Content of the study

Available languages

MARKET SUMMARY

1.1 Presentation

Nicolas Arpagian, author of the book Cybersecurity, defines the concept of cybersecurity as follows: "Cybersecurity includes both the protection and attack of computer equipment (the war for or against information), in order to monitor or take control of it, and the information available on the Internet (the war by information), with possible damage to reputation, theft of sensitive data, digital piracy and other slander campaigns."

In other words, Cybersecurity concerns the defensive and offensive usage of information systems that irrigate our modern organizations. It takes into account both the technical means used for data exchange as well as the content (information that circulates, information that is stored etc.)

Cybersecurity is one of the most important "SMACS" which includes social networks, data analysis, cloud computing and cybersecurity. Violations in Cybersecurity are numerous and concern phishing, ransom software, infection with spyware, destruction or alteration of information, hacking of information, data theft, blocking or slowing down a site, hacking of personal data or even power and air conditioning failure in a computer room.

New destructive practices are developing in cyber space, including criminal use of the Internet (cybercrime), including for terrorist purposes; large-scale propagation of false information and manipulation; espionage for political or economic ends; and attacks on critical infrastructure (transport, energy, communication, etc.) for the purposes of sabotage.

Attacks can come both from State or non-State groups and often they involve the following characteristics:

  • Know no border or distance;
  • Are difficult to trace it is very hard to formally identify the true culprits, who are often acting under the cover of unwitting relays (botnets) or proxies;
  • Can be carried out with relative ease, with little cost or risk for the attacker. They aim to jeopardize the smooth functioning of communication and information systems (CIS) used by citizens, businesses and administrations, and even the physical integrity of infrastructure that is crucial to national security.

DEMAND ANALYSIS

MARKET STRUCTURE

ANALYSIS OF THE OFFER

RULES AND REGULATIONS

POSITIONING OF THE ACTORS

To keep reading, buy the full research

What is in this market study?

  • What are the figures on the size and growth of the market?
  • What is driving the growth of the market and its evolution?
  • What are the latest trends in this market?
  • What is the positioning of companies in the value chain?
  • How do companies in the market differ from each other?
  • Access company mapping and profiles.
  • Data from several dozen databases

  • This market study is available online and in pdf format (38 p.)
  • Download an example
  • Recent reviews ★★★★☆ 
Buy this market study 89€

Availability within 1 business day

Buy a pack and get an immediate discount

Pack 5 études (-15%) - France

378€

  • 5 études au prix de 75,6€HT par étude à choisir parmi nos 800 titres sur le catalogue France pendant 12 mois
  • Conservez -15% sur les études supplémentaires achetées
  • Choisissez le remboursement des crédits non consommés au terme des 12 mois (durée du pack)

Consultez les conditions du pack et de remboursement des crédits non consommés.

Inclus dans ce pack: This study (The cybersecurity market - France) + 4 other studies of your choice

Buy the 5 Study Pack 378€

Pack 10 études (-20%) - France

712€

  • 10 études au prix de 71,2€HT par étude à choisir parmi nos 800 titres sur le catalogue France pendant 12 mois
  • Conservez -20% sur les études supplémentaires achetées
  • Choisissez le remboursement des crédits non consommés au terme des 12 mois (durée du pack)

Consultez les conditions du pack et de remboursement des crédits non consommés.

Inclus dans ce pack: This study (The cybersecurity market - France) + 9 other studies of your choice

Buy the 10 Study Pack 712€

Method

Data
Analysts 1 sector analyzed
in 40 pages
Method
Control

Analysts

  • Top Universities
  • Expert opinion

Data

  • Databases
  • Press
  • Company reports

Control

  • Continuously updated
  • Permanent watch

Method

  • Synthetic structure
  • Standardized charts

Analysts

chargé d'études économiques, Xerfi

Hugo Schott

Hugo Schott logo 1 Hugo Schott logo 2

Associate Consultant

Mathieu Luinaud

Mathieu Luinaud logo 1 Mathieu Luinaud logo 2

PhD Industrial transformations

Robin Charbonnier

Robin Charbonnier logo 1 Robin Charbonnier logo 2

Analyst

Pierre Doussau

Pierre Doussau logo 1 Pierre Doussau logo 2

President Ross Alumni Club France

Arnaud Walter

Arnaud Walter logo 1 Arnaud Walter logo 2

Analyste de marché chez Businesscoot

Amaury de Balincourt

Amaury de Balincourt logo 1 Amaury de Balincourt logo 2

Consultant

Pierrick Cudonnec

Pierrick Cudonnec logo 1 Pierrick Cudonnec logo 2

Project Finance Analyst, Consulting

Maelle Vitry

Etudiante en Double-Diplôme Ingénieur-Manager Centrale

Héloise Fruchard

Héloise Fruchard logo 1 Héloise Fruchard logo 2

EDHEC

Imane Essadiq

Imane Essadiq logo 1 Imane Essadiq logo 2

Auditeur

Vincent Defrenet

Vincent Defrenet logo 1 Vincent Defrenet logo 2

Eva-Garance Tison

Eva-Garance Tison logo 1 Eva-Garance Tison logo 2

Market Research Analyst

Michela Grimaldi

Michela Grimaldi logo 1 Michela Grimaldi logo 2

Market Research Analyst @Businesscoot

Azelie Prigent

Azelie Prigent logo 1 Azelie Prigent logo 2

Market Research Analyst @Businesscoot

Cantiane Gueguen

Cantiane Gueguen logo 1 Cantiane Gueguen logo 2

Consultant

Jules Decour

Jules Decour logo 1 Jules Decour logo 2
Alexia Vacheron

Alexia Vacheron

Emil Ohlsson

Emil Ohlsson

Anna Oeser

Anna Oeser

Gabriel Salvitti

Gabriel Salvitti