International Corporation
MasterCard
McAfee Inc.
MEI Technologies
Merit Network Inc
MHI
Microsoft Corporation
Mitsubishi Heavy Industries
National Agricultural Cooperatives Federation (Nonghyup)
NetApp, Inc.
Netasq
NetWitness Corporation
Network Security Systems Plus, Inc.
New York Times
Northrop Grumman Corporation
Northrop Grumman Information Systems
Norton
Nukona
Nutrisystem, Inc.
Oculis Labs
Odyssey Software
Pikewerks Corporation
Q1 Labs
Qinetiq Group Plc
QinetiQ North America
Radiance Technologies, Inc.
Raytheon BBN Technologies
Raytheon Company
Raytheon Company Cyber Security Solutions
Raytheon Company Intelligence & Information Systems
RLM Communications, Inc.
Rockwell Collins
RSA
Safenet
SAIC Defense Solutions Group (DSG)
SAIC Health, Energy and Civil Solutions Group (HECSG)
SAIC Intelligence, Surveillance, and Reconnaissance Group (ISRG)
SAIC, Inc.
Salient Federal Solutions (SFS)
Schneider Electric
Sentek Consulting, Inc.
Serco
Skolkovo Foundation
Skype
SMSi
Sojitz Corporation
Sony7
Sotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. )
Sparta Inc.
Spirent Communications
SRA International, Inc.
Stratavia
Strategic Operational Solutions, Inc.
stratsec.net
Sukhoi
Symantec Corporation
Symantec Corporation Consumer Business
Symantec Corporation Enterprise Products and Services
Symantec Corporation Enterprise Security
Symantec Corporation Information Management
Symantec Corporation SMB and Symantec.cloud
Taia Global, Inc.
Telecommunications Systems Inc (TCS)
Teligy
Tempest Security Intelligence
Thales Aerospace
Thales Alenia Space
Thales Communications & Security (C&S)
Thales Defence
Thales Group
The Boeing Company
The Economist
The Guardian
The Washington Post
TISTA Science and Technology Corp
Trustwave
Verizon Communications, Inc.
Vertica Systems
VMWare, Inc.
WIJET, LLC
YouTube
ZTE Corporation

Notes for Editors

If you are interested in a more detailed overview of this report, please send an e-mail to [email protected] or call her on +44(0)207-336-6100

About visiongain

Visiongain is one of the fastest growing and most innovative independent media companies in Europe. Based in London, UK, visiongain produces a host of business-2-business conferences, newsletters, management reports and e-zines focusing on the Energy, Telecoms, Pharmaceutical, Defence, Materials sectors.

Visiongain publishes reports produced by its in-house analysts, who are qualified experts in their field. Visiongain has firmly established itself as the first port-of-call for the business professional, who needs independent, high quality, original material

Contact:

Email: Sara Peerun on [email protected]
Tel: +44(0)20-7336-6100

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...