Cybersecurity - Thematic Research

Cybersecurity - Thematic Research

Summary

The cybersecurity landscape is complex. Today’s always-connected world offers a myriad of opportunities for cyberattackers to disrupt countries, organizations, and individuals. Maintaining the security of IT systems is a constant struggle for organizations of all types. Cyberattacks are frequent and increasingly complex, perpetrated by those furthering a geopolitical cause or attackers intent on making money. State-sponsored attacks are a significant risk. No one-not even security providers themselves—is safe from attack. Companies manage an array of assets, including infrastructure, applications, managed and unmanaged endpoints, mobile devices, and cloud services—all of which are under threat. New vulnerabilities can be uncovered at any time, and there is also the worry of an insider attack.

Key Highlights

  • In 2021, enterprises invested more in cybersecurity and cloud architecture due to employees working remotely during the pandemic. This also sparked an M&A boom in the tech sector. Most cybersecurity M&A deals in 2021 were related to managed security services, network security, endpoint security, identity management, and cloud security. Microsoft, which bought cloud infrastructure company CloudKnox, threat intelligence and attack service management firm RiskIQ, and Internet of Things (IoT) security company ReFirm Labs, was one of the leading acquirers in 2021. Google added to its security capabilities by buying Mandiant (formerly FireEye) for $5.4 billion in March 2022, not long after purchasing threat detection firm Siemplify.
  • Securing hybrid working, coping with ransomware and continuing supply chain threats, and moving to a zero-trust security model as a long-term solution to data breaches will drive strong security growth over the next three years. Innovation will be needed to counter the continuously evolving cyberthreat landscape that includes the fallout from the Ukraine-Russia conflict. According to GlobalData estimates, the global cybersecurity industry will grow from $125.5 billion in 2020 to $198.0 billion in 2025 at a compound annual growth rate (CAGR) of 9.5%.
  • Scope
    • This report provides an overview of the cybersecurity theme.
    • It identifies the key trends impacting growth of the theme over the next 12 to 24 months, split into three categories: technology trends, macroeconomic trends, and regulatory trends.
    • It includes comprehensive industry analysis, including market size forecasts for cybersecurity and analysis of patents, company filings, hiring, and social media trends.
    • It contains details of M&A deals driven by the cybersecurity theme, and a timeline highlighting milestones in the development of cybersecurity.
    • The detailed value chain is split into three main areas: hardware, software, and services. The hardware segment includes chip-based security. The software segment includes identity management, network security, endpoint security, threat detection and response, cloud security, data security, email security, application security, unified threat management, and vulnerability management. The services segment includes managed security services, post-breach response services, and risk and compliance services.
    Reasons to Buy
    • In a little over a decade, according to the World Economic Forum (WEF) Global Risks Report, cybercrime has moved from being a specialist crime to one of the most significant strategic risks facing the world today. This report provides an invaluable guide to this extremely disruptive theme. It includes comprehensive lists of the leading players across all aspects of the cybersecurity value chain, helping companies identify the right partners.
    • The report also includes a guide to the major threat actors and looks at the main types of cyberattack, from un-targeted attacks like phishing to targeted attacks like distributed denial of service (DDoS).


    • Executive Summary
    • Players
      • Table Figure 1: This graphic lists the leading players in the cybersecurity theme and shows where they sit in the value chain
    • Technology Briefing
      • Threat actors
        • Table Threat actors
      • Types of cyberattack
        • Table Figure 2: Organizations' technical complexity breeds vulnerability
      • Stages of an attack
    • Trends
      • Technology trends
        • Table Technology trends
      • Macroeconomic trends
        • Table Macroeconomic trends
      • Regulatory trends
        • Table Regulatory trends
    • Industry Analysis
      • The rise and rise of ransomware
        • Table Figure 3: Actors and vehicles behind a cyberattack
      • Market size and growth forecasts
        • Table Figure 4: By 2025, global security revenues will have reached $198.0 billion
        • Table Figure 5: Managed security services account for the largest share of cybersecurity revenues from 2020 to 2025
        • Table Figure 6: How key cybersecurity products and services will grow from 2020 to 2025
      • Mergers and acquisitions
        • Table Figure 7: The key themes driving cybersecurity M&As
        • Table Key M&A transactions associated with the cybersecurity theme since June 2020
      • Patent trends
        • Table Figure 8: New patents are evidence of a continual battle against cybercriminals
        • Table Figure 9: Over 70% of cybersecurity patents globally are registered in China and the US
      • Company filings trends
        • Table Figure 10: Cybersecurity mentions in company filings are consistently high, peaking in Q2 2021
      • Hiring trends
        • Table Figure 11: Cybersecurity job vacancies rose from under 40,000 in January 2020 to 138,087 in March 2022
        • Table Figure 12: Zero trust and ransomware professionals are in demand across TMT, healthcare, and financial services
      • Social media trends
        • Table Figure 13: Zero trust social media mentions spiked in October 2021
      • Timeline
        • Table Figure 14: The cybersecurity story
    • Value Chain
      • Table Figure 15: Our cybersecurity value chain
      • Cybersecurity hardware
        • Table Figure 16: The cybersecurity value chain - hardware
      • Cybersecurity software
        • Table Figure 17: The cybersecurity value chain - software - Identity management: leaders and challengers
        • Table Figure 18: The cybersecurity value chain - software - Network security: leaders and challengers
        • Table Figure 19: The cybersecurity value chain - software - Endpoint security: leaders and challengers
        • Table Figure 20: The cybersecurity value chain - software - Threat detection and response: leaders and challengers
        • Table Figure 21: The cybersecurity value chain - software - Cloud security: leaders and challengers
        • Table Figure 22: The cybersecurity value chain - software - Data security: leaders and challengers
        • Table Figure 23: The cybersecurity value chain - software - Email security: Leaders and challengers
        • Table Figure 24: The cybersecurity value chain - software - Application security: leaders and challengers
        • Table Figure 25: The cybersecurity value chain - software - Unified threat management: leaders and challengers
        • Table Figure 26: The cybersecurity value chain - software - Vulnerability management: leaders and challengers
      • Cybersecurity services
        • Table Figure 27: The cybersecurity value chain - services - Managed security services: leaders and challengers
        • Table Figure 28: The cybersecurity value chain - services - Post-breach response services: leaders and challengers
        • Table Figure 29: The cybersecurity value chain - services - Risk and compliance services: leaders and challengers
    • Companies
      • Public companies
        • Table Public companies
      • Private companies
        • Table Private companies
    • Sector Scorecards
      • Enterprise security sector scorecard
        • Table Figure 30: Who does what in the enterprise security space?
        • Table Figure 31: Thematic screen - Enterprise security sector scorecard
        • Table Figure 32: Valuation screen - Enterprise security sector scorecard
        • Table Figure 33: Risk screen - Enterprise security sector scorecard
      • IT services sector scorecard
        • Table Figure 34: Who does what in the IT services space?
        • Table Figure 35: Thematic screen - IT services sector scorecard
        • Table Figure 36: Valuation screen - IT services sector scorecard
        • Table Figure 37: Risk screen - IT services sector scorecard
    • Glossary
      • Table Glossary
    • Further Reading
      • GlobalData reports
        • Table GlobalData reports
    • Our thematic research methodology
      • Table Figure 38: Our five-step approach for generating a sector scorecard
    • About GlobalData
    • Contact Us

    Download our eBook: How to Succeed Using Market Research

    Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

    Download eBook
    Cookie Settings