IT Security Market in China 2015-2019

Published: Apr 2015 Pages: 98 SKU: IRTNTR5643

About IT Security
IT security protects system data and information over a network. It prevents unauthorized access of data and also prevents its modification. IT security deals with the measures taken to detect, monitor, report, and counter data threats. It includes security hardware, software, and services that focuses on security of important parameters, which includes email security, data protection, compliance, web security, data loss prevention, architecture, governance, security information and event management, and identity and access. IT security has been gaining prominence over the years with an increase in data hacking activities, which cannot be addressed by traditional defense mechanisms.

TechNavio's analysts forecast the IT Security market in China to grow at a CAGR of 11.39 percent over the period 2014-2019.

Covered in this Report
The report covers the present scenario and growth prospects of the IT Security market in China for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the following product segments of the IT Security market in China:

• Hardware: Integrated Firewall/VPN, UTM, Content Management, IPS, IDS, and VPN
• Services
• Software

The major end-users listed in the market are described below:
• SMEs: This segment includes organizations that have less than 10,000 employees and generate revenue of less than US$100 million
• Large Enterprises: This segment includes organizations that have more than 10,000 employees and generate revenue of more than US$100 million
• Government Organizations: This segment includes all government agencies and institutions that are funded and managed by government authorities
TechNavio's report, IT Security Market in China 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Vendors
• CA Technologies
• Check Point Software
• Cisco Systems
• Emc²
• IBM
• Juniper Networks
• Symantec

Other Prominent Vendors
 • Dell SonicWALL
• Fortinet
• F-Secure
• McAfee
• Sophos
• TrendMicro
 
Market Driver
• Increased Dependency on Internet
• For a full, detailed list, view our report

Market Challenge
• High Implementation Cost
• For a full, detailed list, view our report

Market Trend
• Increased Demand for Cloud-based Security Solutions
• For a full, detailed list, view our report

Key Questions Answered in this Report
• What will the market size be in 2019 and what will the growth rate be?
• What are the key market trends?
• What is driving this market?
• What are the challenges to market growth?
• Who are the key vendors in this market space?
• What are the market opportunities and threats faced by the key vendors?
• What are the strengths and weaknesses of the key vendors?

01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
03.2 Product Offerings
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Types of Threats
06.1.1 Trojan
06.1.2 Virus
06.1.3 Worms
06.1.4 Adware
06.1.5 Keylogger
06.1.6 Backdoor
06.1.7 Exploit
06.1.8 Dropper
06.1.9 Phishing
06.1.10 Cookies
06.1.11 Bluesnarfing
06.1.12 Boot Sector Virus
06.1.13 Browser Hijackers
06.1.14 Mousetrapping
06.1.15 Obfuscated Spam
06.1.16 Crimeware
06.2 Components of IT Security
06.3 Advantages of IT Security
07. Market Landscape
07.1 Market Overview
07.1.1 Market Structure
07.1.2 Market Size and Forecast
07.2 Share of China in IT Security Market in APAC Region
07.3 Five Forces Analysis
08. BYOD Implementation: Market Opportunities
09. Product Lifecycle Analysis by Products
10. Market Segmentation by Products
10.1 IT Security Market in China by Products 2014
10.2 IT Security Market in China by Products 2014-2019
10.3 IT Security Hardware Market in China
10.3.1 Market Size and Forecast
10.3.2 Market Segmentation by Product
10.3.3 Integrated Firewall/VPN Market in China
10.3.4 UTM Market in China
10.3.5 IPS Market in China
10.3.6 Content Management Market in China
10.3.7 VPN Market in China
10.3.8 IDS Market in China
10.4 IT Security Services Market in China
10.4.1 Market Size and Forecast
10.5 IT Security Software Market in China
10.5.1 Market Size and Forecast
11. Market Attractiveness
11.1 Market Attractiveness by Products
12. Buying Criteria
13. Market Growth Drivers
14. Drivers and their Impact
15. Market Challenges
16. Impact of Drivers and Challenges
17. Market Trends
18. Trends and their Impact
19. Vendor Landscape
19.1 Competitive Scenario
19.2 Vendor Analysis 2014
19.2.1 Comparison of Vendors based on Applications Offered
19.2.2 Key News
19.2.3 Mergers and Acquisitions
19.3 Other Prominent Vendors
20. Key Vendor Analysis
20.1 CA Technologies
20.1.1 Key Facts
20.1.2 Business Overview
20.1.3 Business Segmentation by Revenue 2013
20.1.4 Business Segmentation by Revenue 2012 and 2013
20.1.5 Geographical Segmentation by Revenue 2013
20.1.6 Business Strategy
20.1.7 Recent Developments
20.1.8 SWOT Analysis
20.2 Check Point Software
20.2.1 Key Facts
20.2.2 Business Overview
20.2.3 Business Strategy
20.2.4 Recent Developments
20.2.5 SWOT Analysis
20.3 Cisco Systems
20.3.1 Key Facts
20.3.2 Business Overview
20.3.3 Business Segmentation by Revenue
20.3.4 Geographical Segmentation by Revenue
20.3.5 Business Strategy
20.3.6 Key Information
20.3.7 SWOT Analysis
20.4 Emc²
20.4.1 Key Facts
20.4.2 Business Overview
20.4.3 Business Segmentation by Revenue 2013
20.4.4 Business Segmentation by Revenue 2012 and 2013
20.4.5 Geographical Segmentation by Revenue 2013
20.4.6 Business Strategy
20.4.7 Recent Developments
20.4.8 SWOT Analysis
20.5 IBM
20.5.1 Key Facts
20.5.2 Business Description
20.5.3 Business Segmentation
20.5.4 Revenue Segmentation by Business Segment
20.5.5 Revenue Segmentation by Business Operation
20.5.6 Revenue Comparison of Business Segments 2012 and 2013
20.5.7 Revenue Segmentation by Geography
20.5.8 Business Strategy
20.5.9 Key Developments
20.5.10 SWOT Analysis
20.6 Juniper Networks
20.6.1 Key Facts
20.6.2 Business Overview
20.6.3 Business Segmentation
20.6.4 Business Segmentation by Revenue 2012 and 2013
20.6.5 Sales by Geography 2013
20.6.6 Business Strategy
20.6.7 Recent Developments
20.6.8 SWOT Analysis
20.7 Symantec
20.7.1 Key Facts
20.7.2 Business Overview
20.7.3 Business Segmentation by Revenue 2013
20.7.4 Business Segmentation by Revenue 2013 and 2014
20.7.5 Geographical Segmentation by Revenue 2013
20.7.6 Business Strategy
20.7.7 Recent Developments
20.7.8 SWOT Analysis
21. Other Reports in this Series

Research Framework

Technavio presents a detailed picture of the market by way of study, synthesis, and summation of data from multiple sources. The analysts have presented the various facets of the market with a particular focus on identifying the key industry influencers. The data thus presented is comprehensive, reliable, and the result of extensive research, both primary and secondary.

INFORMATION SOURCES

Primary sources

  • Manufacturers and suppliers
  • Channel partners
  • Industry experts
  • Strategic decision makers

Secondary sources

  • Industry journals and periodicals
  • Government data
  • Financial reports of key industry players
  • Historical data
  • Press releases

DATA ANALYSIS

Data Synthesis

  • Collation of data
  • Estimation of key figures
  • Analysis of derived insights

Data Validation

  • Triangulation with data models
  • Reference against proprietary databases
  • Corroboration with industry experts

REPORT WRITING

Qualitative

  • Market drivers
  • Market challenges
  • Market trends
  • Five forces analysis

Quantitative

  • Market size and forecast
  • Market segmentation
  • Geographical insights
  • Competitive landscape

PURCHASE FULL REPORT OF

market

Key Questions Answered

  • What are the key global market and the regional market share?
  • What are the revenue-generating key market segments?
  • What are the key factors driving and challenging this market’s growth?
  • Who are the key market vendors and their growth strategies?
  • What are the latest trends influencing the growth of this market?
  • What are the variables influencing the market growth in the primary regions?
  • What are the factors influencing the growth of the parent market?

Why should you prefer Technavio's market insights report?

  • Off-the-shelf research reports
  • Reports can be tailored to meet the customer's needs
  • Trusted by more than 100 fortune 500 organizations
  • Information about the market's key drivers, trends, and challenges
  • Parent market analysis
  • Every week, 50,000 people visit our subscription platform
  • Detailed vendors report with competitive landscape
  • Covid-19 impact and recovery analysis
  • Data on revenue-generating market segments
  • Details on the market shares of various regions
  • Five-force market analysis