Cyber security Market GCC, Cyber security market UAE, Network security market Saudi Arabia - Ken Research - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber security Market GCC, Cyber security market UAE, Network security market Saudi Arabia - Ken Research

Description:

Cyber-attacks on government owned enterprises have forced them to formulate well thought strategies to counter the cyber security threats. – PowerPoint PPT presentation

Number of Views:960
Slides: 30
Provided by: Ashish2117
Category: Other

less

Transcript and Presenter's Notes

Title: Cyber security Market GCC, Cyber security market UAE, Network security market Saudi Arabia - Ken Research


1
Middle East Cyber Security Market Outlook to 2022
By Region (North, Central, West, East and South)
and By Type of Solution (Firewall, Intrusion
Detection System, Antivirus, Identity and Access
Management, Encryption, Data Loss Prevention,
Unidentified Threat Management, Disaster Recovery)
Your Search Ends with Our Research
2
Table of Contents (1/2)
1. Executive Summary 2. Research 2. 1 Market
Definitions 2.2 Abbreviations 2.4 Market
Sizing, Limitation and Services Cyber Security
Market 2.5 Variables (Dependent and Independent)
2.6 Middle East Cyber Security Market
Correlation Matrix 2.7 Middle East Cyber
Security Market Regression Matrix 3. Middle East
Cyber Security Market Value Chain 4. Road Map
for Implementing Cyber Security in Middle East
5. Middle East Cyber Security Market 5.1 Market
Overview 5.2 Recent Developments 5.3 Major
Cyber Attacks in Middle East 5.4 Motives of
Cyber Attacks in Middle East 5.5 Types of Cyber
Attacks in Middle East 5.6 Global Snapshot of
Cost Incurred Due to Data Breaches 5.7 Type of
Cost Incurred due to Cyber Threats 5.8 Middle
East Cyber Security Market- Common Practices 6.
Market Size 6.1 Middle East Cyber Security Market
Size by Revenue, 2012-17 6.2 Middle East Cyber
Security Market Segmentation by Type of Solution,
2017 6.3 Middle East Cyber Security Market
Segmentation by End User, 2017 6.4 Middle East
Cyber Security Market Segmentation by Type of
Security, 2017 6.5 Middle East Cyber Security
Market Segmentation by Region, 2017 7.
Competition 7.1 Middle East Cyber Security
Developers 7.2 Middle East Cyber Security
Market- Parameters of Competition for Developers
7.3 Company Profile of Fire Eye 7.4 Company
Profile of IBM 7.5 Company Profile of Splunk
7.6 Company Profile of Four Scout
3
Table of Contents (2/2)
7.7 Symantec 7.8 Parameters of Competition for
System Integrators 7.9 Etisalat 7.10 ISYX 7.11
BIOS 7.12 DU 7.13 Starlink 8. Industry
Analysis 8.1 Technology Used 8.2 Trends 8.3
Security Trend Matrix 8.4 Challenges 8.5 Growth
Drivers 8.6 Restraints 8.7 Vendor Selection
Process 8.8 Government Regulations 8.9 SWOT
Analysis 8.10 Porter Five Forces Analysis 9.
Future Outlook, 2017-2022 9.1 Middle East Cyber
Security Market Future Outlook, 2017-2022 9.1.1
By Type of Solution, 2017-2022 9.1.2 By Type of
Security, 2017-2022 9.1.3 By Type of End User,
2017-2022 9.1.4 By Region, 2017-2022 10.
Analyst Recommendations Disclaimer Contact Us
4
List of Figures (1/2)
Figure 1.1 Middle East Cyber Security Market by
Revenue, 2012-2022 Figure 1.2 Middle East
Cyber Security Market by Regions by Revenue, 2017
and 2022 Figure 3.1 Value Chain Of Cyber
Security Industry in Middle East Figure 5.1
Effect of Security Breach on Physical and Virtual
Infrastructure Figure 5-2 Intrusion Triangle
Showcasing Key Issues behind a Cyber Attack
Figure 5.3 Global Average Cost Incurred per
Cyber Crime, 2013-17 Figure 6.1 Middle East
Cyber Market Size by Revenue in USD Billion,
2012-2017 Figure 6.2Middle East Cyber Security
Market Segmentation in Percentage by Type of
Solution, 2017 Figure 6.3 Middle East Cyber
Security Segmentation by End User, 2017 Figure
6.4 Segmentation of Middle East Security Market
by Type of Security Figure 6.5 Share of Region
in Middle East Cyber Security Market, 2017
Figure 7.1 Fire Eye Revenue in USD Million from
Global Business, 2013-17 Figure 7.2 Share of
Revenue in Fire Eye Revenue, 2017 Figure 7.3
Revenue in USD Million from EMEA Region
(Excluding OEM), 2012-17 Figure 7.4 Splunk
Global Revenue in USD Million, 2012-17 Figure
7.5 Four Scout Revenue from EMEA, 2015-17
Figure 7.6 Symantec Global Revenue Share of
Consumer Security and Enterprise Security Figure
7.7 Symantec Revenue (in USD billion) from EMEA
region, 2012-17 Figure 7.8 Share of Symantec
Revenue from Total Revenue from Different
Region, 2015-17 Figure 7.9 Dus Annual Revenue
in USD Billions from its Global Operations.
Figure 8.1 Different Technological Trends and
Their Effect on Major Sectors in Middle East
Figure 9.1 Middle East Cyber security market by
Revenue, 2017-22 Figure 9.2 Middle East Cyber
Security market Share, by Solution, 2017-22
Figure 9.3 Middle East Cyber Security Market
Share, by Type of End User, 2017-22 Figure 9.4
Share of Cyber Security Market in Middle East by
Region, 2017-22
5
List of Tables (1/3)
Table 1.1 Major Cyber security Developers and
System Integrators in Middle East, 2017 Table
2.1 Correlation Matrix for Middle East Cyber
Security Market Table 2.2 Regression
Coefficient Output for Middle East Cyber Security
Market Table3.1 Members of Middle East Cyber
Security Market Value Chain Table 5.1 Major
Cyber Attacks in Middle East Region Table 5.2
Types of Cyber Attacks Faced by Organizations,
Their Motives and Threats Offered by Them Table
6.1 Middle East Cyber Security Market
Segmentation by Type of Solution in Revenue in
USD Million, 2017 Table 6.2 Middle East Cyber
Security Market Segmentation by Revenue by End
Users, 2017 Table 6.3 Middle East Cyber
Security Market Segmentation by Revenue by Type
of Security, 2017 Table 6.4 Revenue Generated
from Cyber Security in Different Regions, 2017
Table 7.1 Parameters of Competition in Middle
East Cyber Security Market Table 7.2 Company
Profile of Fire Eye including Company Overview,
USP, Business Strategy, Number of Employees,
Product Portfolio, Service offered, Sales and
Distribution, Marketing, Global Presence,
Technological Partners, Major Projects Table
7.3 Fire Eye RD Expense from 2015-2017 Figure
7.4 Revenue Generated in USD Million from EMEA
Region, 2015-17 Table 7.5 IBM s Global
Presence and Key Sectors Served Table 7.6
Company Profile of IBM Including Company
Overview, Business Strategy, USP, Number of
Employees, Marketing, Product portfolio,
Services Offered Table 7.7 Major Resellers of
Spunk in Middle East, 2012-17 Table 7.8 Company
Profile of Spunk Including Company Overview,
Business Strategy, USP, Number of Employees,
Product Portfolio, Services Offered, Major
Projects. Table 7.9 Four Scout Global Presence
and Key Sectors Served Table 7.10 Company
Profile of Four Scout Including Company Overview,
Business Strategy, USP, Product Portfolio,
Number of Employees, Major Projects, Solutions
Offered Table 7.11 Company Profile of Symantec
including Company Overview, Business Strategy,
USP, Product Portfolio
6
List of Tables (2/3)
Table 7.12 Symantec Revenue from Different
Segments in USD Billions, 2015-17 Table 7.13
Symantec Global Revenue in USD Million from
Different Sectors in USD Million, 2015-17 Table
7.14 Parameters of Competition of Major System
Integrators in Middle East Cyber Security Market
Table 7.15 Company Profile including Company
Overview, Business Strategy, USP and Product
Portfolio Table 7.16 Company Profile Of ISYX
Including Company Overview, Business Strategy,
Global Presence, USP, Number Of Employees And
Product Portfolio. Table 7.17 Company Profile
of BIOS including Company Overview, Product
Feature, USP, Number Of Employees, Services
Offered, Recent Developments Table 7.18 Future
Strategic Priorities of DU, 2018-22 Table 7.19
Company Profile of DU including Company overview,
Business Strategy, Key Achievements, Product
Portfolio. Table 7.20 Company Profile of
Starlink including Company overview, Business
Strategy, Technological Vendors, Number of
Employees Table 8.1 Major Technologies Used in
Cyber Security along with Proprietor and Key
Features Table 8.2 List of Major Smart City
Projects in Middle East Table 8.3 Internet
Penetration in Percentage in Arab Countries
Table 8.4 Security Requirements, Challenges and
Benefit of using Cloud Computing Table 9.1
Middle East Cyber Security Market CAGR by Type
of Solution, 2017-22 Table 9.2 Middle East
Cyber Security Market Segmentation by Revenue in
USD billion by Solution, 2017-22 Table 9.3
Middle East Cyber Security Market Share, by Type
of Security, 2017-22 Table 9.4 Middle East
Cyber Security Market Revenue in USD Billion by
Type of Security, 2017-22 Table 9.5 Middle East
Cyber Security Market, CAGR 2017-22, by Type of
Security Table 9.6 Middle East Cyber Security
Market, Revenue in USD Billion, by Type of End
User, 2017-22 Table 9.7 Middle East Cyber
Security Market, CAGR, by Type of End User,
2017-22 Table 9.8 Market in USD Billion of
Cyber Security in Middle East by Region, 2017-22
Table 9.9 Middle East Cyber Security Market
CAGR (2017-22) by Region.
7
1.1 Middle Cyber Security Market Executive
Summary
Figure 1.2 Middle East Cyber Security Market by
Regions by Revenue, 2017 and 2022
Figure 1.1 Middle East Cyber Security Market by
Revenue, 2012-2022
Region 2017 2022
Central Region
Western region
Southern Region
East Region
Northern Region
Erratic Pricing
Table 1.1 Major Cyber security Developers and
System Integrators in Middle East, 2017
Developers System Integrators
IBM Etisalat
Fire Eye DU
Trend Micro Starlink
Splunk BIOS
Symantec ISYX
OTC drugs allowed to advertise
8
2. 1 Research Methodology - Market Definitions
  • Middle Cyber Security Market The cyber security
    market includes revenue from spending on
    hardware, software and consulting services for
    installation of these services for prevention of
    any kind of cyber threats by various solutions
    including firewall, intrusion detection system,
    antivirus, identity access management,
    encryption and others. Only spending on Domestic
    Commercial, Retail, BFSI, Government,
    Residential, Energy power and Healthcare sector
    has been accounted while collating the market
    size. Spending on army and defense has not been
    considered while cumulating the market revenues.
  • The Middle East cyber security market is
    segmented using following criteria
  • Type of Solution Firewall, Intrusion Detection
    System (IDS/IPS), Antivirus/Antimalware, Identity
    and Access Management (IAM), Encryption, Data
    Loss Prevention (DLP), Unidentified Threat
    Management (UTM), Disaster Recovery.
  • Type of Security Network Security, Wireless
    Security, End-Point Security, Application
    Security, Content Security, Cloud Security.
  • Type of End User Banking Finance Government IT
    Telecom Energy Power Healthcare Retail Others
  • Middle East is segmented into following regions.
  • Central Region Saudi Arabia, Iraq, Jordan
  • Northern Region Turkey, Syria, Cyprus
  • Western region Lebanon, Israel, Egypt, State of
    Palestine
  • Southern Region Oman, UAE, Yemen
  • Eastern Region Bahrain, Kuwait, Qatar, Iran

Erratic Pricing
OTC drugs allowed to advertise
9
2.2 Research Methodology - Abbreviations
AI Artificial Intelligence CAGR Compounded
Annual Growth Rate CCTV Closed Circuit
Television COTS Commercial Off The Shelf DDOS
Distributed Denial Of Service FY Financial
Year GCC Gulf Cooperation Council IoT Internet
of things IP Internet Protocol KD Kuwait
Dirham KSA Kingdom of Saudi Arabia LAN Local
area Network LLC Limited Liability Company MoU
Memorandum of Understanding NVR Network Video
Recorder OPEC Oil Producing and Exporting
Countries PoE Power of Ethernet PTZ Pan Tilt
Zoom QNB Qatar National Bank RD Research and
Development SSS Specialized Security System UAE
United Arab Emirates USD United States
Dollar USP Unique Selling Proposition. WAN Wide
Area Network
Erratic Pricing
OTC drugs allowed to advertise
10
2.3 Research Methodology - Consolidated Research
Approach
  • Hypothesis Creation The research team has first
    framed a hypothesis about the market through
    analysis of existing industry factors obtained
    from magazines, journals, broker reports,
    investor presentations and annual reports of
    major companies, Ministry of Interiors and
    Others.
  • Hypothesis Testing The research team conducted
    computer assisted telephonic interview (CATI)
    with several industry professionals including
    decision makers in Developers and System
    Integrating companies. The industry professionals
    included several management executives, and other
    higher level authorities. Structured interviews
    were conducted through telecom with several
    industry veterans including major decision makers
    from Etisalat, DU, G4S and other companies. The
    analyst at Ken Research collated their insights
    on the market onboard and to seek justification
    to the hypothesis framed by the team.
  • Sanity Checking _at_ Decision Tree Analysis Data
    has been collected and verified through
    cross-sanity checking the opinion and facts
    received from interview with the hypotheses
    framed from public databases. The team has
    verified the data by conducting both
    bottom-to-top and top-to-bottom analysis.
  • Future Forecasting via Poll Opinions and
    Statistical Tools Multi-Factor regression was
    conducted on the lag variables by identifying the
    independent and quantifiable variables directly
    affecting the market. The forecasting was done by
    using SPSS statistical tools. The variables were
    checked for multi-co-linearity and other bias
    that could be present in the model. The
    conclusion from the regression was then
    double-checked by conducting poll opinions.
  • Interpretation and Proofreading The final
    analysis will then be interpreted in the research
    report by our expert team well versed with the
    Cyber Security Industry.

Erratic Pricing
OTC drugs allowed to advertise
11
2.4 Research Methodology - Market Sizing,
Limitation and Services Cyber Security Market
  • Market Sizing
  • Initially, we identified all major developers and
    system integrators operating in the market. We
    then collated the revenue for current year. This
    helped us in sanity checking the current market
    size provided by industry veterans.
  • We also collated the information for entire cyber
    security industry size including segmentation,
    type of solution, type of security, type of end
    user, regions and then interviewed industry
    professionals to seek their expert opinion on
    contribution of these segments to the overall
    market.
  • We have conducted multiple CATIs with industry
    experts and management of leading developers and
    system integrators to understand the market size,
    relationship building process, customer
    acquisition, and their views on future
    development. This helped us in estimating revenue
    generated for the overall market and validating
    the future growth in the market
  • Limitation
  • The projects required for army and defense work
    was not included while calculating the market
    size for cyber security market. Confidentiality
    of data, due to national security concerns was
    the major reason behind lack of access to data.
  • Primaries may have been bullish with certain data
    points but we, Analysts at Ken Research, have
    verified the data points with other bottom up
    approach and through various secondary databases.
  • Middle East Cyber Security Market
  • Products Firewall, Intrusion Detection System
    (IDS/IPS), Antivirus/Antimalware, Identity and
    Access Management (IAM), Encryption, Data Loss
    Prevention (DLP), Unidentified Threat Management
    (UTM), Disaster Recovery.
  • Services Risk assessment, data centres,
    consulting, security and threat intelligence,
    file integrity monitoring. User and Entity
    analytics.

Erratic Pricing
OTC drugs allowed to advertise
12
2.5 Research Methodology - Variables (Dependent
and Independent)
  • Variables Considered
  • Contribution of Financial Sector to the Real GDP
    (UAE) Financial sector represent the biggest end
    user of cyber security products and as the
    financial sector will grow the investments made
    in the cyber security market will also increase.
  • UAE Industrial Sector Contribution to GDP
    Industrial sector contributes 15 of the
    investments made in cyber security market in
    Middle East. The growth in the sectors
    contribution to GDP will increase the expenditure
    made by industrial sector in cyber security.
  • UAE IT Industry size IT industry contributes to
    one-fifth of the cyber security market. Increase
    in IT industry size will result in increase in IT
    infrastructure in the sector which will require
    additional cyber security to ensure safety of
    those infrastructure.
  • Forecast Modelling
  • The report applies Correlation and Regression
    analysis methods to forecast the future of the
    cyber security market. The capabilities of SPSS
    and predictive analytics software have been
    leveraged to determine the relevant indicators
    used for forecasting this industry.
  • In the present case, cyber security market
    revenue has been taken as the dependent variable
    and other variables such as contribution of
    financial sector to the real GDP, UAE industrial
    sector contribution to GDP, UAE IT industry size
    have been taken as independent variables.

Erratic Pricing
OTC drugs allowed to advertise
13
5.1 Middle East Cyber Security Market Overview
Increasing Cyber Threat
Government Focus
Advantage Israel
  • The number of virus-infected computers in the
    Middle East is more than four times the global
    average
  • Cyber crimes in UAE increased by between 2013
    and 2015.
  • The average total organizational cost lost due to
    data breaches in Middle East was USD million in
    2017.
  • The market is dominated by US based developers
    such as IBM, Fire eye etc although a lot of
    Israeli companies are entering the competitive
    landscape. A number of startups from Israel have
    surfaced after 2012 like Check point, Imperva,
    theta ray. In 2017 the Israeli cyber security
    sector solidified its position as a global
    player, raising USD million in venture capital
    and private equity investment. Israel is an
    exception in Middle East , where regional
    developers are virtually non existent. Israel
    wins second-largest number of cyber security
    deals globally after U.S.
  • In Middle East, post data breach response
    expenditure made by organizations in 2017 was
    estimated to be USD million. These activities
    includes desk activities, inbound communications,
    special investigative activities, remediation,
    legal expenditures, product discounts, identity
    protection services and regulatory
    interventions.(Source Ponemon Institute,
    Research Report)
  • According to Telecommunication authority, in
    January 2017, there were attacks on the UAE
    government websites.
  • In 2014 UAE government established its first
    cyber security centre in Dubai in order to
    protect the government information system as well
    as the telecommunication network from the threat
    of cyber attacks
  • The UAE region holds spot globally in terms of
    region susceptible to cyber attacks. Formulation
    of cyber security policies has made the country
    most secure region worldwide.
  • Cyber attacks on state owned companies like Saudi
    Aramco, Qatar National Bank were aimed at
    destabilizing the countrys economy. Hence, after
    these attacks the government have taken the issue
    very seriously.

Recurring Events
  • A total of cyber attacks forayed against
    government, semi-government and private sector
    entities in UAE alone from January to October
    2017. (Source Telecommunication Authority of
    UAE)
  • Companies in Middle East have highest per capita
    direct cost globally, these cost involve direct
    expense outlay to accomplish a given activity
    such as engaging forensic experts, hiring a law
    firm or offering victims identity protection
    services.

The system integrators present in the market are
regional players with exception of a few like
Etisalat, Bios etc. Political tension between
various countries prohibit even the big companies
to expand their business across the Middle East
region.
14
5.3 Major Cyber Attacks in Middle East
Table 5.1 Major Cyber Attacks in Middle East
Region
Affected Organization Country Year Industry Effects of Attack
Saudi Aramco
Qatar National Bank
General Authority of Civil Aviation
Etisalat
Source Gulf News
Figure 5.1 Effect of Security Breach on Physical
and Virtual Infrastructure
Source Kaspersky Report
15
5.5 Types of Cyber Attacks in Middle East
Malware
Virus
In November 2017, a cyber attack using
Powershell malware hit the Saudi government,
aimed to disrupt the government computers. A new
Advanced Persistent Threat (APT) was detected,
which was targeting Saudi Arabia by infiltrating
computers using email phishing techniques by the
governments National Cyber Security Centre.
Attack on Saudi Aramco, by a virus Shamoon in
2012 was one of the most destructive cyber attack
on private business ever. In January 2017,
Shamoon 2, the improved version of Shamoon,
attacked many organizations across KSA leaving at
least three government agencies and four private
sector companies offline for 48 hours. The virus
disrupts computers by overwriting the master boot
record, making it impossible for them to start up.
Skimmers
Skimmers are essentially malicious card readers
that steal data off the ATM cards magnetic
stripe attached to the real payment terminals so
that they can strip data from every person that
swipes their cards.
Ransom Ware
Crypto jacking
Ransom ware represents one of the most dangerous
threat to organizations and end-users. Ransom
wares family continue to increase authors will
be more focused on mobile devices implementing
new evasion techniques making these threats even
more efficient and difficult to eradicate
This is the most recent type of threat in Middle
East which aims at robbing digital wallets. It
uses technologies such as block chain
16
5.8 Middle East Cyber Security Market- Common
Practices
End Point
Mobile
Network
Advanced Fraud
  • End point patching and management.
  • Malware Protection.
  • End point detection and response.
  • Transaction Protection.
  • Device management.
  • Content Security.
  • Network forensics and threat Management.
  • Firewall
  • Network Visibility and segmentation.
  • Fraud protection.
  • Criminal Detection

Security Orchestration and Analytics
Apps
Identity and Access
Data
Threat Intelligence
  • Privileged User Management.
  • Mainframe security.
  • Identity Governance.
  • Data Protection.
  • Data Access Control.
  • Application Scanning.
  • Application security Management
  • Indicators of Compromise.
  • Malware Analysis.
  • Threat Sharing.

17
6.1 Middle East Cyber Security Market Size by
Revenue, 2012-17
Figure 6.1 Middle East Cyber Market Size by
Revenue in USD Billion, 2012-2017
In 2014, UAE national electronic security
authority announced that cyber security one of
the biggest economic and national security
challenge that the country faces at present and
asked public and private entities to adopt cyber
security measures across their organization.
There were few instances when some unidentified
cyber groups attacked various petroleum, gas, and
helium industries in U.A.E, Kingdom of Saudi
Arabia and Qatar using a malware called Trojan.
Source Interview with Dr. Udai Kumar Uprit,
Digital Security Expert, Middle East
As the company expands its business not only it
requires cyber security arising out of increasing
infrastructure but it also adds up to the level
of security as the company becomes more
vulnerable to cyber attacks. Various sectors such
as automobile, healthcare are in their developing
phase due to which demand of cyber security is
rising. Diversification strategies implemented by
OPEC nations have also resulted in expansion in
number of companies coming in the region.
In 2015, first Middle East based cyber criminal
group, with full-scale cyber-espionage
operations, emerged called Desert Falcons. The
group was started in 2011 but it was not until
beginning of 2015 that the group became active.
By February 2015, the group had more than
victims in countries, majority of these victims
were in Palestine.
18
6.3 Middle East Cyber Security Market
Segmentation by End User, 2017 (1/4)
  • Government sectors are shifting to mobile based
    service resulting in demand for cyber security.

Figure 6.3 Middle East Cyber Security
Segmentation by End User, 2017
Type of End User Market Share in Percentage
Banking Finance
Government
IT Telecom
Energy Power
Healthcare
Retail
Others
  • Saudi Vision 2030 aims to secure the kingdom from
    cyber crime in the near future. The government
    wants to develop a cyber security industry which
    would be technological leader in Middle East
    region. In order to accomplish this purpose the
    government has formed a new regulatory body,
    Authority of Cyber Security, in 2017.

Table 6.2 Middle East Cyber Security Market
Segmentation by Revenue by End Users, 2017
Type of End User Expenses in USD Million
Banking Finance
Government
IT Telecom
Energy Power
Healthcare
Retail
Others
Total
  • After a lot of high profile cyber attacks in
    KSA, Saudi Arabia Monetary Authority (SAMA)
    framed a regulatory framework for the
    organizations coming under its jurisdiction. The
    framework defined principles and objectives for
    initiating, implementing, maintaining, monitoring
    and improving cyber security controls. The
    Framework is applicable to all Member
    Organizations regulated by SAMA, which include
    the following

Source Mr. Anastasios Monachos, Security Resesearcher, Private Cyber Security Company
19
6.3 Middle East Cyber Security Market
Segmentation by End User, 2017 (4/4)
Healthcare Sector
  • Healthcare is fifth biggest user of cyber
    security in Middle East countries. The growth in
    the sector has been due to
  • Increase in number of managed and unmanaged
    devices on networks like mobile, laptops and
    others.
  • Data of patients, providers and the organization
    must be protected from loss and cyber incidents
    especially data that is subject to breach
    notification rules.
  • Increase in vendor-owned-and-managed systems on
    the networks have increased resulting in increase
    on vulnerability of the entire system.

Oil Gas Sector
  • In Middle East oil and gas industries have the
    biggest share in power and energy sector which
    comprises 15 of the total demand of cyber
    security in the region. The demand is high
    because of following reasons.
  • Most of the oil and gas refineries in the region
    are state owned and are of national importance
    therefore it becomes profitable for foreign state
    backed hackers to disrupt their operations.

20
7.1 Middle East Cyber Security Developers
Network Security
End Point Security
Application Security
Cloud Security
Intrusion Protection
21
7.2 Middle East Cyber Security Market- Parameters
of Competition for Developers (1/2)
Table 7.1 Parameters of Competition in Middle
East Cyber Security Market
Parameters Description
Integration
Agility
Financial Resource
Effectiveness
After Sales Service
22
7.3 Company Profile of Fire Eye (1/4)
Figure 7.1 Fire Eye Revenue in USD Million from
Global Business, 2013-17
Table 7.2 Company Profile of Fire Eye including
Company Overview, USP, Business Strategy, Number
of Employees, Product Portfolio, Service offered,
Sales and Distribution, Marketing, Global
Presence, Technological Partners, Major Projects
Parameters Description
Company Overview
USP
Business Strategy
Number of Employees
Table 7.3 Fire Eye RD Expense from 2015-2017
Year Expense in millions USD
2015
2016
2017
Source Annual report
23
7.3 Company Profile of Fire Eye (2/4)
Table 7.2 Company Profile of Fire Eye including
Company Overview, USP, Business Strategy, Number
of Employees, Product Portfolio, Service offered,
Sales and Distribution, Marketing, Global
Presence, Technological Partners, Major Projects.
Type of Security Product Portfolio Description
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Forensic and Investigation
Forensic and Investigation
Security management and operations
Security management and operations
Security management and operations
Source Annual report
24
8.1 Middle East Cyber Security Market- Technology
Used (2/2)
There are two major technologies to defend
against malware Signature based approach and
behavior analysis. Most organizations rely on
decades old signature-based methodology,  some
of the new versions of malicious code are not
recognized by signature-based technologies, but
hackers have become smarter and try to evade
static signature detection techniques by coding
the virus in such a way so that it can change
it's signature The more advanced method of
detecting malware via behavior analysis is
gaining rapid traction. Although some banks in
Middle East have adopted the technology but the
technology is still unfamiliar.
Signature-based Technology
Behavior-based Technology
  • Behavior based technology has following
    advantages from signature based technology

25
8.3 Security Trend Matrix
Fig 8.1 Different Technological Trends and Their
Effect on Major Sectors in Middle East
Source Starlink, Ken Research Analysis
26
9.1 Middle East Cyber Security Market Future
Outlook, 2017-2022
Figure 9.1 Middle East Cyber security market by
Revenue, 2017-22
More and more international companies are setting
up offices in Middle East as regulations
regarding foreign investments loosens up amid of
oil price vulnerabilities. Rapid private-sector
growth offers new investment opportunities in key
sectors such as real estate, construction,
tourism and manufacturing, but the sheer scale
and pace of change means new security gaps are
appearing at a dramatic rate.
Various government across the Middle East are
trying to come up with a cyber security strategy
to make the organisations immune from growing
threat of cyber attacks. Currently all the Middle
East countries except Israel lack a substantial
framework governing cyber security. This may have
an effect on the market structure as more and
more global players can be attracted to enter the
market.
Source Interview with Dr. Udai Kumar Uprit,
Digital Security Expert, Middle East
Etisalat, Singtel, Soft Bank and Telefonica will
sign an agreement to create the first Global
Telco Security Alliance to offer enterprises a
comprehensive portfolio of cyber security
services. The alliance will be the worlds
biggest cyber security provider which will
comprise a customer base of more than billion
customers in over countries. The group has
combined world-class Security Operation
Centres (SOCs) and employ more than cyber
security experts globally. The group would look
to enhance the technologies it uses by developing
its capabilities in predictive analytics using
machine learning and advanced cyber security
using internet of things.
27
9.1.2 Middle East Cyber Security Market Future
Outlook by Type of Security, 2017-2022
Table 9.4 Middle East Cyber Security Market
Revenue in USD Billion by Type of Security,
2017-22
Table 9.3 Middle East Cyber Security Market
Share by Type of Security in Percentage, 2017-22
Type of Security 2017 2018 2019 2020 2021 2022
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
Total
Type of Security 2017 2018 2019 2020 2021 2022
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
Table 9.5 Middle East Cyber Security Market,
CAGR 2017-22 by Type of Security
Type of Security CAGR()
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
  • Key Takeaways
  • Network Security and Wireless Security will be
    the fastest growing sectors, both registering a 5
    year CAGR of between 2017 to 2022.
  • Network security will continue to constitute the
    lion share of the market as the demand will
    increase from USD billion in 2017 to USD
    billion in 2022.
  • Cloud security will also cement its position in
    the market, registering a CAGR of
  • between 2017-22. As more and more
    companies are moving to cloud based
    infrastructure.

Source Ken Research Analysis
28
Disclaimer
The research reports provided by Ken Research are
for the personal information of the authorized
recipient and is not for public distribution and
should not be reproduced or redistributed without
prior permission. None of this material may be
used for any commercial or public use until
unless authorized by Ken Research. The report
will only be used as per the license rights
authorized by Ken Research. The information
provided in the research documents is from
publicly available data and other sources, which
are reliable. Efforts are made to try and ensure
accuracy of data. With respect to documents
available, neither the company nor any of its
employees makes any warranty, express or implied,
including the warranties of merchantability and
fitness for a particular purpose, or assumes any
legal liability or responsibility for the
accuracy, completeness, or usefulness of any
information, apparatus, product, or process
disclosed, or represents that its use will not
infringe privately owned rights. The report also
includes analysis and views expressed by our
research team. The research reports are purely
for information purposes. The opinions expressed
are our current opinions as of the date appearing
in the material and may be subject to change from
time to time without notice. Investors should not
solely rely on the information contained in the
research documents and must make investment
decisions based on their own investment
objectives, risk profile and financial position.
The recipients of this material should take their
own professional advice before acting on this
information. Ken Research will not accept return
of reports once dispatched due to the
confidentiality of information provided in our
reports. In case, a report qualify for return, we
will issue a credit, minus shipping charges, of
equal value to the original purchase price,
toward a future purchaseno refunds. The decision
about whether the product return can be accepted
or not is solely at our discretion. Any dispute
will be subject to laws of India and exclusive
jurisdiction of Indian Courts. No part of this
manual or any material appearing may be
reproduced, stored in or transmitted in any other
format without written permission of Ken
Research. This is purely for the reference of the
concerned entity.
29
Contact Us
Unit 14, Tower B3, Spaze I Tech Business Park,
Sohna Road, Sector 49, Gurgaon, Haryana -
122001 New Delhi, India Office 91
9311149880 Web www.kenresearch.com Email
namit_at_kenresearch.com
Contact Us
Write a Comment
User Comments (0)
About PowerShow.com