• レポートコード:MRC2-11QY11571 • 出版社/出版日:QYResearch / 2020年11月25日 ※2024年版があります。お問い合わせください。 • レポート形態:英文、PDF、129ページ • 納品方法:Eメール(納期:2~3日) • 産業分類:情報技術・通信 |
Single User | ¥585,000 (USD3,900) | ▷ お問い合わせ |
Multi User | ¥877,500 (USD5,850) | ▷ お問い合わせ |
Enterprise License | ¥1,170,000 (USD7,800) | ▷ お問い合わせ |
• お支払方法:銀行振込(納品後、ご請求書送付)
レポート概要
当調査資料はデータ漏洩のグローバル市場について調査・分析したレポートです。種類別(ユーザーアクティビティ監視、ウイルス対策/マルウェア対策、ファイアウォール、侵入検知システム/侵入防止システム(IDS/IPS)、暗号化、データ損失防止(DLP)、その他)市場規模、用途別(金融、政府・防衛、小売・eコマース、IT・通信、医療・ライフサイエンス、製造、エネルギー・ユーティリティ、その他)市場規模、地域別(北米、米国、カナダ、ヨーロッパ、ドイツ、フランス、イギリス、イタリア、ロシア、アジア、日本、中国、韓国、インド、オーストラリア、台湾、中南米、メキシコ、ブラジル、アルゼンチン、中東・アフリカ、トルコ、サウジアラビア、UAE等)市場規模データ、主な企業情報と企業別市場シェア等が収録されています。 ・調査範囲 ・エグゼクティブサマリー ・企業別データ漏洩の競争状況、市場シェア ・世界のデータ漏洩市場:種類別市場規模 2015年-2020年(ユーザーアクティビティ監視、ウイルス対策/マルウェア対策、ファイアウォール、侵入検知システム/侵入防止システム(IDS/IPS)、暗号化、データ損失防止(DLP)、その他) ・世界のデータ漏洩市場:種類別市場規模予測 2021年-2026年(ユーザーアクティビティ監視、ウイルス対策/マルウェア対策、ファイアウォール、侵入検知システム/侵入防止システム(IDS/IPS)、暗号化、データ損失防止(DLP)、その他) ・世界のデータ漏洩市場:用途別市場規模 2015年-2020年(金融、政府・防衛、小売・eコマース、IT・通信、医療・ライフサイエンス、製造、エネルギー・ユーティリティ、その他) ・世界のデータ漏洩市場:用途別市場規模予測 2021年-2026年(金融、政府・防衛、小売・eコマース、IT・通信、医療・ライフサイエンス、製造、エネルギー・ユーティリティ、その他) ・北米のデータ漏洩市場分析:米国、カナダ ・ヨーロッパのデータ漏洩市場分析:ドイツ、フランス、イギリス、イタリア、ロシア等 ・アジアのデータ漏洩市場分析:日本、中国、韓国、インド、オーストラリア、台湾等 ・中南米のデータ漏洩市場分析:メキシコ、ブラジル、アルゼンチン等 ・中東・アフリカのデータ漏洩市場分析:トルコ、サウジアラビア、UAE等 ・企業情報(企業概要、製品概要、販売量、企業動向) - 掲載企業(変更可能性あり):Symantec、Mcafee、Palo Alto Networks、Fortinet、Zscaler、Sophos、Trend Micro、Check Point Software Technologies、Juniper Networks、Fireeye、Digital Guardian、Barracuda Networks、Forcepoint、Iboss、Alert Logic、Cisco、GTB、Hillstone Networks、Clearswift (Ruag)、Netwrix ・地域別市場規模予測(2021年-2026年):北米市場、ヨーロッパ市場、アジア市場、中南米市場、中東・アフリカ市場 ・市場機会、課題、リスク、環境分析 ・バリューチェーン、販売チャネル分析 ・調査の結論 |
Data exfiltration, also called data extrusion, is the unauthorized transfer of data from a computer. Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network.
North America is estimated to hold the largest market size in 2018. The increasing need for organizations to reduce the misuse of the internet and enhance their employees’ productivity, and addressing the incidents of attacks on enterprises’ IT infrastructures are expected to drive the data exfiltration market. Furthermore, rapid economic growth in the major countries, along with regulatory reforms and economic stability, is expected to drive the market in Asia Pacific (APAC). In the Middle East and Africa (MEA) region, enterprises in a range of verticals, such as Banking, Financial Services, and Insurance (BFSI), government, education, and manufacturing, are expected to increase their investments in data exfiltration solutions and services.
Market Analysis and Insights: Global Data Exfiltration Market
The global Data Exfiltration market size is projected to reach US$ 49720 million by 2026, from US$ 46400 million in 2020, at a CAGR of 6.6%% during 2021-2026.
Global Data Exfiltration Scope and Market Size
Data Exfiltration market is segmented by Type, and by Application. Players, stakeholders, and other participants in the global Data Exfiltration market will be able to gain the upper hand as they use the report as a powerful resource. The segmental analysis focuses on revenue and forecast by Type and by Application in terms of revenue and forecast for the period 2015-2026.
The key players covered in this study
Symantec
Mcafee
Palo Alto Networks
Fortinet
Zscaler
Sophos
Trend Micro
Check Point Software Technologies
Juniper Networks
Fireeye
Digital Guardian
Barracuda Networks
Forcepoint
Iboss
Alert Logic
Cisco
GTB
Hillstone Networks
Clearswift (Ruag)
Netwrix
Market segment by Type, the product can be split into
User Activity Monitoring
Antivirus/Anti-malware
Firewall
Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
Encryption
Data Loss Prevention (DLP)
Others
Market segment by Application, split into
BFSI
Government and Defense
Retail and eCommerce
IT and Telecom
Healthcare and Life Sciences
Manufacturing
Energy and Utilities
Others
Market segment by Regions/Countries, this report covers
North America
Europe
China
Japan
Southeast Asia
India
1 Report Overview
1.1 Study Scope
1.2 Key Market Segments
1.3 Players Covered: Ranking by Data Exfiltration Revenue
1.4 Market by Type
1.4.1 Global Data Exfiltration Market Size Growth Rate by Type: 2020 VS 2026
1.4.2 User Activity Monitoring
1.4.3 Antivirus/Anti-malware
1.4.4 Firewall
1.4.5 Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
1.4.6 Encryption
1.4.7 Data Loss Prevention (DLP)
1.4.8 Others
1.5 Market by Application
1.5.1 Global Data Exfiltration Market Share by Application: 2020 VS 2026
1.5.2 BFSI
1.5.3 Government and Defense
1.5.4 Retail and eCommerce
1.5.5 IT and Telecom
1.5.6 Healthcare and Life Sciences
1.5.7 Manufacturing
1.5.8 Energy and Utilities
1.5.9 Others
1.6 Study Objectives
1.7 Years Considered
2 Global Growth Trends
2.1 Global Data Exfiltration Market Perspective (2015-2026)
2.2 Global Data Exfiltration Growth Trends by Regions
2.2.1 Data Exfiltration Market Size by Regions: 2015 VS 2020 VS 2026
2.2.2 Data Exfiltration Historic Market Share by Regions (2015-2020)
2.2.3 Data Exfiltration Forecasted Market Size by Regions (2021-2026)
2.3 Industry Trends and Growth Strategy
2.3.1 Market Top Trends
2.3.2 Market Drivers
2.3.3 Market Challenges
2.3.4 Porter’s Five Forces Analysis
2.3.5 Data Exfiltration Market Growth Strategy
2.3.6 Primary Interviews with Key Data Exfiltration Players (Opinion Leaders)
3 Competition Landscape by Key Players
3.1 Global Top Data Exfiltration Players by Market Size
3.1.1 Global Top Data Exfiltration Players by Revenue (2015-2020)
3.1.2 Global Data Exfiltration Revenue Market Share by Players (2015-2020)
3.1.3 Global Data Exfiltration Market Share by Company Type (Tier 1, Tier 2 and Tier 3)
3.2 Global Data Exfiltration Market Concentration Ratio
3.2.1 Global Data Exfiltration Market Concentration Ratio (CR5 and HHI)
3.2.2 Global Top 10 and Top 5 Companies by Data Exfiltration Revenue in 2019
3.3 Data Exfiltration Key Players Head office and Area Served
3.4 Key Players Data Exfiltration Product Solution and Service
3.5 Date of Enter into Data Exfiltration Market
3.6 Mergers & Acquisitions, Expansion Plans
4 Market Size by Type (2015-2026)
4.1 Global Data Exfiltration Historic Market Size by Type (2015-2020)
4.2 Global Data Exfiltration Forecasted Market Size by Type (2021-2026)
5 Market Size by Application (2015-2026)
5.1 Global Data Exfiltration Market Size by Application (2015-2020)
5.2 Global Data Exfiltration Forecasted Market Size by Application (2021-2026)
6 North America
6.1 North America Data Exfiltration Market Size (2015-2020)
6.2 Data Exfiltration Key Players in North America (2019-2020)
6.3 North America Data Exfiltration Market Size by Type (2015-2020)
6.4 North America Data Exfiltration Market Size by Application (2015-2020)
7 Europe
7.1 Europe Data Exfiltration Market Size (2015-2020)
7.2 Data Exfiltration Key Players in Europe (2019-2020)
7.3 Europe Data Exfiltration Market Size by Type (2015-2020)
7.4 Europe Data Exfiltration Market Size by Application (2015-2020)
8 China
8.1 China Data Exfiltration Market Size (2015-2020)
8.2 Data Exfiltration Key Players in China (2019-2020)
8.3 China Data Exfiltration Market Size by Type (2015-2020)
8.4 China Data Exfiltration Market Size by Application (2015-2020)
9 Japan
9.1 Japan Data Exfiltration Market Size (2015-2020)
9.2 Data Exfiltration Key Players in Japan (2019-2020)
9.3 Japan Data Exfiltration Market Size by Type (2015-2020)
9.4 Japan Data Exfiltration Market Size by Application (2015-2020)
10 Southeast Asia
10.1 Southeast Asia Data Exfiltration Market Size (2015-2020)
10.2 Data Exfiltration Key Players in Southeast Asia (2019-2020)
10.3 Southeast Asia Data Exfiltration Market Size by Type (2015-2020)
10.4 Southeast Asia Data Exfiltration Market Size by Application (2015-2020)
11 India
11.1 India Data Exfiltration Market Size (2015-2020)
11.2 Data Exfiltration Key Players in India (2019-2020)
11.3 India Data Exfiltration Market Size by Type (2015-2020)
11.4 India Data Exfiltration Market Size by Application (2015-2020)
12 Central & South America
12.1 Central & South America Data Exfiltration Market Size (2015-2020)
12.2 Data Exfiltration Key Players in Central & South America (2019-2020)
12.3 Central & South America Data Exfiltration Market Size by Type (2015-2020)
12.4 Central & South America Data Exfiltration Market Size by Application (2015-2020)
13 Key Players Profiles
13.1 Symantec
13.1.1 Symantec Company Details
13.1.2 Symantec Business Overview
13.1.3 Symantec Data Exfiltration Introduction
13.1.4 Symantec Revenue in Data Exfiltration Business (2015-2020))
13.1.5 Symantec Recent Development
13.2 Mcafee
13.2.1 Mcafee Company Details
13.2.2 Mcafee Business Overview
13.2.3 Mcafee Data Exfiltration Introduction
13.2.4 Mcafee Revenue in Data Exfiltration Business (2015-2020)
13.2.5 Mcafee Recent Development
13.3 Palo Alto Networks
13.3.1 Palo Alto Networks Company Details
13.3.2 Palo Alto Networks Business Overview
13.3.3 Palo Alto Networks Data Exfiltration Introduction
13.3.4 Palo Alto Networks Revenue in Data Exfiltration Business (2015-2020)
13.3.5 Palo Alto Networks Recent Development
13.4 Fortinet
13.4.1 Fortinet Company Details
13.4.2 Fortinet Business Overview
13.4.3 Fortinet Data Exfiltration Introduction
13.4.4 Fortinet Revenue in Data Exfiltration Business (2015-2020)
13.4.5 Fortinet Recent Development
13.5 Zscaler
13.5.1 Zscaler Company Details
13.5.2 Zscaler Business Overview
13.5.3 Zscaler Data Exfiltration Introduction
13.5.4 Zscaler Revenue in Data Exfiltration Business (2015-2020)
13.5.5 Zscaler Recent Development
13.6 Sophos
13.6.1 Sophos Company Details
13.6.2 Sophos Business Overview
13.6.3 Sophos Data Exfiltration Introduction
13.6.4 Sophos Revenue in Data Exfiltration Business (2015-2020)
13.6.5 Sophos Recent Development
13.7 Trend Micro
13.7.1 Trend Micro Company Details
13.7.2 Trend Micro Business Overview
13.7.3 Trend Micro Data Exfiltration Introduction
13.7.4 Trend Micro Revenue in Data Exfiltration Business (2015-2020)
13.7.5 Trend Micro Recent Development
13.8 Check Point Software Technologies
13.8.1 Check Point Software Technologies Company Details
13.8.2 Check Point Software Technologies Business Overview
13.8.3 Check Point Software Technologies Data Exfiltration Introduction
13.8.4 Check Point Software Technologies Revenue in Data Exfiltration Business (2015-2020)
13.8.5 Check Point Software Technologies Recent Development
13.9 Juniper Networks
13.9.1 Juniper Networks Company Details
13.9.2 Juniper Networks Business Overview
13.9.3 Juniper Networks Data Exfiltration Introduction
13.9.4 Juniper Networks Revenue in Data Exfiltration Business (2015-2020)
13.9.5 Juniper Networks Recent Development
13.10 Fireeye
13.10.1 Fireeye Company Details
13.10.2 Fireeye Business Overview
13.10.3 Fireeye Data Exfiltration Introduction
13.10.4 Fireeye Revenue in Data Exfiltration Business (2015-2020)
13.10.5 Fireeye Recent Development
13.11 Digital Guardian
10.11.1 Digital Guardian Company Details
10.11.2 Digital Guardian Business Overview
10.11.3 Digital Guardian Data Exfiltration Introduction
10.11.4 Digital Guardian Revenue in Data Exfiltration Business (2015-2020)
10.11.5 Digital Guardian Recent Development
13.12 Barracuda Networks
10.12.1 Barracuda Networks Company Details
10.12.2 Barracuda Networks Business Overview
10.12.3 Barracuda Networks Data Exfiltration Introduction
10.12.4 Barracuda Networks Revenue in Data Exfiltration Business (2015-2020)
10.12.5 Barracuda Networks Recent Development
13.13 Forcepoint
10.13.1 Forcepoint Company Details
10.13.2 Forcepoint Business Overview
10.13.3 Forcepoint Data Exfiltration Introduction
10.13.4 Forcepoint Revenue in Data Exfiltration Business (2015-2020)
10.13.5 Forcepoint Recent Development
13.14 Iboss
10.14.1 Iboss Company Details
10.14.2 Iboss Business Overview
10.14.3 Iboss Data Exfiltration Introduction
10.14.4 Iboss Revenue in Data Exfiltration Business (2015-2020)
10.14.5 Iboss Recent Development
13.15 Alert Logic
10.15.1 Alert Logic Company Details
10.15.2 Alert Logic Business Overview
10.15.3 Alert Logic Data Exfiltration Introduction
10.15.4 Alert Logic Revenue in Data Exfiltration Business (2015-2020)
10.15.5 Alert Logic Recent Development
13.16 Cisco
10.16.1 Cisco Company Details
10.16.2 Cisco Business Overview
10.16.3 Cisco Data Exfiltration Introduction
10.16.4 Cisco Revenue in Data Exfiltration Business (2015-2020)
10.16.5 Cisco Recent Development
13.17 GTB
10.17.1 GTB Company Details
10.17.2 GTB Business Overview
10.17.3 GTB Data Exfiltration Introduction
10.17.4 GTB Revenue in Data Exfiltration Business (2015-2020)
10.17.5 GTB Recent Development
13.18 Hillstone Networks
10.18.1 Hillstone Networks Company Details
10.18.2 Hillstone Networks Business Overview
10.18.3 Hillstone Networks Data Exfiltration Introduction
10.18.4 Hillstone Networks Revenue in Data Exfiltration Business (2015-2020)
10.18.5 Hillstone Networks Recent Development
13.19 Clearswift (Ruag)
10.19.1 Clearswift (Ruag) Company Details
10.19.2 Clearswift (Ruag) Business Overview
10.19.3 Clearswift (Ruag) Data Exfiltration Introduction
10.19.4 Clearswift (Ruag) Revenue in Data Exfiltration Business (2015-2020)
10.19.5 Clearswift (Ruag) Recent Development
13.20 Netwrix
10.20.1 Netwrix Company Details
10.20.2 Netwrix Business Overview
10.20.3 Netwrix Data Exfiltration Introduction
10.20.4 Netwrix Revenue in Data Exfiltration Business (2015-2020)
10.20.5 Netwrix Recent Development
14 Analyst’s Viewpoints/Conclusions
15 Appendix
15.1 Research Methodology
15.1.1 Methodology/Research Approach
15.1.2 Data Source
15.2 Disclaimer
15.3 Author Details
Table 1. Data Exfiltration Key Market Segments
Table 2. Key Players Covered: Ranking by Data Exfiltration Revenue
Table 3. Ranking of Global Top Data Exfiltration Manufacturers by Revenue (US$ Million) in 2019
Table 4. Global Data Exfiltration Market Size Growth Rate by Type (US$ Million): 2020 VS 2026
Table 5. Key Players of User Activity Monitoring
Table 6. Key Players of Antivirus/Anti-malware
Table 7. Key Players of Firewall
Table 8. Key Players of Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
Table 9. Key Players of Encryption
Table 10. Key Players of Data Loss Prevention (DLP)
Table 11. Key Players of Others
Table 12. Global Data Exfiltration Market Size Growth by Application (US$ Million): 2020 VS 2026
Table 13. Global Data Exfiltration Market Size by Regions (US$ Million): 2020 VS 2026
Table 14. Global Data Exfiltration Market Size by Regions (2015-2020) (US$ Million)
Table 15. Global Data Exfiltration Market Share by Regions (2015-2020)
Table 16. Global Data Exfiltration Forecasted Market Size by Regions (2021-2026) (US$ Million)
Table 17. Global Data Exfiltration Market Share by Regions (2021-2026)
Table 18. Market Top Trends
Table 19. Key Drivers: Impact Analysis
Table 20. Key Challenges
Table 21. Data Exfiltration Market Growth Strategy
Table 22. Main Points Interviewed from Key Data Exfiltration Players
Table 23. Global Data Exfiltration Revenue by Players (2015-2020) (Million US$)
Table 24. Global Data Exfiltration Market Share by Players (2015-2020)
Table 25. Global Top Data Exfiltration Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Data Exfiltration as of 2019)
Table 26. Global Data Exfiltration by Players Market Concentration Ratio (CR5 and HHI)
Table 27. Key Players Headquarters and Area Served
Table 28. Key Players Data Exfiltration Product Solution and Service
Table 29. Date of Enter into Data Exfiltration Market
Table 30. Mergers & Acquisitions, Expansion Plans
Table 31. Global Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 32. Global Data Exfiltration Market Size Share by Type (2015-2020)
Table 33. Global Data Exfiltration Revenue Market Share by Type (2021-2026)
Table 34. Global Data Exfiltration Market Size Share by Application (2015-2020)
Table 35. Global Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 36. Global Data Exfiltration Market Size Share by Application (2021-2026)
Table 37. North America Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 38. North America Key Players Data Exfiltration Market Share (2019-2020)
Table 39. North America Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 40. North America Data Exfiltration Market Share by Type (2015-2020)
Table 41. North America Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 42. North America Data Exfiltration Market Share by Application (2015-2020)
Table 43. Europe Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 44. Europe Key Players Data Exfiltration Market Share (2019-2020)
Table 45. Europe Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 46. Europe Data Exfiltration Market Share by Type (2015-2020)
Table 47. Europe Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 48. Europe Data Exfiltration Market Share by Application (2015-2020)
Table 49. China Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 50. China Key Players Data Exfiltration Market Share (2019-2020)
Table 51. China Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 52. China Data Exfiltration Market Share by Type (2015-2020)
Table 53. China Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 54. China Data Exfiltration Market Share by Application (2015-2020)
Table 55. Japan Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 56. Japan Key Players Data Exfiltration Market Share (2019-2020)
Table 57. Japan Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 58. Japan Data Exfiltration Market Share by Type (2015-2020)
Table 59. Japan Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 60. Japan Data Exfiltration Market Share by Application (2015-2020)
Table 61. Southeast Asia Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 62. Southeast Asia Key Players Data Exfiltration Market Share (2019-2020)
Table 63. Southeast Asia Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 64. Southeast Asia Data Exfiltration Market Share by Type (2015-2020)
Table 65. Southeast Asia Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 66. Southeast Asia Data Exfiltration Market Share by Application (2015-2020)
Table 67. India Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 68. India Key Players Data Exfiltration Market Share (2019-2020)
Table 69. India Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 70. India Data Exfiltration Market Share by Type (2015-2020)
Table 71. India Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 72. India Data Exfiltration Market Share by Application (2015-2020)
Table 73. Central & South America Key Players Data Exfiltration Revenue (2019-2020) (Million US$)
Table 74. Central & South America Key Players Data Exfiltration Market Share (2019-2020)
Table 75. Central & South America Data Exfiltration Market Size by Type (2015-2020) (Million US$)
Table 76. Central & South America Data Exfiltration Market Share by Type (2015-2020)
Table 77. Central & South America Data Exfiltration Market Size by Application (2015-2020) (Million US$)
Table 78. Central & South America Data Exfiltration Market Share by Application (2015-2020)
Table 79. Symantec Company Details
Table 80. Symantec Business Overview
Table 81. Symantec Product
Table 82. Symantec Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 83. Symantec Recent Development
Table 84. Mcafee Company Details
Table 85. Mcafee Business Overview
Table 86. Mcafee Product
Table 87. Mcafee Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 88. Mcafee Recent Development
Table 89. Palo Alto Networks Company Details
Table 90. Palo Alto Networks Business Overview
Table 91. Palo Alto Networks Product
Table 92. Palo Alto Networks Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 93. Palo Alto Networks Recent Development
Table 94. Fortinet Company Details
Table 95. Fortinet Business Overview
Table 96. Fortinet Product
Table 97. Fortinet Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 98. Fortinet Recent Development
Table 99. Zscaler Company Details
Table 100. Zscaler Business Overview
Table 101. Zscaler Product
Table 102. Zscaler Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 103. Zscaler Recent Development
Table 104. Sophos Company Details
Table 105. Sophos Business Overview
Table 106. Sophos Product
Table 107. Sophos Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 108. Sophos Recent Development
Table 109. Trend Micro Company Details
Table 110. Trend Micro Business Overview
Table 111. Trend Micro Product
Table 112. Trend Micro Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 113. Trend Micro Recent Development
Table 114. Check Point Software Technologies Business Overview
Table 115. Check Point Software Technologies Product
Table 116. Check Point Software Technologies Company Details
Table 117. Check Point Software Technologies Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 118. Check Point Software Technologies Recent Development
Table 119. Juniper Networks Company Details
Table 120. Juniper Networks Business Overview
Table 121. Juniper Networks Product
Table 122. Juniper Networks Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 123. Juniper Networks Recent Development
Table 124. Fireeye Company Details
Table 125. Fireeye Business Overview
Table 126. Fireeye Product
Table 127. Fireeye Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 128. Fireeye Recent Development
Table 129. Digital Guardian Company Details
Table 130. Digital Guardian Business Overview
Table 131. Digital Guardian Product
Table 132. Digital Guardian Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 133. Digital Guardian Recent Development
Table 134. Barracuda Networks Company Details
Table 135. Barracuda Networks Business Overview
Table 136. Barracuda Networks Product
Table 137. Barracuda Networks Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 138. Barracuda Networks Recent Development
Table 139. Forcepoint Company Details
Table 140. Forcepoint Business Overview
Table 141. Forcepoint Product
Table 142. Forcepoint Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 143. Forcepoint Recent Development
Table 144. Iboss Company Details
Table 145. Iboss Business Overview
Table 146. Iboss Product
Table 147. Iboss Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 148. Iboss Recent Development
Table 149. Alert Logic Company Details
Table 150. Alert Logic Business Overview
Table 151. Alert Logic Product
Table 152. Alert Logic Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 153. Alert Logic Recent Development
Table 154. Cisco Company Details
Table 155. Cisco Business Overview
Table 156. Cisco Product
Table 157. Cisco Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 158. Cisco Recent Development
Table 159. GTB Company Details
Table 160. GTB Business Overview
Table 161. GTB Product
Table 162. GTB Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 163. GTB Recent Development
Table 164. Hillstone Networks Company Details
Table 165. Hillstone Networks Business Overview
Table 166. Hillstone Networks Product
Table 167. Hillstone Networks Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 168. Hillstone Networks Recent Development
Table 169. Clearswift (Ruag) Company Details
Table 170. Clearswift (Ruag) Business Overview
Table 171. Clearswift (Ruag) Product
Table 172. Clearswift (Ruag) Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 173. Clearswift (Ruag) Recent Development
Table 174. Netwrix Company Details
Table 175. Netwrix Business Overview
Table 176. Netwrix Product
Table 177. Netwrix Revenue in Data Exfiltration Business (2015-2020) (Million US$)
Table 178. Netwrix Recent Development
Table 179. Research Programs/Design for This Report
Table 180. Key Data Information from Secondary Sources
Table 181. Key Data Information from Primary Sources
List of Figures
Figure 1. Global Data Exfiltration Market Share by Type: 2020 VS 2026
Figure 2. User Activity Monitoring Features
Figure 3. Antivirus/Anti-malware Features
Figure 4. Firewall Features
Figure 5. Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Features
Figure 6. Encryption Features
Figure 7. Data Loss Prevention (DLP) Features
Figure 8. Others Features
Figure 9. Global Data Exfiltration Market Share by Application: 2020 VS 2026
Figure 10. BFSI Case Studies
Figure 11. Government and Defense Case Studies
Figure 12. Retail and eCommerce Case Studies
Figure 13. IT and Telecom Case Studies
Figure 14. Healthcare and Life Sciences Case Studies
Figure 15. Manufacturing Case Studies
Figure 16. Energy and Utilities Case Studies
Figure 17. Others Case Studies
Figure 18. Data Exfiltration Report Years Considered
Figure 19. Global Data Exfiltration Market Size YoY Growth 2015-2026 (US$ Million)
Figure 20. Global Data Exfiltration Market Share by Regions: 2020 VS 2026
Figure 21. Global Data Exfiltration Market Share by Regions (2021-2026)
Figure 22. Porter's Five Forces Analysis
Figure 23. Global Data Exfiltration Market Share by Players in 2019
Figure 24. Global Top Data Exfiltration Players by Company Type (Tier 1, Tier 2 and Tier 3) (based on the Revenue in Data Exfiltration as of 2019
Figure 25. The Top 10 and 5 Players Market Share by Data Exfiltration Revenue in 2019
Figure 26. North America Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 27. Europe Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 28. China Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 29. Japan Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 30. Southeast Asia Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 31. India Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 32. Central & South America Data Exfiltration Market Size YoY Growth (2015-2020) (Million US$)
Figure 33. Bottom-up and Top-down Approaches for This Report
Figure 34. Data Triangulation
Figure 35. Key Executives Interviewed