Table of Contents
Executive Summary
-
- The market
-
- Figure 1: UK market for computer security, 2013-17 and forecast 2018-22
-
- Figure 2: Segmentation of computer security by end use sector, 2017
- Figure 3: Average investment in cyber security, by size of company, 2017
-
- Figure 4: Segmentation of computer security by solution type, 2017
- Figure 5: Segmentation of computer security by product/service, 2017
- Market factors
-
- Figure 6: UK cloud computing market, 2013-17
-
- Figure 7: Main reasons for investing in cyber security, 2017
- Companies
- What we think
Key Insights
-
- What is stimulating growth in the computer security market?
- How does computer security differ between end user sectors?
- What trends in computer breaches are evident?
Introduction
-
- Issues in the market
- Definitions
- Methodology
- Abbreviations
- Market positioning
UK Economy
-
- Overview
-
- Figure 8: Forecast GDP development 2017-22
-
- Figure 9: UK GDP quarterly development, 2004-17
- Inflation
- House prices
-
- Figure 10: UK house price changes, 2006-17
- Interest rates
- Consumer spending
- Manufacturing
-
- Figure 11: UK manufacturing, 2014-17
- Business investment
-
- Figure 12: UK GFCF 2003-17
- Imports
- Exports
Market Factors
-
- Key points
- Market factors
- The cloud
-
- Figure 13: UK cloud computing market, 2013-17
- Internet access and usage
-
- Figure 14: Worldwide internet usage, by region, 2010-17
-
- Figure 15: Proportion of businesses with internet access, by size of company, 2012-16
-
- Figure 16: Proportion of businesses with internet access and type of connection, by size of company, 2012-16
-
- Figure 17: Proportion of businesses by maximum contracted internet connection speed, by size of company, 2012-16
Market Size
-
- Key points
- Market size
-
- Figure 18: UK cyber security strategy spending, 2012-16
-
- Figure 19: UK market for computer security, 2013-17
Market Segmentation
-
- Key points
- Market segmentation
- Segmentation by end-use sector
-
- Figure 20: Segmentation of computer security by end use sector, 2013-17
-
- Figure 21: Average investment in cyber security by companies, by size of company, 2017
-
- Figure 22: Average investment in cyber security by companies, by business sector, 2017
- Segmentation by solution sector
-
- Figure 23: Segmentation of computer security by solution type, 2013-17
- Segmentation by product/service
-
- Figure 24: Segmentation of computer security by product/service, 2013-17
Market Trends
-
- Key points
- Market trends
-
- Figure 25: Data security incidents, by sector, 2016-17
-
- Figure 26: Cyber security incidents, by type, 2017
-
- Figure 27: Cyber security incidents, by sector, 2017
-
- Figure 28: Businesses seeking information, advice or guidance on cyber security threats, by size of company, 2017
- Figure 29: Business awareness of cyber security initiatives and standards, by size of company, 2017
-
- Figure 30: Main reasons for investing in cyber security, 2017
-
- Figure 31: Rules of controls implemented by businesses, 2017
Industry Structure
-
- Key points
- Industry development
-
- Figure 32: Analysis of the changes in the structure of the business and domestic software development industry, 2013-17
-
- Figure 33: Analysis of the changes in the structure of the computer consultancy industry, 2013-17
-
- Figure 34: Reported anti-malware application world market share, 2017
- Development by turnover
-
- Figure 35: Analysis of the financial structure of the business and domestic software development industry, 2016 and 2017
-
- Figure 36: Analysis of the financial structure of the computer consultancy industry, 2016 and 2017
- Development by employment level
-
- Figure 37: Analysis of the employment structure of the computer consultancy industry, 2016 and 2017
-
- Figure 38: Analysis of the employment structure of the business and domestic software development industry, 2016 and 2017
- Company profiles
Avecto
-
-
- Figure 39: Financial analysis of Avecto UK, 2013-16
- Company strategy
-
AVG Technologies UK/Avast Software
-
-
- Figure 40: Financial analysis of AVG Technologies UK, 2011-15
- Company strategy
-
BAE Systems
-
-
- Figure 41: Financial analysis of BAE Systems, 2012-16
-
- Figure 42: Geographic turnover segmentation of BAE Systems, 2016
-
- Figure 43: Activity turnover segmentation of BAE Systems, 2016
- Cyber and intelligence activities
-
- Figure 44: Sales segmentation of BAE Systems’ Intelligence & Security activities, 2016
-
- Figure 45: Sales segmentation of BAE Systems’ Applied Intelligence activities, 2016
- Company strategy
-
Bitdefender
-
-
- Figure 46: Financial analysis of Bitdefender, 2010-14
- Company strategy
-
Boldon James
-
-
- Figure 47: Financial analysis of Boldon James, 2013-17
- Company strategy
-
BT Group
-
-
- Figure 48: Financial analysis of BT Group, 2013-17
-
- Figure 49: Turnover analysis of BT Group, 2017
- BT Global Services
-
- Figure 50: Regional analysis of BT Global Services, 2017
- Company strategy
-
Bullguard
-
-
- Figure 51: Financial analysis of Bullguard, 2012-16
- Company strategy
-
Intel Corporation (UK)/McAfee
-
-
- Figure 52: Financial analysis of Intel Corporation (UK), 2011-15
-
- Figure 53: Financial analysis of Intel Corporation (UK), 2016
-
- Figure 54: Financial analysis of McAfee UK, 2011-15
- Company strategy
-
QinetiQ Group
-
-
- Figure 55: Financial analysis of QinteQ Group, 2013-17
-
- Figure 56: Turnover analysis of EMEA Services division of QinteQ Group, 2017
-
- Figure 57: Turnover analysis of Global Products division of QinteQ Group, 2017
- Company strategy
-
Sophos Group
-
-
- Figure 58: Financial analysis of Sophos Group, 2015-17
-
- Figure 59: Regional revenues by the Sophos Group, 2017
-
- Figure 60: Product revenues by the Sophos Group, 2017
-
- Figure 61: Revenue types by the Sophos Group, 2017
- Company strategy
-
Symantec
-
-
- Figure 62: Turnover analysis of Symantec, 2013-17
-
- Figure 63: Turnover analysis of Symantec, by sector, 2017
- Company strategy
-
Ultra Electronics Group
-
-
- Figure 64: Financial analysis of Ultra Electronics Holdings, 2012-16
-
- Figure 65: Turnover analysis of Ultra Electronics, by region, 2016
- Company strategy
-
Forecast
-
- Key points
- Market size
-
- Figure 66: UK forecast market for computer security, 2018-22
- Market segmentation
- Segmentation by end use sector
-
- Figure 67: Forecast segmentation of computer security by end use sector, 2018-22
- Segmentation by solution sector
-
- Figure 68: Forecast segmentation of computer security by solution type, 2018-22
- Segmentation by product/service
-
- Figure 69: Forecast segmentation of computer security by product/service, 2018-22
Back to top