Need Some Help?
We can help you find the information that meets your research needs.
Please call us at
+886 2 27993110
+65 90752357
+60 12 7220722
or send an email to us at mi@hintoninfo.com
IHS_EWBIEEE xploreIHS_EWB_GF

Development Prospect Forecast Report of China Information Security Market 2015-2020

  • LinkedIn
  • facebook
  • Twitter
Publisher: AskCI
Published: 2015/05/20
Page: 305
Format: PDF
Price:
USD 3,500 (Single-User License)
USD 3,700 (Hard copy)
線上訂購或諮詢
In recent years, the global network threat continues to grow, and network attacks and network crimes are increasing and characterized by more professional tools, commercial purposes, organized behaviors, diverse means, etc. Due to the internet without borders, losses caused by network threats to global users spread rapidly. The continuous growth of network threats drives the rapid development of global information security market, i.e. the product structures are increasingly rich, and the manufacturer number, the market size and information security investment proportion constantly expand. In 2014, the size of the global information security market exceeded $100 billion.

Over the past10 years, hundreds of information security enterprises have developed in China. There were only several information security enterprises back then. With rapid development of information security technologies and products, the passive dependence of core security products on import have been changed fundamentally, and a certain scale of industry has been formed. In 2014, new products and service modes emerged in the information security field in China, the security market for personal information consumption became a new growth point, the industrial policy effects were more significant, and the market size reached RMB 22 billion.

In the information age, network security has become an important part of national security. Especially in 2013, the “Prism” event occurred, highlighting the importance of network information security. Additionally, with the advent of the age of big data, the public information transmission security has attracted the attention of IT giants, and the network security is expected to have great opportunities.

The information security ability is an important part of the comprehensive national strength, economic competition strength and survival ability in the 21st century. Information is the important strategic resource of social development. The information security industry of China has developed only a dozen years and is still not mature. However, it has huge potential. Next 10 years will be the rapid growth period of the information industry of China, and precious development opportunities will be provided for the information security industry.
Volume I Development Environment 1
Chapter I Overview of Information Security Industry Development of China 1
Section I Overview of information security industry 1
I. Content analysis of information security industry 1
(I) Entity security 1
(II) Operation security 1
(III) Data security 1
(IV) Content security 2
II. Main products and services of information security industry 2
(I) Classification of information security industry 2
(II) Information security products and services 3
Section II Analysis of characteristics of information security industry 5
I. Regional characteristics of information security industry 5
II. Cycle characteristics of information security industry 6
III. Seasonal characteristics of information security industry 6
Section III Analysis of information security industry chain 7
I. Introduction to information security industry chain 7
II. Analysis of upstream of information security industry 7
III. Analysis of downstream of information security industry 7
Chapter II Analysis of Market Environment of Information Security Industry in China 9
Section I Analysis of policy environment of information security industry 9
I. Regulatory system of information security industry 9
II. Related policies of information security industry 11
III. Analysis of relevant standards of information security industry 12
IV. “Twelfth Five-year” development plan of information industry 15
Section II Analysis of economic environment of information security industry 18
I. Analysis of china's GDP growth 18
II. Governmental financial information investment 19
III. Investment scale of information security industry 21
Section III Analysis of social environment of information security industry 21
I. Computer virus spreading analysis 21
II. Analysis of domestic network security vulnerabilities 23
III. Promotion of information security by internet development 23
(I) Analysis of information resource construction 23
(II) Analysis of netizen scale growth 24
IV. Analysis of information security thread sources 25
V. Stimulation of information security demands by national policies 27
Chapter III Investigation and Analysis of Chinese Network Information Security Situation 29
Section I Introduction to investigation activity 29
I. Sample distribution 29
II. Definitions of investigation terms 29
Section II Investigation of netizen information security situation 30
I. Analysis of netizen awareness of information security 30
(I) Overall information security awareness of netizens 30
(II) Information security awareness of various netizens 31
II. Analysis of netizen information security protection 33
(I) Quantity of information security protection measures 33
(II) Types of information security protection measures 34
(III) Causes of no security protection software 35
Section III Occurrence of network information security events 36
I. Occurrence of information security events 36
II. Analysis of types of information security events 37
(I) Virus or trojan 37
(II) Stealing of accounts or passwords 39
(III) Personal information leakage 41
(IV) Fake website 44
(V) Fraud information 45
(VI) Mobile malware 46
(VII) Spam messages to mobile phones 47
(VIII) Harassing calls to mobile phones 48
III. Losses caused by information security events 49
IV. Disposal of information security events 50
Section IV Use of network and security protection software 51
I. Network popularization research in China 51
II. Computer security protection software 52
(I) Quantities of users and software 52
(II) Matching mode of security protection software 53
III. Mobile phone security protection software 53
(I) Quantities of users and software 53
(II) Analysis of installation reasons 54
Section V Analysis of network security propagation 55
I. Analysis of network security propagation carriers 55
II. Analysis of account stealing industry chain 55
III. Attacks against enterprise websites 56
Section VI Investigation and analysis of mobile phone security 57
I. Mobile malware infection 57
II. Types of hazards of mobile malware 58
III. Ways of mobile malware spreading 59
Chapter IV Risk Assessment and Analysis of Chinese Information Security Industry 60
Section I Overview of risk assessment of information security industry 60
I. Overview of information security risk assessment 60
(I) Overview of information security risk assessment 60
(II) Principles of information security risk assessment 60
(III) Risk calculation model of information security 60
II. Method of information security risk assessment 61
III. Development direction of information security risk assessment 62
Section II Development analysis of risk assessment of information security industry 63
I. The United States: dominant, strengthening control and management 63
II. Europe: striving, focusing on prevention 65
III. Asia-Pacific region: following up promptly to ensure development 66
IV. International organizations: actively cooperating and focusing on specifications 66
Section III Analysis of information security risk assessment cases of different fields 68
I. Risk assessment of e-government information security 68
II. Information security risk assessment of power system 68
III. Information security risk assessment of iron and steel enterprises 69
Volume II Development 71
Chapter V Analysis of Development of Global Information Security Industry 71
Section I Analysis of global information security industry 71
I. Current situation of global information security industry 71
II. Development of global information security industry 72
III. Scale of analysis of global information security industry 73
IV. Development trend of global information security industry 73
Section II Analysis of development of information security industry in the United States 76
I. Analysis of information development in the United States 76
II. Development of information security industry in the United States 77
III. Development strategy of information security industry in the United States 77
Section III Development of European information security industry 78
I. Analysis of European information development 78
II. Development of European information security industry 79
III. Development strategy of European information security industry 80
Section IV Development of Japanese information security industry 81
I. Analysis of Japanese information development 81
II. Development of Japanese information security industry 82
III. Japanese information security industry development strategy 83
Chapter VI Analysis of the Development of China’s Information Security Industry 84
Section I Overview of information security industry 84
I. Development stages of information security industry 84
(I) Communication security management stage 84
(II) Telecommunications information security stage 84
(III) Network and infrastructure information security management stage 85
II. Features of information security products 85
(I) Features of information security product structure 85
(II) Features of information security product demand 86
III. Development trend of information security industry 86
(I) The trend to systematic and active defense development 86
(II) The trend to networking and intelligent development 87
(III) The trend to service-oriented development 87
Section II Business model of information security manufacture 87
I. Security platform and free mode for individual users 88
II. Sales of information security products 88
III. Information security system integration 89
IV. Software support and service 89
V. Summary and comparison of business model 89
VI. SaaS—new trend to the construction of information security 91
Section III Status quo of information security industry market 93
I. Review of the development of information security industry 93
II. Analysis of the scale of information security industry 94
(I) Market scale of information security industry 94
(II) Market segmentation scale of information security 95
1. Market scale of information security hardware 95
2. Market scale of information security software 95
3. Market scale of information security service 96
III. Status quo and challenge of information security industry 96
Section IV SWOT analysis of the information security industry 98
I. Strengths of information security development 98
II. Weakness of information security development 99
III. Opportunities of information security development 99
IV. Threats of information security development 101
Chapter VII Analysis of the Development of China’s Information Security Industry Technology 102
Section I Elements of information security technology 102
I. Basic content and location of physical security technology 102
(I) Location of physical security 102
(II) Basic elements of physical security 102
(III) Basic contents of physical security 103
II. Basic content and location of cryptography 104
(I) Location of cryptography 104
(II) Basic category of cryptography 105
(III) Application of cryptography 105
III. Basic content and location of identity recognition technology 107
(I)Location of identity authentication 107
(II) Realization of the identity authentication 107
IV. Basic content and location of access control technology 108
(I) Location of access control technology 108
(II) Basic content of access control 109
(III) Realization of access control 110
V. Basic content and location of malicious code protection technology 112
(I) Location of malicious code protection technology 112
(II) Category and operation principles of malicious code 113
(III) Prevention technology of malicious code 115
Section II Information security subsystem 116
I. Secure operating system 116
II. Secure database management system 118
III. Security network system 120
(I) Practical security protocol 120
(II) Firewall system 121
(III) VPN system 121
(IV) Security isolation system 123
IV. Information security detection system 126
(I) Intrusion detection system 126
(II) Information content detention system 128
Section III Information security technology system 130
I. Layering technology protection framework of information security 130
II. Distributed technology protection framework of information security 132
(I) Local computer environment security 132
(II) Boundary Security and Information Exchange 133
(III) Network transmission security 134
(IV) Supporting infrastructures 135
III. The grade of technology protection framework to information security 135
IV. Process technology protection framework to information security 136
(I) Security engineering to Information System 136
(II) Dynamic process protection to information security 137
Section IV Technical status quo of the information security industry 139
I. Technical level of the information security industry 139
(I) Domestic information security technology is backward 139
(II) High foreign dependence of information security 140
(III) Technology in information security segmentations 140
II. Technical characteristics of the information security industry 141
(I) Terminal security management market 141
(II) Security management platform market 142
III. Technical development direction of the information security industry 143
Chapter VIII Application Demand Analysis of China’s Information Security Industry 146
Section I Regional market demand analysis of information security industry 146
I. Information security market scale in East China 146
II. Information security market scale in North China 146
III. Information security market scale in South China 147
IV. Information security market scale in Central China 147
V. Information security market scale in Southwest China 147
VI. Information security market scale in Northwest China 148
VII. Information security market scale in Northeast China 148
Section II Information security market needs analysis by cities 149
I. Information security market scale in tier-1 cities 149
II. Information security market scale in tier-2 cities 149
III. Information security market scale in tier-3 cities 149
IV. Information security market scale in tier-4 and below cities 150
Section III Vertical market needs analysis of the information security industry 150
I. Scale of information security needs in household field 150
II. Scale of information security needs in government field 151
III. Scale of information security needs in telecommunication field 151
IV. Scale of information security needs in finance field 151
V. Scale of information security needs in energy field 152
VI. Scale of information security needs in education field 152
Section IV Information security market scale analysis by channel structure 153
I. Market scale of information security in direct selling channel 153
II. Market scale of information security in indirect selling channel 153
Chapter IX Analysis of Competition Situation of China’s Information Security Industry 154
Section I Analysis of competition structure of information security industry 154
I. Competition among existing enterprises in the industry 154
II. Analysis of threat of new entrants 155
III. Threat of substitute products or services 155
IV. Bargaining capacity of suppliers 155
V. Bargaining capacity of buyers 156
Section II Analysis of competition pattern of information security industry 156
I. Analysis of competition situation of information security industry 156
II. Competition of market segments in information security industry 158
(I) Terminal security management market competition 158
(II) Data security management market competition 158
(III) Security management platform market competition 159
III. Analysis of enterprise competition in information security industry 159
Section III Analysis of competition trends of information security industry 160
I. M&A triggers shuffling of information security industry 160
II. Analysis of M&A and restructuring of information security industry 161
(I) IT giants acquire information security enterprises. 161
(II) M&A and restructuring strategies of Symantec 163
(III) McAfee acquired Stonesoft Corporation at a high price. 163
Section IV Investment of translational information security enterprises in China 164
I. Investment layout of Symantec (America) in China 164
II. Investment distribution of McAfee (America) in China 165
III. Investment distribution of Kaspersky (Russia) in China 166
Volume III Market Segmentation 168
Chapter X Chinese Information Security Hardware Market Analysis 168
Section I Firewall / VPN market analysis 168
I. Market size analysis of firewall / VPN 168
II. Firewall/VPN brand structure analysis 168
Section II IDS / IPS market analysis 169
I. Market size analysis of IDS / IPS 169
II. IDS/ IPS brand structure analysis 169
Section III UTM market analysis 170
I. Market demand analysis of UTM products 170
II. Target market analysis of UTM products 170
Section IV Information encryption / identity authentication market analysis 171
I. The market size of information encryption / identity authentication 171
II. The brand structure of information encryption / identity authentication 171
Chapter XI Chinese Information Security Software Market Analysis 173
Section I WEB business security product market analysis 173
I. Overview of WEB security product development 173
(I) The development of anti-virus software 173
(II) The development of firewall 174
II. The brand competition of WEB security products 175
Section II The market analysis of security management platform 176
I. SOC product demand scale analysis 176
II. SOC product brand structure analysis 176
Section III The market analysis of terminal security management 177
I. The scale of demand for terminal security management products 177
II. The brand structure analysis of terminal security management 177
Section IV Security audit product development analysis 178
I. The scale of demand for security audit products 178
I. The target market of security audit products 178
Section V Operating system security reinforcement market analysis 179
I. Operating system security reinforcement market analysis 179
II. The brand structure analysis of operating system security reinforcement 179
Section VI The market analysis of server security products 180
I. The market analysis of server security demand 180
II. Target market analysis of server security 180
Section VII Content security management market 181
I. Content security management market size analysis 181
II. The brand structure analysis of content security management 181
Section VIII Additional information security software product analysis 181
I. Vulnerability scanning market analysis 181
II. The market analysis of identity management and access control 182
Chapter XII Analysis of China’s Information Security Service Market 184
Section I Analysis of the information security service market 184
I. Overview of the information security service market 184
II. Status quo of the information security service market 184
III. Dynamics of information security service enterprises 185
Section II Development trend of information security services 186
I. Challenges faced by security service market 186
II. Development trends of the security service market 186
Section III Development prospects of information security service industry 187
Volume IV Enterprise Competition 189
Chapter XIII Foreign Information Security Enterprise Business Analysis 189
Section I Symantec 189
I. Company profile 189
II. Products and services 189
III. Business index of the enterprise 190
IV. Technical characteristics of Symantec 190
V. Analysis of business scale 191
Section II McAfee 191
I. Company profile 191
II. Products of the company 192
II. Product characteristics 192
III. Partners 192
IV. Technical conditions 193
Section III Trend Micro 193
I. Company profile 193
II. Main technologies 194
III. Business index of the enterprise 194
IV. Competitive advantages of enterprise 195
V. Development strategy in China 195
Section IV Checkpoint 196
I. Company profile 196
II. Products and services 196
III. Business index of the enterprise 197
IV. Competitive advantages of enterprise 197
V. Customer analysis 197
Section V Proofpoint 198
I. Company profile 198
II. Products and services 198
III. Business index of the enterprise 198
IV. Enterprise development trend 199
V. Enterprise development strategy 199
Section VI SafeNet 199
I. Company profile 199
II. Products and services 200
III. Competitive advantages of enterprise 200
IV. Status quo of enterprise development 201
Section VII Websense 201
I. Company profile 201
II. Products and services 202
III. Competitive advantages of enterprise 202
IV. Enterprise development trend 203
Section VIII Barracuda network company 203
I. Company profile 203
II. Products and services 204
III. Development of Barracuda in China 204
IV. Enterprise development strategy 204
Chapter XIV Analysis of Main Chinese Information Security Enterprises 206
Section I Beijing Venustech Information Technology Co., Ltd. 206
I. Analysis of company profile 206
II. Products and services 206
III. Analysis of enterprise operation 207
IV. Analysis of enterprise marketing network 208
Section II Chengdu Westone Information Industrial Co., Ltd. 209
I. Company profile 209
II. Products and services 209
III. Analysis of enterprise operation 211
IV. Analysis of enterprise marketing network 212
Section III Xiamen Meiya Pico Information Co.,Ltd 213
I. Analysis of company profile 213
II. Products and services 213
III. Analysis of enterprise operation 214
IV. Analysis of enterprise marketing network 216
V. Analysis of competitive advantages of companies 217
Section IV Fujian Rongji Software Co., Ltd. 218
I. Analysis of company profile 218
II. Products and services 218
III. Analysis of enterprise operation 219
IV. Analysis of enterprise marketing network 220
V. Analysis of competitive advantages of companies 221
Section V Bluedon Information Security Technology Co., Ltd. 222
I. Analysis of company profile 222
II. Products and services 222
III. Analysis of enterprise operation 224
IV. Analysis of enterprise marketing network 225
V. Analysis of competitive advantages of companies 226
Section VI Surfilter Network Technology Co., Ltd. 226
I. Analysis of company profile 226
II. Products and services 227
III. Analysis of enterprise operation 228
IV. Analysis of enterprise marketing network 229
V. Analysis of competitive advantages of companies 230
Section VII Neusoft Corporation 231
I. Company profile 231
II. Products and services 232
III. Analysis of enterprise operation 233
IV. Analysis of enterprise marketing network 234
V. Analysis of Company Development Strategy 234
Section VIII Nsfocus Information Technology Co., Ltd. 235
I. Analysis of company profile 235
II. Products and services 235
III. Analysis of enterprise operation 236
IV. Analysis of enterprise marketing network 237
V. Analysis of competitive advantages of companies 238
Section IX Beijing VRV Software Corporation Limited 238
I. Analysis of company profile 238
II. Products and services 238
III. Analysis of enterprise operation 240
IV. Analysis of enterprise marketing network 241
V. Analysis of Company Development Strategy 241
Section X Beijing TRS Information Technology Co., Ltd. 242
I. Analysis of company profile 242
II. Products and services 242
III. Analysis of enterprise operation 243
IV. Analysis of enterprise marketing network 244
V. Analysis of competitive advantages of companies 245
Section XI Sangfor Technologies Co., Ltd. 246
I. Analysis of company profile 246
II. Products and services 246
III. Corporate client service analysis 247
IV. Analysis of competitive advantages of enterprise 248
V. Recent news of corporate operation 248
Section XII FEITIAN Technologies Co., Ltd. 249
I. Analysis of company profile 249
II. Products and services 249
III. Analysis of marketing network of company 251
IV. Analysis of competitive advantages of enterprise 251
V. Analysis of recent news of enterprise 251
Section XIII Jiangsu Agile Technology Co., Ltd. 252
I. Analysis of company profile 252
II. Products and services 252
III. Case analysis of enterprises' achievements 252
IV. Analysis of enterprise marketing network 255
V. Analysis of competitive advantages of companies 256
VI. Analysis of company development strategy 257
Section XIV Softnext Technologies Corp. 257
I. Analysis of company profile 257
II. Products and services 258
III. Case analysis of enterprises' achievements 259
IV. Analysis of enterprise marketing network 262
V. Analysis of Company Development Strategy 263
Section XV Shanghai 30wish Information Security Co., Ltd. 263
I. Analysis of company profile 263
II. Products and services 263
III. Case analysis of enterprises' achievements 264
IV. Analysis of enterprise marketing network 265
V. Analysis of competitive advantages of companies 266
Section XVI Beijing NetentSec, Inc. 267
I. Analysis of company profile 267
II. Products and services 267
III. Case analysis of enterprises' achievements 269
IV. Analysis of enterprise marketing network 269
V. Analysis of competitive advantages of companies 270
Section XVII Legendsec Information Technology (Beijing) Inc. 270
I. Analysis of company profile 270
II. Products and services 271
III. Analysis of enterprise solutions 272
IV. Analysis of enterprise marketing network 274
V. Analysis of enterprise products quality 274
Section XVIII Jilin University Information Technologies Co., Ltd. 275
I. Analysis of company profile 275
II. Analysis of enterprise security products 275
III. Analysis of enterprise solutions 276
IV. Analysis of corporate partners 276
Volume V Investment Outlook 278
Chapter XV Outlook on China's Information Security Industry and Forecast of the Market Scale for 2015-2020 278
Section I Analysis of development trend of information security industry 278
I. Initiative information security products are preferable 278
II. Data security management becomes important 278
III. Development trend of security management platform products 278
IV. Overall security establishment gains increasing attention 279
Section II Forecast of information security industry development 279
I. Analysis of driving factors of the information security industry 279
II. Forecast of the markets sizes of information security 282
Section III Forecast of the markets sizes of the information security industry 283
I. Forecast of the market segments sizes of information security 283
(I) Forecast of the market size of hardware products 283
(II) Forecast of the market size of information security software 283
(III) Forecast of the market size of information security services 284
II. Forecast of regional markets sizes of information security 284
(I) Forecast of the market size of Eastern China 284
(II) Forecast of the market size of North China 285
(III) Forecast of the market size of South China 285
(IV) Forecast of the market size of Central China 286
(V) Forecast of the market size of Southwest China 286
(VI) Forecast of the market size of Northwest China 287
(VII) Forecast of the market size of Northeast China 287
III Forecast of the markets sizes of information security of cities at all levels 288
(I) Forecast of the market size of first-tier cities 288
(II) Forecast of the market size of second-tier cities 289
(III) Forecast of the market size of third-tier cities 289
(IV) Forecast of the market size of fourth-tier cities and below 290
IV. Forecast of vertical markets sizes of information security 290
(I) Forecast of the demand size for family 290
(II) Forecast of the demand size for education 291
(III) Forecast of the demand size for government 291
(IV) Forecast of the demand size for telecommunications industry 292
(V) Forecast of the demand size for energy industry 292
(VI) Forecast of the demand size for financial industry 293
V. Forecast of channel markets sizes of information security 293
(I) Forecast of the market size of the direct sales channel 293
(II) Forecast of the market size of the indirect sales channel 294
Chapter XVI 2015-2020 Investment Opportunities and Risks of China Information Security Industry 295
Section I Analysis of investment features of information security industry 295
I. Analysis of barriers to enter information security industry 295
(I) Technological barriers 295
(II) Talents barriers 295
(III) Brand barriers 296
(IV) Qualification barriers 296
II. Analysis of business model of information security industry 296
III. Analysis of profit factor of information security industry 297
Section II Analysis of investment opportunity of information security industry 298
I. Investment opportunity in information security market segment 298
II. Investment-driven factors of information security 299
(I) Cost-driven factor 299
(II) Technology trend 300
(III) Policy-driven factor 301
III. Increased security budget 301
IV. Merging and reorganization market opportunity in information security industry 301
Section III Analysis of investment risk of information security industry 302
I. Macroeconomic risks 302
II. Industry policy risks 302
III. Industry technology risks 304
III. Industry market risks 305
V. Industrial related risks 305
Back