1 / 29

Network Security Market Middle East, Intrusion Detection System Market Middle East - Ken Research

Middle East cyber security market is expected to register positive CAGR of around 20% during the period 2017-2022 with central region expected to gain major share of the market.

AnkurGupta
Télécharger la présentation

Network Security Market Middle East, Intrusion Detection System Market Middle East - Ken Research

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. September, 2018 Middle East Cyber Security Market Outlook to 2022 By Region (North, Central, West, East and South) and By Type of Solution (Firewall, Intrusion Detection System, Antivirus, Identity and Access Management, Encryption, Data Loss Prevention, Unidentified Threat Management, Disaster Recovery) Your Search Ends with Our Research

  2. Table of Contents (1/2) 1. Executive Summary 2. Research 2. 1 Market Definitions 2.2 Abbreviations 2.4 Market Sizing, Limitation and Services– Cyber Security Market 2.5 Variables (Dependent and Independent) 2.6 Middle East Cyber Security Market Correlation Matrix 2.7 Middle East Cyber Security Market Regression Matrix 3. Middle East Cyber Security Market Value Chain 4. Road Map for Implementing Cyber Security in Middle East 5. Middle East Cyber Security Market 5.1 Market Overview 5.2 Recent Developments 5.3 Major Cyber Attacks in Middle East 5.4 Motives of Cyber Attacks in Middle East 5.5 Types of Cyber Attacks in Middle East 5.6 Global Snapshot of Cost Incurred Due to Data Breaches 5.7 Type of Cost Incurred due to Cyber Threats 5.8 Middle East Cyber Security Market- Common Practices 6. Market Size 6.1 Middle East Cyber Security Market Size by Revenue, 2012-17 6.2 Middle East Cyber Security Market Segmentation by Type of Solution, 2017 6.3 Middle East Cyber Security Market Segmentation by End User, 2017 6.4 Middle East Cyber Security Market Segmentation by Type of Security, 2017 6.5 Middle East Cyber Security Market Segmentation by Region, 2017 7. Competition 7.1 Middle East Cyber Security Developers 7.2 Middle East Cyber Security Market- Parameters of Competition for Developers 7.3 Company Profile of Fire Eye 7.4 Company Profile of IBM 7.5 Company Profile of Splunk 7.6 Company Profile of Four Scout

  3. Table of Contents (2/2) 7.7 Symantec 7.8 Parameters of Competition for System Integrators 7.9 Etisalat 7.10 ISYX 7.11 BIOS 7.12 DU 7.13 Starlink 8. Industry Analysis 8.1 Technology Used 8.2 Trends 8.3 Security Trend Matrix 8.4 Challenges 8.5 Growth Drivers 8.6 Restraints 8.7 Vendor Selection Process 8.8 Government Regulations 8.9 SWOT Analysis 8.10 Porter Five Forces Analysis 9. Future Outlook, 2017-2022 9.1 Middle East Cyber Security Market Future Outlook, 2017-2022 9.1.1 By Type of Solution, 2017-2022 9.1.2 By Type of Security, 2017-2022 9.1.3 By Type of End User, 2017-2022 9.1.4 By Region, 2017-2022 10. Analyst Recommendations Disclaimer Contact Us

  4. List of Figures (1/2) Figure 1.1: Middle East Cyber Security Market by Revenue, 2012-2022 Figure 1.2: Middle East Cyber Security Market by Regions by Revenue, 2017 and 2022 Figure 3.1: Value Chain Of Cyber Security Industry in Middle East Figure 5.1: Effect of Security Breach on Physical and Virtual Infrastructure Figure 5-2: Intrusion Triangle Showcasing Key Issues behind a Cyber Attack Figure 5.3 Global Average Cost Incurred per Cyber Crime, 2013-17 Figure 6.1: Middle East Cyber Market Size by Revenue in USD Billion, 2012-2017 Figure 6.2:Middle East Cyber Security Market Segmentation in Percentage by Type of Solution, 2017 Figure 6.3: Middle East Cyber Security Segmentation by End User, 2017 Figure 6.4: Segmentation of Middle East Security Market by Type of Security Figure 6.5: Share of Region in Middle East Cyber Security Market, 2017 Figure 7.1: Fire Eye Revenue in USD Million from Global Business, 2013-17 Figure 7.2: Share of Revenue in Fire Eye Revenue, 2017 Figure 7.3: Revenue in USD Million from EMEA Region (Excluding OEM), 2012-17 Figure 7.4: Splunk Global Revenue in USD Million, 2012-17 Figure 7.5: Four Scout Revenue from EMEA, 2015-17 Figure 7.6: Symantec Global Revenue Share of Consumer Security and Enterprise Security Figure 7.7: Symantec Revenue (in USD billion) from EMEA region, 2012-17 Figure 7.8: Share of Symantec Revenue from Total Revenue from Different Region, 2015-17 Figure 7.9: Du’s Annual Revenue in USD Billions from its Global Operations. Figure 8.1: Different Technological Trends and Their Effect on Major Sectors in Middle East Figure 9.1: Middle East Cyber security market by Revenue, 2017-22 Figure 9.2: Middle East Cyber Security market Share, by Solution, 2017-22 Figure 9.3: Middle East Cyber Security Market Share, by Type of End User, 2017-22 Figure 9.4: Share of Cyber Security Market in Middle East by Region, 2017-22

  5. List of Tables (1/3) Table 1.1: Major Cyber security Developers and System Integrators in Middle East, 2017 Table 2.1: Correlation Matrix for Middle East Cyber Security Market Table 2.2: Regression Coefficient Output for Middle East Cyber Security Market Table3.1 : Members of Middle East Cyber Security Market Value Chain Table 5.1: Major Cyber Attacks in Middle East Region Table 5.2: Types of Cyber Attacks Faced by Organizations, Their Motives and Threats Offered by Them Table 6.1: Middle East Cyber Security Market Segmentation by Type of Solution in Revenue in USD Million, 2017 Table 6.2: Middle East Cyber Security Market Segmentation by Revenue by End Users, 2017 Table 6.3: Middle East Cyber Security Market Segmentation by Revenue by Type of Security, 2017 Table 6.4: Revenue Generated from Cyber Security in Different Regions, 2017 Table 7.1: Parameters of Competition in Middle East Cyber Security Market Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing, Global Presence, Technological Partners, Major Projects Table 7.3: Fire Eye R&D Expense from 2015-2017 Figure 7.4: Revenue Generated in USD Million from EMEA Region, 2015-17 Table 7.5: IBM ‘s Global Presence and Key Sectors Served Table 7.6: Company Profile of IBM Including Company Overview, Business Strategy, USP, Number of Employees, Marketing, Product portfolio, Services Offered Table 7.7: Major Resellers of Spunk in Middle East, 2012-17 Table 7.8: Company Profile of Spunk Including Company Overview, Business Strategy, USP, Number of Employees, Product Portfolio, Services Offered, Major Projects. Table 7.9: Four Scout Global Presence and Key Sectors Served Table 7.10: Company Profile of Four Scout Including Company Overview, Business Strategy, USP, Product Portfolio, Number of Employees, Major Projects, Solutions Offered Table 7.11: Company Profile of Symantec including Company Overview, Business Strategy, USP, Product Portfolio

  6. List of Tables (2/3) Table 7.12: Symantec Revenue from Different Segments in USD Billions, 2015-17 Table 7.13: Symantec Global Revenue in USD Million from Different Sectors in USD Million, 2015-17 Table 7.14: Parameters of Competition of Major System Integrators in Middle East Cyber Security Market Table 7.15: Company Profile including Company Overview, Business Strategy, USP and Product Portfolio Table 7.16: Company Profile Of ISYX Including Company Overview, Business Strategy, Global Presence, USP, Number Of Employees And Product Portfolio. Table 7.17: Company Profile of BIOS including Company Overview, Product Feature, USP, Number Of Employees, Services Offered, Recent Developments Table 7.18: Future Strategic Priorities of DU, 2018-22 Table 7.19: Company Profile of DU including Company overview, Business Strategy, Key Achievements, Product Portfolio. Table 7.20: Company Profile of Starlink including Company overview, Business Strategy, Technological Vendors, Number of Employees Table 8.1: Major Technologies Used in Cyber Security along with Proprietor and Key Features Table 8.2: List of Major Smart City Projects in Middle East Table 8.3: Internet Penetration in Percentage in Arab Countries Table 8.4: Security Requirements, Challenges and Benefit of using Cloud Computing Table 9.1: Middle East Cyber Security Market CAGR by Type of Solution, 2017-22 Table 9.2: Middle East Cyber Security Market Segmentation by Revenue in USD billion by Solution, 2017-22 Table 9.3: Middle East Cyber Security Market Share, by Type of Security, 2017-22 Table 9.4: Middle East Cyber Security Market Revenue in USD Billion by Type of Security, 2017-22 Table 9.5: Middle East Cyber Security Market, CAGR 2017-22, by Type of Security Table 9.6: Middle East Cyber Security Market, Revenue in USD Billion, by Type of End User, 2017-22 Table 9.7: Middle East Cyber Security Market, CAGR, by Type of End User, 2017-22 Table 9.8: Market in USD Billion of Cyber Security in Middle East by Region, 2017-22 Table 9.9: Middle East Cyber Security Market CAGR (2017-22) by Region.

  7. 1.1 Middle Cyber Security Market Executive Summary Figure 1.2: Middle East Cyber Security Market by Regions by Revenue, 2017 and 2022 Figure 1.1: Middle East Cyber Security Market by Revenue, 2012-2022 1 CAGR (2012-17): ~% CAGR (2017-2022): ~% 2 3 Erratic Pricing Table 1.1: Major Cyber security Developers and System Integrators in Middle East, 2017 CAGR by Revenue 4 Growing Stage 5 Market is dominated by ~ big players. Some regional players enjoy large share in their respective market. OTC drugs allowed to advertise More than ~ system integrators out of which ~ provide service in more than one country. Market Stage Developers are integrating technologies such as cloud, AI etc in order to make their products resilience against the ever evolving landscape. Cyber threats has risen considerably prompting enterprises to take cyber security seriously. Market Structure Technology, Financial backing, Price, Relationship. Number of Players Basis of Competition

  8. 2. 1 Research Methodology - Market Definitions • Middle Cyber Security Market: The cyber security market includes revenue from spending on hardware, software and consulting services for installation of these services for prevention of any kind of cyber threats by various solutions including firewall, intrusion detection system, antivirus, identity & access management, encryption and others. Only spending on Domestic Commercial, Retail, BFSI, Government, Residential, Energy & power and Healthcare sector has been accounted while collating the market size. Spending on army and defense has not been considered while cumulating the market revenues. • The Middle East cyber security market is segmented using following criteria: • Type of Solution: Firewall, Intrusion Detection System (IDS/IPS), Antivirus/Antimalware, Identity and Access Management (IAM), Encryption, Data Loss Prevention (DLP), Unidentified Threat Management (UTM), Disaster Recovery. • Type of Security: Network Security, Wireless Security, End-Point Security, Application Security, Content Security, Cloud Security. • Type of End User: Banking & Finance Government IT & Telecom Energy & Power Healthcare Retail Others • Middle East is segmented into following regions. • Central Region: Saudi Arabia, Iraq, Jordan • Northern Region:Turkey, Syria, Cyprus • Western region: Lebanon, Israel, Egypt, State of Palestine • Southern Region: Oman, UAE, Yemen • Eastern Region: Bahrain, Kuwait, Qatar, Iran Erratic Pricing OTC drugs allowed to advertise

  9. 2.2 Research Methodology - Abbreviations • AI: Artificial Intelligence • CAGR: Compounded Annual Growth Rate • CCTV: Closed Circuit Television • COTS: Commercial Off The Shelf • DDOS: Distributed Denial Of Service • FY: Financial Year • GCC: Gulf Cooperation Council • IoT: Internet of things • IP: Internet Protocol • KD: Kuwait Dirham • KSA: Kingdom of Saudi Arabia • LAN: Local area Network • LLC: Limited Liability Company • MoU: Memorandum of Understanding • NVR: Network Video Recorder • OPEC: Oil Producing and Exporting Countries • PoE: Power of Ethernet • PTZ: Pan Tilt Zoom • QNB: Qatar National Bank • R&D: Research and Development • SSS: Specialized Security System • UAE: United Arab Emirates • USD: United States Dollar • USP: Unique Selling Proposition. • WAN: Wide Area Network Erratic Pricing OTC drugs allowed to advertise

  10. 2.3 Research Methodology - Consolidated Research Approach Hypothesis Creation: The research team has first framed a hypothesis about the market through analysis of existing industry factors obtained from magazines, journals, broker reports, investor presentations and annual reports of major companies, Ministry of Interiors and Others. Hypothesis Testing: The research team conducted computer assisted telephonic interview (CATI) with several industry professionals including decision makers in Developers and System Integrating companies. The industry professionals included several management executives, and other higher level authorities. Structured interviews were conducted through telecom with several industry veterans including major decision makers from Etisalat, DU, G4S and other companies. The analyst at Ken Research collated their insights on the market onboard and to seek justification to the hypothesis framed by the team. Sanity Checking @ Decision Tree Analysis: Data has been collected and verified through cross-sanity checking the opinion and facts received from interview with the hypotheses framed from public databases. The team has verified the data by conducting both bottom-to-top and top-to-bottom analysis. Future Forecasting via Poll Opinions and Statistical Tools: Multi-Factor regression was conducted on the lag variables by identifying the independent and quantifiable variables directly affecting the market. The forecasting was done by using SPSS statistical tools. The variables were checked for multi-co-linearity and other bias that could be present in the model. The conclusion from the regression was then double-checked by conducting poll opinions. Interpretation and Proofreading: The final analysis will then be interpreted in the research report by our expert team well versed with the Cyber Security Industry. Erratic Pricing OTC drugs allowed to advertise

  11. 2.4 Research Methodology - Market Sizing, Limitation and Services– Cyber Security Market Market Sizing: • Initially, we identified all major developers and system integrators operating in the market. We then collated the revenue for current year. This helped us in sanity checking the current market size provided by industry veterans. • We also collated the information for entire cyber security industry size including segmentation, type of solution, type of security, type of end user, regions and then interviewed industry professionals to seek their expert opinion on contribution of these segments to the overall market. • We have conducted multiple CATIs with industry experts and management of leading developers and system integrators to understand the market size, relationship building process, customer acquisition, and their views on future development. This helped us in estimating revenue generated for the overall market and validating the future growth in the market Limitation: • The projects required for army and defense work was not included while calculating the market size for cyber security market. Confidentiality of data, due to national security concerns was the major reason behind lack of access to data. • Primaries may have been bullish with certain data points but we, Analysts at Ken Research, have verified the data points with other bottom up approach and through various secondary databases. • Middle East Cyber Security Market: • Products: Firewall, Intrusion Detection System (IDS/IPS), Antivirus/Antimalware, Identity and Access Management (IAM), Encryption, Data Loss Prevention (DLP), Unidentified Threat Management (UTM), Disaster Recovery. • Services: Risk assessment, data centres, consulting, security and threat intelligence, file integrity monitoring. User and Entity analytics. Erratic Pricing OTC drugs allowed to advertise

  12. 2.5 Research Methodology - Variables (Dependent and Independent) Variables Considered: • Contribution of Financial Sector to the Real GDP (UAE): Financial sector represent the biggest end user of cyber security products and as the financial sector will grow the investments made in the cyber security market will also increase. • UAE Industrial Sector Contribution to GDP: Industrial sector contributes 15% of the investments made in cyber security market in Middle East. The growth in the sector’s contribution to GDP will increase the expenditure made by industrial sector in cyber security. • UAE IT Industry size: IT industry contributes to one-fifth of the cyber security market. Increase in IT industry size will result in increase in IT infrastructure in the sector which will require additional cyber security to ensure safety of those infrastructure. Forecast Modelling: • The report applies Correlation and Regression analysis methods to forecast the future of the cyber security market. The capabilities of SPSS and predictive analytics software have been leveraged to determine the relevant indicators used for forecasting this industry. • In the present case, cyber security market revenue has been taken as the dependent variable and other variables such as contribution of financial sector to the real GDP, UAE industrial sector contribution to GDP, UAE IT industry size have been taken as independent variables. Erratic Pricing OTC drugs allowed to advertise

  13. 5.1 Middle East Cyber Security Market Overview Increasing Cyber Threat Government Focus Advantage Israel • The market is dominated by US based developers such as IBM, Fire eye etc although a lot of Israeli companies are entering the competitive landscape. A number of startups from Israel have surfaced after 2012 like Check point, Imperva, theta ray. In 2017 the Israeli cyber security sector solidified its position as a global player, raising USD ~ million in venture capital and private equity investment. Israel is an exception in Middle East , where regional developers are virtually non existent. Israel wins second-largest number of cyber security deals globally after U.S. • The number of virus-infected computers in the Middle East is more than four times the global average • Cyber crimes in UAE increased by ~% between 2013 and 2015. • The average total organizational cost lost due to data breaches in Middle East was USD ~ million in 2017. • In Middle East, post data breach response expenditure made by organizations in 2017 was estimated to be USD ~ million. These activities includes desk activities, inbound communications, special investigative activities, remediation, legal expenditures, product discounts, identity protection services and regulatory interventions.(Source: Ponemon Institute, Research Report) • According to Telecommunication authority, in January 2017, there were ~ attacks on the UAE government websites. • In 2014 UAE government established its first cyber security centre in Dubai in order to protect the government information system as well as the telecommunication network from the threat of cyber attacks • The UAE region holds ~ spot globally in terms of region susceptible to cyber attacks. Formulation of cyber security policies has made the country ~ most secure region worldwide. • Cyber attacks on state owned companies like Saudi Aramco, Qatar National Bank were aimed at destabilizing the country’s economy. Hence, after these attacks the government have taken the issue very seriously. Recurring Events • A total of ~ cyber attacks forayed against government, semi-government and private sector entities in UAE alone from January to October 2017. (Source: Telecommunication Authority of UAE) • Companies in Middle East have highest per capita direct cost globally, these cost involve direct expense outlay to accomplish a given activity such as engaging forensic experts, hiring a law firm or offering victims identity protection services. The system integrators present in the market are regional players with exception of a few like Etisalat, Bios etc. Political tension between various countries prohibit even the big companies to expand their business across the Middle East region.

  14. 5.3 Major Cyber Attacks in Middle East Table 5.1: Major Cyber Attacks in Middle East Region Source: Gulf News Figure 5.1: Effect of Security Breach on Physical and Virtual Infrastructure Source: Kaspersky Report

  15. 5.5 Types of Cyber Attacks in Middle East Malware Virus In November 2017, a cyber attack using “Powershell” malware hit the Saudi government, aimed to disrupt the government computers. A new Advanced Persistent Threat (APT) was detected, which was targeting Saudi Arabia by infiltrating computers using email phishing techniques by the government’s National Cyber Security Centre. Attack on Saudi Aramco, by a virus Shamoon in 2012 was one of the most destructive cyber attack on private business ever. In January 2017, Shamoon 2, the improved version of Shamoon, attacked many organizations across KSA leaving at least three government agencies and four private sector companies offline for 48 hours. The virus disrupts computers by overwriting the master boot record, making it impossible for them to start up. Skimmers Skimmers are essentially malicious card readers that steal data off the ATM card’s magnetic stripe attached to the real payment terminals so that they can strip data from every person that swipes their cards. Ransom Ware Crypto jacking Ransom ware represents one of the most dangerous threat to organizations and end-users. Ransom ware’s family continue to increase; authors will be more focused on mobile devices implementing new evasion techniques making these threats even more efficient and difficult to eradicate This is the most recent type of threat in Middle East which aims at robbing digital wallets. It uses technologies such as block chain

  16. 5.8 Middle East Cyber Security Market- Common Practices End Point Network Mobile Advanced Fraud • End point patching and management. • Malware Protection. • End point detection and response. • Transaction Protection. • Device management. • Content Security. • Network forensics and threat Management. • Firewall • Network Visibility and segmentation. • Fraud protection. • Criminal Detection Security Orchestration and Analytics Apps Threat Intelligence Data Identity and Access • Indicators of Compromise. • Malware Analysis. • Threat Sharing. • Application Scanning. • Application security Management • Data Protection. • Data Access Control. • Privileged User Management. • Mainframe security. • Identity Governance.

  17. 6.1 Middle East Cyber Security Market Size by Revenue, 2012-17 Figure 6.1: Middle East Cyber Market Size by Revenue in USD Billion, 2012-2017 In 2014, UAE national electronic security authority announced that cyber security one of the biggest economic and national security challenge that the country faces at present and asked public and private entities to adopt cyber security measures across their organization. There were few instances when some unidentified cyber groups attacked various petroleum, gas, and helium industries in U.A.E, Kingdom of Saudi Arabia and Qatar using a malware called Trojan. Source: Interview with Dr. Udai Kumar Uprit, Digital Security Expert, Middle East As the company expands its business not only it requires cyber security arising out of increasing infrastructure but it also adds up to the level of security as the company becomes more vulnerable to cyber attacks. Various sectors such as automobile, healthcare are in their developing phase due to which demand of cyber security is rising. Diversification strategies implemented by OPEC nations have also resulted in expansion in number of companies coming in the region. In 2015, first Middle East based cyber criminal group, with full-scale cyber-espionage operations, emerged called “Desert Falcons”. The group was started in 2011 but it was not until beginning of 2015 that the group became active. By February 2015, the group had more than ~ victims in ~ countries, majority of these victims were in Palestine.

  18. 6.3 Middle East Cyber Security Market Segmentation by End User, 2017 (1/4) • Government sectors are shifting to mobile based service resulting in demand for cyber security. Figure 6.3: Middle East Cyber Security Segmentation by End User, 2017 • Saudi Vision 2030 aims to secure the kingdom from cyber crime in the near future. The government wants to develop a cyber security industry which would be technological leader in Middle East region. In order to accomplish this purpose the government has formed a new regulatory body, Authority of Cyber Security, in 2017. Table 6.2: Middle East Cyber Security Market Segmentation by Revenue by End Users, 2017 • After a lot of high profile cyber attacks in KSA, Saudi Arabia Monetary Authority (SAMA) framed a regulatory framework for the organizations coming under its jurisdiction. The framework defined principles and objectives for initiating, implementing, maintaining, monitoring and improving cyber security controls. The Framework is applicable to all Member Organizations regulated by SAMA, which include the following: • ~ • ~ • ~ • ~ • ~

  19. 6.3 Middle East Cyber Security Market Segmentation by End User, 2017 (4/4) Healthcare Sector • Healthcare is fifth biggest user of cyber security in Middle East countries. The growth in the sector has been due to : • Increase in number of managed and unmanaged devices on networks like mobile, laptops and others. • ~ • Data of patients, providers and the organization must be protected from loss and cyber incidents especially data that is subject to breach notification rules. • ~ • Increase in vendor-owned-and-managed systems on the networks have increased resulting in increase on vulnerability of the entire system. Oil & Gas Sector In Middle East oil and gas industries have the biggest share in power and energy sector which comprises 15 % of the total demand of cyber security in the region. The demand is high because of following reasons. • ~ • Most of the oil and gas refineries in the region are state owned and are of national importance therefore it becomes profitable for foreign state backed hackers to disrupt their operations. • ~

  20. 7.1 Middle East Cyber Security Developers Network Security End Point Security Application Security Cloud Security Intrusion Protection

  21. 7.2 Middle East Cyber Security Market- Parameters of Competition for Developers (1/2) Table 7.1: Parameters of Competition in Middle East Cyber Security Market

  22. 7.3 Company Profile of Fire Eye (1/4) Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing, Global Presence, Technological Partners, Major Projects Figure 7.1: Fire Eye Revenue in USD Million from Global Business, 2013-17 Table 7.3: Fire Eye R&D Expense from 2015-2017 Source: Annual report

  23. 7.3 Company Profile of Fire Eye (2/4) Table 7.2: Company Profile of Fire Eye including Company Overview, USP, Business Strategy, Number of Employees, Product Portfolio, Service offered, Sales and Distribution, Marketing, Global Presence, Technological Partners, Major Projects. Source: Annual report

  24. 8.1 Middle East Cyber Security Market- Technology Used (2/2) There are two major technologies to defend against malware Signature based approach and behavior analysis. Most organizations rely on decade’s old signature-based methodology,  some of the new versions of malicious code are not recognized by signature-based technologies, but hackers have become smarter and try to evade static signature detection techniques by coding the virus in such a way so that it can change it's signature The more advanced method of detecting malware via behavior analysisis gaining rapid traction. Although some banks in Middle East have adopted the technology but the technology is still unfamiliar. Signature-based Technology Behavior-based Technology Behavior based technology has following advantages from signature based technology: ~ ~ ~ ~

  25. 8.3 Security Trend Matrix Behavioral Analytics IoT Cloud Mobile Incident Response Fig 8.1: Different Technological Trends and Their Effect on Major Sectors in Middle East ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Government Telecommunication Oil & Gas Banking Source: Starlink, Ken Research Analysis

  26. 9.1 Middle East Cyber Security Market Future Outlook, 2017-2022 Figure 9.1: Middle East Cyber security market by Revenue, 2017-22 More and more international companies are setting up offices in Middle East as regulations regarding foreign investments loosens up amid of oil price vulnerabilities. Rapid private-sector growth offers new investment opportunities in key sectors such as real estate, construction, tourism and manufacturing, but the sheer scale and pace of change means new security gaps are appearing at a dramatic rate. Various government across the Middle East are trying to come up with a cyber security strategy to make the organisations immune from growing threat of cyber attacks. Currently all the Middle East countries except Israel lack a substantial framework governing cyber security. This may have an effect on the market structure as more and more global players can be attracted to enter the market. Source: Interview with Dr. Udai Kumar Uprit, Digital Security Expert, Middle East Etisalat, Singtel, Soft Bank and Telefonica will sign an agreement to create the first Global Telco Security Alliance to offer enterprises a comprehensive portfolio of cyber security services. The alliance will be the world’s biggest cyber security provider which will comprise a customer base of more than ~ billion customers in over ~ countries. The group has combined ~ world-class Security Operation Centres (SOCs) and employ more than ~cyber security experts globally. The group would look to enhance the technologies it uses by developing its capabilities in predictive analytics using machine learning and advanced cyber security using internet of things.

  27. 9.1.2 Middle East Cyber Security Market Future Outlook by Type of Security, 2017-2022 Table 9.4: Middle East Cyber Security Market Revenue in USD Billion by Type of Security, 2017-22 Table 9.3: Middle East Cyber Security Market Share by Type of Security in Percentage, 2017-22 Table 9.5: Middle East Cyber Security Market, CAGR 2017-22 by Type of Security • Key Takeaways: • Network Security and Wireless Security will be the fastest growing sectors, both registering a 5 year CAGR of ~% between 2017 to 2022. • Network security will continue to constitute the lion share of the market as the demand will increase from ~USD billion in 2017 to ~ USD billion in 2022. • Cloud security will also cement its position in the market, registering a CAGR of • ~ % between 2017-22. As more and more companies are moving to cloud based infrastructure. Source: Ken Research Analysis

  28. Disclaimer The research reports provided by Ken Research are for the personal information of the authorized recipient and is not for public distribution and should not be reproduced or redistributed without prior permission. None of this material may be used for any commercial or public use until unless authorized by Ken Research. The report will only be used as per the license rights authorized by Ken Research. The information provided in the research documents is from publicly available data and other sources, which are reliable. Efforts are made to try and ensure accuracy of data. With respect to documents available, neither the company nor any of its employees makes any warranty, express or implied, including the warranties of merchantability and fitness for a particular purpose, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use will not infringe privately owned rights. The report also includes analysis and views expressed by our research team. The research reports are purely for information purposes. The opinions expressed are our current opinions as of the date appearing in the material and may be subject to change from time to time without notice. Investors should not solely rely on the information contained in the research documents and must make investment decisions based on their own investment objectives, risk profile and financial position. The recipients of this material should take their own professional advice before acting on this information. Ken Research will not accept return of reports once dispatched due to the confidentiality of information provided in our reports. In case, a report qualify for return, we will issue a credit, minus shipping charges, of equal value to the original purchase price, toward a future purchase—no refunds. The decision about whether the product return can be accepted or not is solely at our discretion. Any dispute will be subject to laws of India and exclusive jurisdiction of Indian Courts. No part of this manual or any material appearing may be reproduced, stored in or transmitted in any other format without written permission of Ken Research. This is purely for the reference of the concerned entity.

  29. Contact Us Unit 14, Tower B3, Spaze I Tech Business Park, Sohna Road, Sector 49, Gurgaon, Haryana - 122001 New Delhi, India Office: +91 9311149880 Web:www.kenresearch.com Email: namit@kenresearch.com Contact Us

More Related