Consumer End-point Security Market - Outlook (2015-19) Market_APAC

Embed Size (px)

Citation preview

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    1/17

    Consumer End-point Security Market - Outlook (2015-19)

    for APAC

    [email protected]+1-408-469-4380

    +91-80-6134-1500www.researchfox.com

    1

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    2/17

    ResearchFox Consulting is an Indian market research

    and consulting firm based in Bangalore. We strive to

    provide our clients with research data and reports whichthey can trust and analyze. Insights gleaned from our

    detailed and comprehensive research reports helps our

    clients stay ahead of trends. ResearchFox serves clients

    with services from data collection to analysis and

    reports. ResearchFox has extensive sector expertise and

    its consultants are abreast of global trends and issues

    across industries. Our areas of expertise include

    Manufacturing, IT, FMCG, Healthcare, Automotive,Government Sector and NGO, BFSI and Retail.

    Disclaimer :This report is furnished to the recipient for information

    purposes only. Each recipient should conduct their own

    investigation and analysis of any such information

    contained in this report. No recipient is entitled to rely on

    the work of ResearchFox Consulting Pvt.Ltd. contained in

    this report for any purpose. ResearchFox Consulting Pvt.

    Ltd. makes no representations or warranties regarding the

    accuracy or completeness of such information and

    expressly disclaims any and all liabilities based on such

    information or on omissions therefrom. The recipient must

    not reproduce, disclose or distribute the information

    contained herein without the express prior written consent

    of ResearchFox Consulting Pvt.Ltd.

    Copyright 2015. ResearchFox Consulting Private Limited

    2

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    3/17

    Tableof Contents

    1. Introduction

    1.1. Report Description1.2. Objective

    1.3. Scope of the Research

    1.4. Regions Covered

    1.5. Key Takeaways

    1.6. Key Stakeholders

    1.7. Key Terminologies

    1.8. List of Abbreviations

    2. Executive Summary

    2.1. Executive Overview

    3. Research and Forecasting

    3.1. Research Methodology

    3.2. Forecasting Methodology

    4. Industry Landscape

    4.1. Market Size and Growth

    4.2. Competitive Landscape

    4.3. Market Share

    4.4. Company Classification4.5. Region Outlook

    4.6. Market Metrics

    4.7. Porter's Five Forces Model

    4.8. Key Drivers Analysis

    4.9. Key Constraints Analysis

    4.10. Key Opportunities Identified

    4.11. Key Challenges Identified

    5. Market Segmentation

    5.1. Region 5.1.1. APAC

    5.1.1.1. Market Size and Forecasting

    5.1.1.2. Key Drivers Analysis

    5.1.1.3. Key Constraints Analysis

    5.1.1.4. Key Opportunities Identified

    5.1.1.5. Key Challenges Identified

    5.1.1.6. Sub Segments

    5.1.1.6.1. Deployment : On-Premise

    5.1.1.6.2. Deployment : Cloud

    3

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    4/17

    d dfgfdh dfgfh dfhgf

    Introduction 014

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    5/17

    1. Introduction

    1.1. Report Description

    Internet penetration and improvement of telecom technology has enabled the use of different forms

    endpoint devices like the laptops, smartphones, tablets and various others. Internet users today are so

    much attached to these devices that almost anything and everything is now being browsed over the

    Internet using these devices. While technology is being seen as a facilitator in this case, there are several

    security related risks these activities can bring to the devices used by the consumers. The growing cyber-

    attacks which equally attack the business users as well as individual consumers has prompted many

    individuals to secure their endpoint perimeter. This has enabled the growth of consumer endpoint security

    solutions across the globe.

    The growing sophistication in attacks is making individuals to voluntarily adopt consumer endpoint securitysolutions irrespective of their activities both on-line and offline. The market for Consumer endpoint security

    solutions is expected to flourish further due to increasing average endpoint device per person.This report

    exclusively focuses on studying the Consumer Endpoint Security Solutions market and does not include the

    study of Enterprise endpoint security solutions market.

    The market for Consumer Endpoint Security solution has existed and is growing. And this report provides

    deep insights on how the market is expected to fare in the next five years. It also presents interpretative and

    easy-to-understand facts on how the current Consumer Endpoint Security market is segmented based on

    the deployment type and also based on the geographic regions.

    1.2. Objective

    1. To understand the Consumer Endpoint Security market across the globe by addressing the challenges

    faced by the industry with regards to the adoption of Consumer Endpoint Security solutions.

    2. To estimate the size of present global Consumer Endpoint Security solutions market and to forecast its

    future values.

    1.3. Scope of the Research

    Scope of the research was limited to understanding the market share across segments. Key drivers,constraints and challenges along with their impact on various business functions in both short term and

    long term were addressed. Segmentations and forecasting were done based on:

    1. Deployment Type (On-premise vs Cloud)

    2. Region Based Segmentation (North America, Europe, APAC, South America and RoW)

    1.4. Regions Covered

    1. North America (US, Canada and Mexico and other countries)

    2. Europe (United Kingdom, France, Germany, Italy, Spain and other countries)

    3. APAC (Australia, India, China, Japan, Singapore and others)

    4. South America (Brazil, Argentina and others)

    5. RoW (Middle East and Africa, South America, Russia and other countries)

    5

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    6/17

    1.5. Key Takeaways

    1. North America holds the highest market share in terms of revenue followed by the European region. But,

    Asia-Pacific region is set to record the highest adoption/growth rate in the coming years.

    2. The market for Consumer Endpoint Security was USD 5754.90 million in 2014 and is expected to grow at a

    CAGR of close to 7.20% till 2019.

    3. Deployment wise, traditional on-premise solutions have the highest market share but Cloud based

    solutions are slowly eating up this market share and are experiencing greater adoption rate than on-

    premise solutions.

    1.6. Key Stakeholders

    1. Consumer Endpoint Security solution and product providers: Consumer Endpoint Security solutionproviders will be able to gauge the market more accurately as this will assist them in better decision

    making. Also, the product developers would be able to develop products according to the requirement of

    the customers.

    2. End-User companies: Report will provide the end-users, a more clear picture on the solution provider

    demographics so that they can choose among the best.

    3. Global Investors: Those investors who look to fund new and budding cloud based Consumer Endpoint

    solution provider start-ups, will get clear picture about the market and its trends.

    4. Industry Watchers: Industry and trend watchers are always referred to as trusted advisors who follow

    markets. The report would add to their knowledge repository, creating value for their know-how.

    6

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    7/17

    1.7. Key Terminologies

    1. APAC: Mainly includes Australia, India, China, Japan, Singapore and other nations in the region

    2. Europe: Mainly includes United Kingdom, France, Germany, Spain and other European nations

    3. MEA: Mainly includes Israel, South Africa, UAE and other nations

    4. North America: Mainly includes United States of America, Canada, Mexico and other North American

    nations

    5. South America: Mainly includes Brazil and Argentina and other South American nations

    6. Enterprise: Companies with an employee headcount above 1001.

    7. Mid-Size: Companies with an employee headcount between 501 ? 1000.

    8. Small-Business: Companies with an employee up to 500.

    7

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    8/17

    1.8. List of Abbreviations

    1. USD: United States Dollar

    2. CAGR: Compound Annual Growth Rate

    3. USA: United States of America

    4. APAC: Asia-Pacific

    5. IT: Information Technology

    6. RoW: Rest of the World

    7. UK: United Kingdom

    8. R&D: Research and Development

    9. SMB: Small and Medium Businesses

    10. UAE: United Arab Emirates

    11. SOHO: Small Office Home Office

    8

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    9/17

    d dfgfdh dfgfh dfhgf

    Executive Summary 029

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    10/17

    2. Executive Summary

    2.1. Executive Overview

    Apart from the cyber-attacks on the businesses, miscreants are now actively targeting individual endpoint

    device users or Small Office Home Office (SOHO) users. As there is increased use of multiple devices,

    keeping a track of their security and managing each and every devices is becoming a herculean task.

    Moreover, negligence or accidental revealing of access information or other similar has resulted in breach of

    privacy of data. Containing the ever increasing endpoint device attacks and at the same time providing

    quick access to Internet networks through these devices is the underlying challenge.

    Consumer Endpoint security solutions is slowly gaining popularity among many of the endpoint deviceusers worldwide. Earlier, those individual users who preferred solutions like antivirus or antimalware are

    now actively adopting the comprehensive consumer endpoint security solutions. The availability of

    advanced endpoint security solutions that support several multiple devices and the cost effectiveness of

    these solutions is driving many of the device users to adopt these solutions.

    Consumer Endpoint Security Market Growing Steadily

    With growing frequency of attacks and increased use of endpoint devices, solutions like Consumer Endpoint

    Security is expected to flourish further. The "Global Consumer Endpoint Security Market - Outlook (2015-

    2019)" report suggests that the overall market was valued at USD 5754.90 million in 2014 and is expected to

    grow at a steady CAGR of 7.70% till 2019. The introduction of cloud based consumer endpoint security

    solutions would also add to the growing market.

    Asia-Pacific region set to record highest Adoption Rate

    While North America holds the maximum market share followed by the contribution from the European

    users, the startling adoption rate is expected to be recorded in the Asia-Pacific region. Those solution

    providers who possess vital market share in developed countries like the USA , Canada, UK, Germany, Japan

    and others, are now turning towards the Asia-Pacific market and especially concentrating on emerging

    economies like India.

    Cloud based Consumer Endpoint Security Solutions Gaining Momentum

    As most of the large organizations have been using traditional endpoint security solutions, the market share

    for this solutions remains high. However, with businesses moving towards cloud and with the introduction

    of cloud based versions of endpoint security solutions, businesses, especially medium and small level

    companies are expected to extensively start adopting them. This is expected to provide the necessary boost

    to the cloud based endpoint security provider companies.

    The Underlying Challenges

    While the introduction of cloud based version of consumer endpoint security solutions has considerably

    reduce the costs of these solutions, the main question of concern that would decide on the growth of the

    market would be the effectiveness of the solution. Many of the previous attacks and failure of existing

    10

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    11/17

    security solutions has reduced the faith of device users about this solution. However, with introduction of

    advanced solutions that stay up-to-date in terms of security aspects, the market can expect to grow in the

    near future.

    11

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    12/17

    d dfgfdh dfgfh dfhgf

    Research and Forecasting 0312

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    13/17

    3.1. Research Methodology

    Base Year: 2014Forecasting Period: 2015 - 2019

    3.1.1. Sampling

    The leading suppliers of each end-user product categories that were chosen to provide a larger

    representative sample.

    Purposive unit sampling was adopted for every service segment such as verticals, regions, end-users and

    others. This was resorted to, in order to elicit the appropriate inputs with regard to the qualitative growth

    aspects of the market.

    3.1.2. Secondary Research

    The research methodology that was carried out was desk research through various journals, association

    reports, and in house database to build a knowledge base on various market service segments, product

    categories and industry trends.

    Various fact based data was analyzed. Some of the sources included:

    a. ResearchFox Knowledge Base:

    Previous data on the market has been put through a rigorous and comprehensive analysis to analyze

    the current state.

    b. Desk Research:

    Industry reports, annual reports, press releases, webinars, journals and publication, independent rating

    agencies and government statistics.

    3.1.3. Primary Research

    Primary interviews were conducted among various stakeholders:

    Product and service companies

    Members of associations and alliances

    Subject Matter Experts and Evangelists

    Consultants and Strategists

    13

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    14/17

    3.1.4. Industry Information

    It was essential to understand the current industry landscape, market dynamics, security ecosystem and

    competitor metrics. To estimate the global market, Chief Experience Officers (CXOs), Marketing Heads, Sales

    Managers and product stakeholders were interviewed.

    3.1.5. Technical Information

    In addition to the interviews with leading participants for industry-related information, ResearchFox

    conducted interviews with Research and Development (R&D) and Design and Development teams to

    understand the current usage of the products by service type and also to find out the emerging trends.

    Finally, interviews with suppliers were conducted to cross check the validity of information and also to

    understand the emerging trends in the end-user segment.The detailed methodology for primary research is outlined below.

    3.1.6. Primary Interview Questionnaire Design

    ResearchFox developed a detailed questionnaire, which was used by the analysts as a guide for their

    discussions. This process ensured the collection of all necessary data. The questionnaire was designed to

    elicit unbiased industry level data (market size, production, sales, and others), that had check points

    (questions such as company level information and their position in the industry acted as check points) to

    ensure accuracy of the data. The questionnaire included the following sections:

    1. Industry level information

    2. Characteristics and Dynamics

    3. Company-specific information

    4. Market segmentation data

    3.1.7. Interview Questionnaire Test and Validation

    Following the design of the questionnaire, ResearchFox carried out some initial interviews to verify that theappropriate market and technology data was generated. After the final design of the questionnaire,

    ResearchFox began full scale primary research. Specific companies targeted for primary research interviews

    were selected based upon market participation. Higher was the entity's profile, more attractive was the

    entity.

    14

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    15/17

    3.1.8. Interview Process

    As participants respond in the course of an interview, ResearchFox analysts are trained to move from lower

    priority and/ or sensitive topics to increasingly key and/or sensitive topics in response to the interviewee's

    behavior. This responsive and reflective interview process, combined with the analysts' ability to discuss the

    industry and technical issues in an open and sharing environment, allows ResearchFox to probe for key

    data, operations, and competitive information. Multiple contacts within a single organization and with an

    individual are often planned and/or staged in order to optimize and complete the information gathering

    process.

    3.1.9. Research Validation

    At a point, when 20 percent of the research interviews and/or data collection had been completed,

    ResearchFox consultants evaluated the preliminary findings to assure that up-to-date results are in line with

    project objectives. The analyst team analyzed the information from the interviews and information was

    validated through a combination of the following validation techniques:

    Cross checking with other primary data and previously developed in-house research

    Review of secondary information, such as trade journals, annual reports and industry directories

    15

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    16/17

    3.2. Forecasting Methodology

    3.2.1. Step-by-Step Methodology for Market Estimation and Forecasting

    Market Estimation and Forecast Methodology, 2015

    Step Method

    1Understand the market mechanism for the market through structured, systematic and theoretically established

    norms of analyzing, designing, introducing and quality assurance of the market estimation

    2 Measuring the various market drivers, constraints, opportunities and challenges at regular intervals of time

    3 Integrate expert-opinion of discussions in consultation with the ResearchFox Analyst team

    4 Market estimation and forecast calculation

    5 Delphi method and Causal Analysis used as and when required

    6Rigorous quality check with heads of Research Team, Subject Matter Experts and Consultants before final

    publication

    Source: ResearchFox

    Significance and Importance of the Market Forecast, 2015

    Sr. No. Significance and Importance

    1 Helps revisit on the company's R&D investments

    2 Keeps the Sales and Marketing team posted on the market prospects

    3 Strategize investment and expansion plans

    4 Improve business planning

    5 Helps create business aims and set sales figures within the company

    6 Aware of the current market competition

    7 Support plans for Merger and Acquisition (M&A)

    Source: ResearchFox

    16

  • 7/24/2019 Consumer End-point Security Market - Outlook (2015-19) Market_APAC

    17/17

    About ResearchFoxWHAT WE STAND FOR

    We strive towards helping our customers take informed decisions by

    providing different perspectives for business. We don't believe in

    flashing LOGOs but are proud to mention that we have been helping

    all sizes of businesses since our inception. We are glad to have

    contributed in our own little way towards making a business

    successful. Whether you are a start-up or a large enterprise, we assure

    equal treatment to all, after all "Customer is King"!

    THE TEAM

    We are a bunch of 25 people with handful of grey hair between us. Ourhumble experience of around 75 man years in market research and

    business consulting has led us to believe that this industry is ripe for

    disruption. With the advent of enterprise consumerization and rapid

    digitization across industries, days are numbered for traditional

    business models of market research and consulting services. We

    make all efforts to bring different (fresh) perspectives to Market,

    Competition, and Growth of your business.

    Contact Us:

    Suggest a Report Topic: Report topics are approved based on number of users with the same suggestion and users are

    notified when the topic is approved.

    If you prefer to customize a report, or would like to get your report done exclusively in less than a months time!

    angalore

    4 & 5, 1st & 2nd Floor,

    t Cross,ishna Reddy Colony,

    omlur Layout,

    ngalore 560 071,

    dia

    one: +91-80-61-341500

    mail: [email protected]

    Hyderabad

    # 104 & 105, 1st Floor,

    Bhuvana Towers,CMR Building,

    Sarojini Devi Road,

    Secunderabad 500 003,

    India

    Phone: +91-40-49-084455

    Email: [email protected]

    Pune

    6th Floor Pentagon P-2,

    Magarpatta City,Hadapsar,

    Pune 411 028,

    India

    Phone: +91-20-6500-6541

    Email: [email protected]

    Philippines

    L29 Joy Nostalg Centre,

    17 ADB Avenue,Ortigas Center,

    Pasig City, Manila,

    Philippines - 1600

    Email: [email protected]

    The information contained here in is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we

    endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue

    o be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular

    situation.

    http://researchfox.com/http://researchfox.com/