Table of Contents
Executive Summary
-
- The market
-
- Figure 1: UK market for computer security, 2012-16 and forecast 2017-2021
- Figure 2: Segmentation of computer security by end use sector, 2016
-
- Figure 3: Segmentation of computer security by solution type, 2016
- Figure 4: Segmentation of computer security by product/service, 2016
- Market factors
-
- Figure 5: UK cloud computing market, 2012-16
-
- Figure 6: Data security incidents, by sector, 2016
- Consumer research
-
- Figure 7: Anti-virus protection use, September 2016
- Companies
- What we think
Key Issues
-
- What are the growth factors for the computer security market?
- What are the obstacles to growth?
- What trends in computer breaches are evident?
Introduction
-
- Issues in the market
- Definitions
- Methodology
- Abbreviations
- Market positioning
UK Economy
-
- UK economy
- Overview
-
- Figure 8: UK GDP quarterly development, 2003-16
-
- Figure 9: UK GDP in economic downturns and recoveries since 1979
- Inflation
- Interest rates
- House prices
-
- Figure 10: UK House price changes, 2006-2016
- Consumer spending
- Manufacturing
-
- Figure 11: UK manufacturing, 2014-16
- Business investment
-
- Figure 12: UK GFCF 2003-16
- Imports
- Exports
Market Factors
-
- Key analysis
- Market factors
- The major factors
- Internet access and usage
-
- Figure 13: Worldwide Internet usage, by region, 2010-16
-
- Figure 14: Proportion of businesses with Internet access, by size of company, 2011-15
-
- Figure 15: Proportion of businesses with broadband, by size of company, 2011-15
-
- Figure 16: Proportion of businesses by maximum contracted Internet connection speed, by size of company, 2011-15
- Cloud computing
-
- Figure 17: UK cloud computing market, 2012-16
Market Size
-
- Key analysis
- Market size
-
- Figure 18: UK Cyber Security Strategy Spending, 2012-16
-
- Figure 19: UK market for computer security, 2012-16
Market Segmentation
-
- Key analysis
- Market segmentation
- Segmentation by end use sector
-
- Figure 20: Segmentation of computer security by end use sector, 2012-16
- Segmentation by solution sector
-
- Figure 21: Segmentation of computer security by solution type, 2012-16
- Segmentation by product/service
-
- Figure 22: Segmentation of computer security by product/service, 2012-16
Market Trends
-
- Key analysis
- Market trends
-
- Figure 23: Data security incidents, by sector, 2016
- Figure 24: Data security incidents, by type, 2016
Industry Structure
-
- Key analysis
- Industry development
-
- Figure 25: Analysis of changes in the structure of the business and domestic software development industry, 2012-16
-
- Figure 26: Analysis of changes in the structure of the computer consultancy industry, 2012-16
- Development by turnover
-
- Figure 27: Analysis of the financial structure of the business and domestic software development industry, 2015 and 2016
-
- Figure 28: Analysis of the financial structure of the computer consultancy industry, 2015 and 2016
- Development by employment level
-
- Figure 29: Analysis of the employment structure of the computer consultancy industry, 2015 and 2016
-
- Figure 30: Analysis of the employment structure of the business and domestic software development industry, 2015 and 2016
- Company profiles
Avecto
-
-
- Figure 31: Financial analysis of Avecto UK, 2013-15
- Company strategy
-
AVG Technologies UK
-
-
- Figure 32: Financial analysis of AVG Technologies UK, 2011-15
- Company strategy
-
BAE Systems
-
-
- Figure 33: Financial analysis of BAE Systems, 2011-15
-
- Figure 34: Geographic turnover segmentation of BAE Systems, 2015
-
- Figure 35: Activity turnover segmentation of BAE Systems, 2015
- Cyber and intelligence activities
-
- Figure 36: Activity turnover segmentation of BAE Systems’ Cyber & Intelligence activities, 2015
- Company strategy
-
Bitdefender
-
-
- Figure 37: Financial analysis of Bitdefender, 2010-14
- Company strategy
-
Boldon James
-
-
- Figure 38: Financial analysis of Boldon James, 2012-16
- Company strategy
-
BT Group
-
-
- Figure 39: Financial analysis of BT Group, 2012-16
-
- Figure 40: Turnover analysis of BT Group, 2016
- BT Global Services
-
- Figure 41: Regional analysis of BT Global Services, 2016
-
- Figure 42: Sector analysis of BT Global Services, 2016
- BT Business
- BT Consumer
- EE
-
- Figure 43: Mobile market in the UK, by operator, 2015
- BT Wholesale
- Openreach
- Company strategy
-
Bullguard
-
-
- Figure 44: Financial analysis of Bullguard, 2011-15
- Company strategy
-
Intel Corporation (UK)
-
-
- Figure 45: Financial analysis of Intel Corporation (UK), 2011-15
-
- Figure 46: Financial analysis of McAfee UK, 2011-15
- Company strategy
-
adept4 (Pinnacle Technology Group)
-
-
- Figure 47: Financial analysis of Pinnacle Technology Group, 2011-15
-
- Figure 48: Turnover analysis of Pinnacle Technology Group, 2015
- Company strategy
-
QinetiQ Group
-
-
- Figure 49: Financial analysis of QinteQ Group, 2012-16
-
- Figure 50: Turnover analysis of QinteQ Group, by customer, 2016
-
- Figure 51: Turnover analysis of QinteQ Group, by domain, 2016
- Company strategy
-
Sophos Group
-
-
- Figure 52: Financial analysis of Sophos, 2012-16
- Company strategy
-
Symantec (UK)
-
-
- Figure 53: Financial analysis of Symantec (UK), 2011-15
- Company strategy
-
Ultra Electronics Group
-
-
- Figure 54: Financial analysis of Ultra Electronics Holdings, 2011-15
-
- Figure 55: Turnover analysis of Ultra Electronics, by region, 2015
-
- Figure 56: Turnover analysis of Ultra Electronics, by activity, 2015
- Company strategy
-
Consumer Research
-
- Market data
- Ownership of devices
-
- Figure 57: Ownership of devices, September 2016
- Use of Technology
-
- Figure 58: Use of technology, September 2016
- Type of protection
-
- Figure 59: Type of protection, September 2016
- Anti-virus protection awareness
-
- Figure 60: Anti-virus protection awareness, September 2016
- Anti-virus protection use
-
- Figure 61: Anti-virus protection use, September 2016
Forecast
-
- Key analysis
- Market size
-
- Figure 62: UK forecast market for computer security, 2017-21
- Market segmentation
- Segmentation by end-use sector
-
- Figure 63: Forecast segmentation of computer security by end use sector, 2017-21
- Segmentation by solution sector
-
- Figure 64: Forecast segmentation of computer security by solution type, 2017-21
- Segmentation by product/service
-
- Figure 65: Forecast segmentation of computer security by product/service, 2017-21
Back to top