Report      Database

    Worldwide Vulnerability Assessment Market and 13 Companies Analysis

    Date: 01 Mar, 2011              Type: Technology & Telecommunication              Pages: 86

    Worldwide Vulnerability Assessment Market and 13 Companies Analysis
    • Electronic Access - Single User License
      $900.00
    • CD-ROM Mail Delivery
      $1,000.00
    • Hard-copy Mail Delivery
      $1,000.00
    • Electronic Access - Multi User License
      $1,500.00

    "Report titled “Worldwide Vulnerability Assessment Market and 13 Companies Analysis” is divided in four parts
     
    First Section describes worldwide IT security spending market and future forecast 
    Second Section explains worldwide vulnerability assessment market and future forecast
    Third Section describes key players’ products analysis with Saas solutions 
    Fourth Section talks about the key players - 13 Key Players has been analyzed in the report
     
    Key Players section has been analyzed in the report in the following format
     
    Products Analysis - Company product analysis compared to its competitor products
    Revenue Analysis - Company Revenue in Vulnerability Assessment Market
    Strengths - Company strength in vulnerability assessment market
    Weakness - Company weakness in vulnerability assessment market
     
    Data Sources 
     
    Information and data in this report has been collected from various printable and non-printable sources like Trade Journals, White papers, Online paid databases, News websites, Government Agencies, Magazines, Newspapers and Trade associations.

    1. Worldwide IT Security Risk Management Market & Future Forecast
     
    2. Worldwide Vulnerability Assessment (VA) Market Size & Future Forecast
     
    3. IT Security Risk and Compliance Management Drivers

    3.1 The Payment Card Industry Data Security Standard (PCI DSS)
    3.2 Role of PCI DSS to Improve Security in the Companies

    3.2.1 Collecting All Logs, All the Time
    3.2.2 Monitoring User Activity
    3.2.3 Prioritizing the Risks
    3.3 Return on Investments from IT Security Risk
    3.4 Regulations and Acts for PCI Industry

    3.4.1 Gramm-Leach-Bliley Act (GLBA)
    3.4.2 Health Insurance Portability and Accountability Act (HIPAA)
    3.4.3 Sarbanes Oxley Act (SOX)
    3.4.4 European Union Data Protection Directive (EUDPD)
    3.4.5 ISO 27002 Code of Practice for Information Security Management
    3.4.6 COBIT
     
    4. Key Players - Offering Products & Saas Solutions
    4.1 Key Players - Market Share for 2009
     
    5. Wireless Network Security
    5.1 Wireless Service Providers - Cisco

    5.1.1 Assessment Services
    5.1.2 Planning and Design Services
    5.1.3 Optimization Service
    5.2 Wireless Service Providers - Hewlett Packard Networking
    5.2.1 A Series - For Enterprise Clients with Large and Complex Deployments
    5.2.2 E Series - For Midsize Clients Seeking Affordable, Easy-To-Use Technology
    5.2.3 V Series - Helps Small and Midsize Businesses
    5.2.4 S Series - Offers Clients Needing Increased Network Security
     
    6. Analysis of the key players
    6.1 Qualys Incorporation
    6.1.1 Products
    6.1.2 Qualys - Strengths
    6.1.3 Qualys - Weakness
    6.1.4 Qualys - Revenue
    6.2 Beyond Security
    6.2.1 Products
    6.2.2 Beyond Security - Strengths
    6.2.3 Beyond Security - Weakness
    6.3 Critical Watch, Inc.
    6.3.1 Products
    6.3.2 Critical Watch - Strengths
    6.3.3 Critical Watch - Weakness
    6.4 eEye Digital Security
    6.4.1 Products
    6.4.2 eEye Digital Security - Strengths
    6.4.3 eEye Digital Security - Weakness
    6.5 IBM Internet Security System
    6.5.1 Products
    6.5.2 IBM (Vulnerability Assessment) - Strengths
    6.5.3 IBM (Vulnerability Assessment) - Weakness
    6.5.4 IBM (Vulnerability Assessment) - Revenue
    6.6 Lumension Security Inc.
    6.6.1 Products
    6.6.2 Lumension Security - Strengths
    6.6.3 Lumension Security - Weakness
    6.6.4 Lumension Security - Revenue
    6.7 McAfee Inc.
    6.7.1 Products
    6.7.2 McAfee - Strengths
    6.7.3 McAfee - Weakness
    6.8 nCircle Network Security Inc.
    6.8.1 Products
    6.8.2 nCircle - Strengths
    6.8.3 nCircle - Weakness
    6.8.4 nCircle - Revenue
    6.9 Rapid7 Inc.
    6.9.1 Products
    6.9.2 Rapid7 - Strengths
    6.9.3 Rapid7 - Weakness
    6.9.4 Rapid7 - Revenue
    6.10 Saint Corporation
    6.10.1 Products
    6.10.2 Saint Corporation - Strengths
    6.10.3 Saint Corporation - Weakness
    6.10.4 Saint Corporation - Revenue
    6.11 StillSecure
    6.11.1 Products
    6.11.2 StillSecure - Strengths
    6.11.3 StillSecure - Weakness
    6.12 Tenable Network Security Inc
    6.12.1 Products
    6.12.2 Tenable Network Security - Strengths
    6.12.3 Tenable Network Security - Weakness
    6.12.4 Tenable Network Security - Revenue
    6.13 Trustwave
    6.13.1 Products
    6.13.2 Trustwave - Strengths
    6.13.3 Trustwave - Weakness
    6.13.4 Trust Wave – Revenue

    List of Figures:
     
    Figure 1 1: Worldwide - IT Security Spending Market (Billion US$), 2007 - 2010
    Figure 1 2: Worldwide - Forecast for IT Security Spending Market (Billion US$), 2011 - 2014
    Figure 2 1: Worldwide - Vulnerability Assessment Market Size (Million US$), 2005 - 2009
    Figure 2 2: Worldwide - Forecast for Vulnerability Assessment (VA) Market Size (Million US$), 2010 - 2013
    Figure 3 1: Worldwide - Organization Experience in Various Types of Fraud (Percent %), 2010
    Figure 3 2: United States - Online Sales Market (Billion US$), 2007 - 2012
    Figure 4 1: Worldwide - Key Players Vulnerability Assessment (VA) Market Share Percentage (%), 2009
    Figure 5 1: Worldwide - Network Performance Monitoring and Management Solutions Market, (Million US$), 2008 - 2010
    Figure 5 2: Worldwide - Network Performance Monitoring and Management Solutions Market, (Million US$), 2011 - 2015
    Figure 6 1: Qualys - Revenue (Million US$) 2003 - 2009
    Figure 6 2: IBM - Vulnerability Assessment Revenue (Million US$), 2007 & 2008
    Figure 6 3: Lumension - Revenue (Million US$), 2004 - 2009
    Figure 6 4: nCircle - Revenue (Million US$), 2002 - 2009
    Figure 6 5: Rapid7 - Revenue (Million US$), 2005 - 2009
    Figure 6 6: Saint Corporation - Revenue (Million, US$), 2008 - 2010
    Figure 6 7: Teenable Network Security - Revenue (Million US$), 2006 & 2009
    Figure 6 8: Trustwave - Revenue (Million US$), 2008 – 2010
     

    List of Tables:
     
    Table 2 1: Worldwide - Key Player Offering Products and Saas Solutions


    Related Products