1 INTRODUCTION 22
1.1 OBJECTIVES OF THE STUDY 22
1.2 MARKET DEFINITION 23
1.3 MARKET SEGMENTATION 23
1.4 YEARS CONSIDERED FOR THE STUDY 24
1.5 CURRENCY CONSIDERED 25
1.6 STAKEHOLDERS 25


Download Free Sample Pages of this report


2 RESEARCH METHODOLOGY 26
2.1 RESEARCH DATA 26
2.1.1 SECONDARY DATA 27
2.1.2 PRIMARY DATA 28
2.1.2.1 Breakup of primaries 28
2.1.3 KEY INDUSTRY INSIGHTS 29
2.2 MARKET SIZE ESTIMATION 31
2.2.1 BOTTOM-UP APPROACH 31
2.2.2 TOP-DOWN APPROACH 32
2.3 ASSUMPTIONS FOR THE STUDY 33
2.3.1 LIMITATIONS OF THE STUDY 33

3 EXECUTIVE SUMMARY 34

4 PREMIUM INSIGHTS 38
4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE THREAT INTELLIGENCE MARKET 38
4.2 THREAT INTELLIGENCE MARKET, MARKET SHARE OF TOP 3 SOLUTIONS AND
REGIONS, 2018 39
4.3 THREAT INTELLIGENCE MARKET, TOP 3 SOLUTIONS 40
4.4 THREAT INTELLIGENCE MARKET, BY SERVICE, 2018–2023 40
4.5 THREAT INTELLIGENCE MARKET, BY DEPLOYMENT MODE, 2018 41
4.6 THREAT INTELLIGENCE MARKET, BY ORGANIZATION SIZE, 2018 41
4.7 THREAT INTELLIGENCE MARKET, TOP 3 VERTICALS, 2018 42
4.8 MARKET INVESTMENT SCENARIO 42
?

5 MARKET OVERVIEW 43
5.1 INTRODUCTION 43
5.2 MARKET DYNAMICS 43
5.2.1 DRIVERS 44
5.2.1.1 Increasing level of interconnectivity due to rising IoT and BYOD trends 44
5.2.1.2 Rise in the number of targeted attacks and ubiquitous APTs 45
5.2.1.3 Organization’s need to deploy next-gen cybersecurity 45
5.2.1.4 Stringent directives for data protection 46
5.2.2 RESTRAINTS 46
5.2.2.1 Organizations’ inability to afford robust threat intelligence services 46
5.2.2.2 Lack of skilled security professionals 47
5.2.3 OPPORTUNITIES 48
5.2.3.1 Integration of AI, machine learning, and big data analytics with threat intelligence 48
5.2.3.2 Highly regulated verticals continuing to create attractive opportunities for threat intelligence vendors 48
5.2.3.3 High demand for cloud-based threat intelligence solutions in SMEs 49
5.2.4 CHALLENGES 49
5.2.4.1 Complexities in deriving quality information from huge volumes of threat data 49
5.2.4.2 Duplicate data, large number of false positives, and lack of context 50
5.3 REGULATORY LANDSCAPE 50
5.3.1 GENERAL DATA PROTECTION REGULATION 50
5.3.2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) 51
5.3.3 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT 51
5.3.4 FEDERAL INFORMATION SECURITY MANAGEMENT ACT 51
5.3.5 SARBANES–OXLEY ACT 51
5.3.6 GRAMM–LEACH–BLILEY ACT 52
5.4 BEST PRACTICES IN THREAT INTELLIGENCE 52
5.4.1 DEFINING THE SCOPE OF THREAT INTELLIGENCE PROGRAM 52
5.4.2 DEVELOPING A CENTRAL DATABASE 52
5.4.3 MONITORING INTERNAL AND EXTERNAL THREATS 52
5.4.4 SPREADING AWARENESS ABOUT SECURITY AMONG EMPLOYEES AND
THIRD PARTIES 52
5.4.5 CONTINUOUS IMPROVEMENT IN GATHERING AND APPLYING THREAT INTELLIGENCE 53
5.5 INNOVATION SPOTLIGHT 53
5.5.1 MCAFEE 53
5.5.2 KASPERSKY LAB 53
5.5.3 PROOFPOINT 53
5.5.4 GROUP-IB 53
?

6 THREAT INTELLIGENCE MARKET, BY COMPONENT 54
6.1 INTRODUCTION 55
6.2 SOLUTIONS 56
6.2.1 INCREASING THREAT OF DATA BREACHES DUE TO GROWING SOPHISTICATION OF ATTACKS TO DRIVE THE ADOPTION OF THREAT INTELLIGENCE SOLUTIONS 56
6.3 SERVICES 57
6.3.1 ADOPTION OF SERVICES IS DRIVEN BY ORGANIZATIONS’ NEED TO DEPLOY PROACTIVE SECURITY 57

7 THREAT INTELLIGENCE MARKET, BY SOLUTION 58
7.1 INTRODUCTION 59
7.2 THREAT INTELLIGENCE PLATFORMS 60
7.2.1 THREAT INTELLIGENCE PLATFORMS ENABLE ORGANIZATIONS TO PERFORM FASTER AND DEEPER INVESTIGATIONS 60
7.3 SECURITY INFORMATION AND EVENT MANAGEMENT 61
7.3.1 SIEM SOFTWARE ENABLES USERS TO EXECUTE EVENT FORENSICS FOR ESTABLISHING WHAT ACTUALLY HAPPENED BEFORE, DURING, AND AFTER LOG EVENTS 61
7.4 LOG MANAGEMENT 62
7.4.1 EXPONENTIAL INCREASE IN LOG DATA DUE TO EMERGENCE OF CLOUD TO DRIVE THE DEMAND FOR LOG MANAGEMENT SOLUTIONS 62
7.5 SECURITY AND VULNERABILITY MANAGEMENT 63
7.5.1 RAPID GROWTH IN CYBERCRIMES IS FUELING THE ADOPTION OF SVM SOLUTIONS AMONG GLOBAL ENTERPRISES 63
7.6 IDENTITY AND ACCESS MANAGEMENT 64
7.6.1 INCREASING THREAT OF DATA BREACHES DUE TO INSIDER ATTACKS IS ENCOURAGING ORGANIZATIONS TO DEPLOY THE IAM SOLUTION 64
7.7 RISK AND COMPLIANCE MANAGEMENT 65
7.7.1 COMPLIANCE WITH GOVERNMENT REGULATIONS AND ADOPTION OF BEST SECURITY PRACTICES ARE FUELING THE GROWTH OF THE RISK AND COMPLIANCE MANAGEMENT SOLUTION 65
7.8 INCIDENT FORENSICS 66
7.8.1 HEAVY FINANCIAL LOSSES POST SECURITY INCIDENTS ARE DRIVING THE ADOPTION OF THE INCIDENT FORENSICS SOLUTION 66
7.9 USER AND ENTITY BEHAVIOR ANALYTICS 67
7.9.1 ADOPTION OF THE UEBA SOLUTION IS DRIVEN DUE TO THE INCREASING CYBER THREATS POSED BY INSIDERS IN ORGANIZATIONS 67
?

8 THREAT INTELLIGENCE MARKET, BY SERVICE 69
8.1 INTRODUCTION 70
8.2 MANAGED SERVICES 71
8.2.1 MANAGED SERVICES ARE GAINING POPULARITY AS THEY HELP ORGANIZATIONS MANAGE NEED TO COMPLIANCE 71
8.2.2 ADVANCED THREAT MANAGEMENT 72
8.2.2.1 Cost-saving benefits of the ATM services over in-house IT security services are compelling organizations to adopt them 72
8.2.3 SECURITY INTELLIGENCE FEEDS 73
8.2.3.1 Security intelligence feeds are playing a key role in protecting organizations from potential cyber-attacks 73
8.3 PROFESSIONAL SERVICES 74
8.3.1 INCREASING VOLUME OF THREAT DATA AND EMERGING CYBER THREATS ARE ENCOURAGING ORGANIZATIONS TO ADOPT PROFESSIONAL SERVICES 74
8.3.2 CONSULTING SERVICES 75
8.3.2.1 Consulting services help optimize organizations’ ability to consume, analyze, and apply cyber threat intelligence to protect digital assets 75
8.3.3 TRAINING AND SUPPORT 75
8.3.3.1 Lack of skilled security professionals is driving the adoption of training services 75

9 THREAT INTELLIGENCE MARKET, BY DEPLOYMENT MODE 77
9.1 INTRODUCTION 78
9.2 ON-PREMISES 79
9.2.1 ON-PREMISES THREAT INTELLIGENCE SOLUTIONS ENABLE ORGANIZATIONS TO CONTROL PLATFORMS, APPLICATIONS, SYSTEMS, AND DATA 79
9.3 CLOUD 80
9.3.1 COST-EFFECTIVENESS OF CLOUD-BASED SOLUTIONS IS DRIVING THEIR ADOPTION 80

10 THREAT INTELLIGENCE MARKET, BY ORGANIZATION SIZE 81
10.1 INTRODUCTION 82
10.2 SMALL AND MEDIUM-SIZED ENTERPRISES 83
10.2.1 GROWING ATTACK SURFACE IN SMALL AND MEDIUM-SIZED ENTERPRISES IS ENCOURAGING THEM TO DEPLOY THREAT INTELLIGENCE SOLUTIONS 83
10.3 LARGE ENTERPRISES 84
10.3.1 RISE IN THE NUMBER OF ADVANCED PERSISTENT THREATS IS FUELING THE ADOPTION OF THREAT INTELLIGENCE SOLUTIONS AMONG LARGE ENTERPRISES 84
?

11 THREAT INTELLIGENCE MARKET, BY VERTICAL 85
11.1 INTRODUCTION 86
11.2 GOVERNMENT AND DEFENSE 87
11.2.1 INCREASED SPENDING ON THREAT INTELLIGENCE SOLUTIONS AND SERVICES BY THE GOVERNMENT AND DEFENSE VERTICAL IS EXPECTED TO DRIVE THE GROWTH OF THE THREAT INTELLIGENCE MARKET 87
11.3 BANKING, FINANCIAL SERVICES, AND INSURANCE 88
11.3.1 INCREASED INSTANCES OF CYBER-ATTACKS IN THE FINANCIAL VERTICAL DRIVING THE ADOPTION OF THREAT INTELLIGENCE SOLUTIONS 88
11.4 IT AND TELECOM 89
11.4.1 RAPID TECHNOLOGICAL ADVANCEMENTS IN IOT, CLOUD, TELECOM CONNECTIVITY, AI-BASED APPLICATIONS, AND SMART INFRASTRUCTURE DRIVING THE DEMAND OF THREAT INTELLIGENCE IN THE IT AND TELECOM VERTICAL 89
11.5 HEALTHCARE 90
11.5.1 INCREASING NUMBER OF DATA BREACHES AND COMPROMISED ELECTRONIC HEALTHCARE RECORDS DRIVING THE DEMAND FOR THREAT INTELLIGENCE SOLUTIONS AND SERVICES 90
11.6 RETAIL 91
11.6.1 EXPANDING CUSTOMER BASE AND GROWING USE OF HIGH-TECH BY RETAIL VENDORS LEADING TO DEMAND FOR THREAT INTELLIGENCE IN RETAIL VERTICAL 91
11.7 TRANSPORTATION 92
11.7.1 PROLIFERATION OF CLOUD SERVICES AND INCREASED INSTANCES OF CYBER-ATTACKS TO INCREASE THE DEMAND OF THREAT INTELLIGENCE SOLUTIONS 92
11.8 ENERGY AND UTILITIES 93
11.8.1 INCREASED INSTANCES OF CYBER-ATTACKS ON THE CRITICAL INFRASTRUCTURE WOULD SURGE THE ADOPTION OF THREAT INTELLIGENCE SOLUTIONS AND SERVICES 93
11.9 MANUFACTURING 94
11.9.1 HUGE INVESTMENTS IN INDUSTRY 4.0 BY MANUFACTURING INDUSTRY TO BENEFIT THE THREAT INTELLIGENCE MARKET 94
11.10 EDUCATION 95
11.10.1 INCREASING AWARENESS OF CYBER THREATS IN THE EDUCATION VERTICAL TO DRIVE THE GROWTH OF THE THREAT INTELLIGENCE MARKET 95
11.11 OTHERS 96
?
12 THREAT INTELLIGENCE MARKET, BY REGION 97
12.1 INTRODUCTION 98
12.2 NORTH AMERICA 99
12.2.1 UNITED STATES 104
12.2.1.1 US holds the highest market share in the threat intelligence market owing to a large number of vendors and increased instances of cyber-attacks in the region 104
12.2.2 CANADA 104
12.2.2.1 Adoption of threat intelligence solutions and services expected to increase in BFSI, IT and Telecom, and manufacturing in Canada 104
12.3 EUROPE 105
12.3.1 UNITED KINGDOM 109
12.3.1.1 IT and Telecom and financial sector to be top verticals under constant threat from attackers 109
12.3.2 GERMANY 109
12.3.2.1 Ransomware, spyware, and reconnaissance to be top threat vectors leading to increase in adoption of threat intelligence solutions and services 109
12.3.3 FRANCE 109
12.3.3.1 BFSI, Government, and IT and Telecom to continue to be subject to hostile reconnaissance activities in coming years 109
12.3.4 REST OF EUROPE 109
12.4 ASIA PACIFIC 110
12.4.1 CHINA 116
12.4.1.1 Increased instances of attacks from virus, worms, spyware, Trojan, and ransomware on enterprises and government organizations to impact threat intelligence market growth 116
12.4.2 JAPAN 116
12.4.2.1 Manufacturing, retail, and IT and Telecom continue to be top verticals which are under constant threat from cyber-criminals 116
12.4.3 INDIA 116
12.4.3.1 Service specific attacks, brute forcing, and network manipulation attacks on BFSI, IT and Telecom, and Government to increase adoption of threat intelligence solutions and services 116
12.4.4 AUSTRALIA AND NEW ZEALAND (ANZ) 116
12.4.4.1 Proliferation of cloud services and growing IoT trend to attract high intensity threat vectors on enterprise devices and network 116
12.4.5 REST OF ASIA PACIFIC 117
12.5 MIDDLE EAST AND AFRICA 117
12.5.1 MIDDLE EAST 121
12.5.1.1 Convergence of IT and OT, need to protect industrial assets, and growing trend of IIoT to impact high growth in the threat intelligence market 121
12.5.2 AFRICA 121
12.5.2.1 Need to protect the critical infrastructure is driving the growth in the threat intelligence market 121
12.6 LATIN AMERICA 122
12.6.1 BRAZIL 126
12.6.1.1 Service specific attacks, malware, phishing, DDoS, and reconnaissance to be major threat vectors which has forced enterprises to increase adoption of threat intelligence solutions 126
12.6.2 MEXICO 126
12.6.2.1 Increasing volume of data and increased instances of insider and outsider threats is forcing enterprises and organization to adopt threat intelligence solutions 126
12.6.3 REST OF LATIN AMERICA 126

13 COMPETITIVE LANDSCAPE 127
13.1 OVERVIEW 127
13.2 COMPETITIVE SCENARIO 129
13.2.1 PARTNERSHIPS, AGREEMENTS, AND COLLABORATIONS 129
13.2.2 NEW PRODUCT LAUNCHES AND PRODUCT ENHANCEMENTS 130
13.2.3 MERGERS AND ACQUISITIONS 131
13.2.4 BUSINESS EXPANSIONS 132

14 COMPANY PROFILES 134
14.1 INTRODUCTION 134
(Business Overview, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View)*
14.2 SYMANTEC 135
14.3 IBM 139
14.4 FIREEYE 143
14.5 CHECK POINT 146
14.6 TREND MICRO 149
14.7 DELL TECHNOLOGIES 152
14.8 ALIENVAULT 155
14.9 WEBROOT 157
14.10 DIGITAL SHADOWS 159
14.11 OPTIV 160
14.12 THREATCONNECT 162
14.13 CROWDSTRIKE 164
14.14 MCAFEE 166
14.15 LOGRHYTHM 169
14.16 LOOKINGGLASS CYBER SOLUTIONS 173
14.17 FARSIGHT SECURITY 176
14.18 KASPERSKY LAB 178
14.19 PROOFPOINT 180
14.20 GROUP-IB 183
14.21 BLUELIV 185
14.22 INTEL 471 186
14.23 PHISHLABS 188
14.24 DOMAINTOOLS 189
14.25 FLASHPOINT 190
14.26 SURFWATCH LABS 192
*Details on Business Overview, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View might not be captured in case of unlisted companies.

15 APPENDIX 193
15.1 DISCUSSION GUIDE 193
15.2 KNOWLEDGE STORE: MARKETSANDMARKETS’ SUBSCRIPTION PORTAL 197
15.3 AVAILABLE CUSTOMIZATIONS 199
15.4 RELATED REPORTS 199
15.5 AUTHOR DETAILS 200