Expert View: Quelles sont les obligations inhérentes au Cloud hybride qui s’imposent au DSI ?
Nov 17, 2016 | Expert View
5
Average: 5 (1 vote)
Nov 17, 2016
Expert View
5
Average: 5 (1 vote)
Les Expert Views apportent les opinions des analystes et consultants du Groupe CXP sur des questions critiques ou d’actualité dans les métiers IT. Au moyen d’exemples, de citations d’experts, de chiffres et d’expériences personnelles les Expert Views montrent en quoi une tendance, une innovation, une rupture technologique, une obligation légale à venir, un signal faible, une annonce, etc. risque ou a déjà impacté les métiers IT du point du vue de l’utilisateur à court, moyen et long terme.
Analyst : 
Downloads : 
66
2 pages
Expert View: Wie relevant ist Edge Computing für IoT-Projekte?
Feb 02, 2017 | Expert View
5
Average: 5 (1 vote)
Feb 02, 2017
Expert View
5
Average: 5 (1 vote)
Edge Computing bezeichnet eine Technologie, die zentrale Cloud-Funktionen auf dezentrale Geräte wie Sensoren und Mikrocomputer verteilt. Damit soll unter anderem die Funktionsfähigkeit der IoT-Umgebung auch bei fehlender Konnektivität sichergestellt werden.   Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
45
2 pages
Cyber Security & Big Data - Market InSight - Worldwide
Mar 07, 2016 | InSight Analysis
5
Average: 5 (1 vote)
Mar 07, 2016
InSight Analysis
5
Average: 5 (1 vote)
Objectives of the report: The aim of this report is to present in a succinct but detailed manner the phenomenon of big data and the obligation to protect the wealth of information big data contains. We will explain how the techniques associated with big data will enable cyber security to detect attempts at intrusion or fraud before irreparable damage is done. This report should be of interest both to people in charge of big data projects and to: Security managers who like t...
Analyst : 
Emmanuel LARTIGUE, Mathieu Poujol
Downloads : 
215
25 pages
The Security Software Market from an Industry Perspective - Market InBrief - Germany
Mar 07, 2016 | InBrief Analysis
5
Average: 5 (1 vote)
Mar 07, 2016
InBrief Analysis
5
Average: 5 (1 vote)
This report examines the security software market in Germany in different vertical sectors.   Contents: The Security Software Market in Germany PAC’s definition and segmentation Market volumes and growth in Germany Industry View Manufacturing Retail Banking and financial services Insurance Utilities, telecoms and transport Public sector Services and consumers Summary and Recommend...
Analyst : 
Melanie Flug, Mathieu Poujol
Downloads : 
156
13 pages
Cyber Sécurité & Big Data - Market InSight - France
Feb 29, 2016 | InSight Analysis
4
Average: 4 (1 vote)
Feb 29, 2016
InSight Analysis
4
Average: 4 (1 vote)
Ce rapport a pour ambition de présenter de manière succincte mais détaillée le phénomène des Big Data et l’obligation de protéger la masse d’information qu’ils renferment. Dans un second temps, nous expliquerons comment les techniques liées au Big Data vont permettre à la Cyber Sécurité de détecter des tentatives d’intrusion ou des tentatives de fraude avant que l’irréparable ne soit commis. Ce rapport devrait intéresser à la fois les personnes en charge de projets Big Data mais aussi les ...
Analyst : 
Emmanuel LARTIGUE, Mathieu Poujol
Downloads : 
159
26 pages
Internet Network Infrastructure Issues - Market InSight - Worldwide
Sep 14, 2016 | InSight Analysis
4
Average: 4 (1 vote)
Sep 14, 2016
InSight Analysis
4
Average: 4 (1 vote)
Objectives of the report: All of our current digital transformation depends on the internet network infrastructure, but the vulnerabilities it presents are often not assessed by either IT or business. This report Identifies the current and future vulnerabilities of the internet network infrastructure Highlights the specifics of the internet network infrastructure Maps and classifies the different players, their strengths, and their weaknesses Details best prac...
Analyst : 
Mathieu Poujol, Paul Fisher
Downloads : 
60
17 pages
Securing the Cloud - InSight Analysis - Worldwide
Mar 07, 2017 | InSight Analysis
4
Average: 4 (1 vote)
Mar 07, 2017
InSight Analysis
4
Average: 4 (1 vote)
This report focuses on the following topics: Analysis of the worldwide offshore market for cyber security Identification of the drivers and obstacles that are shaping the offshore market of cyber security Recommendations for end users Recommendations for offshore security service providers
Analyst : 
Downloads : 
151
22 pages
Managed Security Services - Market InSight - Germany
Feb 04, 2016 | InSight Analysis
0
Feb 04, 2016
InSight Analysis
0
Objectives of the report: Clarify the meaning of managed security services (MSS) Analyze the drivers and obstacles that are shaping customer interest in MSS Show the scale and growth that is occurring within the German MSS market Consider the outcomes of these market dynamics for MSS suppliers Map the German MSS supplier landscape and identify key future success factors for vendors operating in this segment   Contents: PAC’s Analy...
Analyst : 
Downloads : 
211
37 pages
Next Generation Security Operation Center (SOC) - Market InSight - Worldwide
Feb 23, 2016 | InSight Analysis
0
Feb 23, 2016
InSight Analysis
0
Objectives of the report: Provide an analysis of the worldwide market for next generation SOC Identify the drivers and obstacles that are shaping the market for next generation SOC Provide recommendations for end users Provide recommendations for next generation SOC providers   Contents: PAC’s Analysis Management summary PAC’s opinion PAC’s recommendations Understanding Security Needs Overview of a Fi...
Analyst : 
Biswajit Banerjee, Mathieu Poujol
Downloads : 
105
21 pages
Security Software - Market InSight - UK
Mar 07, 2016 | InSight Analysis
0
Mar 07, 2016
InSight Analysis
0
Objectives of the report: Determine the unique factors that will shape the UK security software market Map the growth and size of the UK security software market for 2016 and beyond Examine those aspects of the UK economy that impact on security technology Examine UK Government investment in cyber security and its benefit to the market
Analyst : 
Downloads : 
74
16 pages
Governance, Risk & Compliance - Market InSight - Worldwide
Aug 24, 2016 | InSight Analysis
0
Aug 24, 2016
InSight Analysis
0
Objectives of the report: This report takes a broad look at governance, risk and compliance that affects organizations globally. In a world where IT infrastructures are changing rapidly to accommodate digital transformation and IoT, as well as increased cybersecurity threats, the report looks at the background to legislation and what clients and suppliers need to do to. It includes: Analysis of major compliance regulations, including the forthcoming EU GDPR & NIS direct...
Analyst : 
Downloads : 
50
14 pages
Cyber Security - Sophos - Vendor Profile - Worldwide
Nov 14, 2016 | Vendor Profile - Cluster-specific
0
Nov 14, 2016
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
20
13 pages
Cyber Security - Airbus Defense & Space Cyber Security - Vendor Profile - Worldwide
Nov 15, 2016 | Vendor Profile - Cluster-specific
0
Nov 15, 2016
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
46
12 pages
Cyber Security - Giesecke & Devrient - Vendor Profile - Worldwide
Nov 30, 2016 | Vendor Profile - Cluster-specific
0
Nov 30, 2016
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in the Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segme...
Analyst : 
Downloads : 
23
13 pages
Cyber Security - FireEye - Vendor Profile - Worldwide
Nov 24, 2016 | Vendor Profile - Cluster-specific
0
Nov 24, 2016
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Share of Software vs. IT Services in Cyber Security Revenue Key Industries & Top Accounts in Cybe...
Analyst : 
Downloads : 
23
12 pages
Cyber Security - Fortinet - Vendor Profile - Worldwide
Nov 28, 2016 | Vendor Profile - Cluster-specific
0
Nov 28, 2016
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
27
12 pages
Cyber Security - Fujitsu - Vendor Profile - Worldwide
Dec 05, 2016 | Vendor Profile - Cluster-specific
0
Dec 05, 2016
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
52
12 pages
Offshoring Cyber Security Services - Market InSight - Worldwide
Dec 07, 2016 | InSight Analysis
0
Dec 07, 2016
InSight Analysis
0
Objectives of the report: Analysis of the worldwide offshore market for cyber security Identify the drivers and obstacles that are shaping the offshore market of cyber security Recommendations for end users Recommendations for offshore security services providers   Contents: PAC’s Analysis Management summary PAC’s opinion PAC’s recommendations Understanding the Need Holistic view Geographical...
Analyst : 
Downloads : 
87
19 pages
UK Government Cyber Policy and Its Impact on Investment and Innovation - Market InBrief
Feb 14, 2017 | InBrief Analysis
0
Feb 14, 2017
InBrief Analysis
0
This report focuses on how the UK government is focusing efforts on building its cyber capability as part of national defence by investing billions into new research and educational facilities to make the UK a world leader. At the same time, this activity of central government may be having a positive knock on effect for the private cyber security industry. Currently, like most European countries, the UK’s indigenous cyber security industry is small and consists of a multitude of mostl...
Analyst : 
Downloads : 
36
10 pages
Expert View: Quelle est la pertinence du Edge Computing pour les projets IoT ?
Feb 15, 2017 | Expert View
0
Feb 15, 2017
Expert View
0
L’expression « Edge Computing » désigne une technologie qui répartit des fonctions centrales du Cloud sur des appareils décentralisés comme des capteurs et des microordinateurs. L’objectif étant, entre autres, d’assurer le fonctionnement de l’environnement IoT même en cas d’absence de connectivité.   Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
30
2 pages
Expert View: How relevant is edge computing for IoT projects?
Feb 17, 2017 | Expert View
0
Feb 17, 2017
Expert View
0
Edge computing refers to a technology that allocates central Cloud functions to peripheral devices such as gateways and microcomputers. Amongst other things, the aim of edge computing is to provide IoT functionality even in the absence of connectivity.   Click here for the French version. Click here for the German version.
Analyst : 
Joachim Hackmann, Milos Milojevic
Downloads : 
70
2 pages
Expert View: NUMERIQUE ET ETHIQUE : Quelles questions se poser ?
Jun 26, 2017 | Expert View
0
Jun 26, 2017
Expert View
0
Dans le domaine des RH, comme dans de nombreux domaines, l’utilisation des nouvelles technologies ouvre de nouvelles possibilités dans l’analyse des données. Big data, small data, analyses croisées, analyses prédictives, choix, aide à la décision, automatisation… que souhaitons-nous réaliser avec l’utilisation des nouvelles technologies mise à notre disposition ? Les possibilités semblent infinies et pourtant, au plan systémique, la même ligne directrice est toujours mise en place : défi...
Downloads : 
48
2 pages
Security Operations Centers and Analytic Developments - InSight Analysis - Worldwide
Jul 03, 2017 | InSight Analysis
0
Jul 03, 2017
InSight Analysis
0
The security services space is still at various stages of maturity across global markets - the UK is more mature than Germany for example. It also remains one that is fragmented and serving different requirements to different organizations based on size and sector, and within that, security services players may even offer different options within the same organization. One defining characteristic of security services players is whether they can boast either their own, or access to a Secu...
Analyst : 
Downloads : 
29
12 pages
Expert View: DevOps et API : Comment sécuriser la transformation digitale ?
Jul 06, 2017 | Expert View
0
Jul 06, 2017
Expert View
0
Avec Wannacry et autres attaques, le monde prend directement conscience des risques encourus et de la vulnérabilité globale de la sphère numérique. Dans un monde hyperconnecté la sécurisation se pose en termes totalement nouveaux pour l’informatique. C’est aussi ce à quoi poussent toutes les nouvelles règlementations. Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
41
2 pages
Expert View: DevOps und API: Wie kann die digitale Transformation abgesichert werden?
Sep 25, 2017 | Expert View
0
Sep 25, 2017
Expert View
0
Cyber-Attacken wie WannaCry haben die Risiken und die Verwundbarkeit der digitalen Welt deutlich vor Augen geführt. In einer hochgradig vernetzten Welt braucht IT-Sicherheit einen neuen Stellenwert – genau darauf zielen auch neue regulatorische Verordnungen ab. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
33
2 pages
Leadership Compass: Cloud Access Security Brokers - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.   Contents: 1 Introduction 1.1 Market Segment 1.2 Required capabilities 1.2.1 Discovery of Cloud Usage 1.2.2 Access Control 1.2.3 Securing Data in the Cloud 1.2.4 Compliance 1...
Analyst : 
Downloads : 
33
47 pages
Leadership Compass: Privilege Management - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.   Contents: 1 Introduction 1.1 Market Segment 1.2 Requ...
Analyst : 
Downloads : 
48
55 pages
Leadership Compass: Adaptive Authentication - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.   Contents: 1 Management Summary 1.1 Overall Leadership 1.2 Product Leadership 1.3 Market Leadership 1.4 Innovation Leadership 2 Methodology 3 Product Rating 4 Vendor Rating 5 Vendor Coverage 6 Market Segment 7 Specific features analyzed 8 Market Leaders 9 Product Leaders ...
Analyst : 
Downloads : 
14
49 pages
Leadership Compass: Identity as a Service: Single Sign-on to the Cloud - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market. Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities 2 Leadership 2.1 Overall Leadership 2.2 Product Leadership 2.3 Innovation Le...
Analyst : 
Downloads : 
27
53 pages
Leadership Compass: CIAM Platforms - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.   Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities...
Analyst : 
Downloads : 
29
53 pages
Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation - Product Benchmark - Worldwide
Oct 04, 2017 | Product & Supplier Benchmarks
0
Oct 04, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other groups of users. Your compass for finding the right path in the market. Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities 2 Leadership 2.1 Ove...
Analyst : 
Downloads : 
33
66 pages
Leadership Compass: Database Security - Product Benchmark - Worldwide
Oct 04, 2017 | Product & Supplier Benchmarks
0
Oct 04, 2017
Product & Supplier Benchmarks
0
Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data.   Contents: 1 Management Summary 1.1 Overall Leadership 1.2 Product Leadership 1.3 M...
Analyst : 
Downloads : 
27
49 pages
Le futur de la GRC : Nouveaux challenges, nouvelles approches - 1ère partie - InSight Analysis - France
Nov 27, 2017 | InSight Analysis
0
Nov 27, 2017
InSight Analysis
0
Ce rapport fait le point sur les problématiques qui se posent aux organisations pour répondre aux exigences règlementaires dans un contexte de plus en plus tendu, où la cyber-conformité se rajoute aux règlementations spécifiques. Dans une seconde partie nous ferons le point sur les types de solutions technologiques et les services de GRC (Governance Risk and Compliance) disponibles sur le marché. Cette étude s’adresse aux DSI, aux RSSI et plus généralement aux responsables des risque...
Analyst : 
Downloads : 
35
19 pages
IT Security by Segments - Market Figures - Americas by Countries
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Americas IT security market for the 2015-2021 period. It covers 4 countries (Canada, United States, Brazil, Mexico) and Rest of Americas. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Appl...
Analyst : 
Downloads : 
11
IT Security by Segments - Market Figures - Americas Consolidation
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Americas for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please c...
Analyst : 
Downloads : 
9
IT Security by Segments - Market Figures - Brazil
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Brazil for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
5
IT Security by Segments - Market Figures - Canada
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Canada for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
2
IT Security by Segments - Market Figures - Rest of Americas
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Rest of Americas for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. ...
Analyst : 
Downloads : 
7
IT Security by Segments - Market Figures - South Africa
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in South Africa for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Plea...
Analyst : 
Downloads : 
11
IT Security by Segments - Market Figures - Middle East
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Middle East for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Pleas...
Analyst : 
Downloads : 
6
IT Security by Segments - Market Figures - MEA by Countries
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the MEA (Middle East & Africa) IT security market for the 2015-2021 period. It covers 2 countries (Middle East, South Africa) and Rest of Africa. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data &a...
Analyst : 
Downloads : 
18
IT Security by Segments - Market Figures - Rest of MEA
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Rest of MEA (Middle East & Africa) for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; ...
Analyst : 
Downloads : 
7
IT Security by Segments - Market Figures - MEA Consolidation
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in MEA (Middle East & Africa) for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsour...
Analyst : 
Downloads : 
10
IT Security by Segments - Market Figures - APAC by Countries
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Asia Pacific IT security market for the 2015-2021 period. It covers 4 countries (Australia, China incl. Hong Kong, India, Japan) and Rest of Asia Pacific. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management...
Analyst : 
Downloads : 
8
IT Security by Segments - Market Figures - APAC Consolidation
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Asia-Pacific for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Plea...
Analyst : 
Downloads : 
4
IT Security by Segments - Market Figures - Australia
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Australia for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please ...
Analyst : 
Downloads : 
2
IT Security by Segments - Market Figures - China
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in China for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
3
IT Security by Segments - Market Figures - India
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in India for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
2
IT Security by Segments - Market Figures - Japan
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Japan for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
3
IT Security by Segments - Market Figures - Rest of APAC
Dec 29, 2017 | Market Figures & Forecast
0
Dec 29, 2017
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Rest of APAC for the 2015-2021 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Plea...
Analyst : 
Downloads : 
4

Pages