TECH SUPPLIER Aug 2018 - Market Share - Doc # EMEA43328618
Western Europe Security Software Market Shares, 2017: Competition Heats Up But the Giants Remain Dominant
This IDC Market Share identifies the leading vendors in the Western Europe security software market by revenue. It also identifies the top 10 vendors in each of the six major segments that make up the total market. The seventh segment, "other security software," is not analyzed as it is not a consistent market with clear leaders. Rather, it is an amalgam of emerging segments that have yet to be categorized.
"Endpoint majors dominate current market share, but disruptive challengers, besides those that have grown through acquisition, are making the largest market share gains," said Dominic Trott, associate research director, IDC European Security Research Team. "Chief among these disruptors is Microsoft, which is changing the market for specialist security vendors by building security into its broader propositions (i.e., infrastructure as a service, office automation, operating systems). This challenges traditional vendors to demonstrate how they offer added value. Meanwhile, vendors such as Okta and Zscaler are growing fast by attaching their value propositions to cloud migration, which lies at the heart of digital transformation strategies that are at (or near) the top of European board-level priorities. The consistent theme across these disruptors is that they are changing the way security vendors demonstrate value to their customers. There is renewed focus on business benefits, such as a secure path to cloud migration."
Advanced authentication, Endpoint security, Enterprise single sign-on, Federated single sign-on, Firewall and VPN security appliance products, Identity and access management, Information protection and control, Intrusion detection and prevention, Legacy authorization, Messaging security, Network security, Secure content and threat management, Security and vulnerability management software, Security management, Software as a service, Unified threat management, Virtual private network products, Web security
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.