Market Research Reports and Industry Reports

Development Prospect Forecast Report of China Information Security Market 2015-2020

  • DESCRIPTION
  • TABLE OF
    CONTENTS
  • RELATED
    REPORTS
  • SAMPLE REQUEST
  • PURCHASE BY
    SECTION
In recent years, the global network threat continues to grow, and network attacks and network crimes are increasing and characterized by more professional tools, commercial purposes, organized behaviors, diverse means, etc. Due to the internet without borders, losses caused by network threats to global users spread rapidly. The continuous growth of network threats drives the rapid development of global information security market, i.e. the product structures are increasingly rich, and the manufacturer number, the market size and information security investment proportion constantly expand. In 2014, the size of the global information security market exceeded $100 billion.

Over the past10 years, hundreds of information security enterprises have developed in China. There were only several information security enterprises back then. With rapid development of information security technologies and products, the passive dependence of core security products on import have been changed fundamentally, and a certain scale of industry has been formed. In 2014, new products and service modes emerged in the information security field in China, the security market for personal information consumption became a new growth point, the industrial policy effects were more significant, and the market size reached RMB 22 billion.

In the information age, network security has become an important part of national security. Especially in 2013, the Prism event occurred, highlighting the importance of network information security. Additionally, with the advent of the age of big data, the public information transmission security has attracted the attention of IT giants, and the network security is expected to have great opportunities.

The information security ability is an important part of the comprehensive national strength, economic competition strength and survival ability in the 21st century. Information is the important strategic resource of social development. The information security industry of China has developed only a dozen years and is still not mature. However, it has huge potential. Next 10 years will be the rapid growth period of the information industry of China, and precious development opportunities will be provided for the information security industry.
Volume I Development Environment 1
Chapter I Overview of Information Security Industry Development of China 1
Section I Overview of information security industry 1
I. Content analysis of information security industry 1
(I) Entity security 1
(II) Operation security 1
(III) Data security 1
(IV) Content security 2
II. Main products and services of information security industry 2
(I) Classification of information security industry 2
(II) Information security products and services 3
Section II Analysis of characteristics of information security industry 5
I. Regional characteristics of information security industry 5
II. Cycle characteristics of information security industry 6
III. Seasonal characteristics of information security industry 6
Section III Analysis of information security industry chain 7
I. Introduction to information security industry chain 7
II. Analysis of upstream of information security industry 7
III. Analysis of downstream of information security industry 7
Chapter II Analysis of Market Environment of Information Security Industry in China 9
Section I Analysis of policy environment of information security industry 9
I. Regulatory system of information security industry 9
II. Related policies of information security industry 11
III. Analysis of relevant standards of information security industry 12
IV. Twelfth Five-year development plan of information industry 15
Section II Analysis of economic environment of information security industry 18
I. Analysis of china's GDP growth 18
II. Governmental financial information investment 19
III. Investment scale of information security industry 21
Section III Analysis of social environment of information security industry 21
I. Computer virus spreading analysis 21
II. Analysis of domestic network security vulnerabilities 23
III. Promotion of information security by internet development 23
(I) Analysis of information resource construction 23
(II) Analysis of netizen scale growth 24
IV. Analysis of information security thread sources 25
V. Stimulation of information security demands by national policies 27
Chapter III Investigation and Analysis of Chinese Network Information Security Situation 29
Section I Introduction to investigation activity 29
I. Sample distribution 29
II. Definitions of investigation terms 29
Section II Investigation of netizen information security situation 30
I. Analysis of netizen awareness of information security 30
(I) Overall information security awareness of netizens 30
(II) Information security awareness of various netizens 31
II. Analysis of netizen information security protection 33
(I) Quantity of information security protection measures 33
(II) Types of information security protection measures 34
(III) Causes of no security protection software 35
Section III Occurrence of network information security events 36
I. Occurrence of information security events 36
II. Analysis of types of information security events 37
(I) Virus or trojan 37
(II) Stealing of accounts or passwords 39
(III) Personal information leakage 41
(IV) Fake website 44
(V) Fraud information 45
(VI) Mobile malware 46
(VII) Spam messages to mobile phones 47
(VIII) Harassing calls to mobile phones 48
III. Losses caused by information security events 49
IV. Disposal of information security events 50
Section IV Use of network and security protection software 51
I. Network popularization research in China 51
II. Computer security protection software 52
(I) Quantities of users and software 52
(II) Matching mode of security protection software 53
III. Mobile phone security protection software 53
(I) Quantities of users and software 53
(II) Analysis of installation reasons 54
Section V Analysis of network security propagation 55
I. Analysis of network security propagation carriers 55
II. Analysis of account stealing industry chain 55
III. Attacks against enterprise websites 56
Section VI Investigation and analysis of mobile phone security 57
I. Mobile malware infection 57
II. Types of hazards of mobile malware 58
III. Ways of mobile malware spreading 59
Chapter IV Risk Assessment and Analysis of Chinese Information Security Industry 60
Section I Overview of risk assessment of information security industry 60
I. Overview of information security risk assessment 60
(I) Overview of information security risk assessment 60
(II) Principles of information security risk assessment 60
(III) Risk calculation model of information security 60
II. Method of information security risk assessment 61
III. Development direction of information security risk assessment 62
Section II Development analysis of risk assessment of information security industry 63
I. The United States: dominant, strengthening control and management 63
II. Europe: striving, focusing on prevention 65
III. Asia-Pacific region: following up promptly to ensure development 66
IV. International organizations: actively cooperating and focusing on specifications 66
Section III Analysis of information security risk assessment cases of different fields 68
I. Risk assessment of e-government information security 68
II. Information security risk assessment of power system 68
III. Information security risk assessment of iron and steel enterprises 69
Volume II Development 71
Chapter V Analysis of Development of Global Information Security Industry 71
Section I Analysis of global information security industry 71
I. Current situation of global information security industry 71
II. Development of global information security industry 72
III. Scale of analysis of global information security industry 73
IV. Development trend of global information security industry 73
Section II Analysis of development of information security industry in the United States 76
I. Analysis of information development in the United States 76
II. Development of information security industry in the United States 77
III. Development strategy of information security industry in the United States 77
Section III Development of European information security industry 78
I. Analysis of European information development 78
II. Development of European information security industry 79
III. Development strategy of European information security industry 80
Section IV Development of Japanese information security industry 81
I. Analysis of Japanese information development 81
II. Development of Japanese information security industry 82
III. Japanese information security industry development strategy 83
Chapter VI Analysis of the Development of Chinas Information Security Industry 84
Section I Overview of information security industry 84
I. Development stages of information security industry 84
(I) Communication security management stage 84
(II) Telecommunications information security stage 84
(III) Network and infrastructure information security management stage 85
II. Features of information security products 85
(I) Features of information security product structure 85
(II) Features of information security product demand 86
III. Development trend of information security industry 86
(I) The trend to systematic and active defense development 86
(II) The trend to networking and intelligent development 87
(III) The trend to service-oriented development 87
Section II Business model of information security manufacture 87
I. Security platform and free mode for individual users 88
II. Sales of information security products 88
III. Information security system integration 89
IV. Software support and service 89
V. Summary and comparison of business model 89
VI. SaaSnew trend to the construction of information security 91
Section III Status quo of information security industry market 93
I. Review of the development of information security industry 93
II. Analysis of the scale of information security industry 94
(I) Market scale of information security industry 94
(II) Market segmentation scale of information security 95
1. Market scale of information security hardware 95
2. Market scale of information security software 95
3. Market scale of information security service 96
III. Status quo and challenge of information security industry 96
Section IV SWOT analysis of the information security industry 98
I. Strengths of information security development 98
II. Weakness of information security development 99
III. Opportunities of information security development 99
IV. Threats of information security development 101
Chapter VII Analysis of the Development of Chinas Information Security Industry Technology 102
Section I Elements of information security technology 102
I. Basic content and location of physical security technology 102
(I) Location of physical security 102
(II) Basic elements of physical security 102
(III) Basic contents of physical security 103
II. Basic content and location of cryptography 104
(I) Location of cryptography 104
(II) Basic category of cryptography 105
(III) Application of cryptography 105
III. Basic content and location of identity recognition technology 107
(I)Location of identity authentication 107
(II) Realization of the identity authentication 107
IV. Basic content and location of access control technology 108
(I) Location of access control technology 108
(II) Basic content of access control 109
(III) Realization of access control 110
V. Basic content and location of malicious code protection technology 112
(I) Location of malicious code protection technology 112
(II) Category and operation principles of malicious code 113
(III) Prevention technology of malicious code 115
Section II Information security subsystem 116
I. Secure operating system 116
II. Secure database management system 118
III. Security network system 120
(I) Practical security protocol 120
(II) Firewall system 121
(III) VPN system 121
(IV) Security isolation system 123
IV. Information security detection system 126
(I) Intrusion detection system 126
(II) Information content detention system 128
Section III Information security technology system 130
I. Layering technology protection framework of information security 130
II. Distributed technology protection framework of information security 132
(I) Local computer environment security 132
(II) Boundary Security and Information Exchange 133
(III) Network transmission security 134
(IV) Supporting infrastructures 135
III. The grade of technology protection framework to information security 135
IV. Process technology protection framework to information security 136
(I) Security engineering to Information System 136
(II) Dynamic process protection to information security 137
Section IV Technical status quo of the information security industry 139
I. Technical level of the information security industry 139
(I) Domestic information security technology is backward 139
(II) High foreign dependence of information security 140
(III) Technology in information security segmentations 140
II. Technical characteristics of the information security industry 141
(I) Terminal security management market 141
(II) Security management platform market 142
III. Technical development direction of the information security industry 143
Chapter VIII Application Demand Analysis of Chinas Information Security Industry 146
Section I Regional market demand analysis of information security industry 146
I. Information security market scale in East China 146
II. Information security market scale in North China 146
III. Information security market scale in South China 147
IV. Information security market scale in Central China 147
V. Information security market scale in Southwest China 147
VI. Information security market scale in Northwest China 148
VII. Information security market scale in Northeast China 148
Section II Information security market needs analysis by cities 149
I. Information security market scale in tier-1 cities 149
II. Information security market scale in tier-2 cities 149
III. Information security market scale in tier-3 cities 149
IV. Information security market scale in tier-4 and below cities 150
Section III Vertical market needs analysis of the information security industry 150
I. Scale of information security needs in household field 150
II. Scale of information security needs in government field 151
III. Scale of information security needs in telecommunication field 151
IV. Scale of information security needs in finance field 151
V. Scale of information security needs in energy field 152
VI. Scale of information security needs in education field 152
Section IV Information security market scale analysis by channel structure 153
I. Market scale of information security in direct selling channel 153
II. Market scale of information security in indirect selling channel 153
Chapter IX Analysis of Competition Situation of Chinas Information Security Industry 154
Section I Analysis of competition structure of information security industry 154
I. Competition among existing enterprises in the industry 154
II. Analysis of threat of new entrants 155
III. Threat of substitute products or services 155
IV. Bargaining capacity of suppliers 155
V. Bargaining capacity of buyers 156
Section II Analysis of competition pattern of information security industry 156
I. Analysis of competition situation of information security industry 156
II. Competition of market segments in information security industry 158
(I) Terminal security management market competition 158
(II) Data security management market competition 158
(III) Security management platform market competition 159
III. Analysis of enterprise competition in information security industry 159
Section III Analysis of competition trends of information security industry 160
I. M&A triggers shuffling of information security industry 160
II. Analysis of M&A and restructuring of information security industry 161
(I) IT giants acquire information security enterprises. 161
(II) M&A and restructuring strategies of Symantec 163
(III) McAfee acquired Stonesoft Corporation at a high price. 163
Section IV Investment of translational information security enterprises in China 164
I. Investment layout of Symantec (America) in China 164
II. Investment distribution of McAfee (America) in China 165
III. Investment distribution of Kaspersky (Russia) in China 166
Volume III Market Segmentation 168
Chapter X Chinese Information Security Hardware Market Analysis 168
Section I Firewall / VPN market analysis 168
I. Market size analysis of firewall / VPN 168
II. Firewall/VPN brand structure analysis 168
Section II IDS / IPS market analysis 169
I. Market size analysis of IDS / IPS 169
II. IDS/ IPS brand structure analysis 169
Section III UTM market analysis 170
I. Market demand analysis of UTM products 170
II. Target market analysis of UTM products 170
Section IV Information encryption / identity authentication market analysis 171
I. The market size of information encryption / identity authentication 171
II. The brand structure of information encryption / identity authentication 171
Chapter XI Chinese Information Security Software Market Analysis 173
Section I WEB business security product market analysis 173
I. Overview of WEB security product development 173
(I) The development of anti-virus software 173
(II) The development of firewall 174
II. The brand competition of WEB security products 175
Section II The market analysis of security management platform 176
I. SOC product demand scale analysis 176
II. SOC product brand structure analysis 176
Section III The market analysis of terminal security management 177
I. The scale of demand for terminal security management products 177
II. The brand structure analysis of terminal security management 177
Section IV Security audit product development analysis 178
I. The scale of demand for security audit products 178
I. The target market of security audit products 178
Section V Operating system security reinforcement market analysis 179
I. Operating system security reinforcement market analysis 179
II. The brand structure analysis of operating system security reinforcement 179
Section VI The market analysis of server security products 180
I. The market analysis of server security demand 180
II. Target market analysis of server security 180
Section VII Content security management market 181
I. Content security management market size analysis 181
II. The brand structure analysis of content security management 181
Section VIII Additional information security software product analysis 181
I. Vulnerability scanning market analysis 181
II. The market analysis of identity management and access control 182
Chapter XII Analysis of Chinas Information Security Service Market 184
Section I Analysis of the information security service market 184
I. Overview of the information security service market 184
II. Status quo of the information security service market 184
III. Dynamics of information security service enterprises 185
Section II Development trend of information security services 186
I. Challenges faced by security service market 186
II. Development trends of the security service market 186
Section III Development prospects of information security service industry 187
Volume IV Enterprise Competition 189
Chapter XIII Foreign Information Security Enterprise Business Analysis 189
Section I Symantec 189
I. Company profile 189
II. Products and services 189
III. Business index of the enterprise 190
IV. Technical characteristics of Symantec 190
V. Analysis of business scale 191
Section II McAfee 191
I. Company profile 191
II. Products of the company 192
II. Product characteristics 192
III. Partners 192
IV. Technical conditions 193
Section III Trend Micro 193
I. Company profile 193
II. Main technologies 194
III. Business index of the enterprise 194
IV. Competitive advantages of enterprise 195
V. Development strategy in China 195
Section IV Checkpoint 196
I. Company profile 196
II. Products and services 196
III. Business index of the enterprise 197
IV. Competitive advantages of enterprise 197
V. Customer analysis 197
Section V Proofpoint 198
I. Company profile 198
II. Products and services 198
III. Business index of the enterprise 198
IV. Enterprise development trend 199
V. Enterprise development strategy 199
Section VI SafeNet 199
I. Company profile 199
II. Products and services 200
III. Competitive advantages of enterprise 200
IV. Status quo of enterprise development 201
Section VII Websense 201
I. Company profile 201
II. Products and services 202
III. Competitive advantages of enterprise 202
IV. Enterprise development trend 203
Section VIII Barracuda network company 203
I. Company profile 203
II. Products and services 204
III. Development of Barracuda in China 204
IV. Enterprise development strategy 204
Chapter XIV Analysis of Main Chinese Information Security Enterprises 206
Section I Beijing Venustech Information Technology Co., Ltd. 206
I. Analysis of company profile 206
II. Products and services 206
III. Analysis of enterprise operation 207
IV. Analysis of enterprise marketing network 208
Section II Chengdu Westone Information Industrial Co., Ltd. 209
I. Company profile 209
II. Products and services 209
III. Analysis of enterprise operation 211
IV. Analysis of enterprise marketing network 212
Section III Xiamen Meiya Pico Information Co.,Ltd 213
I. Analysis of company profile 213
II. Products and services 213
III. Analysis of enterprise operation 214
IV. Analysis of enterprise marketing network 216
V. Analysis of competitive advantages of companies 217
Section IV Fujian Rongji Software Co., Ltd. 218
I. Analysis of company profile 218
II. Products and services 218
III. Analysis of enterprise operation 219
IV. Analysis of enterprise marketing network 220
V. Analysis of competitive advantages of companies 221
Section V Bluedon Information Security Technology Co., Ltd. 222
I. Analysis of company profile 222
II. Products and services 222
III. Analysis of enterprise operation 224
IV. Analysis of enterprise marketing network 225
V. Analysis of competitive advantages of companies 226
Section VI Surfilter Network Technology Co., Ltd. 226
I. Analysis of company profile 226
II. Products and services 227
III. Analysis of enterprise operation 228
IV. Analysis of enterprise marketing network 229
V. Analysis of competitive advantages of companies 230
Section VII Neusoft Corporation 231
I. Company profile 231
II. Products and services 232
III. Analysis of enterprise operation 233
IV. Analysis of enterprise marketing network 234
V. Analysis of Company Development Strategy 234
Section VIII Nsfocus Information Technology Co., Ltd. 235
I. Analysis of company profile 235
II. Products and services 235
III. Analysis of enterprise operation 236
IV. Analysis of enterprise marketing network 237
V. Analysis of competitive advantages of companies 238
Section IX Beijing VRV Software Corporation Limited 238
I. Analysis of company profile 238
II. Products and services 238
III. Analysis of enterprise operation 240
IV. Analysis of enterprise marketing network 241
V. Analysis of Company Development Strategy 241
Section X Beijing TRS Information Technology Co., Ltd. 242
I. Analysis of company profile 242
II. Products and services 242
III. Analysis of enterprise operation 243
IV. Analysis of enterprise marketing network 244
V. Analysis of competitive advantages of companies 245
Section XI Sangfor Technologies Co., Ltd. 246
I. Analysis of company profile 246
II. Products and services 246
III. Corporate client service analysis 247
IV. Analysis of competitive advantages of enterprise 248
V. Recent news of corporate operation 248
Section XII FEITIAN Technologies Co., Ltd. 249
I. Analysis of company profile 249
II. Products and services 249
III. Analysis of marketing network of company 251
IV. Analysis of competitive advantages of enterprise 251
V. Analysis of recent news of enterprise 251
Section XIII Jiangsu Agile Technology Co., Ltd. 252
I. Analysis of company profile 252
II. Products and services 252
III. Case analysis of enterprises' achievements 252
IV. Analysis of enterprise marketing network 255
V. Analysis of competitive advantages of companies 256
VI. Analysis of company development strategy 257
Section XIV Softnext Technologies Corp. 257
I. Analysis of company profile 257
II. Products and services 258
III. Case analysis of enterprises' achievements 259
IV. Analysis of enterprise marketing network 262
V. Analysis of Company Development Strategy 263
Section XV Shanghai 30wish Information Security Co., Ltd. 263
I. Analysis of company profile 263
II. Products and services 263
III. Case analysis of enterprises' achievements 264
IV. Analysis of enterprise marketing network 265
V. Analysis of competitive advantages of companies 266
Section XVI Beijing NetentSec, Inc. 267
I. Analysis of company profile 267
II. Products and services 267
III. Case analysis of enterprises' achievements 269
IV. Analysis of enterprise marketing network 269
V. Analysis of competitive advantages of companies 270
Section XVII Legendsec Information Technology (Beijing) Inc. 270
I. Analysis of company profile 270
II. Products and services 271
III. Analysis of enterprise solutions 272
IV. Analysis of enterprise marketing network 274
V. Analysis of enterprise products quality 274
Section XVIII Jilin University Information Technologies Co., Ltd. 275
I. Analysis of company profile 275
II. Analysis of enterprise security products 275
III. Analysis of enterprise solutions 276
IV. Analysis of corporate partners 276
Volume V Investment Outlook 278
Chapter XV Outlook on China's Information Security Industry and Forecast of the Market Scale for 2015-2020 278
Section I Analysis of development trend of information security industry 278
I. Initiative information security products are preferable 278
II. Data security management becomes important 278
III. Development trend of security management platform products 278
IV. Overall security establishment gains increasing attention 279
Section II Forecast of information security industry development 279
I. Analysis of driving factors of the information security industry 279
II. Forecast of the markets sizes of information security 282
Section III Forecast of the markets sizes of the information security industry 283
I. Forecast of the market segments sizes of information security 283
(I) Forecast of the market size of hardware products 283
(II) Forecast of the market size of information security software 283
(III) Forecast of the market size of information security services 284
II. Forecast of regional markets sizes of information security 284
(I) Forecast of the market size of Eastern China 284
(II) Forecast of the market size of North China 285
(III) Forecast of the market size of South China 285
(IV) Forecast of the market size of Central China 286
(V) Forecast of the market size of Southwest China 286
(VI) Forecast of the market size of Northwest China 287
(VII) Forecast of the market size of Northeast China 287
III Forecast of the markets sizes of information security of cities at all levels 288
(I) Forecast of the market size of first-tier cities 288
(II) Forecast of the market size of second-tier cities 289
(III) Forecast of the market size of third-tier cities 289
(IV) Forecast of the market size of fourth-tier cities and below 290
IV. Forecast of vertical markets sizes of information security 290
(I) Forecast of the demand size for family 290
(II) Forecast of the demand size for education 291
(III) Forecast of the demand size for government 291
(IV) Forecast of the demand size for telecommunications industry 292
(V) Forecast of the demand size for energy industry 292
(VI) Forecast of the demand size for financial industry 293
V. Forecast of channel markets sizes of information security 293
(I) Forecast of the market size of the direct sales channel 293
(II) Forecast of the market size of the indirect sales channel 294
Chapter XVI 2015-2020 Investment Opportunities and Risks of China Information Security Industry 295
Section I Analysis of investment features of information security industry 295
I. Analysis of barriers to enter information security industry 295
(I) Technological barriers 295
(II) Talents barriers 295
(III) Brand barriers 296
(IV) Qualification barriers 296
II. Analysis of business model of information security industry 296
III. Analysis of profit factor of information security industry 297
Section II Analysis of investment opportunity of information security industry 298
I. Investment opportunity in information security market segment 298
II. Investment-driven factors of information security 299
(I) Cost-driven factor 299
(II) Technology trend 300
(III) Policy-driven factor 301
III. Increased security budget 301
IV. Merging and reorganization market opportunity in information security industry 301
Section III Analysis of investment risk of information security industry 302
I. Macroeconomic risks 302
II. Industry policy risks 302
III. Industry technology risks 304
III. Industry market risks 305
V. Industrial related risks 305

List Of Figures

Chart 1 Product and service classification of information security industry 2
Chart 2Schematic diagram of information security industry chain 7
Chart 3 Related management authorities and responsibilities of information security industry 9
Chart 4 Main policies and regulations of information security industry 11
Chart 5 List of standards of information security industry 12
Chart 6 China's GDP and growth rate variation during 2010-2014 19
Chart 7 GDP pattern and corresponding growth rate during 2013-2014 19
Chart 8 Total financial information investment of China during 2012-2014 20
Chart 9 Chinese financial information investment in software and hardware during 2010-2014 20
Chart 10 Classification of vulnerability types 23
Chart 11 Change trends of Chinese netizen scale and internet penetration rate during 2005-2014 25
Chart 12 General information security awareness investigation among Chinese netizens 31
Chart 13 Investigation of information security awareness of Chinese netizens at different ages 32
Chart 14 Investigation of information security awareness of Chinese netizens with different education backgrounds 33
Chart 15 Quantity of information security protection measures in China 34
Chart 16 Measures of Chinese netizens for information security protection 35
Chart 17 Causes of failure of Chinese netizens to install security protection software 35
Chart 18 Information security events encountered by Chinese ordinary netizens 37
Chart 19 Virus or Trojan situation encountered by Chinese netizens 38
Chart 20 Disposal of virus or Trojan events by Chinese netizens 39
Chart 21 Types of stolen accounts of Chinese netizens 40
Chart 22 Disposal methods of Chinese netizens for account stealing 41
Chart 23 Types of leaked information of Chinese netizens 42
Chart 24 Disposal methods of Chinese netizens for information leakage events 42
Chart 25 Release of current location information by Chinese netizens with mobile phones 43
Chart 26 Proportions of Chinese netizens of different kinds and with mobile phones engaged in release of current location information 44
Chart 27 Type of fake websites encountered by Chinese netizens 45
Chart 28 Tricking of Chinese netizens by fake websites 45
Chart 29 Type of fraud information encountered by Chinese netizens 46
Chart 30 Tricking of Chinese netizens by fraud information 46
Chart 31 Types of hazards of mobile malware in China 47
Chart 32 Frequency of receiving spam messages by Chinese mobile phone users 48
Chart 33 Contents of spam messages sent to mobile phones in China 48
Chart 34 Frequency of receiving harassing calls by mobile phone users in China 49
Chart 35 Losses caused by information security events 50
Chart 36 Disposal of information security events 51
Chart 37 Internet penetration among Chinese urban and rural residents during 2007-2014 52
Chart 38 Quantities of security protection software in computers in China 52
Chart 39 Proportion of security protection software of mobile phones 54
Chart 40 Reasons of installation of security protection software in mobile phones 54
Chart 41 Proportion of virus propagation carriers in China 55
Chart 42 Mode of account stealing industry chain 56
Chart 43 Proportion of attacks to various enterprise websites in China 57
Chart 44 Comparison of new malware infections of Android platform 57
Chart 45 Monthly malware infections of Android platform 58
Chart 46 Distribution of malware infections of Android platform 59
Chart 47 Spreading ways of mobile malware 59
Chart 48 Risk calculation model 61
Chart 49 Flow chart of security risk assessment 69
Chart 50 Analysis of development of international information security industry 72
Chart 51 Trend of scale changes of global information security product market during 2009-2014 73
Chart 52 Business model of domestic information security enterprises 88
Chart 53 The proportion of major domestic information security product sales, system integration and services income 90
Chart 54 Comparison of operating income, net profit and gross margin of major domestic information security manufacturers 91
Chart 55 SaaS business mode 91
Chart 56 Active layout of SaaS by international information security giants 93
Chart 57 Changes in market scale of Chinas information security industry during 2009- 2014 95
Chart 58 Changes in market scale of Chinas information security hardware products during 2009 - 2014 95
Chart 59 Changes in market scale of Chinas information security software products during 2009 - 2014 96
Chart 60 Changes in market scale of Chinas information security service during 2009 - 2014 96
Chart 61 Introduction to basic elements of computer physical security 102
Chart 62 Introduction to computer physical security 103
Chart 63 Schematic diagram of cryptosystem 105
Chart 64 Category of cryptography 105
Chart 65 General model of access control 109
Chart 66 Features of malicious computer code 112
Chart 67 Basic structure module of malicious code 113
Chart 68 Operation mechanism of malicious code 114
Chart 69 Relationship among main security technologies in the operating system 117
Chart 70 Classification table of practical security protocols 120
Chart 71 Working principles of the physical isolation network card 124
Chart 72 Working principles of the physical isolation hub 125
Chart 73 Working principles of the security isolation network gateway 126
Chart 74 Intrusion detection classification and principle overview 127
Chart 75 Logic schematic of local computer environment. 133
Chart 76 Security isolation and information exchange 134
Chart 77 PDR model 138
Chart 78 Information security market scale in East China during 2011- 2014 146
Chart 79 Information security market scale in North China during 2011- 2014 146
Chart 80 Information security market scale in South China during 2011 - 2014 147
Chart 81 Information security market scale in Central China during 2011 - 2014 147
Chart 82 Information security market scale in Southwest China during 2011- 2014 147
Chart 83 Information security market scale in Northwest China during 2011 - 2014 148
Chart 84 Information security market scale in Northeast China during 2011 - 2014 148
Chart 85 Information security market scale in tier-1 cities during 2011 - 2014 149
Chart 86 Information security market scale in tier-2 cities during 2011 - 2014 149
Chart 87 Information security market scale in tier-3 cities during 2011 - 2014 149
Chart 88 Information security market scale in tier-4 and below cities during 2011 - 2014 150
Chart 89 Market scale of information security in household field during 2011 - 2014 150
Chart 90 Market scale of information security in government field during 2011 - 2014 151
Chart 91 Market scale of information security in telecommunication field during 2011 - 2014 151
Chart 92 Market scale of information security in finance field during 2011 - 2014 151
Chart 93 Market scale of information security in energy field during 2011 - 2014 152
Chart 94 Market scale of information security in education field during 2011 - 2014 152
Chart 95 Market scale of information security industry in direct channel during 2011 - 2014 153
Chart 96 Market scale of information security industry in indirect channel during 2011 - 2014 153
Chart 97 Diagram of competitiveness of Chinas information security industry 154
Chart 98 Main enterprises in each product market segment of domestic information security industry 159
Chart 99 IT giants acquiring information security enterprises 162
Chart 100 Relatively good relative gains from investment in information security companies 162
Chart 101 The change trend of China's market size of firewall / VPN products during 2009 - 2014 168
Chart 102 The brand structure of firewall / VPN products on the Chinese market 169
Chart 103 The change trend of China's market size of IDS / IPS products during 2009 - 2014 169
Chart 104 The brand structure of IDS / IPS on the Chinese market 170
Chart 105 The change trend of China's market size of UTM products during 2009 - 2014 170
Chart 106 The change trend of China's market size of information encryption / identity authentication products during 2009 - 2014 171
Chart 107 Market brand structure of information encryption / identity authentication in China 172
Chart 108 The change trend of China's market size of SOC products during 2009 - 2014 176
Chart 109 The brand structure of SOC on the Chinese market 176
Chart 110 China's market size of terminal security management during 2009-2014 177
Chart 111 The brand structure of the Chinese terminal security management market 177
Chart 112 The change trend of China's market size of security audit products during 2009 - 2014 178
Chart 113 The change trend of China's market size of operating system security reinforcement products during 2009 - 2014 179
Chart 114 The brand structure of the Chinese operating system security reinforcement market 180
Chart 115 The change trend of China's market size of server security products during 2009 - 2014 180
Chart 116 The change trend of China's market size of content security management during 2009 - 2014 181
Chart 117 Competition pattern of the domestic vulnerability scanning 182
Chart 118 Competition pattern of the domestic content management and access control market 183
Chart 119 Main products of Symantec 189
Chart 120 Main business indexes of Symantec from 2011 to 2015 190
Chart 121 Technical characteristics of Symantec 190
Chart 122 List of main clients of McAfee 192
Chart 123 Technical functions of McAfee 193
Chart 124 Features of the active cloud virus interception technology of Trend Micro 194
Chart 125 Main business situation of Trend Micro during 2011 - 2014 194
Chart 126 Competitive advantage analysis of Trend Micro 195
Chart 127Main business situation of Check Point from 2011 to 2015 197
Chart 128 Competitive advantage analysis of Check Point 197
Chart 129 Main business situation of Proof point from 2011 to 2015 198
Chart 130 List of products and services of SafeNet 200
Chart 131 Competitive advantage analysis of SafeNet 201
Chart 132 Profile of main Websense products 202
Chart 133 Competitive advantage analysis of Websense 202
Chart 134 Main products of Barracuda Networks Inc. 204
Chart 135 Security products and services of Venustech 206
Chart 136 2014 Venustech product situation 207
Chart 1372014 Venustech business structure 208
Chart 138 Venustech income and profit statistics from 2012 to 2015 208
Chart 139 2014 Venustech regional distribution situation 209
Chart 140 Security products of Chengdu Westone 210
Chart 141 2014 product situation of Chengdu Westone 211
Chart 142 2014 business structure of Chengdu Westone 212
Chart 143 Chengdu Westone income and profit statistics from 2012 to 2015 212
Chart 144 2014 regional distribution situation of Chengdu Westone 213
Chart 145 Main products of Xiamen Meiya Pico 214
Chart 146 2014 Xiamen Meiya Pico product distribution by industries 214
Chart 147 2014 business structure of Xiamen Meiya Pico 216
Chart 148 income and profit statistics of Xiamen Meiya Pico from 2012 to 2015 216
Chart 149 2014 regional distribution situation of Xiamen Meiya Pico 217
Chart 150 Competitive advantage analysis of Xiamen Meiya Pico 217
Chart 151 Information security products of Fujian Rongji 218
Chart 152 2014 Fujian Rongji product situation 219
Chart 153 2014 Business structure of Fujian Rongji 220
Chart 154 Fujian Rongji income and profit statistics from 2012 to 2015 220
Chart 155 2014 Fujian Rongji business situation by areas 220
Chart 156 Competitive advantage analysis of Fujian Rongji 221
Chart 157 Security products of Bluedon 222
Chart 158 Bluedon product situation in 2014 by industries 224
Chart 159 2014 business structure of Bluedon Information Security Co., Ltd. 224
Chart 160 Income and profit statistics of Bluedon Information Security Co., Ltd. from 2012 to 2015 225
Chart 161 Situation of Bluedon in 2014 by areas 225
Chart 162 Competition advantage analysis of Bluedon 226
Chart 163 Security products of Surfilter Network Technology Co., Ltd. 227
Chart 164 Operation of security products of Surfilter Network Technology Co., Ltd. classified by industries and products in 2014 228
Chart 165 Business structure of Security products of Surfilter Network Technology Co., Ltd. in 2014 229
Chart 166 Revenue and profit of Surfilter Network Technology Co., Ltd. from 2012 to 2015 229
Chart 167 Operation of security products of Surfilter Network Technology Co., Ltd. classified by regions in 2014 230
Chart 168 Analysis of competitive advantages of Surfilter Network Technology Co., Ltd. 230
Chart 169 Main products of Neusoft Corporation in network security 232
Chart 170 Operation of Neusoft Corporation classified in industries in 2014 233
Chart 171 Business structure of Neusoft Corporation in 2014 233
Chart 172 Revenue and profits statistics of Neusoft Corporation from 2012 to 2015 234
Table 173 Operation of Neusoft Corporation classified in regions in 2014 234
Chart 174 Main products and services of Nsfocus Information Technology Co., Ltd. 236
Chart 175 Operation of Nsfocus Information Technology Co., Ltd. classified by products in 2014 236
Chart 176 Business structure of Nsfocus Information Technology Co., Ltd. in 2014 236
Chart 177 Revenue and profit statistics of Nsfocus Information Technology Co., Ltd. from 2012 to 2015 237
Chart 178 Operation of Nsfocus Information Technology Co., Ltd. classified by regions in 2014 237
Chart 179 Security products of Beijing VRV Software Corporation Limited 239
Chart 180 Operation of Beijing VRV Software Corporation Limited classified by products in 2014 240
Chart 181 Business structure of Beijing VRV Software Corporation Limited in 2014 240
Chart 182 Revenue and profit statistics of Beijing VRV Software Corporation Limited from 2012 to 2015 241
Chart 183 Operation of Beijing VRV Software Corporation Limited classified by regions in 2014 241
Chart 184 Major products of TRS 242
Chart 185 List of sector and product of TRS in 2014 243
Chart 186 Business structure of TRS in 2014 243
Chart 187 Revenue and profit of TRS from 2012 to 2015 244
Chart 188 Regional sales of TRS in 2014 244
Chart 189 Sales network of TRS 245
Chart 190 Major security products of Sangfor Technologies Co., Ltd. 246
Chart 191 Analysis of competitive strength of Sangfor Technologies Co., Ltd. 248
Chart 192 Network security products and solutions of FEITIAN 249
Chart 193 Partial products of FEITIAN 250
Chart 194 Solutions of FEITIAN 250
Chart 195 Analysis of competitive strength of FEITIAN 251
Chart 196 Main products of Agile Technology Co., Ltd. 252
Chart 197 Successful cases of Agile Technology Co., Ltd. 252
Chart 198 Successful cases of all industries of Agile Technology Co., Ltd. 253
Chart 199 Chart of domestic service network of Agile Technology Co., Ltd. 256
Chart 200 Analysis of competitive strength of Agile Technology Co., Ltd. 256
Chart 201 Introduction of main products of Softnext Technologies Corporation 258
Chart 202 Successful cases of all industries of Agile Technology Co., Ltd. 260
Chart 203 Introduction of main products of Softnext Technologies Corp. 264
Chart 204 Successful cases of Beijing NetentSec, Inc. 269
Chart 205 Products list of Jilin University Information Technologies Co., Ltd. 275
Chart 206 Solutions of Jilin University Information Technologies Co., Ltd. 276
Chart 207 List of main cooperation partners of Jilin University Information Technologies Co., Ltd. 276
Chart 208 Direction for future development of China's information security 280
Chart 209 Forecast of the market size of information security from 2015 to 2020 282
Chart 210 Tendency chart of the forecast of the hardware market size of China's information security industry from 2015 to 2020 283
Chart 211 Tendency chart of the forecast of the software market size of China's information security industry from 2015 to 2020 284
Chart 212 Tendency chart of the forecast of the services market size of China's information security industry from 2015 to 2020 284
Chart 213 Tendency chart of the forecast of the market size of information security of Eastern China from 2015 to 2020 285
Chart 214 Tendency chart of the forecast of the market size of information security of North China from 2015 to 2020 285
Chart 215 Tendency chart of the forecast of the market size of information security of South China from 2015 to 2020 286
Chart 216 Tendency chart of the forecast of the market size of information security of Central China from 2015 to 2020 286
Chart 217 Tendency chart of the forecast of the market size of information security of Southwest China from 2015 to 2020 287
Chart 218 Tendency chart of the forecast of the market size of information security of Northwest China from 2015 to 2020 287
Chart 219 Tendency chart of the forecast of the market size of information security of Northeast China from 2015 to 2020 288
Chart 220 Tendency chart of the forecast of the market size of information security of China's first-tier cities from 2015 to 2020 288
Chart 221 Tendency chart of the forecast of the market size of information security of China's second-tier cities from 2015 to 2020 289
Chart 222 Tendency chart of the forecast of the market size of information security of China's third-tier cities for from 2015 to 2020 289
Chart 223 Tendency chart of the forecast of the market size of information security of China's fourth-tier cities and below from 2015 to 2020 290
Chart 224 Tendency chart of the forecast of the market size of information security for family from 2015 to 2020 291
Chart 225 Tendency chart of the forecast of the market size of information security for education from 2015 to 2020 291
Chart 226 Tendency chart of the forecast of the market size of information security for government from 2015 to 2020 292
Chart 227 Tendency chart of the forecast of the market size of information security for telecommunications industry from 2015 to 2020 292
Chart 228 Tendency chart of the forecast of the market size of information security for energy industry from 2015 to 2020 293
Chart 229 Tendency chart of the forecast of the market size of information security for financial industry from 2015 to 2020 293
Chart 230 Tendency chart of the forecast of the market size of the direct sales channel of information security from 2015 to 2020 294
Chart 231 Tendency chart of the forecast of the market size of the indirect sales channel of information security from 2015 to 2020 294
Chart 232 APT attack in comparison with common virus 299

Heliopolis Co for Housing & Development Company Profile- Outlook, Business Segments, Competitors, Goods and Services, SWOT and Financial Analysis

Heliopolis Co for Housing & Development Company Profile is a complete analysis of the companys operations, strategies, outlook and historic performance. The research work analyzes key strategies in current

USD 200View Report

Hadasit Medical Research Services & Development Ltd Company Profile- Outlook, Business Segments, Competitors, Goods and Services, SWOT and Financial Analysis

Hadasit Medical Research Services & Development Ltd Company Profile is a complete analysis of the companys operations, strategies, outlook and historic performance. The research work analyzes key strategies in current

USD 200View Report

Guodian Development Company Company Profile- Outlook, Business Segments, Competitors, Goods and Services, SWOT and Financial Analysis

Guodian Development Company Company Profile is a complete analysis of the companys operations, strategies, outlook and historic performance. The research work analyzes key strategies in current market conditions, SWOT profile,

USD 200View Report

Market Analysis and Development Prospect of Imported Wine Industry in China 2015-2020

1. INTRODUCTION With the continuous improvement of peoples living standard, Wine’s health and health care function also gradually known by people. In 2008-2014, the imported volume of wine was

USD 3500View Report

Market Analysis and Development Prospect of Industrial Automation Industry in China 2015-2020 Proposal

1. INTRODUCTIONIn 2014, the output of automatic adjusting instrument and control system was 49,514,900 units, which grew by 11.91% compared with the year before. The sales income of industrial automation

USD 3500View Report

Market Analysis and Development Prospect of Global and Chinese WEEE Recycling Industry 2015-2020 Proposal

1. INTRODUCTIONWaste from Electrical and Electronic Equipment, hereinafter referred to as WEEE, refers to discarded electric and electronic products and unqualified products, components, oddments, etc. during production. In 2014,

USD 3500View Report

Fill The Form For Sample Request
Name*
Email*
Mobile No.*
LandLine No.
If you want to purchase particular section from this report then kindly contact us at contact@aarkstore.com.

Delivery Details

PDF FORMAT REPORTS will be delivered by email within 12 to 24 hours after placing the order (Mon-Fri IST)

CHOOSE FORMAT

  • PDF    $ 3500
  • Hard copy    $ 3700
$ 3500

Reports Details

Published Date : May 2015
No. of Pages :305
Country :China
Category :Defense
Publisher :AskCI Consulting Co., Ltd
Report Delivery By :Email
Report Delivery Time :12 to 24 hours after placing the order.

Customized Research

If you do not find this specific report suitable to your exact needs then you can also opt for customized research report that will befit all your expectation. To specify your requirements CLICK HERE

 

We Accept

payment