Service Hotline +86 400-068-7188

China Information Security Industry Indepth Research and Investment Strategy Report, 2013-2017

China Information Security Industry Indepth Research and Investment Strategy Report, 2013-2017

China Information Security Industry Indepth Research and Investment Strategy Report, 2013-2017

A must-have for enterprise medium to long-term strategic planning

Without deep industry knowledge, it will be difficult to gain any return

English Version:USD7900

Including: Paper back + Electronic Copy + Invoice

Customer Hotline:+86 755 - 82925195 / 82925295

Free Hotline:+86 400-068-7188After-sales Hotline: +86 755-33013088

The Ministry of Commerce of the People's Republic of China designated Qianzhan Industrial Research Institute as the only "regional workstation for dealing with trade friction" in the Guangdong-Hong Kong-Macao Greater Bay Area

Special Statement

We are aware of that the content of our products have been stolen by some ones who changed the design and used it to deceive customers as it is their own products. Customers who are misled may experience no product received or an incomplete product. Therefore, Qianzhan Industrial Research Institute encourage you to arrange an in-person visit to our company before you make the purchase. Qianzhan has the sole copyright of all research reports. We have never had partnership or affiliated with any third party agent. Please recognize the"前瞻"trademark when purchasing reports.To have better investment return or strategic outcomes, you must have a forward-looking vision. Qianzhan Industrial Research Institute - China's leading industry consulting institutions provide you with all the things you need in business!

* The table of contents and the rest of this report are originally created by Qianzhan. Without any prior written permission, it is prohibited to copy or reproduce in any way. To have better investment return or strategic outcomes, you must have a forward-looking vision!

  • Table of Contents

  • Content Summary

China Information Security Industry Indepth Research and Investment Strategy Report, 2013-2017

Chapter 1: Development Overview of China Information Security Industry

1.1 Overview of Information Security Industry

1.1.1 Connotation of Information Security Industry

(1) Definition of Information Security

(2) Nature of Information Security

(3) Principle of Information Security

1.1.2 Major Products and Service of Information Security Industry

1.2 Characteristics of Information Security Industry

1.2.1 Regional Characteristics of Information Security Industry

1.2.2 Periodic Characteristics of Information Security Industry

1.2.3 Seasonal Characteristics of Information Security Industry

1.3 Industrial Chain Analysis of Information Security Industry

1.3.1 Industrial Chain Brief of Information Security Industry

1.3.2 Major Upstream Industries of Information Security Industry

(1) Development Status of Software Industry

(2) Development Status of Industrial Control Equipment Market

1.3.3 Major Downstream Industry of Information Security Industry

(1) Development Status and Trend of Information Industry

(2) Development Status and Trend of Financial Industry

(3) Development Status and Trend of Energy Industry

(4) Development Status and Trend of Military Industry

Chapter 2: Development Status of China Information Security Industry

2.1 Development Overview of Information Security Industry

2.1.1 Development Stages of Information Security Industry

(1) Budding Stage

(2) Growing Stage

(3) Widespread Stage

2.1.2 Development Characteristics of Information Security Industry

2.1.3 Influencing Factors to Information Security Industry

(1) Favorable Factors

(2) Unfavorable Factors

2.1.4 Market Scale of Information Security Industry

2.1.5 Industrial Structure of Information Security Industry

2.1.6 Common Status and Challenge of Information Security Industry

2.2 Development Status of Information Security Industry in Major Provinces and Cities

2.2.1 Development of Information Security Industry in Beijing City

(1) Supporting Policy of Information Security Industry in Beijing City

(2) Development Status of Information Security Industry in Beijing City

(3) Major Enterprises of Information Security Industry in Beijing City

2.2.2 Development of Information Security Industry in Shanghai City

(1) Supporting Policy of Information Security Industry in Shanghai City

(2) Development Status of Information Security Industry in Shanghai City

(3) Major Enterprises of Information Security Industry in Shanghai City

2.2.3 Development of Information Security Industry in Sichuan Province

(1) Supporting Policy of Information Security Industry in Sichuan Province

(2) Development Status of Information Security Industry in Sichuan Province

(3) Major Enterprises of Information Security Industry in Sichuan Province

2.2.4 Development of Information Security Industry in Guangdong Province

(1) Supporting Policy of Information Security Industry in Guangdong Province

(2) Development Status of Information Security Industry in Guangdong Province

(3) Major Enterprises of Information Security Industry in Guangdong Province

2.3 Downstream Demand of Information Security Industry

2.3.1 Parallel Market Demand of Information Security Industry

(1) Information Security Demand in the aspect of Government

(2) Information Security Demand in the aspect of Finance

(3) Information Security Demand in the aspect of Education

2.3.2 Vertical Market Demand of Information Security Industry

(1) Information Security Demand in the aspect of Large and Medium-sized Enterprises

(2) Information Security Demand in the aspect of Medium and Small-sized Enterprises

(3) Information Security Demand in the aspect of household

2.3.3 Demand of Information Security Industry in different Fields

(1) Information Security Demand in the aspect of State Infrastructure

(2) Information Security Demand in the aspect of E-government-affairs

(3) Information Security Demand in the aspect of E-commerce

(4) Information Security Demand in the aspect of Industry Informationization

(5) Information Security Demand in the aspect of Urban Informationization

Chapter 3: Market Environment of China Information Security Industry

3.1 Policy Environment of Information Security Industry

3.1.1 Supervision System of Information Security Industry

3.1.2 Relevant Policies of Information Security Industry

(1) “Twelfth Five Years” Plan on the Development of National Economy and Society

(2) Procedures on Electronic Authentication Service Password

(3) Procedures on Information Safety Ranking Protection

(4) Guidance on Information Security Technology basing on Information Security Safe Implementation of Internet E-government-affairs

(5) Regulations on Trusted Computing Password Support Platform Function and Interface Specification

3.1.3 Relevant Standards of Information Security Industry

(1) Sarbanes-Oxley Act

(2) Risk Assessment on the Information Security of National E-Government Engineering Construction Project

(3) Guidance of Commercial Bank Internal Control

3.1.4 “Twelfth Five Years” Development Plan on Information Security Industry

3.2 Economic Environment of Information Security Industry

3.2.1 Status and Trend of Domestic Economic Environment

(1) Operation of Domestic Macro Economy

(2) Forecast of Domestic Macro Economy

3.2.2 Development Status of Domestic Informationization

(1) Development Status of Industry Informationization

(2) Development Status of Urban Informationization

3.3 Social Environment of Information Security Industry

3.3.1 Threat of 2010 Global Information Security

3.3.2 Status of 2010 Domestic Computer Viruses

3.3.3 Analysis of 2010 Domestic Internet Security Hole

Chapter 4: Technology Development of China Information Security Industry

4.1 Factors of Information Security Technology

4.1.1 Positioning and Basic Content of Physical Security Technology

(1) Positioning of Physical Security

(2) Basic Elements of Physical Security

(3) Basic Content of Physical Security

4.1.2 Positioning and Basic Content of Cryptographic Technique

(1) Positioning of Cryptographic Technique

(2) Basic Principle of Cryptographic Technique

(3) Application of Cryptographic Technique

4.1.3 Positioning and Basic Content of Identity Recognition Technology

(1) Positioning of Identity Recognition

(2) Realization of Identity Recognition

4.1.4 Positioning and Basic Content of Access Control Technology

(1) Positioning of Access Control Technology

(2) Basic Content of Access Control Technology

(3) Model of Access Control

(4) Realization of Access Control

4.1.5 Positioning and Basic Content of Malicious Code Prevention Technology

(1) Positioning of Malicious Code Prevention Technology

(2) Classification and Working Principle of Malicious Code

(3) Prevention Technology of Malicious Code

4.1.6 Positioning and Basic Content of Risk Analysis Technology

(1) Positioning of Risk Analysis Technology

(2) Basic Content of Risk Analysis

(3) Security Scanning Technology

4.2 Information Security Technology System

4.2.1 Layering Technology Protection Framework of Information Security

4.2.2 Regional Technology Protection Framework of Information Security

(1) Local Computer Environment Security

(2) Boundary Security and Information Exchange

(3) Internet Transmission Security

(4) Supports of Infrastructure

4.2.3 Ranking Technology Protection Framework of Information Security

(1) Classification of Information Security Ranking Protection

(2) Technology System of Information Security Ranking Protection

4.2.4 Domestic Technology Protection Framework of Information Security

(1) Safety Engineering of Information System

(2) Dynamical Process Protection of Information Security

4.2.5 Guarantee Framework of Typical Information Security Technology

(1) Regional Protection Framework of E-government-affairs

(2) Ranking Security Guarantee Technology Framework of E-government-affairs

4.3 Overview of Information Security Sub-system

4.3.1 Secure Operating System

(1) Development of Secure Operating System

(2) Basic Content of Secure Operating System

4.3.2 Secure Database Management System

(1) Development of Secure Database Management System

(2) Basic Content of Secure Database Management System

4.3.3 Secure Network System

(1) Practical Security Protocol

(2) Firewall System

(3) VPN System

(4) Security Isolation System

4.3.4 Information Security Detection System

(1) Development of Information Security Detection System

(2) Intrusion Detection System

(3) Information Content Detection System

4.4 Technology Status and Gap of Information Security Industry

4.4.1 Overview of Information Security Industry

(1) Domestic Mainstream Information Security Technology

(2) Production Flow of Information Security Products

(3) Business Flow of Information Security Service

4.4.2 Technology Gap of Information Security Industry

(1) Small Gap between China and International Advanced Level in the aspect of Core Technology

(2) Comparable Ability to Combine Service with Security Technology

(3) Limited Capability to Transfer Security Technology into Products

(4) Significant Gap of Application Environment Creates a Huge Potential Market

4.4.3 New Technology Trend of Information Security Industry

(1) International New Technology Trend

(2) Domestic New Technology Trend

Chapter 5: Competition of China Information Security Industry

5.1 Competition of International Information Security Industry

5.1.1 Development Overview of International Information Security Industry

(1) Development Progress

(2) Market Scale

(3) Market Structure

5.1.2 Competitive Landscape of International Information Security Industry

5.1.3 Development Trend of International Information Security Industry

5.2 Investment Distribution of Transnational Information Security Enterprises in China

5.2.1 Investment Distribution of Symantec Company in China

5.2.2 Investment Distribution of McAfee Company in China

5.2.3 Investment Distribution of Kaspersky Company in China

5.2.4 Investment Distribution of RSA in China

5.2.5 Investment Distribution of Fortine in China

5.2.6 Investment Distribution of Cisco Systems in China

5.3 Competition of Domestic Information Security Industry

5.3.1 Bargaining Capability of Domestic Information Security Industry

(1) Upstream Bargaining Capability

(2) Downstream Bargaining Capability

5.3.2 Potential Threats of Domestic Information Security Industry

(1) Threats of New Entrants

(2) Threats of Alternative Products

5.3.3 Competitive Landscape of Domestic Information Security Industry

(1) Fast Growth of Market, Abundant Manufacturers, and Low Brand Concentration Degree

(2) Ways for Information Security Manufacturers to Realize Differential Competition

5.4 Investment, Merger and Reconstruction of Information Security Industry

5.4.1 Investment, Merger and Reconstruction of International Information Security Industry

(1) Investment, Merger and Reconstruction Trend of International Market

(2) Highlights from Investment, Merger and Reconstruction of International Market

5.4.2 Investment, Merger and Reconstruction of Domestic Information Security Industry

5.4.3 Characteristics of Investment, Merger and Reconstruction of Information Security Industry

Chapter 6: Market Segmentation of China Information Security Industry

6.1 Market Characteristics of Information Security Industry

6.1.1 Product Structure Characteristics of Information Security Industry

6.1.2 Product Demand Characteristics of Information Security Industry

6.2 Information Security Hardware Market

6.2.1 Analysis of Firewall/VPN Market

(1) Status of Firewall/VPN Market

(2) Structure of Firewall/VPN Market

(3) Trend of Firewall/VPN Market

6.2.2 Analysis of IDS/IPS Market

(1) Status of IDS/IPS Market

(2) Structure of IDS/IPS Market

(3) Trend of IDS/IPS Market

6.2.3 Analysis of UTM Market

(1) Overview of UTM Market

(2) Development Status of UTM Market

(3) Marketing Program of UTM Market

(4) Development Trend of UTM Market

(5) Forecast of UTM Market Capacity

6.3 Analysis of Information Security Software Market

6.3.1 Security Product Market of WEB Business

(1) Overview of WEB Business

(2) Security Product Market of WEB Business

(3) Marketing Program of Security Product Market of WEB Business

(4) Security Product Market Capacity Forecast of WEB Business

6.3.2 Analysis of Security Management Platform Market

(1) Overview of Security Management Platform Market

(2) Development Status of Security Management Platform Market

(3) Marketing Program of Security Management Platform Market

(4) Capacity Forecast of Security Management Platform Market

6.3.3 Analysis of Terminal Security Management Market

(1) Overview of Terminal Security Management Market

(2) Development Status of Terminal Security Management Market

(3) Marketing Program of Terminal Security Management Market

(4) Development Trend of Terminal Security Management Market

(5) Capacity Forecast of Terminal Security Management Market

6.4 Analysis of Information Security Service Market

6.4.1 Overview of Security Service Market

6.4.2 Development Status of Security Service Market

(1) Market Scale

(2) Major Enterprises

6.4.3 Development Trend of Security Service Market

(1) Improving Attention to Security Service of Users

(2) Strict Information Security Policy will Promote the Popularization of Security Service

6.4.4 Capacity Forecast of Security Service Market

Chapter 7: Production and Management of Major Enterprises of Information Security Industry

7.1 Development Overview of Information Security Industry

7.2 Cases Study of Information Security Enterprises

7.2.1 Management Analysis of Beijing Venustech Inc.

(1) Brief Analysis of Enterprise Development

(2) Analysis of Major Economic Index

(3) Analysis of Enterprise Profitability

(4) Analysis of Enterprise Operational Capability

(5) Analysis of Enterprise Debt-paying Ability

(6) Analysis of Enterprise Development Capability

(7) Analysis of Enterprise’s Equity Structure and Organization Structure

(8) Analysis of Enterprise Management Model

(9) Analysis of Enterprise Qualification and Capability

(10) Analysis of Enterprise Product Structure and Solutions

(11) Analysis of Enterprise’s Service System and Customer Network

(12) Analysis of Enterprise Management Advantages and Disadvantages

(13) Analysis of Enterprise Investment, Merger and Reconstruction

(14) Analysis of Enterprise Latest Development Trend

7.2.2 Management of Westone Information Industry Inc.

(1) Brief Analysis of Enterprise Development

(2) Analysis of Major Economic Index

(3) Analysis of Enterprise Profitability

(4) Analysis of Enterprise Operational Capability

(5) Analysis of Enterprise Debt-paying Ability

(6) Analysis of Enterprise Development Capability

(7) Analysis of Enterprise Organization Structure

(8) Analysis of Enterprise Qualification and Capability

(9) Analysis of Enterprise Product Structure and Solutions

(10) Analysis of Enterprise’s Service System and Customer Network

(11) Analysis of Enterprise Management Advantages and Disadvantages

(12) Analysis of Enterprise Investment, Merger and Reconstruction

(13) Analysis of Enterprise Latest Development Trend

7.2.3 Management Analysis of Netac Technology Co., Ltd.

(1) Brief Analysis of Enterprise Development

(2) Analysis of Major Economic Index

(3) Analysis of Enterprise Profitability

(4) Analysis of Enterprise Operational Capability

(5) Analysis of Enterprise Debt-paying Ability

(6) Analysis of Enterprise Development Capability

(7) Analysis of Enterprise Organization Structure

(8) Analysis of Enterprise Management Structure

(9) Analysis of Enterprise Qualification and Capability

(10) Analysis of Enterprise Product Structure and Solutions

(11) Analysis of Enterprise’s Service System and Customer Network

(12) Analysis of Enterprise R&D of Technology Product

(13) Analysis of Enterprise Management Advantages and Disadvantages

(14) Analysis of Enterprise Investment, Merger and Reconstruction

(15) Analysis of Enterprise Latest Development Trend

7.2.4 Management Analysis of Meiya Pico

(1) Brief Analysis of Enterprise Development

(2) Analysis of Major Economic Index

(3) Analysis of Enterprise Profitability

(4) Analysis of Enterprise Operational Capability

(5) Analysis of Enterprise Debt-paying Ability

(6) Analysis of Enterprise Development Capability

(7) Analysis of Enterprise’s Equity Structure and Organization Structure

(8) Analysis of Enterprise Management Model

(9) Analysis of Enterprise Qualification and Capability

(10) Analysis of Enterprise Product Structure and Solutions

(11) Analysis of Enterprise’s Service System and Customer Network

(12) Analysis of Enterprise Management Advantages and Disadvantages

(13) Analysis of Enterprise Investment, Merger and Reconstruction

(14) Analysis of Enterprise Latest Development Trend

7.2.5 Management Analysis of Legendsec Information Technology (Beijing) Inc.

(1) Brief Analysis of Enterprise Development

(2) Analysis of Enterprise Qualification and Capability

(3) Analysis of Enterprise Product Structure and Solutions

Reporting core values

Presently, investment proportion of information security to overall IT in China is only 1%-2% while it is 8%-12% in Euro-American countries. Thus as the application environment and user demand of domestic information security market is gradually mature, the market space is huge. Current these years, the infiltrated rate of internet continuously increases and commercialization trend of internet is obvious. Corporations are willing to strengthen the investment of information security due to the worsen information security condition. Therefore, the industry is facing great opportunity.

Main Contents of report

China information security industry starts late and experience three important stages (beginning, outbreak and popularization) since the beginning of this century. The industry scale gradually expands especially in current years. Damages bring by various network threats promote the increasing demand of information security products and services. Besides, government attaching great importance and policy supports also continuously promote the fast development of China information security industry. Market scale of China information security in 2010 reaches 11.174 billion Yuan with a year-on-year growth of 20.23%.

Currently, information security industry in China had already had certain protection, the supervision and control ability in view of each kind of network threat behaviors. The market development potential is continuously increasing. In the aspect of market demand, key industries for information security corporations are still government, telecom, bank, energy and army. And new markets--such as securities, transportation, education and manufacturing--which with a strong demand bring new vitality to information security products market. In the aspect of product structure, the category of information security products is gradually rich. Fields, such as network boundary security, intranet information security and outer-net information exchange security are in an all-round development.

View from the global range, information security market of America, France, Israel, British and Denmark is mature while that of Japan, China and Australia is stably developing and with a gradually strong competition. In the aspect of corporations, Fortineth, Cisco and Juniper firmly take the top three of the information security market. Even the corporations with strong strength in China market can hardly compete with the three giants. As the market competition at home and abroad in the future will be fiercer, only the manufacturers who advance in technology, brand, talent and capital can become the potential industry integrator. Merger in the industry is inevitable.

Presently, investment proportion of information security to overall IT in China is only 1%-2% while it is 8%-12% in Euro-American countries. Thus as the application environment and user demand of domestic information security market is gradually mature, the market space is huge. Current these years, the infiltrated rate of internet continuously increases and commercialization trend of internet is obvious. Corporations are willing to strengthen the investment of information security due to the worsen information security condition. Therefore, the industry is facing great opportunity.

In spite of this, our government will strengthen impacts on information security corporations by the aspects of technology, standard and management. With the improvement of informationization in China and network security demand, demand of network security industry will be further developed and become mature. And information security demand of new markets like securities, transportation, education and manufacturing will greatly increase. Driving by a series of factors China information security industry will keep a fast development trend. It is predicted that annual growth rate for the whole information security market in China will be over 20% from 2011 to 2015. And the industry market scale is hopefully to reach 29.427 billion Yuan by 2015.

Qianzhan Business Information Co., Ltd. Industry Research College
Research Team of Information Security Industry

For any special needs, please contact us.Customize Your Report

  • The National Bureau of Statistics Foreign-related investigation Permission

  • National Innovation Company and Dual Software Certified Enterprise

  • The only DRC desginated Enterprise of the Industry Yearbook

  • National Ministry of Commerce designated Industrial Early Warning and Monitoring Workstation

  • Guangdong Province Enterprise of Observing Contract and Valuing Credit

Qianzhan Industrial Research Institute· The leading company of China Business Consulting

  • 01

    Qianzhan is an industry consulting service provider with national innovation company qualification, independent research and development of industrial big data and Dual Software Certification.

  • 02

    Qianzhan is a consulting and research organization that has been engaged in business consulting for over 16 years in China.

  • 03

    Qianzhan is a consulting service provider with a team of nearly 300 industrial researchers and analysts.

  • 04

    Qianzhan is a consulting service provider with an in-house expert pool of 1200 experts.

  • 05

    Qianzhan is a research and consulting organization that have served 180000 clients and received over positive comments from 100000 of our clients.

  • 06

    Qianzhan is an industry research and consulting organization that has been designated by the highest authority, the DRC, to prepare the yearbook.

  • 07

    Qianzhan is an industry planning and consulting organization that adopts the internationally synchronized SCP scientific analysis model and the perfect industry chain research map to guide the business planning and consulting.

  • 08

    Qizhan is a consulting service organization that helps enterprises to solve the five aspects of industry research, planning, strategic design, capital operation and implementation.

What Else do We Offer

Contact Us

Shenzhen Headquarter

Free Hotline:+86 400-068-7188

Customer Hotline:+86 755 - 82925195 / 82925295

Email Address:service@qianzhan.com

3rd Floor, FIYTA Building West, High Tech South Avenue 1, Nanshan District, Shenzhen, China

Shanghai Office

Location:Rm.1106, Building 1, Jiayu International Plaza, Songhu Road, Yangpu District,
Shanghai, China