Title: Cyber security Market GCC, Cyber security market UAE, Network security market Saudi Arabia - Ken Research
1Middle East Cyber Security Market Outlook to 2022
By Region (North, Central, West, East and South)
and By Type of Solution (Firewall, Intrusion
Detection System, Antivirus, Identity and Access
Management, Encryption, Data Loss Prevention,
Unidentified Threat Management, Disaster Recovery)
Your Search Ends with Our Research
2Table of Contents (1/2)
1. Executive Summary 2. Research 2. 1 Market
Definitions 2.2 Abbreviations 2.4 Market
Sizing, Limitation and Services Cyber Security
Market 2.5 Variables (Dependent and Independent)
2.6 Middle East Cyber Security Market
Correlation Matrix 2.7 Middle East Cyber
Security Market Regression Matrix 3. Middle East
Cyber Security Market Value Chain 4. Road Map
for Implementing Cyber Security in Middle East
5. Middle East Cyber Security Market 5.1 Market
Overview 5.2 Recent Developments 5.3 Major
Cyber Attacks in Middle East 5.4 Motives of
Cyber Attacks in Middle East 5.5 Types of Cyber
Attacks in Middle East 5.6 Global Snapshot of
Cost Incurred Due to Data Breaches 5.7 Type of
Cost Incurred due to Cyber Threats 5.8 Middle
East Cyber Security Market- Common Practices 6.
Market Size 6.1 Middle East Cyber Security Market
Size by Revenue, 2012-17 6.2 Middle East Cyber
Security Market Segmentation by Type of Solution,
2017 6.3 Middle East Cyber Security Market
Segmentation by End User, 2017 6.4 Middle East
Cyber Security Market Segmentation by Type of
Security, 2017 6.5 Middle East Cyber Security
Market Segmentation by Region, 2017 7.
Competition 7.1 Middle East Cyber Security
Developers 7.2 Middle East Cyber Security
Market- Parameters of Competition for Developers
7.3 Company Profile of Fire Eye 7.4 Company
Profile of IBM 7.5 Company Profile of Splunk
7.6 Company Profile of Four Scout
3Table of Contents (2/2)
7.7 Symantec 7.8 Parameters of Competition for
System Integrators 7.9 Etisalat 7.10 ISYX 7.11
BIOS 7.12 DU 7.13 Starlink 8. Industry
Analysis 8.1 Technology Used 8.2 Trends 8.3
Security Trend Matrix 8.4 Challenges 8.5 Growth
Drivers 8.6 Restraints 8.7 Vendor Selection
Process 8.8 Government Regulations 8.9 SWOT
Analysis 8.10 Porter Five Forces Analysis 9.
Future Outlook, 2017-2022 9.1 Middle East Cyber
Security Market Future Outlook, 2017-2022 9.1.1
By Type of Solution, 2017-2022 9.1.2 By Type of
Security, 2017-2022 9.1.3 By Type of End User,
2017-2022 9.1.4 By Region, 2017-2022 10.
Analyst Recommendations Disclaimer Contact Us
4List of Figures (1/2)
Figure 1.1 Middle East Cyber Security Market by
Revenue, 2012-2022 Figure 1.2 Middle East
Cyber Security Market by Regions by Revenue, 2017
and 2022 Figure 3.1 Value Chain Of Cyber
Security Industry in Middle East Figure 5.1
Effect of Security Breach on Physical and Virtual
Infrastructure Figure 5-2 Intrusion Triangle
Showcasing Key Issues behind a Cyber Attack
Figure 5.3 Global Average Cost Incurred per
Cyber Crime, 2013-17 Figure 6.1 Middle East
Cyber Market Size by Revenue in USD Billion,
2012-2017 Figure 6.2Middle East Cyber Security
Market Segmentation in Percentage by Type of
Solution, 2017 Figure 6.3 Middle East Cyber
Security Segmentation by End User, 2017 Figure
6.4 Segmentation of Middle East Security Market
by Type of Security Figure 6.5 Share of Region
in Middle East Cyber Security Market, 2017
Figure 7.1 Fire Eye Revenue in USD Million from
Global Business, 2013-17 Figure 7.2 Share of
Revenue in Fire Eye Revenue, 2017 Figure 7.3
Revenue in USD Million from EMEA Region
(Excluding OEM), 2012-17 Figure 7.4 Splunk
Global Revenue in USD Million, 2012-17 Figure
7.5 Four Scout Revenue from EMEA, 2015-17
Figure 7.6 Symantec Global Revenue Share of
Consumer Security and Enterprise Security Figure
7.7 Symantec Revenue (in USD billion) from EMEA
region, 2012-17 Figure 7.8 Share of Symantec
Revenue from Total Revenue from Different
Region, 2015-17 Figure 7.9 Dus Annual Revenue
in USD Billions from its Global Operations.
Figure 8.1 Different Technological Trends and
Their Effect on Major Sectors in Middle East
Figure 9.1 Middle East Cyber security market by
Revenue, 2017-22 Figure 9.2 Middle East Cyber
Security market Share, by Solution, 2017-22
Figure 9.3 Middle East Cyber Security Market
Share, by Type of End User, 2017-22 Figure 9.4
Share of Cyber Security Market in Middle East by
Region, 2017-22
5List of Tables (1/3)
Table 1.1 Major Cyber security Developers and
System Integrators in Middle East, 2017 Table
2.1 Correlation Matrix for Middle East Cyber
Security Market Table 2.2 Regression
Coefficient Output for Middle East Cyber Security
Market Table3.1 Members of Middle East Cyber
Security Market Value Chain Table 5.1 Major
Cyber Attacks in Middle East Region Table 5.2
Types of Cyber Attacks Faced by Organizations,
Their Motives and Threats Offered by Them Table
6.1 Middle East Cyber Security Market
Segmentation by Type of Solution in Revenue in
USD Million, 2017 Table 6.2 Middle East Cyber
Security Market Segmentation by Revenue by End
Users, 2017 Table 6.3 Middle East Cyber
Security Market Segmentation by Revenue by Type
of Security, 2017 Table 6.4 Revenue Generated
from Cyber Security in Different Regions, 2017
Table 7.1 Parameters of Competition in Middle
East Cyber Security Market Table 7.2 Company
Profile of Fire Eye including Company Overview,
USP, Business Strategy, Number of Employees,
Product Portfolio, Service offered, Sales and
Distribution, Marketing, Global Presence,
Technological Partners, Major Projects Table
7.3 Fire Eye RD Expense from 2015-2017 Figure
7.4 Revenue Generated in USD Million from EMEA
Region, 2015-17 Table 7.5 IBM s Global
Presence and Key Sectors Served Table 7.6
Company Profile of IBM Including Company
Overview, Business Strategy, USP, Number of
Employees, Marketing, Product portfolio,
Services Offered Table 7.7 Major Resellers of
Spunk in Middle East, 2012-17 Table 7.8 Company
Profile of Spunk Including Company Overview,
Business Strategy, USP, Number of Employees,
Product Portfolio, Services Offered, Major
Projects. Table 7.9 Four Scout Global Presence
and Key Sectors Served Table 7.10 Company
Profile of Four Scout Including Company Overview,
Business Strategy, USP, Product Portfolio,
Number of Employees, Major Projects, Solutions
Offered Table 7.11 Company Profile of Symantec
including Company Overview, Business Strategy,
USP, Product Portfolio
6List of Tables (2/3)
Table 7.12 Symantec Revenue from Different
Segments in USD Billions, 2015-17 Table 7.13
Symantec Global Revenue in USD Million from
Different Sectors in USD Million, 2015-17 Table
7.14 Parameters of Competition of Major System
Integrators in Middle East Cyber Security Market
Table 7.15 Company Profile including Company
Overview, Business Strategy, USP and Product
Portfolio Table 7.16 Company Profile Of ISYX
Including Company Overview, Business Strategy,
Global Presence, USP, Number Of Employees And
Product Portfolio. Table 7.17 Company Profile
of BIOS including Company Overview, Product
Feature, USP, Number Of Employees, Services
Offered, Recent Developments Table 7.18 Future
Strategic Priorities of DU, 2018-22 Table 7.19
Company Profile of DU including Company overview,
Business Strategy, Key Achievements, Product
Portfolio. Table 7.20 Company Profile of
Starlink including Company overview, Business
Strategy, Technological Vendors, Number of
Employees Table 8.1 Major Technologies Used in
Cyber Security along with Proprietor and Key
Features Table 8.2 List of Major Smart City
Projects in Middle East Table 8.3 Internet
Penetration in Percentage in Arab Countries
Table 8.4 Security Requirements, Challenges and
Benefit of using Cloud Computing Table 9.1
Middle East Cyber Security Market CAGR by Type
of Solution, 2017-22 Table 9.2 Middle East
Cyber Security Market Segmentation by Revenue in
USD billion by Solution, 2017-22 Table 9.3
Middle East Cyber Security Market Share, by Type
of Security, 2017-22 Table 9.4 Middle East
Cyber Security Market Revenue in USD Billion by
Type of Security, 2017-22 Table 9.5 Middle East
Cyber Security Market, CAGR 2017-22, by Type of
Security Table 9.6 Middle East Cyber Security
Market, Revenue in USD Billion, by Type of End
User, 2017-22 Table 9.7 Middle East Cyber
Security Market, CAGR, by Type of End User,
2017-22 Table 9.8 Market in USD Billion of
Cyber Security in Middle East by Region, 2017-22
Table 9.9 Middle East Cyber Security Market
CAGR (2017-22) by Region.
71.1 Middle Cyber Security Market Executive
Summary
Figure 1.2 Middle East Cyber Security Market by
Regions by Revenue, 2017 and 2022
Figure 1.1 Middle East Cyber Security Market by
Revenue, 2012-2022
Region 2017 2022
Central Region
Western region
Southern Region
East Region
Northern Region
Erratic Pricing
Table 1.1 Major Cyber security Developers and
System Integrators in Middle East, 2017
Developers System Integrators
IBM Etisalat
Fire Eye DU
Trend Micro Starlink
Splunk BIOS
Symantec ISYX
OTC drugs allowed to advertise
82. 1 Research Methodology - Market Definitions
- Middle Cyber Security Market The cyber security
market includes revenue from spending on
hardware, software and consulting services for
installation of these services for prevention of
any kind of cyber threats by various solutions
including firewall, intrusion detection system,
antivirus, identity access management,
encryption and others. Only spending on Domestic
Commercial, Retail, BFSI, Government,
Residential, Energy power and Healthcare sector
has been accounted while collating the market
size. Spending on army and defense has not been
considered while cumulating the market revenues. - The Middle East cyber security market is
segmented using following criteria - Type of Solution Firewall, Intrusion Detection
System (IDS/IPS), Antivirus/Antimalware, Identity
and Access Management (IAM), Encryption, Data
Loss Prevention (DLP), Unidentified Threat
Management (UTM), Disaster Recovery. - Type of Security Network Security, Wireless
Security, End-Point Security, Application
Security, Content Security, Cloud Security. - Type of End User Banking Finance Government IT
Telecom Energy Power Healthcare Retail Others
- Middle East is segmented into following regions.
- Central Region Saudi Arabia, Iraq, Jordan
- Northern Region Turkey, Syria, Cyprus
- Western region Lebanon, Israel, Egypt, State of
Palestine - Southern Region Oman, UAE, Yemen
- Eastern Region Bahrain, Kuwait, Qatar, Iran
Erratic Pricing
OTC drugs allowed to advertise
92.2 Research Methodology - Abbreviations
AI Artificial Intelligence CAGR Compounded
Annual Growth Rate CCTV Closed Circuit
Television COTS Commercial Off The Shelf DDOS
Distributed Denial Of Service FY Financial
Year GCC Gulf Cooperation Council IoT Internet
of things IP Internet Protocol KD Kuwait
Dirham KSA Kingdom of Saudi Arabia LAN Local
area Network LLC Limited Liability Company MoU
Memorandum of Understanding NVR Network Video
Recorder OPEC Oil Producing and Exporting
Countries PoE Power of Ethernet PTZ Pan Tilt
Zoom QNB Qatar National Bank RD Research and
Development SSS Specialized Security System UAE
United Arab Emirates USD United States
Dollar USP Unique Selling Proposition. WAN Wide
Area Network
Erratic Pricing
OTC drugs allowed to advertise
102.3 Research Methodology - Consolidated Research
Approach
- Hypothesis Creation The research team has first
framed a hypothesis about the market through
analysis of existing industry factors obtained
from magazines, journals, broker reports,
investor presentations and annual reports of
major companies, Ministry of Interiors and
Others. - Hypothesis Testing The research team conducted
computer assisted telephonic interview (CATI)
with several industry professionals including
decision makers in Developers and System
Integrating companies. The industry professionals
included several management executives, and other
higher level authorities. Structured interviews
were conducted through telecom with several
industry veterans including major decision makers
from Etisalat, DU, G4S and other companies. The
analyst at Ken Research collated their insights
on the market onboard and to seek justification
to the hypothesis framed by the team. - Sanity Checking _at_ Decision Tree Analysis Data
has been collected and verified through
cross-sanity checking the opinion and facts
received from interview with the hypotheses
framed from public databases. The team has
verified the data by conducting both
bottom-to-top and top-to-bottom analysis. - Future Forecasting via Poll Opinions and
Statistical Tools Multi-Factor regression was
conducted on the lag variables by identifying the
independent and quantifiable variables directly
affecting the market. The forecasting was done by
using SPSS statistical tools. The variables were
checked for multi-co-linearity and other bias
that could be present in the model. The
conclusion from the regression was then
double-checked by conducting poll opinions. - Interpretation and Proofreading The final
analysis will then be interpreted in the research
report by our expert team well versed with the
Cyber Security Industry.
Erratic Pricing
OTC drugs allowed to advertise
112.4 Research Methodology - Market Sizing,
Limitation and Services Cyber Security Market
- Market Sizing
- Initially, we identified all major developers and
system integrators operating in the market. We
then collated the revenue for current year. This
helped us in sanity checking the current market
size provided by industry veterans. - We also collated the information for entire cyber
security industry size including segmentation,
type of solution, type of security, type of end
user, regions and then interviewed industry
professionals to seek their expert opinion on
contribution of these segments to the overall
market. - We have conducted multiple CATIs with industry
experts and management of leading developers and
system integrators to understand the market size,
relationship building process, customer
acquisition, and their views on future
development. This helped us in estimating revenue
generated for the overall market and validating
the future growth in the market - Limitation
- The projects required for army and defense work
was not included while calculating the market
size for cyber security market. Confidentiality
of data, due to national security concerns was
the major reason behind lack of access to data. - Primaries may have been bullish with certain data
points but we, Analysts at Ken Research, have
verified the data points with other bottom up
approach and through various secondary databases. - Middle East Cyber Security Market
- Products Firewall, Intrusion Detection System
(IDS/IPS), Antivirus/Antimalware, Identity and
Access Management (IAM), Encryption, Data Loss
Prevention (DLP), Unidentified Threat Management
(UTM), Disaster Recovery. - Services Risk assessment, data centres,
consulting, security and threat intelligence,
file integrity monitoring. User and Entity
analytics.
Erratic Pricing
OTC drugs allowed to advertise
122.5 Research Methodology - Variables (Dependent
and Independent)
- Variables Considered
- Contribution of Financial Sector to the Real GDP
(UAE) Financial sector represent the biggest end
user of cyber security products and as the
financial sector will grow the investments made
in the cyber security market will also increase. - UAE Industrial Sector Contribution to GDP
Industrial sector contributes 15 of the
investments made in cyber security market in
Middle East. The growth in the sectors
contribution to GDP will increase the expenditure
made by industrial sector in cyber security. - UAE IT Industry size IT industry contributes to
one-fifth of the cyber security market. Increase
in IT industry size will result in increase in IT
infrastructure in the sector which will require
additional cyber security to ensure safety of
those infrastructure. - Forecast Modelling
- The report applies Correlation and Regression
analysis methods to forecast the future of the
cyber security market. The capabilities of SPSS
and predictive analytics software have been
leveraged to determine the relevant indicators
used for forecasting this industry. - In the present case, cyber security market
revenue has been taken as the dependent variable
and other variables such as contribution of
financial sector to the real GDP, UAE industrial
sector contribution to GDP, UAE IT industry size
have been taken as independent variables.
Erratic Pricing
OTC drugs allowed to advertise
135.1 Middle East Cyber Security Market Overview
Increasing Cyber Threat
Government Focus
Advantage Israel
- The number of virus-infected computers in the
Middle East is more than four times the global
average - Cyber crimes in UAE increased by between 2013
and 2015. - The average total organizational cost lost due to
data breaches in Middle East was USD million in
2017.
- The market is dominated by US based developers
such as IBM, Fire eye etc although a lot of
Israeli companies are entering the competitive
landscape. A number of startups from Israel have
surfaced after 2012 like Check point, Imperva,
theta ray. In 2017 the Israeli cyber security
sector solidified its position as a global
player, raising USD million in venture capital
and private equity investment. Israel is an
exception in Middle East , where regional
developers are virtually non existent. Israel
wins second-largest number of cyber security
deals globally after U.S.
- In Middle East, post data breach response
expenditure made by organizations in 2017 was
estimated to be USD million. These activities
includes desk activities, inbound communications,
special investigative activities, remediation,
legal expenditures, product discounts, identity
protection services and regulatory
interventions.(Source Ponemon Institute,
Research Report) - According to Telecommunication authority, in
January 2017, there were attacks on the UAE
government websites. - In 2014 UAE government established its first
cyber security centre in Dubai in order to
protect the government information system as well
as the telecommunication network from the threat
of cyber attacks - The UAE region holds spot globally in terms of
region susceptible to cyber attacks. Formulation
of cyber security policies has made the country
most secure region worldwide. - Cyber attacks on state owned companies like Saudi
Aramco, Qatar National Bank were aimed at
destabilizing the countrys economy. Hence, after
these attacks the government have taken the issue
very seriously.
Recurring Events
- A total of cyber attacks forayed against
government, semi-government and private sector
entities in UAE alone from January to October
2017. (Source Telecommunication Authority of
UAE) - Companies in Middle East have highest per capita
direct cost globally, these cost involve direct
expense outlay to accomplish a given activity
such as engaging forensic experts, hiring a law
firm or offering victims identity protection
services.
The system integrators present in the market are
regional players with exception of a few like
Etisalat, Bios etc. Political tension between
various countries prohibit even the big companies
to expand their business across the Middle East
region.
145.3 Major Cyber Attacks in Middle East
Table 5.1 Major Cyber Attacks in Middle East
Region
Affected Organization Country Year Industry Effects of Attack
Saudi Aramco
Qatar National Bank
General Authority of Civil Aviation
Etisalat
Source Gulf News
Figure 5.1 Effect of Security Breach on Physical
and Virtual Infrastructure
Source Kaspersky Report
155.5 Types of Cyber Attacks in Middle East
Malware
Virus
In November 2017, a cyber attack using
Powershell malware hit the Saudi government,
aimed to disrupt the government computers. A new
Advanced Persistent Threat (APT) was detected,
which was targeting Saudi Arabia by infiltrating
computers using email phishing techniques by the
governments National Cyber Security Centre.
Attack on Saudi Aramco, by a virus Shamoon in
2012 was one of the most destructive cyber attack
on private business ever. In January 2017,
Shamoon 2, the improved version of Shamoon,
attacked many organizations across KSA leaving at
least three government agencies and four private
sector companies offline for 48 hours. The virus
disrupts computers by overwriting the master boot
record, making it impossible for them to start up.
Skimmers
Skimmers are essentially malicious card readers
that steal data off the ATM cards magnetic
stripe attached to the real payment terminals so
that they can strip data from every person that
swipes their cards.
Ransom Ware
Crypto jacking
Ransom ware represents one of the most dangerous
threat to organizations and end-users. Ransom
wares family continue to increase authors will
be more focused on mobile devices implementing
new evasion techniques making these threats even
more efficient and difficult to eradicate
This is the most recent type of threat in Middle
East which aims at robbing digital wallets. It
uses technologies such as block chain
165.8 Middle East Cyber Security Market- Common
Practices
End Point
Mobile
Network
Advanced Fraud
- End point patching and management.
- Malware Protection.
- End point detection and response.
- Transaction Protection.
- Device management.
- Content Security.
- Network forensics and threat Management.
- Firewall
- Network Visibility and segmentation.
- Fraud protection.
- Criminal Detection
Security Orchestration and Analytics
Apps
Identity and Access
Data
Threat Intelligence
- Privileged User Management.
- Mainframe security.
- Identity Governance.
- Data Protection.
- Data Access Control.
- Application Scanning.
- Application security Management
- Indicators of Compromise.
- Malware Analysis.
- Threat Sharing.
176.1 Middle East Cyber Security Market Size by
Revenue, 2012-17
Figure 6.1 Middle East Cyber Market Size by
Revenue in USD Billion, 2012-2017
In 2014, UAE national electronic security
authority announced that cyber security one of
the biggest economic and national security
challenge that the country faces at present and
asked public and private entities to adopt cyber
security measures across their organization.
There were few instances when some unidentified
cyber groups attacked various petroleum, gas, and
helium industries in U.A.E, Kingdom of Saudi
Arabia and Qatar using a malware called Trojan.
Source Interview with Dr. Udai Kumar Uprit,
Digital Security Expert, Middle East
As the company expands its business not only it
requires cyber security arising out of increasing
infrastructure but it also adds up to the level
of security as the company becomes more
vulnerable to cyber attacks. Various sectors such
as automobile, healthcare are in their developing
phase due to which demand of cyber security is
rising. Diversification strategies implemented by
OPEC nations have also resulted in expansion in
number of companies coming in the region.
In 2015, first Middle East based cyber criminal
group, with full-scale cyber-espionage
operations, emerged called Desert Falcons. The
group was started in 2011 but it was not until
beginning of 2015 that the group became active.
By February 2015, the group had more than
victims in countries, majority of these victims
were in Palestine.
186.3 Middle East Cyber Security Market
Segmentation by End User, 2017 (1/4)
- Government sectors are shifting to mobile based
service resulting in demand for cyber security.
Figure 6.3 Middle East Cyber Security
Segmentation by End User, 2017
Type of End User Market Share in Percentage
Banking Finance
Government
IT Telecom
Energy Power
Healthcare
Retail
Others
- Saudi Vision 2030 aims to secure the kingdom from
cyber crime in the near future. The government
wants to develop a cyber security industry which
would be technological leader in Middle East
region. In order to accomplish this purpose the
government has formed a new regulatory body,
Authority of Cyber Security, in 2017.
Table 6.2 Middle East Cyber Security Market
Segmentation by Revenue by End Users, 2017
Type of End User Expenses in USD Million
Banking Finance
Government
IT Telecom
Energy Power
Healthcare
Retail
Others
Total
- After a lot of high profile cyber attacks in
KSA, Saudi Arabia Monetary Authority (SAMA)
framed a regulatory framework for the
organizations coming under its jurisdiction. The
framework defined principles and objectives for
initiating, implementing, maintaining, monitoring
and improving cyber security controls. The
Framework is applicable to all Member
Organizations regulated by SAMA, which include
the following -
-
-
-
Source Mr. Anastasios Monachos, Security Resesearcher, Private Cyber Security Company
196.3 Middle East Cyber Security Market
Segmentation by End User, 2017 (4/4)
Healthcare Sector
- Healthcare is fifth biggest user of cyber
security in Middle East countries. The growth in
the sector has been due to - Increase in number of managed and unmanaged
devices on networks like mobile, laptops and
others. -
- Data of patients, providers and the organization
must be protected from loss and cyber incidents
especially data that is subject to breach
notification rules. -
- Increase in vendor-owned-and-managed systems on
the networks have increased resulting in increase
on vulnerability of the entire system.
Oil Gas Sector
- In Middle East oil and gas industries have the
biggest share in power and energy sector which
comprises 15 of the total demand of cyber
security in the region. The demand is high
because of following reasons. -
- Most of the oil and gas refineries in the region
are state owned and are of national importance
therefore it becomes profitable for foreign state
backed hackers to disrupt their operations.
207.1 Middle East Cyber Security Developers
Network Security
End Point Security
Application Security
Cloud Security
Intrusion Protection
217.2 Middle East Cyber Security Market- Parameters
of Competition for Developers (1/2)
Table 7.1 Parameters of Competition in Middle
East Cyber Security Market
Parameters Description
Integration
Agility
Financial Resource
Effectiveness
After Sales Service
227.3 Company Profile of Fire Eye (1/4)
Figure 7.1 Fire Eye Revenue in USD Million from
Global Business, 2013-17
Table 7.2 Company Profile of Fire Eye including
Company Overview, USP, Business Strategy, Number
of Employees, Product Portfolio, Service offered,
Sales and Distribution, Marketing, Global
Presence, Technological Partners, Major Projects
Parameters Description
Company Overview
USP
Business Strategy
Number of Employees
Table 7.3 Fire Eye RD Expense from 2015-2017
Year Expense in millions USD
2015
2016
2017
Source Annual report
237.3 Company Profile of Fire Eye (2/4)
Table 7.2 Company Profile of Fire Eye including
Company Overview, USP, Business Strategy, Number
of Employees, Product Portfolio, Service offered,
Sales and Distribution, Marketing, Global
Presence, Technological Partners, Major Projects.
Type of Security Product Portfolio Description
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Threat Detection and Prevention
Forensic and Investigation
Forensic and Investigation
Security management and operations
Security management and operations
Security management and operations
Source Annual report
248.1 Middle East Cyber Security Market- Technology
Used (2/2)
There are two major technologies to defend
against malware Signature based approach and
behavior analysis. Most organizations rely on
decades old signature-based methodology, some
of the new versions of malicious code are not
recognized by signature-based technologies, but
hackers have become smarter and try to evade
static signature detection techniques by coding
the virus in such a way so that it can change
it's signature The more advanced method of
detecting malware via behavior analysis is
gaining rapid traction. Although some banks in
Middle East have adopted the technology but the
technology is still unfamiliar.
Signature-based Technology
Behavior-based Technology
- Behavior based technology has following
advantages from signature based technology -
-
-
258.3 Security Trend Matrix
Fig 8.1 Different Technological Trends and Their
Effect on Major Sectors in Middle East
Source Starlink, Ken Research Analysis
269.1 Middle East Cyber Security Market Future
Outlook, 2017-2022
Figure 9.1 Middle East Cyber security market by
Revenue, 2017-22
More and more international companies are setting
up offices in Middle East as regulations
regarding foreign investments loosens up amid of
oil price vulnerabilities. Rapid private-sector
growth offers new investment opportunities in key
sectors such as real estate, construction,
tourism and manufacturing, but the sheer scale
and pace of change means new security gaps are
appearing at a dramatic rate.
Various government across the Middle East are
trying to come up with a cyber security strategy
to make the organisations immune from growing
threat of cyber attacks. Currently all the Middle
East countries except Israel lack a substantial
framework governing cyber security. This may have
an effect on the market structure as more and
more global players can be attracted to enter the
market.
Source Interview with Dr. Udai Kumar Uprit,
Digital Security Expert, Middle East
Etisalat, Singtel, Soft Bank and Telefonica will
sign an agreement to create the first Global
Telco Security Alliance to offer enterprises a
comprehensive portfolio of cyber security
services. The alliance will be the worlds
biggest cyber security provider which will
comprise a customer base of more than billion
customers in over countries. The group has
combined world-class Security Operation
Centres (SOCs) and employ more than cyber
security experts globally. The group would look
to enhance the technologies it uses by developing
its capabilities in predictive analytics using
machine learning and advanced cyber security
using internet of things.
279.1.2 Middle East Cyber Security Market Future
Outlook by Type of Security, 2017-2022
Table 9.4 Middle East Cyber Security Market
Revenue in USD Billion by Type of Security,
2017-22
Table 9.3 Middle East Cyber Security Market
Share by Type of Security in Percentage, 2017-22
Type of Security 2017 2018 2019 2020 2021 2022
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
Total
Type of Security 2017 2018 2019 2020 2021 2022
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
Table 9.5 Middle East Cyber Security Market,
CAGR 2017-22 by Type of Security
Type of Security CAGR()
Network Security
Wireless Security
End-Point Security
Application Security
Content Security
Cloud Security
- Key Takeaways
- Network Security and Wireless Security will be
the fastest growing sectors, both registering a 5
year CAGR of between 2017 to 2022. - Network security will continue to constitute the
lion share of the market as the demand will
increase from USD billion in 2017 to USD
billion in 2022. - Cloud security will also cement its position in
the market, registering a CAGR of - between 2017-22. As more and more
companies are moving to cloud based
infrastructure.
Source Ken Research Analysis
28Disclaimer
The research reports provided by Ken Research are
for the personal information of the authorized
recipient and is not for public distribution and
should not be reproduced or redistributed without
prior permission. None of this material may be
used for any commercial or public use until
unless authorized by Ken Research. The report
will only be used as per the license rights
authorized by Ken Research. The information
provided in the research documents is from
publicly available data and other sources, which
are reliable. Efforts are made to try and ensure
accuracy of data. With respect to documents
available, neither the company nor any of its
employees makes any warranty, express or implied,
including the warranties of merchantability and
fitness for a particular purpose, or assumes any
legal liability or responsibility for the
accuracy, completeness, or usefulness of any
information, apparatus, product, or process
disclosed, or represents that its use will not
infringe privately owned rights. The report also
includes analysis and views expressed by our
research team. The research reports are purely
for information purposes. The opinions expressed
are our current opinions as of the date appearing
in the material and may be subject to change from
time to time without notice. Investors should not
solely rely on the information contained in the
research documents and must make investment
decisions based on their own investment
objectives, risk profile and financial position.
The recipients of this material should take their
own professional advice before acting on this
information. Ken Research will not accept return
of reports once dispatched due to the
confidentiality of information provided in our
reports. In case, a report qualify for return, we
will issue a credit, minus shipping charges, of
equal value to the original purchase price,
toward a future purchaseno refunds. The decision
about whether the product return can be accepted
or not is solely at our discretion. Any dispute
will be subject to laws of India and exclusive
jurisdiction of Indian Courts. No part of this
manual or any material appearing may be
reproduced, stored in or transmitted in any other
format without written permission of Ken
Research. This is purely for the reference of the
concerned entity.
29Contact Us
Unit 14, Tower B3, Spaze I Tech Business Park,
Sohna Road, Sector 49, Gurgaon, Haryana -
122001 New Delhi, India Office 91
9311149880 Web www.kenresearch.com Email
namit_at_kenresearch.com
Contact Us