Docstoc

The Cyber Security Market

Document Sample
The Cyber Security Market Powered By Docstoc
					网络安全市场 2012-2022 年研究报告—
—The Cyber Security Market 2012-
              2022
联系购买电话:010-82863480 公司名称:佐思信息 公司地址:北京市海淀区
     苏州街 18 号院长远天地大厦 A2 座 1008-1 室(100080)

The Cyber Security Market 2012-2022

      Publication date: 12/12/2011
      Number of Pages: 336

Report Details

The proliferation of cyber attacks over the past decade has meant that many
companies and government organisations are now fully aware of the dangers
exposed to them through under-protected networks or from individual negligence.
The growth of the internet has meant that cyber attacks represent a borderless
challenge to security operators, who must now find solutions that are successful
within the entire cyber domain rather than a specific tangible location. As a
consequence, Visiongain has determined that the value of the global cyber security
market in 2012 will reach $61.10bn.

Cyber security operations, solutions, and products are now standard across business,
government, military, and personal networks, as users now understand the high
threat potential posed by hackers from around the world. Whether originating from
state sponsored agents or lone hacktivists, cyber security vendors must now protect
their clients from a range of intrusive behaviours, including phishing email scams,
advanced persistent threats (ATP), distributed denial of service (DDoS), and other
malicious malware and viruses.

Visiongain expects an increase in public-private partnerships across a number of
cyber security sectors, while technological developments are also projected to evolve
to reflect the changing dynamics of the cyber threats, and the increased demands
placed on applications and devices by end users.

National cyber security markets for the US and major European countries will remain
central to the cyber security market over the forecast period to 2022, as advanced
economies continue to exploit internet services, requiring further cyber security
defences. Growth within Asian cyber security markets such as China and India is
forecast by Visiongain to be significant, while in the longer term, Middle Eastern
spending on cyber security is expected to increase sharply, as cyber security is
demanded worldwide.

The report contains 212 tables, charts and graphs that add visual analysis in order to
explain developing trends within the cyber security market. Visiongain provides
forecasts for the period 2012-2022 in terms of value (US$) for the global cyber
security market, as well as for 4 sectors (military, government, vital infrastructures,
and private sector) and 7 submarkets (network security, security operations, data
security, identity & access, endpoint security, application security, and cloud security)
of the cyber security market. In addition, 14 national cyber security markets are
forecast and analysed by Visiongain over the period 2012-2022. The report also
provides profiles of 40 leading companies operating within the market, and includes 4
exclusive interviews with principal cyber security companies, providing expert insight
alongside Visiongain analysis.

Unique Selling Points

• Comprehensive analysis of the prospects for the cyber security market from 2012-
2022.
• Analysis and forecasting informed by extensive expert consultation with industry
leaders. You will be able to read full transcripts of interviews from 4 leading
companies involved within the cyber security market.
• 212 tables, charts and graphs that quantify, analyse and forecast the changing
dynamics of the cyber security market between 2012-2022.
• Forecasts and analysis for the global cyber security market between 2012-2022
• Forecasts and analysis for 4 sectors of the cyber security market from 2012-2022.
• Forecasts and analysis for 7 cyber security submarkets from 2012-2022.
• Forecasts and analysis for 13 national cyber security markets, as well as rest of the
world figures and projections for the period 2012-2022
• Analysis of the forces that influence and characterise the cyber security market
• Profiles of 40 leading companies operating within the cyber security market.

Methodology

This report has been compiled by combining information obtained from a very wide
and rich mixture of primary and secondary research sources, producing a broad
industry overview. Visiongain sought opinions from leading figures in the cyber
security market to underpin the analysis of market drivers and restraints.

The study draws on a diverse range of official corporate and governmental
announcements, media reports, policy documents, industry statements and expert
opinion as a basis for discussing and predicting developments in the cyber security
market between 2012 and 2022.

Visiongain considers that this methodology results in an accurate, objective mixture
of analyses and forecasts.?

Why you should buy The Cyber Security Market 2012-2022

• You will receive a comprehensive analysis of the cyber security market from 2012-
2022
• The analysis and forecasting has been informed by extensive expert consultation
with industry leaders. Within the report, you will be able to read full transcripts of
interviews from 4 leading companies involved within the cyber security market.
- Science Applications International Corporation (SAIC)
- Symantec
- McAfee
- Kaspersky Lab
• You will find 212 tables, charts, and graphs that quantify, analyse and forecast the
cyber security market from 2012-2022
• You will receive forecasts and analysis of the global military cyber security market
between 2012-2022
• You will discover forecasts and analysis for 4 sectors of the cyber security market
between 2012-2022
- Military
- Government
- Vital Infrastructures
- Private Sector
• You will find forecasts and analysis of 7 cyber security submarkets over the period
2012-2022
- Network Security
- Security Operations
- Data Security
- Identity & Access
- Endpoint Security
- Application Security
- Cloud Security
• You will be presented with forecasts for the 13 leading national cyber security
markets, as well as rest of the world figures and projections for the period 2012-2022
- US
- China
- Japan
- Germany
- UK
- France
- Italy
- Russia
- India
- Canada
- Australia
- South Korea
- Israel
- Rest of the World (ROW)
• You will receive a SWOT analysis that examines the cyber security market from
2012-2022
• You will gain profiles of 40 leading companies operating within the cyber security
market

Visiongain is a trading partner with the US Federal Government
CCR Ref number: KD4R6

Pricing:

Single licence:
GBP:1,899
USD:2,953
Euro:2,299

Dept licence:
GBP:2,999
USD:4,663
Euro:3,630

Site Licence:
GBP:4,999
USD:7,772
Euro:6,051

Global Site Licence
GBP:6,999
USD:10,882
Euro:8,472




Table of Contents

1. Executive Summary
1.1 Cyber Security Market Overview
1.2 Drivers and Restraints of the Cyber Security Market
1.3 Report Benefits and Highlights
1.4 Report Structure
1.5 Methodology
1.6 Global Cyber Security Forecast 2012-2022
1.7 Cyber Security Market Sectors Forecasts 2012-2022
1.7.1 Military Sector Forecast 2012-2022
1.7.2 Government Sector Forecast 2012-2022
1.7.3 Vital Infrastructures Sector Forecast 2012-2022
1.7.4 Private Sector Forecast 2012-2022
1.8 Cyber Security Submarkets Forecasts 2012-2022
1.8.1 Network Security Forecast 2012-2022
1.8.2 Security Operations Forecast 2012-2022
1.8.3 Data Security Forecast 2012-2022
1.8.4 Identity & Access Forecast 2012-2022
1.8.5 Endpoint Security Forecast 2012-2022
1.8.6 Application Security Forecast 2012-2022
1.8.7 Cloud Security Forecast 2012-2022
1.9 Leading National Cyber Security Markets 2012-2022

2. Introduction to the Cyber Security Market
2.1 Defining Cyber Security
2.2 Forms of Cyber Security
2.2.1 Military
2.2.2 Government
2.2.3 Vital Infrastructures
2.2.4 Private Sector
2.3 Cyber Security Submarket Definitions
2.3.1 Network Security
2.3.2 Security Operations
2.3.3 Data Security
2.3.4 Identity & Access Management
2.3.5 Endpoint Security
2.3.6 Application Security
2.3.7 Cloud Security
2.4 International Cyber Security Strategies
2.4.1 Privacy Law
2.4.2 Standardised Responses
2.4.3 International Protocol
2.5 Structure of the Cyber Security Market

3. Cyber Attacks
3.1 Types of Cyber Attack
3.2 Cyber Weapons
3.3 Cyber Defences
3.4 Major Cyber Attacks
3.4.1 Estonia
3.4.2 Operation Orchard
3.4.3 Georgia
3.4.4 Conficker
3.4.5 Pentagon
3.4.6 Aurora
3.4.7 Chinese Diversion of Internet Traffic
3.4.8 Stuxnet
3.4.9 Duqu
3.4.10 RSA
3.4.11 Sony
3.4.12 Operation Shady RAT
3.4.13 Mitsubishi Heavy Industries
3.5 Major Cyber Attacks 2011

4. Global Cyber Security Market 2012-2022
4.1 Global Cyber Security Market Forecast 2012-2022
4.2 Global Cyber Security Market Analysis
4.3 Fastest Growing Cyber Security Markets 2012-2022
4.3.1 Fastest Growing Cyber Security Market Sectors
4.3.1.1 Fastest Growing Cyber Security Market Sectors 2012-2022
4.3.1.2 Fastest Growing Cyber Security Market Sectors 2012-2017
4.3.1.3 Fastest Growing Cyber Security Market Sectors 2017-2022
4.3.2 Fastest Growing Cyber Security Submarkets
4.3.2.1 Fastest Growing Cyber Security Submarkets 2012-2022
4.3.2.2 Fastest Growing Cyber Security Submarkets 2012-2017
4.3.2.3 Fastest Growing Cyber Security Submarkets 2017-2022
4.3.3 Fastest Growing Leading National Cyber Security Markets
4.3.3.1 Fastest Growing Leading National Cyber Security Markets 2012-2022
4.3.3.2 Fastest Growing Leading National Cyber Security Markets 2012-2017
4.3.3.3 Fastest Growing Leading National Cyber Security Markets 2017-2022
4.4 Cyber Security Market Share Allocations
4.4.1 Cyber Security Market Sector Share Allocations
4.4.2 Cyber Security Submarket Share Allocations
4.4.3 Cyber Security Leading National Market Share Allocations
4.5 Cyber Security Market Cumulative Sales 2012-2022
4.5.1 Cyber Security Market Sectors Cumulative Sales 2012-2022
4.5.2 Cyber Security Submarkets Cumulative Sales 2012-2022
4.5.3 Leading National Cyber Security Markets Cumulative Sales 2012-2022

5. Cyber Security Market Sectors 2012-2022
5.1 Cyber Security Market Military Sector
5.1.1 Cyber Security Market Military Sector Forecast 2012-2022
5.1.2 Cyber Security Market Military Sector Analysis
5.2 Cyber Security Market Government Sector
5.2.1 Cyber Security Market Government Sector Forecast 2012-2022
5.2.2 Cyber Security Market Government Sector Analysis
5.3 Cyber Security Market Vital Infrastructures Sector
5.3.1 Cyber Security Market Vital Infrastructures Sector Forecast 2012-2022
5.3.2 Cyber Security Market Vital Infrastructures Sector Analysis
5.4 Cyber Security Market Private Sector
5.4.1 Cyber Security Market Private Sector Forecast 2012-2022
5.4.2 Cyber Security Market Private Sector Analysis

6. Cyber Security Submarkets 2012-2022
6.1 Network Security Submarket
6.1.1 Network Security Submarket Forecast 2012-2022
6.1.2 Network Security Submarket Analysis
6.2 Security Operations Submarket
6.2.1 Security Operations Submarket Forecast 2012-2022
6.2.2 Security Operations Submarket Analysis
6.3 Data Security Submarket
6.3.1 Data Security Submarket Forecast 2012-2022
6.3.2 Data Security Submarket Analysis
6.4 Identity & Access Submarket
6.4.1 Identity & Access Submarket Forecast 2012-2022
6.4.2 Identity & Access Submarket Analysis
6.5 Endpoint Security Submarket
6.5.1 Endpoint Security Submarket Forecast 2012-2022
6.5.2 Endpoint Security Submarket Analysis
6.6 Application Security
6.6.1 Application Security Submarket Forecast 2012-2022
6.6.2 Application Security Submarket Analysis
6.7 Cloud Security Submarket
6.7.1 Cloud Security Submarket Forecast 2012-2022
6.7.2 Cloud Security Submarket Analysis

7. Leading National Cyber Security Markets 2012-2022
7.1 US Cyber Security Market
7.1.1 US Cyber Security Market Forecast 2012-2022
7.1.2 US Cyber Security Market Analysis
7.1.2.1 US Budget Request 2012
7.1.2.2 US Federal Government Cyber Spending Analysis
7.1.2.3 US International Strategy for Cyberspace 2011
7.1.2.4 US Government and Military Cyber Organisations and Structure
7.1.2.5 CNCI
7.1.2.6 US CYBERCOM
7.1.2.7 ARCYBER
7.1.2.8 AFCYBER
7.1.2.9 FLTCYBERCOM
7.1.2.10 MARFORCYBER
7.1.2.11 NSA
7.1.2.12 Perfect Citizen
7.1.2.13 DISA
7.1.2.14 DHS
7.1.2.15 National Cyber Security Center
7.1.2.16 National Protection and Programs Directorate
7.1.2.17 Office of Cyber Security and Communications
7.1.2.18 Einstein II
7.1.2.19 Cyberstorm III
7.1.2.20 DARPA
7.1.2.21 CINDER
7.1.2.22 US Vital Infrastructures
7.1.2.23 CSC - Defense Cyber Investigations Training Academy
7.1.2.24 CSC- US Intelligence
7.1.2.25 HBGary -DHS
7.1.2.26 Booz Allen Hamilton - US Cyber Command / Research
7.1.2.27 Harris Corporation - USAF
7.1.2.28 Booz Allen Hamilton - US DOD
7.1.2.29 Hewlett Packard - USAF
7.1.2.30 ManTech - USDA
7.1.2.31 ManTech - FBI
7.1.2.32 Point One, LLC - Fort Meade
7.1.2.33 Georgia Tech Applied Research - Space and Naval Warfare Center
Systems Command
7.1.2.34 Adventium Enterprise - USAF IT Infrastructure
7.1.2.35 Johns Hopkins University - DARPA
7.1.2.36 SRI International- DHS
7.1.2.37 Kratos Defense and Security Solutions - US Navy
7.1.2.38 MEI Technologies - National Aeronautics and Space Administration (NASA)
7.1.2.30 SecureIT - OPIC
7.1.2.40 TeleCommunication Systems (TCS) - US DOD
7.1.2.41 CSC - US Air Force 33rd Network Warfare Squadron
7.1.2.42 ManTech - FBI (2)
7.1.2.43 SAIC - SCC Pacific
7.1.2.44 Booz Allen Hamilton - SCC Pacific
7.1.2.45 General Dynamics - SCC Pacific
7.1.2.46 Northrop Grumman - SCC Pacific
7.1.2.47 Booz Allen Hamilton - SSC Pacific (2)
7.1.2.48 SAIC - US Navy 10th Fleet Cyber Command
7.1.2.49 Blue Ridge Networks - US DOJ
7.1.2.50 DHS / GSA - Risk Management Framework Company Awards
7.1.2.51 G&B Solutions - GSA / DHS
7.1.2.52 Merlin International - HHS
7.1.2.53 General Dynamics - DIA Task Order
7.2 Chinese Cyber Security Market
7.2.1 Chinese Cyber Security Market Forecast 2012-2022
7.2.2 Chinese Cyber Security Market Analysis
7.2.2.1 Chinese Online Blue Army 7.2.2.2 National Computer Network Emergency
Response Coordination Centre of China Report
7.2.2.3 UN Code of Conduct Proposed
7.2.2.4 Huawei / ZTE - Contract Bidding
7.3 Japanese Cyber Security Market
7.3.1 Japanese Cyber Security Market Forecast 2012-2022
7.3.2 Japanese Cyber Security Market Analysis
7.4 German Cyber Security Market
7.4.1 German Cyber Security Market Forecast 2012-2022
7.4.2 German Cyber Security Market Analysis
7.4.2.1 Cyber Security Strategy for Germany
7.5 UK Cyber Security Market
7.5.1 UK Cyber Security Market Forecast 2012-2022
7.5.2 UK Cyber Security Market Analysis
7.5.2.1 Huawei - Cyber Security Evaluation Centre
7.5.2.2 Detica - UK MOJ
7.5.2.3 Blue Screen IT Ltd - RAF
7.6 French Cyber Security Market
7.6.1 French Cyber Security Market Forecast 2012-2022
7.6.2 French Cyber Security Market Analysis
7.7 Italian Cyber Security Market
7.7.1 Italian Cyber Security Market Forecast 2012-2022
7.7.2 Italian Cyber Security Market Analysis
7.8 Russian Cyber Security Market
7.8.1 Russian Cyber Security Market Forecast 2012-2022
7.8.2 Russian Cyber Security Market Analysis
7.8.2.1 Russian - Bulgarian Joint working Group on Information Society and
Communication Technologies
7.8.2.2 Russia - US Cyberspace Cooperation
7.8.2.3 Defined Terms - Russian and US
7.9 Indian Cyber Security Market
7.9.1 Indian Cyber Security Market Forecast 2012-2022
7.9.2 Indian Cyber Security Market Analysis
7.9.2.1 India - US MOU
7.9.2.2 Indian Government Website Measures
7.9.2.3 India- NATO
7.10 Canadian Cyber Security Market
7.10.1 Canadian Cyber Security Market Forecast 2012-2022
7.10.2 Canadian Cyber Security Market Analysis
7.11 Australian Cyber Security Market
7.11.1 Australian Cyber Security Market Forecast 2012-2022
7.11.2 Australian Cyber Security Market Analysis
7.11.2.1 Australian - US Cyber Cooperation
7.11.2.2 Australian 2012 White Paper on Cyber Security
7.12 South Korean Cyber Security Market
7.12.1 South Korean Cyber Security Market Forecast 2012-2022
7.12.2 South Korean Cyber Security Market Analysis
7.13 Israeli Cyber Security Market
7.13.1 Israeli Cyber Security Market Forecast 2012-2022
7.13.2 Israeli Cyber Security Market Analysis
7.13.2.1 Covertix - Kima Ventures
7.13.2.2 Israeli National Cyber Directorate (NCD)
7.13.2.3 Israeli Duqu Development
7.14 Rest of the World (ROW) Cyber Security Market
7.14.1 Rest of the World (ROW) Cyber Security Market Forecast 2012-2022
7.14.2 Rest of the World (ROW) Cyber Security Market Analysis
7.14.2.1 UAE
7.14.2.2 Iran

8. SWOT Analysis of the Cyber Security Market 2012-2022
8.1 Strengths
8.1.1 Increasing Use of the Internet and Cyber Platforms
8.1.2 Escalation in Cyber Attacks
8.1.3 Strong Government Commitment
8.1.4 Necessity of Infrastructure Security
8.1.5 Development of Cyber Warfare Capabilities
8.1.6 Global Markets
8.2 Weaknesses
8.2.1 Lack of Skilled Personnel
8.2.2 Threat Perception Not Realistic
8.2.3 Globalised Problems
8.2.4 International Strategies
8.2.5 Economic Outlook
8.3 Opportunities
8.3.1 Security for New Platforms
8.3.2 Growth of Government Cyber Budgets
8.3.3 Cyber Security in New Geographical Markets
8.3.4 Company Cross Over Between Sectors
8.3.5 Development of Cyber Warfare
8.3.6 Investment in Long Term Research
8.4 Threats
8.4.1 Under Skilled Personnel
8.4.2 Government/Organisational Paralysis
8.4.3 Cloud Security
8.4.4 Economic and Financial Threats
8.4.5 Reputation

9. Expert Opinion
9.1 Science Applications International Corporation (SAIC)
9.1.1 Role at SAIC
9.1.2 Cyber Security Portfolio
9.1.3 Cyber Focus
9.1.4 SAIC's Cyber Customers
9.1.5 Contract Attainment
9.1.6 SAIC's Focus Within Cyber Markets
9.1.7 Important Cyber Trends
9.1.8 Cyber Challenges Facing Vendors
9.1.9 Cyber Security Growth Within National Markets
9.1.10 US Cyber Security Market Perception
9.1.11 Cyber Spending Within Economies
9.1.12 Public and Private Roles in Infrastructure Protection
9.1.13 SAIC and McAfee Strategic Partnership
9.2 Symantec
9.2.1 Role at Symantec
9.2.2 Symantec's Involvement within Cyber Security
9.2.3 Symantec's Cyber Security Focus and Target Growth Areas
9.2.4 Trends within Cyber Security
9.2.5 Challenge of Cyber Security
9.2.6 Duqu's Relevance for Cyber Security
9.2.7 Future for Critical Infrastructures Cyber Security
9.2.8 Symantec's Latest Area of Research
9.3 McAfee
9.3.1 Job Specification at McAfee
9.3.2 McAfee's Focus within Cyber Security
9.3.3 Technological Trends
9.3.4 Moving to the Cloud
9.3.5 Targeting Senior Managerial Levels
9.3.6 World Cyber Security Growth
9.3.7 UK Cyber Security
9.3.8 Challenges
9.3.9 Nature of Future Attacks
9.3.10 Critical Infrastructures
9.3.11 Future Cyber Requirements
9.4 Kaspersky Lab
9.4.1 Kaspersky Lab Cyber Security Profile
9.4.2 Kaspersky Lab's Cyber Customers
9.4.3 Cyber Security Partnerships
9.4.4 Trends within the Cyber Security Market
9.4.5 Challenges within the Market
9.4.6 Global Growth of Cyber Security
9.4.7 US Cyber Security Market Assessment
9.4.8 The Threat of Duqu and its Implications
9.4.9 Future of Critical Infrastructures Cyber Security Management
9.4.10 Impact of Cloud Technologies
9.4.11 Latest Research Areas for Kaspersky Lab

10. Leading Companies in the Cyber Security Market
10.1 AVAST Software a.s
10.2 AVG Technologies
10.3 BAE Systems
10.4 Boeing Defense, Space and Security (BDS)
10.5 Booz Allen Hamilton Inc.
10.6 BreakingPoint Systems, Inc.
10.7 CACI
10.8 Camber Corporation
10.9 Cisco Systems, Inc
10.10 Computer Sciences Corporation (CSC)
10.11 Corero Network Security
10.12 Cubic
10.13 EADS Group
10.14 EMC Corporation
10.15 F-Secure Corporation
10.16 General Dynamics Corporation
10.17 Harris Corporation
10.18 Hewlett Packard (HP)
10.19 Honeywell, Inc.
10.20 International Business Machine (IBM)
10.21 Kaspersky Lab
10.22 KEYW
10.23 Kratos Defense & Security Solutions, Inc.
10.24 L-3 Communications
10.25 Lockheed Martin Corporation
10.26 ManTech International Corporation
10.27 McAfee Inc
10.28 MEI Technologies
10.29 Microsoft Corporation
10.30 NetWitness Corporation
10.31 Northrop Grumman Corporation
10.32 Qinetiq Group Plc
10.33 Raytheon Company
10.34 Salient Federal Solutions (SFS)
10.35 Science Applications International Corporation (SAIC)
10.36 Sotera Defense Solutions, Inc.
10.37 Spirent Communications
10.38 Symantec Corporation
10.39 Telecommunications Systems Inc. (TCS)
10.40 Thales Group

11. Conclusions
11.1 Global Cyber Security Market 2012-2022
11.2 Cyber Security Market Sectors 2012-2022
11.2.1 Military Sector
11.2.2 Government Sector
11.2.3 Vital Infrastructures Sector
11.2.4 Private Sector
11.3 Cyber Security Submarkets 2012-2022
11.3.1 Network Security
11.3.2 Security Operations
11.3.3 Data Security
11.3.4 Identity & Access
11.3.5 Endpoint Security
11.3.6 Application Security
11.3.7 Cloud Security
11.4 Leading National Cyber Security Markets 2012-2022
11.5 Fastest Growing Cyber Security Markets 2012-2022
11.6 Cyber Security Market Drivers
11.7 Cyber Security Market Restraints
11.8 Opportunities within the Cyber Security Market

12. Glossary

List of Tables
Table 1.1 Drivers and Restraints of the Cyber Security Market
Table 2.1 List of Vital Infrastructures
Table 3.1 Types of Cyber Attack
Table 3.2 Cyber Weapons
Table 3.3 Cyber Defences
Table 3.4 Operation Shady RAT Targets
Table 3.5 Major Cyber Attacks 2011
Table 4.1 Global Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 4.2 Global Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 4.3 Cyber Security Market Sector Forecasts 2012-2022 ($bn, AGR %)
Table 4.4 Cyber Security Submarkets Forecasts 2012-2022 ($bn, AGR %)
Table 4.5 Leading National Cyber Security Markets Forecasts 2012-2022 ($bn,
AGR %)
Table 4.6 Global Cyber Warfare Market, Sectors, Submarkets, and Leading National
Markets Forecast CAGR (%) 2012-2022, 2012-2017, 2017-2022
Table 4.7 Fastest Growing Cyber Security Sectors Forecast CAGR (%) 2012-2022
Table 4.8 Fastest Growing Cyber Security Sectors Forecast CAGR (%) 2012-2017
Table 4.9 Fastest Growing Cyber Security Sectors Forecast CAGR (%) 2017-2022
Table 4.10 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2012-
2022
Table 4.11 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2012-
2027
Table 4.12 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2017-
2022
Table 4.13 Fastest Growing Leading National Cyber Security Markets Forecast
CAGR (%) 2012-2022
Table 4.14 Fastest Growing Leading National Cyber Security Markets Forecast
CAGR (%) 2012-2017
Table 4.15 Fastest Growing Leading National Cyber Security Markets Forecast
CAGR (%) 2017-2022
Table 4.16 Cyber Security Sector Share Forecast 2011 vs 2021 (% Share, %
Change)
Table 4.17 Cyber Security Submarket Share Forecast 2011 vs 2021 (% Share, %
Change)
Table 4.18 Leading National Cyber Security Market Share Forecast 2011 vs 2021 (%
Share, % Change)
Table 4.19 Global Cyber Security Market, Sectors, Submarkets, and Leading
National Markets Cumulative Sales Forecast 2012-2022 ($bn, %)
Table 5.1 Cyber Security Market Military Sector Forecast Summary 2012, 2017 and
2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 5.2 Cyber Security Market Military Sector Forecast 2012-2022 ($bn, AGR %)
Table 5.3 Cyber Security Market Military Sector Forecast CAGR (%) 2012-2022,
2012-2017, and 2017-2022
Table 5.4 Cyber Security Market Government Sector Forecast Summary 2012, 2017
and 2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 5.5 Cyber Security Market Military Sector Forecast 2012-2022 ($bn, AGR %)
Table 5.6 Cyber Security Market Military Sector Forecast CAGR (%) 2012-2022,
2012-2017, and 2017-2022
Table 5.7 Cyber Security Market Vital Infrastructures Sector Forecast Summary 2012,
2017 and 2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 5.8 Cyber Security Market Vital Infrastructures Sector Forecast 2012-2022
($bn, AGR %)
Table 5.9 Cyber Security Market Vital Infrastructures Sector Forecast CAGR (%)
2012-2022, 2012-2017, and 2017-2022
Table 5.10 Cyber Security Market Private Sector Forecast Summary 2012, 2017 and
2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 5.11 Cyber Security Market Private Sector Forecast 2012-2022 ($bn, AGR %)
Table 5.12 Cyber Security Market Private Sector Forecast CAGR (%) 2012-2022,
2012-2017, and 2017-2022
Table 6.1 Network Security Submarket Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 6.2 Network Security Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.3 Network Security Submarket Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 6.4 Security Operations Submarket Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 6.5 Security Operations Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.6 Security Operations Submarket Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 6.7 Data Security Submarket Forecast Summary 2012, 2017 and 2022 ($bn,
Rank, % Share, CAGR %, Cumulative)
Table 6.8 Data Security Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.9 Data Security Submarket Forecast CAGR (%) 2012-2022, 2012-2017, and
2017-2022
Table 6.10 Identity & Access Submarket Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 6.11 Identity & Access Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.12 Identity & Access Submarket Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 6.13 Endpoint Security Submarket Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 6.14 Endpoint Security Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.15 Endpoint Security Submarket Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 6.16 Application Security Submarket Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 6.17 Application Security Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.18 Application Security Submarket Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 6.19 Cloud Security Submarket Forecast Summary 2012, 2017 and 2022 ($bn,
Rank, % Share, CAGR %, Cumulative)
Table 6.20 Cloud Security Submarket Forecast 2012-2022 ($bn, AGR %)
Table 6.21 Cloud Security Submarket Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 7.1 US Cyber Security Market Forecast Summary 2012, 2017 and 2022 ($bn,
Rank, % Share, CAGR %, Cumulative)
Table 7.2 US Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.3 US Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 7.4 US Cyber Budget Request 2012 ($bn)
Table 7.5 Chinese Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.6 Chinese Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.7 Chinese Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.8 Japanese Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.9 Japanese Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.10 Japanese Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.11 German Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.12 German Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.13 German Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.14 UK Cyber Security Market Forecast Summary 2012, 2017 and 2022 ($bn,
Rank, % Share, CAGR %, Cumulative)
Table 7.15 UK Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.16 UK Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 7.17 French Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.18 French Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.19 French Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.20 Italian Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.21 Italian Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.22 Italian Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 7.23 Russian Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.24 Russian Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.25 Russian Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.26 List of Russian and US Jointly Defined Cyber Terms
Table 7.27 Indian Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.28 Indian Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.29 Indian Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 7.30 Canadian Cyber Security Market Forecast Summary 2012, 2017 and
2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.31 Canadian Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.32 Canadian Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.33 Australian Cyber Security Market Forecast Summary 2012, 2017 and
2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.34 Australian Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.35 Australian Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-
2017, and 2017-2022
Table 7.36 South Korean Cyber Security Market Forecast Summary 2012, 2017 and
2022 ($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.37 South Korean Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.38 South Korean Cyber Security Market Forecast CAGR (%) 2012-2022,
2012-2017, and 2017-202
Table 7.39 Israeli Cyber Security Market Forecast Summary 2012, 2017 and 2022
($bn, Rank, % Share, CAGR %, Cumulative)
Table 7.40 Israeli Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.41 Israeli Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 7.42 ROW Security Market Forecast Summary 2012, 2017 and 2022 ($bn,
Rank, % Share, CAGR %, Cumulative)
Table 7.43 ROW Cyber Security Market Forecast 2012-2022 ($bn, AGR %)
Table 7.44 ROW Cyber Security Market Forecast CAGR (%) 2012-2022, 2012-2017,
and 2017-2022
Table 8.1 SWOT Analysis of the Cyber Security Market 2012-2022
Table 11.1 Fastest Growing Cyber Security Markets 2012-2022 (CAGR, %)
Table 11.2 Cyber Security Market Drivers
Table 11.3 Cyber Security Market Restraints
Table 11.4 Cyber Security Market Opportunities

List of Figures
Figure 2.1 Structure of the Cyber Security Market
Figure 3.1 Operation Shady RAT Targets
Figure 4.1 Global Cyber Security Market Forecast 2012-2022 ($bn)
Figure 4.2 Global Cyber Security Market Forecast 2012-2022 Annual Growth Rate
(AGR %)
Figure 4.3 Cyber Security Market Sector Forecasts 2012-2022 ($bn)
Figure 4.4 Cyber Security Market Sector Forecasts 2012-2022 Annual Growth Rates
(AGR %)
Figure 4.5 Cyber Security Submarket Forecasts 2012-2022 ($bn)
Figure 4.6 Cyber Security Submarkets Forecasts 2012-2022 Annual Growth Rates
(AGR %)
Figure 4.7 Leading National Cyber Security Market Forecasts 2012-2022 ($bn)
Figure 4.8 Leading National Cyber Security Markets Forecasts 2012-2022 Annual
Growth Rates (AGR %)
Figure 4.9 Fastest Growing Cyber Security Sectors Forecast CAGR (%) 2012-2022
Figure 4.10 Fastest Growing Cyber Security Sectors Forecast CAGR (%) 2012-2017
Figure 4.11 Fastest Growing Cyber Security Sectors Forecast CAGR (%) 2017-2022
Figure 4.12 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2012-
2022
Figure 4.13 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2012-
2027
Figure 4.14 Fastest Growing Cyber Security Submarkets Forecast CAGR (%) 2017-
2022
Figure 4.15 Fastest Growing Leading National Cyber Security Markets Forecast
CAGR (%) 2012-2022
Figure 4.16 Fastest Growing Leading National Cyber Security Markets Forecast
CAGR (%) 2012-2027
Figure 4.17 Fastest Growing Leading National Cyber Security Markets Forecast
CAGR (%) 2017-2022
Figure 4.18 Cyber Security Sector Share Forecast 2012 (%)
Figure 4.19 Cyber Security Sector Share Forecast 2017 (%)
Figure 4.20 Cyber Security Sector Share Forecast 2022 (%)
Figure 4.21 Increasing and Decreasing Cyber Security Sectors Share Forecast 2011
vs 2021 (%)
Figure 4.22 Cyber Security Submarkets Share Forecast 2012 (%)
Figure 4.23 Cyber Security Submarkets Share Forecast 2017 (%)
Figure 4.24 Cyber Security Submarkets Share Forecast 2022 (%)
Figure 4.25 Increasing and Decreasing Cyber Security Submarkets Share Forecast
2011 vs 2021 (%)
Figure 4.26 Leading National Cyber Security Markets Share Forecast 2012 (%)
Figure 4.27 Leading National Cyber Security Markets Share Forecast 2017 (%)
Figure 4.28 Leading National Cyber Security Markets Share Forecast 2022 (%)
Figure 4.29 Increasing and Decreasing Leading National Cyber Security Markets
Share Forecast 2011 vs 2021 (%)
Figure 4.30 Cyber Security Sectors Cumulative Spending Forecast 2012-2022 ($bn)
Figure 4.31 Cyber Security Sectors Cumulative Spending Percentage Share
Forecast 2012-2022 (%)
Figure 4.32 Cyber Security Submarkets Cumulative Spending Forecast 2012-2022
($bn)
Figure 4.33 Cyber Security Submarkets Cumulative Spending Percentage Share
Forecast 2012-2022 (%)
Figure 4.34 Leading National Cyber Security Markets Cumulative Spending Forecast
2012-2022 ($bn)
Figure 4.35 Leading National Cyber Security Markets Cumulative Spending
Percentage Share Forecast 2012-2022 (%)
Figure 5.1 Cyber Security Market Military Sector Share Forecast 2012, 2017 and
2022 (% Share)
Figure 5.2 Cyber Security Market Military Sector Forecast 2012-2022 ($bn)
Figure 5.3 Cyber Security Market Military Sector Forecast Annual Growth Rate 2012-
2022 (AGR %)
Figure 5.4 Cyber Security Market Government Sector Share Forecast 2012, 2017
and 2022 (% Share)
Figure 5.5 Cyber Security Market Military Sector Forecast 2012-2022 ($bn)
Figure 5.6 Cyber Security Market Military Sector Forecast Annual Growth Rate 2012-
2022 (AGR %)
Figure 5.7 Cyber Security Market Vital Infrastructures Sector Share Forecast 2012,
2017 and 2022 (% Share)
Figure 5.8 Cyber Security Market Vital Infrastructures Sector Forecast 2012-2022
($bn)
Figure 5.9 Cyber Security Market Vital Infrastructures Sector Forecast Annual
Growth Rate 2012-2022 (AGR %)
Figure 5.10 Cyber Security Market Private Sector Share Forecast 2012, 2017 and
2022 (% Share)
Figure 5.11 Cyber Security Market Private Sector Forecast 2012-2022 ($bn)
Figure 5.12 Cyber Security Market Private Sector Forecast Annual Growth Rate
2012-2022 (AGR %)
Figure 6.1 Network Security Submarket Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 6.2 Network Security Submarket Forecast 2012-2022 ($bn)
Figure 6.3 Network Security Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 6.4 Security Operations Submarket Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 6.5 Security Operations Submarket Forecast 2012-2022 ($bn)
Figure 6.6 Security Operations Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 6.7 Data Security Submarket Share Forecast 2012, 2017 and 2022 (% Share)
Figure 6.8 Data Security Submarket Forecast 2012-2022 ($bn)
Figure 6.9 Data Security Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 6.10 Identity & Access Submarket Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 6.11 Identity & Access Submarket Forecast 2012-2022 ($bn)
Figure 6.12 Identity & Access Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 6.13 Endpoint Security Submarket Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 6.14 Endpoint Security Submarket Forecast 2012-2022 ($bn)
Figure 6.15 Endpoint Security Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 6.16 Application Security Submarket Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 6.17 Application Security Submarket Forecast 2012-2022 ($bn)
Figure 6.18 Application Security Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 6.19 Cloud Security Submarket Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 6.20 Cloud Security Submarket Forecast 2012-2022 ($bn)
Figure 6.21 Cloud Security Submarket Forecast Annual Growth Rate 2012-2022
(AGR %)
Figure 7.1 US Cyber Security Market Share Forecast 2012, 2017 and 2022 (% Share)
Figure 7.2 US Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.3 US Cyber Security Budget Request 2012 DHS versus DOD ($bn, %)
Figure 7.4 US Cyber Security Budget Request 2012 Divisional Allocations ($bn)
Figure 7.5 US Cyber Security Budget Request 2012 Divisional Allocations (%)
Figure 7.6 US Cyber Security Budget Proposal 2012 Defense Agencies Breakdown
($bn, %)
Figure 7.7 US Government and Military Cyber Organisational Structure
Figure 7.8 US CYBERCOM Organisational Structure
Figure 7.9 Chinese Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.10 Chinese Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.11 Japanese Cyber Security Market Share Forecast 2012, 2017 and 2022
(% Share)
Figure 7.12 Japanese Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.13 German Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.14 German Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.15 UK Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.16 UK Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.17 French Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.18 French Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.19 Italian Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.20 Italian Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.21 Russian Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.22 Russian Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.23 Indian Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.24 Indian Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.25 Canadian Cyber Security Market Share Forecast 2012, 2017 and 2022
(% Share)
Figure 7.26 Canadian Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.27 Australian Cyber Security Market Share Forecast 2012, 2017 and 2022
(% Share)
Figure 7.28 Australian Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.29 South Korean Cyber Security Market Share Forecast 2012, 2017 and
2022 (% Share)
Figure 7.30 South Korean Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.31 Israeli Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.32 Israeli Cyber Security Market Forecast 2012-2022 ($bn)
Figure 7.33 ROW Cyber Security Market Share Forecast 2012, 2017 and 2022 (%
Share)
Figure 7.34 ROW Cyber Security Market Forecast 2012-2022 ($bn)

Companies Listed

Adventium Enterprise, LLC
Allianceforcebiz.com
Anonplus
APC
Apple Inc.
Applied Signal Technology (AST)
Apptis Inc.
ArcSight
Armonk
AVAST Software a.s
AVG Technologies
BAE Systems
BAE Systems Information Solutions
BASF
Betfair
Bethesda Softworks
Bitcointalk
Blue Ridge Networks
Blue Screen IT Ltd
blueHOMES AG
Boeing Company
Boeing Cyber and Information Solutions Division
Boeing Defense, Space and Security (BDS)
Booz Allen Hamilton Inc.
BreakingPoint Systems, Inc.
Bright House Networks
Brinker International, Inc.
CA Technologies
CACI
Camber Corporation
Cassidian
Check Point
China Central Television (CCTV)
China Telecom
Cisco Systems, Inc
CitiGroup
Cloudshield Technologies Inc.
Club Music CPPS
Cobham Plc
Comodo
Computer Sciences Corporation (CSC)
COMVATION AG
Core Security Technologies
Corero Network Security
Cosentini Associates
Covertix
Cubic
Cubic Mission Support Services
CVG-Avtec
Dell
Deloitte Consulting LLP
Detica Ltd
Diebold
Diginotar
DSD Laboratories Inc.
Dynamics Research Corporation
EADS Airbus
EADS Astrium
EADS Cassidian
EADS Eurocopter
EADS Group
Ebay
EMC Corporation
Emiraje Systems LLC
Epsilon
Epson Korea
Facebook
Fashion TV India
Filmradar
Find2Trade.com Ltd
Fox Broadcasting Company
Fox Entertainment Group
FremantleMedia Ltd
Front National
F-Secure Corporation
Funniestvideosonline
G&B Solutions Inc.
Gabia
Genentech, Inc.
General Dynamics Advanced Information Systems
General Dynamics Corporation
General Dynamics Information Technology
Generali
Georgia Tech Applied Research
GIS
Global Network Systems
GlobalSign
Google
Gretech Corporation
GuardianEdge
Hana SK Card Co
Harris Corporation
Harris Integrated Network Solutions
HBGary
HBGary Federal
Hewlett Packard (HP)
Honeywell, Inc.
Hong Kong Exchanges and Clearing Limited
HP Enterprise Services
HSBC Korea
Huawei Technologies Co. Ltd
IBM
Indria Gandh International Airport
InfraGard
Inmotion Hosting
Integral Systems Europe
Integral Systems Service Solutions (IS3)
Intel Corporation
International Business Machine (IBM)
IRC Federal
IRNA (Islamic Republic News Agency)
Johnson Controls
Juniper Networks
Justonehost
Kaspersky Lab
Kernel
KEYW
Kima Ventures
Knowledge Consulting Group Inc.
Kratos Defense & Security Solutions, Inc.
L-3 Communications
L-3 STRATIS
LimeWire
LinkedIn
Linux Foundation
Lockheed Martin Corporation
Lotus
Lumistar
LVHM
ManTech Cyber Solutions Inc.
ManTech International Corporation
McAfee Inc
MEI Technologies Inc.
Merlin International
Microsoft Corporation
Microsoft Defence Solutions
Microsoft Government Solutions
Mitsubishi Heavy Industries (MHI)
Mobile App Network Forum
Monsanto
Moody's Investors Service, Inc
MTCSC
MySQL.com
Nasdaq
NBC (National Broadcasting Company) News
NetApp
NetWitness Corporation
Newpoint Technologies
News Corp. International
Nintendo Co., Ltd
Nokia Developer Forum
Northrop Grumman Corporation
Novell
Oracle Corporation
Orange France
Panda Security
Pastebin
PCS Consultants
PGP Corporation
Point One, LLC
Proctor & Gamble
Public Broadcasting Service (PBS)
Qinetiq Group Plc
QinetiQ North America's Security and Intelligence Solutions
Raytheon Company
Raytheon Technical Computer Solutions
Red Ha
Regency ITt
RIAA.com
RIM (Research In Motion)
RSA Security
RT Logic
Salient Federal Solutions (SFS)
Samsung Card Co. Ltd
SAT Corporation
Science Applications International Corporation (SAIC)
SecureInfo Corporation
SecureIT
Securicon LLC
SEGA Corporation
Signature Consultants LLC
Signature Government Solutions LLC
Simco Ltd
SK Communications
Sony
Sony BMG Belgium
Sony BMG Greece
Sony BMG Netherlands
Sony Music Ireland
Sony Network Entertainment International LLC
Sotera Defense Solutions, Inc.
Sparta Inc
Spirent Communications
SRI International
SUSE
Swarovski
Symantec Corporation
Tantus Technologies Inc.
TeleCommunication Systems Inc. (TCS)
Telegraph Media Group Limited
Telos Corporation
Tetrad Digital Integrity
Thales Group
Thales Information Systems Security
The Register
thetvdb
Top 100 Arena
Toshiba America
TripAdvisor.com
Trustwave
TWD & Associates
Twitter
UKChatterbox
Ukgraffiti Ltd.
Uni Jobs
UPS
Uronimo Mobile Platform
USA Today
Vacationland Vendros
Vanguard Defense Industries (VDI)
Veris Group LLC.
Verisign Inc.
Vitrociest
VMware
Vodafone
Voice of America
Welt Online
WineHQ
WordPress
Wrestlegame
ZTE
Zytel Corporation

Government Agencies and Other Organisations Mentioned in This Report
@BashCrew
@BlackHatGhosts
@FailRoot
@ThEhAcKeR12
Abhaxas
Albanian Cyber Army
Anonplus
Anonymous
Anonymous Austria
Anonymous France
Anonymous_DR
Antisec
Arizona Police Department
Australian Department of Defence
Australian Office of the Attorney General
Australian Parliament
Austrian Federal Police
Austrian Federal Economic Chamber
Barbaros-DZ
BART Police Officers Association
Beaumont Independent School District
Birdville School District
Brazilian Federal Police
Brazilian Government
California State Assembly
Canadian Conservative Party
Canadian Defence Research and Development
Canadian Finance Department
Canadian Government
Canadian Treasury Board
Chile Ministry of Education
Chinese Information Office of the Ministry of National Defence
Chinese Ministry of National Defense
Chinese Online Blue Army
CIA (Central Intelligence Agency)
Cloud Security Alliance
CNAIPIC (National Anti-Crime Computer Centre for Critical Infrastructure Protection)
Cocain Team Hackers
COGEL (Council of Government Ethical Law)
Columbian Government
Comodo Hacker
Computer Chaos Club
Cslsec (Can't Stop Laughing Security)
Cyber Innovations Centre
Danish Government
Defense Advanced Research Projects Agency (DARPA)
Department of Public Enterprises South Africa
Division Hackers Crew
East West Institute
Egyptian Government
Egyptian Ministry of Communications and Information Technology
Egyptian Ministry of the Interior
ElectrOn[+]
Embassy of Pakistan in China
EU Institute for Energy and Transport
European Commission
European Council
European External Action Service
European Space Agency (ESA)
Evil18
FBI (Federal Bureau of Investigation)
Federal Bureau of Investigation Criminal, Cyber, Response and Services Branch
Federal Bureau of Investigation Criminal, Cyber, Response and Services Branch
Cyber Division
Florida Education Department
Florida Election Department
French Finance Ministry
French Navy
General Services Administration (GSA)
German Federal commissioner for Date Protection and Freedom of Information
(BFDI)
German Federal Criminal Post Office (BKA)
German Federal Ministry for Economics and Technology (BMWi)
German Federal Network Agency for Gas, Telecommunications, Post and Railway
(BNetzA)
German Federal Office for Information Security (BSI)
German Federal Office for Information Technology (BIT)
German Federal Police
German Law Authority and Customs Department
Government of China
Government of Venezuela
Government of Zimbabwe
Harvard University
Headpuster
HHS Security Incident Response Center (CSIRC)
HM Treasury
IMF (International Monetary Fund)
India Cyber Crime Investigation Cell
Indian Computer Emergency Response Team (CERT-In)
Indian Department of Information Technology
Indian Government
Indian Ministry of State for Communications and Information Technology
Indian National Informatics Centre (NIC)
Indian Office of the Prime Minister
Information Security Forum
Information Security Institute at Moscow State University
Israeli Air Force (IAF)
Iranian Cyber Army
Iranian Passive Defence Organisation
ISCN Hacking/Security Team
Israeli Defence Force (IDF)
Israeli Defence Ministry Administration for the Development of Weapons and
Technological Infrastructure
Israeli National Cyber Directorate (NCD)
Israeli Security Agency (Shin Bet)
Italian Cyber Police
Jefferson National Lab
Johns Hopkins University Advanced Physics Laboratory
Katastrophenschutz (German Federal Office of Civil Protection and Disaster
Assistance)
Kiplinger Washington Editors
LulzSec
LulzStorm
Malaysian Government
Massachusetts Executive Office of Labor and Workforce Development
Metropolitan Police
Mexican Government
Ministry of Culture and Tourism, Republic of Indonesia
Ministry of Information and Communications of the Russian Federation
Moscow State University
Mossad (Israeli Intelligence Service)
National Aeronautics and Space Administration (NASA)
National Computer Network Emergency Response Coordination Centre of China
(CERT-China)
National Cyber Response Co-ordination Group (NCRCG)
National Cyber Security Division (NCSD)
National Institute for Standards and Technology (NIST)
National Security Agency (NSA)
Nationaler Cyber-Sicherheitsrat (Cyber-Security Council)
Nationales Cyber-Abwehrzentrum (NCAZ) (National Cyber-Defence Centre)
NATO (North Atlantic Treaty Organisation)
NeatStuffs
New Zealand Department of Internal Affairs (DIA)
Nigerian Government
NN-Crew
Nomcat
NSEC (Netaji Subhah Engineering College)
Oak Ridge National Laboratory
OECD (Organisation for Economic Co-operation and Development)
Office of Cyber and Security Communication
Office of Cyber and Security Communication, Computer Emergency Readiness
Team (CERT)
Office of Cyber Security and Communications (CS&C)
Office of the Columbian President
Office of the President of Bolivia
Office of the Thailand Prime Minister
Optik Fiber
OSCE (Organization for Security and Co-operation in Europe)
Overseas Private Investment Corporation (OPIC)
Pacific Northwest National Lab
People's Liberation Army (PLA)
Peru Special Unit Police
Philippines Congress
prOtectOr AKA mrNRG
Royal Air Force (RAF)
Russian - Bulgarian Joint working Group on Information Society and Communication
Technologies
Russian Embassy in UK
Russian National Security Council
SAPPE (Independent Union of Prison Guards)
Sec Indi Security Team
ShadOw
Shadow008
Singhania University
SncOpe
SOCA (Serious Organised Crime Agency)
Space and Naval Warfare Center Systems Command (SPAWAR)
Spanish National Police
Stanford Hospital
State Government of Michigan
State Government of Utah
Stohanko
SwichSmoke
Syrian Electronic Army
Syrian Electronic Soldiers
Syrian Government
Syrian Ministry of Defence
Team Dexter
Team Inj3ctOr
TeaMpOisoN
Telecomix
Texas Police Association
Texas Police Chiefs Association
The National Communications System
The National Cyber Security Division
The Office of Emergency Communications
The Script Kiddies
TIGER-M@TE
TinKode
Tunisian Government
Turkguvenligi
Turkish Energy Team
Turkish Government
UK Cabinet Office
UK Communications Electronics Security Group (CESG)
UK Embassy of Russian Federation
UK Ministry of Justice (MO)J)
UK Ministry of Defence (MOD)
UK NHS (National Health Service)
UN (United Nations)
UN General Assembly
United Arab Emirates (UAE) Armed Forces Command and Control System (ECCS)
United Nations (UN)
University of Georgia
University of Maryland
University of Wisconsin-Milwaukee
US Air Force (USAF)
US Air Force 67th Network Warfare Wing
US Air Force 688th Information Operations Wing
US Air Force 689th Combat Communications Wing
US Air Force Air Mobility Command (AMC)
US Air Force Cyber Command (AFCYBER)
US Army
US Army 1st Information Operations Command
US Army CECOM (Communications-Electronics Command)
US Army Cyber Command (ARCYBER)
US Army Intelligence and Security Command (INSCOM)
US Army Network Enterprise
US Army Network Enterprise Technology Command (NETCOM)/9th Army Signal
Command (NETCOM/9th SC)
US Centre for Cyber Security Studies
US-China Economic and Security Review Commission
US Coast Guard
US Coast Guard Cyber Command
US Computer Emergency Readiness Team (US CERT)
US Cyber Command (USCYBERCOM)
US Cyber Security Evaluation Center
US Cyber Security Research and Development Center (CSRDC)
US Defence Industry Security Association (DISA)
US Defense Cyber Investigations Training Academy
US Defense Intelligence Agency (DIA)
US Department of Agriculture (USDA)
US Department of Agriculture (USDA) Office of the Chief Information Officer (OCIO),
Agriculture Security Operations Center (SOC).
US Department of Commerce
US Department of Defence Manpower Data Centre (DMDC)
US Department of Defense (DOD)
US Department of Defense Cyber Crime Center (DC3)
US Department of Energy
US Department of Health
US Department of Health and Human Services (HHS)
US Department of Homeland Security (DHS)
US Department of Homeland Security Science and Technology Directorate (DHS
S&T)
US Department of Justice (DOJ)
US Department of State
US Department of the Interior
US Department of the Treasury
US Department of Transportation
US DOD Intelligence Information System (DODIIS) Enterprise, Combatant
Commands and Service Intelligence Agencies
US DOJ Executive Office for United States Attorneys (EOUSA)
US Environmental Protection Agency (EPA)
US Executive Office for United States Attorneys (EOUSA)
US Fleet Cyber Command (FLYCYBERCOM)
US Government
US HHS Security Incident Response Center (CSRIC)
US Homeland Security Council
US Integrated Cyber Center
US Intelligence and National Security Alliance
US Joint Operation Center
US Marine Corps (USMC)
US Marine Corps Cryptologist Support Battalion (MCSB)
US Marine Corps Network Operations Security Center (MCNOSC)
US Marine Forces Cyber Command (MARFORCYBER)
US Marine Forces Cyber Command (MARFORCYBER) Command Element
US National Cyber Response Co-ordination Group (NCRCG)
US National Cyber Security and Communication Integration Center
US National Cyber Security Division (NCSD)
US National Protection and Programs Directorate (NPPD)
US Naval Academy Foundation.
US Naval Combined Task Force
US Naval Cyber Defense Operations Command (NCDOC)
US Naval Information Operations Command (NIOC)
US Naval Network Warfare Command (NNWC)
US Navy
US Navy (USN)
US Navy's Fleet Cyber Command/10th Fleet
US Office of Cyber security and Communications (CS&C)
US Office of Management and Budget
US Office of the Director of National Intelligence
US Office of the National Counter Intelligence Executive
US Pentagon
US Senate
US Space and Naval Warfare Systems Center Pacific (SSC Pacific)
US State Department
US Strategic Command (STRATCOM)
USAF 33rd Network Warfare Squadron (NWS)
uTorrent
vBTEAM Underground
Venezuela National Graduate Advisory Council
Venezuela National Statistics Institute
Verfassungsschutz (German Federal Office for the Protection of the Constitution)
WarOx
Westboro Baptist Church
Why So Serious
Wikileaks
X-Nerd

				
DOCUMENT INFO
Categories:
Tags:
Stats:
views:12
posted:6/5/2012
language:
pages:27