Product Code: TC 9085
The threat-hunting market is set to grow significantly. It's expected to be worth around USD 3.4 billion in 2024 and increase to about USD 6.9 billion by 2029 at a CAGR of 14.9% during the forecast period. The threat-hunting market is thriving in response to the escalating sophistication and frequency of cyberattacks. The ever-evolving landscape of cyber threats necessitates a more dynamic defense. Traditional security tools need help to keep up with the ever-increasing cunning of attackers who employ novel tactics and exploit previously unknown vulnerabilities. Through a combination of skilled analysts, advanced threat intelligence, and specialized tools, threat hunting empowers organizations to uncover these hidden threats before they can cause significant damage. Businesses are becoming increasingly cognizant of the potential ramifications of cyberattacks, driving them to invest in proactive security solutions. As the threat landscape evolves, the need for threat hunting will only become more critical, ensuring this vital security practice's continued growth and importance.
Scope of the Report |
Years Considered for the Study | 2018-2029 |
Base Year | 2023 |
Forecast Period | 2024-2029 |
Units Considered | USD (Billion) |
Segments | By Offering, By Threat Type, By Organization Size, By Deployment mode, By Vertical, and By Region |
Regions covered | North America, Europe, Asia Pacific, Middle East Africa, and Latin America |
"By deployment mode, the cloud segment will grow at a higher CAGR during the forecast period."
Cloud environments are highly dynamic and complex, incorporating multiple infrastructure layers, platforms, and services across public, private, and hybrid clouds. This complexity introduces new attack surfaces and vulnerabilities that traditional security measures may need help to detect and mitigate effectively. Cloud environments' increasing complexity, scale, and regulatory scrutiny drive the demand for robust threat-hunting solutions. By addressing the unique security challenges of cloud deployments and leveraging advanced technologies, threat hunting enables organizations to protect sensitive data, maintain compliance with regulatory requirements, and safeguard their digital assets in the evolving threat landscape of cloud computing.
"By Tools, the Network Detection and Response segment will grow at the highest CAGR during the forecast period. "
Network Detection and Response (NDR) is poised to exhibit the highest Compound Annual Growth Rate (CAGR) in the threat-hunting market segmented by tools. NDR solutions are crucial for threat hunting because they monitor real-time network traffic, detect suspicious activities, and provide rapid incident response capabilities. As organizations increasingly recognize the importance of proactive network security and real-time threat detection, the demand for NDR tools is expected to surge. NDR solutions leverage advanced analytics, machine learning, and AI-driven algorithms to identify anomalies and potential threats across complex network environments, enhancing overall cybersecurity resilience.
"By region, North America will have the largest market size during the forecast period."
North America has many large enterprises across various sectors like finance, healthcare, and technology. These organizations hold vast amounts of sensitive data and intellectual property, making them prime cyberattack targets. The United States is often more involved in or directly impacted by geopolitical events. As per the State of Threat Hunting published by census, the US experiences the highest number of cyberattacks globally - twice as many as Europe. This fuels the need for proactive threat hunting to identify and neutralize threats before they can cause significant damage across the region. Also, while there's a global cybersecurity talent shortage, North America has a relatively more extensive pool of skilled professionals than other regions.
Breakdown of primaries:
In-depth interviews were conducted with Chief Executive Officers (CEOs), marketing directors, other innovation and technology directors, and executives from various key organizations operating in the Threat hunting market.
- By company type: Tier 1: 20%, Tier 2: 47%, and Tier 3: 33%
- By designation: C-level: 40%, Managers and another level: 60%
- By Region: North America: 20%, Europe: 35%, Asia Pacific: 45%,
Major vendors in the global Threat hunting market include IBM(US), Kaspersky (Russia), Capgemini (France), CrowdStrike(US), Trustwave(US), Verizon (US), SecureWorks(US), Sangfor (China), Eviden (France), Rapid 7(US), VMware (US), Solidworks (US), Trend Micro (Japan), Cynet (US), Palo Alto Networks (US) Cipher (India), Talatek (US), SOC Prime (US), RSI Security (US), Protected Harbour (US), Mindpoint Group (US), Exponential- E (UK), Redscan (UK), Iron Net Cybersecurity (US), LiveAction (US). The study includes an in-depth competitive analysis of the critical threat hunting market players, company profiles, recent developments, and key market strategies.
Research Coverage
The report comprehensively segments the Threat hunting market. It provides forecasts regarding its size across various dimensions, including offering (tools, services), threat type, organization size (large enterprises and SMEs), deployment mode (cloud and on-premises), vertical (BFSI, IT & ITES, government, energy & utilities, manufacturing, healthcare, retail, and other verticals), and region (North America, Europe, Middle East & Africa, Asia Pacific, and Latin America).
Additionally, the study encompasses a thorough competitive analysis of key market players, offering insights into their company profiles, product and business offerings, recent developments, and key market strategies.
Key benefits of buying report
The report offers valuable insights to market leaders and new entrants by providing close approximations of revenue figures for the Threat hunting market and its subsegments. Stakeholders can leverage this report to understand the competitive landscape better, enabling them to position their businesses more effectively and develop tailored go-to-market strategies. Additionally, stakeholders can grasp the market dynamics and stay informed about key drivers, restraints, challenges, and opportunities shaping the industry landscape.
The report provides insights on the following pointers:
- Analysis of critical drivers (the rise and the speed in the ferocity of cyberattacks, the growing menace of supply chain attacks), restraints (Budget constraints and return on investments), opportunities (The rise of generative AI leading to AI-based threat-hunting tools), and challenges (false positives & unknown assets)
- Product Development/Innovation: Detailed insights on upcoming technologies, research development activities, new products, and service launches in the threat-hunting market.
- Market Development: Comprehensive information about lucrative markets - the report analyses the Threat hunting market across varied regions.
- Market Diversification: Exhaustive information about new products and services, untapped geographies, recent developments, and investments in the threat-hunting market.
- Competitive Assessment: In-depth assessment of market shares, growth strategies, and service offerings of leading players IBM(US), Kaspersky (Russia), Capgemini (France), CrowdStrike(US), Trustwave(US), Verizon (US), SecureWorks(US), Sangfor (China), Eviden (France), Rapid 7(US), VMware (US), Solidworks (US), Trend Micro (Japan), Cynet (US), Palo Alto Networks (US) among others, in the threat hunting market.
TABLE OF CONTENTS
1 INTRODUCTION
- 1.1 STUDY OBJECTIVES
- 1.2 MARKET DEFINITION
- 1.2.1 INCLUSIONS & EXCLUSIONS
- 1.3 STUDY SCOPE
- 1.3.1 MARKET SEGMENTATION
- 1.4 YEARS CONSIDERED
- 1.5 CURRENCY CONSIDERED
- 1.6 STAKEHOLDERS
- 1.7 RECESSION IMPACT
2 RESEARCH METHODOLOGY
- 2.1 RESEARCH DATA
- 2.1.1 SECONDARY DATA
- 2.1.2 PRIMARY DATA
- 2.1.2.1 Breakdown of primary profiles
- 2.1.2.2 Key insights from industry experts
- 2.2 DATA TRIANGULATION
- 2.3 MARKET SIZE ESTIMATION
- 2.3.1 REVENUE ESTIMATES
- 2.3.1.1 Top-down approach
- 2.3.1.2 Bottom-up approach
- 2.4 MARKET FORECAST
- 2.5 RESEARCH ASSUMPTIONS
- 2.6 LIMITATIONS AND RISK ASSESSMENT
3 EXECUTIVE SUMMARY
4 PREMIUM INSIGHTS
- 4.1 ATTRACTIVE OPPORTUNITIES FOR PLAYERS IN THREAT HUNTING MARKET
- 4.2 THREAT HUNTING MARKET, BY OFFERING
- 4.3 THREAT HUNTING MARKET, BY TOOL
- 4.4 THREAT HUNTING MARKET, BY SERVICE
- 4.5 THREAT HUNTING MARKET, BY ORGANIZATION SIZE
- 4.6 THREAT HUNTING MARKET, BY DEPLOYMENT MODE
- 4.7 THREAT HUNTING MARKET, BY VERTICAL
- 4.8 THREAT HUNTING MARKET, BY REGION
- 4.9 MARKET INVESTMENT SCENARIO
5 MARKET OVERVIEW AND INDUSTRY TRENDS
- 5.1 INTRODUCTION
- 5.2 MARKET DYNAMICS
- 5.2.1 DRIVERS
- 5.2.1.1 Increase in frequency and ferocity of cyberattacks
- 5.2.1.2 Spike in prevalence of supply chain attacks
- 5.2.1.3 Use of sophisticated techniques for exploiting cloud vulnerabilities
- 5.2.2 RESTRAINTS
- 5.2.2.1 Budget constraints and increasing complexity of calculating return on investments
- 5.2.2.2 Integration with existing security infrastructure
- 5.2.3 OPPORTUNITIES
- 5.2.3.1 Growing adoption of AI-based threat-hunting tools
- 5.2.3.2 Integration of robust threat intelligence platforms into threat-hunting capabilities
- 5.2.4 CHALLENGES
- 5.2.4.1 False positives and presence of unknown assets
- 5.2.4.2 Data overload and alert fatigue
- 5.2.4.3 Lack of skilled security professionals
- 5.3 THREAT HUNTING TECHNOLOGY EVOLUTION
- 5.3.1 EARLY DAYS - REACTIVE HUNTING WITH INDICATORS OF COMPROMISE (IOCS)
- 5.3.2 RISE OF PROACTIVE HUNTING - UNDERSTANDING ATTACKER BEHAVIOR
- 5.3.3 MODERN ERA - AUTOMATION AND ORCHESTRATION
- 5.4 CASE STUDY ANALYSIS
- 5.4.1 CAPGEMINI HELPED FINANCIAL SERVICES FIRM ESTABLISH SECURITY OPERATIONS CENTER (SOC) CAPABILITY ON AGGRESSIVE DEPLOYMENT SCHEDULE
- 5.4.2 CROWDSTRIKE ASSISTED GLOBAL MANUFACTURING COMPANY IN IMPROVING WORKFLOW AND INCREASING EFFICIENCY
- 5.4.3 TRUSTWAVE SPIDERLABS' THREAT HUNTER HELPED PUBLIC UTILITY COMPANY ENHANCE IT SECURITY POSTURE
- 5.5 VALUE CHAIN ANALYSIS
- 5.5.1 OFFERINGS
- 5.5.2 PLANNING AND DESIGNING
- 5.5.3 DEPLOYMENT (IF APPLICABLE)
- 5.5.4 SYSTEM INTEGRATION
- 5.5.5 CONSULTATION
- 5.5.6 ONSITE SUPPORT (IF REQUIRED)
- 5.5.7 END-USER GROUPS
- 5.6 MARKET MAP
- 5.7 PORTER'S FIVE FORCES ANALYSIS
- 5.7.1 THREAT OF NEW ENTRANTS
- 5.7.2 BARGAINING POWER OF SUPPLIERS
- 5.7.3 BARGAINING POWER OF BUYERS
- 5.7.4 THREAT OF SUBSTITUTES
- 5.7.5 INTENSITY OF COMPETITIVE RIVALRY
- 5.8 KEY STAKEHOLDERS & BUYING CRITERIA
- 5.8.1 KEY STAKEHOLDERS IN BUYING PROCESS
- 5.8.2 BUYING CRITERIA
- 5.9 PRICING ANALYSIS
- 5.9.1 INDICATIVE PRICE TREND OF KEY PLAYERS, BY OFFERING
- 5.9.2 INDICATIVE PRICING ANALYSIS, BY OFFERING
- 5.9.3 INDICATIVE PRICING ANALYSIS, BY VENDOR
- 5.10 TECHNOLOGY ANALYSIS
- 5.10.1 KEY TECHNOLOGIES
- 5.10.1.1 Security information and event management
- 5.10.1.2 Endpoint detection and response
- 5.10.1.3 User and entity behavior analytics
- 5.10.1.4 Threat intelligence
- 5.10.1.5 Machine learning and artificial intelligence
- 5.10.2 COMPLEMENTARY TECHNOLOGIES
- 5.10.2.1 Security orchestration, automation, and response
- 5.10.2.2 Network traffic analysis
- 5.10.3 ADJACENT TECHNOLOGIES
- 5.10.3.1 Extended detection and response
- 5.10.3.2 Cloud security posture management
- 5.10.3.3 Vulnerability management
- 5.11 PATENT ANALYSIS
- 5.12 TRENDS/DISRUPTIONS IMPACTING CUSTOMERS' BUSINESSES
- 5.13 REGULATORY LANDSCAPE
- 5.13.1 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS
- 5.13.2 REGULATIONS, BY REGION
- 5.14 KEY CONFERENCES & EVENTS
- 5.15 BUSINESS MODEL ANALYSIS
- 5.15.1 SUBSCRIPTION-BASED MODEL
- 5.15.2 PERPETUAL LICENSE MODEL
- 5.15.3 PAY-PER-USE MODEL
- 5.15.4 CONSULTING AND PROFESSIONAL SERVICES MODEL
- 5.15.5 INTEGRATED SOLUTIONS MODEL
- 5.16 INVESTMENT & FUNDING SCENARIO
6 THREAT HUNTING MARKET, BY OFFERING
- 6.1 INTRODUCTION
- 6.1.1 OFFERING: THREAT HUNTING MARKET DRIVERS
- 6.2 TOOLS
- 6.2.1 THREAT-HUNTING TOOLS TO REDUCE RISKS OF DATA BREACHES AND OPERATIONAL DISRUPTIONS
- 6.2.2 ENDPOINT DETECTION AND RESPONSE (EDR)
- 6.2.3 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
- 6.2.4 NETWORK DETECTION AND RESPONSE (NDR)
- 6.2.5 THREAT INTELLIGENCE PLATFORM
- 6.2.6 OTHER TOOLS
- 6.3 SERVICES
- 6.3.1 THREAT-HUNTING SERVICES TO OFFER CRITICAL SUPPORT IN IDENTIFYING AND MITIGATING POTENTIAL CYBER THREATS
- 6.3.2 PROFESSIONAL SERVICES
- 6.3.3 MANAGED SERVICES
7 THREAT HUNTING MARKET, BY ORGANIZATION SIZE
- 7.1 INTRODUCTION
- 7.1.1 ORGANIZATION SIZE: THREAT HUNTING MARKET DRIVERS
- 7.2 SMALL AND MEDIUM ENTERPRISES (SMES)
- 7.2.1 THREAT-HUNTING SOLUTIONS TO FOCUS ON AFFORDABILITY, EASE OF DEPLOYMENT, AND AUTOMATION
- 7.3 LARGE ENTERPRISES
- 7.3.1 LARGE ENTERPRISES TO PRIORITIZE SCALABILITY, INTEGRATION WITH EXISTING SECURITY FRAMEWORKS, AND COMPLIANCE WITH REGULATORY REQUIREMENTS
8 THREAT HUNTING MARKET, BY DEPLOYMENT MODE
- 8.1 INTRODUCTION
- 8.1.1 DEPLOYMENT MODE: THREAT HUNTING MARKET DRIVERS
- 8.2 ON-PREMISES
- 8.2.1 ON-PREMISES DEPLOYMENT TO ENABLE DIRECT MANAGEMENT OF SECURITY POLICIES AND REAL-TIME DATA VISIBILITY
- 8.3 CLOUD
- 8.3.1 CLOUD DEPLOYMENT TO PROVIDE AGILITY, COST-EFFICIENCY, AND GLOBAL ACCESSIBILITY IN CYBERSECURITY OPERATIONS
9 THREAT HUNTING MARKET, BY VERTICAL
- 9.1 INTRODUCTION
- 9.1.1 VERTICAL: THREAT HUNTING MARKET DRIVERS
- 9.2 BFSI
- 9.2.1 RISING DEMAND FOR DATA PROTECTION SERVICES IN FINANCIAL INSTITUTIONS TO DRIVE MARKET
- 9.3 IT & ITES
- 9.3.1 GROWING CONCERNS OF FRAUD AND COMPLIANCE TO PROPEL MARKET
- 9.4 GOVERNMENT
- 9.4.1 RISING CONCERNS ABOUT IDENTITY THEFT AND BUSINESS FRAUD TO FUEL MARKET GROWTH
- 9.5 ENERGY & UTILITIES
- 9.5.1 NEED TO SECURE CRITICAL INFRASTRUCTURE TO FUEL SEGMENT GROWTH
- 9.6 MANUFACTURING
- 9.6.1 MOBILE SECURITY TO BOOST MANAGED SECURITY INFRASTRUCTURE
- 9.7 HEALTHCARE
- 9.7.1 INCREASING NEED TO SECURE CRITICAL PATIENT DATA ACROSS CLOUD ENVIRONMENT TO BOOST MARKET
- 9.8 RETAIL & ECOMMERCE
- 9.8.1 AUTOMATION ACROSS RETAIL CHANNELS FOR CURBING DATA THEFT TO PROPEL MARKET
- 9.9 OTHER VERTICALS
10 THREAT HUNTING MARKET, BY THREAT TYPE
- 10.1 INTRODUCTION
- 10.1.1 THREAT TYPE: ATTACK SURFACE MANAGEMENT MARKET DRIVERS
- 10.2 ADVANCED PERSISTENT THREATS (APTS)
- 10.2.1 DEPLOYMENT OF ADVANCED THREAT INTELLIGENCE MEASURES TO MITIGATE IMPACT OF ADVANCED PERSISTENT THREATS
- 10.3 MALWARE AND RANSOMWARE
- 10.3.1 SURGING DEMAND FOR EFFECTIVE THREAT-HUNTING STRATEGIES TO PROPEL MARKET GROWTH
- 10.4 INSIDER THREATS
- 10.4.1 GROWING CONCERNS OVER INSIDER MISUSE AND DATA BREACHES TO DRIVE MARKET
- 10.5 PHISHING AND SOCIAL ENGINEERING
- 10.5.1 THREAT HUNTING FOR PHISHING AND SOCIAL ENGINEERING TO FOCUS ON IDENTIFYING PHISHING CAMPAIGNS AND MONITORING USER INTERACTIONS
- 10.6 OTHER THREATS
11 THREAT HUNTING MARKET, BY REGION
- 11.1 INTRODUCTION
- 11.2 NORTH AMERICA
- 11.2.1 NORTH AMERICA: THREAT HUNTING MARKET DRIVERS
- 11.2.2 NORTH AMERICA: RECESSION IMPACT
- 11.2.3 US
- 11.2.3.1 Growing reliance on advanced analytics to drive market
- 11.2.4 CANADA
- 11.2.4.1 Urgent need for effective cybersecurity measures to accelerate market growth
- 11.3 EUROPE
- 11.3.1 EUROPE: THREAT HUNTING MARKET DRIVERS
- 11.3.2 EUROPE: RECESSION IMPACT
- 11.3.3 UK
- 11.3.3.1 Enhanced cyber threat awareness to drive market
- 11.3.4 GERMANY
- 11.3.4.1 Increasing investments in proactive security solutions to drive market
- 11.3.5 FRANCE
- 11.3.5.1 Growing security concerns and increasing emphasis on national security to boost market
- 11.3.6 ITALY
- 11.3.6.1 Heightened cyber threat awareness to propel market growth
- 11.3.7 REST OF EUROPE
- 11.4 ASIA PACIFIC
- 11.4.1 ASIA PACIFIC: THREAT HUNTING MARKET DRIVERS
- 11.4.2 ASIA PACIFIC: RECESSION IMPACT
- 11.4.3 CHINA
- 11.4.3.1 Rapid digitalization and stringent cybersecurity regulations to foster market growth
- 11.4.4 JAPAN
- 11.4.4.1 Growing adoption of advanced AI-driven threat-hunting technologies to drive market
- 11.4.5 AUSTRALIA AND NEW ZEALAND
- 11.4.5.1 Increased funding and allocation of resources for threat-hunting initiatives to drive market
- 11.4.6 INDIA
- 11.4.6.1 Growing significance of threat hunting in safeguarding country's digital infrastructure to aid market growth
- 11.4.7 REST OF ASIA PACIFIC
- 11.5 MIDDLE EAST & AFRICA
- 11.5.1 MIDDLE EAST & AFRICA: THREAT HUNTING MARKET DRIVERS
- 11.5.2 MIDDLE EAST
- 11.5.2.1 Escalating cyberattacks, economic development, and increasing digital adoption to drive market
- 11.5.3 GULF COOPERATION COUNCIL (GCC)
- 11.5.3.1 Surging need for advanced security measures for protection of sensitive data and digital assets to drive market
- 11.5.3.2 KSA
- 11.5.3.2.1 Economic development and regulatory imperatives to boost market
- 11.5.3.3 UAE
- 11.5.3.3.1 Rapid digitalization, strict regulations, and heightened awareness of cyber threats to boost market
- 11.5.3.4 Rest of GCC
- 11.5.4 SOUTH AFRICA
- 11.5.4.1 Regulatory compliance and cyber resilience to propel market
- 11.5.5 REST OF MIDDLE EAST & AFRICA
- 11.6 LATIN AMERICA
- 11.6.1 LATIN AMERICA: THREAT HUNTING MARKET DRIVERS
- 11.6.2 LATIN AMERICA: RECESSION IMPACT
- 11.6.3 BRAZIL
- 11.6.3.1 Rising cyber threats and regulatory compliance to boost market
- 11.6.4 MEXICO
- 11.6.4.1 Surging need for safeguarding evolving digital assets and infrastructure from escalating cyber threats to bolster market
- 11.6.5 REST OF LATIN AMERICA
12 COMPETITIVE LANDSCAPE
- 12.1 KEY PLAYER STRATEGIES/RIGHT TO WIN
- 12.2 REVENUE ANALYSIS
- 12.3 MARKET SHARE ANALYSIS
- 12.4 BRAND COMPARISON
- 12.5 COMPANY VALUATION AND FINANCIAL METRICS
- 12.5.1 COMPANY VALUATION
- 12.5.2 FINANCIAL METRICS USING EV/EBIDTA
- 12.6 COMPANY EVALUATION MATRIX: KEY PLAYERS, 2023
- 12.6.1 STARS
- 12.6.2 EMERGING LEADERS
- 12.6.3 PERVASIVE PLAYERS
- 12.6.4 PARTICIPANTS
- 12.6.5 COMPANY FOOTPRINT: KEY PLAYERS, 2023
- 12.6.5.1 Company footprint
- 12.6.5.2 Regional footprint
- 12.6.5.3 Solution footprint
- 12.6.5.4 Vertical footprint
- 12.7 COMPANY EVALUATION MATRIX: STARTUPS/SMES, 2023
- 12.7.1 PROGRESSIVE COMPANIES
- 12.7.2 RESPONSIVE COMPANIES
- 12.7.3 DYNAMIC COMPANIES
- 12.7.4 STARTING BLOCKS
- 12.7.5 COMPETITIVE BENCHMARKING: STARTUPS/SMES, 2023
- 12.7.5.1 Detailed list of key startups/SMEs
- 12.7.5.2 Competitive benchmarking of key startups/SMEs
- 12.8 COMPETITIVE SCENARIO
- 12.8.1 PRODUCT LAUNCHES
- 12.8.2 DEALS
13 COMPANY PROFILES
- 13.1 KEY PLAYERS
- 13.1.1 PALO ALTO NETWORKS
- 13.1.1.1 Business overview
- 13.1.1.2 Products/Solutions/Services offered
- 13.1.1.3 Recent developments
- 13.1.1.4 MnM view
- 13.1.1.4.1 Right to win
- 13.1.1.4.2 Strategic choices
- 13.1.1.4.3 Weaknesses and competitive threats
- 13.1.2 CROWDSTRIKE
- 13.1.2.1 Business overview
- 13.1.2.2 Products/Solutions/Services offered
- 13.1.2.3 Recent developments
- 13.1.2.4 MnM view
- 13.1.2.4.1 Right to win
- 13.1.2.4.2 Strategic choices
- 13.1.2.4.3 Weaknesses and competitive threats
- 13.1.3 RAPID7
- 13.1.3.1 Business overview
- 13.1.3.2 Products/Solutions/Services offered
- 13.1.3.3 Recent developments
- 13.1.3.4 MnM view
- 13.1.3.4.1 Key strengths
- 13.1.3.4.2 Strategic choices
- 13.1.3.4.3 Weaknesses and competitive threats
- 13.1.4 VMWARE
- 13.1.4.1 Business overview
- 13.1.4.2 Products/Solutions/Services Offered
- 13.1.4.3 Recent developments
- 13.1.4.4 MnM view
- 13.1.4.4.1 Key strengths
- 13.1.4.4.2 Strategic choices
- 13.1.4.4.3 Weaknesses and competitive threats
- 13.1.5 IBM
- 13.1.5.1 Business overview
- 13.1.5.2 Products/Solutions/Services Offered
- 13.1.5.3 Recent developments
- 13.1.5.4 MnM view
- 13.1.5.4.1 Right to win
- 13.1.5.4.2 Strategic choices
- 13.1.5.4.3 Weaknesses and competitive threats
- 13.1.6 TREND MICRO
- 13.1.6.1 Business overview
- 13.1.6.2 Products/Solutions/Services offered
- 13.1.6.3 Recent developments
- 13.1.7 CAPGEMINI
- 13.1.7.1 Business overview
- 13.1.7.2 Products/Solutions/Services offered
- 13.1.8 KASPERSKY
- 13.1.8.1 Business overview
- 13.1.8.2 Products/Solutions/Services offered
- 13.1.8.3 Recent developments
- 13.1.9 VERIZON
- 13.1.9.1 Business overview
- 13.1.9.2 Products/Solutions/Services offered
- 13.1.10 SECUREWORKS
- 13.1.10.1 Business overview
- 13.1.10.2 Products/Solutions/Services Offered
- 13.1.10.3 Recent developments
- 13.1.11 SANGFOR
- 13.1.11.1 Business overview
- 13.1.11.2 Products/Solutions/Services offered
- 13.1.11.3 Recent developments
- 13.1.12 EVIDEN
- 13.1.12.1 Business overview
- 13.1.12.2 Products/Solutions/Services Offered
- 13.1.12.3 Recent developments
- 13.1.13 SOLARWINDS
- 13.1.13.1 Business overview
- 13.1.13.2 Products/Solutions/Services offered
- 13.1.14 CYNET
- 13.1.14.1 Business overview
- 13.1.14.2 Products/Solutions/Services offered
- 13.1.14.3 Recent developments
- 13.1.15 MANDIANT
- 13.1.16 BINARY DEFENSE
- 13.1.17 SOPHOS
- 13.2 OTHER PLAYERS
- 13.2.1 ESENTIRE
- 13.2.2 DEEPWATCH
- 13.2.3 NETSURION
- 13.2.4 GOSECURE
- 13.2.5 LMNTRIX
- 13.2.6 UNDERDEFENSE
- 13.2.7 ACKCENT
- 13.2.8 CYBEREASON
- 13.2.9 CRITICAL START
- 13.2.10 CYSIV
- 13.2.11 CRITICAL INSIGHT
- 13.2.12 CIPHER MANAGED SECURITY SERVICES
- 13.2.13 TALATEK
- 13.2.14 SOC PRIME
- 13.2.15 RSI SECURITY
- 13.2.16 PROTECTED HARBOR
- 13.2.17 MINDPOINT GROUP
- 13.2.18 EXPONENTIAL-E
- 13.2.19 REDSCAN
- 13.2.20 IRON NET CYBERSECURITY
- 13.2.21 LIVEACTION
14 ADJACENT MARKETS
- 14.1 INTRODUCTION TO ADJACENT MARKETS
- 14.2 LIMITATIONS
- 14.3 SECURITY AND VULNERABILITY MANAGEMENT MARKET
- 14.3.1 INCLUSIONS AND EXCLUSIONS
- 14.4 SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) MARKET
- 14.4.1 INCLUSIONS AND EXCLUSIONS
15 APPENDIX
- 15.1 DISCUSSION GUIDE
- 15.2 KNOWLEDGESTORE: MARKETSANDMARKETS' SUBSCRIPTION PORTAL
- 15.3 CUSTOMIZATION OPTIONS
- 15.4 RELATED REPORTS
- 15.5 AUTHOR DETAILS