Global Information
회사소개 | 문의 | 비교리스트

위협 인텔리전스 보안 서비스 시장 : 성장, 동향, 예측

Threat Intelligence Security Services Market - Growth, Trends, and Forecast (2020 - 2025)

리서치사 Mordor Intelligence LLP
발행일 2020년 01월 상품 코드 922607
페이지 정보 영문
US $ 4,250 ₩ 5,136,000 PDF by E-mail (Single User License)
US $ 4,750 ₩ 5,740,000 PDF by E-mail (Team License: Up to 7 Users)
US $ 6,000 ₩ 7,251,000 PDF by E-mail (Site License)
US $ 7,500 ₩ 9,064,000 PDF by E-mail (Corporate License)

위협 인텔리전스 보안 서비스 시장 : 성장, 동향, 예측 Threat Intelligence Security Services Market - Growth, Trends, and Forecast (2020 - 2025)
발행일 : 2020년 01월 페이지 정보 : 영문

세계의 위협 인텔리전스 보안 서비스 시장은 2019년에 17억 달러를 기록했습니다. 향후 12.9%의 CAGR로 확대되어 2025년에는 35억 3,000만 달러에 달할 것으로 예측됩니다. 이전에는 식별되지 않은 공격, 첨단 멀웨어 등의 위협을 감지하는 위협 탐지 기능에 대한 수요가 확대되고 있습니다.

세계의 위협 인텔리전스 보안 서비스(Threat Intelligence Security Services) 시장을 조사했으며, 시장 개요, 지역별 시장 동향, 시장 규모 추정과 예측, 시장 성장 촉진·저해요인 및 시장 기회 분석, 경쟁 상황, 주요 기업 개요 등 종합적인 정보를 제공합니다.


제1장 서론

  • 조사 결과
  • 조사 가정
  • 조사 범위

제2장 조사 방법

제3장 개요

제4장 시장 역학

  • 시장 개요
  • 시장 성장 촉진요인과 억제요인의 개요
  • 성장 촉진요인
  • 성장 억제요인
  • 가치 사슬/공급망 분석
  • Porter's Five Forces 분석
    • 신규 참여업체의 위협
    • 소비자의 협상력
    • 공급업체의 협상력
    • 대체품의 위협
    • 산업 내에서의 경쟁
  • PESTLE 분석

제5장 시장 세분화

  • 지역별
    • 북미
    • 유럽
    • 아시아태평양
    • 라틴아메리카
    • 중동 및 아프리카

제6장 경쟁 상황

  • 벤더의 시장 점유율
  • 인수 합병
  • 기업 개요
    • Juniper Networks, Inc.
    • Dell Inc.
    • Check Point Software Technologies Ltd.
    • FireEye, Inc.
    • IBM Corporation
    • AlienVault, Inc.
    • Farsight Security, Inc.
    • LogRhythm, Inc.
    • F-Secure Corporation
    • Webroot Inc.,
    • Fortinet, Inc.
    • McAfee, LLC
    • Symantec Corporation
    • LookingGlass Cyber Solutions, Inc.

제7장 시장 기회 및 향후 동향

KSM 20.04.21

Market Overview

The Threat Intelligence Security Services Market was valued at USD 1.70 billion in 2019 and is expected to reach USD 3.53 billion by 2025, at a CAGR of 12.9% over the forecast period 2020 - 2025. Threat intelligence services nurtured out of security service providers evolving their threat detection abilities to address the encounter of detecting advanced persistent threats (APTs), previously unidentified attacks, advanced malware, and other threats. Advanced persistent threats are a new class of malware. However, in reality, advanced persistent threats are a combination of malware, delivery systems (such as phishing), and data exfiltration. Most of the threat attacks are unknown, low-targeted, slow, and adaptive

Cybercrime has existed for many years and has evolved to become a severe problem for individuals, organizations, and hence, the society at large. Global adoption of the Internet and the proliferation of payment-linked online services, which attract profit-oriented criminals, are among the relevant drivers for such motived attacks. For instance, according to the National Crime Agency of the United Kingdom, cybercrime has surpassed all forms of traditional crimes.

The natural sources to quantify crime are police-recorded statistics. In the context of cybercrime, however, some limitations and caveats put police-recorded statistics to doubt. A lack of consensus of what constitutes a cybercrime is one among such. As a missing authoritative definition, some offences may be classified as cyber when in fact they are not, while others may be concealed within other crime statistics. For instance, in Germany, only 64,426 out of an estimated 14.7 million cybercrime incidents (0.4%) made it to the police-recorded statistics in 2013. In the United States, only 8% of identity theft victims stated that they had filed a report.

One of the major causes of the incidences of cyber-attacks is the lack of skilled cyber security personnel. The number of experienced cyber security professionals, especially in Europe, Asia-Pacific, Latin America, and the Middle East, is less compared to the need for security professionals required to handle the cyber threats for financial institutes, government organizations, and private sector/industrial businesses.

Europe, Latin America, and Middle East & Africa have smaller numbers of cyber security workforces. However, there is a high degree of business activities in these regions as well, making them some of the most attractive countries for cyber-attacks; except Europe and North America, cyber laws are not well defined in most regions. Also, most of the professionals working in this region are not experienced enough to deal with the intensity of incoming cyber threats.

Scope of the Report

Threat intelligence services are internet-based attempts to damage or disrupt information systems and hack critical information using spyware, malware, and phishing. Threat intelligence solutions help an organization to monitor, detect, report, and counter cyber threats to maintain data confidentiality.

Key Market Trends

Geographic Trends

The United States is the largest market for threat intelligence services due to the increasing amount of spending by discrete manufacturing and federal/central government. Also, increase in smart devices (which generate a massive amount of data), the need for faster processing, dependency on IoT devices, BYOD, cloud adoption, pressures on the network, and increased cyber threats are further aiding the market growth.

In the US IT sector, it was estimated that in the past three years, BYOD adoption witnessed an increase of 44.42%, which depicts the need for the adoption of threat intelligence services. Moreover, the country has a strong foothold of threat intelligence service vendors, which adds to the growth of the market. Some of them include Juniper Networks Inc., IBM Corporation, Cisco Systems Inc., FireEye, and Symantec Corporation, among others.

With continuous enhancements in technology, cybersecurity attacks are growing day-by-day, by avoiding all the traditional security tools. This has directly led to the demand for advanced protection techniques, such as cyber threat intelligence solutions.

The growth in the number of data breaches is pushing many organizations to take threat intelligence services. For instance, Equifax, one of the largest credit agencies in the country, suffered a breach in 2017 that affected approximately 143 million consumers. JPMorgan also witnessed one of the biggest bank breaches in history, as hackers got access to the financial information of 3,500 customers.

Retail and Consumer Goods segment is expected to have highest growth

With the introduction of E-commerce over two decades ago, the retail industry has entered into the digital age where the retailers have the opportunity to collect more information about their customers. Retail is seeing a huge data that is generating from the various channel modes - social sites, blogs, and data generated from different apps. Much of the unstructured data produced is left unused, which provides valuable information.

This digital transformation did not end with the E-commerce channel. An increasing number of connected devices have made their way into physical stores in the form of kiosks, point-of-sale (POS) systems, and handheld devices, and they are all designed to collect and access customer information.

To ensure that a retailer's network, data, application, and endpoints should remain secure (away from any malware and breaches), several software applications and services are evolving to deal with these threats. For instance, according to NTT Security, in retail sectors, the cyber targets within APAC, the United States, and Australia were the sources of 93 % of attacks and brute force attacks led with 64 % of the hostile activity.

Data compromises involved the travel industry-including airlines, travel agencies, and travel websites. Further, the retail sector was slanted heavily in favor of data from CNP transactions, while attackers are targeting the food and beverage industries mostly through card track data.

Competitive Landscape

The threat intelligence market is highly competitive and consists of several major players. In terms of market share, few of the major players currently dominate the market. These major players with the prominent shares in the market are focusing on expanding their customer base across foreign countries. These companies are leveraging on strategic collaborative initiatives to increase their market share and profitability. The companies operating in the market are also doing partnerships with start-ups working on the threat intelligence market to strengthen their product capabilities. For an instance, in June 2017, IBM Corporation entered into a partnership with Cisco Systems. With this partnership, they will work together to address the growing global threat of cybercrime and work closely together across products, services, and threat intelligence for the benefit of customers.

Reasons to Purchase this report:

  • The market estimate (ME) sheet in Excel format
  • Report customization as per the client's requirements
  • 3 months of analyst support

Table of Contents


  • 1.1 Study Deliverables
  • 1.2 Study Assumptions
  • 1.3 Scope of the Study




  • 4.1 Market Overview
  • 4.2 Introduction to Market Drivers and Restraints
  • 4.3 Market Drivers
    • 4.3.1 Rapidly Increasing Cyber Security Incidents and Regulations Requiring its Reporting
    • 4.3.2 Growing M2M/IoT Connections Demands for Strengthened Cyber Security in Enterprises
  • 4.4 Market Restraints
    • 4.4.1 Lack of Cyber Security Professionals
    • 4.4.2 High Reliance on Traditional Authentication Methods and Low Preparedness
  • 4.5 Value Chain / Supply Chain Analysis
  • 4.6 Industry Attractiveness Porter's Five Forces Analysis
    • 4.6.1 Threat of New Entrants
    • 4.6.2 Bargaining Power of Buyers/Consumers
    • 4.6.3 Bargaining Power of Suppliers
    • 4.6.4 Threat of Substitute Products
    • 4.6.5 Intensity of Competitive Rivalry
  • 4.7 PESTLE Analysis


  • 5.1 Geography
    • 5.1.1 North America
      • United States
      • Canada
    • 5.1.2 Europe
      • Germany
      • United Kingdom
      • France
    • 5.1.3 Asia-Pacific
      • China
      • Japan
      • South Korea
      • Rest of Asia-Pacific
    • 5.1.4 Latin America
    • 5.1.5 Middle East & Africa


  • 6.1 Vendor Market Share
  • 6.2 Mergers & Acquisitions
  • 6.3 Company Profiles
    • 6.3.1 Juniper Networks, Inc.
    • 6.3.2 Dell Inc.
    • 6.3.3 Check Point Software Technologies Ltd.
    • 6.3.4 FireEye, Inc.
    • 6.3.5 IBM Corporation
    • 6.3.6 AlienVault, Inc.
    • 6.3.7 Farsight Security, Inc.
    • 6.3.8 LogRhythm, Inc.
    • 6.3.9 F-Secure Corporation
    • 6.3.10 Webroot Inc.,
    • 6.3.11 Fortinet, Inc.
    • 6.3.12 McAfee, LLC
    • 6.3.13 Symantec Corporation
    • 6.3.14 LookingGlass Cyber Solutions, Inc.


Back to Top
전화 문의