Cybersecurity & Digital ID

More from:

The enormous rise in incidence and sophistication of cyberattacks over the years has driven an increasing demand for cybersecurity solutions across a range of applications, including automotive, healthcare, industrial utilities, telecom, payment and digital ID cards.

Assess the complexity of cybersecurity threats and challenges, as well as the diversity of the market for cyber solutions, with our detailed analysis of individual vertical markets—from market-specific operating models to key trends and development opportunities for future cyber revenues.

Our comprehensive digital ID research offers deep insight into SIM/eSIM, near field and proximity payments, fraud protection, mPOS, payment cards, E-government and healthcare ID cards, and identity management.
Insights

Analyst Insights View All (77)

  • Jeff Wilson | March 25, 2020
    Coronavirus (COVID-19) is a global issue that is already having a widespread impact on nearly everyone on the planet. The situation is very fluid; anyone who thinks they know exactly what is going to happen is kidding themselves. However, as we have been tracking several fundamental security markets going back to 1997, I was able to go back to two disruptive events during that time—the dot-com bubble burst of 2001 and the global financial crisis of 2008—to provide some guidance on how the cybersecurity technology market will respond to the current crisis. I reviewed the pre-crash forecasts and the actual results for key security technologies like firewalls, IDS/IPS, and web and mail security to help guide my initial adjustments to my current forecasts. Clients, please log in to read the full content.
    Subscribers Only
  • Jeff Wilson, Tanner Johnson | March 10, 2020
    RSA Conference 2020 took place in San Francisco at the end of February. This is the first event that analysts have attended as Omdia, the newly launched research brand of Informa Tech, combining market-leading analyst houses Ovum, IHS Markit TMT research, Tractica, and Heavy Reading.
  • Bryan Montany | September 30, 2019
    In the world of electronic access control systems, hardware has traditionally reigned supreme, the principal actor in granting or denying entry and passage into homes, buildings, and other physical spaces where access is sought. In this old paradigm, software typically played a secondary role, installed directly onto local control panels with its functionality limited to basic incident-reporting for security managers.

Services

Subscription Services

Understand cyber threat mitigation technologies used to protect networks, data centers, the cloud, mobile devices and the IoT. This service delivers global, in-depth coverage of threat mitigation technologies used by enterprises and service providers to protect networks, data centers, the cloud, mobile devices and the Internet of Things (IoT).
Identify growth opportunities in the market for protecting IoT devices and their data. This service provides complete coverage of IoT cybersecurity products and services, with detailed analysis based on revenue splits from market contributors. The comprehensive market is segmented by domain, technology, region, and vertical.

Reports

Reports View All (60)

  • Jeff Wilson | April 02, 2020
    This annual market report provides accurate data and analysis - including market size, forecasts, and market trends - to help clients make better business decisions in the cloud and CPE managed security services market.
    Subscribers Only
  • Don Tait | March 23, 2020
    This report examines the global market for blockchain in the financial sector. It provides a current snapshot of this market and examines the factors that are projected to hinder or drive growth of the blockchain market over the next decade.
    Subscribers Only
  • Tanner Johnson | February 21, 2020
    This market brief is designed to provide comprehensive analysis and insight into the cybersecurity challenges and opportunities present in the global automotive IoT market
    Subscribers Only

Data

Data View All (13)

  • Jeff Wilson | March 23, 2020
    The Threat Mitigation Products Market Database is a data-only market tracker, providing a total view of the cybersecurity technology market by combining the data from multiple security market trackers into one database.
    Subscribers Only
  • Jeff Wilson | March 17, 2020
    This market tracker provides accurate data and analyses including market size, vendor market share, forecasts, and market trends to help clients make better business decisions in the network security appliances and software market.
    Subscribers Only
  • Jeff Wilson | March 10, 2020
    This market tracker provides accurate data and analyses—including market size, vendor market share, forecasts, and market trends—to help clients make better business decisions in the content security gateway appliances, software, and SaaS market.
    Subscribers Only

Presentations

Presentations View All (5)


Press Releases

Press Releases View All (24)


Analysts View All (3)

  • Icon Principal Analyst, Cybersecurity & Digital ID
    Don Tait brings over fifteen years of market research experience to his role as principal analyst within the IHS Technology group. He specializes in the areas of smart cards, payment and banking cards, NFC, and contactless credentials.
  • Icon Research Director and Advisor, Cybersecurity Technology
    With more than 18 years in the data networking and telecom industry and one of the most accurate forecast track records in the business, Jeff is a certifiable network security market guru. He has expertise in a wide variety of network security appliance, software, and services markets.
Share facebook Twitter Google Plus Linked In Add This Contact Us