サイバーセキュリティにおける人工知能市場 : 2028 年までの世界予測

出版:MarketsandMarkets(マーケッツアンドマーケッツ) 出版年月:2022年12月

サイバーセキュリティにおける人工知能市場 : オファリング (ハードウェア、ソフトウェア、サービス)、展開の種類、セキュリティの種類、テクノロジ (ML、NLP、コンテキスト認識)、用途 (IAM、DLP、UTM)、エンド ユーザー、地域別 – 2028 年までの世界予測
Artificial Intelligence in Cybersecurity Market by Offering (Hardware, Software, and Service), Deployment Type, Security Type, Technology (ML, NLP, and Context-Aware), Application (IAM, DLP, and UTM), End User and Geography – Global Forecast to 2028

ページ数304
図表数258
種別英文調査報告書
価格

レポート目次    お問合せ・ご注文    価格・納期について

無料サンプル

The artificial intelligence in cybersecurity market size is valued at USD 22.4 Billion in 2023 and is anticipated to be USD 60.6 Billion by 2028; growing at a CAGR of 21.9% from 2023 to 2028. The Driving Factors can be attributed to increasing instances of cyber threat, increasing vulnerability of Wi-Fi networks to the security threats, growing adoption of IoT and increasing number of connected devices among others.

サイバーセキュリティにおける人工知能市場 : オファリング (ハードウェア、ソフトウェア、サービス)、展開の種類、セキュリティの種類、テクノロジ (ML、NLP、コンテキスト認識)、用途 (IAM、DLP、UTM)、エンド ユーザー、地域別 - 2028 年までの世界予測 Artificial Intelligence in Cybersecurity Market by Offering (Hardware, Software, and Service), Deployment Type, Security Type, Technology (ML, NLP, and Context-Aware), Application (IAM, DLP, and UTM), End User and Geography - Global Forecast to 2028
Rising concerns of data protection
Data protection directives play an essential role in addressing rising concerns over the privacy of an individual’s data. The constantly changing threat landscape has given rise to a large number of government regulations globally, which need to be strictly adhered by enterprises across the world. Enterprises are required to meet the mandatory security standards, failing which, severe fine is to be paid to the government. An enterprise data breach or data leakage causes huge data loss to organizations and hamper the brand image of companies. Recently, the Bank of Spain witnessed DDoS attacks, which resulted in sporadic disruptions of the company’s website services. The regulatory compliances provide a guideline to implement the best practices and mitigate security risks. The various regulatory compliances include Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA), Federal Trade Commission (FTC), Gramm-Leach-Bliley Act (GLBA), European Union Agency for Network and Information Security (ENISA), GDPR, and Sarbanes-Oxley Act (SOX). The compliances help SMEs and large enterprises across various industries to adopt the best practices and maintain robust cybersecurity. The federal regulations that govern the development and implementation of policies, standards, and guidelines for data security focus on specific industries, such as the financial and healthcare that are governed by the HIPAA and GLBA, respectively. The FTC regulates corporate cybersecurity practices, which involves preventing enterprises from inadequate security practices that fall under unfair trade practices regulation. European GDPR is a revolutionary regulation that governs data privacy laws across Europe. Furthermore, the PCI DSS standard safeguards the cardholder from fraudulent activities and financial thefts. The other important regulations include FISMA and SOX that ensure and govern data privacy and data security.
Increasing vulnerability of Wi-Fi networks to security threats
In Wi-Fi networks, a hacker can position himself between the user and the connection point. Instead of connecting directly with the hotspot, the user sends information to the hacker, who then relays it. Free Wi-Fi hotspots require no authentication to establish a network connection, thus making them easy targets. Hackers can also use an unsecured Wi-Fi connection to distribute malware. If a user allows file-sharing across a network, the hacker can easily plant infected software on his computer. A few ingenious hackers have even managed to hack the connection point itself, causing a pop-up window to appear during the connection process offering an upgrade to a piece of popular software; clicking the window installs the malware. As mobile Wi-Fi becomes increasingly common, one can expect Internet security issues and public Wi-Fi risks to grow over time.
Most Wi-Fi connections use the WPA2 security protocol. Malicious attack can be used to steal sensitive information, such as credit card numbers, passwords, chat messages, emails, and photos. Attackers can also inject some ransomware or malware into the website. The vulnerability affects a number of operating systems and devices, including Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others. Traditional cybersecurity methods are not very efficient in handling the attacks on WiFi networks, and this drawback of traditional cybersecurity methods is driving the need for AI in cybersecurity.
APAC is the fastest-growing region in the artificial intelligence in cybersecurity market

Asia Pacific is projected to be a high-growth market for artificial intelligence in cybersecurity during the forecast period. SMEs and large enterprises in this region are rapidly adopting cybersecurity solutions to ensure security of their networks, web, and mobile applications. High adoption of advanced technologies, such as IoT, big data analytics, and cloud computing, and rising concerns about data security in the region are expected to drive the growth of the AI in cybersecurity market in APAC.

The breakup of primaries conducted during the study is depicted below:
• By Company Type: Tier 1 – 30 %, Tier 2 – 30%, and Tier 3 –40%
• By Designation: C-Level Executives – 45%, Directors – 30%, and Others – 25%
• By Region: North America– 30%, Europe – 40%, APAC – 25%, Rest of world– 5%

サイバーセキュリティにおける人工知能市場 : オファリング (ハードウェア、ソフトウェア、サービス)、展開の種類、セキュリティの種類、テクノロジ (ML、NLP、コンテキスト認識)、用途 (IAM、DLP、UTM)、エンド ユーザー、地域別 - 2028 年までの世界予測 Artificial Intelligence in Cybersecurity Market by Offering (Hardware, Software, and Service), Deployment Type, Security Type, Technology (ML, NLP, and Context-Aware), Application (IAM, DLP, and UTM), End User and Geography - Global Forecast to 2028
Research Coverage
The report segments the artificial intelligence in cybersecurity market and forecasts its size, by value, based on geography (North America, Europe, Asia Pacific, and RoW), deployment type (on-premise, cloud), security type (network security, endpoint security, application security, and cloud security), by application (identity and access management, risk and compliance management, data loss prevention, unified threat management, antivirus/antimalware, intrusion detection/prevention system, security and vulnerability management, threat intelligence, fraud detection, and others (such as application whitelisting and patch management)), end users (government & defense, BFSI, enterprise, infrastructure, automotive & transportation, healthcare, retail, manufacturing, and others (oil & gas, education, and energy)), offerings (hardware, software, and services), and technology (machine learning, natural language processing (NLP), and context-aware computing). The report also provides a comprehensive review of market drivers, restraints, opportunities, and challenges in the artificial intelligence in cybersecurity market. The report also covers qualitative aspects in addition to the quantitative aspects of these markets.
Key Benefits of Buying This Report
1 This report segments the artificial intelligence in cybersecurity market comprehensively provides the closest approximations of the overall market size and those of the subsegments across different applications and regions
2 The report provides a detailed analysis of the artificial intelligence in cybersecurity market with the help of competitive leadership mapping, including crucial companies in the market and their relations in the ecosystem.
3 Major market drivers, restraints, challenges, and opportunities have been detailed in this report.
4 Illustrative segmentation, analyses, and forecasts for the market based on offerings, deployment type, security type, applications, end users, technology, and geography have been conducted to provide an overall view of the artificial intelligence in cybersecurity market.
5 The report includes an in-depth analysis and ranking of key players.


目次

1 INTRODUCTION 35
1.1 STUDY OBJECTIVES 35
1.2 MARKET DEFINITION 35
1.2.1 INCLUSIONS AND EXCLUSIONS 36
1.2.2 COMPANY: INCLUSIONS AND EXCLUSIONS 36
1.2.3 OFFERING: INCLUSIONS AND EXCLUSIONS 36
1.2.4 DEPLOYMENT TYPE: INCLUSIONS AND EXCLUSIONS 37
1.2.5 SECURITY TYPE: INCLUSIONS AND EXCLUSIONS 37
1.2.6 TECHNOLOGY: INCLUSIONS AND EXCLUSIONS 37
1.2.7 APPLICATION: INCLUSIONS AND EXCLUSIONS 37
1.2.8 END USER: INCLUSIONS AND EXCLUSIONS 38
1.2.9 REGION: INCLUSIONS AND EXCLUSIONS 38
1.3 STUDY SCOPE 39
1.3.1 MARKETS COVERED 39
FIGURE 1 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET SEGMENTATION 39
1.3.2 REGIONAL SCOPE 40
1.3.3 YEARS CONSIDERED 40
1.4 CURRENCY CONSIDERED 41
TABLE 1 CURRENCY CONVERSION RATES 41
1.5 LIMITATIONS 41
1.6 STAKEHOLDERS 41
1.7 SUMMARY OF CHANGES 42
2 RESEARCH METHODOLOGY 43
2.1 RESEARCH DATA 43
FIGURE 2 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: RESEARCH DESIGN 43
2.1.1 SECONDARY AND PRIMARY RESEARCH 45
2.1.1.1 Key industry insights 45
2.1.2 SECONDARY DATA 46
2.1.2.1 List of major secondary sources 46
2.1.2.2 Secondary sources 46
2.1.3 PRIMARY DATA 47
2.1.3.1 Breakdown of primaries 47
2.1.3.2 Primary sources 48
2.2 MARKET SIZE ESTIMATION 49
FIGURE 3 PROCESS FLOW OF MARKET SIZE ESTIMATION 49
2.2.1 BOTTOM-UP APPROACH 49
FIGURE 4 BOTTOM-UP APPROACH 50

2.2.2 TOP-DOWN APPROACH 50
FIGURE 5 MARKET SIZE ESTIMATION METHODOLOGY: APPROACH 1 (SUPPLY SIDE)−REVENUE GENERATED BY KEY PLAYERS IN ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET 51
FIGURE 6 TOP-DOWN APPROACH 51
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION 52
FIGURE 7 DATA TRIANGULATION 52
2.4 RESEARCH ASSUMPTIONS 53
2.4.1 LIMITATIONS 54
FIGURE 8 RESEARCH LIMITATIONS 54
2.5 RISK ASSESSMENT 54
TABLE 2 RISK ASSESSMENT 54
3 EXECUTIVE SUMMARY 55
FIGURE 9 SOFTWARE TO HOLD LARGEST MARKET SHARE OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY DURING 2023–2028 56
FIGURE 10 CLOUD-BASED DEPLOYMENT OF AI IN CYBERSECURITY TO GROW AT HIGHER CAGR DURING 2023–2028 56
FIGURE 11 CLOUD SECURITY IN AI IN CYBERSECURITY MARKET TO GROW AT HIGHEST CAGR DURING 2023–2028 57
FIGURE 12 ENTERPRISE TO DOMINATE ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET IN 2022 58
FIGURE 13 NORTH AMERICA TO HOLD LARGEST MARKET SHARE OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY DURING 2023–2028 59
4 PREMIUM INSIGHTS 60
4.1 ATTRACTIVE OPPORTUNITIES FOR PLAYERS IN ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET 60
FIGURE 14 ASIA PACIFIC TO GROW AT HIGHEST CAGR IN ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET DURING 2023–2028 60
4.2 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY TECHNOLOGY 61
FIGURE 15 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MACHINE LEARNING TO GROW AT HIGHEST CAGR FROM 2023−2028 61
4.3 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION 61
FIGURE 16 IDENTITY AND ACCESS MANAGEMENT TO HOLD LARGEST SIZE DURING FORECAST PERIOD 61
4.4 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET IN ASIA PACIFIC, BY APPLICATION AND COUNTRY 62
FIGURE 17 CHINA TO HOLD LARGEST SHARE OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET IN ASIA PACIFIC 62
4.5 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY 62
FIGURE 18 MARKET IN CHINA TO GROW AT HIGHEST CAGR FROM 2023 TO 2028 62

5 MARKET OVERVIEW 63
5.1 INTRODUCTION 63
5.2 MARKET DYNAMICS 63
FIGURE 19 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET DYNAMICS 63
5.2.1 DRIVERS 64
5.2.1.1 Growing adoption of IoT and increasing number of connected devices 64
5.2.1.2 Increasing instances of cyber threats 64
FIGURE 20 US: NUMBER OF CYBERATTACKS, 2015–2021 65
5.2.1.3 Rising concerns of data protection 65
5.2.1.4 Increasing vulnerability of Wi-Fi networks to security threats 66
5.2.2 RESTRAINTS 66
5.2.2.1 Inability of AI to stop zero-day and advanced threats 67
5.2.2.2 Rise in insider cyber threats 67
5.2.3 OPPORTUNITIES 67
5.2.3.1 Growing need for cloud-based security solutions among SMEs 68
5.2.3.2 Increasing use of social media for business functions 68
5.2.3.3 Zero trust framework providing advanced security 68
5.2.4 CHALLENGES 69
5.2.4.1 Limited number of cybersecurity and AI professionals 69
5.2.4.2 Lack of interoperability with existing information systems 69
5.2.4.3 Shortcomings of AI 70
5.3 TECHNOLOGY ANALYSIS 70
5.3.1 DEEP LEARNING 70
5.3.2 MACHINE LEARNING 70
5.3.3 USER AND ENTITY BEHAVIOR ANALYTICS (UEBA) 71
5.3.4 TOKENIZATION 71
5.3.5 BLOCKCHAIN 71
5.4 PORTER’S FIVE FORCES ANALYSIS 71
TABLE 3 IMPACT OF PORTER’S FIVE FORCES 72
5.4.1 THREAT OF NEW ENTRANTS 72
5.4.2 THREAT OF SUBSTITUTES 72
5.4.3 BARGAINING POWER OF SUPPLIERS 72
5.4.4 BARGAINING POWER OF BUYERS 73
5.4.5 INTENSITY OF COMPETITIVE RIVALRY 73
5.5 TRADE DATA 73
TABLE 4 EXPORTS DATA FOR PRODUCTS UNDER HS CODE 8471, BY COUNTRY, 2017–2021 (USD MILLION) 73
TABLE 5 IMPORTS DATA FOR PRODUCTS UNDER HS CODE 8471, BY COUNTRY, 2017–2021 (USD MILLION) 74

5.6 REGULATORY IMPLICATIONS 74
5.6.1 GENERAL DATA PROTECTION REGULATION 74
5.6.2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD 75
5.6.3 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT 75
5.6.4 FEDERAL INFORMATION SECURITY MANAGEMENT ACT 75
5.6.5 GRAMM-LEACH-BLILEY ACT 75
5.6.6 SARBANES-OXLEY ACT 76
5.6.7 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 27001 76
5.6.8 REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 76
TABLE 6 NORTH AMERICA: REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 76
TABLE 7 EUROPE: REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 77
TABLE 8 ASIA PACIFIC: REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 77
TABLE 9 REST OF THE WORLD: REGULATORY BODIES, GOVERNMENT AGENCIES, AND OTHER ORGANIZATIONS 77
5.7 KEY STAKEHOLDERS AND BUYING PROCESS 78
5.7.1 KEY STAKEHOLDERS IN BUYING PROCESS 78
FIGURE 21 INFLUENCE OF STAKEHOLDERS ON BUYING PROCESS FOR TOP THREE APPLICATIONS 78
TABLE 10 INFLUENCE OF STAKEHOLDERS ON BUYING PROCESS FOR TOP THREE APPLICATIONS (%) 78
5.7.2 BUYING CRITERIA 79
FIGURE 22 KEY BUYING CRITERIA FOR TOP THREE APPLICATIONS 79
TABLE 11 KEY BUYING CRITERIA FOR TOP THREE APPLICATIONS 79
5.8 CASE STUDY ANALYSIS 80
5.8.1 CARGILLS BANK IMPLEMENTS IBM QRADAR SIEM 80
5.8.2 INFOSYS IMPLEMENTS INFRASTRUCTURE SECURITY ENDPOINT MANAGEMENT (ISEM) FOR INVESTMENT GIANT 80
5.8.3 SIEMENS USES AMAZON WEB SERVICES (AWS) TO BUILD DATA ANALYTICS PLATFORM 81
5.8.4 INFOSYS CREATES UNIFIED DATA LOSS PREVENTION PLATFORM USING GCP (GOOGLE CLOUD PLATFORM) 81
5.9 KEY CONFERENCES AND EVENTS, 2022–2023 82
TABLE 12 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: KEY CONFERENCES AND EVENTS, 2022-2032 82
5.10 REVENUE SHIFT AND NEW REVENUE POCKETS FOR CUSTOMERS’ BUSINESSES 83
FIGURE 23 REVENUE SHIFT IN AI IN CYBERSECURITY MARKET 83
5.11 ECOSYSTEM ANALYSIS 84
TABLE 13 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: ECOSYSTEM 84
FIGURE 24 KEY PLAYERS IN ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ECOSYSTEM 85

5.12 VALUE CHAIN ANALYSIS 86
FIGURE 25 VALUE CHAIN ANALYSIS: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET 86
5.12.1 RESEARCH, DESIGN, AND DEVELOPMENT 86
5.12.2 COMPONENT PROVIDERS 87
5.12.3 SYSTEM INTEGRATORS 87
5.12.4 MARKETING AND SALES EXECUTIVES 87
5.12.5 END USER INDUSTRIES 87
5.12.6 SERVICE PROVIDERS 87
5.13 PATENT ANALYSIS 87
TABLE 14 IMPORTANT PATENT REGISTRATIONS, 2017–2021 88
FIGURE 26 COMPANIES WITH HIGHEST NUMBER OF PATENT APPLICATIONS IN LAST 10 YEARS 93
FIGURE 27 ANNUAL NUMBER OF PATENTS GRANTED OVER LAST FIVE YEARS 93
TABLE 15 TOP 10 PATENT OWNERS 94
5.14 PRICING ANALYSIS 94
FIGURE 28 PRICING BY KEY PLAYERS 95
FIGURE 29 AVERAGE SELLING PRICING 95
6 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY OFFERING 96
6.1 INTRODUCTION 97
FIGURE 30 SOFTWARE TO DOMINATE AI IN CYBERSECURITY MARKET DURING FORECAST PERIOD 97
TABLE 16 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY OFFERING, 2019–2022 (USD MILLION) 97
TABLE 17 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY OFFERING, 2023–2028 (USD MILLION) 98
6.2 HARDWARE 98
TABLE 18 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR HARDWARE, BY REGION, 2019–2022 (USD MILLION) 98
TABLE 19 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR HARDWARE, BY REGION, 2023–2028 (USD MILLION) 99
TABLE 20 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY HARDWARE, 2019–2022 (USD MILLION) 99
TABLE 21 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY HARDWARE, 2023–2028 (USD MILLION) 99
6.2.1 PROCESSORS 100
TABLE 22 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR PROCESSORS, BY TYPE, 2019–2022 (USD MILLION) 100
TABLE 23 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR PROCESSORS, BY TYPE, 2023–2028 (USD MILLION) 100
6.2.1.1 MPU 101
6.2.1.1.1 Performs arithmetic and logic operations that use registers 101
6.2.1.2 GPU 101
6.2.1.2.1 Rapidly manipulates and alters memory to accelerate image creation 101
6.2.1.3 FPGA 101
6.2.1.3.1 Enables rapid prototyping, shorter time-to-market, reprogram ability, and longevity 101
6.2.1.4 ASIC 101
6.2.1.4.1 Affordable and enables improved performance 101
6.2.2 MEMORY 102
6.2.2.1 Memory solutions help store large volume of data 102
6.2.3 NETWORK 102
6.2.3.1 High-bandwidth networks enable ultrafast communication between CPU and GPU 102
6.3 SOFTWARE 102
TABLE 24 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SOFTWARE, BY REGION, 2019–2022 (USD MILLION) 102
TABLE 25 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SOFTWARE, BY REGION, 2023–2028 (USD MILLION) 103
FIGURE 31 AI PLATFORM TO GROW AT HIGHER CAGR DURING FORECAST PERIOD 103
TABLE 26 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SOFTWARE, BY TYPE, 2019–2022 (USD MILLION) 104
TABLE 27 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SOFTWARE, BY TYPE, 2023–2028 (USD MILLION) 104
6.3.1 AI SOLUTIONS 104
6.3.1.1 Advancements in AI solutions boosting market growth 104
6.3.2 AI PLATFORM 104
6.3.2.1 AI platforms are used to develop learning algorithms and intelligent applications 104
TABLE 28 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR AI PLATFORM, BY TYPE, 2019–2022 (USD MILLION) 105
TABLE 29 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR AI PLATFORM, BY TYPE, 2023–2028 (USD MILLION) 105
6.3.2.2 Application Program Interface (API) 105
6.3.2.2.1 Easily develops program by providing all building blocks 105
6.3.2.3 Machine learning framework 105
6.3.2.3.1 Enables developers to create machine learning models and algorithms 105
6.4 SERVICES 106
TABLE 30 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SERVICES, BY REGION, 2019–2022 (USD MILLION) 106
TABLE 31 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SERVICES, BY REGION, 2023–2028 (USD MILLION) 106
TABLE 32 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SERVICES, BY TYPE, 2019–2022 (USD MILLION) 107
TABLE 33 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SERVICES, BY TYPE, 2023–2028 (USD MILLION) 107

6.4.1 DEPLOYMENT & INTEGRATION 107
6.4.1.1 Required for configuration of AI systems 107
6.4.2 SUPPORT & MAINTENANCE 107
6.4.2.1 Help in maintaining acceptable standards of systems 107
7 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE 108
7.1 INTRODUCTION 109
FIGURE 32 CLOUD-BASED DEPLOYMENT TO GROW AT HIGHER CAGR DURING FORECAST PERIOD 109
TABLE 34 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2019–2022 (USD MILLION) 109
TABLE 35 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2023–2028 (USD MILLION) 110
7.2 CLOUD 110
7.2.1 COST-EFFECTIVENESS OF CLOUD-BASED SOLUTIONS TO BOOST MARKET 110
TABLE 36 CLOUD: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2019–2022 (USD MILLION) 111
TABLE 37 CLOUD: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2023–2028 (USD MILLION) 111
7.3 ON-PREMISE 112
7.3.1 FULL CONTROL OF PLATFORMS, APPLICATIONS, SYSTEMS, AND DATA TO DRIVE MARKET 112
TABLE 38 ON-PREMISE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2019–2022 (USD MILLION) 112
TABLE 39 ON-PREMISE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2023–2028 (USD MILLION) 113
8 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE 114
8.1 INTRODUCTION 115
FIGURE 33 CLOUD SECURITY TO GROW AT HIGHEST CAGR DURING FORECAST PERIOD 115
TABLE 40 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2019–2022 (USD MILLION) 115
TABLE 41 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2023–2028 (USD MILLION) 116
8.2 NETWORK SECURITY 116
8.2.1 HELPS TO PROTECT DATA FROM NUMEROUS THREATS 116
TABLE 42 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR NETWORK SECURITY, BY REGION, 2019–2022 (USD MILLION) 117
TABLE 43 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR NETWORK SECURITY, BY REGION, 2023–2028 (USD MILLION) 117
8.3 ENDPOINT SECURITY 118
8.3.1 PROVIDES REAL-TIME THREAT DETECTION, PREVENTION, AND RESPONSE TO NETWORK DEVICES 118
TABLE 44 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR ENDPOINT SECURITY, BY REGION, 2019–2022 (USD MILLION) 118
TABLE 45 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR ENDPOINT SECURITY, BY REGION, 2023–2028 (USD MILLION) 118
8.4 APPLICATION SECURITY 119
8.4.1 ENABLES ENTERPRISES TO SECURE BUSINESS-SENSITIVE APPLICATIONS 119
FIGURE 34 APPLICATION SECURITY IN ASIA PACIFIC TO GROW AT HIGHEST CAGR DURING FORECAST PERIOD 120
TABLE 46 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR APPLICATION SECURITY, BY REGION, 2019–2022 (USD MILLION) 120
TABLE 47 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR APPLICATION SECURITY, BY REGION, 2023–2028 (USD MILLION) 121
8.5 CLOUD SECURITY 121
8.5.1 PROVIDES COMPLETE THREAT PROTECTION AGAINST RANSOMWARE, INTERNAL EMAIL RISKS, AND FILE-SHARING RISKS 121
TABLE 48 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR CLOUD SECURITY, BY REGION, 2019–2022 (USD MILLION) 122
TABLE 49 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR CLOUD SECURITY, BY REGION, 2023–2028(USD MILLION) 122
9 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY TECHNOLOGY 123
9.1 INTRODUCTION 124
FIGURE 35 MACHINE LEARNING TO LEAD AI IN CYBERSECURITY MARKET DURING FORECAST PERIOD 124
TABLE 50 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY TECHNOLOGY, 2019–2022 (USD MILLION) 124
TABLE 51 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY TECHNOLOGY, 2023–2028 (USD MILLION) 125
9.2 MACHINE LEARNING 125
9.2.1 MACHINE LEARNING HELP BUSINESSES DEAL WITH LARGE VOLUMES OF DATA 125
TABLE 52 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MACHINE LEARNING, BY REGION, 2019–2022 (USD MILLION) 126
TABLE 53 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MACHINE LEARNING, BY REGION, 2023–2028 (USD MILLION) 126
TABLE 54 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MACHINE LEARNING, BY TYPE, 2019–2022 (USD MILLION) 127
TABLE 55 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MACHINE LEARNING, BY TYPE, 2023–2028 (USD MILLION) 127
9.2.2 DEEP LEARNING 128
9.2.2.1 Growing application of deep learning algorithms 128
9.2.3 SUPERVISED LEARNING 128
9.2.3.1 Classification and regression − major segments of supervised learning 128
9.2.4 UNSUPERVISED LEARNING 128
9.2.4.1 Includes clustering methods consisting of algorithms with unlabeled training data 128
9.2.5 REINFORCEMENT LEARNING 129
9.2.5.1 Allows systems and software to determine ideal behavior to maximize performance 129
9.2.6 OTHERS 129
9.3 NATURAL LANGUAGE PROCESSING 129
9.3.1 REAL-TIME TRANSLATION AND DEVELOPMENT OF SYSTEMS THAT CAN INTERACT THROUGH DIALOGUES 129
TABLE 56 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR NATURAL LANGUAGE PROCESSING, BY REGION, 2019–2022 (USD MILLION) 130
TABLE 57 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR NATURAL LANGUAGE PROCESSING, BY REGION, 2023–2028 (USD MILLION) 130
FIGURE 36 CLASSIFICATION & CATEGORIZATION IN NLP TO GROW AT HIGHER CAGR DURING FORECAST PERIOD 131
TABLE 58 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR NATURAL LANGUAGE PROCESSING, BY PROCESS, 2019–2022 (USD MILLION) 131
TABLE 59 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR NATURAL LANGUAGE PROCESSING, BY PROCESS, 2023–2028 (USD MILLION) 131
9.4 CONTEXT-AWARE COMPUTING 132
9.4.1 DEVELOPMENT OF SOPHISTICATED HARD AND SOFT SENSORS 132
TABLE 60 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR CONTEXT-AWARE COMPUTING, BY REGION, 2019–2022 (USD MILLION) 132
TABLE 61 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR CONTEXT-AWARE COMPUTING, BY REGION, 2023–2028 (USD MILLION) 133
TABLE 62 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR CONTEXT-AWARE COMPUTING, BY PROCESS, 2019–2022 (USD MILLION) 133
TABLE 63 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR CONTEXT-AWARE COMPUTING, BY PROCESS, 2023–2028 (USD MILLION) 133
10 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION 135
10.1 INTRODUCTION 136
FIGURE 37 IDENTITY & ACCESS MANAGEMENT TO HOLD LARGEST SHARE OF MARKET DURING FORECAST PERIOD 136
TABLE 64 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2019–2022 (USD MILLION) 137
TABLE 65 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2023–2028 (USD MILLION) 137
10.2 IDENTITY & ACCESS MANAGEMENT 138
10.2.1 INCREASING THREAT OF DATA BREACHES DUE TO INSIDER ATTACKS 138
TABLE 66 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR IDENTITY & ACCESS MANAGEMENT, BY REGION, 2019–2022 (USD MILLION) 138
TABLE 67 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR IDENTITY & ACCESS MANAGEMENT, BY REGION, 2023–2028 (USD MILLION) 139
10.3 RISK & COMPLIANCE MANAGEMENT 139
10.3.1 GROWING NEED FOR INTERNAL AUDIT FEATURES AND REGULATORY COMPLIANCE MANDATES 139
TABLE 68 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR RISK & COMPLIANCE MANAGEMENT, BY REGION, 2019–2022 (USD MILLION) 140
TABLE 69 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR RISK & COMPLIANCE MANAGEMENT, BY REGION, 2023–2028 (USD MILLION) 140

10.4 DATA LOSS PREVENTION 141
10.4.1 STRICT IMPLEMENTATION OF GOVERNMENT REGULATIONS AND LAWS 141
TABLE 70 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR DATA LOSS PREVENTION, BY REGION, 2019–2022 (USD MILLION) 141
TABLE 71 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR DATA LOSS PREVENTION, BY REGION, 2023–2028 (USD MILLION) 141
10.5 UNIFIED THREAT MANAGEMENT 142
10.5.1 PROVIDES MULTIPLE SECURITY FUNCTIONS TO PROTECT ENTERPRISES FROM EVOLVING CYBER THREATS 142
TABLE 72 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR UNIFIED THREAT MANAGEMENT, BY REGION, 2019–2022 (USD MILLION) 142
TABLE 73 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR UNIFIED THREAT MANAGEMENT, BY REGION, 2023–2028 (USD MILLION) 143
10.6 SECURITY & VULNERABILITY MANAGEMENT 143
10.6.1 EXPANDING VOLUME OF DATA AND RISING ADOPTION OF BYOD TREND 143
TABLE 74 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SECURITY & VULNERABILITY MANAGEMENT, BY REGION, 2019–2022 (USD MILLION) 144
TABLE 75 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR SECURITY & VULNERABILITY MANAGEMENT, BY REGION, 2023–2028 (USD MILLION) 144
10.7 ANTIVIRUS/ANTIMALWARE 144
10.7.1 RISING NUMBER OF MALWARE AND VIRUS ATTACKS 144
TABLE 76 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR ANTIVIRUS/ANTIMALWARE, BY REGION, 2019–2022 (USD MILLION) 145
TABLE 77 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR ANTIVIRUS/ANTIMALWARE, BY REGION, 2023–2028 (USD MILLION) 145
10.8 FRAUD DETECTION/ANTIFRAUD 146
10.8.1 NEED FOR ROBUST INFRASTRUCTURE WITH HIGH-PERFORMANCE COMPUTING AND SCALABILITY 146
TABLE 78 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR FRAUD DETECTION/ ANTIFRAUD, BY REGION, 2019–2022 (USD MILLION) 146
TABLE 79 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR FRAUD DETECTION/ ANTIFRAUD, BY REGION, 2023–2028 (USD MILLION) 147
10.9 INTRUSION DETECTION/PREVENTION SYSTEM 147
10.9.1 MONITORS NETWORK ACROSS ENTERPRISES FOR SUSPICIOUS ACTIVITY 147
TABLE 80 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR INTRUSION DETECTION/PREVENTION SYSTEM, BY REGION, 2019–2022 (USD MILLION) 148
TABLE 81 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR INTRUSION DETECTION/PREVENTION SYSTEM, BY REGION, 2023–2028 (USD MILLION) 148
10.10 THREAT INTELLIGENCE/DETECTION 149
10.10.1 PREDICTS CYBER THREATS IN ADVANCE 149
TABLE 82 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR THREAT INTELLIGENCE, BY REGION, 2019–2022 (USD MILLION) 149
TABLE 83 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR THREAT INTELLIGENCE, BY REGION, 2023–2028 (USD MILLION) 149

10.11 OTHERS 150
TABLE 84 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR OTHER APPLICATIONS, BY REGION, 2019–2022 (USD MILLION) 150
TABLE 85 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR OTHER APPLICATIONS, BY REGION, 2023–2028 (USD MILLION) 151
11 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY END USER 152
11.1 INTRODUCTION 153
FIGURE 38 AUTOMOTIVE TO GROW AT HIGHEST CAGR DURING FORECAST PERIOD 153
TABLE 86 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY END USER, 2019–2022 (USD MILLION) 154
TABLE 87 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY END USER, 2023–2028 (USD MILLION) 154
11.2 BFSI 155
11.2.1 INCREASED INSTANCES OF CYBER-ATTACKS IN FINANCIAL VERTICAL 155
TABLE 88 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR BFSI, BY REGION, 2019–2022 (USD MILLION) 155
TABLE 89 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR BFSI, BY REGION, 2023–2028 (USD MILLION) 156
11.3 RETAIL 156
11.3.1 LARGE NUMBER OF MONETARY TRANSACTIONS AND EXPANDING CONSUMER BASE 156
TABLE 90 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR RETAIL, BY REGION, 2019–2022 (USD MILLION) 157
TABLE 91 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR RETAIL, BY REGION, 2023–2028 (USD MILLION) 157
11.4 GOVERNMENT & DEFENSE 157
11.4.1 INCREASED SPENDING ON AI-BASED CYBERSECURITY SOLUTIONS 157
TABLE 92 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR GOVERNMENT & DEFENSE, BY REGION, 2019–2022 (USD MILLION) 158
TABLE 93 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR GOVERNMENT & DEFENSE, BY REGION, 2023–2028 (USD MILLION) 158
11.5 MANUFACTURING 159
11.5.1 HUGE INVESTMENTS IN INDUSTRY FOR AUTOMATION 159
TABLE 94 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MANUFACTURING, BY REGION, 2019–2022 (USD MILLION) 159
TABLE 95 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR MANUFACTURING, BY REGION, 2023–2028 (USD MILLION) 159
11.6 INFRASTRUCTURE 160
11.6.1 GROWING FOCUS ON SMART INFRASTRUCTURE 160
TABLE 96 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR INFRASTRUCTURE, BY REGION, 2019–2022 (USD MILLION) 160
TABLE 97 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR INFRASTRUCTURE, BY REGION, 2023–2028 (USD MILLION) 161

11.7 ENTERPRISE 161
11.7.1 RAPID TECHNOLOGICAL ADVANCEMENTS IN IOT, CLOUD, AND TELECOM CONNECTIVITY 161
FIGURE 39 ASIA PACIFIC TO GROW AT HIGHEST CAGR DURING FORECAST PERIOD IN ENTERPRISE SEGMENT 162
TABLE 98 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR ENTERPRISE, BY REGION, 2019–2022 (USD MILLION) 162
TABLE 99 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR ENTERPRISE, BY REGION, 2023–2028 (USD MILLION) 162
11.8 HEALTHCARE 163
11.8.1 INCREASING NUMBER OF DATA BREACHES AND COMPROMISED ELECTRONIC HEALTHCARE RECORDS 163
TABLE 100 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR HEALTHCARE, BY REGION, 2019–2022 (USD MILLION) 163
TABLE 101 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR HEALTHCARE, BY REGION, 2023–2028 (USD MILLION) 164
11.9 AUTOMOTIVE 164
11.9.1 INCREASING CYBERATTACKS DUE TO RISING NUMBER OF CONNECTED AND AUTONOMOUS CARS 164
TABLE 102 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR AUTOMOTIVE, BY REGION, 2019–2022 (USD MILLION) 165
TABLE 103 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR AUTOMOTIVE, BY REGION, 2023–2028 (USD MILLION) 165
11.10 OTHERS 166
TABLE 104 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR OTHER END USERS, BY REGION, 2019–2022 (USD MILLION) 166
TABLE 105 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET FOR OTHER END USERS, BY REGION, 2023–2028 (USD MILLION) 167
12 REGIONAL ANALYSIS 168
12.1 INTRODUCTION 169
FIGURE 40 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET IN ASIA PACIFIC TO GROW AT HIGHEST CAGR FROM 2023−2028 169
TABLE 106 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2019–2022 (USD MILLION) 169
TABLE 107 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2023–2028 (USD MILLION) 170
12.2 NORTH AMERICA 170
FIGURE 41 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET SNAPSHOT 171
TABLE 108 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2019–2022 (USD MILLION) 171
TABLE 109 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2023–2028 (USD MILLION) 172
TABLE 110 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2019–2022 (USD MILLION) 172
TABLE 111 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2023–2028 (USD MILLION) 172
TABLE 112 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2019–2022 (USD MILLION) 173
TABLE 113 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2023–2028 (USD MILLION) 173
TABLE 114 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY, 2019–2022 (USD MILLION) 174
TABLE 115 NORTH AMERICA: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY, 2023–2028 (USD MILLION) 174
12.2.1 US 174
12.2.1.1 Rapid growth in technological innovations and increased use of internet 174
12.2.2 CANADA 175
12.2.2.1 Investment in modern technologies to drive market 175
12.2.3 MEXICO 175
12.2.3.1 Increasing connectivity to boost market 175
12.3 EUROPE 175
FIGURE 42 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET SNAPSHOT 176
TABLE 116 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2019–2022 (USD MILLION) 177
TABLE 117 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2023–2028(USD MILLION) 177
TABLE 118 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2019–2022 (USD MILLION) 177
TABLE 119 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2023–2028 (USD MILLION) 178
TABLE 120 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2019–2022 (USD MILLION) 178
TABLE 121 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2023–2028 (USD MILLION) 179
TABLE 122 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY, 2019–2022 (USD MILLION) 179
TABLE 123 EUROPE: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY, 2023–2028(USD MILLION) 180
12.3.1 GERMANY 180
12.3.1.1 Increasing number of ransomware, spyware, and reconnaissance to fuel market 180
12.3.2 UK 180
12.3.2.1 Threat to IT, telecom, and financial sectors to increase demand for cybersecurity 180
12.3.3 FRANCE 181
12.3.3.1 Market growth attributed to increasing adoption of AI cybersecurity in BFSI, government, and retail 181
12.3.4 ITALY 181
12.3.4.1 Rising spread of cloud computing, social media, wireless connectivity, e-commerce, and big data to provide opportunities 181

12.3.5 SPAIN 181
12.3.5.1 Private and public sector companies’ initiatives to adopt AI in cybersecurity to fuel market 181
12.3.6 REST OF EUROPE 182
12.4 ASIA PACIFIC 182
FIGURE 43 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET SNAPSHOT 183
TABLE 124 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2019–2022 (USD MILLION) 184
TABLE 125 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2023–2028 (USD MILLION) 184
TABLE 126 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2019–2022 (USD MILLION) 184
TABLE 127 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2023–2028 (USD MILLION) 185
TABLE 128 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET IN ASIA PACIFIC, BY APPLICATION, 2019–2022 (USD MILLION) 185
TABLE 129 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2023–2028 (USD MILLION) 186
TABLE 130 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY, 2019–2022 (USD MILLION) 186
TABLE 131 ASIA PACIFIC: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY COUNTRY, 2023–2028 (USD MILLION) 187
12.4.1 CHINA 187
12.4.1.1 Increased instances of virus, worm, spyware, trojan, and ransomware attacks to drive market 187
12.4.2 JAPAN 188
12.4.2.1 Significant number of ICT users to drive market 188
12.4.3 SOUTH KOREA 188
12.4.3.1 Government initiatives to enhance cybersecurity driving market growth 188
12.4.4 INDIA 188
12.4.4.1 Participation of SMEs and large enterprises 188
12.4.5 REST OF ASIA PACIFIC 189
12.5 REST OF THE WORLD 189
TABLE 132 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2019–2022 (USD MILLION) 189
TABLE 133 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY DEPLOYMENT TYPE, 2023–2028 (USD MILLION) 189
TABLE 134 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2019–2022 (USD MILLION) 190
TABLE 135 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY SECURITY TYPE, 2023–2028 (USD MILLION) 190
TABLE 136 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2019–2022 (USD MILLION) 191
TABLE 137 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY APPLICATION, 2023–2028 (USD MILLION) 191
TABLE 138 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2019–2022 (USD MILLION) 192
TABLE 139 ROW: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET, BY REGION, 2023–2028 (USD MILLION) 192
12.5.1 MIDDLE EAST AND AFRICA 192
12.5.1.1 Demand to protect critical infrastructure and industrial assets to aid market growth 192
12.5.2 SOUTH AMERICA 193
12.5.2.1 Service-specific attacks, malware, phishing, DDoS, and reconnaissance are major threat vectors 193
13 COMPETITIVE LANDSCAPE 194
13.1 OVERVIEW 194
TABLE 140 COMPANIES ADOPTED ACQUISITIONS AND PARTNERSHIPS AS KEY GROWTH STRATEGIES FROM 2019−2022 194
13.2 MARKET SHARE ANALYSIS 195
TABLE 141 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: DEGREE OF COMPETITION FOR SOFTWARE 2022 195
TABLE 142 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: RANKING ANALYSIS FOR SOFTWARE 2022 195
FIGURE 44 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET SHARE ANALYSIS FOR SOFTWARE (2022) 196
TABLE 143 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: DEGREE OF COMPETITION FOR HARDWARE 2022 197
TABLE 144 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: RANKING ANALYSIS FOR HARDWARE 2022 198
FIGURE 45 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET SHARE ANALYSIS FOR HARDWARE (2022) 198
13.3 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: REVENUE ANALYSIS, 2017–2021 200
FIGURE 46 FIVE-YEAR REVENUE SNAPSHOT OF KEY HARDWARE COMPANIES 200
FIGURE 47 THREE-YEAR REVENUE SNAPSHOT OF KEY SOFTWARE COMPANIES 201
13.4 COMPANY EVALUATION QUADRANT, 2022 201
13.4.1 STARS 201
13.4.2 PERVASIVE PLAYERS 201
13.4.3 EMERGING LEADERS 202
13.4.4 PARTICIPANTS 202
FIGURE 48 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: GLOBAL COMPANY EVALUATION QUADRANT, 2022 202
13.5 COMPETITIVE BENCHMARKING 203
13.5.1 PRODUCT FOOTPRINT (12 COMPANIES) 203
TABLE 145 SECURITY TYPE: COMPANY FOOTPRINT (33 COMPANIES) 203
TABLE 146 DEPLOYMENT TYPE: COMPANY FOOTPRINT (33 COMPANIES) 205
TABLE 147 REGION: COMPANY FOOTPRINT (33 COMPANIES) 206
TABLE 148 OVERALL: COMPANY FOOTPRINT (33 COMPANIES) 207

13.6 STARTUP/SME EVALUATION QUADRANT, 2022 209
13.6.1 PROGRESSIVE COMPANIES 209
13.6.2 RESPONSIVE COMPANIES 209
13.6.3 DYNAMIC COMPANIES 209
13.6.4 STARTING BLOCKS 209
FIGURE 49 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: GLOBAL STARTUP/SME EVALUATION QUADRANT, 2022 210
13.7 COMPETITIVE SCENARIO AND TRENDS 211
13.7.1 PRODUCT LAUNCHES 211
TABLE 149 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: PRODUCT LAUNCHES, 2019–2022 211
13.7.2 DEALS 218
TABLE 150 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: DEALS, 2018–2022 218
TABLE 151 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY MARKET: KEY STARTUPS/SMES 227

14 COMPANY PROFILES 228
14.1 INTRODUCTION 228
(Business overview, Products offered, Recent Developments, MNM view)*
14.2 KEY PLAYERS 229
14.2.1 NVIDIA 229
TABLE 152 NVIDIA: BUSINESS OVERVIEW 229
FIGURE 50 NVIDIA: COMPANY SNAPSHOT 230
TABLE 153 NVIDIA: PRODUCTS OFFERED 230
TABLE 154 NVIDIA: PRODUCT LAUNCHES 231
TABLE 155 NVIDIA: DEALS 232
14.2.2 INTEL 235
TABLE 156 INTEL: BUSINESS OVERVIEW 235
FIGURE 51 INTEL: COMPANY SNAPSHOT 236
TABLE 157 INTEL: PRODUCTS OFFERED 236
TABLE 158 INTEL: PRODUCT LAUNCHES 237
TABLE 159 INTEL: DEALS 238
14.2.3 XILINX INC. 240
TABLE 160 XILINX INC.: BUSINESS OVERVIEW 240
FIGURE 52 XILINX INC.: COMPANY SNAPSHOT 241
TABLE 161 XILINX INC.: PRODUCTS OFFERED 241
TABLE 162 XILINX INC.: PRODUCT LAUNCHES 242
TABLE 163 XILINX INC.: DEALS 242
14.2.4 SAMSUNG ELECTRONICS CO., LTD 244
TABLE 164 SAMSUNG ELECTRONICS CO., LTD: BUSINESS OVERVIEW 244
FIGURE 53 SAMSUNG ELECTRONICS CO., LTD: COMPANY SNAPSHOT 245
TABLE 165 SAMSUNG ELECTRONICS CO., LTD: PRODUCTS OFFERED 246
TABLE 166 SAMSUNG ELECTRONICS CO., LTD: PRODUCT LAUNCHES 246
TABLE 167 SAMSUNG ELECTRONICS CO., LTD: DEALS 247
14.2.5 MICRON TECHNOLOGY 248
TABLE 168 MICRON TECHNOLOGY: BUSINESS OVERVIEW 248
FIGURE 54 MICRON TECHNOLOGY: COMPANY SNAPSHOT 249
TABLE 169 MICRON TECHNOLOGY: PRODUCTS OFFERED 250
TABLE 170 MICRON TECHNOLOGY: PRODUCT LAUNCHES 251
TABLE 171 MICRON TECHNOLOGY: DEALS 251
14.2.6 INTERNATIONAL BUSINESS MACHINES CORPORATION (IBM) 253
FIGURE 55 IBM: COMPANY SNAPSHOT 253
TABLE 172 IBM: BUSINESS OVERVIEW 254
TABLE 173 IBM: PRODUCTS OFFERED 254
TABLE 174 IBM: PRODUCT LAUNCHES 255
TABLE 175 IBM: DEALS 256
14.2.7 AMAZON WEB SERVICES (AWS) 259
TABLE 176 AMAZON WEB SERVICES: BUSINESS OVERVIEW 259
FIGURE 56 AMAZON WEB SERVICES: COMPANY SNAPSHOT 260
TABLE 177 AMAZON WEB SERVICES: PRODUCTS OFFERED 261
TABLE 178 AMAZON WEB SERVICES: PRODUCT LAUNCHES 261
TABLE 179 AMAZON WEB SERVICES: DEALS 263
14.2.8 MICROSOFT CORPORATION 266
TABLE 180 MICROSOFT CORPORATION: BUSINESS OVERVIEW 266
FIGURE 57 MICROSOFT CORPORATION: COMPANY SNAPSHOT 267
TABLE 181 MICROSOFT CORPORATION: PRODUCTS OFFERED 267
TABLE 182 MICROSOFT CORPORATION: PRODUCT LAUNCHES 269
TABLE 183 MICROSOFT CORPORATION: DEALS 270
14.2.9 PALO ALTO NETWORKS 272
TABLE 184 PALO ALTO NETWORKS: BUSINESS OVERVIEW 272
FIGURE 58 PALO ALTO NETWORKS: COMPANY SNAPSHOT 273
TABLE 185 PALO ALTO NETWORKS: PRODUCTS OFFERED 273
TABLE 186 PALO ALTO NETWORKS: PRODUCT LAUNCHES 274
TABLE 187 PALO ALTO NETWORKS: DEALS 274
14.2.10 TRELLIX 276
TABLE 188 TRELLIX: BUSINESS OVERVIEW 276
TABLE 189 TRELLIX: PRODUCTS OFFERED 276
TABLE 190 TRELLIX: PRODUCT LAUNCHES 277
14.2.11 CROWDSTRIKE 278
TABLE 191 CROWDSTRIKE: BUSINESS OVERVIEW 278
FIGURE 59 CROWDSTRIKE: COMPANY SNAPSHOT 279
TABLE 192 CROWDSTRIKE: PRODUCTS OFFERED 279
TABLE 193 CROWDSTRIKE: PRODUCT LAUNCHES 280
TABLE 194 CROWDSTRIKE: DEALS 280
14.2.12 NORTON LIFELOCK 282
TABLE 195 NORTON LIFELOCK: BUSINESS OVERVIEW 282
FIGURE 60 NORTON LIFELOCK: COMPANY SNAPSHOT 283
TABLE 196 NORTON LIFELOCK: PRODUCTS OFFERED 283
TABLE 197 NORTON LIFELOCK: PRODUCT LAUNCHES 284
TABLE 198 NORTON LIFELOCK: DEALS 284
14.3 OTHER PLAYERS 285
14.3.1 CYLANCE 285
14.3.2 THREATMETRIX 286
14.3.3 SECURONIX 287
14.3.4 SIFT SCIENCE 288
14.3.5 ACALVIO TECHNOLOGIES 289
14.3.6 DARKTRACE 290
14.3.7 SPARKCONGNITION 291
14.3.8 FORTINET 292
14.3.9 CHECK POINT SOFTWARE TECHNOLOGIES 293
14.3.10 HIGH-TECH BRIDGE 294
14.3.11 DEEP INSTINCT 295
14.3.12 SENTINELONE 296
14.3.13 FEEDZAI 297
14.3.14 VECTRA 298
14.3.15 ZIMPERIUM 299
14.3.16 ARGUS CYBER SECURITY 300
14.3.17 NOZOMI NETWORKS 300
14.3.18 BITSIGHT TECHNOLOGIES 301
14.4 ANTIVIRUS COMPANIES 302
14.4.1 KASPERSKY LAB 302
14.4.2 BITDEFENDER 302
14.4.3 ESET 303
*Details on Business overview, Products offered, Recent Developments, MNM view might not be captured in case of unlisted companies.
15 APPENDIX 304
15.1 DISCUSSION GUIDE 304
15.2 KNOWLEDGESTORE: MARKETSANDMARKETS’ SUBSCRIPTION PORTAL 309
15.3 CUSTOMIZATION OPTIONS 311
15.4 RELATED REPORTS 311
15.5 AUTHOR DETAILS 312


    お問合せフォーム

    • *のある項目は必須項目です。

    • レポートのタイトルは自動で入ります。

    • 無料サンプルはご購入を検討されている方向けのレポート形式等確認用資料です。
      重要記述や数値は記載されていません。予めご了承ください。

    お名前*

    会社名*

    部署名

    メールアドレス*

    電話番号

    当ウェブサイトを知った経緯を教えてください。

    お問合せ内容

    株式会社SEMABIZ・ChosaReport.com プライバシーポリシー

    Eメールでのお問合せもお受けしております。
    下記アドレスへ“(at)”を“@”に変えてお送りください。通常1営業日以内にご返信いたします。
    crinquiry(at)chosareport.com