½ÃÀ庸°í¼­
»óǰÄÚµå
1540851

¼¼°èÀÇ º¸¾È ºÐ¼® ½ÃÀå º¸°í¼­ : ±¸¼º¿ä¼Ò, ¿ëµµ, µµÀÔ ÇüÅÂ, Á¶Á÷ ±Ô¸ð, »ê¾÷º°, Áö¿ªº°(2024-2032³â)

Security Analytics Market Report by Component, Application, Deployment Mode, Organization Size, Vertical, and Region 2024-2032

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IMARC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 150 Pages | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

¼¼°è º¸¾È ºÐ¼® ½ÃÀå ±Ô¸ð´Â 2023³â 54¾ï ´Þ·¯¿¡ ´ÞÇß½À´Ï´Ù. ÇâÈÄ IMARC ±×·ìÀº 2032³â±îÁö ½ÃÀå ±Ô¸ð°¡ 143¾ï ´Þ·¯¿¡ ´ÞÇϰí, 2024-2032³â°£ 11.2%ÀÇ ¿¬Æò±Õ ¼ºÀå·ü(CAGR)À» ³ªÅ¸³¾ °ÍÀ¸·Î ¿¹»óÇß½À´Ï´Ù.

º¸¾È ºÐ¼®Àº ºòµ¥ÀÌÅÍ ºÐ¼®°ú ¸Ó½Å·¯´×À» Ȱ¿ëÇØ ³×Æ®¿öÅ© Àåºñ¿¡¼­ µ¥ÀÌÅ͸¦ ¼öÁý, ºÐ·ù, ºÐ¼®ÇÏ´Â »çÀü ¿¹¹æÀû º¸¾È Á¢±Ù ¹æ½ÄÀ» ¸»ÇÕ´Ï´Ù. ÁÖ·Î Á¶Á÷ÀÇ µðÁöÅÐ ÀÎÇÁ¶ó º¸¾ÈÀ» °ü¸®Çϰí Áö´ÉÇü À§ÇùÀ» ¹æÁöÇÏ´Â °ÍÀ» ¸ñÇ¥·Î ÇÕ´Ï´Ù. µðÁöÅÐ ÀÚ»êÀÇ ¸ÞŸµ¥ÀÌÅÍ, Áö¸®Àû À§Ä¡ Á¤º¸, À§Çù ÀÎÅÚ¸®Àü½º, ÀÎÅÍ³Ý ÇÁ·ÎÅäÄÝ(IP) ÄÁÅØ½ºÆ® °ü·Ã ºÐ¼® °á°ú¸¦ Á¦°øÇÏ´Â µ¥ ÁßÁ¡À» µÐ µ¥ÀÌÅÍ ¸¶ÀÌ´× ¹× À§Çù ŽÁö ¾Ë°í¸®ÁòÀ» ±â¹ÝÀ¸·Î ÇÕ´Ï´Ù. ¿öÅ©½ºÅ×À̼Ç, ¼­¹ö, ¸ð¹ÙÀÏ ±â±â, ¼¾¼­ ¹× ±âŸ ¿£µåÆ÷ÀÎÆ®¿¡¼­ ½Ç½Ã°£ ¾Ë¸²À» Á¦°øÇϰí, ³×Æ®¿öÅ© Æ®·¡ÇÈ ¾çÀ» ¸ð´ÏÅ͸µÇϸç, Ÿ»ç À§Çù ÀÎÅÚ¸®Àü½º Çǵ带 À¯Áö °ü¸®ÇÕ´Ï´Ù.

Àü ¼¼°èÀûÀ¸·Î »çÀ̹ö À§Çù°ú º¸¾È Ä§ÇØ°¡ Áõ°¡Çϰí ÀÖ´Â °ÍÀº ½ÃÀå ¼ºÀåÀ» °¡¼ÓÇÏ´Â ÁÖ¿ä ¿äÀÎ Áß ÇϳªÀÔ´Ï´Ù. ÀÌ¿Í ÇÔ²², µ¥ÀÌÅÍ À¯Ãâ ¹× ÇâÈÄ Ä§ÀÔÀ» ¹æÁöÇϱâ À§ÇÑ ÅëÂû·ÂÀ» ¾ò±â À§ÇØ ³×Æ®¿öÅ© ±â¹Ý À§ÇùÀÇ ÆÐÅÏÀ» ¹ß°ßÇÏ°í ¿ì¼±¼øÀ§¸¦ Á¤Çϱâ À§ÇÑ º¸¾È ºÐ¼® µµ±¸°¡ Á¶Á÷ Àü¹Ý¿¡ °ÉÃÄ ³Î¸® äÅõǰí ÀÖ´Â °Íµµ ½ÃÀå ¼ºÀå¿¡ ±â¿©Çϰí ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ±â¹Ý ¼­ºñ½º¿Í ºòµ¥ÀÌÅÍ µµ±¸ÀÇ »ç¿ëÀÌ Áõ°¡Çϰí ÀÖ´Â °Íµµ ½ÃÀå ¼ºÀå¿¡ Å« ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù. º¸¾È ºÐ¼®ÀÇ Å¬¶ó¿ìµå ¹èÆ÷´Â È®À强, ³×Æ®¿öÅ© º¸¾È, ¼Óµµ¸¦ °­È­ÇÑ À¥ ±â¹Ý °ü¸® ¹× ±â¾÷ ±Ô¸ðÀÇ º¸È£ ¼Ö·ç¼Ç¿¡ ´ëÇÑ È®À强, ³×Æ®¿öÅ© º¸¾È ¹× ¼Óµµ¸¦ ¼³¸íÇÕ´Ï´Ù. ¶ÇÇÑ, ³×Æ®¿öÅ© Æ®·¡ÇÈÀÇ »ó¼¼ÇÑ ÆÐŶ ºÐ¼®À» ÅëÇØ ¾Ç¼ºÄڵ带 ½Äº°Çϰí À̸¦ ¿ÏÈ­ÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ© º¸¾È ºÐ¼®ÀÇ ¹ßÀüµµ ½ÃÀå Àü¸ÁÀ» ¹à°Ô Çϰí ÀÖ½À´Ï´Ù. Áö´ÉÇü »çÀ̹ö À§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ Á¤ºÎ ¹× ¹æÀ§ ±â°üÀÇ ÅõÀÚ Áõ°¡, Â÷¼¼´ë ¹æÈ­º®, ħÀÔ¹æÁö½Ã½ºÅÛ(IPS), ¾ÈƼ-¸Ö¿þ¾î °ÔÀÌÆ®¿þÀÌ, ¿£µåÆ÷ÀÎÆ® º¸¾È ¿ëµµÀÇ °³¹ß µî ´Ù¸¥ ¿äÀε鵵 ½ÃÀåÀ» ´õ¿í °ßÀÎÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

º» º¸°í¼­¿¡¼­ ´Ù·é ÁÖ¿ä Áú¹®µé

  • 2023³â º¸¾È ºÐ¼® ½ÃÀå ¼¼°è ½ÃÀå ±Ô¸ð´Â?
  • 2024-2032³â º¸¾È ºÐ¼® ½ÃÀå ¼¼°è ½ÃÀå ¼ºÀå·ü Àü¸ÁÀº?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀ» À̲ô´Â ÁÖ¿ä ¿äÀÎÀº?
  • Äڷγª19°¡ ¼¼°è º¸¾È ºÐ¼® ½ÃÀå¿¡ ¹ÌÄ¡´Â ¿µÇâÀº?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀÇ ±¸¼º ¿ä¼Òº° ½ÃÀå ÇöȲÀº?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀÇ ¿ëµµº° ½ÃÀå ÇöȲÀº?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀÇ µµÀÔ Çüź° ½ÃÀå ÇöȲÀº?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀÇ Á¶Á÷ ±Ô¸ðº° ºÐ¼® ÇöȲÀº?
  • º¸¾È ºÐ¼® ½ÃÀåÀÇ ¾÷Á¾º° ºÐ¼®Àº ¾î¶»°Ô ÀÌ·ç¾îÁö³ª¿ä?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀÇ ÁÖ¿ä Áö¿ªÀº?
  • ¼¼°è º¸¾È ºÐ¼® ½ÃÀåÀÇ ÁÖ¿ä ½ÃÀå ÁøÃâ±â¾÷Àº?

¸ñÂ÷

Á¦1Àå ¼­¹®

Á¦2Àå Á¶»ç ¹üÀ§¿Í Á¶»ç ¹æ¹ý

  • Á¶»ç ¸ñÀû
  • ÀÌÇØ°ü°èÀÚ
  • µ¥ÀÌÅÍ ¼Ò½º
    • 1Â÷ Á¤º¸
    • 2Â÷ Á¤º¸
  • ½ÃÀå ÃßÁ¤
    • º¸ÅÒ¾÷ Á¢±Ù
    • Åé´Ù¿î Á¢±Ù
  • Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ¼­·Ð

  • °³¿ä
  • ÁÖ¿ä ¾÷°è µ¿Çâ

Á¦5Àå ¼¼°èÀÇ º¸¾È ºÐ¼® ½ÃÀå

  • ½ÃÀå °³¿ä
  • ½ÃÀå ºÐ¼®
  • COVID-19ÀÇ ¿µÇâ
  • ½ÃÀå ¿¹Ãø

Á¦6Àå ½ÃÀå ºÐ¼® : ÄÄÆ÷³ÍÆ®º°

  • ¼Ö·ç¼Ç
  • ¼­ºñ½º
    • ½ÃÀå µ¿Çâ
    • ÁÖ¿ä À¯Çü
      • Àü¹® ¼­ºñ½º
      • ¸Å´ÏÁöµå ¼­ºñ½º
    • ½ÃÀå ¿¹Ãø

Á¦7Àå ½ÃÀå ºÐ¼® : ¿ëµµº°

  • ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È ºÐ¼®
  • À¥ º¸¾È ºÐ¼®
  • ¿£µåÆ÷ÀÎÆ® º¸¾È ºÐ¼®
  • ³×Æ®¿öÅ© º¸¾È ºÐ¼®
  • ±âŸ

Á¦8Àå ½ÃÀå ºÐ¼® : µµÀÔ Çüź°

  • Ŭ¶ó¿ìµå ±â¹Ý
  • ¿ÂÇÁ·¹¹Ì½º

Á¦9Àå ½ÃÀå ºÐ¼® : Á¶Á÷ ±Ô¸ðº°

  • Áß¼Ò±â¾÷
  • ´ë±â¾÷

Á¦10Àå ½ÃÀå ºÐ¼® : ¾÷°èº°

  • ÀºÇà/±ÝÀ¶¼­ºñ½º/º¸Çè(BFSI)
  • ÀÇ·á
  • Á¦Á¶
  • ¼ÒºñÀç ¹× ¼Ò¸Å
  • IT ¹× Åë½Å
  • Á¤ºÎ ¹× ¹æÀ§
  • ±âŸ

Á¦11Àå ½ÃÀå ºÐ¼® : Áö¿ªº°

  • ºÏ¹Ì
    • ¹Ì±¹
    • ij³ª´Ù
  • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • Áß±¹
    • ÀϺ»
    • Àεµ
    • Çѱ¹
    • È£ÁÖ
    • Àεµ³×½Ã¾Æ
    • ±âŸ
  • À¯·´
    • µ¶ÀÏ
    • ÇÁ¶û½º
    • ¿µ±¹
    • ÀÌÅ»¸®¾Æ
    • ½ºÆäÀÎ
    • ·¯½Ã¾Æ
    • ±âŸ
  • ¶óƾ¾Æ¸Þ¸®Ä«
    • ºê¶óÁú
    • ¸ß½ÃÄÚ
    • ±âŸ
  • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
    • ½ÃÀå µ¿Çâ
    • ½ÃÀå ºÐ¼® : ±¹°¡º°
    • ½ÃÀå ¿¹Ãø

Á¦12Àå SWOT ºÐ¼®

  • °³¿ä
  • °­Á¡
  • ¾àÁ¡
  • ±âȸ
  • À§Çù

Á¦13Àå ¹ë·ùüÀÎ ºÐ¼®

Á¦14Àå PorterÀÇ Five Forces ºÐ¼®

  • °³¿ä
  • ¹ÙÀ̾îÀÇ ±³¼··Â
  • °ø±Þ ±â¾÷ÀÇ ±³¼··Â
  • °æÀï Á¤µµ
  • ½Å±Ô ÁøÃâ¾÷üÀÇ À§Çù
  • ´ëüǰÀÇ À§Çù

Á¦15Àå °æÀï ±¸µµ

  • ½ÃÀå ±¸Á¶
  • ÁÖ¿ä ±â¾÷
  • ÁÖ¿ä ±â¾÷ °³¿ä
    • Alert Logic Inc.(Welsh, Carson, Anderson & Stowe)
    • Alienvault Inc.(AT&T Cybersecurity)
    • Arbor Networks Inc.(NETSCOUT Systems Inc.)
    • Cisco Systems Inc.
    • Fortinet Inc.
    • Hewlett Packard Enterprise Development LP
    • International Business Machines Corporation
    • LogRhythm Inc.(Thoma Bravo LLC)
    • McAfee LLC(TPG Capital & Intel Corporation)
    • RSA Security LLC(Dell Technologies Inc.)
    • Splunk Inc.
LSH 24.09.03

The global security analytics market size reached US$ 5.4 Billion in 2023. Looking forward, IMARC Group expects the market to reach US$ 14.3 Billion by 2032, exhibiting a growth rate (CAGR) of 11.2% during 2024-2032.

Security analytics refers to a proactive security approach that uses big data analytics and machine learning to gather, categorize and analyze data from network devices. It is primarily aimed at managing the security of an organization's digital infrastructure and prevent advanced threats. It is based on data mining and threat detection algorithms that are focused on providing digital asset metadata, geo-location, threat intelligence and internet protocol (IP) context-related analytical results. It provides real-time alerts from workstations, servers, mobile devices, sensors and other endpoints, monitors network traffic volume and maintains third-party threat intelligence feeds.

The increasing number of cyber threats and security breaches across the globe is one of the key factors driving the growth of the market. In line with this, the widespread adoption of security analytic tools across organizations for discovering patterns and prioritizing network-based threats to obtain insights for preventing data losses and future intrusions is also contributing to the market growth. The increasing utilization of cloud-based services and big data tools is acting as another major growth-inducing factor. Cloud deployment of security analytics offers web-based management and enterprise-wide protection solutions that have enhanced scalability, network security and speed. Additionally, the development of network security analytics that can perform deep packet analysis of the network traffic to identify malware and mitigate it, is also creating a positive outlook for the market. Other factors, including increasing investments by government and defense organizations to combat advanced cyber threats, along with the development of Next-generation firewalls, Intrusion Prevention Systems (IPS), anti-malware gateways and endpoint security applications, are projected to drive the market further.

Key Market Segmentation:

IMARC Group provides an analysis of the key trends in each sub-segment of the global security analytics market report, along with forecasts at the global, regional and country level from 2024-2032. Our report has categorized the market based on component, application, deployment mode, organization size, and vertical.

Breakup by Component:

Solutions

Services

Professional Services

Managed Services

Breakup by Application:

Application Security Analytics

Web Security Analytics

Endpoint Security Analytics

Network Security Analytics

Others

Breakup by Deployment Mode:

Cloud-based

On-premises

Breakup by Organization Size:

Small and Medium Enterprises

Large Enterprises

Breakup by Vertical:

BFSI

Healthcare

Manufacturing

Consumer Goods and Retail

IT and Telecom

Government and Defense

Others

Breakup by Region:

North America

United States

Canada

Asia Pacific

China

Japan

India

South Korea

Australia

Indonesia

Others

Europe

Germany

France

United Kingdom

Italy

Spain

Russia

Others

Latin America

Brazil

Mexico

Others

Middle East and Africa

Competitive Landscape:

The report has also analysed the competitive landscape of the market with some of the key players being Alert Logic Inc. (Welsh, Carson, Anderson & Stowe), Alienvault Inc. (AT&T Cybersecurity), Arbor Networks Inc. (NETSCOUT Systems, Inc.), Cisco Systems Inc., Fortinet Inc., Hewlett Packard Enterprise Development LP, International Business Machines Corporation, LogRhythm Inc. (Thoma Bravo, LLC), McAfee LLC (TPG Capital & Intel Corporation), RSA Security LLC. (Dell Technologies Inc.), Splunk Inc., etc.

Key Questions Answered in This Report

  • 1. What was the size of the global security analytics market in 2023?
  • 2. What is the expected growth rate of the global security analytics market during 2024-2032?
  • 3. What are the key factors driving the global security analytics market?
  • 4. What has been the impact of COVID-19 on the global security analytics market?
  • 5. What is the breakup of the global security analytics market based on the component?
  • 6. What is the breakup of the global security analytics market based on the application?
  • 7. What is the breakup of the global security analytics market based on deployment mode?
  • 8. What is the breakup of the global security analytics market based on the organization size?
  • 9. What is the breakup of the global security analytics market based on the vertical?
  • 10. What are the key regions in the global security analytics market?
  • 11. Who are the key players/companies in the global security analytics market?

Table of Contents

1 Preface

2 Scope and Methodology

  • 2.1 Objectives of the Study
  • 2.2 Stakeholders
  • 2.3 Data Sources
    • 2.3.1 Primary Sources
    • 2.3.2 Secondary Sources
  • 2.4 Market Estimation
    • 2.4.1 Bottom-Up Approach
    • 2.4.2 Top-Down Approach
  • 2.5 Forecasting Methodology

3 Executive Summary

4 Introduction

  • 4.1 Overview
  • 4.2 Key Industry Trends

5 Global Security Analytics Market

  • 5.1 Market Overview
  • 5.2 Market Performance
  • 5.3 Impact of Covid-19
  • 5.4 Market Forecast

6 Market Breakup by Component

  • 6.1 Solutions
    • 6.1.1 Market Trends
    • 6.1.2 Market Forecast
  • 6.2 Services
    • 6.2.1 Market Trends
    • 6.2.2 Major Types
      • 6.2.2.1 Professional Services
      • 6.2.2.2 Managed Services
    • 6.2.3 Market Forecast

7 Market Breakup by Application

  • 7.1 Application Security Analytics
    • 7.1.1 Market Trends
    • 7.1.2 Market Forecast
  • 7.2 Web Security Analytics
    • 7.2.1 Market Trends
    • 7.2.2 Market Forecast
  • 7.3 Endpoint Security Analytics
    • 7.3.1 Market Trends
    • 7.3.2 Market Forecast
  • 7.4 Network Security Analytics
    • 7.4.1 Market Trends
    • 7.4.2 Market Forecast
  • 7.5 Others
    • 7.5.1 Market Trends
    • 7.5.2 Market Forecast

8 Market Breakup by Deployment Mode

  • 8.1 Cloud-based
    • 8.1.1 Market Trends
    • 8.1.2 Market Forecast
  • 8.2 On-premises
    • 8.2.1 Market Trends
    • 8.2.2 Market Forecast

9 Market Breakup by Organization Size

  • 9.1 Small and Medium Enterprises
    • 9.1.1 Market Trends
    • 9.1.2 Market Forecast
  • 9.2 Large Enterprises
    • 9.2.1 Market Trends
    • 9.2.2 Market Forecast

10 Market Breakup by Vertical

  • 10.1 BFSI
    • 10.1.1 Market Trends
    • 10.1.2 Market Forecast
  • 10.2 Healthcare
    • 10.2.1 Market Trends
    • 10.2.2 Market Forecast
  • 10.3 Manufacturing
    • 10.3.1 Market Trends
    • 10.3.2 Market Forecast
  • 10.4 Consumer Goods and Retail
    • 10.4.1 Market Trends
    • 10.4.2 Market Forecast
  • 10.5 IT and Telecom
    • 10.5.1 Market Trends
    • 10.5.2 Market Forecast
  • 10.6 Government and Defense
    • 10.6.1 Market Trends
    • 10.6.2 Market Forecast
  • 10.7 Others
    • 10.7.1 Market Trends
    • 10.7.2 Market Forecast

11 Market Breakup by Region

  • 11.1 North America
    • 11.1.1 United States
      • 11.1.1.1 Market Trends
      • 11.1.1.2 Market Forecast
    • 11.1.2 Canada
      • 11.1.2.1 Market Trends
      • 11.1.2.2 Market Forecast
  • 11.2 Asia Pacific
    • 11.2.1 China
      • 11.2.1.1 Market Trends
      • 11.2.1.2 Market Forecast
    • 11.2.2 Japan
      • 11.2.2.1 Market Trends
      • 11.2.2.2 Market Forecast
    • 11.2.3 India
      • 11.2.3.1 Market Trends
      • 11.2.3.2 Market Forecast
    • 11.2.4 South Korea
      • 11.2.4.1 Market Trends
      • 11.2.4.2 Market Forecast
    • 11.2.5 Australia
      • 11.2.5.1 Market Trends
      • 11.2.5.2 Market Forecast
    • 11.2.6 Indonesia
      • 11.2.6.1 Market Trends
      • 11.2.6.2 Market Forecast
    • 11.2.7 Others
      • 11.2.7.1 Market Trends
      • 11.2.7.2 Market Forecast
  • 11.3 Europe
    • 11.3.1 Germany
      • 11.3.1.1 Market Trends
      • 11.3.1.2 Market Forecast
    • 11.3.2 France
      • 11.3.2.1 Market Trends
      • 11.3.2.2 Market Forecast
    • 11.3.3 United Kingdom
      • 11.3.3.1 Market Trends
      • 11.3.3.2 Market Forecast
    • 11.3.4 Italy
      • 11.3.4.1 Market Trends
      • 11.3.4.2 Market Forecast
    • 11.3.5 Spain
      • 11.3.5.1 Market Trends
      • 11.3.5.2 Market Forecast
    • 11.3.6 Russia
      • 11.3.6.1 Market Trends
      • 11.3.6.2 Market Forecast
    • 11.3.7 Others
      • 11.3.7.1 Market Trends
      • 11.3.7.2 Market Forecast
  • 11.4 Latin America
    • 11.4.1 Brazil
      • 11.4.1.1 Market Trends
      • 11.4.1.2 Market Forecast
    • 11.4.2 Mexico
      • 11.4.2.1 Market Trends
      • 11.4.2.2 Market Forecast
    • 11.4.3 Others
      • 11.4.3.1 Market Trends
      • 11.4.3.2 Market Forecast
  • 11.5 Middle East and Africa
    • 11.5.1 Market Trends
    • 11.5.2 Market Breakup by Country
    • 11.5.3 Market Forecast

12 SWOT Analysis

  • 12.1 Overview
  • 12.2 Strengths
  • 12.3 Weaknesses
  • 12.4 Opportunities
  • 12.5 Threats

13 Value Chain Analysis

14 Porters Five Forces Analysis

  • 14.1 Overview
  • 14.2 Bargaining Power of Buyers
  • 14.3 Bargaining Power of Suppliers
  • 14.4 Degree of Competition
  • 14.5 Threat of New Entrants
  • 14.6 Threat of Substitutes

15 Competitive Landscape

  • 15.1 Market Structure
  • 15.2 Key Players
  • 15.3 Profiles of Key Players
    • 15.3.1 Alert Logic Inc. (Welsh, Carson, Anderson & Stowe)
      • 15.3.1.1 Company Overview
      • 15.3.1.2 Product Portfolio
    • 15.3.2 Alienvault Inc. (AT&T Cybersecurity)
      • 15.3.2.1 Company Overview
      • 15.3.2.2 Product Portfolio
    • 15.3.3 Arbor Networks Inc. (NETSCOUT Systems Inc.)
      • 15.3.3.1 Company Overview
      • 15.3.3.2 Product Portfolio
    • 15.3.4 Cisco Systems Inc.
      • 15.3.4.1 Company Overview
      • 15.3.4.2 Product Portfolio
      • 15.3.4.3 Financials
      • 15.3.4.4 SWOT Analysis
    • 15.3.5 Fortinet Inc.
      • 15.3.5.1 Company Overview
      • 15.3.5.2 Product Portfolio
      • 15.3.5.3 Financials
      • 15.3.5.4 SWOT Analysis
    • 15.3.6 Hewlett Packard Enterprise Development LP
      • 15.3.6.1 Company Overview
      • 15.3.6.2 Product Portfolio
      • 15.3.6.3 Financials
      • 15.3.6.4 SWOT Analysis
    • 15.3.7 International Business Machines Corporation
      • 15.3.7.1 Company Overview
      • 15.3.7.2 Product Portfolio
      • 15.3.7.3 Financials
      • 15.3.7.4 SWOT Analysis
    • 15.3.8 LogRhythm Inc. (Thoma Bravo LLC)
      • 15.3.8.1 Company Overview
      • 15.3.8.2 Product Portfolio
    • 15.3.9 McAfee LLC (TPG Capital & Intel Corporation)
      • 15.3.9.1 Company Overview
      • 15.3.9.2 Product Portfolio
    • 15.3.10 RSA Security LLC (Dell Technologies Inc.)
      • 15.3.10.1 Company Overview
      • 15.3.10.2 Product Portfolio
    • 15.3.11 Splunk Inc.
      • 15.3.11.1 Company Overview
      • 15.3.11.2 Product Portfolio
      • 15.3.11.3 Financials
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦