SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
Cyber Security Market Forecast
2014-2024
Prospects For Leading Companies in Military,
Government, Critical Infrastructure & Private Sector

©notice
This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior written agreement of visiongain. You cannot photocopy, fax, download to database or duplicate in any other way any of the material contained in this report. Each purchase and single copy is for personal use only.
Contents
1. Executive Summary
1.1 Cyber Security Market Overview
1.2 Benefits of This Report
1.3 Who is This Report For?
1.4 Methodology
1.5 Global Cyber Security Market Forecast 2014-2024
1.6 Leading National Cyber Security Market Forecasts 2014-2024
1.7 Cyber Security Market Sector Forecasts 2014-2024
1.8 Cyber Security Submarket Forecasts 2014-2024

2. Introduction to the Cyber Security Market 2014-2024
2.1 Defining The Cyber Security Market
2.2 The Cyber Security Market Structure Overview
2.3 Cyber Security Attacks, Weapons & Defences
2.3.1 Mechanisms of Cyber Attack
2.3.2 Cyber Weaponry
2.3.3 Methods of Cyber Defence
2.4 List of Major Cyber Attacks
2.4.1 Estonia
2.4.2 Operation Orchard
2.4.3 Georgia
2.4.4 Conficker
2.4.5 Pentagon
2.4.6 Aurora
2.4.7 Chinese Diversion of Internet Traffic
2.4.8 Stuxnet
2.4.9 Duqu
2.4.10 RSA
2.4.11 Sony
2.4.12 Operation Shady RAT
2.4.13 Mitsubishi Heavy Industries
2.4.14 Flame / Operation: Olympic Games
2.4.13 Aramco

www.visiongain.com
Contents
3. Global Cyber Security Market 2014-2024
3.1 The Global Cyber Security Market Forecast 2014-2024
3.2 Global Cyber Security Drivers & Restraints
3.2 The Global Cyber Security Market Analysis 2014-2024
3.3 The Global Cyber Security Market Forecast 2014-2024
3.4 The Global Cyber Security Market Growth Rates
3.5 13 Fastest Growing Leading National Cyber Security Markets
3.5.1 13 Fastest Growing Leading National Cyber Security Markets 2014-2024
3.5.2 13 Fastest Growing Leading National Cyber Security Markets 2014-2019
3.5.3 13 Fastest Growing Leading National Cyber Security Markets 2019-2024
3.6 Fastest Growing Cyber Security Market Sectors
3.6.1 Fastest Growing Cyber Security Market Sectors 2014-2024
3.6.2 Fastest Growing Cyber Security Market Sectors 2014-2019
3.6.3 Fastest Growing Cyber Security Market Sectors 2019-2024
3.7 Fastest Growing Cyber Security Submarkets
3.7.1 Fastest Growing Cyber Security Submarkets 2014-2024
3.7.2 Fastest Growing Cyber Security Submarkets 2014-2019
3.7.3 Fastest Growing Cyber Security Submarkets 2019-2024
3.8 13 Leading National Cyber Security Markets Share Forecast 2014-2024
3.10 Cyber Security Submarket Share Forecasts 2014-2024
3.9 Cyber Security Market Sectors Share Forecast 2014-2024
3.11 Cumulative Value of the 13 Cyber Security Market 2014-2024
3.12 Cumulative Value of the 13 Leading National Cyber Security Markets 2014-2024
3.13 Cyber Security Market Sectors Cumulative Value 2014-2024
3.14 Cumulative Value of the Cyber Security Submarkets 2014-2024

4. Leading National Cyber Security Markets 2014-2024
4.1 13 Leading National Cyber Security Markets Share Forecast 2014-2024
4.2 US Cyber Security Market 2014-2024
4.2.1 US Cyber Security Market Forecast
4.2.2 US Cyber Security Sector Forecasts 2014-2024
4.2.3 US Cyber Security Market Analysis
4.2.4 US Federal Government Cyber Spending Analysis
4.2.5 US Federal Spending Drivers & Future Trends
4.2.6 US DHS Budget Request

www.visiongain.com
Contents
4.2.7 The US Cyber Security Act – If, not When?
4.2.8 US International Strategy for Cyberspace 2011
4.2.9 US Government and Military Cyber Organisations and Structure
4.2.10 CNCI
4.2.11 US CYBERCOM
4.2.12 ARCYBER
th

4.2.13 AFCYBER (20 Air Force)
4.2.14 FLTCYBERCOM
4.2.15 MARFORCYBER
4.2.16 NSA
4.2.17 Perfect Citizen
4.2.18 DISA
4.2.19 DHS
4.2.20 National Protection and Programs Directorate
4.2.21 Office of Cyber Security and Communications
4.2.22 Einstein II
4.2.23 DARPA
4.2.24 780th Military Intelligence Brigade
4.2.25 Major US Cyber Security Contracts & Programmes
4.3 Chinese (PRC) Cyber Security Market 2014-2024
4.3.1 Chinese Cyber Security Market Forecast
4.3.2 Chinese Cyber Security Sector Forecasts 2014-2024
4.3.3 Chinese Cyber Security Market Analysis
4.3.4 Chinese Cyber Security – A Predisposition to Offend?
4.3.5 How Does China’s Conceptual Understanding of ‘Information’ Shape Cyber Security?
4.3.6 How Does the Shanghai Cooperation Organisation Cyber Security Strategy Stand to Effect Future
Chinese Efforts?
4.3.7 National Computer Network Emergency Response Coordination Centre of China Report
4.3.8 UN Code of Conduct Proposed
4.3.9 Huawei / ZTE – Contract Bidding
4.3.10 The Cyber Security Command Chain in the PRC
4.4 Japanese Cyber Security Market 2014-2024
4.4.1 Japanese Cyber Security Market Forecast
4.4.2 Japanese Cyber Security Sector Forecasts 2014-2024
4.4.3 Japanese Cyber Security Market Analysis
4.4.4 The Japanese Cyber Security Threat – National Security or LOLCats?

www.visiongain.com
Contents
4.4.5 How Has the Japanese Cyber Security Response Evolved to Counter the Threat?
4.4.6 How Has the Japanese Defence Budget Allocation for Cyber Security Changed?
4.4.7 Who Holds Budgetary Authority Within the Japanese Cyber Security Chain of Command?
4.4.8 Major Japanese Cyber Security Contracts & Programmes
4.5 German Cyber Security Market 2014-2024
4.5.1 German Cyber Security Market Forecast
4.5.2 German Cyber Security Sector Forecasts 2014-2024
4.5.3 German Cyber Security Market Analysis
4.5.4 Have German Cyber Security Efforts Acquired New Emphasis?
4.5.5 Can the German Private Sector Afford Current Cyber Attack Levels?
4.5.6 How Will German Efforts Towards International Collaboration Affect Spending?
4.5.7 The German Cyber Security Strategy: Actors and Intentions
4.5.8 Major German Cyber Security Contracts & Programmes
4.6 UK Cyber Security Market 2014-2024
4.6.1 UK Cyber Security Market Forecast
4.6.2 UK Cyber Security Sector Forecasts 2014-2024
4.6.3 UK Cyber Security Market Analysis
4.6.4 How Has the UK Govt Funding For Cyber Security Been Employed, and How Much is Left?
4.6.5 UK Cyber Security Market SME/SMB Vulnerabilities
4.6.6 Cyber Information Sharing Partnership
4.6.7 Major UK Cyber Security Contracts & Programmes
4.7 French Cyber Security Market 2014-2024
4.7.1 French Cyber Security Market Forecast
4.7.2 French Cyber Security Sector Forecasts 2014-2024
4.7.3 French Cyber Security Market Analysis
4.7.4 Is France Witnessing a Newfound Vigour Towards Cyber Security?
4.7.5 Have Efforts to Involve the French Private Sector Been Effective?
4.7.6 French Offensive Cyber Capabilities
4.7.7 CNIL
4.7.8 French Bilateral Cyber Security Efforts & Prism
4.7.9 LOPPSI(ded?) – How France Has Previously Budgeted Cyber Security?
4.8 Russian Cyber Security Market 2014-2024
4.8.1 Russian Cyber Security Market Forecast
4.8.2 Russian Cyber Security Sector Forecasts 2014-2024
4.8.3 Russian Cyber Security Market Analysis
4.8.4 Russian Cyber Security Policy: How Stage Two Is Expected to Build on Previous Developments

www.visiongain.com
Contents
4.8.5 How Has Greater Centralisation of Russian Cyber Security Policy Effected Implementation?
4.8.6 Is the Russian Private Sector Ignoring Cyber Security?
4.8.7 How Have Russian Bilateral Agreements for Cyber Security Impacted on the Market and How Will
They Fare in Future?
4.8.8 Major Russian Cyber Security Contracts & Programmes
4.9 South Korean Cyber Security Market 2014-2024
4.9.1 South Korean Cyber Security Market Forecast
4.9.2 South Korean Cyber Security Sector Forecasts 2014-2024
4.9.3 South Korean Cyber Security Market Analysis
4.9.4 Is South Korea’s Cyber Space the Most Contested in the World?
4.9.5 How Has South Korea Met the Challenge of the Cyber Threat?
4.9.6 Are Domestic Threats Being Underplayed in the Korean Threat Calculus?
4.9.7 NCSC
4.9.8 Turning From Japan to Jamaica: Is South Korea Becoming a Cyber Exporter?
4.9.9 Major South Korean Cyber Security Contracts & Programmes
4.10 Italian Cyber Security Market 2014-2024
4.10.1 Italian Cyber Security Market Forecast
4.10.2 Italian Cyber Security Sector Forecasts 2014-2024
4.10.3 Italian Cyber Security Market Analysis
4.10.4 Breaking the Da Vinci Code: How 2014 Has Been a Renaissance Year for Italian Cyber Security?
4.10.5 How Successful Have the Italian Government’s Efforts to Enhance Private Sector Involvement in
Cyber Security Been?
4.10.6 CNAIPIC
4.11 Canadian Cyber Security Market 2014-2024
4.11.1 Canadian Cyber Security Market Forecast
4.11.2 Canadian Cyber Security Sector Forecasts 2014-2024
4.11.3 Canadian Cyber Security Market Analysis
4.11.4 Underfunded, Underdeveloped, Underperforming: Why Canadian Efforts Towards Cyber Security
Have Floundered
4.11.5 Why The Canadian Private Sector is Still Being Asked to Pick up the Slack on National Cyber
Security
4.11.6 Canada’s Cyber Security Strategy
4.11.7 Canada Bans Huawei from Government Contract
4.11.8 A US-Canadian Partnership – Integrating North American Cyber Space
4.11.9 Canadian Cyber Incident Response Centre (CCIRC)
4.11.10 Major Canadian Cyber Security Contracts & Programmes

www.visiongain.com
Contents
4.12 Israeli Cyber Security Market 2014-2024
4.12.1 Israeli Cyber Security Market Forecast
4.12.2 Israeli Cyber Security Sector Forecasts 2014-2024
4.12.3 Israeli Cyber Security Market Analysis
4.12.4 Does Israel’s Conventional Military Superiority Act as A Stimulus for Cyber Attacks?
4.12.4 Why Israeli Private Sector Spending Will Outperform Government
4.12.5 National Cyber Directorate (NCD)
4.12.6 Police Cyber Crime Unit
4.12.7 India/Israeli R&D Partnership
4.12.8 Major Israeli Cyber Security Contracts & Programmes
4.13 Indian Cyber Security Market 2014-2024
4.13.1 Indian Cyber Security Market Forecast
4.13.2 Indian Cyber Security Sector Forecasts 2014-2024
4.13.3 Indian Cyber Security Market Analysis
4.13.4 Can the Indian Government Translate Words Into Deeds On Cyber Security?
4.13.5 Is the Indian Private Sector Critically Vulnerable to Cyber Attacks?
4.13.6 How Has India’s 2012 Blackout Sharpened Focus on Critical Infrastructure Protection?
4.13.7 Indian Bilateral Agreements
4.13.8 Indian Offensive Cyber Capabilities
4.13.9 Indian Military Cyber Leadership
4.13.10 Indian Government Website Measures
4.13.11 Major Indian Cyber Security Contracts & Programmes
4.14 Australian Cyber Security Market 2014-2024
4.14.1 Australian Cyber Security Market Forecast
4.14.2 Australian Cyber Security Sector Forecasts 2014-2024
4.14.3 Australian Cyber Security Market Analysis
4.14.4 Why the Australian Cyber Security Market Needs Urgent Investment
4.14.5 Why the Australian Cyber Security Landscape is Ripe for Moves by Defence Providers
4.14.6 Is Australian Cyber Security A Covert Success Story?
4.14.7 Australian Bilateral Agreements: Realignment Towards a US Cyber Security Umbrella?
4.14.8 Australian Cyber Security Strategy
4.14.9 Why Australian Has Joined in the Huawei Ban and Why It Will Stick
4.14.10 Cyber Security Operations Centre (CSOC)
4.14.11 Major Australian Cyber Security Contracts & Programmes
4.15 ROW Cyber Security Market 2014-2024
4.15.1 ROW Cyber Security Market Forecast

www.visiongain.com
Contents
4.15.2 ROW Cyber Security Sector Forecasts 2014-2024
4.15.3 ROW Cyber Security Market Analysis
4.15.4 Latin America – Why Brazil is the Next Big Thing
4.15.5 Why South East Asian Cyber Security is Positioned to Explode
4.15.6 Is the European Cyber Security Market Oversaturated?
4.15.7 The Middle East & Africa – Markets of the Future or the Now?
4.15.8 Major ROW Cyber Security Contracts & Programmes

5. Cyber Security Marker Sectors 2014-2024
5.1 Cyber Security Marker Sector Forecasts 2014-2024
5.2 The Cyber Security Military Market Sector 2014-2024
5.2.1 The Cyber Security Military Market Sector Forecast
5.2.2 Cyber Security Market Military Sector Analysis
5.2.3 Contain, Counter, Exploit: Can Offensive and Defensive Cyber Security Efforts be Clearly Delineated?
5.2.4 For Want of Nail: Why the Vulnerability of Modern Military Forces Necessitates Investment in Cyber
Security Capabilities
5.3 The Cyber Security Government Market Sector 2014-2024
5.3.1 The Cyber Security Government Market Sector Forecast
5.3.2 Cyber Security Government Market Sector Analysis
5.3.3 Government Information Security: Not Wholly a New Phenomenon?
5.4 The Cyber Security Critical Infrastructure Market Sector 2014-2024
5.4.1 The Cyber Security Critical Infrastructure Market Sector Forecast
5.4.2 Cyber Security Critical Infrastructure Market Sector Analysis
5.4.3 Why the Scale of Critical National Infrastructure Remains Such a Challenge for Cyber Security
5.4.4 What Role Does the Public/Private Distinction Play in CNI Cyber Security Spending?
5.5 The Cyber Security Private Sector Market Sector 2014-2024
5.5.1 The Cyber Security Private Sector Market Sector Forecast
5.5.2 Cyber Security Private Sector Market Sector Analysis
5.5.3 Why the Threat of Cyber Attacks on Business Is Only Expected to Grow
5.5.4 Invisible Losses? Why Cyber Attacks Represent Real Losses Beyond The Balance Sheet
5.5.5 Opportunities and Requirements for Cyber Security Vendors in the Private Sector
5.5.6 How the Consumer Still Plays an Important Role in Cyber Security Spending

www.visiongain.com
Contents
6. Cyber Security Submarkets 2014-2024
6.1 Cyber Security Submarket Forecasts 2014-2024
6.2 The Cyber Security Network Security (NetSec) Submarket 2014-2024
6.2.1 The Cyber Security Network Security (NetSec) Submarket Forecast
6.2.2 Network Security Submarket Analysis
6.3 The Cyber Security Security Operations (SecOps) Submarket 2014-2024
6.3.1 The Cyber Security Security Operations (SecOps) Submarket Forecast
6.3.2 Security Operations Submarket Analysis
6.4 The Cyber Security Data Security (DataSec) Submarket 2014-2024
6.4.1 The Cyber Security Data Security (DataSec) Submarket Forecast
6.4.2 Data Security Submarket Analysis
6.5 The Cyber Security Identity & Access (ID&Acc) Submarket 2014-2024
6.5.1 The Cyber Security Identity & Access (ID&Acc) Submarket Forecast
6.5.2 Identity & Access Management
6.6 The Cyber Security Endpoint Security (EndSec) Submarket 2014-2024
6.6.1 The Cyber Security Endpoint Security (EndSec) Submarket Forecast
6.6.2 Endpoint Security Submarket Analysis
6.7 The Cyber Security Application Security (AppSec) Submarket 2014-2024
6.7.1 The Cyber Security Application Security (AppSec) Submarket Forecast
6.7.2 Application Security Submarket Analysis
6.8 The Cyber Security Cloud Security (CloudSec) Submarket 2014-2024
6.8.1 The Cyber Security Cloud Security (CloudSec) Submarket Forecast
6.8.2 Cloud Security Submarket Analysis

7. STEP Analysis of the Cyber Security Market 2014-2024
8. Expert Opinion
8.1 Symantec
8.1.1 Background & Position
8.1.2 What Are the Current Key Areas of Focus?
8.1.3 Is Proactive Defence an Outdated Concept for Cyber Security?
8.1.4 What Are the Current Key Trends in the Cyber Security Market?

www.visiongain.com
Contents
9. Leading Companies in the Cyber Security Market
9.1 BAE Systems
9.1.1 BAE Systems Analysis & Future Outlook
9.1.2 BAE Systems Competitors
9.1.3 BAE Systems Regional Emphasis / Focus
9.1.4 BAE Systems M&A Activity
9.2 Boeing Defense, Space and Security
9.2.1 Boeing Defense, Space and Security Analysis & Future Outlook
9.2.2 Boeing Defense, Space and Security M&A Activity
9.3 Booz Allen Hamilton, Inc.
9.3.1 Booz Allen Analysis & Future Outlook
9.3.2 Booz Allen M&A Activity
9.4 Computer Science Corporation (CSC)
9.4.1 CSC Analysis & Future Outlook
9.4.2 CSC M&A Activity
9.5 EADS (Airbus Group)
9.5.1 EADS/Airbus Analysis & Future Outlook
9.5.2 EADS/Airbus M&A Activity
9.6 General Dynamics Corporation Overview
9.6.1 General Dynamics Analysis & Future Outlook
9.6.2 General Dynamics M&A Activity
9.7 Hewlett Packard (HP) Company
9.8.1 HP Analysis & Future Outlook
9.8.2 HP Regional Emphasis / Focus
9.8.3 HP M&A Activity
9.8 International Business Machines (IBM) Corporation
9.8.1 IBM Analysis & Future Outlook
9.8.2 IBM Competitors
9.8.3 IBM Regional Emphasis / Focus
9.8.4 IBM M&A Activity
9.9 Intel Corporation (incl. McAfee, Inc.)
9.9.1 Intel Analysis & Future Outlook
9.9.2 Intel Competitors
9.9.3 Intel Regional Emphasis / Focus
9.9.4 Intel M&A Activity
9.10 L-3 Communications

www.visiongain.com
Contents
9.10.1 L-3 Communications Analysis & Future Outlook
9.10.2 L-3 Communications M&A Activity
9.11 Lockheed Martin Corporation
9.11.1 Lockheed Martin Analysis & Future Outlook
9.11.2 Lockheed Martin Competitors
9.11.3 Lockheed Martin Regional Emphasis / Focus
9.11.4 Lockheed Martin M&A Activity
9.12 Northrop Grumman Corporation
9.12.1 Northrop Grumman Analysis & Future Outlook
9.12.2 Northrop Grumman Regional Emphasis / Focus
9.12.3 Northrop Grumman M&A Activity
9.13 Raytheon Company
9.13.1 Raytheon Analysis & Future Outlook
9.13.2 Raytheon M&A Activity
9.14 Symantec Corporation
9.14.1 Symantec Analysis & Future Outlook
9.14.2 Symantec Competitors
9.14.3 Symantec Regional Emphasis / Focus
9.14.4 Symantec M&A Activity
9.15 Other Relevant Companies in the Cyber Security Market

10. Conclusions
10.1 The Cyber Security Market Outlook 2014-2024
10.2 Cyber Security Market Drivers & Restraints
10.3 Global Cyber Security Market Forecast 2014-2024
10.4 13 Leading National Cyber Security Market Forecasts 2014-2024
10.5 Cyber Security Market Sector Forecasts 2014-2024
10.6 Cyber Security Submarket Forecasts 2014-2024
10.7 Fastest Growing and Largest Cyber Security Markets 2014-2024

11. Glossary

www.visiongain.com
Contents
List of Tables
Table 1.1 Global Cyber Security Market Forecast Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 1.2 13 Leading National Market Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 1.2 Cyber Security Market Sector Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 1.3 Cyber Security Submarket Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 2.1 Types of Cyber Attack
Table 2.2 Cyber Weapons
Table 2.3 Cyber Defences
Table 3.1 Global Cyber Security Market Drivers & Restraints
Table 3.2 Global Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 3.3 Global Cyber Security Market; 13 Leading National Markets, Market Sectors & Submarkets Forecast
CAGR (%) 2014-2024, 2014-2019, 2019-2024
Table 3.4 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2024
Table 3.5 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2019
Table 3.6 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2024
Table 3.7 Fastest Growing Cyber Security Markets Sectors Forecast CAGR (%) 2014-2024
Table 3.8 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2014-2019
Table 3.9 Fastest Growing Cyber Security Markets Sectors Forecast CAGR (%) 2019-2024
Table 3.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2024
Table 3.11 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2019
Table 3.12 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2019-2024
Table 3.13 Leading National Cyber Security Markets Share Forecast 2014, 2019 & 2024 (% Share, % Change)
Table 3.14 Cyber Security Submarket Share Forecasts 2014, 2019 & 2024 (% Share, % Change)
Table 3.15 Cyber Security Market Sectors Share Forecast 2014, 2019 & 2024 (% Share, % Change)
Table 3.16 Cyber Security Global Market; Leading National Markets, Market Sectors, and Submarkets Cumulative
Sales Forecast 2014-2024 ($bn, %)
Table 4.1 Leading National Cyber Security Markets Forecast 2014-2024 ($bn, AGR %)
Table 4.2 US Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.3 US Cyber Security Market Drivers & Restraints
Table 4.4 US Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.5 Major US Cyber Security Contracts & Programmes
Table 4.6 Chinese Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.7 Chinese Cyber Security Market Drivers & Restraints
Table 4.8 Chinese Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.9 Japanese Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.10 Japanese Cyber Security Market Drivers & Restraints

www.visiongain.com
Contents
Table 4.11 Japanese Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.12 Major Japanese Cyber Security Contracts & Programmes (Company, Value, Date, Details
Table 4.13 German Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.14 German Cyber Security Market Drivers & Restraints
Table 4.15 German Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.16 Major German Cyber Security Contracts & Programmes (Company, Date, Details)
Table 4.17 UK Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.18 UK Cyber Security Market Drivers & Restraints
Table 4.19 UK Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.20 Major UK Cyber Security Contracts & Programmes (Company, Value, Date, Details)
Table 4.21 French Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.22 French Cyber Security Market Drivers & Restraints
Table 4.23 French Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.24 Russian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.25 Russian Cyber Security Market Drivers & Restraints
Table 4.26 Russian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.27 List of Russian and US Jointly Defined Cyber Terms
Table 4.28 Major Russian Cyber Security Contracts & Programmes (Company, Value, Date, Details)
Table 4.29 South Korean Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.30 South Korean Cyber Security Market Drivers & Restraints
Table 4.31 Korean Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.32 Major South Korean Cyber Security Contracts & Programmes (Company, Date, Details)
Table 4.33 Italian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.34 Italian Cyber Security Market Drivers & Restraints
Table 4.35 Italian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.36 Canadian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.37 Canadian Cyber Security Market Drivers & Restraints
Table 4.38 Canadian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.39 Major Canadian Cyber Security Contracts & Programmes (Company, Date, Details)
Table 4.40 Israeli Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.41 Israeli Cyber Security Market Drivers & Restraints
Table 4.42 Israeli Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.43 Major Israeli Cyber Security Contracts & Programmes (Company, Value, Date, Details)
Table 4.44 Indian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.45 Indian Cyber Security Market Drivers & Restraints
Table 4.46 Indian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)

www.visiongain.com
Contents
Table 4.47 Major Indian Cyber Security Contracts & Programmes (Company, Date, Details)
Table 4.48 Australian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.49 Australian Cyber Security Market Drivers & Restraints
Table 4.50 Australian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.51 Major Australian Cyber Security Contracts & Programmes (Company, Value, Date, Details)
Table 4.52 ROW Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative)
Table 4.53 ROW Cyber Security Market Drivers & Restraints
Table 4.54 ROW Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Table 4.55 Major ROW Cyber Security Markets Forecast 2014-2024 ($bn, AGR %)
Table 4.56 Major ROW Cyber Security Contracts & Programmes (Company / Country, Value, Date, Details
Table 5.1 Cyber Security Market Sector Forecasts 2014-2024 ($bn, AGR %)
Table 5.2 Cyber Security Military Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 5.3 Cyber Security Military Market Sector Drivers & Restraints
Table 5.4 Cyber Security Govt Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 5.5 Cyber Security Govt Market Sector Drivers & Restraints
Table 5.6 Cyber Security Critical Infrastructure Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %,
Cumulative)
Table 5.7 Cyber Security Critical Infrastructure Market Sector Drivers & Restraints
Table 5.8 List of Critical Infrastructures
Table 5.9 Cyber Security Private Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 5.10 Cyber Security Private Market Sector Drivers & Restraints
Table 6.1 Cyber Security Submarket Forecasts 2014-2024 ($bn, AGR %)
Table 6.2 Cyber Security NetSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.3 Cyber Security NetSec Submarket Market Drivers & Restraints
Table 6.4 Cyber Security SecOps Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.5 Cyber Security SecOps Submarket Market Drivers & Restraints
Table 6.6 Cyber Security DataSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.7 Cyber Security DataSec Submarket Market Drivers & Restraints
Table 6.8 Cyber Security ID&Acc Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.9 Cyber Security ID&Acc Submarket Market Drivers & Restraints
Table 6.10 Cyber Security EndSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.11 Cyber Security EndSec Submarket Market Drivers & Restraints
Table 6.12 Cyber Security AppSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.13 Cyber Security AppSec Submarket Market Drivers & Restraints
Table 6.14 Cyber Security CloudSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative)
Table 6.15 Cyber Security CloudSec Submarket Market Drivers & Restraints

www.visiongain.com
Contents
Table 7.1 STEP Analysis of the Cyber Security Market 2014-2024
Table 9.1 14 Leading Companies in the Cyber Security Market 2013 (Company, Subsidiary Where Applicable)
Table 9.2 BAE Systems Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From
Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.3 BAE Systems Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Country,
Value, Expires, Details)
Table 9.4 BAE Systems Cyber Security Products / Services (Division, Product, Specification)
Table 9.5 BAE Systems Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.6 The Boeing Company (including BDS) Overview 2012 (Total Revenue, Revenue from Cyber Security
Market, % Revenue From Cyber Security Market, HQ, Ticker, Website)
Table 9.7 The Boeing Company Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors,
Location, Details)
Table 9.8 The Boeing Company Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.9 Booz Allen Hamilton Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue
From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.10 Booz Allen Hamilton Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors,
Country, Value, Expires, Details)
Table 9.11 Booz Allen Hamilton Cyber Security Products / Services (Division, Product/Service Product & Technology)
Table 9.12 Computer Sciences Corporation (CSC) Overview 2012 (Total Revenue, Revenue from Cyber Security
Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.13 Computer Sciences Corporation (CSC) Major Cyber Security Contracts / Projects / Programmes (Date,
Subcontractors, Value, Details)
Table 9.14 Computer Sciences Corporation (CSC) Cyber Security Products/Services (Division, Product/Service,
Details)
Table 9.15 Airbus Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber
Security Market, HQ, Ticker, Contact, Website)
Table 9.16 Airbus Major Cyber Security Contracts / Projects / Programmes (Date, Country, Value, Details)
Table 9.17 Airbus Group Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.18 General Dynamics Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, %
Revenue From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.19 General Dynamics Corporation Major Cyber Security Contracts / Projects / Programmes (Date,
Subcontractors, Value, Expires, Details)
Table 9.20 General Dynamics Corporation Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.21 Hewlett Packard Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, %
Revenue From Cyber Security Market, HQ, Ticker, Contact, Website)

www.visiongain.com
Contents
Table 9.22 Hewlett Packard Company Major Cyber Security Contracts / Projects / Programmes (Date,
Subcontractors, Value, Expires, Details)
Table 9.23 Hewlett Packard Company Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.24 International Business Machines Corporation (IBM) Overview 2012 (Total Revenue, Revenue from Cyber
Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.25 International Business Machines Corporation (IBM) Major Cyber Security Contracts / Projects /
Programmes (Date, Subcontractors, Value, Expires, Details)
Table 9.26 International Business Machines Corporation (IBM) Cyber Security Products / Services (Division, Product,
Details)
Table 9.27 Intel Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From
Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.28 Intel Corporation Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value,
Expires, Details)
Table 9.29 Intel Corporation Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.30 L-3 Communications Holdings Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market,
% Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker,
Website)
Table 9.31 L-3 Communications Holdings Inc Major Cyber Security Contracts / Projects / Programmes (Date,
Subcontractors, Value, Expires, Details)
Table 9.32 L-3 Communications Holdings Inc Cyber Security Products/Services (Division, Product/Service,
Description)
Table 9.33 Lockheed Martin Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, %
Revenue From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.34 Lockheed Martin Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value,
Expires, Details)
Table 9.35 Lockheed Martin Corporation Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.36 Northrop Grumman Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market,
% Revenue From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.37 Northrop Grumman Corporation Major Cyber Security Contracts / Projects / Programmes (Date,
Subcontractors, Value, Expires, Details)
Table 9.38 Northrop Grumman Corporation Cyber Security Products/Services (Division, Product/Service, Details)
Table 9.39 Raytheon Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue
From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.40 Raytheon Company Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors,
Value, Details)
Table 9.41 Raytheon Company Cyber Security Products / Services (Division, Product/Service, Details)

www.visiongain.com
Contents
Table 9.42 Symantec Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue
From Cyber Security Market, HQ, Ticker, Contact, Website)
Table 9.43 Symantec Corporation Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors,
Value, Expires, Details)
Table 9.44 Symantec Cyber Security Products / Services (Division, Product, Details)
Table 9.45 Symantec Corporation Cyber Security Products/Services (Product/Service)
Table 9.46 Other Relevant Companies in the Cyber Security Market
Table 10.1 Global Cyber Security Market Drivers & Restraints
Table 10.2 Global Cyber Security Market Forecast Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 10.3 13 Leading National Market Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 10.4 Cyber Security Market Sector Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 10.5 Cyber Security Submarket Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %)
Table 10.6 Fastest Growing National Cyber Security Markets, Cyber Security Market Sectors & Cyber Security
Submarkets 2014-2024 (CAGR %); Largest Cumulative National Cyber Security Markets, Cyber Security Market
Sectors & Cyber Security Submarkets 2014-2024 ($m)

www.visiongain.com
Contents
List of Figures
Figure 2.1 Global Cyber Security Market Structure Overview
Figure 2.2 Operation Shady RAT Targets
Figure 3.1 Global Cyber Security Market Forecast 2014-2024 ($bn, AGR %)
Figure 3.2 13 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2024
Figure 3.3 13 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2019
Figure 3.4 13 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2019-2024
Figure 3.5 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2014-2024
Figure 3.6 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2014-2019
Figure 3.7 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2019-2024
Figure 3.8 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2024
Figure 3.9 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2019
Figure 3.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2019-2024
Figure 3.11 13 Leading National Cyber Security Markets Cumulative Sales Forecast 2014-2024 ($bn)
Figure 3.12 13 Leading National Cyber Security Markets Cumulative Sales Share 2014-2024 (%)
Figure 3.13 Cyber Security Market Sectors Cumulative Sales Forecast 2014-2024 ($bn)
Figure 3.14 Cyber Security Market Sectors Cumulative Sales Share 2014-2024 (%)
Figure 3.15 Cyber Security Submarkets Cumulative Sales Forecast 2014-2024 ($bn)
Figure 3.16 Cyber Security Submarkets Cumulative Sales Share 2014-2024 (%)
Figure 4.1 13 Leading National Cyber Security Markets Forecast 2014-2024 ($bn)
Figure 4.2 13 Leading National Cyber Security Markets Share Forecast 2014 (%)
Figure 4.3 13 Leading National Cyber Security Markets Share Forecast 2019 (%)
Figure 4.4 13 Leading National Cyber Security Markets Share Forecast 2024 (%)
Figure 4.5 13 Leading National Cyber Security Markets Percentage Share Change 2014-2024 (%)
Figure 4.6 US Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.7 US Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.8 US Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.9 US Government and Military Cyber Organisational Structure
Figure 4.10 US CYBERCOM Organisational Structure
Figure 4.11 Chinese Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.12 Chinese Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.13 Chinese Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.14 Japanese Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.15 Japanese Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.16 Japanese Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.17 German Cyber Security Market Forecast 2014-2024 ($bn, AGR%)

www.visiongain.com
Contents
Figure 4.18 German Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.19 German Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.20 UK Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.21 UK Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.22 UK Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.23 French Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.24 French Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.25 French Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.26 Russian Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.27 Russian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Table 4.28 Russian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %)
Figure 4.29 South Korean Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.30 South Korean Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.31 Korean Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.32 Italian Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.33 Italian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.34 Italian Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.35 Canadian Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.36 Canadian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.37 Canadian Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.38 Israeli Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.39 Israeli Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.40 Israeli Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.41 Indian Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.42 Indian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.43 Indian Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.44 Australian Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.45 Australian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.46 Australian Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.47 ROW Cyber Security Market Forecast 2014-2024 ($bn, AGR%)
Figure 4.48 ROW Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share)
Figure 4.49 ROW Cyber Security Sector Forecasts 2014-2024 ($bn)
Figure 4.50 Major ROW Cyber Security Markets Forecast 2014-2024 ($bn)
Figure 5.1 Cyber Security Market Sector Forecasts 2014-2024 ($bn)
Figure 5.2 Cyber Security Market Sector Share Forecast 2014 (%)
Figure 5.3 Cyber Security Market Sector Share Forecast 2019 (%)

www.visiongain.com
Contents
Figure 5.4 Cyber Security Market Sector Share Forecast 2024 (%)
Figure 5.5 Cyber Security Market Sector Shares Percentage Change 2014-2024 (%)
Figure 5.6 Cyber Security Military Market Sector Forecast 2014-2024 ($bn, AGR %)
Figure 5.7 Cyber Security Military Market Sector Share Forecast 2014, 2019 and 2024 (% Share)
Figure 5.8 Cyber Security Govt Market Sector Forecast 2014-2024 ($bn, AGR %)
Figure 5.9 Cyber Security Govt Market Sector Share Forecast 2014, 2019 and 2024 (% Share)
Figure 5.10 Cyber Security Critical Infrastructure Market Sector Forecast 2014-2024 ($bn, AGR %)
Figure 5.11 Cyber Security Critical Infrastructure Market Sector Share Forecast 2014, 2019 and 2024 (% Share)
Figure 5.12 Cyber Security Private Market Sector Forecast 2014-2024 ($bn, AGR %)
Figure 5.13 Cyber Security Private Market Sector Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.1 Cyber Security Submarket Forecasts 2014-2024 ($bn)
Figure 6.2 Cyber Security Submarkets Share Forecast 2014 (%)
Figure 6.3 Cyber Security Submarkets Share Forecast 2019 (%)
Figure 6.4 Cyber Security Submarkets Share Forecast 2024 (%)
Figure 6.5 Cyber Security Submarkets Percentage Share Change 2014-2024 (%)
Figure 6.6 Cyber Security NetSec Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.7 Cyber Security NetSec Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.8 Cyber Security SecOps Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.9 Cyber Security SecOps Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.10 Cyber Security DataSec Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.11 Cyber Security DataSec Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.12 Cyber Security ID&Acc Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.13 Cyber Security ID&Acc Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.14 Cyber Security EndSec Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.15 Cyber Security EndSec Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.16 Cyber Security AppSec Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.17 Cyber Security AppSec Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 6.18 Cyber Security CloudSec Submarket Forecast 2014-2024 ($bn, AGR %)
Figure 6.19 Cyber Security CloudSec Submarket Share Forecast 2014, 2019 and 2024 (% Share)
Figure 9.1 BAE Systems Company Structure 2013
Figure 9.2 Boeing Company Structure 2013
Figure 9.3 Computer Sciences Corporation (CSC ) Inc Structure 2013
Figure 9.4 Airbus Defence & Space Structure 2013
Figure 9.5 General Dynamics Corporation Company Structure 2013
Figure 9.6 Hewlett Packard Company Structure 2013
Figure 9.7 International Business Machines Corporation (IBM) Structure 2013

www.visiongain.com
Contents
Figure 9.8 Intel Corporation Structure 2013
Figure 9.9 L-3 Communications Holdings Inc Structure 2013
Figure 9.10 Lockheed Martin Corporation Structure 2013
Figure 9.11 Raytheon Company Structure 2013
Figure 9.12 Symantec Corporation Structure 2013

www.visiongain.com
Contents
Companies Mentioned in This Report
3Di Technologies LLC
42Six Solutions LLC
ACS
Advanced C4 Systems Inc.
Advanced Content Services Inc
Advanced Micro Devices
AfreecaTV Co Ltd
AhnLab, Inc.
Airbus Defence & Space
Airbus Group
Airbus Military
Akamai Technologies
ALEX-AS, J.V.
ALON, Inc.
Anagran
Antiy Labs
Apple
Applied Visions, Inc
ArcSight
Argon ST
ARINC
Arkoon Network Security
Asgent Inc
Assured Information Security, Inc
Astrium
AT&T
Atac
Atheeb NetSol
ATR
Autonomy
AVAST Software
AVG Technologies
BAE Systems
BAE Systems Australia
BAE Systems Detica

www.visiongain.com
Contents
BAE Systems Electronic Systems (ES)
BAE Systems India
BAE Systems Land & Armaments (L&A)
BAE Systems Maritime
BAE Systems Military Air & Information (MA&I)
BAE Systems Regional Aircraft
BAE Systems Saudi Arabia
BAE Systems Shared Services
BAE Systems Support Solutions
Barracuda Networks Inc
BBN Technologies
Beijing VRV Software Corp Ltd
Bell Canada
Blue Screen IT Ltd
Blue Sun Media Inc
Boeing Defense, Space and Security
Boeing Information Solutions
Boeing Network & Space Systems
Bombardier
Booz & Company
Booz Allen Hamilton Inc.
BreakingPoint Systems
British Gas
British Telecom (BT)
Business Computers Management Consulting Group, LLC
Business Integra Technology Solutions, Inc.
Byres Security
CACI, Inc.
Camber Corporation
Cassidian CyberSecurity
CGI Logica
Check Point Software Technologies Ltd
China Telecom
Cisco Systems, Inc
CloudShield Technologies, Inc.
Columbia University

www.visiongain.com
Contents
CommVault Systems Inc
Computer Science Corporation
Computer Sciences Canada Inc.
Corero Network Security
Cosentini Associates
Creative Computing Solutions
CrySyS Lab
CSC North American Public Sector Defense Group
Cubic XD
CyberArk Software
Danaher Corporation
Defense Systems Engineering & Support
Def-Logix
Dell Corporation
Detica Group plc
Detica NetReveal
Diebold
Digital Arts Inc
DMI
DRC Systems
Dynamic Network Enterprises, Inc.
EADS Cassidian
EADS Group (Airbus)
El Al Israel Airlines Ltd
Elbit Systems
EMC Corporation
EmeSec Inc.
Emiraje Systems
Enel
Enterprise Information Services
ETI
Eurocopter
Exelis, Inc.
Exida Canada
Exobox Technologies Corp
Experian

www.visiongain.com
Contents
Federal Management Systems, Inc.
Fidelis Cybersecurity Solutions
Fidelis Security Solutions Inc
Finmeccanica SpA
FireEye, Inc.
Fondation Télécom
Foreground Security
Fortify Software
F-Secure Corporation
Fujitsu
Galois
General Dynamics Advanced Information Systems
General Dynamics Canada
General Dynamics Corporation
General Dynamics UK
Georgia Tech Research Corp
Gideon technologies
Global Info Tek, Inc.
Google
Group-IB
GuardianEdge
Gulfstream
H3G
Hangzhou Shunwang Technology Co Ltd
Harris Corporation
Harris Government Communications Systems
Harris Integrated Network Solutions
HAURI Inc
Henggeler Computer Consultants, Inc.
Hewlett Packard Corporation (HP)
HighAction, LLC
Honeywell, Inc.
HP Enterprise Business
HP Mobility Global Business
HP Software
HRL Laboratories, LLC

www.visiongain.com
Contents
Huawei Technologies Ltd
i2
IBM Global Business Services (GBS)
IBM Global Financing
IBM Global Technology Services (GTS)
IBM Integrated Supply Chain (ISC)
IBM Research
IBM Software
ICL
Igloo Security Inc
IHI Corporation
Imagine One StraCon Venture, LLC
Infineon Technologies AG
Injazat
In-Q-Tel
Intel Corporation
International Business Machine (IBM) Corporation
International Computer Science Institute
Intrusion Inc
Invincea
iPass Inc
ISC8, Inc.
ISHPI Information Technologies, Inc.
ITT Advanced Engineering & Sciences Division
Ivincea
Johnson Controls
Juniper Networks
Jupiter Networks
Kaspersky Labs
Kawasaki Heavy Industries
KCG
Kestrel Technology, LLC
KEYW
KISA
Knownsec
Kollmorgen Electro-Optical

www.visiongain.com
Contents
Kratos Defence
Kratos Defense & Security Solutions, Inc.
KT Corporation
L-3 Advanced Laser Systems Technologies Inc
L-3 Aeromet
L-3 Airborne Technologies Inc
L-3 Ami
L-3 Army Fleet Support
L-3 ASA
L-3 ComCept
L-3 Comms Systems East
L-3 Comms Systems West
L-3 Communications
L-3 Crestview Aerospace
L-3 Integrated Optical Systems
L-3 KEO
L-3 MAS
L-3 Mission Integration
L-3 Photonics
L-3 Platform Integration
L-3 Services, Inc.
L-3 STRATIS
L-3 Systems Field Support
L-3 TCS
L-3 WESCAM
Lacoon Mobile Security
Lacoon Security Ltd
Leidos
LETA Group
LGS Innovations
LiveOffice
Lockheed Martin Aeronautics
Lockheed Martin Australia
Lockheed Martin Canada
Lockheed Martin Corporation
Lockheed Martin Electronic Systems (ES)

www.visiongain.com
Contents
Lockheed Martin Information Systems & Global Solutions (IS&GS)
Lockheed Martin Space Systems
Lockheed Martin UK
Lockheed Martin’s Information Systems & Global Solutions Division
M5 Network Security Pty Ltd
MacAulay-Brown Inc.
Macquarie Telecom
Mandiant
ManTech International Corporation
MasterCard
McAfee Inc.
MEI Technologies
Merit Network Inc
Merlin RAMCo
MessageLabs
MHI
Mi5 Networks
Microsoft Corporation
MicroTech
Mitsubishi Heavy Industries
Mobile Vault Inc
Mobilityone Ltd
Narus
National Agricultural Cooperatives Federation (Nonghyup)
Neoarena Inc
NetApp, Inc.
Netasq
NetentSec
NetSol Technologies, Inc.
NetWitness Corporation
Network Security Systems Plus, Inc.
New York Times
NexG Co Ltd
Nicstech Co Ltd
NitroSecurity
Northrop Grumman Corporation

www.visiongain.com
Contents
Northrop Grumman Information Systems
Norton
Nukona
Nutrisystem, Inc.
Oasis Systems
Oculis Labs
Odyssey Software
Odyssey Technologies Ltd
One Source
Palantir Technologies Inc
Panda Security
Paradigm Technologies
Petrobras
PGP Corporation
Pikewerks Corporation
Plantynet Co Ltd
Q1 Labs
Qihoo 360 Technology Co. Ltd
Qinetiq Group Plc
QinetiQ North America
Radiance Technologies, Inc.
Raytheon BBN Technologies
Raytheon Company
Raytheon Company Cyber Security Solutions
Raytheon Company Intelligence & Information Systems
Raytheon UK
RLM Communications, Inc.
Rockwell Collins
Rolls-Royce
RSA (EMC)
Safenet
SAIC
SAIC Defense Solutions Group (DSG)
SAIC Health, Energy and Civil Solutions Group (HECSG)
SAIC Intelligence, Surveillance, and Reconnaissance Group (ISRG)
SAIC, Inc. (Leidos)

www.visiongain.com
Contents
Salient Federal Solutions, Inc.
Sandia Corporation
Saudi Aramco
Schneider Electric
Secure Computing
Secure Digital Inc
Secure Tech
Selex Finmeccanica
Senetas Corp Ltd
Sentek Consulting, Inc.
Sentrigo
Serco
Skolkovo Foundation
Skype
Skyscape
SMSi
SoftScan
Software Box Ltd
Sogeti
Sojitz Corporation
Solana Networks
Solutions Made Simple Inc
Sony Corporation
Sony7
Sotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. )
Sparta Inc.
Spirent Communications
SRA International, Inc.
Stratavia
Strategic Operational Solutions, Inc.
STRATIS
stratsec.net
Strikeforce Technologies Inc
STS Group
Sukhoi
Symantec Corporation

www.visiongain.com
Contents
Symantec Corporation Consumer Business
Symantec Corporation Enterprise Products and Services
Symantec Corporation Enterprise Security
Symantec Corporation Information Management
Symantec Corporation SMB and Symantec.cloud
SynApps Solutions
Taia Global, Inc.
Technica
TeleCommunication Systems, Inc.
Teligy
Telstra
Tempest Security Intelligence
Thales Aerospace
Thales Alenia Space
Thales Communications & Security (C&S)
Thales Defence
Thales Group
Thales Raytheon Systems
Thales UK
The Boeing Company
The Economist
The Washington Post
Times of India
TISTA Science and Technology Corp
Trend Micro Inc
Trusteer
Trustwave
TWD & Associates
VASCO Data Security International Inc
Venustech
Verint Systems
VeriSign Inc
Verizon Communications, Inc.
Vertica Systems
VMWare, Inc.
Vulnerability Research Labs

www.visiongain.com
Contents
VulnHunt
Waterfall Security Solutions Ltd
WIJET, LLC
xInformation Systems Security
Your Internet Defender Inc
YouTube
Zix Corp
ZTE Corporation

www.visiongain.com
Contents
Government Agencies and Other Organisations Mentioned in This Report
American Civil Liberties Union (ACLU)
Anonymous
Australian Attorney-General’s Department
Australian Customs and Border Protection Service
Australian Cyber Security Operations Centre (CSOC)
Australian Defence Force
Australian Defence Force Academy
Australian Defence Intelligence Organisation
Australian Defence Science and Technology Organisation
Australian Defence Science and Technology Organisation (DSTO)
Australian Defence Signals Directorate (DSD)
Australian Department of Agriculture, Fisheries, and Forestry
Australian Department of Broadband, Communications, and the Digital Economy
Australian Department of Defence
Australian Federal Police
Australian Government
Australian Government Information Management Office (AGIMO)
Australian Secret Intelligence Service (ASIS)
Australian Security Intelligence Organisation
Brazilian Air Force
Brazilian Armed Forces
Brazilian Army
Brazilian Army’s Cyber Defence Centre
Brazilian CBCyber
Brazilian Federation of Banks (Febraban)
Brazilian Ministry of Science Technology
Brazilian National Computer Emergency Response Team (CERT)
Brazilian Navy
Brazilian Stock Exchange
Bristol Security Centre
Bristol University
British Broadcasting Corporation (BBC)
Canadian Communications Security Establishment
Canadian Cyber Incident Response Centre
Canadian Department of National Defence

www.visiongain.com
Contents
Canadian Department of Public Safety and Emergency Preparedness
Chinese Anti-Virus Products Testing and Certification Centre
Chinese General Office of the CPC Central Committee
Chinese General Office of the State Council
Chinese Information Security Certification Centre
Chinese Information Technology Security Evaluation Centre
Chinese National Computer Network Emergency Response Technical Team/Coordination Center of China
(CNCERT/CC)
Chinese National Research Centre for Anti-Computer Invasion and Virus Prevention
Chinese People’s Liberation Army (PLA)
Chinese Quality Supervision and Test Centre of Security Products for Computer Information System of the Ministry
of Public Security
Columbia University
Commonwealth of Massachusetts Executive Office of Health and Human Services
Cyber Security Research Alliance (CRSA)
Danish Defence Ministry
Danish Forsvarets Efterretningstjeneste
Danish Parliament
DarkSeoul
Defence Research and Development Canada
Def-Logix
East West Institute
Electronic Frontier Foundation (EFF)
European Commission (EC)
European Council/EU
European Network and Information Security Agency (ENISA)
European Union Committee
EUROPOL
Executive Office US Attorneys (EOUSA)
Foreign Ministry, People’s Republic of China
French Agence nationale de la sécurité des systèmes d'information (ANSSI)
French Commission Nationale de l’informatique et des Libertés (National Data Protection Authority)
French Defense Ministry
French Navy
French Senate Committee on Foreign Affairs, Defence & Armed Forces
G8 (Group of Eight)

www.visiongain.com
Contents
George Mason University
German Bundeswehr
German Customs Criminological Office
German Federal commissioner for Date Protection and Freedom of Information
German Federal Criminal Police Office
German Federal Criminal Post Office
German Federal Intelligence Service
German Federal Ministry for Economics and Technology
German Federal Ministry of the Interior
German Federal Network Agency for Gas, Telecommunications, Post and Railway
German Federal Office for Information Security
German Federal Office for Information Technology
German Federal Office for the Protection of the Constitution
German Federal Office of Civil Protection and Disaster Assistance
German Federal Police
German Nationaler Cyber-Sicherheitsrat (NCS, Cyber Security Council)
German Nationales Cyber-Abwehrzentrum (NCAZ, National Cyber Response Centre)
Hezbollah
IBM Institute for Advanced Security
ICT KTN
Indian Armed Forces
Indian CERT-In (Computer Emergency Response Team)
Indian Defence Intelligence Agency (DIA)
Indian Defence Research and Development Organisation (DRDO)
Indian Department of Electronics and Information Technology
Indian Department of Telecommunications
Indian Government
Indian Joint Working Group (JWG) on Cyber Security
Indian Minister of State for Communications and Information Technology
Indian Ministry of Communication and Information Technology (MCIT)
Indian Ministry of Defence
Indian Ministry of Human Resource Development (MHRD)
Indian National Association of Software Services Companies
Indian National Critical Information Infrastructure Protection Centre
Indian National Security Council Secretariat (NSCS)
Indian National Technical Research Organisation (NTRO)

www.visiongain.com
Contents
Indian Navy (IN)
Indonesian Communications and Information Ministry
Information Security Institute, Moscow State University
International Security Assistance Force (ISAF)
ISA Security Compliance Institute
Israeli Air Force (IAF)
Israeli Cabinet
Israeli Defence Force (IDF)
Israeli Ministry of Defence Directorate for Research and Development
Israeli Ministry of Defence Directorate for Research and Development
Israeli Mossad
Israeli National Cyber Bureau
Israeli National Cyber Committee
Israeli National Cyber Directorate (NCD)
Israeli Science and Technology Ministry
Israeli Security Agency
Israeli Shin Bet
Italian Postal and Communication Police Service
Japan Information Security Audit Association (JASA)
Japan Information-Technology Promotion Agency
Japan Information-technology Promotion Agency
Japan Network Security Association (JNSA)
Japanese Defence Ministry
Japanese Information Security Policy Council
Japanese Internal Affairs and Communications Ministry
Japanese ISA Security Compliance Institute
Japanese Ministry of Economy, Trade and Industry (METI)
Japanese National Information Security Center (NISC)
Japanese National Police Agency (NPA)
Japanese SDF Command, Control, Communication, & Computers Systems Command (C4SC)
Japanese Self-Defence Force (JSDF)
Johns Hopkins University
Kansas State University (KSU)
Khalifa University
Korea Communications Commission (KCC)
Korea Information Security Industry Association (KISIA)

www.visiongain.com
Contents
Korea Telecommunication Corporation
Korean National Cyber Security Centre
Korean National Intelligence Service
Kuwait Ministry of Commerce and Industry
Lancaster University
Queen’s University Belfast
LM Cyber Security Alliance
LulzSec
MAHER Center of Iranian National Computer Emergency Response Team
Morgridge Institute for Research
Mossad
National Computer Network Emergency Response Coordination Centre of China
National Information Communications Technology Australia (NICTA)
NATO (North Atlantic Treaty Organisation)
Naval Postgraduate School
North Atlantic Treaty Organisation (NATO)
Oak Ridge National Laboratory
OECD (Organisation for Economic Co-operation and Development)
Organisation for Security and Co-operation in Europe
Organisation of Economic Co-operation and Development
OSCE (Organisation for Security and Co-operation in Europe)
Pacific NW National Laboratory
Public Safety Canada
Purdue University
Royal United Services Institute (RUSI)
Russian – Bulgarian Joint working Group on Information Society and Communication Technologies
Russian Federal Security Service (FSB)
Russian Federal Service for Technical and Export Control (FSTEC)
Russian Security Council
Rutgers University - New Brunswick Campus
Security and Defence Agenda
Security and Defence Agenda Think Tank
Shanghai Cooperation Organisation (SCO)
Singapore Info-communications Technology Security Authority (SITSA)
Singaporean Infocomm Development Authority
Singaporean Ministry of Home Affairs

www.visiongain.com
Contents
Singaporean National Cyber Security Centre (NCSC)
Soon Chun Hyang University
South Africa Cabinet
South Africa State Security Agency (SSA)
South African National Cyber Security Advisory Council
South Korean Ministry of Science and Technology
St Cyr Coëtquidan Academy
Stanford University
Tel Aviv Stock Exchange
Thai Computer Emergency Response Team
Thai Information and Communications Technology Ministry
Thailand National Cyber Security Policy Committee
The Boeing Cyber Engagement Center (CEC)
The Trustees of Princeton University
The University of Alabama at Birmingham
The University of North Carolina at Chapel Hill
Trustees of Dartmouth College
Trustees of Indiana University
UK Cabinet Office
UK Cyber Security Evaluation Centre
UK Defence Industrial Base (DIB)
UK Department for Business Innovation & Skills
UK Department for Business, Innovation and Skills (BIS)
UK Engineering and Physical Sciences Research Council (EPSRC)
UK Environment Agency
UK Foreign and Commonwealth Office (FCO)
UK GCHQ (Government Communications Headquarters)
UK Home Office
UK Ministry of Defence (MOD)
UK Ministry of Justice (MOJ)
UK National Crime Agency
UK National Technical Authority for Information Assurance (CESG)
UK Public Services Network
UK Royal Air Force (RAF)
UN (United Nations)
United Nations (UN)

www.visiongain.com
Contents
Universiti Malaya (UM)
University of Arizona
University of California, San Diego
University of Illinois at Urbana-Champaign
University of Lancaster
University of Maryland
University of Maryland
University of Minnesota
University of Southern California Information Sciences Institute
University of Texas
US 1st Information Operations Command (Land) (1st IO (Land))
US 780th Military Intelligence Brigade
US 9th Army Signal Command (NETCOM/9th SC)
US Air Force
US Air Force Cyber Command (AFCYBER)
US Air Force Medical Services (AFMS)
US Air Force Office of Special Investigations (AFOSI)
US Air Force Research Laboratory (AFRL)
US Antarctic Program (USAP)
US Army
US Army Forces Cyber Command (ARCYBER)
US Army Intelligence and Security Command (INSCOM)
US Army Network Enterprise Technology Command (NETCOM)
US Army Research Laboratory (ARL)
US Centers for Medicare & Medicaid Services (CMS)
US Central Intelligence Agency (CIA)
US Chamber of Commerce
US Coast Guard
US Commonwealth of Massachusetts’ Executive Office of Health and Human Services
US Computer Emergency Readiness Team
US Computer Emergency Readiness Team (US CERT)
US Congress
US CYBERCOM
US Defense Advanced Research Projects Agency (DARPA)
US Defense Industrial Base (DIB)
US Defense Information Systems Agency (DISA)

www.visiongain.com
Contents
US Defense Intelligence Agency (DIA)
US Department for Homeland Security (DHS)
US Department of Defense (DOD)
US Department of Homeland Security Science and Technology Directorate (DHS S&T)
US Department of Justice (DOJ)
US Department of Justice’s Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)
US Department of State
US Department of State's Bureau of Diplomatic Security
US Department of Transportation's Research and Innovative Technology Administration
US DHS S&T Cyber Security Division (CSD)
US DOD Defense Industrial Base (DIB) Cyber Security Task Force
US DOD Manpower Data Centre (DMDC)
US Federal Bureau of Investigation (FBI)
US Federal Government
US Fleet Cyber Command (FLTCYBERCOM)
US General Accountability Office (GAO)
US General Services Administration
US House Intelligence Committee
US House of Representatives
US Joint Operations Center of the Integrated Cyber Center
US Marine Corps (USMC)
US Marine Corps Cryptologic Support Battalion’s (MCSB)
US Marine Corps Cyberspace Command (MARFORCYBER)
US Marine Corps Network Operations Security Center (MCNOSC)
US Marshals Service (USMS)
US National Cyber Response Co-ordination Group (NCRCG)
US National Cyber Security and Communications Integration Center
US National Cyber Security Center
US National Cyber Security Division
US National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC)
US National Protection and Programs Directorate (NPPD)
US National Security Agency (NSA)
US Naval Academy
US Naval Information Operation Commands (NIOC)
US Naval Network Warfare Command (NNWC)
US Naval Supply Systems Command (NAVSUP) Fleet Logistics Center

www.visiongain.com
Contents
US Navy Cyber Defense Operations Command (NCDOC)
US NSTIC (National Strategies on Trusted Identities in Cyberspace)
US Office of Cyber Security and Communications (CS&C)
US Office of the Chief Information Officer
US Office of the Chief Information Officer’s Information Assurance Division
US Pentagon
US Pentagon's Cyber Crime Center
US Secret Service
US Securities and Exchange Commission (SEC)
US Senate
US Southern Command
US Space and Naval Warfare Systems Center
US Space and Naval Warfare Systems Center (SSC)
US Space and Naval Warfare Systems Command (SPAWAR)
US Special Operations Command (SOCOM)
US Strategic Command (STRATCOM)
US Transportation Security Administration (TSA)
US-China Economic and Security Review Commission
Wikileaks
World Bank

www.visiongain.com
Cyber Security Market Forecast 2014-2024: Prospects
for Leading Companies in Military, Government,
Critical Infrastructure & Private Sector Protection
4.13.3 Indian Cyber Security Market Analysis
The Indian cyber security market is forecast by Visiongain to be the fastest growing leading
national cyber security market over the period 2014-2024. The Indian cyber security market is
expected to achieve a massive CAGR of 17.7% across the ten year forecast period, with an
equally high CAGR of 38.9% for 2014-2019. Partially as a response to numerous institutional
failings, Visiongain anticipates that India will be the darling of the cyber security market, with highly
significant increases in spending expected for 2014 by the Indian government and military to rectify
potentially crippling vulnerabilities. However, this initial growth is not an anomaly, spending by the
private sector and on critical infrastructure is expected to be similarly high. In all sectors, growth is
generally expected to be stronger earlier in the forecast, with spending levelling off as the forecast
period develops; even so, growth is expected to remain substantial even in the long term. Over the
course of the forecast period, the Indian cyber security market is projected to increase nearly
tenfold, a figure which should underscore its immense potential for interested parties.

4.13.4 Can the Indian Government Translate Words Into Deeds On
Cyber Security?
In previous years, cyber security has been a recurrent theme of Indian political discourse, although
this has, until recently, failed to translate into spending or direct results. Evidence of cyber security
incidents illustrates that significant growth from less than three hundred in 2005 to more than
fifteen thousand in 2012. While not having caused excessive damage, the attacks have been
acutely embarrassing to the Indian government, with a July 2012 attack on India’s CERT-In
bringing the cyber unit’s website down for five hours. With India’s regional security situation
evolving to accommodate an ever expanding array of threats, particularly from Pakistan and the
PRC who are believed to account for most attacks, the threat is certain to grow.
The response to the growing threat has been publically forthcoming, with a major Joint Working
Group releasing its Recommendations in October 2012 (emphasising the need to work through
existing structures, increase the role of PPPs, grow existing numbers of cyber security personnel,
and achieve greater overall holism). In July 2013, this was followed by the National Cyber Security
Policy (by the Ministry of Communication and Information Technology) which formalised and
codified many of these earlier policy directives. Several key areas have direct relevance for the
future Indian cyber security market:
•

The expansion of the Indian cyber security personnel pool by 500,000 by 2018.

www.visiongain.com

Page 190
Cyber Security Market Forecast 2014-2024: Prospects
for Leading Companies in Military, Government,
Critical Infrastructure & Private Sector Protection
4.14.1 Australian Cyber Security Market Forecast
Visiongain has judged that the Australian cyber security market was worth $0.90bn in 2013.
Visiongain forecasts that the Australian cyber security market will record an annual growth rate
(AGR) of 12.6% in 2014, resulting in the value of the Australian cyber security market increasing to
$1.01bn in 2014.
Over the forecast period 2014-2024, the Australian cyber security market is forecast to achieve a
compound annual growth rate (CAGR) of 8.7%, producing a market projection of $2.34bn in 2024.
For the period 2014-2019, a CAGR of 8.8% is expected for the Australian cyber security market,
with a CAGR of 8.7% projected for the period 2019-2024.
The Australian cyber security market was determined by Visiongain to account for 1.3% of the
global cyber security market in 2014. The Australian cyber security market is expected to be worth
1.6% of the global cyber security market by 2024.
Cumulative spending for the Australian cyber security market is projected to reach $17.67bn from
2014-2024, representing 1.4% of the cumulative spending total for the global cyber security market
in the years 2014-2024.
Table 4.48, along with Figures 4.44 and 4.45, shows the Australian cyber security market forecast,
in terms of sales ($bn), annual growth rates (AGR) (%), and compound annual growth rates
(CAGR). Table 4.49 below provides an overview of the drivers and restraints for the Australian
cyber security market.

Table 4.49 Australian Cyber Security Market Drivers & Restraints
Drivers
Restraints
•

Continued government focus

•

Increased regional tensions driving evolving
threat landscape

•

Recent efforts have lost emphasis; losing sight
of the threat

•

Bilateral agreements not focused on regional
security

Dispersed inhabitation generating additional
vulnerability to communications

•

•

•

Political pressure limiting governmental
freedom of action

Increased regional role
•

Improved bilateral posture with US

Source: Visiongain 2014

www.visiongain.com

Page 197
Cyber Security Market Forecast 2014-2024: Prospects
for Leading Companies in Military, Government,
Critical Infrastructure & Private Sector Protection
01/2012

N/A

US

2

2015

Systems-Army Cloud Fellow-On
Booz Allen received a contract with the US
SOCOM to provide Special Operations Forces
Data Layer Application Maintenance

Source: Visiongain 2014

Table 9.11 Booz Allen Hamilton Cyber Security Products / Services (Division,
Product/Service Product, Details)
Company Division
Cyber Technologies

Cyber Solutions

Product/Service
eDiscovery

Details
Assessment and Gap analysis
Data mapping of IT infrastructure
Electronic and paper management
protocol definition
Integration of records management
Program implementation
Advanced eDiscovery analytics
Systems and electronic data
management
Assurance and Resilience Systems security engineering
Cyber security operations
Certifications and compliance
Enterprise security management
Enterprise and systems resilience
Security Development Life Training
Cycle
Lifecycle governance and organizational
software assurance infrastructure
Requirements
Booz
Allen
Cyber Advanced cyber analytics
Solutions Network
Computer network defence
Cyber product testing and evaluation
Advanced cyber training
International
Policy, management, technology,
Cybersecurity
people, and operations

Source: Visiongain 2014

www.visiongain.com

Page 284

Mais conteúdo relacionado

Último

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 

Último (20)

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 

Destaque

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Destaque (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Cyber Security Market Forecast 2014 2024

  • 1. Cyber Security Market Forecast 2014-2024 Prospects For Leading Companies in Military, Government, Critical Infrastructure & Private Sector ©notice This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior written agreement of visiongain. You cannot photocopy, fax, download to database or duplicate in any other way any of the material contained in this report. Each purchase and single copy is for personal use only.
  • 2. Contents 1. Executive Summary 1.1 Cyber Security Market Overview 1.2 Benefits of This Report 1.3 Who is This Report For? 1.4 Methodology 1.5 Global Cyber Security Market Forecast 2014-2024 1.6 Leading National Cyber Security Market Forecasts 2014-2024 1.7 Cyber Security Market Sector Forecasts 2014-2024 1.8 Cyber Security Submarket Forecasts 2014-2024 2. Introduction to the Cyber Security Market 2014-2024 2.1 Defining The Cyber Security Market 2.2 The Cyber Security Market Structure Overview 2.3 Cyber Security Attacks, Weapons & Defences 2.3.1 Mechanisms of Cyber Attack 2.3.2 Cyber Weaponry 2.3.3 Methods of Cyber Defence 2.4 List of Major Cyber Attacks 2.4.1 Estonia 2.4.2 Operation Orchard 2.4.3 Georgia 2.4.4 Conficker 2.4.5 Pentagon 2.4.6 Aurora 2.4.7 Chinese Diversion of Internet Traffic 2.4.8 Stuxnet 2.4.9 Duqu 2.4.10 RSA 2.4.11 Sony 2.4.12 Operation Shady RAT 2.4.13 Mitsubishi Heavy Industries 2.4.14 Flame / Operation: Olympic Games 2.4.13 Aramco www.visiongain.com
  • 3. Contents 3. Global Cyber Security Market 2014-2024 3.1 The Global Cyber Security Market Forecast 2014-2024 3.2 Global Cyber Security Drivers & Restraints 3.2 The Global Cyber Security Market Analysis 2014-2024 3.3 The Global Cyber Security Market Forecast 2014-2024 3.4 The Global Cyber Security Market Growth Rates 3.5 13 Fastest Growing Leading National Cyber Security Markets 3.5.1 13 Fastest Growing Leading National Cyber Security Markets 2014-2024 3.5.2 13 Fastest Growing Leading National Cyber Security Markets 2014-2019 3.5.3 13 Fastest Growing Leading National Cyber Security Markets 2019-2024 3.6 Fastest Growing Cyber Security Market Sectors 3.6.1 Fastest Growing Cyber Security Market Sectors 2014-2024 3.6.2 Fastest Growing Cyber Security Market Sectors 2014-2019 3.6.3 Fastest Growing Cyber Security Market Sectors 2019-2024 3.7 Fastest Growing Cyber Security Submarkets 3.7.1 Fastest Growing Cyber Security Submarkets 2014-2024 3.7.2 Fastest Growing Cyber Security Submarkets 2014-2019 3.7.3 Fastest Growing Cyber Security Submarkets 2019-2024 3.8 13 Leading National Cyber Security Markets Share Forecast 2014-2024 3.10 Cyber Security Submarket Share Forecasts 2014-2024 3.9 Cyber Security Market Sectors Share Forecast 2014-2024 3.11 Cumulative Value of the 13 Cyber Security Market 2014-2024 3.12 Cumulative Value of the 13 Leading National Cyber Security Markets 2014-2024 3.13 Cyber Security Market Sectors Cumulative Value 2014-2024 3.14 Cumulative Value of the Cyber Security Submarkets 2014-2024 4. Leading National Cyber Security Markets 2014-2024 4.1 13 Leading National Cyber Security Markets Share Forecast 2014-2024 4.2 US Cyber Security Market 2014-2024 4.2.1 US Cyber Security Market Forecast 4.2.2 US Cyber Security Sector Forecasts 2014-2024 4.2.3 US Cyber Security Market Analysis 4.2.4 US Federal Government Cyber Spending Analysis 4.2.5 US Federal Spending Drivers & Future Trends 4.2.6 US DHS Budget Request www.visiongain.com
  • 4. Contents 4.2.7 The US Cyber Security Act – If, not When? 4.2.8 US International Strategy for Cyberspace 2011 4.2.9 US Government and Military Cyber Organisations and Structure 4.2.10 CNCI 4.2.11 US CYBERCOM 4.2.12 ARCYBER th 4.2.13 AFCYBER (20 Air Force) 4.2.14 FLTCYBERCOM 4.2.15 MARFORCYBER 4.2.16 NSA 4.2.17 Perfect Citizen 4.2.18 DISA 4.2.19 DHS 4.2.20 National Protection and Programs Directorate 4.2.21 Office of Cyber Security and Communications 4.2.22 Einstein II 4.2.23 DARPA 4.2.24 780th Military Intelligence Brigade 4.2.25 Major US Cyber Security Contracts & Programmes 4.3 Chinese (PRC) Cyber Security Market 2014-2024 4.3.1 Chinese Cyber Security Market Forecast 4.3.2 Chinese Cyber Security Sector Forecasts 2014-2024 4.3.3 Chinese Cyber Security Market Analysis 4.3.4 Chinese Cyber Security – A Predisposition to Offend? 4.3.5 How Does China’s Conceptual Understanding of ‘Information’ Shape Cyber Security? 4.3.6 How Does the Shanghai Cooperation Organisation Cyber Security Strategy Stand to Effect Future Chinese Efforts? 4.3.7 National Computer Network Emergency Response Coordination Centre of China Report 4.3.8 UN Code of Conduct Proposed 4.3.9 Huawei / ZTE – Contract Bidding 4.3.10 The Cyber Security Command Chain in the PRC 4.4 Japanese Cyber Security Market 2014-2024 4.4.1 Japanese Cyber Security Market Forecast 4.4.2 Japanese Cyber Security Sector Forecasts 2014-2024 4.4.3 Japanese Cyber Security Market Analysis 4.4.4 The Japanese Cyber Security Threat – National Security or LOLCats? www.visiongain.com
  • 5. Contents 4.4.5 How Has the Japanese Cyber Security Response Evolved to Counter the Threat? 4.4.6 How Has the Japanese Defence Budget Allocation for Cyber Security Changed? 4.4.7 Who Holds Budgetary Authority Within the Japanese Cyber Security Chain of Command? 4.4.8 Major Japanese Cyber Security Contracts & Programmes 4.5 German Cyber Security Market 2014-2024 4.5.1 German Cyber Security Market Forecast 4.5.2 German Cyber Security Sector Forecasts 2014-2024 4.5.3 German Cyber Security Market Analysis 4.5.4 Have German Cyber Security Efforts Acquired New Emphasis? 4.5.5 Can the German Private Sector Afford Current Cyber Attack Levels? 4.5.6 How Will German Efforts Towards International Collaboration Affect Spending? 4.5.7 The German Cyber Security Strategy: Actors and Intentions 4.5.8 Major German Cyber Security Contracts & Programmes 4.6 UK Cyber Security Market 2014-2024 4.6.1 UK Cyber Security Market Forecast 4.6.2 UK Cyber Security Sector Forecasts 2014-2024 4.6.3 UK Cyber Security Market Analysis 4.6.4 How Has the UK Govt Funding For Cyber Security Been Employed, and How Much is Left? 4.6.5 UK Cyber Security Market SME/SMB Vulnerabilities 4.6.6 Cyber Information Sharing Partnership 4.6.7 Major UK Cyber Security Contracts & Programmes 4.7 French Cyber Security Market 2014-2024 4.7.1 French Cyber Security Market Forecast 4.7.2 French Cyber Security Sector Forecasts 2014-2024 4.7.3 French Cyber Security Market Analysis 4.7.4 Is France Witnessing a Newfound Vigour Towards Cyber Security? 4.7.5 Have Efforts to Involve the French Private Sector Been Effective? 4.7.6 French Offensive Cyber Capabilities 4.7.7 CNIL 4.7.8 French Bilateral Cyber Security Efforts & Prism 4.7.9 LOPPSI(ded?) – How France Has Previously Budgeted Cyber Security? 4.8 Russian Cyber Security Market 2014-2024 4.8.1 Russian Cyber Security Market Forecast 4.8.2 Russian Cyber Security Sector Forecasts 2014-2024 4.8.3 Russian Cyber Security Market Analysis 4.8.4 Russian Cyber Security Policy: How Stage Two Is Expected to Build on Previous Developments www.visiongain.com
  • 6. Contents 4.8.5 How Has Greater Centralisation of Russian Cyber Security Policy Effected Implementation? 4.8.6 Is the Russian Private Sector Ignoring Cyber Security? 4.8.7 How Have Russian Bilateral Agreements for Cyber Security Impacted on the Market and How Will They Fare in Future? 4.8.8 Major Russian Cyber Security Contracts & Programmes 4.9 South Korean Cyber Security Market 2014-2024 4.9.1 South Korean Cyber Security Market Forecast 4.9.2 South Korean Cyber Security Sector Forecasts 2014-2024 4.9.3 South Korean Cyber Security Market Analysis 4.9.4 Is South Korea’s Cyber Space the Most Contested in the World? 4.9.5 How Has South Korea Met the Challenge of the Cyber Threat? 4.9.6 Are Domestic Threats Being Underplayed in the Korean Threat Calculus? 4.9.7 NCSC 4.9.8 Turning From Japan to Jamaica: Is South Korea Becoming a Cyber Exporter? 4.9.9 Major South Korean Cyber Security Contracts & Programmes 4.10 Italian Cyber Security Market 2014-2024 4.10.1 Italian Cyber Security Market Forecast 4.10.2 Italian Cyber Security Sector Forecasts 2014-2024 4.10.3 Italian Cyber Security Market Analysis 4.10.4 Breaking the Da Vinci Code: How 2014 Has Been a Renaissance Year for Italian Cyber Security? 4.10.5 How Successful Have the Italian Government’s Efforts to Enhance Private Sector Involvement in Cyber Security Been? 4.10.6 CNAIPIC 4.11 Canadian Cyber Security Market 2014-2024 4.11.1 Canadian Cyber Security Market Forecast 4.11.2 Canadian Cyber Security Sector Forecasts 2014-2024 4.11.3 Canadian Cyber Security Market Analysis 4.11.4 Underfunded, Underdeveloped, Underperforming: Why Canadian Efforts Towards Cyber Security Have Floundered 4.11.5 Why The Canadian Private Sector is Still Being Asked to Pick up the Slack on National Cyber Security 4.11.6 Canada’s Cyber Security Strategy 4.11.7 Canada Bans Huawei from Government Contract 4.11.8 A US-Canadian Partnership – Integrating North American Cyber Space 4.11.9 Canadian Cyber Incident Response Centre (CCIRC) 4.11.10 Major Canadian Cyber Security Contracts & Programmes www.visiongain.com
  • 7. Contents 4.12 Israeli Cyber Security Market 2014-2024 4.12.1 Israeli Cyber Security Market Forecast 4.12.2 Israeli Cyber Security Sector Forecasts 2014-2024 4.12.3 Israeli Cyber Security Market Analysis 4.12.4 Does Israel’s Conventional Military Superiority Act as A Stimulus for Cyber Attacks? 4.12.4 Why Israeli Private Sector Spending Will Outperform Government 4.12.5 National Cyber Directorate (NCD) 4.12.6 Police Cyber Crime Unit 4.12.7 India/Israeli R&D Partnership 4.12.8 Major Israeli Cyber Security Contracts & Programmes 4.13 Indian Cyber Security Market 2014-2024 4.13.1 Indian Cyber Security Market Forecast 4.13.2 Indian Cyber Security Sector Forecasts 2014-2024 4.13.3 Indian Cyber Security Market Analysis 4.13.4 Can the Indian Government Translate Words Into Deeds On Cyber Security? 4.13.5 Is the Indian Private Sector Critically Vulnerable to Cyber Attacks? 4.13.6 How Has India’s 2012 Blackout Sharpened Focus on Critical Infrastructure Protection? 4.13.7 Indian Bilateral Agreements 4.13.8 Indian Offensive Cyber Capabilities 4.13.9 Indian Military Cyber Leadership 4.13.10 Indian Government Website Measures 4.13.11 Major Indian Cyber Security Contracts & Programmes 4.14 Australian Cyber Security Market 2014-2024 4.14.1 Australian Cyber Security Market Forecast 4.14.2 Australian Cyber Security Sector Forecasts 2014-2024 4.14.3 Australian Cyber Security Market Analysis 4.14.4 Why the Australian Cyber Security Market Needs Urgent Investment 4.14.5 Why the Australian Cyber Security Landscape is Ripe for Moves by Defence Providers 4.14.6 Is Australian Cyber Security A Covert Success Story? 4.14.7 Australian Bilateral Agreements: Realignment Towards a US Cyber Security Umbrella? 4.14.8 Australian Cyber Security Strategy 4.14.9 Why Australian Has Joined in the Huawei Ban and Why It Will Stick 4.14.10 Cyber Security Operations Centre (CSOC) 4.14.11 Major Australian Cyber Security Contracts & Programmes 4.15 ROW Cyber Security Market 2014-2024 4.15.1 ROW Cyber Security Market Forecast www.visiongain.com
  • 8. Contents 4.15.2 ROW Cyber Security Sector Forecasts 2014-2024 4.15.3 ROW Cyber Security Market Analysis 4.15.4 Latin America – Why Brazil is the Next Big Thing 4.15.5 Why South East Asian Cyber Security is Positioned to Explode 4.15.6 Is the European Cyber Security Market Oversaturated? 4.15.7 The Middle East & Africa – Markets of the Future or the Now? 4.15.8 Major ROW Cyber Security Contracts & Programmes 5. Cyber Security Marker Sectors 2014-2024 5.1 Cyber Security Marker Sector Forecasts 2014-2024 5.2 The Cyber Security Military Market Sector 2014-2024 5.2.1 The Cyber Security Military Market Sector Forecast 5.2.2 Cyber Security Market Military Sector Analysis 5.2.3 Contain, Counter, Exploit: Can Offensive and Defensive Cyber Security Efforts be Clearly Delineated? 5.2.4 For Want of Nail: Why the Vulnerability of Modern Military Forces Necessitates Investment in Cyber Security Capabilities 5.3 The Cyber Security Government Market Sector 2014-2024 5.3.1 The Cyber Security Government Market Sector Forecast 5.3.2 Cyber Security Government Market Sector Analysis 5.3.3 Government Information Security: Not Wholly a New Phenomenon? 5.4 The Cyber Security Critical Infrastructure Market Sector 2014-2024 5.4.1 The Cyber Security Critical Infrastructure Market Sector Forecast 5.4.2 Cyber Security Critical Infrastructure Market Sector Analysis 5.4.3 Why the Scale of Critical National Infrastructure Remains Such a Challenge for Cyber Security 5.4.4 What Role Does the Public/Private Distinction Play in CNI Cyber Security Spending? 5.5 The Cyber Security Private Sector Market Sector 2014-2024 5.5.1 The Cyber Security Private Sector Market Sector Forecast 5.5.2 Cyber Security Private Sector Market Sector Analysis 5.5.3 Why the Threat of Cyber Attacks on Business Is Only Expected to Grow 5.5.4 Invisible Losses? Why Cyber Attacks Represent Real Losses Beyond The Balance Sheet 5.5.5 Opportunities and Requirements for Cyber Security Vendors in the Private Sector 5.5.6 How the Consumer Still Plays an Important Role in Cyber Security Spending www.visiongain.com
  • 9. Contents 6. Cyber Security Submarkets 2014-2024 6.1 Cyber Security Submarket Forecasts 2014-2024 6.2 The Cyber Security Network Security (NetSec) Submarket 2014-2024 6.2.1 The Cyber Security Network Security (NetSec) Submarket Forecast 6.2.2 Network Security Submarket Analysis 6.3 The Cyber Security Security Operations (SecOps) Submarket 2014-2024 6.3.1 The Cyber Security Security Operations (SecOps) Submarket Forecast 6.3.2 Security Operations Submarket Analysis 6.4 The Cyber Security Data Security (DataSec) Submarket 2014-2024 6.4.1 The Cyber Security Data Security (DataSec) Submarket Forecast 6.4.2 Data Security Submarket Analysis 6.5 The Cyber Security Identity & Access (ID&Acc) Submarket 2014-2024 6.5.1 The Cyber Security Identity & Access (ID&Acc) Submarket Forecast 6.5.2 Identity & Access Management 6.6 The Cyber Security Endpoint Security (EndSec) Submarket 2014-2024 6.6.1 The Cyber Security Endpoint Security (EndSec) Submarket Forecast 6.6.2 Endpoint Security Submarket Analysis 6.7 The Cyber Security Application Security (AppSec) Submarket 2014-2024 6.7.1 The Cyber Security Application Security (AppSec) Submarket Forecast 6.7.2 Application Security Submarket Analysis 6.8 The Cyber Security Cloud Security (CloudSec) Submarket 2014-2024 6.8.1 The Cyber Security Cloud Security (CloudSec) Submarket Forecast 6.8.2 Cloud Security Submarket Analysis 7. STEP Analysis of the Cyber Security Market 2014-2024 8. Expert Opinion 8.1 Symantec 8.1.1 Background & Position 8.1.2 What Are the Current Key Areas of Focus? 8.1.3 Is Proactive Defence an Outdated Concept for Cyber Security? 8.1.4 What Are the Current Key Trends in the Cyber Security Market? www.visiongain.com
  • 10. Contents 9. Leading Companies in the Cyber Security Market 9.1 BAE Systems 9.1.1 BAE Systems Analysis & Future Outlook 9.1.2 BAE Systems Competitors 9.1.3 BAE Systems Regional Emphasis / Focus 9.1.4 BAE Systems M&A Activity 9.2 Boeing Defense, Space and Security 9.2.1 Boeing Defense, Space and Security Analysis & Future Outlook 9.2.2 Boeing Defense, Space and Security M&A Activity 9.3 Booz Allen Hamilton, Inc. 9.3.1 Booz Allen Analysis & Future Outlook 9.3.2 Booz Allen M&A Activity 9.4 Computer Science Corporation (CSC) 9.4.1 CSC Analysis & Future Outlook 9.4.2 CSC M&A Activity 9.5 EADS (Airbus Group) 9.5.1 EADS/Airbus Analysis & Future Outlook 9.5.2 EADS/Airbus M&A Activity 9.6 General Dynamics Corporation Overview 9.6.1 General Dynamics Analysis & Future Outlook 9.6.2 General Dynamics M&A Activity 9.7 Hewlett Packard (HP) Company 9.8.1 HP Analysis & Future Outlook 9.8.2 HP Regional Emphasis / Focus 9.8.3 HP M&A Activity 9.8 International Business Machines (IBM) Corporation 9.8.1 IBM Analysis & Future Outlook 9.8.2 IBM Competitors 9.8.3 IBM Regional Emphasis / Focus 9.8.4 IBM M&A Activity 9.9 Intel Corporation (incl. McAfee, Inc.) 9.9.1 Intel Analysis & Future Outlook 9.9.2 Intel Competitors 9.9.3 Intel Regional Emphasis / Focus 9.9.4 Intel M&A Activity 9.10 L-3 Communications www.visiongain.com
  • 11. Contents 9.10.1 L-3 Communications Analysis & Future Outlook 9.10.2 L-3 Communications M&A Activity 9.11 Lockheed Martin Corporation 9.11.1 Lockheed Martin Analysis & Future Outlook 9.11.2 Lockheed Martin Competitors 9.11.3 Lockheed Martin Regional Emphasis / Focus 9.11.4 Lockheed Martin M&A Activity 9.12 Northrop Grumman Corporation 9.12.1 Northrop Grumman Analysis & Future Outlook 9.12.2 Northrop Grumman Regional Emphasis / Focus 9.12.3 Northrop Grumman M&A Activity 9.13 Raytheon Company 9.13.1 Raytheon Analysis & Future Outlook 9.13.2 Raytheon M&A Activity 9.14 Symantec Corporation 9.14.1 Symantec Analysis & Future Outlook 9.14.2 Symantec Competitors 9.14.3 Symantec Regional Emphasis / Focus 9.14.4 Symantec M&A Activity 9.15 Other Relevant Companies in the Cyber Security Market 10. Conclusions 10.1 The Cyber Security Market Outlook 2014-2024 10.2 Cyber Security Market Drivers & Restraints 10.3 Global Cyber Security Market Forecast 2014-2024 10.4 13 Leading National Cyber Security Market Forecasts 2014-2024 10.5 Cyber Security Market Sector Forecasts 2014-2024 10.6 Cyber Security Submarket Forecasts 2014-2024 10.7 Fastest Growing and Largest Cyber Security Markets 2014-2024 11. Glossary www.visiongain.com
  • 12. Contents List of Tables Table 1.1 Global Cyber Security Market Forecast Summary 2014, 2019, 2024 ($bn, CAGR %) Table 1.2 13 Leading National Market Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %) Table 1.2 Cyber Security Market Sector Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %) Table 1.3 Cyber Security Submarket Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %) Table 2.1 Types of Cyber Attack Table 2.2 Cyber Weapons Table 2.3 Cyber Defences Table 3.1 Global Cyber Security Market Drivers & Restraints Table 3.2 Global Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 3.3 Global Cyber Security Market; 13 Leading National Markets, Market Sectors & Submarkets Forecast CAGR (%) 2014-2024, 2014-2019, 2019-2024 Table 3.4 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2024 Table 3.5 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2019 Table 3.6 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2024 Table 3.7 Fastest Growing Cyber Security Markets Sectors Forecast CAGR (%) 2014-2024 Table 3.8 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2014-2019 Table 3.9 Fastest Growing Cyber Security Markets Sectors Forecast CAGR (%) 2019-2024 Table 3.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2024 Table 3.11 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2019 Table 3.12 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2019-2024 Table 3.13 Leading National Cyber Security Markets Share Forecast 2014, 2019 & 2024 (% Share, % Change) Table 3.14 Cyber Security Submarket Share Forecasts 2014, 2019 & 2024 (% Share, % Change) Table 3.15 Cyber Security Market Sectors Share Forecast 2014, 2019 & 2024 (% Share, % Change) Table 3.16 Cyber Security Global Market; Leading National Markets, Market Sectors, and Submarkets Cumulative Sales Forecast 2014-2024 ($bn, %) Table 4.1 Leading National Cyber Security Markets Forecast 2014-2024 ($bn, AGR %) Table 4.2 US Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.3 US Cyber Security Market Drivers & Restraints Table 4.4 US Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.5 Major US Cyber Security Contracts & Programmes Table 4.6 Chinese Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.7 Chinese Cyber Security Market Drivers & Restraints Table 4.8 Chinese Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.9 Japanese Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.10 Japanese Cyber Security Market Drivers & Restraints www.visiongain.com
  • 13. Contents Table 4.11 Japanese Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.12 Major Japanese Cyber Security Contracts & Programmes (Company, Value, Date, Details Table 4.13 German Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.14 German Cyber Security Market Drivers & Restraints Table 4.15 German Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.16 Major German Cyber Security Contracts & Programmes (Company, Date, Details) Table 4.17 UK Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.18 UK Cyber Security Market Drivers & Restraints Table 4.19 UK Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.20 Major UK Cyber Security Contracts & Programmes (Company, Value, Date, Details) Table 4.21 French Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.22 French Cyber Security Market Drivers & Restraints Table 4.23 French Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.24 Russian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.25 Russian Cyber Security Market Drivers & Restraints Table 4.26 Russian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.27 List of Russian and US Jointly Defined Cyber Terms Table 4.28 Major Russian Cyber Security Contracts & Programmes (Company, Value, Date, Details) Table 4.29 South Korean Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.30 South Korean Cyber Security Market Drivers & Restraints Table 4.31 Korean Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.32 Major South Korean Cyber Security Contracts & Programmes (Company, Date, Details) Table 4.33 Italian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.34 Italian Cyber Security Market Drivers & Restraints Table 4.35 Italian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.36 Canadian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.37 Canadian Cyber Security Market Drivers & Restraints Table 4.38 Canadian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.39 Major Canadian Cyber Security Contracts & Programmes (Company, Date, Details) Table 4.40 Israeli Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.41 Israeli Cyber Security Market Drivers & Restraints Table 4.42 Israeli Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.43 Major Israeli Cyber Security Contracts & Programmes (Company, Value, Date, Details) Table 4.44 Indian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.45 Indian Cyber Security Market Drivers & Restraints Table 4.46 Indian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) www.visiongain.com
  • 14. Contents Table 4.47 Major Indian Cyber Security Contracts & Programmes (Company, Date, Details) Table 4.48 Australian Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.49 Australian Cyber Security Market Drivers & Restraints Table 4.50 Australian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.51 Major Australian Cyber Security Contracts & Programmes (Company, Value, Date, Details) Table 4.52 ROW Cyber Security Market Forecast 2014-2024 ($bn, AGR %, CAGR%, Cumulative) Table 4.53 ROW Cyber Security Market Drivers & Restraints Table 4.54 ROW Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Table 4.55 Major ROW Cyber Security Markets Forecast 2014-2024 ($bn, AGR %) Table 4.56 Major ROW Cyber Security Contracts & Programmes (Company / Country, Value, Date, Details Table 5.1 Cyber Security Market Sector Forecasts 2014-2024 ($bn, AGR %) Table 5.2 Cyber Security Military Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 5.3 Cyber Security Military Market Sector Drivers & Restraints Table 5.4 Cyber Security Govt Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 5.5 Cyber Security Govt Market Sector Drivers & Restraints Table 5.6 Cyber Security Critical Infrastructure Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 5.7 Cyber Security Critical Infrastructure Market Sector Drivers & Restraints Table 5.8 List of Critical Infrastructures Table 5.9 Cyber Security Private Market Sector Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 5.10 Cyber Security Private Market Sector Drivers & Restraints Table 6.1 Cyber Security Submarket Forecasts 2014-2024 ($bn, AGR %) Table 6.2 Cyber Security NetSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.3 Cyber Security NetSec Submarket Market Drivers & Restraints Table 6.4 Cyber Security SecOps Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.5 Cyber Security SecOps Submarket Market Drivers & Restraints Table 6.6 Cyber Security DataSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.7 Cyber Security DataSec Submarket Market Drivers & Restraints Table 6.8 Cyber Security ID&Acc Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.9 Cyber Security ID&Acc Submarket Market Drivers & Restraints Table 6.10 Cyber Security EndSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.11 Cyber Security EndSec Submarket Market Drivers & Restraints Table 6.12 Cyber Security AppSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.13 Cyber Security AppSec Submarket Market Drivers & Restraints Table 6.14 Cyber Security CloudSec Submarket Forecast 2014-2024 ($bn, AGR %, CAGR %, Cumulative) Table 6.15 Cyber Security CloudSec Submarket Market Drivers & Restraints www.visiongain.com
  • 15. Contents Table 7.1 STEP Analysis of the Cyber Security Market 2014-2024 Table 9.1 14 Leading Companies in the Cyber Security Market 2013 (Company, Subsidiary Where Applicable) Table 9.2 BAE Systems Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.3 BAE Systems Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Expires, Details) Table 9.4 BAE Systems Cyber Security Products / Services (Division, Product, Specification) Table 9.5 BAE Systems Cyber Security Products/Services (Division, Product/Service, Details) Table 9.6 The Boeing Company (including BDS) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Website) Table 9.7 The Boeing Company Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Location, Details) Table 9.8 The Boeing Company Cyber Security Products/Services (Division, Product/Service, Details) Table 9.9 Booz Allen Hamilton Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.10 Booz Allen Hamilton Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Expires, Details) Table 9.11 Booz Allen Hamilton Cyber Security Products / Services (Division, Product/Service Product & Technology) Table 9.12 Computer Sciences Corporation (CSC) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.13 Computer Sciences Corporation (CSC) Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Details) Table 9.14 Computer Sciences Corporation (CSC) Cyber Security Products/Services (Division, Product/Service, Details) Table 9.15 Airbus Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.16 Airbus Major Cyber Security Contracts / Projects / Programmes (Date, Country, Value, Details) Table 9.17 Airbus Group Cyber Security Products/Services (Division, Product/Service, Details) Table 9.18 General Dynamics Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.19 General Dynamics Corporation Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.20 General Dynamics Corporation Cyber Security Products/Services (Division, Product/Service, Details) Table 9.21 Hewlett Packard Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) www.visiongain.com
  • 16. Contents Table 9.22 Hewlett Packard Company Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.23 Hewlett Packard Company Cyber Security Products/Services (Division, Product/Service, Details) Table 9.24 International Business Machines Corporation (IBM) Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.25 International Business Machines Corporation (IBM) Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.26 International Business Machines Corporation (IBM) Cyber Security Products / Services (Division, Product, Details) Table 9.27 Intel Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.28 Intel Corporation Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.29 Intel Corporation Cyber Security Products/Services (Division, Product/Service, Details) Table 9.30 L-3 Communications Holdings Inc Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, Global Market Share %,Subsidiaries in Cyber Security Market, HQ, Ticker, Website) Table 9.31 L-3 Communications Holdings Inc Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.32 L-3 Communications Holdings Inc Cyber Security Products/Services (Division, Product/Service, Description) Table 9.33 Lockheed Martin Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.34 Lockheed Martin Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.35 Lockheed Martin Corporation Cyber Security Products/Services (Division, Product/Service, Details) Table 9.36 Northrop Grumman Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.37 Northrop Grumman Corporation Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.38 Northrop Grumman Corporation Cyber Security Products/Services (Division, Product/Service, Details) Table 9.39 Raytheon Company Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.40 Raytheon Company Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Details) Table 9.41 Raytheon Company Cyber Security Products / Services (Division, Product/Service, Details) www.visiongain.com
  • 17. Contents Table 9.42 Symantec Corporation Overview 2012 (Total Revenue, Revenue from Cyber Security Market, % Revenue From Cyber Security Market, HQ, Ticker, Contact, Website) Table 9.43 Symantec Corporation Major Cyber Security Contracts / Projects / Programmes (Date, Subcontractors, Value, Expires, Details) Table 9.44 Symantec Cyber Security Products / Services (Division, Product, Details) Table 9.45 Symantec Corporation Cyber Security Products/Services (Product/Service) Table 9.46 Other Relevant Companies in the Cyber Security Market Table 10.1 Global Cyber Security Market Drivers & Restraints Table 10.2 Global Cyber Security Market Forecast Summary 2014, 2019, 2024 ($bn, CAGR %) Table 10.3 13 Leading National Market Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %) Table 10.4 Cyber Security Market Sector Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %) Table 10.5 Cyber Security Submarket Forecasts Summary 2014, 2019, 2024 ($bn, CAGR %) Table 10.6 Fastest Growing National Cyber Security Markets, Cyber Security Market Sectors & Cyber Security Submarkets 2014-2024 (CAGR %); Largest Cumulative National Cyber Security Markets, Cyber Security Market Sectors & Cyber Security Submarkets 2014-2024 ($m) www.visiongain.com
  • 18. Contents List of Figures Figure 2.1 Global Cyber Security Market Structure Overview Figure 2.2 Operation Shady RAT Targets Figure 3.1 Global Cyber Security Market Forecast 2014-2024 ($bn, AGR %) Figure 3.2 13 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2024 Figure 3.3 13 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2014-2019 Figure 3.4 13 Fastest Growing Leading National Cyber Security Markets Forecast CAGR (%) 2019-2024 Figure 3.5 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2014-2024 Figure 3.6 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2014-2019 Figure 3.7 Fastest Growing Cyber Security Market Sectors Forecast CAGR (%) 2019-2024 Figure 3.8 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2024 Figure 3.9 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2014-2019 Figure 3.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2019-2024 Figure 3.11 13 Leading National Cyber Security Markets Cumulative Sales Forecast 2014-2024 ($bn) Figure 3.12 13 Leading National Cyber Security Markets Cumulative Sales Share 2014-2024 (%) Figure 3.13 Cyber Security Market Sectors Cumulative Sales Forecast 2014-2024 ($bn) Figure 3.14 Cyber Security Market Sectors Cumulative Sales Share 2014-2024 (%) Figure 3.15 Cyber Security Submarkets Cumulative Sales Forecast 2014-2024 ($bn) Figure 3.16 Cyber Security Submarkets Cumulative Sales Share 2014-2024 (%) Figure 4.1 13 Leading National Cyber Security Markets Forecast 2014-2024 ($bn) Figure 4.2 13 Leading National Cyber Security Markets Share Forecast 2014 (%) Figure 4.3 13 Leading National Cyber Security Markets Share Forecast 2019 (%) Figure 4.4 13 Leading National Cyber Security Markets Share Forecast 2024 (%) Figure 4.5 13 Leading National Cyber Security Markets Percentage Share Change 2014-2024 (%) Figure 4.6 US Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.7 US Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.8 US Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.9 US Government and Military Cyber Organisational Structure Figure 4.10 US CYBERCOM Organisational Structure Figure 4.11 Chinese Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.12 Chinese Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.13 Chinese Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.14 Japanese Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.15 Japanese Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.16 Japanese Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.17 German Cyber Security Market Forecast 2014-2024 ($bn, AGR%) www.visiongain.com
  • 19. Contents Figure 4.18 German Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.19 German Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.20 UK Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.21 UK Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.22 UK Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.23 French Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.24 French Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.25 French Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.26 Russian Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.27 Russian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Table 4.28 Russian Cyber Security Sector Forecasts 2014-2024 ($bn, AGR %) Figure 4.29 South Korean Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.30 South Korean Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.31 Korean Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.32 Italian Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.33 Italian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.34 Italian Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.35 Canadian Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.36 Canadian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.37 Canadian Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.38 Israeli Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.39 Israeli Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.40 Israeli Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.41 Indian Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.42 Indian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.43 Indian Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.44 Australian Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.45 Australian Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.46 Australian Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.47 ROW Cyber Security Market Forecast 2014-2024 ($bn, AGR%) Figure 4.48 ROW Cyber Security Market Share Forecast 2014, 2019 and 2024 (% Share) Figure 4.49 ROW Cyber Security Sector Forecasts 2014-2024 ($bn) Figure 4.50 Major ROW Cyber Security Markets Forecast 2014-2024 ($bn) Figure 5.1 Cyber Security Market Sector Forecasts 2014-2024 ($bn) Figure 5.2 Cyber Security Market Sector Share Forecast 2014 (%) Figure 5.3 Cyber Security Market Sector Share Forecast 2019 (%) www.visiongain.com
  • 20. Contents Figure 5.4 Cyber Security Market Sector Share Forecast 2024 (%) Figure 5.5 Cyber Security Market Sector Shares Percentage Change 2014-2024 (%) Figure 5.6 Cyber Security Military Market Sector Forecast 2014-2024 ($bn, AGR %) Figure 5.7 Cyber Security Military Market Sector Share Forecast 2014, 2019 and 2024 (% Share) Figure 5.8 Cyber Security Govt Market Sector Forecast 2014-2024 ($bn, AGR %) Figure 5.9 Cyber Security Govt Market Sector Share Forecast 2014, 2019 and 2024 (% Share) Figure 5.10 Cyber Security Critical Infrastructure Market Sector Forecast 2014-2024 ($bn, AGR %) Figure 5.11 Cyber Security Critical Infrastructure Market Sector Share Forecast 2014, 2019 and 2024 (% Share) Figure 5.12 Cyber Security Private Market Sector Forecast 2014-2024 ($bn, AGR %) Figure 5.13 Cyber Security Private Market Sector Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.1 Cyber Security Submarket Forecasts 2014-2024 ($bn) Figure 6.2 Cyber Security Submarkets Share Forecast 2014 (%) Figure 6.3 Cyber Security Submarkets Share Forecast 2019 (%) Figure 6.4 Cyber Security Submarkets Share Forecast 2024 (%) Figure 6.5 Cyber Security Submarkets Percentage Share Change 2014-2024 (%) Figure 6.6 Cyber Security NetSec Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.7 Cyber Security NetSec Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.8 Cyber Security SecOps Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.9 Cyber Security SecOps Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.10 Cyber Security DataSec Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.11 Cyber Security DataSec Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.12 Cyber Security ID&Acc Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.13 Cyber Security ID&Acc Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.14 Cyber Security EndSec Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.15 Cyber Security EndSec Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.16 Cyber Security AppSec Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.17 Cyber Security AppSec Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 6.18 Cyber Security CloudSec Submarket Forecast 2014-2024 ($bn, AGR %) Figure 6.19 Cyber Security CloudSec Submarket Share Forecast 2014, 2019 and 2024 (% Share) Figure 9.1 BAE Systems Company Structure 2013 Figure 9.2 Boeing Company Structure 2013 Figure 9.3 Computer Sciences Corporation (CSC ) Inc Structure 2013 Figure 9.4 Airbus Defence & Space Structure 2013 Figure 9.5 General Dynamics Corporation Company Structure 2013 Figure 9.6 Hewlett Packard Company Structure 2013 Figure 9.7 International Business Machines Corporation (IBM) Structure 2013 www.visiongain.com
  • 21. Contents Figure 9.8 Intel Corporation Structure 2013 Figure 9.9 L-3 Communications Holdings Inc Structure 2013 Figure 9.10 Lockheed Martin Corporation Structure 2013 Figure 9.11 Raytheon Company Structure 2013 Figure 9.12 Symantec Corporation Structure 2013 www.visiongain.com
  • 22. Contents Companies Mentioned in This Report 3Di Technologies LLC 42Six Solutions LLC ACS Advanced C4 Systems Inc. Advanced Content Services Inc Advanced Micro Devices AfreecaTV Co Ltd AhnLab, Inc. Airbus Defence & Space Airbus Group Airbus Military Akamai Technologies ALEX-AS, J.V. ALON, Inc. Anagran Antiy Labs Apple Applied Visions, Inc ArcSight Argon ST ARINC Arkoon Network Security Asgent Inc Assured Information Security, Inc Astrium AT&T Atac Atheeb NetSol ATR Autonomy AVAST Software AVG Technologies BAE Systems BAE Systems Australia BAE Systems Detica www.visiongain.com
  • 23. Contents BAE Systems Electronic Systems (ES) BAE Systems India BAE Systems Land & Armaments (L&A) BAE Systems Maritime BAE Systems Military Air & Information (MA&I) BAE Systems Regional Aircraft BAE Systems Saudi Arabia BAE Systems Shared Services BAE Systems Support Solutions Barracuda Networks Inc BBN Technologies Beijing VRV Software Corp Ltd Bell Canada Blue Screen IT Ltd Blue Sun Media Inc Boeing Defense, Space and Security Boeing Information Solutions Boeing Network & Space Systems Bombardier Booz & Company Booz Allen Hamilton Inc. BreakingPoint Systems British Gas British Telecom (BT) Business Computers Management Consulting Group, LLC Business Integra Technology Solutions, Inc. Byres Security CACI, Inc. Camber Corporation Cassidian CyberSecurity CGI Logica Check Point Software Technologies Ltd China Telecom Cisco Systems, Inc CloudShield Technologies, Inc. Columbia University www.visiongain.com
  • 24. Contents CommVault Systems Inc Computer Science Corporation Computer Sciences Canada Inc. Corero Network Security Cosentini Associates Creative Computing Solutions CrySyS Lab CSC North American Public Sector Defense Group Cubic XD CyberArk Software Danaher Corporation Defense Systems Engineering & Support Def-Logix Dell Corporation Detica Group plc Detica NetReveal Diebold Digital Arts Inc DMI DRC Systems Dynamic Network Enterprises, Inc. EADS Cassidian EADS Group (Airbus) El Al Israel Airlines Ltd Elbit Systems EMC Corporation EmeSec Inc. Emiraje Systems Enel Enterprise Information Services ETI Eurocopter Exelis, Inc. Exida Canada Exobox Technologies Corp Experian www.visiongain.com
  • 25. Contents Federal Management Systems, Inc. Fidelis Cybersecurity Solutions Fidelis Security Solutions Inc Finmeccanica SpA FireEye, Inc. Fondation Télécom Foreground Security Fortify Software F-Secure Corporation Fujitsu Galois General Dynamics Advanced Information Systems General Dynamics Canada General Dynamics Corporation General Dynamics UK Georgia Tech Research Corp Gideon technologies Global Info Tek, Inc. Google Group-IB GuardianEdge Gulfstream H3G Hangzhou Shunwang Technology Co Ltd Harris Corporation Harris Government Communications Systems Harris Integrated Network Solutions HAURI Inc Henggeler Computer Consultants, Inc. Hewlett Packard Corporation (HP) HighAction, LLC Honeywell, Inc. HP Enterprise Business HP Mobility Global Business HP Software HRL Laboratories, LLC www.visiongain.com
  • 26. Contents Huawei Technologies Ltd i2 IBM Global Business Services (GBS) IBM Global Financing IBM Global Technology Services (GTS) IBM Integrated Supply Chain (ISC) IBM Research IBM Software ICL Igloo Security Inc IHI Corporation Imagine One StraCon Venture, LLC Infineon Technologies AG Injazat In-Q-Tel Intel Corporation International Business Machine (IBM) Corporation International Computer Science Institute Intrusion Inc Invincea iPass Inc ISC8, Inc. ISHPI Information Technologies, Inc. ITT Advanced Engineering & Sciences Division Ivincea Johnson Controls Juniper Networks Jupiter Networks Kaspersky Labs Kawasaki Heavy Industries KCG Kestrel Technology, LLC KEYW KISA Knownsec Kollmorgen Electro-Optical www.visiongain.com
  • 27. Contents Kratos Defence Kratos Defense & Security Solutions, Inc. KT Corporation L-3 Advanced Laser Systems Technologies Inc L-3 Aeromet L-3 Airborne Technologies Inc L-3 Ami L-3 Army Fleet Support L-3 ASA L-3 ComCept L-3 Comms Systems East L-3 Comms Systems West L-3 Communications L-3 Crestview Aerospace L-3 Integrated Optical Systems L-3 KEO L-3 MAS L-3 Mission Integration L-3 Photonics L-3 Platform Integration L-3 Services, Inc. L-3 STRATIS L-3 Systems Field Support L-3 TCS L-3 WESCAM Lacoon Mobile Security Lacoon Security Ltd Leidos LETA Group LGS Innovations LiveOffice Lockheed Martin Aeronautics Lockheed Martin Australia Lockheed Martin Canada Lockheed Martin Corporation Lockheed Martin Electronic Systems (ES) www.visiongain.com
  • 28. Contents Lockheed Martin Information Systems & Global Solutions (IS&GS) Lockheed Martin Space Systems Lockheed Martin UK Lockheed Martin’s Information Systems & Global Solutions Division M5 Network Security Pty Ltd MacAulay-Brown Inc. Macquarie Telecom Mandiant ManTech International Corporation MasterCard McAfee Inc. MEI Technologies Merit Network Inc Merlin RAMCo MessageLabs MHI Mi5 Networks Microsoft Corporation MicroTech Mitsubishi Heavy Industries Mobile Vault Inc Mobilityone Ltd Narus National Agricultural Cooperatives Federation (Nonghyup) Neoarena Inc NetApp, Inc. Netasq NetentSec NetSol Technologies, Inc. NetWitness Corporation Network Security Systems Plus, Inc. New York Times NexG Co Ltd Nicstech Co Ltd NitroSecurity Northrop Grumman Corporation www.visiongain.com
  • 29. Contents Northrop Grumman Information Systems Norton Nukona Nutrisystem, Inc. Oasis Systems Oculis Labs Odyssey Software Odyssey Technologies Ltd One Source Palantir Technologies Inc Panda Security Paradigm Technologies Petrobras PGP Corporation Pikewerks Corporation Plantynet Co Ltd Q1 Labs Qihoo 360 Technology Co. Ltd Qinetiq Group Plc QinetiQ North America Radiance Technologies, Inc. Raytheon BBN Technologies Raytheon Company Raytheon Company Cyber Security Solutions Raytheon Company Intelligence & Information Systems Raytheon UK RLM Communications, Inc. Rockwell Collins Rolls-Royce RSA (EMC) Safenet SAIC SAIC Defense Solutions Group (DSG) SAIC Health, Energy and Civil Solutions Group (HECSG) SAIC Intelligence, Surveillance, and Reconnaissance Group (ISRG) SAIC, Inc. (Leidos) www.visiongain.com
  • 30. Contents Salient Federal Solutions, Inc. Sandia Corporation Saudi Aramco Schneider Electric Secure Computing Secure Digital Inc Secure Tech Selex Finmeccanica Senetas Corp Ltd Sentek Consulting, Inc. Sentrigo Serco Skolkovo Foundation Skype Skyscape SMSi SoftScan Software Box Ltd Sogeti Sojitz Corporation Solana Networks Solutions Made Simple Inc Sony Corporation Sony7 Sotera Defense Solutions, Inc. (prev. Global Defence Technologies & Systems Inc. ) Sparta Inc. Spirent Communications SRA International, Inc. Stratavia Strategic Operational Solutions, Inc. STRATIS stratsec.net Strikeforce Technologies Inc STS Group Sukhoi Symantec Corporation www.visiongain.com
  • 31. Contents Symantec Corporation Consumer Business Symantec Corporation Enterprise Products and Services Symantec Corporation Enterprise Security Symantec Corporation Information Management Symantec Corporation SMB and Symantec.cloud SynApps Solutions Taia Global, Inc. Technica TeleCommunication Systems, Inc. Teligy Telstra Tempest Security Intelligence Thales Aerospace Thales Alenia Space Thales Communications & Security (C&S) Thales Defence Thales Group Thales Raytheon Systems Thales UK The Boeing Company The Economist The Washington Post Times of India TISTA Science and Technology Corp Trend Micro Inc Trusteer Trustwave TWD & Associates VASCO Data Security International Inc Venustech Verint Systems VeriSign Inc Verizon Communications, Inc. Vertica Systems VMWare, Inc. Vulnerability Research Labs www.visiongain.com
  • 32. Contents VulnHunt Waterfall Security Solutions Ltd WIJET, LLC xInformation Systems Security Your Internet Defender Inc YouTube Zix Corp ZTE Corporation www.visiongain.com
  • 33. Contents Government Agencies and Other Organisations Mentioned in This Report American Civil Liberties Union (ACLU) Anonymous Australian Attorney-General’s Department Australian Customs and Border Protection Service Australian Cyber Security Operations Centre (CSOC) Australian Defence Force Australian Defence Force Academy Australian Defence Intelligence Organisation Australian Defence Science and Technology Organisation Australian Defence Science and Technology Organisation (DSTO) Australian Defence Signals Directorate (DSD) Australian Department of Agriculture, Fisheries, and Forestry Australian Department of Broadband, Communications, and the Digital Economy Australian Department of Defence Australian Federal Police Australian Government Australian Government Information Management Office (AGIMO) Australian Secret Intelligence Service (ASIS) Australian Security Intelligence Organisation Brazilian Air Force Brazilian Armed Forces Brazilian Army Brazilian Army’s Cyber Defence Centre Brazilian CBCyber Brazilian Federation of Banks (Febraban) Brazilian Ministry of Science Technology Brazilian National Computer Emergency Response Team (CERT) Brazilian Navy Brazilian Stock Exchange Bristol Security Centre Bristol University British Broadcasting Corporation (BBC) Canadian Communications Security Establishment Canadian Cyber Incident Response Centre Canadian Department of National Defence www.visiongain.com
  • 34. Contents Canadian Department of Public Safety and Emergency Preparedness Chinese Anti-Virus Products Testing and Certification Centre Chinese General Office of the CPC Central Committee Chinese General Office of the State Council Chinese Information Security Certification Centre Chinese Information Technology Security Evaluation Centre Chinese National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) Chinese National Research Centre for Anti-Computer Invasion and Virus Prevention Chinese People’s Liberation Army (PLA) Chinese Quality Supervision and Test Centre of Security Products for Computer Information System of the Ministry of Public Security Columbia University Commonwealth of Massachusetts Executive Office of Health and Human Services Cyber Security Research Alliance (CRSA) Danish Defence Ministry Danish Forsvarets Efterretningstjeneste Danish Parliament DarkSeoul Defence Research and Development Canada Def-Logix East West Institute Electronic Frontier Foundation (EFF) European Commission (EC) European Council/EU European Network and Information Security Agency (ENISA) European Union Committee EUROPOL Executive Office US Attorneys (EOUSA) Foreign Ministry, People’s Republic of China French Agence nationale de la sécurité des systèmes d'information (ANSSI) French Commission Nationale de l’informatique et des Libertés (National Data Protection Authority) French Defense Ministry French Navy French Senate Committee on Foreign Affairs, Defence & Armed Forces G8 (Group of Eight) www.visiongain.com
  • 35. Contents George Mason University German Bundeswehr German Customs Criminological Office German Federal commissioner for Date Protection and Freedom of Information German Federal Criminal Police Office German Federal Criminal Post Office German Federal Intelligence Service German Federal Ministry for Economics and Technology German Federal Ministry of the Interior German Federal Network Agency for Gas, Telecommunications, Post and Railway German Federal Office for Information Security German Federal Office for Information Technology German Federal Office for the Protection of the Constitution German Federal Office of Civil Protection and Disaster Assistance German Federal Police German Nationaler Cyber-Sicherheitsrat (NCS, Cyber Security Council) German Nationales Cyber-Abwehrzentrum (NCAZ, National Cyber Response Centre) Hezbollah IBM Institute for Advanced Security ICT KTN Indian Armed Forces Indian CERT-In (Computer Emergency Response Team) Indian Defence Intelligence Agency (DIA) Indian Defence Research and Development Organisation (DRDO) Indian Department of Electronics and Information Technology Indian Department of Telecommunications Indian Government Indian Joint Working Group (JWG) on Cyber Security Indian Minister of State for Communications and Information Technology Indian Ministry of Communication and Information Technology (MCIT) Indian Ministry of Defence Indian Ministry of Human Resource Development (MHRD) Indian National Association of Software Services Companies Indian National Critical Information Infrastructure Protection Centre Indian National Security Council Secretariat (NSCS) Indian National Technical Research Organisation (NTRO) www.visiongain.com
  • 36. Contents Indian Navy (IN) Indonesian Communications and Information Ministry Information Security Institute, Moscow State University International Security Assistance Force (ISAF) ISA Security Compliance Institute Israeli Air Force (IAF) Israeli Cabinet Israeli Defence Force (IDF) Israeli Ministry of Defence Directorate for Research and Development Israeli Ministry of Defence Directorate for Research and Development Israeli Mossad Israeli National Cyber Bureau Israeli National Cyber Committee Israeli National Cyber Directorate (NCD) Israeli Science and Technology Ministry Israeli Security Agency Israeli Shin Bet Italian Postal and Communication Police Service Japan Information Security Audit Association (JASA) Japan Information-Technology Promotion Agency Japan Information-technology Promotion Agency Japan Network Security Association (JNSA) Japanese Defence Ministry Japanese Information Security Policy Council Japanese Internal Affairs and Communications Ministry Japanese ISA Security Compliance Institute Japanese Ministry of Economy, Trade and Industry (METI) Japanese National Information Security Center (NISC) Japanese National Police Agency (NPA) Japanese SDF Command, Control, Communication, & Computers Systems Command (C4SC) Japanese Self-Defence Force (JSDF) Johns Hopkins University Kansas State University (KSU) Khalifa University Korea Communications Commission (KCC) Korea Information Security Industry Association (KISIA) www.visiongain.com
  • 37. Contents Korea Telecommunication Corporation Korean National Cyber Security Centre Korean National Intelligence Service Kuwait Ministry of Commerce and Industry Lancaster University Queen’s University Belfast LM Cyber Security Alliance LulzSec MAHER Center of Iranian National Computer Emergency Response Team Morgridge Institute for Research Mossad National Computer Network Emergency Response Coordination Centre of China National Information Communications Technology Australia (NICTA) NATO (North Atlantic Treaty Organisation) Naval Postgraduate School North Atlantic Treaty Organisation (NATO) Oak Ridge National Laboratory OECD (Organisation for Economic Co-operation and Development) Organisation for Security and Co-operation in Europe Organisation of Economic Co-operation and Development OSCE (Organisation for Security and Co-operation in Europe) Pacific NW National Laboratory Public Safety Canada Purdue University Royal United Services Institute (RUSI) Russian – Bulgarian Joint working Group on Information Society and Communication Technologies Russian Federal Security Service (FSB) Russian Federal Service for Technical and Export Control (FSTEC) Russian Security Council Rutgers University - New Brunswick Campus Security and Defence Agenda Security and Defence Agenda Think Tank Shanghai Cooperation Organisation (SCO) Singapore Info-communications Technology Security Authority (SITSA) Singaporean Infocomm Development Authority Singaporean Ministry of Home Affairs www.visiongain.com
  • 38. Contents Singaporean National Cyber Security Centre (NCSC) Soon Chun Hyang University South Africa Cabinet South Africa State Security Agency (SSA) South African National Cyber Security Advisory Council South Korean Ministry of Science and Technology St Cyr Coëtquidan Academy Stanford University Tel Aviv Stock Exchange Thai Computer Emergency Response Team Thai Information and Communications Technology Ministry Thailand National Cyber Security Policy Committee The Boeing Cyber Engagement Center (CEC) The Trustees of Princeton University The University of Alabama at Birmingham The University of North Carolina at Chapel Hill Trustees of Dartmouth College Trustees of Indiana University UK Cabinet Office UK Cyber Security Evaluation Centre UK Defence Industrial Base (DIB) UK Department for Business Innovation & Skills UK Department for Business, Innovation and Skills (BIS) UK Engineering and Physical Sciences Research Council (EPSRC) UK Environment Agency UK Foreign and Commonwealth Office (FCO) UK GCHQ (Government Communications Headquarters) UK Home Office UK Ministry of Defence (MOD) UK Ministry of Justice (MOJ) UK National Crime Agency UK National Technical Authority for Information Assurance (CESG) UK Public Services Network UK Royal Air Force (RAF) UN (United Nations) United Nations (UN) www.visiongain.com
  • 39. Contents Universiti Malaya (UM) University of Arizona University of California, San Diego University of Illinois at Urbana-Champaign University of Lancaster University of Maryland University of Maryland University of Minnesota University of Southern California Information Sciences Institute University of Texas US 1st Information Operations Command (Land) (1st IO (Land)) US 780th Military Intelligence Brigade US 9th Army Signal Command (NETCOM/9th SC) US Air Force US Air Force Cyber Command (AFCYBER) US Air Force Medical Services (AFMS) US Air Force Office of Special Investigations (AFOSI) US Air Force Research Laboratory (AFRL) US Antarctic Program (USAP) US Army US Army Forces Cyber Command (ARCYBER) US Army Intelligence and Security Command (INSCOM) US Army Network Enterprise Technology Command (NETCOM) US Army Research Laboratory (ARL) US Centers for Medicare & Medicaid Services (CMS) US Central Intelligence Agency (CIA) US Chamber of Commerce US Coast Guard US Commonwealth of Massachusetts’ Executive Office of Health and Human Services US Computer Emergency Readiness Team US Computer Emergency Readiness Team (US CERT) US Congress US CYBERCOM US Defense Advanced Research Projects Agency (DARPA) US Defense Industrial Base (DIB) US Defense Information Systems Agency (DISA) www.visiongain.com
  • 40. Contents US Defense Intelligence Agency (DIA) US Department for Homeland Security (DHS) US Department of Defense (DOD) US Department of Homeland Security Science and Technology Directorate (DHS S&T) US Department of Justice (DOJ) US Department of Justice’s Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) US Department of State US Department of State's Bureau of Diplomatic Security US Department of Transportation's Research and Innovative Technology Administration US DHS S&T Cyber Security Division (CSD) US DOD Defense Industrial Base (DIB) Cyber Security Task Force US DOD Manpower Data Centre (DMDC) US Federal Bureau of Investigation (FBI) US Federal Government US Fleet Cyber Command (FLTCYBERCOM) US General Accountability Office (GAO) US General Services Administration US House Intelligence Committee US House of Representatives US Joint Operations Center of the Integrated Cyber Center US Marine Corps (USMC) US Marine Corps Cryptologic Support Battalion’s (MCSB) US Marine Corps Cyberspace Command (MARFORCYBER) US Marine Corps Network Operations Security Center (MCNOSC) US Marshals Service (USMS) US National Cyber Response Co-ordination Group (NCRCG) US National Cyber Security and Communications Integration Center US National Cyber Security Center US National Cyber Security Division US National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC) US National Protection and Programs Directorate (NPPD) US National Security Agency (NSA) US Naval Academy US Naval Information Operation Commands (NIOC) US Naval Network Warfare Command (NNWC) US Naval Supply Systems Command (NAVSUP) Fleet Logistics Center www.visiongain.com
  • 41. Contents US Navy Cyber Defense Operations Command (NCDOC) US NSTIC (National Strategies on Trusted Identities in Cyberspace) US Office of Cyber Security and Communications (CS&C) US Office of the Chief Information Officer US Office of the Chief Information Officer’s Information Assurance Division US Pentagon US Pentagon's Cyber Crime Center US Secret Service US Securities and Exchange Commission (SEC) US Senate US Southern Command US Space and Naval Warfare Systems Center US Space and Naval Warfare Systems Center (SSC) US Space and Naval Warfare Systems Command (SPAWAR) US Special Operations Command (SOCOM) US Strategic Command (STRATCOM) US Transportation Security Administration (TSA) US-China Economic and Security Review Commission Wikileaks World Bank www.visiongain.com
  • 42. Cyber Security Market Forecast 2014-2024: Prospects for Leading Companies in Military, Government, Critical Infrastructure & Private Sector Protection 4.13.3 Indian Cyber Security Market Analysis The Indian cyber security market is forecast by Visiongain to be the fastest growing leading national cyber security market over the period 2014-2024. The Indian cyber security market is expected to achieve a massive CAGR of 17.7% across the ten year forecast period, with an equally high CAGR of 38.9% for 2014-2019. Partially as a response to numerous institutional failings, Visiongain anticipates that India will be the darling of the cyber security market, with highly significant increases in spending expected for 2014 by the Indian government and military to rectify potentially crippling vulnerabilities. However, this initial growth is not an anomaly, spending by the private sector and on critical infrastructure is expected to be similarly high. In all sectors, growth is generally expected to be stronger earlier in the forecast, with spending levelling off as the forecast period develops; even so, growth is expected to remain substantial even in the long term. Over the course of the forecast period, the Indian cyber security market is projected to increase nearly tenfold, a figure which should underscore its immense potential for interested parties. 4.13.4 Can the Indian Government Translate Words Into Deeds On Cyber Security? In previous years, cyber security has been a recurrent theme of Indian political discourse, although this has, until recently, failed to translate into spending or direct results. Evidence of cyber security incidents illustrates that significant growth from less than three hundred in 2005 to more than fifteen thousand in 2012. While not having caused excessive damage, the attacks have been acutely embarrassing to the Indian government, with a July 2012 attack on India’s CERT-In bringing the cyber unit’s website down for five hours. With India’s regional security situation evolving to accommodate an ever expanding array of threats, particularly from Pakistan and the PRC who are believed to account for most attacks, the threat is certain to grow. The response to the growing threat has been publically forthcoming, with a major Joint Working Group releasing its Recommendations in October 2012 (emphasising the need to work through existing structures, increase the role of PPPs, grow existing numbers of cyber security personnel, and achieve greater overall holism). In July 2013, this was followed by the National Cyber Security Policy (by the Ministry of Communication and Information Technology) which formalised and codified many of these earlier policy directives. Several key areas have direct relevance for the future Indian cyber security market: • The expansion of the Indian cyber security personnel pool by 500,000 by 2018. www.visiongain.com Page 190
  • 43. Cyber Security Market Forecast 2014-2024: Prospects for Leading Companies in Military, Government, Critical Infrastructure & Private Sector Protection 4.14.1 Australian Cyber Security Market Forecast Visiongain has judged that the Australian cyber security market was worth $0.90bn in 2013. Visiongain forecasts that the Australian cyber security market will record an annual growth rate (AGR) of 12.6% in 2014, resulting in the value of the Australian cyber security market increasing to $1.01bn in 2014. Over the forecast period 2014-2024, the Australian cyber security market is forecast to achieve a compound annual growth rate (CAGR) of 8.7%, producing a market projection of $2.34bn in 2024. For the period 2014-2019, a CAGR of 8.8% is expected for the Australian cyber security market, with a CAGR of 8.7% projected for the period 2019-2024. The Australian cyber security market was determined by Visiongain to account for 1.3% of the global cyber security market in 2014. The Australian cyber security market is expected to be worth 1.6% of the global cyber security market by 2024. Cumulative spending for the Australian cyber security market is projected to reach $17.67bn from 2014-2024, representing 1.4% of the cumulative spending total for the global cyber security market in the years 2014-2024. Table 4.48, along with Figures 4.44 and 4.45, shows the Australian cyber security market forecast, in terms of sales ($bn), annual growth rates (AGR) (%), and compound annual growth rates (CAGR). Table 4.49 below provides an overview of the drivers and restraints for the Australian cyber security market. Table 4.49 Australian Cyber Security Market Drivers & Restraints Drivers Restraints • Continued government focus • Increased regional tensions driving evolving threat landscape • Recent efforts have lost emphasis; losing sight of the threat • Bilateral agreements not focused on regional security Dispersed inhabitation generating additional vulnerability to communications • • • Political pressure limiting governmental freedom of action Increased regional role • Improved bilateral posture with US Source: Visiongain 2014 www.visiongain.com Page 197
  • 44. Cyber Security Market Forecast 2014-2024: Prospects for Leading Companies in Military, Government, Critical Infrastructure & Private Sector Protection 01/2012 N/A US 2 2015 Systems-Army Cloud Fellow-On Booz Allen received a contract with the US SOCOM to provide Special Operations Forces Data Layer Application Maintenance Source: Visiongain 2014 Table 9.11 Booz Allen Hamilton Cyber Security Products / Services (Division, Product/Service Product, Details) Company Division Cyber Technologies Cyber Solutions Product/Service eDiscovery Details Assessment and Gap analysis Data mapping of IT infrastructure Electronic and paper management protocol definition Integration of records management Program implementation Advanced eDiscovery analytics Systems and electronic data management Assurance and Resilience Systems security engineering Cyber security operations Certifications and compliance Enterprise security management Enterprise and systems resilience Security Development Life Training Cycle Lifecycle governance and organizational software assurance infrastructure Requirements Booz Allen Cyber Advanced cyber analytics Solutions Network Computer network defence Cyber product testing and evaluation Advanced cyber training International Policy, management, technology, Cybersecurity people, and operations Source: Visiongain 2014 www.visiongain.com Page 284