Global Deception Technology Market 2016-2020


#785438

112pages

Technavio

$ 2500

In Stock

About Cyber Deception

The term cyber deception was coined in 1989 by Gene Spafford. He sourced active defenses to identify attacks in the network, slow down attackers while they attempt to infuse virus attacks, learn their techniques, and feed them with fake data. In 1999, the Honeynet Project was launched, with innovation to the deception techniques and ways to understand and learn the behavior and competency of attackers.

Technavios analysts forecast the global deception technology market to generate revenue over USD 1 billion.

Covered in this report
The report covers the present scenario and the growth prospects of the global deception technology market for 2016-2020. To calculate the market size, the report considers the revenue generated from the sales of deception technology solutions.

The market is divided into the following segments based on geography:
Americas
APAC
EMEA

Technavio's report, Global Deception Technology Market 2016-2020, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Key vendors
GraudiCore
Attivo Networks
Cymmetria
TrapX Security

Other prominent vendors
Allure Security Technology
CyberTrap
ForeScout
Hexis Cyber Solutions
LogRhythm
Illusive Networks
Percipient Networks
Rapid7
Shape Security
Specter
TopSpin Security

Market driver
Increased adoption of BYOD policy among enterprises
For a full, detailed list, view our report

Market challenge
Lack of efficient security solutions
For a full, detailed list, view our report

Market trend
Implementing firewall as a disruptive deception capability
For a full, detailed list, view our report

Key questions answered in this report
What will the market size be in 2020 and what will the growth rate be?
What are the key market trends?
What is driving this market?
What are the challenges to market growth?
Who are the key vendors in this market space?
What are the market opportunities and threats faced by the key vendors?
What are the strengths and weaknesses of the key vendors?

You can request one free hour of our analysts time when you purchase this market report. Details are provided within the report.





PART 01: Executive summary
Highlights
Key findings
PART 02: Scope of the report
Market overview
PART 03: Market research methodology
Research methodology
Economic indicators
PART 04: Introduction
Key market highlights
PART 05: Market description
Types of cyber threats
Types of attacks
Cyber attacks by geography
Instances of cyber attacks
Implementation of deception technology solutions
Regulations against cyber threats
Stages of deception
Applications of deception security solutions
PART 06: Product life cycle analysis
PART 07: Market landscape
Market overview
Market size and forecast
PART 08: Five forces analysis
PART 09: Geographical segmentation
Global deception technology by geography
Deception technology market in Americas
Deception technology market in EMEA
Deception technology market in APAC
PART 10: Market attractiveness
Market attractiveness by geography
PART 11: Buying criteria
PART 12: Market opportunities
PART 13: Market drivers
Increase in number of incidents of identity theft
Growing number of network security threats
Increased adoption of BYOD policy among enterprises
Stringent government regulations
PART 14: Impact of drivers
PART 15: Market challenges
Lack of efficient security solutions
Complex IT infrastructure
Challenges associated with compatibility of security solutions
Adverse impact of traffic on network performance
PART 16: Impact of drivers and challenges
PART 17: Market trends
Increasing reliance on partnership networks
Rise in adoption of hybrid models
Implementing firewall as a disruptive deception capability
PART 18: Vendor landscape
Competitive scenario
Vendor matrix
Vendor analysis
Other prominent vendors
PART 19: Appendix
Market assumptions
PART 20: Appendix
List of abbreviations
PART 21: Explore Technavio
List of Exhibits
Exhibit 01: Penetration of deception technology in enterprises 2015 and 2020 (%)
Exhibit 02: Countries considered
Exhibit 03: Types of attacks
Exhibit 04: Cyber attacks in 2015
Exhibit 05: Implementation of deception technology solutions
Exhibit 06: Stages of deception
Exhibit 07: Life cycle of deception technology
Exhibit 08: Market overview
Exhibit 09: Global deception technology market 2015-2020 ($ billions)
Exhibit 10: Five forces analysis
Exhibit 11: Global deception technology by geography 2015-2020 (% share)
Exhibit 12: Deception technology market in Americas 2015-2020 ($ millions)
Exhibit 13: Deception technology market in EMEA 2015-2020 ($ millions)
Exhibit 14: Deception technology market in APAC 2015-2020 ($ millions)
Exhibit 15: Market attractiveness by geography 2015-2016
Exhibit 16: Market attractiveness by geography 2019-2020
Exhibit 17: Buying criteria for deception technology
Exhibit 18: Cloud-based deception model
Exhibit 19: Deception technology in defense organizations
Exhibit 20: MSSP M&A
Exhibit 21: Identity thefts by sector 2015 (% of total identity theft attacks globally)
Exhibit 22: Government regulations and their objectives
Exhibit 23: Impact of drivers
Exhibit 24: Impact of drivers and challenges
Exhibit 25: Major partnerships
Exhibit 26: Vendor matrix
Exhibit 27: Levels of deception offered by vendors
Exhibit 28: Vendor analysis
Exhibit 29: Other prominent vendors
Exhibit 30: Market assumptions