Sorry for interrupting, this website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Learn more
Accept & Close

Computer Security - UK - November 2015

“The potential costs of data breaches are extreme. At a national security level they can literally be a matter of life and death, while in the other public, enterprise and SME sectors data breaches can lead to the disclosure of very personal and important individual financial information. For this reason, data breaches attract mass public attention and consumer outrage. The overt and hidden costs of such breaches will continue to concentrate government and corporate policies into defeating malevolent computer activity.”

– Terry Leggett Senior B2B Analyst

This report addresses the following key questions:

  • How will the computer security market develop over the next five years?
  • How are our changing communication habits affecting the industry?
  • Which technologies and approaches to computer security will gain in importance?
  • Will growth in the market be driven by the government and public sector, large enterprises, or SMEs and consumers?
  • How is the cloud and growth in e-commerce affecting the market? 

What you get

What's included

Why buy from us?

Succeed

Our reports will provide you with market data, consumer research and competitive intelligence to succeed in your market.

Instant Access

Buy now and you'll have instant access to the information you need to make the right decisions.

Opportunities

Find out what's next in the markets that matter to you: where opportunities lie and what challenges you will face.

Trusted

A business Superbrand, Mintel is a source you can trust. We have been defining and refining the Market Intelligence mix since 1972.

Table of contents

  1. Executive Summary

      • The market
        • Figure 1: UK market for computer security, 2010-14 actual and 2015-19 forecast
        • Figure 2: Segmentation of computer security, by end use sector, 2014
        • Figure 3: Segmentation of computer security, by solution type, 2014
        • Figure 4: Segmentation of computer security, by product/service, 2014
      • Market factors
        • Figure 5: Data security incidents, by sector, April-June 2015
        • Figure 6: Data security incidents, by type, April-June 2015
      • Companies
        • What we think
        • Key Insights

            • What is driving the computer security market?
              • Is long-term growth virtually assured?
                • How does public spending on computer security fit into the market?
                  • So is the rest of the market accounted for by major corporations or consumers?
                  • Introduction

                    • Issues in the market
                      • Definitions
                        • Methodology
                          • Abbreviations
                            • Market positioning
                            • UK Economy

                              • Overview
                                • Figure 7: UK GDP quarterly development, 2003-15
                                • Figure 8: UK GDP in economic downturns and recoveries since 1979
                              • Inflation
                                • Interest rates
                                  • House prices
                                    • Consumer spending
                                      • Manufacturing
                                        • Figure 9: UK output, by industry, 2008-15
                                      • Business investment
                                        • Figure 10: UK GFCF 2003-15
                                      • Imports
                                        • Exports
                                        • Market Factors

                                          • Key points
                                            • Internet usage
                                              • Figure 11: Worldwide internet usage, by region, 2010-14
                                              • Figure 12: Proportion of businesses with internet access, by size of company, 2009-13
                                              • Figure 13: Proportion of businesses with broadband, by size of company, 2009-13
                                              • Figure 14: Proportion of businesses by maximum contracted internet connection speed, by size of company, 2010-13
                                            • Cloud computing
                                              • Figure 15: UK cloud computing market, 2010-14
                                            • E-Commerce
                                              • Figure 16: The total UK e-commerce market, 2010-14
                                          • Market Size

                                            • Key points
                                                • Figure 17: UK market for computer security, 2010-14
                                            • Market Segmentation

                                              • Key points
                                                • Segmentation by end use sector
                                                  • Figure 18: Segmentation of computer security, by end use sector, 2010-14
                                                • Segmentation by solution sector
                                                  • Figure 19: Segmentation of computer security, by solution type, 2010-14
                                                • Segmentation by product/service
                                                  • Figure 20: Segmentation of computer security, by product/service, 2010-14
                                              • Market Trends

                                                • Key points
                                                  • Security breaches continue to be a major issue
                                                      • Figure 21: Data security incidents, by sector, April-June 2015
                                                      • Figure 22: Data security incidents, by type, April-June 2015
                                                    • External attacks
                                                      • Regulatory influences
                                                        • Supply chains
                                                          • Bring-your-own technology into the workplace
                                                            • Awareness
                                                              • The impact of the cloud
                                                              • Industry Structure

                                                                • Key points
                                                                  • Industry development
                                                                      • Figure 23: Analysis of the changes in the structure of the business and domestic software development industry, 2011-15
                                                                      • Figure 24: Analysis of the changes in the structure of the computer consultancy industry, 2011-15
                                                                    • Development by turnover
                                                                      • Figure 25: Analysis of the financial structure of the business and domestic software development industry, 2014 and 2015
                                                                      • Figure 26: Analysis of the financial structure of the computer consultancy industry, 2014 and 2015
                                                                    • Development by employment level
                                                                      • Figure 27: Analysis of the employment structure of the computer consultancy industry, 2014 and 2015
                                                                      • Figure 28: Analysis of the employment structure of the business and domestic software development industry, 2014 and 2015
                                                                  • Company Profiles

                                                                    • Avecto

                                                                          • Figure 29: Financial analysis of Avecto UK, 2013-14
                                                                        • Company strategy
                                                                        • AVG Technologies UK

                                                                            • Figure 30: Financial analysis of AVG Technologies UK, 2010-14
                                                                          • Company strategy
                                                                          • BAE Systems

                                                                                • Figure 31: Financial analysis of BAE Systems, 2010-14
                                                                                • Figure 32: Geographic turnover segmentation of BAE Systems, 2014
                                                                                • Figure 33: Activity turnover segmentation of BAE Systems, 2014
                                                                              • Cyber and intelligence activities
                                                                                  • Figure 34: Activity turnover segmentation of BAE Systems’ Intelligence & Security activities, 2014
                                                                                  • Figure 35: Activity turnover segmentation of BAE Systems’ Applied Intelligence activities, 2014
                                                                                • Company strategy
                                                                                • Bitdefender

                                                                                    • Figure 36: Financial analysis of Bitdefender, 2010-14
                                                                                  • Company strategy
                                                                                  • Boldon James

                                                                                      • Figure 37: Financial analysis of Boldon James, 2011-15
                                                                                    • Company strategy
                                                                                    • BT Group

                                                                                        • BT Global Services
                                                                                          • BT Business
                                                                                            • BT Consumer
                                                                                              • BT Wholesale
                                                                                                • Openreach
                                                                                                  • Figure 38: Financial analysis of BT Group, 2011-15
                                                                                                  • Figure 39: Turnover analysis of BT Group, 2013-15
                                                                                                • Company strategy
                                                                                                • Bullguard

                                                                                                    • Figure 40: Financial analysis of Bullguard, 2009-13
                                                                                                  • Company strategy
                                                                                                  • Gemalto UK

                                                                                                      • Figure 41: Turnover analysis of total Gemalto group, 2010-14
                                                                                                      • Figure 42: Alternative revenue analysis of total Gemalto group, 2010-14
                                                                                                      • Figure 43: Financial analysis of Gemalto UK, 2010-14
                                                                                                    • Company strategy
                                                                                                    • Intel Corporation (UK)

                                                                                                          • Figure 44: Financial analysis of Intel Corporation (UK), 2010-14
                                                                                                          • Figure 45: Financial analysis of McAfee UK, 2010-14
                                                                                                        • Company strategy
                                                                                                        • PA Consulting Group

                                                                                                              • Figure 46: Financial analysis of PA Consulting Group, 2010-14
                                                                                                            • Company strategy
                                                                                                            • Pinnacle Technology Group

                                                                                                                  • Figure 47: Financial analysis of Pinnacle Technology Group, 2010-14
                                                                                                                  • Figure 48: Turnover analysis of Pinnacle Technology Group, 2014
                                                                                                                • Company strategy
                                                                                                                • QinetiQ Group

                                                                                                                      • Figure 49: Financial analysis of QinteQ Group, 2011-15
                                                                                                                    • Company strategy
                                                                                                                    • Sophos Group

                                                                                                                        • Figure 50: Financial analysis of Sophos, 2012-15
                                                                                                                      • Company strategy
                                                                                                                      • Symantec (UK)

                                                                                                                            • Figure 51: Financial analysis of Symantec (UK), 2010-14
                                                                                                                          • Company strategy
                                                                                                                          • Ultra Electronics Group

                                                                                                                                • Figure 52: Financial analysis of Ultra Electronics Group, 2010-14
                                                                                                                                • Figure 53: Turnover analysis of Ultra Electronics, 2014
                                                                                                                              • Company strategy
                                                                                                                              • Forecast

                                                                                                                                • Key points
                                                                                                                                  • Market size
                                                                                                                                    • Figure 54: UK forecast market for computer security, 2015-19
                                                                                                                                  • Market segmentation
                                                                                                                                    • Segmentation by end use sector
                                                                                                                                      • Figure 55: Forecast segmentation of computer security, by end use sector, 2015-19
                                                                                                                                    • Segmentation by solution sector
                                                                                                                                      • Figure 56: Forecast segmentation of computer security, by solution type, 2015-19
                                                                                                                                    • Segmentation by product/service
                                                                                                                                      • Figure 57: Forecast segmentation of computer security, by product/service, 2015-19

                                                                                                                                  Computer Security - UK - November 2015

                                                                                                                                  US $1,321.06 (Excl.Tax)