封面
市场调查报告书
商品编码
1433772

威胁情报 - 市场占有率分析、产业趋势与统计、成长预测(2024 - 2029)

Threat Intelligence - Market Share Analysis, Industry Trends & Statistics, Growth Forecasts (2024 - 2029)

出版日期: | 出版商: Mordor Intelligence | 英文 220 Pages | 商品交期: 2-3个工作天内

价格

本网页内容可能与最新版本有所差异。详细情况请与我们联繫。

简介目录

威胁情报市场规模预计到 2024 年为 81.5 亿美元,预计到 2029 年将达到 149.6 亿美元,在预测期内(2024-2029 年)CAGR为 12.90%。

威胁情报 - 市场

在过去的几年中,攻击源、目标、目标攻击概况和不同类型的技术之间发生了范式转移。虽然攻击类型和目标可以揭示,但攻击源仍然存在问题,因为很难为特定攻击分配归因。

主要亮点

  • 网路攻击和资料外洩的数量不断增加,已将组织的重点转移到各种网路安全解决方案。由于攻击者和防御者之间的网路军备竞赛不断升级,越来越多的组织开始关注网路情报。因此,威胁情报使防御者能够做出更快、更明智的安全决策,并将其在应对违规行为中的行为从被动转变为主动。
  • 大多数组织将其情报工作重点放在更基本的用例(取决于现有的案例研究和攻击)上,例如将情报来源与当前的IPS、防火墙和SIEM 集成,而没有充分利用它们可以提供的情报见解。
  • 威胁情报市场主要是由攻击技术日益独特而导致资料易受攻击所驱动。不同企业产生的资料量不断增加是推动市场的关键因素。
  • 透过整合云端和威胁情报,组织可以阻止网路威胁并利用全球威胁社群来识别未知威胁并最终在威胁出现之前阻止它们,从而瞄准攻击面。因此,威胁情报解决方案的采用显着增加。
  • 过去几年,网路犯罪增加,而且没有放缓的迹象。随着疫情的持续发展,远距办公不断成长,网路攻击的发生率也随之增加。企业采用远距工作模式,引发了人们对企业安全的担忧,这些因素进一步推动了威胁情报市场的发展。
  • COVID-19 大流行对市场的成长产生了积极影响,世界各地的政府机构正在製定新的策略实施,以帮助支持组织提出的网路问题。网路漏洞数量的增加正在推动威胁情报市场的成长。

威胁情报市场趋势

BFSI 细分市场预计将占据重要份额

  • BFSI 产业是面临多次资料外洩和网路攻击的关键基础设施领域之一,因为该产业服务的客户群庞大且财务资讯受到威胁。作为一种利润丰厚的营运模式,具有惊人的回报,并具有相对较低的风险和可检测性,网路犯罪分子正在优化许多邪恶的网路攻击,以瘫痪金融部门。这些攻击的威胁范围从木马、恶意软体、ATM 恶意软体、勒索软体和行动银行恶意软体到资料外洩、机构入侵、资料窃取、财务外洩等。
  • 例如,根据 Orange Cyber​​defense 的数据,恶意软体是 2021 年 10 月至 2022 年 9 月期间金融和保险组织中最常见的网路攻击类型。全球约 40% 的组织成为攻击媒介的目标。网路和应用程式异常位居第二,23% 的组织经历过此类网路攻击,其次是系统异常 (20%)。
  • 透过保护 IT 流程和系统、保护关键客户资料以及遵守政府法规的策略,公共和私人银行机构专注于实施最新技术来防止网路攻击。此外,不断提高的客户期望、技术进步和监管要求要求银行机构采取积极主动的安全措施。随着网路银行、手机银行等科技和数位管道的日益普及,网路银行已成为客户银行服务的首选。银行必须使用高阶身份验证和存取控制流程,包括威胁情报策略。
  • 例如,2022 年 2 月,司法部 (DoJ) 和菲律宾银行家协会 (BAP) 签署了一份谅解备忘录 (MoU),以提高菲律宾的网路安全意识并打击网路犯罪。 BAP 旨在加强银行业的网路弹性,并与司法部建立合作伙伴关係,在该国网路犯罪事件不断增加后,透过资讯共享和协作实现协调、集体和策略性的网路回应。
  • 2022 年 1 月,美国联邦银行监管机构发布了一项网路安全规则,要求及时通知违规行为。拟议的规则旨在儘早向各机构发出重大电脑安全事件的警告。银行企业确定发生事件后,需要尽快提供信息,并在36小时内提供资讯。此类法规可以控制美国银行业的网路攻击。

北美将占据最大市场份额

  • 美国的 BFSI 磁区储存的资料超过 1 艾位元组。这些资料是从各种来源产生的,例如信用卡/金融卡历史记录、客户银行存取记录、银行交易量、通话记录、帐户交易和网路互动。
  • 由于基础设施的高可用性,许多全球金融机构增加了物联网设备的采用,网路使用者预计将推动北美地区威胁情报解决方案的成长。
  • 各地区的政府实体和私人企业投资研发以引入先进的威胁情报解决方案。美国国土安全部(DHS) 网路安全和基础设施安全局(CISA) 提到,他们经历了使用以COVID-19 为主题的诱饵、註册包含与冠状病毒或COVID 相关措辞的新域名的网络钓鱼和恶意软体传播大幅增加-19,以及针对新部署的快速部署的远端存取和远端办公基础设施的攻击。
  • 此外,组织也专注于测试安全策略和实践。例如,根据埃森哲 2022 年 2 月进行的一项调查,其网路威胁情报和事件回应团队调查了几起涉嫌网路间谍和出于经济动机的目标案件。在这些调查过程中,威胁情报和事件回应分析师获得了一些最老练的网路攻击者所采用的策略、技术和程序 (TTP) 的第一手资料。调查显示,2021 年勒索软体和勒索造成的入侵高达 35%,其中 30% 是恶意软体威胁。
  • 对威胁情报解决方案的投资对于加强国家的安全态势至关重要。实施威胁情报解决方案将有助于组织在整个北美地区提供平稳、安全的营运。

威胁情报产业概览

威胁情报市场由几家主要参与者主导,并推出了更安全的软体解决方案。 Dell Inc.、IBM Corporation、Anomali Inc.、Fortinet Inc. 和 CrowdStrike Inc. 是提供威胁情报专用解决方案的市场主要参与者。

  • 2022 年 2 月 - IBM 宣布收购美国云端服务顾问公司 Neudesic。此次收购将进一步帮助公司大幅扩展其混合多云服务组合,并增强其混合云和人工智慧策略解决方案。
  • 2022 年 3 月 - Fortinet 宣布与五家新服务供应商建立合作伙伴关係 - Etihad Atheeb Telecom Company 'GO'、Microland、Radius Telecoms Inc.、Spectrotel 和 TIME dotcom。这种合作伙伴关係可以提供具有增强安全性的简化网路架构,全部由单一作业系统提供支持,以在从资料中心到多云环境再到 SaaS 位置的任何地方实现营运效率。

额外的好处:

  • Excel 格式的市场估算 (ME) 表
  • 3 个月的分析师支持

目录

第 1 章:简介

  • 研究假设和市场定义
  • 研究范围

第 2 章:研究方法

第 3 章:执行摘要

第 4 章:市场洞察

  • 市场概况
  • 产业吸引力-波特五力分析
    • 新进入者的威胁
    • 买家/消费者的议价能力
    • 供应商的议价能力
    • 替代产品的威胁
    • 竞争激烈程度
  • 产业价值链分析
  • COVID-19 对市场的影响评估

第 5 章:市场动态

  • 市场驱动因素
    • 安全漏洞和网路犯罪事件不断增加
    • 下一代安全解决方案的演变
  • 市场挑战/限制
    • 资料安全预算低,解决方案安装成本高

第 6 章:市场细分

  • 按类型
    • 解决方案
    • 服务
  • 按部署
    • 本地部署
  • 按最终用户产业
    • BFSI
    • 资讯科技和电信
    • 零售
    • 製造业
    • 卫生保健
    • 其他最终用户产业
  • 按地理
    • 北美洲
      • 美国
      • 加拿大
    • 欧洲
      • 英国
      • 德国
      • 法国
      • 欧洲其他地区
    • 亚太
      • 中国
      • 日本
      • 印度
      • 澳洲
      • 亚太其他地区
    • 拉丁美洲
      • 墨西哥
      • 巴西
      • 拉丁美洲其他地区
    • 中东和非洲
      • 阿拉伯聯合大公国
      • 南非
      • 中东和非洲其他地区

第 7 章:竞争格局

  • 公司简介
    • Juniper Networks Inc.
    • AlienVault Inc.
    • Farsight Security Inc.
    • Trend Micro Incorporated
    • LogRhythm Inc.
    • F-Secure Corporation
    • Check Point Software Technologies Ltd
    • Dell Inc.
    • IBM Corporation
    • Webroot Inc.
    • Fortinet Inc.
    • Broadcom Inc. (Symantec Corporation)
    • McAfee LLC
    • LookingGlass Cyber Solutions Inc.
    • FireEye Inc.

第 8 章:投资分析

第 9 章:市场的未来

简介目录
Product Code: 65042

The Threat Intelligence Market size is estimated at USD 8.15 billion in 2024, and is expected to reach USD 14.96 billion by 2029, growing at a CAGR of 12.90% during the forecast period (2024-2029).

Threat Intelligence - Market

In the past few years, there has been a paradigm shift between attack sources, targets, destination attack profiles, and different types of technologies. While the attack types and targets can be revealing, attack sources remain problematic because of the difficulties in assigning attribution for a specific attack.

Key Highlights

  • The growing number of cyberattacks and data breaches has shifted organizations' focus to various cybersecurity solutions. More organizations are focusing on cyber intelligence because of the escalating cyber arms race between attackers and defenders. As a result, threat intelligence has enabled defenders to make faster, more informed security decisions and shift their behavior in the fight against breaches from reactive to proactive.
  • Most organizations are focusing their intelligence efforts on more basic use cases (that depend on existing case studies and attacks), such as integrating intelligence feeds with current IPS, firewalls, and SIEMs, without taking full advantage of the intelligence insights they can offer.
  • The threat intelligence market is primarily driven by increasing uniqueness in the attacking techniques leaving the data vulnerable. The rising volumes of data generated by different enterprises are the key factor driving the market.
  • By integrating cloud and threat intelligence, organizations can block cyber threats and leverage the global threat community to identify unknown threats and ultimately stop them before they emerge, thus, targeting the attack surface. Therefore, the adoption of threat intelligence solutions has increased significantly.
  • Cybercrime has increased over the last few years, and there are no signs of a slowdown. With the ongoing pandemic, telecommuting has grown, increasing the rate of cyberattacks. Enterprises have adopted a remote working model, which raises concerns about corporate security, and these factors further drive the threat intelligence market.
  • The COVID-19 pandemic has positively impacted the market's growth, and government bodies across the world are coming up with new strategy implementation to help support the cyber concerns organizations raise. The increasing number of cyber vulnerabilities is driving the growth of the threat intelligence market.

Threat Intelligence Market Trends

BFSI Segment is Expected to Occupy a Significant Share

  • The BFSI industry is one of the critical infrastructure segments that face multiple data breaches and cyber-attacks, owing to the massive customer base that the sector serves and the financial information that is at stake. Being a highly lucrative operation model with phenomenal returns and the added upside of relatively low risk and detectability, cybercriminals are optimizing many diabolical cyberattacks to immobilize the financial sector. These attacks' threat landscape ranges from Trojans, malware, ATM malware, ransomware, and mobile banking malware to data breaches, institutional invasion, data thefts, fiscal breaches, etc.
  • For instance, according to Orange Cyberdefense, malware was the most common type of cyber attack in financial and insurance organizations between October 2021 and September 2022. Around 40% of organizations worldwide were targeted by the attack vector. Network and application anomalies came in second, with 23% of organizations experiencing such cyber attacks, followed by system anomalies (20%).
  • With a strategy of protecting IT processes and systems, protecting critical customer data, and complying with government regulations, public and private banking institutions are focused on implementing the latest technologies to prevent cyberattacks. In addition, rising customer expectations, technological advances, and regulatory requirements require banking institutions to take a proactive approach to security. With the increasing penetration of technology and digital channels, such as internet banking and mobile banking, online banking has become a favorite choice for customers of banking services. Banks must use advanced authentication and access control processes, including threat intelligence strategies.
  • For instance, in February 2022, the Department of Justice (DoJ) and Bankers Association of the Philippines (BAP) signed a memorandum of understanding (MoU) to raise cybersecurity awareness and combat cybercrime in the Philippines. The BAP aims to strengthen the banking industry's cyber-resilience and develop a collaborative partnership with the Justice Department to achieve a coordinated, collective, and strategic cyber response through information sharing and collaboration in the wake of rising cybercrime incidents in the country.
  • In January 2022, the federal banking regulators of the United States issued a cybersecurity rule requiring prompt notification of a breach. The proposed rule is poised to warn the agencies early of considerable computer security incidents. It would need information as soon as possible and by 36 hours after a banking enterprise determines that an incident has occurred. Such regulations could control cyber attacks in the banking sector of the United States.

North America to Hold the Largest Market Share

  • The BFSI sector in the United States has more than 1 exabyte of stored data. These data are generated from various sources, such as credit/debit card histories, customer bank visits, banking volumes, call logs, account transactions, and web interactions.
  • Due to the high availability of adequate infrastructure, numerous global financial institutions increased the adoption of IoT devices, and internet users are expected to drive the growth of threat intelligence solutions in the North American region.
  • Government entities and private players across regions invest in R&D to introduce advanced threat intelligence solutions. The US Department of Homeland Security (DHS) Cybersecurity and the Infrastructure Security Agency (CISA) mentioned that they experienced a massive rise in phishing and malware distribution using COVID-19-themed lures, registration of new domain names containing wording related to coronavirus or COVID-19, and attacks against newly and rapidly deployed remote access and teleworking infrastructure.
  • Additionally, organizations are focusing on testing security strategies and practices. For instance, according to a survey conducted by Accenture in February 2022, its cyber threat intelligence and incident response team has investigated several suspected cyber-spy and financially motivated targeting cases. During these investigations, threat intelligence and incident response analysts gained first-hand insight into the tactics, techniques, and procedures (TTP) employed by some of the most sophisticated cyber attackers. The survey revealed that intrusions made by ransomware and extortion were up to 35%, and 30% were malware threats in 2021.
  • Investments in threat intelligence solutions are essential for strengthening the security posture of a country. Implementing threat intelligence solutions will help organizations provide smooth and secure operations across North America.

Threat Intelligence Industry Overview

The threat intelligence market is dominated by a few major players, with more secure software solutions being launched. Dell Inc., IBM Corporation, Anomali Inc., Fortinet Inc., and CrowdStrike Inc. are key players in the market that offer dedicated solutions for threat intelligence.

  • February 2022 - IBM announced the acquisition of Neudesic, a US cloud services consultancy. This acquisition will further help the company significantly expand its hybrid multi-cloud services portfolio and enhance its hybrid cloud and AI strategy solutions.
  • March 2022 - Fortinet announced a partnership with five new service providers - Etihad Atheeb Telecom Company 'GO,' Microland, Radius Telecoms Inc., Spectrotel, and TIME dotcom. This partnership may deliver a simplified network architecture with enhanced security, all powered by a single operating system to achieve operational effectiveness everywhere, from the data center to multi-cloud environments to SaaS locations.

Additional Benefits:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 Study Assumptions and Market Definition
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET INSIGHTS

  • 4.1 Market Overview
  • 4.2 Industry Attractiveness - Porter's Five Forces Analysis
    • 4.2.1 Threat of New Entrants
    • 4.2.2 Bargaining Power of Buyers/Consumers
    • 4.2.3 Bargaining Power of Suppliers
    • 4.2.4 Threat of Substitute Products
    • 4.2.5 Intensity of Competitive Rivalry
  • 4.3 Industry Value Chain Analysis
  • 4.4 Assessment of Impact of COVID-19 on the Market

5 MARKET DYNAMICS

  • 5.1 Market Drivers
    • 5.1.1 Growing Incidences of Security Breaches and Cyber Crime
    • 5.1.2 Evolution of Next-generation Security Solutions
  • 5.2 Market Challenges/restraints
    • 5.2.1 Low Data Security Budget and High Installation Cost of Solution

6 MARKET SEGMENTATION

  • 6.1 By Type
    • 6.1.1 Solutions
    • 6.1.2 Services
  • 6.2 By Deployment
    • 6.2.1 On-premise
    • 6.2.2 Cloud
  • 6.3 By End-user Industry
    • 6.3.1 BFSI
    • 6.3.2 IT and Telecommunications
    • 6.3.3 Retail
    • 6.3.4 Manufacturing
    • 6.3.5 Healthcare
    • 6.3.6 Other End-user Industries
  • 6.4 By Geography
    • 6.4.1 North America
      • 6.4.1.1 United States
      • 6.4.1.2 Canada
    • 6.4.2 Europe
      • 6.4.2.1 United Kingdom
      • 6.4.2.2 Germany
      • 6.4.2.3 France
      • 6.4.2.4 Rest of Europe
    • 6.4.3 Asia-Pacific
      • 6.4.3.1 China
      • 6.4.3.2 Japan
      • 6.4.3.3 India
      • 6.4.3.4 Australia
      • 6.4.3.5 Rest of Asia-Pacific
    • 6.4.4 Latin America
      • 6.4.4.1 Mexico
      • 6.4.4.2 Brazil
      • 6.4.4.3 Rest of Latin America
    • 6.4.5 Middle East and Africa
      • 6.4.5.1 United Arab Emirates
      • 6.4.5.2 South Africa
      • 6.4.5.3 Rest of Middle East and Africa

7 COMPETITIVE LANDSCAPE

  • 7.1 Company Profiles
    • 7.1.1 Juniper Networks Inc.
    • 7.1.2 AlienVault Inc.
    • 7.1.3 Farsight Security Inc.
    • 7.1.4 Trend Micro Incorporated
    • 7.1.5 LogRhythm Inc.
    • 7.1.6 F-Secure Corporation
    • 7.1.7 Check Point Software Technologies Ltd
    • 7.1.8 Dell Inc.
    • 7.1.9 IBM Corporation
    • 7.1.10 Webroot Inc.
    • 7.1.11 Fortinet Inc.
    • 7.1.12 Broadcom Inc. (Symantec Corporation)
    • 7.1.13 McAfee LLC
    • 7.1.14 LookingGlass Cyber Solutions Inc.
    • 7.1.15 FireEye Inc.

8 INVESTMENT ANALYSIS

9 FUTURE OF THE MARKET