Table of Contents
Executive Summary
-
- The market
-
- Figure 1: UK market for computer security, 2010-14 actual and 2015-19 forecast
-
- Figure 2: Segmentation of computer security, by end use sector, 2014
-
- Figure 3: Segmentation of computer security, by solution type, 2014
-
- Figure 4: Segmentation of computer security, by product/service, 2014
- Market factors
-
- Figure 5: Data security incidents, by sector, April-June 2015
- Figure 6: Data security incidents, by type, April-June 2015
- Companies
- What we think
Key Insights
-
- What is driving the computer security market?
- Is long-term growth virtually assured?
- How does public spending on computer security fit into the market?
- So is the rest of the market accounted for by major corporations or consumers?
UK Economy
-
- Overview
-
- Figure 7: UK GDP quarterly development, 2003-15
-
- Figure 8: UK GDP in economic downturns and recoveries since 1979
- Inflation
- Interest rates
- House prices
- Consumer spending
- Manufacturing
-
- Figure 9: UK output, by industry, 2008-15
- Business investment
-
- Figure 10: UK GFCF 2003-15
- Imports
- Exports
Market Factors
-
- Key points
- Internet usage
-
- Figure 11: Worldwide internet usage, by region, 2010-14
-
- Figure 12: Proportion of businesses with internet access, by size of company, 2009-13
-
- Figure 13: Proportion of businesses with broadband, by size of company, 2009-13
-
- Figure 14: Proportion of businesses by maximum contracted internet connection speed, by size of company, 2010-13
- Cloud computing
-
- Figure 15: UK cloud computing market, 2010-14
- E-Commerce
-
- Figure 16: The total UK e-commerce market, 2010-14
Market Size
-
- Key points
-
- Figure 17: UK market for computer security, 2010-14
Market Segmentation
-
- Key points
- Segmentation by end use sector
-
- Figure 18: Segmentation of computer security, by end use sector, 2010-14
- Segmentation by solution sector
-
- Figure 19: Segmentation of computer security, by solution type, 2010-14
- Segmentation by product/service
-
- Figure 20: Segmentation of computer security, by product/service, 2010-14
Market Trends
-
- Key points
- Security breaches continue to be a major issue
-
- Figure 21: Data security incidents, by sector, April-June 2015
-
- Figure 22: Data security incidents, by type, April-June 2015
- External attacks
- Regulatory influences
- Supply chains
- Bring-your-own technology into the workplace
- Awareness
- The impact of the cloud
Industry Structure
-
- Key points
- Industry development
-
- Figure 23: Analysis of the changes in the structure of the business and domestic software development industry, 2011-15
-
- Figure 24: Analysis of the changes in the structure of the computer consultancy industry, 2011-15
- Development by turnover
-
- Figure 25: Analysis of the financial structure of the business and domestic software development industry, 2014 and 2015
-
- Figure 26: Analysis of the financial structure of the computer consultancy industry, 2014 and 2015
- Development by employment level
-
- Figure 27: Analysis of the employment structure of the computer consultancy industry, 2014 and 2015
-
- Figure 28: Analysis of the employment structure of the business and domestic software development industry, 2014 and 2015
Company Profiles
Avecto
-
-
- Figure 29: Financial analysis of Avecto UK, 2013-14
- Company strategy
-
AVG Technologies UK
-
-
- Figure 30: Financial analysis of AVG Technologies UK, 2010-14
- Company strategy
-
BAE Systems
-
-
- Figure 31: Financial analysis of BAE Systems, 2010-14
-
- Figure 32: Geographic turnover segmentation of BAE Systems, 2014
-
- Figure 33: Activity turnover segmentation of BAE Systems, 2014
- Cyber and intelligence activities
-
- Figure 34: Activity turnover segmentation of BAE Systems’ Intelligence & Security activities, 2014
-
- Figure 35: Activity turnover segmentation of BAE Systems’ Applied Intelligence activities, 2014
- Company strategy
-
Bitdefender
-
-
- Figure 36: Financial analysis of Bitdefender, 2010-14
- Company strategy
-
Boldon James
-
-
- Figure 37: Financial analysis of Boldon James, 2011-15
- Company strategy
-
BT Group
-
- BT Global Services
- BT Business
- BT Consumer
- BT Wholesale
- Openreach
-
- Figure 38: Financial analysis of BT Group, 2011-15
-
- Figure 39: Turnover analysis of BT Group, 2013-15
- Company strategy
Bullguard
-
-
- Figure 40: Financial analysis of Bullguard, 2009-13
- Company strategy
-
Gemalto UK
-
-
- Figure 41: Turnover analysis of total Gemalto group, 2010-14
-
- Figure 42: Alternative revenue analysis of total Gemalto group, 2010-14
-
- Figure 43: Financial analysis of Gemalto UK, 2010-14
- Company strategy
-
Intel Corporation (UK)
-
-
- Figure 44: Financial analysis of Intel Corporation (UK), 2010-14
-
- Figure 45: Financial analysis of McAfee UK, 2010-14
- Company strategy
-
PA Consulting Group
-
-
- Figure 46: Financial analysis of PA Consulting Group, 2010-14
- Company strategy
-
Pinnacle Technology Group
-
-
- Figure 47: Financial analysis of Pinnacle Technology Group, 2010-14
-
- Figure 48: Turnover analysis of Pinnacle Technology Group, 2014
- Company strategy
-
QinetiQ Group
-
-
- Figure 49: Financial analysis of QinteQ Group, 2011-15
- Company strategy
-
Sophos Group
-
-
- Figure 50: Financial analysis of Sophos, 2012-15
- Company strategy
-
Symantec (UK)
-
-
- Figure 51: Financial analysis of Symantec (UK), 2010-14
- Company strategy
-
Ultra Electronics Group
-
-
- Figure 52: Financial analysis of Ultra Electronics Group, 2010-14
-
- Figure 53: Turnover analysis of Ultra Electronics, 2014
- Company strategy
-
Forecast
-
- Key points
- Market size
-
- Figure 54: UK forecast market for computer security, 2015-19
- Market segmentation
- Segmentation by end use sector
-
- Figure 55: Forecast segmentation of computer security, by end use sector, 2015-19
- Segmentation by solution sector
-
- Figure 56: Forecast segmentation of computer security, by solution type, 2015-19
- Segmentation by product/service
-
- Figure 57: Forecast segmentation of computer security, by product/service, 2015-19
Back to top