46
(Source: U.S. Congress GAO July 2015) Homeland Security Research Corp. 2016-2020 U.S. Financial Services: Cybersecurity Systems & Services Market

2016-2020 U.S. Financial Services: Cybersecurity Systems

Embed Size (px)

Citation preview

Page 1: 2016-2020 U.S. Financial Services: Cybersecurity Systems

(Source: U.S. Congress GAO July 2015)

Homeland Security Research Corp.

2016-2020

U.S. Financial Services: Cybersecurity Systems

& Services Market

Page 2: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 2

2 Volumes:

U.S. Financial Services: Cybersecurity

Systems & Services Market - 2016-2020 -

Volume 1

U.S. Financial Services: Cybersecurity

Systems & Services Market - 2016-2020 -

Volume 2

Page 3: 2016-2020 U.S. Financial Services: Cybersecurity Systems

(Source: U.S. Congress GAO July 2015)

Homeland Security Research Corp.

2016-2020

U.S. Financial Services: Cybersecurity Systems

& Services Market

Volume 1

Page 4: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 2

U.S. Financial Services:

Cybersecurity Systems &

Services Market

Volume 1

August 2015 Homeland Security Research Corp. (HSRC) is an international market and technology research firm specializing in the Homeland Security (HLS) & Public Safety (PS) Industry. HSRC provides premium market reports on present and emerging technologies and industry expertise, enabling global clients to gain time-critical insight into business opportunities. HSRC’s clients include U.S. Congress, DHS, U.S. Army, U.S. Navy, NATO, DOD, DOT, GAO, and EU, among others; as well as HLS & PS government agencies in Japan, Korea, Taiwan, Israel, Canada, UK, Germany, Australia, Sweden, Finland, Singapore. With over 750 private sector clients (72% repeat customers), including major defense and security contractors, and Fortune 500 companies. HSRC earned the reputation as the industry’s Gold Standard for HLS & PS market reports.

Washington D.C. 20004, 601 Pennsylvania Ave., NW Suite 900, Tel: 202-455-0966, [email protected], www.homelandsecurityresearch.com

Page 5: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 3

Table of Contents

1 Executive Summary .................................................................................. 26

1.1 Major Findings .................................................................................. 26 1.2 U.S. Financial Services Cybersecurity Mitigation Market ................. 35

1.2.1 Market by Cybersecurity Technology & Service- 2016-2020 . 35 1.2.2 U.S. Financial Services Cybercrime Mitigation Market by

Sector - 2016-2020 ................................................................ 38

1.3 Major Conclusions ............................................................................ 40

MARKET BACKGROUND .................................................................................. 50

2 The Global Banking & Financial Services Industry ............................... 50 2.1 Payment Cards & Mobile Payment Providers & Retailers ................ 51 2.2 Electronic Money .............................................................................. 53

2.2.1 E-Money Security .................................................................. 53

2.2.2 E-Money Regulation .............................................................. 54 2.2.3 Electronic Money Systems ..................................................... 54

2.2.4 Centralized Systems .............................................................. 54 2.3 Global Non-Cash Transactions ........................................................ 54

2.3.1 Non-Cash Transactions: Facts, Figures and Trends ............. 54

2.3.2 Global Non-Cash Growth Drivers .......................................... 60 2.4 Global Mobile Devices Services ....................................................... 61

2.4.1 Overview ................................................................................ 61 2.4.2 NFC Payments from Mobile Phones ...................................... 62

2.5 Cryptocurrency Cybersecurity .......................................................... 62 2.6 Cybersecurity of the Future: Quantum Computing Encryption &

Code-Breaking ................................................................................. 64 2.7 The Global “Financial Services Information Sharing & Analysis

Center” ............................................................................................. 65

2.8 The Global Largest Banking & Financial Services Corporations ...... 67 2.9 The U.S. Banking & Financial Services Industry .............................. 70

2.9.1 Facts & Figures ...................................................................... 70

2.9.2 Roster of 21,643 Banking and Financial Services Enterprises (Incl. Corporate Contact Info) ................................................. 77

2.9.3 International Linkages and Coordination ............................... 78 2.9.4 U.S. Regulatory Environment ................................................ 79

3 Cyber Attacks Against Financial Institutions ......................................... 81 3.1 Scope ............................................................................................... 81 3.2 Depository Institutions I.T. Security Methods ................................... 82

3.3 Theft of Financial Assets .................................................................. 83 3.4 Business Information Theft ............................................................... 84 3.5 Insurance Sector Cybercrime ........................................................... 85

4 U.S. Banking & Financial Services Cyber-Threats Landscape ............. 90

Page 6: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 4

4.1 Introduction ...................................................................................... 90

4.2 Cybercrime in the U.S. ..................................................................... 92 4.2.1 Overview ................................................................................ 92

4.2.2 Consumer & Identity Theft ..................................................... 94 4.3 U.S. Cyber-crime Statistical Data ..................................................... 96

5 The U.S. Financial Services Cybersecurity Market Outlook ............... 105

6 Republican Congress Cybersecurity Legislation Outlook .................. 106

7 Financial Services Cybercrime Mitigation Market: SWOT Analysis ... 107

7.1 Strengths ........................................................................................ 107 7.2 Weaknesses ................................................................................... 108 7.3 Opportunities .................................................................................. 109 7.4 Threats ........................................................................................... 110

MARKET BY TECHNOLOGY & SERVICE ...................................................... 111

8 U.S. Financial Institutions Endpoint Security Submarket - 2016-2020 .......................................................................................................... 111 8.1 Endpoint Security Overview ........................................................... 111

8.2 Market Drivers ................................................................................ 112 8.3 U.S. Financial Institutions Endpoint Security Market - 2016-2020 . 113

8.3.1 Market Size - 2016-2020...................................................... 113

8.3.2 Market Dynamics ................................................................. 114 8.3.3 Market Share ....................................................................... 115

9 U.S. Financial Institutions Identity and Access Management Submarket - 2016-2020 ........................................................................... 116

9.1 Identity and Access Management Overview .................................. 116 9.1.1 Overview .............................................................................. 116

9.2 Market Drivers ................................................................................ 116 9.3 U.S. Financial Institutions Identity and Access Management

Market - 2016-2020 ........................................................................ 116

9.3.1 Market Size .......................................................................... 116 9.3.2 Market Dynamics ................................................................. 117 9.3.3 Market Share ....................................................................... 118

10 U.S. Financial Institutions Mobile Enterprise Management Submarket- 2016-2020 ............................................................................ 120 10.1 Mobile Enterprise Management Overview ...................................... 120

10.2 Market Background ........................................................................ 120 10.3 Market Drivers ................................................................................ 121 10.4 U.S. Financial Institutions Mobile Enterprise Management Market -

2016-2020 ...................................................................................... 121

10.4.1 Market Size .......................................................................... 121 10.4.2 Market Dynamics ................................................................. 122 10.4.3 Market Share ....................................................................... 123

Page 7: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 5

11 U.S. Financial Institutions Mobile Security Submarket- 2016-2020 .... 125

11.1 Mobile Security Overview ............................................................... 125 11.2 U.S. Banking, Financial Services, Retail & Payment Mobile

Security Market - 2016-2020 .......................................................... 125 11.2.1 Market Size .......................................................................... 125 11.2.2 Market Dynamics ................................................................. 126 11.2.3 Market Share ....................................................................... 127

12 U.S. Financial Institutions Security Information & Event Management Submarket - 2016-2020 .................................................... 129 12.1 Security Information and Event Management (SIEM): Market

Background .................................................................................... 129 12.2 Security Information Overload ........................................................ 130 12.3 Market Drivers ................................................................................ 132

12.4 U.S. Financial Institutions Security Information and Event Management Market - 2016-2020 .................................................. 133

12.4.1 Market Size .......................................................................... 133 12.4.2 Market Dynamics ................................................................. 134

12.4.3 Market Share ....................................................................... 135

13 U.S. Financial Institutions Content Security Submarket- 2016-2020 .. 137 13.1 Content Security Overview ............................................................. 137

13.2 Malware Mitigation ......................................................................... 137 13.3 Market Trends ................................................................................ 138

13.4 Market Drivers ................................................................................ 139 13.5 U.S. Financial Institutions Content Security Market - 2016-2020 .. 140

13.5.1 Market Size .......................................................................... 140

13.5.2 Market Dynamics ................................................................. 141

13.5.3 Market Share ....................................................................... 142

14 U.S. Financial Institutions Data Loss Prevention (DLP) Submarket- 2016-2020 ................................................................................................. 144

14.1 Data Loss Prevention Overview ..................................................... 144 14.2 Market Drivers ................................................................................ 145 14.3 U.S. Financial Institutions Data Loss Prevention (DLP) Market -

2016-2020 ...................................................................................... 146 14.3.1 Market Size .......................................................................... 146 14.3.2 Market Dynamics ................................................................. 147 14.3.3 Market Share ....................................................................... 148

15 U.S. Financial Institutions Datacenter Security Submarket- 2016-2020 .......................................................................................................... 149 15.1 Datacenter Security Overview ........................................................ 149

15.2 Market Drivers ................................................................................ 149 15.3 Datacenter Security Market Drivers................................................ 150 15.4 U.S. Financial Institutions Datacenter Security Market - 2016-

2020 ............................................................................................... 152 15.4.1 Market Size .......................................................................... 152

Page 8: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 6

15.4.2 Market Dynamics ................................................................. 153

15.4.3 Market Share ....................................................................... 154

16 U.S. Financial Institutions Firewall Submarket - 2016-2020 ............... 155

16.1 Firewalls - Background ................................................................... 155 16.2 U.S. Banking, Financial Services, Retail & Payment Firewall

Market - 2016-2020 ........................................................................ 156 16.2.1 Market Size .......................................................................... 156 16.2.2 Market Dynamics ................................................................. 158

16.2.3 Market Share ....................................................................... 159

17 U.S. Financial Institutions Next Generation Firewall Submarket -2016-2020 ................................................................................................. 160 17.1 Next Generation Firewall Market Background ................................ 160

17.2 U.S. Banking, Financial Services, Retail & Payment Next Generation Firewall Market - 2016-2020 ........................................ 161

17.2.1 Market Size .......................................................................... 161

17.2.2 Market Dynamics ................................................................. 162 17.2.3 Market Share ....................................................................... 163

18 U.S. Financial Institutions IDS/IPS Submarket - 2016-2020 ................ 164 18.1 Intrusion Prevention Systems and Intrusion Detection Systems -

Overview ........................................................................................ 164

18.2 IDS/IPS Market Ecosystem ............................................................ 164 18.3 Market Drivers ................................................................................ 165

18.4 U.S. Financial Institutions IDS/IPS Market - 2016-2020 ................. 166 18.4.1 Market Size .......................................................................... 166

18.4.2 Market Dynamics ................................................................. 167 18.4.3 Market Share ....................................................................... 168

19 U.S. Financial Institutions Unified Threat Management (UTM) Submarket - 2016-2020 ........................................................................... 170 19.1 Unified Threat Management Overview ........................................... 170

19.2 Market Drivers ................................................................................ 171 19.3 Market Inhibitors ............................................................................. 172 19.4 U.S. Financial Institutions Unified Threat Management Market -

2016-2020 ...................................................................................... 173 19.4.1 Market Size .......................................................................... 173 19.4.2 Market Dynamics ................................................................. 174 19.4.3 Market Share ....................................................................... 175

20 U.S. Financial Institutions Cloud-Based Security Services Submarket - 2016-2020 ........................................................................... 176 20.1 Cloud-Based Services Overview .................................................... 176

20.2 Hybrid Cloud .................................................................................. 176 20.3 Market Drivers ................................................................................ 177 20.4 U.S. Banking, Financial Services, Retail & Payment Cloud-Based

Services Market - 2016-2020 ......................................................... 178 20.4.1 Market Size .......................................................................... 178

Page 9: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 7

20.4.2 Market Dynamics ................................................................. 179

20.4.3 Market Share ....................................................................... 180

21 U.S. Financial Institutions Vulnerability/Risk Management & Managed Security Services Submarket - 2016-2020 ............................ 181 21.1 Vulnerability/Risk Management & Managed Security Services

Overview ........................................................................................ 181 21.1.1 Vulnerability Management ................................................... 181 21.1.2 Vulnerability Assessment ..................................................... 181

21.2 Vulnerability/Risk Management & Managed Cybersecurity Services Market Drivers ................................................................. 182

21.3 U.S. Financial Institutions Vulnerability/Risk Management & Managed Security Services Market - 2016-2020 ........................... 183

21.3.1 Market Size .......................................................................... 183

21.3.2 Market Dynamics ................................................................. 184 21.3.3 Market Share ....................................................................... 185

22 U.S. Financial Institutions Cybersecurity Consulting Market - 2016-2020 .......................................................................................................... 187

22.1 Market Size .................................................................................... 187 22.2 Market Dynamics............................................................................ 188 22.3 Market Share .................................................................................. 189

23 U.S. Banking, Financial Services, Retail & Payment Cybersecurity Integration Services Market - 2016-2020 ............................................... 190

23.1 Market Size .................................................................................... 190 23.2 Market Dynamics............................................................................ 191

23.3 Market Share .................................................................................. 192

24 U.S. Banking, Financial Services, Retail & Payment Education and Training Services Market - 2016-2020 ................................................... 193 24.1 Market Size .................................................................................... 193 24.2 Market Dynamics............................................................................ 194

24.3 Market Share .................................................................................. 195

25 U.S. Financial Institutions Forensics, VPN, Web Security, Policy & Compliance and Other Cybersecurity Services Market - 2016-2020 .. 196

25.1 Market Size .................................................................................... 196 25.2 Market Dynamics............................................................................ 197 25.3 Market Share .................................................................................. 198

26 U.S. Financial Institutions Cybersecurity Technology/ Service Submarkets Analysis - 2016-2020 ......................................................... 199 26.1 Technology/Service Submarkets Outlook - 2016-2020 .................. 199

26.1.1 Market Size - 2016-2020...................................................... 199

26.1.2 Market Dynamics - 2016-2020 ............................................. 200 26.1.3 Market Breakdown - 2016-2020 ........................................... 202

26.2 Major Banking, Financial Services, Retail & Payment Cybersecurity Markets .................................................................... 203

Page 10: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 8

26.2.1 Overview - 2016-2020 ......................................................... 203

26.2.2 Software Security U.S. Financial Services Market - 2016-2020207 26.2.3 Network Security U.S. Financial Services Market - 2016-2020210

MARKET BY FINANCIAL INDUSTRY SECTOR ............................................. 213

27 U.S. Financial Industry Cybersecurity Market Outlook by Financial Industry Sector........................................................................................ 213 27.1 Overview ........................................................................................ 213

27.1.1 Market Size - 2016-2020...................................................... 214 27.1.2 Market Dynamics - 2016-2020 ............................................. 215 27.1.3 Market Breakdown - 2016-2020 ........................................... 216

28 U.S. Banking Industry Cybersecurity Submarket - 2016-2020 ............ 218 28.1 U.S. Banking Industry Market Background ..................................... 218 28.2 U.S. Banking Industry Cybersecurity Market - 2016-2020 .............. 221

28.2.1 Market Size .......................................................................... 221

28.2.2 Market Dynamics ................................................................. 222 28.2.3 Market Share ....................................................................... 222

29 U.S. Insurance Industry Cybersecurity Submarket- 2016-2020 .......... 224 29.1 The U.S. Insurance Industry Market Background ........................... 224 29.2 U.S. Insurance Industry Cybersecurity Market - 2016-2020 ........... 227

29.2.1 Market Size .......................................................................... 227 29.2.2 Market Dynamics ................................................................. 228

29.2.3 Market Share ....................................................................... 229

30 U.S. Payment Card & Mobile Payment Providers and Retailers Cybersecurity Submarket- 2016-2020 ................................................... 231 30.1 U.S. Payment Card Companies & Mobile Payment Providers

industry Market Background ........................................................... 231 30.2 The U.S. Chip and PIN Cards Transformation Program ................ 239 30.3 U.S. Payment Card & Mobile Payment Providers and Retailers

Cybersecurity Market - 2016-2020 ................................................. 242 30.3.1 Market Size .......................................................................... 242 30.3.2 Market Dynamics ................................................................. 243

30.3.3 Market Share ....................................................................... 244

31 U.S. Government Related Financial Services Sector Cybersecurity Submarket - 2016-2020 ........................................................................... 246

31.1 Government Related Financial Services Market Background ........ 246 31.2 U.S. Government Related Financial Services Sector Cybersecurity

Market - 2016-2020 ........................................................................ 247 31.2.1 Market Size .......................................................................... 247

31.2.2 Market Dynamics ................................................................. 248 31.2.3 Market Share ....................................................................... 249

Page 11: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 9

32 U.S. Stock Brokerages Industry & Exchanges Cybersecurity Submarket -2016-2020 ............................................................................ 251 32.1 Stock Brokerages Industry & Exchanges Market Background ....... 251

32.1.1 Overview .............................................................................. 251 32.1.2 Auction Exchanges - NYSE ................................................. 252 32.1.3 Nasdaq (an Electronic Exchange) ....................................... 253 32.1.4 Electronic Communication Networks (ECNs) ....................... 253 32.1.5 Over-the-Counter (OTC) ...................................................... 253

32.1.6 Stock Brokers and Exchanges Cybersecurity Vulnerabilities254 32.1.7 Threat Profile for Securities Markets .................................... 255

32.2 U.S. Stock Brokerages Industry & Exchanges Cybersecurity Market - 2016-2020 ........................................................................ 256

32.2.1 Market Size .......................................................................... 256

32.2.2 Market Dynamics ................................................................. 257 32.2.3 Market Share ....................................................................... 258

33 U.S. Pension Funds Industry Cybersecurity Submarket - 2016-2020 . 259 33.1 U.S. Pension Funds Industry Market Background .......................... 259

33.1.1 Overview .............................................................................. 259 33.1.2 Social Security Trust Funds ................................................. 264 33.1.3 U.S. Social Security Cybersecurity Vulnerabilities ............... 265

33.2 U.S. Pension Funds Industry Cybersecurity Market - 2016-2020 .. 266 33.2.1 Market Size .......................................................................... 266

33.2.2 Market Dynamics ................................................................. 267 33.2.3 Market Share ....................................................................... 268

34 U.S. Credit Unions, Investment Funds, Accountancy Companies & Other Financial Sectors Cybersecurity Submarket- 2016-2020 .......... 269

34.1 Securities Sector Market Background ............................................ 269 34.1.1 U.S. Asset Management Industry ........................................ 269 34.1.2 U.S. Security Sector Cybersecurity Vulnerabilities .............. 273

34.2 Accountancy Firms Market Background ......................................... 273 34.3 U.S. Credit Unions, Investment Funds, Accountancy Companies &

Other Financial Sectors Cybersecurity Market - 2016-2020 ........... 275

34.3.1 Market Size .......................................................................... 275 34.3.2 Market Dynamics ................................................................. 276 34.3.3 Market Share ....................................................................... 277

EXPERTS OPINION, THE INDUSTRY ............................................................. 278

35 Experts Opinion ...................................................................................... 278

35.1 Ari M. Schwartz - Director for Cybersecurity,the White House (NSC ). ........................................................................................... 278

35.2 Luis A. Aguilar- Commissioner-U.S. Securities and Exchange Commission (SEC) ......................................................................... 279

Page 12: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 10

35.3 A. Belfiore - Head, Global Cybersecurity - J.P. Morgan ................. 279

35.4 J. Routh - CISO, Aetna Cisco ......................................................... 280 35.5 Werner Vogels- Amazon’ CTO ....................................................... 281

35.6 Ed Powers-National Managing Partner, Cyber-risk Services, Deloitte & Touche LLP ................................................................... 281

35.7 Curt Aubley -Dirctor Cybersecurity , Lockheed Martin................... 281 35.8 Ed Schwartz - RSA, Security Division of EMC, Chairman,

Cybersecurity Task Force at ISACA ............................................... 282

35.9 M. Barzilay - Head of IT & Cybersecurity-Bank Hapoalim .............. 283 35.10 Martin Borrett - Director-IBM Institute for Advanced Security

Europe ............................................................................................ 283 35.11 Mark Gazit - CEO, President, Board Member- ThtaRay ................. 284 35.12 Eugene Kaspersky - Chairman & CEO - Kaspersky Labs .............. 285

35.13 Art Coviello - Executive Chairman, Executive VP, EMC Corporation, and RSA, ................................................................... 288

35.14 Tal Mozes - Advisory Services, Ernst & Young .............................. 289 35.15 Andrey Dulkin - Director -Cyber Innovation, Cyber-Ark .................. 290

36 The Cybercrime Underground Market ................................................... 291

37 Banking, Financial Services, Retail & Payment Services Trojans ...... 295 37.1 Cybercrime Risk Assessment ........................................................ 296

37.2 Cybercrime, the Banking, Financial Services, Retail & Payment Services Perspective ...................................................................... 298

38 Financial Institutions: Cyber-Risk Framework ....................................... 308 38.1 Cybersecurity and Economic Security ............................................ 309

38.2 Cyber Resilience vs. National Competitive Advantage ................. 309

39 Four Cases of U.S. Banking, Financial Services & Retail Cyber Breaches, Facts, Costs, Analysis & Conclusions ................................ 311 39.1 The JP Morgan 2014 Breach ......................................................... 311 39.2 The Target Data Breach ................................................................. 316

39.2.1 The Target Breach ............................................................... 316 39.2.2 Target Breach: Total Cost Estimates ................................... 317 39.2.3 Target CRS Conclusions ..................................................... 318

39.3 Fidelity Investments Breach. .......................................................... 318 39.4 Kmart Breach ................................................................................. 319

40 Cybercrime Insurance ............................................................................ 321 40.1 Introduction .................................................................................... 321

40.2 The U.S. Cyber-incident Data Repository ...................................... 322 40.3 Enterprise Risk Management (ERM) .............................................. 324 40.4 U.S. Cybersecurity Insurance ......................................................... 325

41 The Cybersecurity Supplier Industry .................................................... 328

42 Cybersecurity Industry Mergers & Acquisitions .................................. 331

Page 13: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 11

43 Recommendations for Banking, Financial Services, Retail & Payment Services Security Managers .................................................. 334 43.1 Challenges of Financial Sector Complexity .................................... 336

43.2 How to Measure your Cybersecurity Risk ...................................... 337

44 The International Treaty on Cybercrime ............................................... 338

Page 14: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 12

List of Tables

Table 1 - Sources of Adversarial Threats to Cybersecurity ................................. 32

Table 2 - U.S. Banking & Financial Services Cyber Security Technology Submarkets [$M] - 2013-2020 ........................................................ 36

Table 3 - U.S. Banking & Financial Services Cyber Security Market by Sector [$M] - 2013-2020 ................................................................................... 38

Table 4 - The Banking & Financial Services ICT Environmental Change Factors49

Table 5 - Worldwide Largest Banking & Financial Services Corporations by [$B] Revenue (2014) ............................................................................. 67

Table 6 - U.S. Banking & Financial Services Assets [$B] by Banking & Financial Services Sectors - 2010, 2011 ....................................................... 72

Table 7 - Top 10 U.S. Banking & Financial Services Firms by Revenues [$M] - 2011 ............................................................................................... 73

Table 8 - Distribution of the Number of Noncash Payments in the U.S. - 2006, 2009 ............................................................................................... 75

Table 9 - U.S. Automated Clearing House Electronic Payments 2002-2011 ....... 76

Table 10 - Distribution of U.S. Banks by Cumulative Assets ............................... 77 Table 11 - Cyber Attack: Why, Who & What? ..................................................... 81 Table 12 -Top Cybercrime Types in the U.S. - 2011 ........................................... 93

Table 13 - Top States for Cybercrime in the U.S. - 2011 ..................................... 93 Table 14 - How Victims’ Information is Misused in the U.S. - 2011 ..................... 95

Table 15 - Identity Theft by State in the U.S. - 2011 ........................................... 95 Table 16 - U.S. Financial Services Endpoint Security Submarket [$M] - 2013-2020

..................................................................................................... 113

Table 17 - U.S. Financial Services Endpoint Security Submarket AGR [%] - 2013-2020 ............................................................................................. 114

Table 18 - U.S. Financial Services Endpoint Security Submarket Share [%] - 2013-2020 .................................................................................... 115

Table 19 - U.S. Financial Services Identity and Access Management Submarket [$M] - 2013-2020 .......................................................................... 117

Table 20 - U.S. Financial Services Identity and Access Management Submarket AGR [%] - 2013-2020 ................................................................... 117

Table 21 - U.S. Financial Services Identity and Access Management Submarket Share [%] - 2013-2020 ................................................................. 118

Table 22 - U.S. Financial Services Mobile Enterprise Management Submarket [$M] - 2013-2020 ......................................................................... 121

Table 23 - U.S. Financial Services Mobile Enterprise Management Submarket AGR [%] - 2013-2020 ................................................................... 122

Table 24 - U.S. Financial Services Mobile Enterprise Management Submarket Share [%] - 2013-2020 ................................................................. 123

Table 25 - U.S. Financial Services Mobile Security Submarket [$M] - 2013-2020 ..................................................................................................... 125

Table 26 - U.S. Financial Services Mobile Security Submarket AGR [%] - 2013-2020 ............................................................................................. 126

Page 15: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 13

Table 27 - U.S. Financial Services Mobile Security Submarket Share [%] - 2013-2020 ............................................................................................. 127

Table 28 - U.S. Financial Services Security Information and Event Management Submarket [$M] - 2013-2020........................................................ 133

Table 29 - U.S. Financial Services Security Information and Event Management Submarket AGR [%] - 2013-2020 ................................................. 134

Table 30 - U.S. Financial Services Security Information and Event Management Submarket Share [%] - 2013-2020 ............................................... 135

Table 31 - U.S. Financial Services Content Security Submarket [$M] - 2013-2020 ..................................................................................................... 141

Table 32 - U.S. Financial Services Content Security Submarket AGR [%] - 2013-2020 ............................................................................................. 141

Table 33 - U.S. Financial Services Content Security Submarket Share [%] - 2013-2020 ............................................................................................. 142

Table 34 - U.S. Financial Services Data Loss Prevention (DLP) Submarket [$M] - 2013-2020 .................................................................................... 146

Table 35 - U.S. Financial Services Data Loss Prevention (DLP) Submarket AGR [%] - 2013-2020 ............................................................................ 147

Table 36 - U.S. Financial Services Data Loss Prevention (DLP) Submarket Share [%] - 2013-2020 ............................................................................ 148

Table 37 - U.S. Financial Services Datacenter Security Submarket [$M] - 2013-2020 ............................................................................................. 152

Table 38 - U.S. Financial Services Datacenter Security Submarket AGR [%] - 2013-2020 .................................................................................... 153

Table 39 - U.S. Financial Services Datacenter Security Submarket Share [%] - 2013-2020 .................................................................................... 154

Table 40 - U.S. Financial Services Firewall Submarket [$M] - 2013-2020 ........ 156 Table 41 - U.S. Financial Services Firewall Submarket AGR [%] - 2013-2020 . 158 Table 42 - U.S. Financial Services Firewall Submarket Share [%] - 2013-2020 159

Table 43 - U.S. Financial Services Next Generation Firewall Submarket [$M] - 2013-2020 .................................................................................... 161

Table 44 - U.S. Financial Services Next Generation Firewall Submarket AGR [%] - 2013-2020 .................................................................................... 162

Table 45 - U.S. Financial Services Next Generation Firewall Submarket Share [%] - 2013-2020 ................................................................................. 163

Table 46 - U.S. Financial Services IDS/IPS Submarket [$M] - 2013-2020 ........ 166 Table 47 - U.S. Financial Services IDS/IPS Submarket AGR [%] - 2013-2020 . 167

Table 48 - U.S. Financial Services IDS/IPS Submarket Share [%] - 2013-2020168

Table 49 - U.S. Financial Services Unified Threat Management Submarket [$M] - 2013-2020 .................................................................................... 173

Table 50 - U.S. Financial Services Unified Threat Management Submarket AGR [%] - 2013-2020 ............................................................................ 174

Table 51 - U.S. Financial Services Unified Threat Management Submarket Share [%] - 2013-2020 ............................................................................ 175

Table 52 - U.S. Financial Services Cloud-Based Services Submarket [$M] - 2013-2020 ............................................................................................. 178

Page 16: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 14

Table 53 - U.S. Financial Services Cloud-Based Services Submarket AGR [%] - 2013-2020 .................................................................................... 179

Table 54 - U.S. Financial Services Cloud-Based Services Submarket Share [%] - 2013-2020 .................................................................................... 180

Table 55 - U.S. Financial Services Vulnerability/Risk Management & Managed Security Services Submarket [$M] - 2013-2020 ........................... 183

Table 56 - U.S. Financial Services Vulnerability/Risk Management & Managed Security Services Submarket AGR [%] - 2013-2020 .................... 184

Table 57 - U.S. Financial Services Vulnerability/Risk Management & Managed Security Services Submarket Share [%] - 2013-2020 .................. 185

Table 58 - U.S. Financial Services Consulting Market [$M] - 2013-2020 .......... 187 Table 59 - U.S. Financial Services Consulting Market AGR [%] - 2013-2020 ... 188 Table 60 - U.S. Financial Services Consulting Market Share [%] - 2013-2020 . 189

Table 61 - U.S. Financial Services Integration Services Market [$M] - 2013-2020 ..................................................................................................... 190

Table 62 - U.S. Financial Services Integration Services Market AGR [%] - 2013-2020 ............................................................................................. 191

Table 63 - U.S. Financial Services Integration Services Market Share [%] - 2013-2020 ............................................................................................. 192

Table 64 - U.S. Financial Services Education and Training Services Market [$M] - 2013-2020 .................................................................................... 193

Table 65 - U.S. Financial Services Education and Training Services Market AGR [%] - 2013-2020 ............................................................................ 194

Table 66 - U.S. Financial Services Education and Training Services Market Share [%] - 2013-2020 ............................................................................ 195

Table 67 - U.S. Financial Services Forensics, VPN, Web Security, Policy & Compliance and Other Services Market [$M] - 2013-2020 .......... 196

Table 68 - U.S. Financial Services Forensics, VPN, Web Security, Policy & Compliance and Other Services Market AGR [%] - 2013-2020 ... 197

Table 69 - U.S. Financial Services Forensics, VPN, Web Security, Policy & Compliance and Other Services Market Share [%] - 2013-2020 .. 198

Table 70 - U.S. Financial Services Cybersecurity Technology Submarkets [$M] - 2013-2020 .................................................................................... 200

Table 71 - U.S. Financial Services Cybersecurity Technology Submarkets AGR [%] - 2013-2020 ............................................................................ 201

Table 72 - U.S. Financial Services Cybersecurity Technology Submarket Shares [%] - 2013-2020 ............................................................................ 202

Table 73 - Major U.S. Financial Services Cybersecurity Markets [$M] - 2013-2020 ..................................................................................................... 203

Table 74 - Major U.S. Financial Services Cybersecurity Markets AGR [%] - 2013-2020 ............................................................................................. 204

Table 75 - Major U.S. Financial Services Cybersecurity Market Shares [%] - 2013-2020 ............................................................................................. 205

Table 76 - U.S. Financial Services Cybersecurity Market by Sector [$M] - 2013-2020 ............................................................................................. 214

Page 17: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 15

Table 77 - U.S. Financial Services Cybersecurity Market AGR [%] by Sector - 2013-2020 .................................................................................... 215

Table 78 - U.S. Financial Services Cybersecurity Market Shares [%] by Sector - 2013-2020 .................................................................................... 216

Table 79 - Top Ten U.S. Bank Owners of ATMs - 20121 ................................... 219 Table 80 - Withdrawals from U.S. ATMs by Type of Institution - 2010 .............. 219 Table 81 - U.S. ATM Withdrawals ..................................................................... 219 Table 82 - Distribution of U.S. Banks Assets, Employees & Offices (July 1, 2014)

..................................................................................................... 220 Table 83 - U.S. Banking Industry Cybersecurity Submarket [$M] - 2013-2020 . 221 Table 84 - U.S. Banking Industry Cybersecurity Submarket AGR [%] - 2013-2020

..................................................................................................... 222 Table 85 - U.S. Banking Industry Cybersecurity Submarket Share [%] - 2013-2020

..................................................................................................... 223 Table 86 - Top Ten Writers of Property/Casualty Insurance by Direct Premiums

Written 2013 ................................................................................. 225 Table 87 - Top Ten Writers of Life Insurance/Annuities by Direct Premiums

Written 2013 ................................................................................. 226 Table 88 - Top Ten Commercial Insurance Brokers of U.S. Business by

Revenues [$M] - 20111 ................................................................ 227

Table 89 - U.S. Insurance Companies Cybersecurity Submarket [$M] - 2013-2020 ..................................................................................................... 227

Table 90 - U.S. Insurance Companies Cybersecurity Submarket AGR [%] - 2013-2020 ............................................................................................. 228

Table 91 - U.S. Insurance Companies Cybersecurity Submarket Share [%] - 2013-2020 ............................................................................................. 229

Table 92 - U.S. 45 Top Payment Card Acquirers: Links, Territory of Operation and Contact Info. .......................................................................... 232

Table 93 - U.S. 22 Top Payment Card & 22 Top Debit Cards Issuers Data ...... 234

Table 94 - Payment Card Technologies: Magnetic Stripe vs. Chip $ PIN Cards238 Table 95 - U.S. Payment Card & Mobile Payment Providers and Retailers

Cybersecurity Submarket [$M] - 2013-2020 ................................. 242

Table 96 - U.S. Payment Card & Mobile Payment Providers and Retailers Cybersecurity Submarket AGR [%] - 2013-2020 .......................... 243

Table 97 - U.S. Payment Card & Mobile Payment Providers and Retailers Cybersecurity Submarket Share [%] - 2013-2020 ........................ 244

Table 98 - U.S. Government Related Financial Services Sector Cybersecurity Submarket [$M] - 2013-2020........................................................ 247

Table 99 - U.S. Government Related Financial Services Sector Cybersecurity Submarket AGR [%] - 2013-2020 ................................................. 248

Table 100 - U.S. Government Related Financial Services Sector Cybersecurity Submarket Share [%] - 2013-2020 ............................................... 249

Table 101 - U.S. Stock Brokerages & Exchanges Sector Cybersecurity Submarket [$M] - 2013-2020 .......................................................................... 256

Table 102 - U.S. Stock Brokerages & Exchanges Sector Cybersecurity Submarket AGR [%] - 2013-2020 ................................................................... 257

Page 18: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 16

Table 103 - U.S. Stock Brokerages & Exchanges Sector Cybersecurity Submarket Share [%] - 2013-2020 ................................................................. 258

Table 104 - Participation in Defined Benefit and Defined Contribution Pension Plans [%] - 1990-20111 ................................................................ 259

Table 105 - U.S. Pension Funds Cybersecurity Submarket [$M] - 2013-2020 .. 266 Table 106 - U.S. Pension Funds Cybersecurity Submarket AGR [%] - 2013-2020

..................................................................................................... 267 Table 107 - U.S. Pension Funds Cybersecurity Submarket Share [%] - 2013-2020

..................................................................................................... 268 Table 108 - FINRA Member Firms Categorization (2009) ................................. 269 Table 109 - U.S. Credit Unions, Investment Funds, Accountancy Companies &

Other Sectors Cybersecurity Submarket [$M] - 2013-2020 .......... 275 Table 110 - U.S. Credit Unions, Investment Funds, Accountancy Companies &

Other Sectors Cybersecurity Submarket AGR [%] - 2013-2020 ... 276 Table 111 - U.S. Credit Unions, Investment Funds, Accountancy Companies &

Other Sectors Cybersecurity Submarket Share [%] - 2013-2020 . 277 Table 112 - The Banking, Financial Services, Retail & Payment Services ICT

Environmental Change Factors .................................................... 302

Page 19: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 17

List of Figures

Figure 1 - Steps Involved in Financial Account Takeovers .................................. 28

Figure 2 - Depository Trust & Clearing Corporation (DTCC) Banking and Financial Services Risk Barometer Survey .................................................... 30

Figure 3 - Cybersecurity Ecosystem.................................................................... 31 Figure 4 - Prompt Detection & Response is Key to Cybersecurity ...................... 31 Figure 5 - Layout of Cybersecurity Solutions & Technologies Infrastructure ....... 33

Figure 6 - The Report Sub-Markets ..................................................................... 35 Figure 7 - Major U.S. Banking & Financial Services Cyber Security Market Shares

[%] - 2013-2020 .............................................................................. 37 Figure 8 - U.S. Banking & Financial Services Cyber Security Market Shares [%]

by Sector - 2013-2020 .................................................................... 39 Figure 9 - Selected Sources of Cyber Threat Information, Based on the U.S.

Congress GAO Interviews .............................................................. 41

Figure 10 - E-Commerce Method Segmentation and Payment Mechanism Flow Chart .............................................................................................. 51

Figure 11 - Payment Card Transaction Process ................................................. 53 Figure 12 - The Fraction of Non-cash Payments by 33 Countries ....................... 56 Figure 13 - Comparison of Non-Cash Transactions [Billion] and Change in

Payments’ Mix [%] by Geo. Region and Transaction Method ........ 58 Figure 14 - Cryptocurrency Hot List (12.1.2013) ................................................. 63

Figure 15 - U.S. Gross Domestic Product of Financial Services, Shares by Component, Excluding Real Estate - 2010 .................................... 70

Figure 16 - Assets [$B] & Assets Share [%] of the U.S. Banking & Financial Services Sectors ............................................................................ 71

Figure 17 - The U.S. Banking, Insurance & Securities Industries Infrastructure .. 74 Figure 18 - United States: Financial System Linkages to the Rest of the World . 78 Figure 19 - Cybercrime Complaints Types in the U.S. - 2007-2011 .................... 92

Figure 20 - Fraud, Consumer & Identity Theft Complaints in the U.S. - 2009-2011 ....................................................................................................... 94

Figure 21 - Categories of Financial Services Share [%] of Cyber-attack Incidents ....................................................................................................... 99

Figure 22 - Banking & Financial Services [%] Reliance on Outsourcing vs. Other Industries in the U.S. .................................................................... 100

Figure 23 - Banking & Financial Services Share [%] By Attacker Category in the U.S. .............................................................................................. 101

Figure 24 - Banking & Financial Services Cybercrime: Share [%] By Motivation in the U.S. ........................................................................................ 102

Figure 25 - Banking & Financial Services Breaches: Share [%] By Root Cause in the U.S. ........................................................................................ 102

Figure 26 - Banking & Financial Services Average Cybercrime Cost/Annum [$M] per Enterprise in the U.S. - 2010-2013 ......................................... 103

Figure 27 - Global Financial Services Firms' Attacks Response Time Statistics104

Page 20: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 18

Figure 28 - U.S. Financial Services Endpoint Security Submarket [$M] - 2013-2020 ............................................................................................. 113

Figure 29 - U.S. Financial Services Endpoint Security Submarket AGR [%] - 2013-2020 ............................................................................................. 114

Figure 30 - U.S. Financial Services Endpoint Security Submarket Share [%] - 2013-2020 .................................................................................... 115

Figure 31 - U.S. Financial Services Identity and Access Management Submarket [$M] - 2013-2020 .......................................................................... 117

Figure 32 - U.S. Financial Services Identity and Access Management Submarket AGR [%] - 2013-2020 ................................................................... 118

Figure 33 - U.S. Financial Services Identity and Access Management Submarket Share [%] - 2013-2020 ................................................................. 119

Figure 34 - U.S. Financial Services Mobile Enterprise Management Submarket [$M] - 2013-2020 ......................................................................... 122

Figure 35 - U.S. Financial Services Mobile Enterprise Management Submarket AGR [%] - 2013-2020 ................................................................... 123

Figure 36 - U.S. Financial Services Mobile Enterprise Management Submarket Share [%] - 2013-2020 ................................................................. 124

Figure 37 - U.S. Financial Services Mobile Security Submarket [$M] - 2013-2020 ..................................................................................................... 126

Figure 38 - U.S. Financial Services Mobile Security Submarket AGR [%] - 2013-2020 ............................................................................................. 127

Figure 39 - U.S. Financial Services Mobile Security Submarket Share [%] - 2013-2020 ............................................................................................. 128

Figure 40 - Security Information and Event Management (SIEM) Architecture . 129

Figure 41 - Security Information and Event Management Solutions ................. 131

Figure 42 - IBM QRadar Security Intelligence Platform ..................................... 132 Figure 43 - U.S. Financial Services Security Information and Event Management

Submarket [$M] - 2013-2020........................................................ 134

Figure 44 - U.S. Financial Services Security Information and Event Management Submarket AGR [%] - 2013-2020 ................................................. 135

Figure 45 - U.S. Financial Services Security Information and Event Management Submarket Share [%] - 2013-2020 ............................................... 136

Figure 46 - U.S. Financial Services Content Security Submarket [$M] - 2013-2020 ..................................................................................................... 141

Figure 47 - U.S. Financial Services Content Security Submarket AGR [%] - 2013-2020 ............................................................................................. 142

Figure 48 - U.S. Financial Services Content Security Submarket Share [%] - 2013-2020 ............................................................................................. 143

Figure 49 - U.S. Financial Services Data Loss Prevention (DLP) Submarket [$M] - 2013-2020 .................................................................................... 146

Figure 50 - U.S. Financial Services Data Loss Prevention (DLP) Submarket AGR [%] - 2013-2020 ............................................................................ 147

Figure 51 - U.S. Financial Services Data Loss Prevention (DLP) Submarket Share [%] - 2013-2020 ............................................................................ 148

Page 21: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 19

Figure 52 - U.S. Financial Services Datacenter Security Submarket [$M] - 2013-2020 ............................................................................................. 152

Figure 53 - U.S. Financial Services Datacenter Security Submarket AGR [%] - 2013-2020 .................................................................................... 153

Figure 54 - U.S. Financial Services Datacenter Security Submarket Share [%] - 2013-2020 .................................................................................... 154

Figure 55 - U.S. Financial Services Firewall Submarket [$M] - 2013-2020 ....... 157 Figure 56 - U.S. Financial Services Firewall Submarket AGR [%] - 2013-2020 158

Figure 57 - U.S. Financial Services Firewall Submarket Share [%] - 2013-2020159 Figure 58 - U.S. Financial Services Next Generation Firewall Submarket [$M] -

2013-2020 .................................................................................... 161 Figure 59 - U.S. Financial Services Next Generation Firewall Submarket AGR [%]

- 2013-2020 ................................................................................. 162

Figure 60 - U.S. Financial Services Next Generation Firewall Submarket Share [%] - 2013-2020 ........................................................................... 163

Figure 61 - U.S. Financial Services IDS/IPS Submarket [$M] - 2013-2020 ....... 167 Figure 62 - U.S. Financial Services IDS/IPS Submarket AGR [%] - 2013-2020 168

Figure 63 - U.S. Financial Services IDS/IPS Submarket Share [%] - 2013-2020 ..................................................................................................... 169

Figure 64 - U.S. Financial Services Unified Threat Management Submarket [$M] - 2013-2020 .................................................................................... 173

Figure 65 - U.S. Financial Services Unified Threat Management Submarket AGR [%] - 2013-2020 ............................................................................ 174

Figure 66 - U.S. Financial Services Unified Threat Management Submarket Share [%] - 2013-2020 ............................................................................ 175

Figure 67 - U.S. Financial Services Cloud-Based Services Submarket [$M] - 2013-2020 .................................................................................... 178

Figure 68 - U.S. Financial Services Cloud-Based Services Submarket AGR [%] - 2013-2020 .................................................................................... 179

Figure 69 - U.S. Financial Services Cloud-Based Services Submarket Share [%] - 2013-2020 .................................................................................... 180

Figure 70 - U.S. Financial Services Vulnerability/Risk Management & Managed Security Services Submarket [$M] - 2013-2020 ........................... 184

Figure 71 - U.S. Financial Services Vulnerability/Risk Management & Managed Security Services Submarket AGR [%] - 2013-2020 .................... 185

Figure 72 - U.S. Financial Services Vulnerability/Risk Management & Managed Security Services Submarket Share [%] - 2013-2020 .................. 186

Figure 73 - U.S. Financial Services Consulting Market [$M] - 2013-2020 ......... 187

Figure 74 - U.S. Financial Services Consulting Market AGR [%] - 2013-2020 .. 188

Figure 75 - U.S. Financial Services Consulting Market Share [%] - 2013-2020 189 Figure 76 - U.S. Financial Services Integration Services Market [$M] - 2013-2020

..................................................................................................... 190 Figure 77 - U.S. Financial Services Integration Services Market AGR [%] - 2013-

2020 ............................................................................................. 191

Figure 78 - U.S. Financial Services Integration Services Market Share [%] - 2013-2020 ............................................................................................. 192

Page 22: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 20

Figure 79 - U.S. Financial Services Education and Training Services Market [$M] - 2013-2020 .................................................................................... 193

Figure 80 - U.S. Financial Services Education and Training Services Market AGR [%] - 2013-2020 ............................................................................ 194

Figure 81 - U.S. Financial Services Education and Training Services Market Share [%] - 2013-2020 ................................................................. 195

Figure 82 - U.S. Financial Services Forensics, VPN, Web Security, Policy & Compliance and Other Services Market [$M] - 2013-2020 .......... 196

Figure 83 - U.S. Financial Services Forensics, VPN, Web Security, Policy & Compliance and Other Services Market AGR [%] - 2013-2020 ... 197

Figure 84 - U.S. Financial Services Forensics, VPN, Web Security, Policy & Compliance and Other Services Market Share [%] - 2013-2020 .. 198

Figure 85 - Major U.S. Financial Services Cybersecurity Markets [$M] - 2013-2020 ..................................................................................................... 204

Figure 86 - Major U.S. Financial Services Cybersecurity Markets AGR [%] - 2013-2020 ............................................................................................. 205

Figure 87 - Major U.S. Financial Services Cybersecurity Market Shares [%] - 2013-2020 .................................................................................... 206

Figure 88 - U.S. Financial Services Software Security Technology Submarkets [$M] - 2013-2020 .......................................................................... 207

Figure 89 - U.S. Financial Services Software Security Technology Submarkets AGR [%] - 2013-2020 ................................................................... 208

Figure 90 - U.S. Financial Services Software Security Technology Submarket Shares [%] - 2013-2020 ............................................................... 209

Figure 91 - U.S. Financial Services Network Security Technology Submarkets [$M] - 2013-2020 .......................................................................... 210

Figure 92 - U.S. Financial Services Network Security Technology Submarkets AGR [%] - 2013-2020 ................................................................... 211

Figure 93 - U.S. Financial Services Network Security Technology Submarket Shares [%] - 2013-2020 ............................................................... 212

Figure 94 - U.S. Financial Services Cybersecurity Market by Sector [$M] - 2013-2020 ............................................................................................. 214

Figure 95 - U.S. Financial Services Cybersecurity Market AGR [%] by Sector - 2013-2020 .................................................................................... 215

Figure 96 - U.S. Financial Services Cybersecurity Market Shares [%] by Sector - 2013-2020 .................................................................................... 217

Figure 97 - U.S. Banking Industry Cybersecurity Submarket [$M] - 2013-2020 221

Figure 98 - U.S. Banking Industry Cybersecurity Submarket AGR [%] - 2013-2020 ..................................................................................................... 222

Figure 99 - U.S. Banking Industry Cybersecurity Submarket Share [%] - 2013-2020 ............................................................................................. 223

Figure 100 - U.S. Insurance Companies Cybersecurity Submarket [$M] - 2013-2020 ............................................................................................. 228

Figure 101 - U.S. Insurance Companies Cybersecurity Submarket AGR [%] - 2013-2020 .................................................................................... 229

Page 23: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 21

Figure 102 - U.S. Insurance Companies Cybersecurity Submarket Share [%] - 2013-2020 .................................................................................... 230

Figure 103 - Relationship between EMVCo Specifications, Payment System, & Payment System Products. .......................................................... 235

Figure 104 - Chip and PIN Card and Point of Sale Reader ............................... 239 Figure 105 - Global Adoption Rate of EMV (Chip and PIN) Cards by Region-

Country ........................................................................................ 240 Figure 106 - Chip and PIN Card Processing ..................................................... 241

Figure 107 - U.S. Payment Card & Mobile Payment Providers and Retailers Cybersecurity Submarket [$M] - 2013-2020 ................................. 243

Figure 108 - U.S. Payment Card & Mobile Payment Providers and Retailers Cybersecurity Submarket AGR [%] - 2013-2020 .......................... 244

Figure 109 - U.S. Payment Card & Mobile Payment Providers and Retailers Cybersecurity Submarket Share [%] - 2013-2020 ........................ 245

Figure 110 - U.S. Government Related Financial Services Sector Cybersecurity Submarket [$M] - 2013-2020........................................................ 248

Figure 111 - U.S. Government Related Financial Services Sector Cybersecurity Submarket AGR [%] - 2013-2020 ................................................. 249

Figure 112 - U.S. Government Related Financial Services Sector Cybersecurity Submarket Share [%] - 2013-2020 ............................................... 250

Figure 113 - Threat Profile for Securities Markets ............................................. 255 Figure 114 - U.S. Stock Brokerages & Exchanges Sector Cybersecurity

Submarket [$M] - 2013-2020........................................................ 256 Figure 115 - U.S. Stock Brokerages & Exchanges Sector Cybersecurity

Submarket AGR [%] - 2013-2020 ................................................. 257

Figure 116 - U.S. Stock Brokerages & Exchanges Sector Cybersecurity Submarket Share [%] - 2013-2020 ............................................... 258

Figure 117 - U.S. Pension Funds Asset Allocation - 2013 ................................. 260 Figure 118 - IRA Market Share by Holder - 2011 .............................................. 262

Figure 119 - Average Asset Allocation for all 401K Plan Balances - 2010 ........ 263 Figure 120 - The U.S. Retirement Assets ($ trillions) by Market Share [%] ....... 264 Figure 121 - U.S. Pension Funds Cybersecurity Submarket [$M] - 2013-2020 . 266

Figure 122 - U.S. Pension Funds Cybersecurity Submarket AGR [%] - 2013-2020 ..................................................................................................... 267

Figure 123 - U.S. Pension Funds Cybersecurity Submarket Share [%] - 2013-2020 ............................................................................................. 268

Figure 124 - Asset Management Industry Overview ......................................... 271

Figure 125 -Top 20 Asset Management Firms by Assets [$B] Under Management (as of January 2013) .................................................................... 272

Figure 126 - U.S. Leading accounting firms - 2014 by U.S. Revenue [$B] ........ 274 Figure 127 - U.S. Credit Unions, Investment Funds, Accountancy Companies &

Other Sectors Cybersecurity Submarket [$M] - 2013-2020 .......... 275 Figure 128 - U.S. Credit Unions, Investment Funds, Accountancy Companies &

Other Sectors Cybersecurity Submarket AGR [%] - 2013-2020 ... 276

Figure 129 - U.S. Credit Unions, Investment Funds, Accountancy Companies & Other Sectors Cybersecurity Submarket Share [%] - 2013-2020 . 277

Page 24: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 1

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 22

Figure 130 - Diagram of the Cybercriminal Attack ............................................. 292

Figure 131 - Number of Institutions Targeted by Each Trojan ........................... 296 Figure 132 - A Financial Service Enterprise Cybersecurity Platform ................. 299

Figure 133 - Cloud, Convergence, Consolidation and Mobility Infrastructure of a Bank ............................................................................................. 301

Figure 134- Banking, Financial Services, Retail & Payment Services Cybercrime Risk Frame ................................................................................... 308

Figure 135 - Cyber Risk Management Process ................................................. 310

Figure 136 - Common Gaps in Standard Policies ............................................. 322 Figure 137 - Cyber Insurance Coverage ........................................................... 326 Figure 138 - The Differentiated Cyber-Security Ecosystem .............................. 328 Figure 139 - Elements Required for a Financial Enterprise Premium Cybersecurity

Set-up .......................................................................................... 334

Figure 140 - The Financial Sector Cyber Risks Roadmap ................................ 337

Page 25: 2016-2020 U.S. Financial Services: Cybersecurity Systems

(Source: U.S. Congress GAO July 2015)

Homeland Security Research Corp.

2016-2020

U.S. Financial Services: Cybersecurity Systems

& Services Market

Volume 2

Page 26: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 2

U.S. Financial Services:

Cybersecurity Systems &

Services Market

Volume 2

August 2015 Homeland Security Research Corp. (HSRC) is an international market and technology research firm specializing in the Homeland Security (HLS) & Public Safety (PS) Industry. HSRC provides premium market reports on present and emerging technologies and industry expertise, enabling global clients to gain time-critical insight into business opportunities. HSRC’s clients include U.S. Congress, DHS, U.S. Army, U.S. Navy, NATO, DOD, DOT, GAO, and EU, among others; as well as HLS & PS government agencies in Japan, Korea, Taiwan, Israel, Canada, UK, Germany, Australia, Sweden, Finland, Singapore. With over 750 private sector clients (72% repeat customers), including major defense and security contractors, and Fortune 500 companies. HSRC earned the reputation as the industry’s Gold Standard for HLS & PS market reports.

Washington D.C. 20004, 601 Pennsylvania Ave., NW Suite 900, Tel: 202-455-0966, [email protected], www.homelandsecurityresearch.com

Page 27: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 3

Table of Contents

VENDORS .......................................................................................................... 23

1 CyberSecurity Vendors ............................................................................ 23

1.1 41st Parameter ................................................................................. 23 1.1.1 Contact Info ........................................................................... 23 1.1.2 Company Profile .................................................................... 23 1.1.3 Key Executives ...................................................................... 23

1.2 Accenture ......................................................................................... 24

1.2.1 Contact Info ........................................................................... 24 1.2.2 Company Profile .................................................................... 24

1.2.3 Key Executives ...................................................................... 24

1.3 Agiliance ........................................................................................... 25 1.3.1 Contact Info ........................................................................... 25 1.3.2 Company Profile .................................................................... 25

1.3.3 Key Executives ...................................................................... 25 1.4 AhnLab ............................................................................................. 26

1.4.1 Contact Info ........................................................................... 26

1.4.2 Company Profile .................................................................... 26 1.5 Airbus ............................................................................................... 26

1.5.1 Contact Info ........................................................................... 26 1.5.2 Company Profile .................................................................... 26 1.5.3 Key Executives ...................................................................... 27

1.6 AirWatch ........................................................................................... 27

1.6.1 Contact Info ........................................................................... 27 1.6.2 Company Profile .................................................................... 28 1.6.3 Key Executives ...................................................................... 28

1.7 Akamai ............................................................................................. 28 1.7.1 Contact Info ........................................................................... 28

1.7.2 Company Profile .................................................................... 29 1.7.3 Key Executives ...................................................................... 29

1.8 AlertEnterprise ................................................................................. 30 1.8.1 Contact Info ........................................................................... 30 1.8.2 Company Profile .................................................................... 30

1.8.3 Key Executives ...................................................................... 30 1.9 Alert Logic ........................................................................................ 31

1.9.1 Contact Info ........................................................................... 31

1.9.2 Company Profile .................................................................... 31 1.9.3 Key Executives ...................................................................... 32

1.10 AlienVault ......................................................................................... 32 1.10.1 Contact Info ........................................................................... 32

1.10.2 Company Profile .................................................................... 32 1.10.3 Key Executives ...................................................................... 33

1.11 Alt-N Technologies ........................................................................... 33

Page 28: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 4

1.11.1 Contact Info ........................................................................... 33 1.11.2 Company Profile .................................................................... 33 1.11.3 Key Executives ...................................................................... 34

1.12 Application Security .......................................................................... 34 1.12.1 Contact Info ........................................................................... 34

1.12.2 Company Profile .................................................................... 34 1.12.3 Key Executives ...................................................................... 35

1.13 AppSense Limited ............................................................................ 35 1.13.1 Contact Info ........................................................................... 35 1.13.2 Company Profile .................................................................... 35

1.13.3 Key Executives ...................................................................... 36 1.14 Arbor Networks ................................................................................ 36

1.14.1 Contact Info ........................................................................... 36 1.14.2 Company Profile .................................................................... 36 1.14.3 Key Executives ...................................................................... 37

1.15 Attachmate ....................................................................................... 37

1.15.1 Contact Info ........................................................................... 37 1.15.2 Company Profile .................................................................... 37 1.15.3 Key Executives ...................................................................... 38

1.16 Authentify ......................................................................................... 38 1.16.1 Contact Info ........................................................................... 38

1.16.2 Company Profile .................................................................... 38 1.16.3 Key Executives ...................................................................... 39

1.17 AVAST Software .............................................................................. 39

1.17.1 Contact Info ........................................................................... 39

1.17.2 Company Profile .................................................................... 39 1.17.3 Key Executives ...................................................................... 40

1.18 Aveksa ............................................................................................. 40

1.18.1 Contact Info ........................................................................... 40 1.18.2 Company Profile .................................................................... 40

1.18.3 Key Executives ...................................................................... 41 1.19 AVG Technologies ........................................................................... 41

1.19.1 Contact Info ........................................................................... 41 1.19.2 Company Profile .................................................................... 41

1.19.3 Key Executives ...................................................................... 42 1.20 Avira ................................................................................................. 42

1.20.1 Contact Info ........................................................................... 42

1.20.2 Company Profile .................................................................... 43 1.20.3 Key Executives ...................................................................... 43

1.21 Barracuda Networks ......................................................................... 44 1.21.1 Contact Info ........................................................................... 44

1.21.2 Company Profile .................................................................... 44 1.21.3 Key Executives ...................................................................... 44

1.22 Beyond Security ............................................................................... 45 1.22.1 Contact Info ........................................................................... 45

Page 29: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 5

1.22.2 Company Profile .................................................................... 45 1.22.3 Key Executives ...................................................................... 45

1.23 BeyondTrust ..................................................................................... 46 1.23.1 Contact Info ........................................................................... 46 1.23.2 Company Profile .................................................................... 46

1.23.3 Key Executives ...................................................................... 46 1.24 Bit9 ................................................................................................... 47

1.24.1 Contact Info ........................................................................... 47 1.24.2 Company Profile .................................................................... 47 1.24.3 Key Executives ...................................................................... 48

1.25 Bitdefender ....................................................................................... 48 1.25.1 Contact Info ........................................................................... 48

1.25.2 Company Profile .................................................................... 48 1.25.3 Key Executives ...................................................................... 49

1.26 BlackBerry ........................................................................................ 49 1.26.1 Fast facts ............................................................................... 49

1.26.2 Company Profile .................................................................... 49 1.26.3 Key Executives ...................................................................... 50

1.27 BlackStratus ..................................................................................... 50

1.27.1 Contact Info ........................................................................... 50 1.27.2 Company Profile .................................................................... 51

1.27.3 Key Executives ...................................................................... 51 1.28 Blue Coat Systems ........................................................................... 51

1.28.1 Contact Info ........................................................................... 51

1.28.2 Company Profile .................................................................... 52

1.28.3 Key Executives ...................................................................... 52 1.29 BoxTone ........................................................................................... 53 1.30 Bromium ........................................................................................... 53

1.30.1 Contact Info ........................................................................... 53 1.30.2 Company Profile .................................................................... 53

1.30.3 Key Executives ...................................................................... 53 1.31 BullGuard ......................................................................................... 54

1.31.1 Contact Info ........................................................................... 54 1.31.2 Company Profile .................................................................... 54

1.31.3 Key Executives ...................................................................... 54 1.32 Cassidian Communications, Inc. ...................................................... 55

1.32.1 Contact Info ........................................................................... 55

1.32.2 Company Profile .................................................................... 55 1.32.3 Key Executives ...................................................................... 56

1.33 Catbird Networks .............................................................................. 56 1.33.1 Contact Info ........................................................................... 56

1.33.2 Company Profile .................................................................... 56 1.33.3 Key Executives ...................................................................... 56

1.34 Centrify ............................................................................................. 57 1.34.1 Contact Info ........................................................................... 57

Page 30: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 6

1.34.2 Company Profile .................................................................... 57 1.34.3 Key Executives ...................................................................... 58

1.35 Cenzic .............................................................................................. 58 1.35.1 Contact Info ........................................................................... 58 1.35.2 Company Profile .................................................................... 58

1.35.3 Key Executives ...................................................................... 59 1.36 Check Point ...................................................................................... 59

1.36.1 Contact Info ........................................................................... 59 1.36.2 Company Profile .................................................................... 59 1.36.3 Key Executives ...................................................................... 60

1.37 CipherCloud ..................................................................................... 60 1.37.1 Contact Info ........................................................................... 60

1.37.2 Company Profile .................................................................... 60 1.37.3 Key Executives ...................................................................... 61

1.38 Cisco Systems Inc ............................................................................ 61 1.38.1 Contact Info ........................................................................... 61

1.38.2 Company Profile .................................................................... 61 1.38.3 Key Executives ...................................................................... 62

1.39 Clearswift ......................................................................................... 62

1.39.1 Contact Info ........................................................................... 62 1.39.2 Company Profile .................................................................... 62

1.39.3 Key Executives ...................................................................... 63 1.40 Click Security ................................................................................... 63

1.40.1 Contact Info ........................................................................... 63

1.40.2 Company Profile .................................................................... 64

1.40.3 Key Executives ...................................................................... 64 1.41 CloudFlare ........................................................................................ 64

1.41.1 Contact Info ........................................................................... 64

1.41.2 Company Profile .................................................................... 65 1.41.3 Key Executives ...................................................................... 65

1.42 CloudLock ........................................................................................ 65 1.42.1 Contact Info ........................................................................... 65 1.42.2 Company Profile .................................................................... 65 1.42.3 Key Executives ...................................................................... 66

1.43 Code Green Networks ...................................................................... 66 1.43.1 Contact Info ........................................................................... 66 1.43.2 Company Profile .................................................................... 67

1.43.3 Key Executives ...................................................................... 67 1.44 Commtouch Software ....................................................................... 67 1.45 Cyber Operations ............................................................................. 68

1.45.1 Contact Info ........................................................................... 68

1.45.2 Company Profile .................................................................... 68 1.45.3 Key Executives ...................................................................... 68

1.46 CyberArk Software ........................................................................... 69 1.46.1 Contact Info ........................................................................... 69

Page 31: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 7

1.46.2 Company Profile .................................................................... 69 1.46.3 Key Executives ...................................................................... 70

1.47 Cyren ................................................................................................ 70 1.47.1 Contact Info ........................................................................... 70 1.47.2 Company Profile .................................................................... 70

1.47.3 Key Executives ...................................................................... 70 1.48 Comodo ............................................................................................ 71

1.48.1 Contact Info ........................................................................... 71 1.48.2 Company Profile .................................................................... 71 1.48.3 Key Executives ...................................................................... 71

1.49 CORE Security ................................................................................. 72 1.49.1 Contact Info ........................................................................... 72

1.49.2 Company Profile .................................................................... 72 1.49.3 Key Executives ...................................................................... 73

1.50 Corero Network Security .................................................................. 73 1.50.1 Contact Info ........................................................................... 73

1.50.2 Company Profile .................................................................... 73 1.50.3 Key Executives ...................................................................... 74

1.51 Courion ............................................................................................. 74

1.51.1 Contact Info ........................................................................... 74 1.51.2 Company Profile .................................................................... 74

1.51.3 Key Executives ...................................................................... 75 1.52 Covisint ............................................................................................ 75

1.52.1 Contact Info ........................................................................... 75

1.52.2 Company Profile .................................................................... 75

1.53 CrowdStrike Holdings ....................................................................... 76 1.53.1 Contact Info ........................................................................... 76 1.53.2 Company Profile .................................................................... 76

1.53.3 Key Executives ...................................................................... 76 1.54 CSID ................................................................................................. 76

1.54.1 Contact Info ........................................................................... 76 1.54.2 Company Profile .................................................................... 76 1.54.3 Key Executives ...................................................................... 77

1.55 Cyber-Ark ......................................................................................... 77

1.55.1 Contact Info ........................................................................... 77 1.55.2 Company Profile .................................................................... 78 1.55.3 Key Executives ...................................................................... 78

1.56 Cyberoam ......................................................................................... 79 1.56.1 Contact Info ........................................................................... 79 1.56.2 Company Profile .................................................................... 79 1.56.3 Key Executives ...................................................................... 79

1.57 Damballa .......................................................................................... 79 1.57.1 Contact Info ........................................................................... 79 1.57.2 Company Profile .................................................................... 80 1.57.3 Key Executives ...................................................................... 80

Page 32: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 8

1.58 DigiCert ............................................................................................ 80 1.58.1 Contact Info ........................................................................... 80 1.58.2 Company Profile .................................................................... 81 1.58.3 Key Executives ...................................................................... 81

1.59 Digital Info Security Company .......................................................... 81

1.59.1 Contact Info ........................................................................... 81 1.59.2 Company Profile .................................................................... 81 1.59.3 Key Executives ...................................................................... 82

1.60 EdgeWave ........................................................................................ 82 1.60.1 Contact Info ........................................................................... 82

1.60.2 Company Profile .................................................................... 82 1.60.3 Key Executives ...................................................................... 83

1.61 EiQ Networks ................................................................................... 83 1.61.1 Contact Info ........................................................................... 83 1.61.2 Company Profile .................................................................... 83 1.61.3 Key Executives ...................................................................... 84

1.62 Elbit Systems ................................................................................... 84 1.62.1 Contact Info ........................................................................... 84 1.62.2 Company Profile .................................................................... 84

1.62.3 Key Executives ...................................................................... 85 1.63 Enterasys Networks ......................................................................... 85

1.64 Extreme Networks ............................................................................ 85 1.64.1 Contact Info ........................................................................... 85 1.64.2 Company Profile .................................................................... 86

1.65 Entrust .............................................................................................. 86

1.65.1 Contact Info ........................................................................... 86 1.65.2 Company Profile .................................................................... 86 1.65.3 Key Executives ...................................................................... 87

1.66 ESET ................................................................................................ 87 1.66.1 Contact Info ........................................................................... 87

1.66.2 Company Profile .................................................................... 87 1.66.3 Key Executives ...................................................................... 88

1.67 Exobox Technologies Corp .............................................................. 88 1.67.1 Contact Info ........................................................................... 88

1.67.2 Company Profile .................................................................... 88 1.67.3 Key Executives ...................................................................... 88

1.68 Faronics Technologies ..................................................................... 89

1.68.1 Contact Info ........................................................................... 89 1.68.2 Company Profile .................................................................... 89 1.68.3 Key Executives ...................................................................... 90

1.69 Fiberlink ............................................................................................ 90

1.69.1 Contact Info ........................................................................... 90 1.69.2 Company Profile .................................................................... 90 1.69.3 Key Executives ...................................................................... 91

1.70 Fidelis Security Systems .................................................................. 91

Page 33: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 9

1.70.1 Contact Info ........................................................................... 91 1.70.2 Company Profile .................................................................... 91 1.70.3 Key Executives ...................................................................... 92

1.71 FireEye ............................................................................................. 92 1.71.1 Contact Info ........................................................................... 92

1.71.2 Company Profile .................................................................... 92 1.71.3 Key Executives ...................................................................... 93

1.72 FireMon ............................................................................................ 93 1.72.1 Contact Info ........................................................................... 93 1.72.2 Company Profile .................................................................... 93

1.72.3 Key Executives ...................................................................... 94 1.73 ForeScout Technologies .................................................................. 94

1.73.1 Contact Info ........................................................................... 94 1.73.2 Company Profile .................................................................... 94 1.73.3 Key Executives ...................................................................... 94

1.74 FoxGuard Solutions.......................................................................... 95

1.74.1 Contact Info ........................................................................... 95 1.74.2 Company Profile .................................................................... 95 1.74.3 Key Executives ...................................................................... 95

1.75 Fulcrum IT Services Company, LLC................................................. 95 1.75.1 Contact Info ........................................................................... 95

1.75.2 Company Profile .................................................................... 96 1.75.3 Key Executives ...................................................................... 96

1.76 F-Secure .......................................................................................... 96

1.76.1 Contact Info ........................................................................... 96

1.76.2 Company Profile .................................................................... 97 1.76.3 Key Executives ...................................................................... 97

1.77 G2 Web Services ............................................................................. 98

1.77.1 Contact Info ........................................................................... 98 1.77.2 Company Profile .................................................................... 98

1.77.3 Key Executives ...................................................................... 98 1.78 Gemalto ............................................................................................ 98

1.78.1 Contact Info ........................................................................... 98 1.78.2 Company Profile .................................................................... 99

1.78.3 Key Executives ...................................................................... 99 1.79 General Dynamics .......................................................................... 100

1.79.1 Contact Info ......................................................................... 100

1.79.2 Company Profile .................................................................. 100 1.79.3 Key Executives .................................................................... 101

1.80 GFI Software .................................................................................. 101 1.80.1 Contact Info ......................................................................... 101

1.80.2 Company Profile .................................................................. 101 1.80.3 Key Executives .................................................................... 102

1.81 Good Technology ........................................................................... 102 1.81.1 Contact Info ......................................................................... 102

Page 34: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 10

1.81.2 Company Profile .................................................................. 102 1.81.3 Key Executives .................................................................... 103

1.82 Guardian Analytics ......................................................................... 103 1.82.1 Contact Info ......................................................................... 103 1.82.2 Company Profile .................................................................. 103

1.82.3 Key Executives .................................................................... 104 1.83 Guidance Software ......................................................................... 104

1.83.1 Contact Info ......................................................................... 104 1.83.2 Company Profile .................................................................. 104 1.83.3 Key Executives .................................................................... 105

1.84 Hewlett-Packard Co ....................................................................... 105 1.84.1 Contact Info ......................................................................... 105

1.84.2 Company Profile .................................................................. 105 1.84.3 Key Executives .................................................................... 106

1.85 HyTrust ........................................................................................... 107 1.85.1 Contact Info ......................................................................... 107

1.85.2 Company Profile .................................................................. 107 1.85.3 Key Executives .................................................................... 107

1.86 ID Analytics .................................................................................... 108

1.86.1 Contact Info ......................................................................... 108 1.86.2 Company Profile .................................................................. 108

1.86.3 Key Executives .................................................................... 108 1.87 Igloo Security Inc ............................................................................ 109

1.87.1 Contact Info ......................................................................... 109

1.87.2 Company Profile .................................................................. 109

1.87.3 Key Executives .................................................................... 109 1.88 Imprivata ........................................................................................ 110

1.88.1 Contact Info ......................................................................... 110

1.88.2 Company Profile .................................................................. 110 1.88.3 Key Executives .................................................................... 110

1.89 Intel Security Group........................................................................ 111 1.89.1 Contact Info ......................................................................... 111 1.89.2 Company Profile .................................................................. 111 1.89.3 Key Executives .................................................................... 111

1.90 International Business Machines Corp ........................................... 112 1.90.1 Contact Info ......................................................................... 112 1.90.2 Company Profile .................................................................. 112

1.90.3 Key Executives .................................................................... 113 1.91 Intrusion Inc .................................................................................... 113

1.91.1 Contact Info ......................................................................... 113 1.91.2 Company Profile .................................................................. 113

1.91.3 Key Executives .................................................................... 114 1.92 IOActive .......................................................................................... 114

1.92.1 Contact Info ......................................................................... 114 1.92.2 Company Profile .................................................................. 114

Page 35: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 11

1.92.3 Key Executives .................................................................... 115 1.93 Iovation ........................................................................................... 115

1.93.1 Contact Info ......................................................................... 115 1.93.2 Company Profile .................................................................. 115 1.93.3 Key Executives .................................................................... 115

1.94 Juniper Network ............................................................................. 116 1.94.1 Contact Info ......................................................................... 116 1.94.2 Company Profile .................................................................. 116 1.94.3 Key Executives .................................................................... 117

1.95 Kaspersky Lab ............................................................................... 117

1.95.1 Contact Info ......................................................................... 117 1.95.2 Company Profile .................................................................. 117

1.95.3 Key Executives .................................................................... 118 1.96 The KEYW Holding Corporation ..................................................... 118

1.96.1 Contact Info ......................................................................... 118 1.96.2 Company Profile .................................................................. 118

1.96.3 Key Executives .................................................................... 119 1.97 L-3 Communications ...................................................................... 119

1.97.1 Contact Info ......................................................................... 119

1.97.2 Company Profile .................................................................. 119 1.97.3 Key Executives .................................................................... 120

1.98 Lacoon Security Ltd........................................................................ 120 1.98.1 Contact Info ......................................................................... 120 1.98.2 Company Profile .................................................................. 121

1.98.3 Key Executives .................................................................... 121

1.99 Lancope ......................................................................................... 121 1.99.1 Contact Info ......................................................................... 121 1.99.2 Company Profile .................................................................. 121

1.99.3 Key Executives .................................................................... 122 1.100 LANDesk Software ......................................................................... 122

1.100.1 Contact Info ......................................................................... 122 1.100.2 Company Profile .................................................................. 123 1.100.3 Key Executives .................................................................... 123

1.101 LogRhythm ..................................................................................... 124

1.101.1 Contact Info ......................................................................... 124 1.101.2 Company Profile .................................................................. 124 1.101.3 Key Executives .................................................................... 124

1.102 Lookingglass Cyber Solutions ........................................................ 125 1.102.1 Contact Info ......................................................................... 125 1.102.2 Company Profile .................................................................. 125 1.102.3 Key Executives .................................................................... 125

1.103 Lookout Mobile ............................................................................... 126 1.103.1 Contact Info ......................................................................... 126 1.103.2 Company Profile .................................................................. 126 1.103.3 Key Executives .................................................................... 126

Page 36: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 12

1.104 Lumension Security ........................................................................ 126 1.104.1 Contact Info ......................................................................... 126 1.104.2 Company Profile .................................................................. 127 1.104.3 Key Executives .................................................................... 127

1.105 M5 Network Security ...................................................................... 128

1.105.1 Contact Info ......................................................................... 128 1.105.2 Company Profile .................................................................. 128 1.105.3 Key Executives .................................................................... 128

1.106 Mandiant ........................................................................................ 129 1.106.1 Contact Info ......................................................................... 129

1.106.2 Company Profile .................................................................. 129 1.107 Mantech International Corp ............................................................ 129

1.107.1 Contact Info ......................................................................... 129 1.107.2 Company Profile .................................................................. 130 1.107.3 Key Executives .................................................................... 130

1.108 Memento ........................................................................................ 131

1.108.1 Contact Info ......................................................................... 131 1.108.2 Company Profile .................................................................. 131 1.108.3 Key Executives .................................................................... 131

1.109 Merlin International ......................................................................... 132 1.109.1 Contact Info ......................................................................... 132

1.109.2 Company Profile .................................................................. 132 1.109.3 Key Executives .................................................................... 132

1.110 MessageLabs ................................................................................. 133

1.110.1 Contact Info ......................................................................... 133

1.110.2 Company Profile .................................................................. 133 1.110.3 Key Executives .................................................................... 133

1.111 MetricStream .................................................................................. 133

1.111.1 Contact Info ......................................................................... 133 1.111.2 Company Profile .................................................................. 134

1.111.3 Key Executives .................................................................... 134 1.112 Mobile Active Defense .................................................................... 135

1.112.1 Contact Info ......................................................................... 135 1.112.2 Company Profile .................................................................. 135

1.112.3 Key Executives .................................................................... 135 1.113 Mobile Vault ................................................................................... 135

1.113.1 Contact Info ......................................................................... 135

1.113.2 Company Profile .................................................................. 136 1.113.3 Key Executives .................................................................... 136

1.114 MobileIron ...................................................................................... 136 1.114.1 Contact Info ......................................................................... 136

1.114.2 Key Executives .................................................................... 137 1.115 Mobilityone Ltd ............................................................................... 137

1.115.1 Contact Info ......................................................................... 137 1.115.2 Company Profile .................................................................. 137

Page 37: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 13

1.115.3 Key Executives .................................................................... 138 1.116 Mocana .......................................................................................... 138

1.116.1 Contact Info ......................................................................... 138 1.116.2 Company Profile .................................................................. 138 1.116.3 Key Executives .................................................................... 139

1.117 MU Dynamics ................................................................................. 139 1.117.1 Contact Info ......................................................................... 139 1.117.2 Company Profile .................................................................. 140 1.117.3 Key Executives .................................................................... 140

1.118 N-Dimension Solutions ................................................................... 140

1.118.1 Contact Info ......................................................................... 140 1.118.2 Company Profile .................................................................. 141

1.118.3 Key Executives .................................................................... 141 1.119 NetCentrics Corporation ................................................................. 141

1.119.1 Contact Info ......................................................................... 141 1.119.2 Company Profile .................................................................. 142

1.119.3 Key Executives .................................................................... 142 1.120 Network Security Systems ............................................................. 142

1.120.1 Contact Info ......................................................................... 142

1.120.2 Company Profile .................................................................. 142 1.120.3 Key Executives .................................................................... 143

1.121 Nics Tech Co., Ltd. ......................................................................... 143 1.121.1 Contact Info ......................................................................... 143 1.121.2 Company Profile .................................................................. 143

1.121.3 Key Executives .................................................................... 144

1.122 NIKSUN .......................................................................................... 144 1.122.1 Contact Info ......................................................................... 144 1.122.2 Company Profile .................................................................. 144

1.122.3 Key Executives .................................................................... 145 1.123 NSS Labs, Inc. ............................................................................... 145

1.123.1 Contact Info ......................................................................... 145 1.123.2 Company Profile .................................................................. 145 1.123.3 Key Executives .................................................................... 146

1.124 Odyssey Technologies ................................................................... 146

1.124.1 Contact Info ......................................................................... 146 1.124.2 Company Profile .................................................................. 146 1.124.3 Key Executives .................................................................... 147

1.125 Okta ................................................................................................ 147 1.125.1 Contact Info ......................................................................... 147 1.125.2 Company Profile .................................................................. 147 1.125.3 Key Executives .................................................................... 148

1.126 OpenDNS ....................................................................................... 148 1.126.1 Contact Info ......................................................................... 148 1.126.2 Company Profile .................................................................. 148 1.126.3 Key Executives .................................................................... 148

Page 38: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 14

1.127 Panda Security ............................................................................... 149 1.127.1 Contact Info ......................................................................... 149 1.127.2 Company Profile .................................................................. 149 1.127.3 Key Executives .................................................................... 149

1.128 ParetoLogic .................................................................................... 150

1.128.1 Contact Info ......................................................................... 150 1.128.2 Company Profile .................................................................. 150 1.128.3 Key Executives .................................................................... 150

1.129 Perimeter Internetworking Corp. .................................................... 151 1.130 PerspecSys .................................................................................... 151

1.130.1 Contact Info ......................................................................... 151 1.130.2 Company Profile .................................................................. 151

1.130.3 Key Executives .................................................................... 151 1.131 Ping Identity ................................................................................... 152

1.131.1 Contact Info ......................................................................... 152 1.131.2 Company Profile .................................................................. 152

1.131.3 Key Executives .................................................................... 152 1.132 Palantir Technologies Inc ............................................................... 153

1.132.1 Contact Info ......................................................................... 153

1.132.2 Company Profile .................................................................. 153 1.132.3 Key Executives .................................................................... 153

1.133 Palo Alto Networks Inc ................................................................... 154 1.133.1 Contact Info ......................................................................... 154 1.133.2 Company Profile .................................................................. 154

1.133.3 Key Executives .................................................................... 155

1.134 Prolexic Technologies .................................................................... 155 1.134.1 Contact Info ......................................................................... 155 1.134.2 Company Profile .................................................................. 155

1.134.3 Key Executives .................................................................... 156 1.135 Proofpoint ....................................................................................... 156

1.135.1 Contact Info ......................................................................... 156 1.135.2 Company Profile .................................................................. 156 1.135.3 Key Executives .................................................................... 157

1.136 Qualys, Inc. .................................................................................... 157

1.136.1 Contact Info ......................................................................... 157 1.136.2 Company Profile .................................................................. 157 1.136.3 Key Executives .................................................................... 158

1.137 QUMAS .......................................................................................... 158 1.137.1 Contact Info ......................................................................... 158 1.137.2 Company Profile .................................................................. 158

1.138 QuoVadis ....................................................................................... 159

1.138.1 Contact Info ......................................................................... 159 1.138.2 Company Profile .................................................................. 159 1.138.3 Key Executives .................................................................... 159

1.139 Quick Heal Technologies (P) Ltd. ................................................... 160

Page 39: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 15

1.139.1 Contact Info ......................................................................... 160 1.139.2 Company Profile .................................................................. 160 1.139.3 Key Executives .................................................................... 161

1.140 Radware Ltd ................................................................................... 161 1.140.1 Contact Info ......................................................................... 161

1.140.2 Company Profile .................................................................. 161 1.140.3 Key Executives .................................................................... 162

1.141 Rapid7 ............................................................................................ 162 1.141.1 Contact Info ......................................................................... 162 1.141.2 Company Profile .................................................................. 162

1.141.3 Key Executives .................................................................... 163 1.142 Raytheon Pikewerks Corporation ................................................... 163

1.142.1 Contact Info ......................................................................... 163 1.142.2 Company Profile .................................................................. 163 1.142.3 Key Executives .................................................................... 164

1.143 Red Lambda Inc. ............................................................................ 164

1.143.1 Contact Info ......................................................................... 164 1.143.2 Company Profile .................................................................. 164 1.143.3 Key Executives .................................................................... 165

1.144 ReD plc .......................................................................................... 165 1.145 RedSeal Networks, Inc. .................................................................. 165

1.145.1 Contact Info ......................................................................... 165 1.145.2 Company Profile .................................................................. 165 1.145.3 Key Executives .................................................................... 166

1.146 Retail Decisions Plc........................................................................ 166

1.146.1 Contact Info ......................................................................... 166 1.146.2 Company Profile .................................................................. 166 1.146.3 Key Executives .................................................................... 167

1.147 RLM Communications, Inc. ............................................................ 167 1.147.1 Contact Info ......................................................................... 167

1.147.2 Company Profile .................................................................. 167 1.147.3 Key Executives .................................................................... 168

1.148 RSA Security LLC .......................................................................... 168 1.148.1 Contact Info ......................................................................... 168

1.148.2 Company Profile .................................................................. 169 1.148.3 Key Executives .................................................................... 169

1.149 SafeNet, Inc. .................................................................................. 169

1.149.1 Contact Info ......................................................................... 169 1.149.2 Company Profile .................................................................. 170 1.149.3 Key Executives .................................................................... 170

1.150 SailPoint Technologies, Inc. ........................................................... 170

1.150.1 Contact Info ......................................................................... 170 1.150.2 Company Profile .................................................................. 171 1.150.3 Key Executives .................................................................... 171

1.151 SAINT Corporation ......................................................................... 171

Page 40: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 16

1.151.1 Contact Info ......................................................................... 171 1.151.2 Company Profile .................................................................. 172 1.151.3 Key Executives .................................................................... 172

1.152 Salient Federal Solutions, Inc. ........................................................ 172 1.152.1 Contact Info ......................................................................... 172

1.152.2 Company Profile .................................................................. 173 1.152.3 Key Executives .................................................................... 173

1.153 SecurityMetrics ............................................................................... 174 1.153.1 Contact Info ......................................................................... 174 1.153.2 Company Profile .................................................................. 174

1.153.3 Key Executives .................................................................... 174 1.154 Senetas Corp. Ltd .......................................................................... 175

1.154.1 Contact Info ......................................................................... 175 1.154.2 Company Profile .................................................................. 175 1.154.3 Key Executives .................................................................... 175

1.155 SilverSky ........................................................................................ 175

1.155.1 Contact Info ......................................................................... 175 1.155.2 Company Profile .................................................................. 176 1.155.3 Key Executives .................................................................... 176

1.156 Skybox Security Inc. ....................................................................... 177 1.156.1 Contact Info ......................................................................... 177

1.156.2 Company Profile .................................................................. 177 1.156.3 Key Executives .................................................................... 178

1.157 SolarWinds ..................................................................................... 178

1.157.1 Contact Info ......................................................................... 178

1.157.2 Company Profile .................................................................. 178 1.157.3 Key Executives .................................................................... 179

1.158 Solera Networks Inc. ...................................................................... 179

1.158.1 Contact Info ......................................................................... 179 1.158.2 Company Profile .................................................................. 179

1.158.3 Key Executives .................................................................... 180 1.159 Sophos Ltd. .................................................................................... 180

1.159.1 Contact Info ......................................................................... 180 1.159.2 Company Profile .................................................................. 180

1.159.3 Key Executives .................................................................... 181 1.160 Sotera Defense Solutions, Inc. ....................................................... 181

1.160.1 Contact Info ......................................................................... 181

1.160.2 Company Profile .................................................................. 181 1.160.3 Key Executives .................................................................... 182

1.161 Splunk Inc. ..................................................................................... 182 1.161.1 Contact Info ......................................................................... 182

1.161.2 Company Profile .................................................................. 182 1.161.3 Key Executives .................................................................... 183

1.162 Stormshield Network Security (Formerly: NETASQ S.A.) .............. 183 1.162.1 Contact Info ......................................................................... 183

Page 41: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 17

1.162.2 Company Profile .................................................................. 184 1.162.3 Key Executives .................................................................... 184

1.163 Strikeforce Technologies ................................................................ 184 1.163.1 Contact Info ......................................................................... 184 1.163.2 Company Profile .................................................................. 184

1.163.3 Key Executives .................................................................... 185 1.164 Symantec Corporation .................................................................... 185

1.164.1 Contact Info ......................................................................... 185 1.164.2 Company Profile .................................................................. 186 1.164.3 Key Executives .................................................................... 186

1.165 Synectics Plc .................................................................................. 186 1.165.1 Contact Info ......................................................................... 186

1.165.2 Company Profile .................................................................. 187 1.165.3 Key Executives .................................................................... 187

1.166 Symplified, Inc. ............................................................................... 187 1.166.1 Contact Info ......................................................................... 187

1.166.2 Company Profile .................................................................. 188 1.166.3 Key Executives .................................................................... 188

1.167 Tangoe ........................................................................................... 188

1.167.1 Contact Info ......................................................................... 188 1.167.2 Company Profile .................................................................. 189

1.167.3 Key Executives .................................................................... 189 1.168 Thales ............................................................................................ 190

1.168.1 Contact Info ......................................................................... 190

1.168.2 Company Profile .................................................................. 190

1.168.3 Key Executives .................................................................... 190 1.169 TeleSign Corp. ............................................................................... 191

1.169.1 Contact Info ......................................................................... 191

1.169.2 Company Profile .................................................................. 191 1.169.3 Key Executives .................................................................... 191

1.170 Tenable Network Security .............................................................. 192 1.170.1 Contact Info ......................................................................... 192 1.170.2 Company Profile .................................................................. 192 1.170.3 Key Executives .................................................................... 193

1.171 ThreatMetrix ................................................................................... 193 1.171.1 Contact Info ......................................................................... 193 1.171.2 Company Profile .................................................................. 193

1.171.3 Key Executives .................................................................... 194 1.172 TIBCO Software ............................................................................. 194

1.172.1 Contact Info ......................................................................... 194 1.172.2 Company Profile .................................................................. 194

1.172.3 Key Executives .................................................................... 195 1.173 TraceSecurity ................................................................................. 195

1.173.1 Contact Info ......................................................................... 195 1.173.2 Company Profile .................................................................. 195

Page 42: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 18

1.173.3 Key Executives .................................................................... 196 1.174 Trend Micro Inc .............................................................................. 196

1.174.1 Contact Info ......................................................................... 196 1.174.2 Company Profile .................................................................. 197 1.174.3 Key Executives .................................................................... 197

1.175 Tripwire .......................................................................................... 198 1.175.1 Contact Info ......................................................................... 198 1.175.2 Company Profile .................................................................. 198 1.175.3 Key Executives .................................................................... 198

1.176 Trusteer .......................................................................................... 199

1.176.1 Contact Info ......................................................................... 199 1.176.2 Company Profile .................................................................. 199

1.176.3 Key Executives .................................................................... 200 1.177 Trustwave ....................................................................................... 200

1.177.1 Contact Info ......................................................................... 200 1.177.2 Company Profile .................................................................. 200

1.177.3 Key Executives .................................................................... 200 1.178 Utimaco Safeware, Inc. .................................................................. 201

1.178.1 Contact Info ......................................................................... 201

1.178.2 Company Profile .................................................................. 201 1.178.3 Key Executives .................................................................... 201

1.179 Vanguard Integrity Professionals, Inc. ............................................ 202 1.179.1 Contact Info ......................................................................... 202 1.179.2 Company Profile .................................................................. 202

1.179.3 Key Executives .................................................................... 203

1.180 Varonis Systems ............................................................................ 203 1.180.1 Contact Info ......................................................................... 203 1.180.2 Company Profile .................................................................. 203

1.180.3 Key Executives .................................................................... 204 1.181 VASCO Data Security International................................................ 204

1.181.1 Contact Info ......................................................................... 204 1.181.2 Company Profile .................................................................. 204 1.181.3 Key Executives .................................................................... 205

1.182 Venafi ............................................................................................. 205

1.182.1 Contact Info ......................................................................... 205 1.182.2 Company Profile .................................................................. 205 1.182.3 Key Executives .................................................................... 206

1.183 Veracode ........................................................................................ 206 1.183.1 Contact Info ......................................................................... 206 1.183.2 Company Profile .................................................................. 206 1.183.3 Key Executives .................................................................... 207

1.184 Verdasys ........................................................................................ 207 1.184.1 Contact Info ......................................................................... 207 1.184.2 Company Profile .................................................................. 207 1.184.3 Key Executives .................................................................... 208

Page 43: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 19

1.185 Verint Systems Inc ......................................................................... 208 1.185.1 Contact Info ......................................................................... 208 1.185.2 Company Profile .................................................................. 209 1.185.3 Key Executives .................................................................... 209

1.186 WatchGuard Technologies ............................................................. 210

1.186.1 Contact Info ......................................................................... 210 1.186.2 Company Profile .................................................................. 210 1.186.3 Key Executives .................................................................... 210

1.187 Webroot .......................................................................................... 211 1.187.1 Contact Info ......................................................................... 211

1.187.2 Company Profile .................................................................. 211 1.187.3 Key Executives .................................................................... 211

1.188 WhiteHat Security........................................................................... 212 1.188.1 Contact Info ......................................................................... 212 1.188.2 Company Profile .................................................................. 212 1.188.3 Key Executives .................................................................... 212

1.189 Workshare Technology .................................................................. 213 1.189.1 Contact Info ......................................................................... 213 1.189.2 Company Profile .................................................................. 213

1.189.3 Key Executives .................................................................... 213 1.190 Zix Corporation ............................................................................... 214

1.190.1 Contact Info ......................................................................... 214 1.190.2 Company Profile .................................................................. 214 1.190.3 Key Executives .................................................................... 214

1.191 Zscaler ........................................................................................... 215

1.191.1 Contact Info ......................................................................... 215 1.191.2 Company Profile .................................................................. 215 1.191.3 Key Executives .................................................................... 215

2 Risk Posture of 3rd Party Suppliers ...................................................... 217

APPENDICES ................................................................................................... 218

3 Appendix A: Other Banking and Financial Services Security Solutions ................................................................................................. 218 3.1 Scope and Analysis ........................................................................ 218

3.2 Banking and Financial Services Security: from IT Security to Cybersecurity ................................................................................. 219

3.3 Intelligence & Forensics ................................................................. 220 3.4 Cryptography .................................................................................. 222 3.5 Artificial Intelligence........................................................................ 222 3.6 Behavioral Analytics ....................................................................... 223 3.7 Identity Management ...................................................................... 223

4 Appendix B: Techno-Tactical Trends .................................................... 225 4.1 Risk Management .......................................................................... 225

Page 44: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 20

4.2 Vulnerability Management .............................................................. 225 4.3 Asset Discovery and Management ................................................. 226 4.4 Mobile Device Security ................................................................... 226 4.5 SCADA Protection .......................................................................... 227 4.6 Security-by-Design ......................................................................... 227

4.7 Security Operation Centers (SOC) ................................................. 228 4.8 Managed Security Services (MSS)................................................. 229

5 Appendix C: Cyberspace Layers ........................................................... 230

6 Appendix D: Cybersecurity Standards ................................................. 232 6.1 Introduction .................................................................................... 232

6.2 ISO 27001 and 27002 Standards ................................................... 232

6.3 Standard of Good Practice ............................................................. 233

6.4 NERC Standards ............................................................................ 233 6.5 NIST Standards .............................................................................. 234

6.6 RFC 2196 Standards ...................................................................... 234 6.7 ISA/IEC-62443 Standards .............................................................. 234

6.8 Planned and Published ISA-62443 IACS Security Standards. ....... 235 6.8.1 ISA-62443 Standards .......................................................... 235 6.8.2 General Standards ............................................................... 236

6.8.3 Policy and Procedure Standards ......................................... 236 6.8.4 System Integrator Standards ............................................... 236

6.8.5 Component Provider Standards ........................................... 237 6.9 ISA Security Compliance Institute .................................................. 237 6.10 The U.K. IASME Standards ............................................................ 237

6.11 Payment Card Industry Security Standard (PCI DSS) ................... 238

6.11.1 PCI DSS of Major Debit, Credit, Prepaid, E-Purse, ATM, and POS Cards ........................................................................... 238

6.11.2 Requirements ...................................................................... 239

6.11.3 Mandated Compliance ......................................................... 240 6.11.4 Compliance and Wireless LANs .......................................... 240

6.12 IT Security Standards ..................................................................... 240 6.12.1 ISO 27000 Series of Standards ........................................... 240

7 Appendix E: The E.U. Banking and Financial Services Security Regulations ............................................................................................. 251

7.1 E.U. Regulations ............................................................................ 251 7.1.1 Legislation in Force .............................................................. 251

7.1.2 FATF International Standard ................................................ 251 7.1.3 Cybercrime, Money Laundering and Terrorist Financing

Pipeline Legislation .............................................................. 252

8 Appendix F: Payment Card Transactions & Security Systems........... 253 8.1 Payment Card Transaction Process ............................................... 253

8.2 Three-Party Transactions ............................................................... 254 8.3 The Retail Industry: Cybersecurity Breaches ................................. 255

Page 45: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 21

8.4 Costs of Compromised Payment Cards ......................................... 256 8.5 Who Foots the bill?......................................................................... 257 8.6 U.S. Legacy Payment Card Industry Security Practices ................. 257 8.7 Pipeline Transaction Security Technologies ................................... 259

9 Appendix G: Financial Sector Acronyms & Glossary .......................... 260

9.1 Financial Sector Acronyms ............................................................. 260 9.2 Financial Sector Glossary .............................................................. 280

10 Appendix H: NIST - Framework for Improving Critical Infrastructure Cybersecurity .................................................................. 321

11 The Report Research Methodology ....................................................... 322 11.1 Report Structure ............................................................................. 322

11.2 Assumptions ................................................................................... 322 11.3 Research Methodology .................................................................. 323

11.4 Who Is This Report For? ................................................................ 324 11.5 Research Methods ......................................................................... 324

12 Disclaimer and Copyright ...................................................................... 325

Page 46: 2016-2020 U.S. Financial Services: Cybersecurity Systems

U.S. Financial Services: Cybersecurity Systems & Services Market - 2016-2020 Volume 2

Copyright © 2015 HSRC. All rights reserved | Copy #2015-0811123 | 22

List of Tables

Table 1 - Control Objectives vs. PCI DSS Requirements .................................. 238 Table 2 - ISO 27001 - 27006 Standards ............................................................ 240

Table 3 - ISO/IEC Standards ............................................................................. 245 Table 4 - Compromised Payment Cards: Loss Estimates ................................. 254

List of Figures

Figure 1 - Three Layers of Cyberspace ............................................................. 228 Figure 2 - Payment Card Transaction Process ................................................. 252