Opportunities in Taiwan Info Security Market by RNCOS

VIEWS: 427 PAGES: 33

More Info
									t
                                                          t




                    Published by




                   RNCOS




 © Opportunities in Taiwan Info Security Market
                       Edition 1.0
   All rights reserved. This publication is protected
by copyright. No part of it may be reproduced, stored
in a retrieval system or transmitted, in any form or by
  any means, electronic mechanical, photocopying,
    recording or otherwise without the prior written
              permission of the publishers.
                                                                                 t



"#          $   %%




!                           "                                             #
                                                     !$ %            &'
()**+()*,                           - ./ 01) 2              ()*, 3




                                                 +
                +                     4                     +
                                5




                                                                                 +
                        +


6                               6                                         !$ %
       7'           +


!                                                                                8




4               5




                                     !
    t




&
                                                                                                                                                          t


                                                               Table of Contents

1.  Analyst View.........................................................................................................................................8
2.  Emerging Market Trends ....................................................................................................................9
  2.1   Growing Importance and Awareness of E-Commerce ..................................................................9
  2.2   Heightened Use of ICT ................................................................................................................10
  2.3   'E-Taiwan' Project ........................................................................................................................11
  2.4   Government Strategies................................................................................................................12
3. Information Security Market by 2013...............................................................................................13
  3.1   Market Overview..........................................................................................................................13
4. Analysis by Segment ........................................................................................................................16
  4.1   Anti-virus......................................................................................................................................16
  4.2   E-mail Security.............................................................................................................................19
  4.3   Firewall ........................................................................................................................................21
5. Export/Domestic Sales Related Issues ...........................................................................................22
6. Development Strategy and Future Action Plan ..............................................................................24
7. Key Player Analysis ..........................................................................................................................27
  7.1   Trend Micro..................................................................................................................................27
  7.2   Symantec.....................................................................................................................................29
  7.3   Kaspersky Lab .............................................................................................................................31




                                                                             '
                                                                                                                                      t


List of Figures:

Figure 3-1: Information Security Market (Million US$), 2009-2013 .............................................................14
Figure 4-1: Anti-virus Market (Billion NTD), 2009-2013 ..............................................................................17
Figure 4-2: Share of Anti-virus Market by Usage (2009).............................................................................17
Figure 4-3: E-mail Security Market (Million US$), 2009-2013.....................................................................20
Figure 4-4: Firewall/ UTM Market (Million US$), 2009-2013 .......................................................................21




                                                                   (
                                                                                                                                      t


List of Tables:

Table 6-1: Expected Investment Funds in Strategy Plan 1 (NTD), 2010-2013...........................................25
Table 6-2: Expected Investment Funds in Strategy Plan 2 (NTD), 2010-2013...........................................25
Table 6-3: Expected Investment Funds in Strategy Plan 3 (NTD), 2010-2013...........................................26
Table 7-1: Trend Micro - Strength and Weakness ......................................................................................28
Table 7-2: Symantec Corporation - Strength and Weakness......................................................................30
Table 7-3: Kaspersky Lab - Strength and Weakness..................................................................................31




                                                                   )
                                                                                           t



    + ,                 -




                                            9




!




           +            +


    !$ %           &'           ()**+()*,           - ./ 01) 2           ()*,


!                                                   :            9   :            !


               !




                                                                                       +
                           
								
To top