Table of Contents
Overview
-
- What you need to know
- Covered in this Report
Executive Summary
-
- The market
- A varied market
-
- Figure 1: Segmentation of the computer security market, by product/service 2018 (£ million)
- A large and growing market
-
- Figure 2: UK market for computer security products and services, 2014-18
- A market for every sector
-
- Figure 3: Segmentation of the computer security market, by end use sector, 2018 (£ million)
- A market with continued growth prospects
-
- Figure 4: Forecast market for computer security products and services, 2019-23
- Many market drivers
-
- Figure 5: Worldwide connected devices installed, 2015-17 actual and 2018-25 forecast
-
- Figure 6: The UK cloud computing market, 2014-18
- Companies and brands
- Fragmented industry offering a fragmented array of solutions
- UK industry boost
- What we think
Issues and Insights
-
- The Cloud – more or less secure?
- The facts
- The implications
- Computer threats are mobile too
- The facts
- The implications
- The Internet of Things gets targeted too
- The facts
- The implications
The Market – What You Need to Know
-
- A diverse market – not simply software
-
- Figure 7: Segmentation of the computer security market, 2018 (£ million)
- Cyber-crime and legislation driving market
- The variety of miscreants
Market Size
-
- Largest in Europe and still buoyant
-
- Figure 8: UK market for computer security products and services, (£ million)
- Cyber-crime concentrating minds
-
- Figure 9: Cyber-crime statistics, 2017-18 (year to June)
Market Segmentation by End Use
-
-
- Figure 10: Cyber security incidents reported to Information Commissioner’s Office, 2nd Q 2018/19
- Figure 11: Average investment in cyber security, by sector, 2018
-
- Figure 12: Segmentation of the computer security market, by end use sector, 2018 (£ million)
- Figure 13: Development of private sector computer security purchases, 2014-18
-
- Figure 14: Development of defence and intelligence computer security purchases, 2014-18
-
- Figure 15: Development of other public sector computer security purchases, 2014-18
-
Market Segmentation by Size of Company
-
-
- Figure 16: Segmentation of the private sector computer security market, by size of company, 2018 (£ million)
-
- Figure 17: Development of enterprise computer security purchases, 2014-18
-
- Figure 18: Development of SME and consumer computer security purchases, 2014-18
- Figure 19: Average investment in cyber security, by size of company, 2017 and 2018
-
- Figure 20: Proportion of companies with no cyber security spend, by size of company 2018
-
Market Segmentation by Solution
-
-
- Figure 21: Segmentation of the computer security market, by solution, 2018 (£ million)
- Figure 22: Development of computer security purchases of infrastructure, 2014-18
-
- Figure 23: Development of computer security purchases of systems security, 2014-18
-
- Figure 24: Development of computer security purchases of content security, 2014-18
-
- Figure 25: Development of computer security purchases of governance, 2014-18
-
Market Segmentation by Product/Service
-
-
- Figure 26: Segmentation of the computer security market, by product/service, 2014-18 (£ million)
-
Market Forecast
-
- Government encouragement
- Market development
-
- Figure 27: Forecast market for computer security products and services, 2019-23
- End-use growth
-
- Figure 28: Forecast end use market for computer security products and services, 2019-23
The Impact of the Economy
-
- GDP
-
- Figure 29: GDP overall quarterly development, Q1 2015-Q3 2018
-
- Figure 30: GDP quarterly development, by sector, 2004-18
- Figure 31: Forecast GDP development, 2018-23
- Household spending
-
- Figure 32: Quarterly household final consumption expenditure, 2013-18
Market Trends
-
- A worldwide issue
-
- Figure 33: Worldwide data breach incidents, by source or breach, 2013-18
- Figure 34: Nature of worldwide computer breach incidents and records, first half of 2018
-
- Figure 35: UK cyber security incidents, by type second Q 2018/19
- EU-wide GDPR
- The need for real-time cyber security
- Keeping up with artificial intelligence and machine learning
- Passwords to become past words
- Growing advance of the Internet of Things
-
- Figure 36: Worldwide connected devices installed, 2015-17 actual and 2018-25 forecast
Market Drivers
-
- Internet usage
-
- Figure 37: Worldwide Internet usage, by region, 2000-18 (million)
- Figure 38: Proportion of UK businesses with internet access, by size of company, 2017
- Website use by companies
-
- Figure 39: Proportion of UK businesses with websites, by size of business, 2017
- Business purchasing over the internet
-
- Figure 40: Proportion of UK businesses making e-commerce purchases, by size of business, 2017
- Figure 41: Proportion of UK businesses making e-commerce purchases, by industry, 2017
- Business selling over the Internet
-
- Figure 42: Proportion of UK businesses making website sales, by size of business, 2017
- Figure 43: Proportion of UK businesses making EDI sales, by size of business, 2017
-
- Figure 44: Proportion of UK businesses making e-commerce sales, by industry, 2017
- The Cloud
-
- Figure 45: The UK cloud computing market, 2014-18
-
- Figure 46: Proportion of UK businesses purchasing cloud computing services, 2017
- Figure 47: Proportion of UK businesses using servers exclusively reserved at service providers, 2017
-
- Figure 48: Proportion of UK businesses using shared servers at service providers, 2017
Companies and Brands – What You Need to Know
-
- Fragmented industry
- Combatting AI and ML supported attacks with AI and ML
Industry Structure
-
- Software
-
- Figure 49: Development of the business and domestic software industry, 2013-18
- Computer consultancy
-
- Figure 50: Development of the computer consultancy industry, 2013-18
- Computer/cyber security
Competitive Strategies
-
- Highly acquisitive sector – but it is not consolidated
- Diverse target markets and strategies
- Recurring income model
-
- Figure 51: Billing analysis of Sophos Group, 2018
- Routes to market change with target
Company Profiles
-
- BAe Systems
- Activity
- Performance
-
- Figure 52: Financial analysis of BAe Systems, 2013-17 (£ million)
- Strategy
- Cisco Systems
- Activity
- Performance
-
- Figure 53: Financial analysis of Cisco Systems Revenues, 2014-18 ($ billion)
- Strategy
- IBM
- Activity
- Performance
-
- Figure 54: Financial analysis of IBM United Kingdom, 2013-17 (£ million)
- Strategy
- McAfee
- Activity
- Performance
- Strategy
- Sophos Group
- Activity
- Performance
-
- Figure 55: Financial analysis of Sophos Group data, 2015-18 ($ million)
- Strategy
- Symantec Corporation
- Activity
- Performance
-
- Figure 56: Financial analysis of Symantec Security (UK), 2016-17 (£ 000)
- Strategy
Appendix – Data Sources, Abbreviations and Supporting Information
-
- Abbreviations
- Methodology
Back to top