- REPORT SUMMARY
- TABLE OF CONTENTS
-
Deception network, also called honeypot or decoy, is utilized to divert attacks to other nodes and offer prior warnings to the administrator.
The increasing adoption of the Internet of Things (IoT) is highlighting the cyber deception technology and promoting high usage, over conventional cyber security. As a result, the cyber deception market is expected to witness high growth over the forecast period.
This report offers an overview of the market trends, drivers, and barriers with respect to the China Cyber Deception market. It also provides a detailed overview of the market of different regions across North China, Central China, South China, East China, Northeast China, Southwest China, Northwest China. The report deep analyzes type and application in China Cyber Deception market. Detailed analysis of key players, along with key growth strategies adopted by Cyber Deception industry, the PEST and SWOT analysis are also included. In short, the report will provide a comprehensive view of the industry's development and features.
By Player:
Illusive Networks
Rapid7
ForeScout
GuardiCore
Fidelis Cybersecurity
Cymmetria
LogRythm
Attivo Networks
Acalvio
SEC Technologies
Allure Security
By Type:
Professional Service
Managed Service
By End-User:
IT & Telecom
Retail
Energy & Power
BFSI
Healthcare
By Region:
-
North China
-
Central China
-
South China
-
East China
-
Northeast China
-
Southwest China
-
Northwest China
TABLE OF CONTENT
1 Report Overview
-
1.1 Product Definition and Scope
-
1.2 PEST (Political, Economic, Social and Technological) Analysis of Cyber Deception Market
-
1.3 Market Segment by Type
-
1.3.1 China Cyber Deception Market Size and Growth Rate of Professional Service from 2016 to 2027
-
1.3.2 China Cyber Deception Market Size and Growth Rate of Managed Service from 2016 to 2027
-
1.4 Market Segment by Application
-
1.4.1 China Cyber Deception Market Size and Growth Rate of IT & Telecom from 2016 to 2027
-
1.4.2 China Cyber Deception Market Size and Growth Rate of Retail from 2016 to 2027
-
1.4.3 China Cyber Deception Market Size and Growth Rate of Energy & Power from 2016 to 2027
-
1.4.4 China Cyber Deception Market Size and Growth Rate of BFSI from 2016 to 2027
-
1.4.5 China Cyber Deception Market Size and Growth Rate of Healthcare from 2016 to 2027
-
1.5 Market Segment by Regions
-
1.5.1 North China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
1.5.2 Central China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
1.5.3 South China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
1.5.4 East China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
1.5.5 Northeast China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
1.5.6 Southwest China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
1.5.7 Northwest China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
2 Market Trends and Competitive Landscape
-
2.1 Market Trends and Dynamics
-
2.1.1 Market Challenges and Restraints
-
2.1.2 Market Opportunities and Potentials
-
2.1.3 Mergers and Acquisitions
-
2.2 Competitive Landscape Analysis
-
2.2.1 Industrial Concentration Analysis
-
2.2.2 Porter's Five Forces Analysis of the Industry
-
2.2.3 SWOT Analysis for New Entrants
-
2.3 Coronavirus (COVID-19) Distribution and its Impact on the Industry
3 Segmentation of Cyber Deception Market by Types
-
3.1 Products Development Trends of Different Types
-
3.2 Commercial Products Types of Major Vendors
-
3.3 Competitive Landscape Analysis of Different Types
-
3.4 Market Size of Cyber Deception by Major Types
-
3.4.1 Market Size and Growth Rate of Professional Service
-
3.4.2 Market Size and Growth Rate of Managed Service
4 Segmentation of Cyber Deception Market by End-Users
-
4.1 Downstream Client Analysis by End-Users
-
4.2 Competitive Landscape Analysis of Different End-Users
-
4.3 Market Potential Analysis of Different End-Users
-
4.4 Market Size of Cyber Deception by Major End-Users
-
4.4.1 Market Size and Growth Rate of Cyber Deception in IT & Telecom
-
4.4.2 Market Size and Growth Rate of Cyber Deception in Retail
-
4.4.3 Market Size and Growth Rate of Cyber Deception in Energy & Power
-
4.4.4 Market Size and Growth Rate of Cyber Deception in BFSI
-
4.4.5 Market Size and Growth Rate of Cyber Deception in Healthcare
5 Market Analysis by Regions
-
5.1 China Cyber Deception Production Analysis by Regions
-
5.2 China Cyber Deception Consumption Analysis by Regions
-
5.3 Coronavirus (COVID-19) Impact on China Economy
6 North China Cyber Deception Landscape Analysis
-
6.1 North China Cyber Deception Landscape Analysis by Major Types
-
6.2 North China Cyber Deception Landscape Analysis by Major End-Users
7 Central China Cyber Deception Landscape Analysis
-
7.1 Central China Cyber Deception Landscape Analysis by Major Types
-
7.2 Central China Cyber Deception Landscape Analysis by Major End-Users
8 South China Cyber Deception Landscape Analysis
-
8.1 South China Cyber Deception Landscape Analysis by Major Types
-
8.2 South China Cyber Deception Landscape Analysis by Major End-Users
9 East China Cyber Deception Landscape Analysis
-
9.1 East China Cyber Deception Landscape Analysis by Major Types
-
9.2 East China Cyber Deception Landscape Analysis by Major End-Users
10 Northeast China Cyber Deception Landscape Analysis
-
10.1 Northeast China Cyber Deception Landscape Analysis by Major Types
-
10.2 Northeast China Cyber Deception Landscape Analysis by Major End-Users
11 Southwest China Cyber Deception Landscape Analysis
-
11.1 Southwest China Cyber Deception Landscape Analysis by Major Types
-
11.2 Southwest China Cyber Deception Landscape Analysis by Major End-Users
12 Northwest China Cyber Deception Landscape Analysis
-
12.1 Northwest China Cyber Deception Landscape Analysis by Major Types
-
12.2 Northwest China Cyber Deception Landscape Analysis by Major End-Users
13 Major Players Profiles
-
13.1 Illusive Networks
-
13.1.1 Illusive Networks Company Profile and Recent Development
-
13.1.2 Market Performance
-
13.1.3 Product and Service Introduction
-
13.2 Rapid7
-
13.2.1 Rapid7 Company Profile and Recent Development
-
13.2.2 Market Performance
-
13.2.3 Product and Service Introduction
-
13.3 ForeScout
-
13.3.1 ForeScout Company Profile and Recent Development
-
13.3.2 Market Performance
-
13.3.3 Product and Service Introduction
-
13.4 GuardiCore
-
13.4.1 GuardiCore Company Profile and Recent Development
-
13.4.2 Market Performance
-
13.4.3 Product and Service Introduction
-
13.5 Fidelis Cybersecurity
-
13.5.1 Fidelis Cybersecurity Company Profile and Recent Development
-
13.5.2 Market Performance
-
13.5.3 Product and Service Introduction
-
13.6 Cymmetria
-
13.6.1 Cymmetria Company Profile and Recent Development
-
13.6.2 Market Performance
-
13.6.3 Product and Service Introduction
-
13.7 LogRythm
-
13.7.1 LogRythm Company Profile and Recent Development
-
13.7.2 Market Performance
-
13.7.3 Product and Service Introduction
-
13.8 Attivo Networks
-
13.8.1 Attivo Networks Company Profile and Recent Development
-
13.8.2 Market Performance
-
13.8.3 Product and Service Introduction
-
13.9 Acalvio
-
13.9.1 Acalvio Company Profile and Recent Development
-
13.9.2 Market Performance
-
13.9.3 Product and Service Introduction
-
13.10 SEC Technologies
-
13.10.1 SEC Technologies Company Profile and Recent Development
-
13.10.2 Market Performance
-
13.10.3 Product and Service Introduction
-
13.11 Allure Security
-
13.11.1 Allure Security Company Profile and Recent Development
-
13.11.2 Market Performance
-
13.11.3 Product and Service Introduction
The List of Tables and Figures
-
Figure Product Picture
-
Figure China Cyber Deception Market Size and Growth Rate of Professional Service from 2016 to 2027
-
Figure China Cyber Deception Market Size and Growth Rate of Managed Service from 2016 to 2027
-
Figure Market Share by Type in 2016
-
Figure Market Share by Type in 2021
-
Figure Market Share by Type in 2027
-
Figure China Cyber Deception Market Size and Growth Rate of IT & Telecom from 2016 to 2027
-
Figure China Cyber Deception Market Size and Growth Rate of Retail from 2016 to 2027
-
Figure China Cyber Deception Market Size and Growth Rate of Energy & Power from 2016 to 2027
-
Figure China Cyber Deception Market Size and Growth Rate of BFSI from 2016 to 2027
-
Figure China Cyber Deception Market Size and Growth Rate of Healthcare from 2016 to 2027
-
Figure Market Share by End-User in 2016
-
Figure Market Share by End-User in 2021
-
Figure Market Share by End-User in 2027
-
Figure North China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure Central China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure South China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure East China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure Northeast China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure Southwest China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure Northwest China Cyber Deception Consumption Market Size and Growth Rate from 2016 to 2027
-
Figure Development Trends and Industry Dynamics of Cyber Deception Industry
-
Figure Market Challenges and Restraints
-
Figure Market Opportunities and Potentials
-
Table Mergers and Acquisition
-
Figure Market Share of TOP 3 Players in 2020
-
Figure Market Share of TOP 5 Players in 2021
-
Figure Market Share of TOP 6 Players from 2016 to 2021
-
Figure Porter's Five Forces Analysis
-
Figure New Entrant SWOT Analysis
-
Figure Coronavirus (COVID-19) Map of China
-
Table Coronavirus (COVID-19) Impact on the Industry
-
Figure Specifications of Different Types of Cyber Deception
-
Figure Development Trends of Different Types
-
Table Commercial Products Types of Major Vendors
-
Figure Competitive Landscape Analysis of Different Types
-
Table Consumption of Cyber Deception by Different Types from 2016 to 2027
-
Table Consumption Share of Cyber Deception by Different Types from 2016 to 2027
-
Figure Market Size and Growth Rate of Professional Service
-
Figure Market Size and Growth Rate of Managed Service
-
Table Downstream Client Analysis by End-Users
-
Figure Competitive Landscape Analysis of Different End-Users
-
Table Market Potential Analysis of Different End-Users
-
Figure Consumption of Cyber Deception by Different End-Users from 2016 to 2027
-
Table Consumption Share of Cyber Deception by Different End-Users from 2016 to 2027
-
Figure Market Size and Growth Rate of IT & Telecom
-
Figure Market Size and Growth Rate of Retail
-
Figure Market Size and Growth Rate of Energy & Power
-
Figure Market Size and Growth Rate of BFSI
-
Figure Market Size and Growth Rate of Healthcare
-
Table China Cyber Deception Production by Regions
-
Table China Cyber Deception Production Share by Regions
-
Figure China Cyber Deception Production Share by Regions in 2016
-
Figure China Cyber Deception Production Share by Regions in 2021
-
Figure China Cyber Deception Production Share by Regions in 2027
-
Table China Cyber Deception Consumption by Regions
-
Table China Cyber Deception Consumption Share by Regions
-
Figure China Cyber Deception Consumption Share by Regions in 2016
-
Figure China Cyber Deception Consumption Share by Regions in 2021
-
Figure China Cyber Deception Consumption Share by Regions in 2027
-
Table North China Cyber Deception Consumption by Types from 2016 to 2027
-
Table North China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure North China Cyber Deception Consumption Share by Types in 2016
-
Figure North China Cyber Deception Consumption Share by Types in 2021
-
Figure North China Cyber Deception Consumption Share by Types in 2027
-
Table North China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table North China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure North China Cyber Deception Consumption Share by End-Users in 2016
-
Figure North China Cyber Deception Consumption Share by End-Users in 2021
-
Figure North China Cyber Deception Consumption Share by End-Users in 2027
-
Table Central China Cyber Deception Consumption by Types from 2016 to 2027
-
Table Central China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure Central China Cyber Deception Consumption Share by Types in 2016
-
Figure Central China Cyber Deception Consumption Share by Types in 2021
-
Figure Central China Cyber Deception Consumption Share by Types in 2027
-
Table Central China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table Central China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure Central China Cyber Deception Consumption Share by End-Users in 2016
-
Figure Central China Cyber Deception Consumption Share by End-Users in 2021
-
Figure Central China Cyber Deception Consumption Share by End-Users in 2027
-
Table South China Cyber Deception Consumption by Types from 2016 to 2027
-
Table South China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure South China Cyber Deception Consumption Share by Types in 2016
-
Figure South China Cyber Deception Consumption Share by Types in 2021
-
Figure South China Cyber Deception Consumption Share by Types in 2027
-
Table South China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table South China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure South China Cyber Deception Consumption Share by End-Users in 2016
-
Figure South China Cyber Deception Consumption Share by End-Users in 2021
-
Figure South China Cyber Deception Consumption Share by End-Users in 2027
-
Table East China Cyber Deception Consumption by Types from 2016 to 2027
-
Table East China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure East China Cyber Deception Consumption Share by Types in 2016
-
Figure East China Cyber Deception Consumption Share by Types in 2021
-
Figure East China Cyber Deception Consumption Share by Types in 2027
-
Table East China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table East China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure East China Cyber Deception Consumption Share by End-Users in 2016
-
Figure East China Cyber Deception Consumption Share by End-Users in 2021
-
Figure East China Cyber Deception Consumption Share by End-Users in 2027
-
Table Northeast China Cyber Deception Consumption by Types from 2016 to 2027
-
Table Northeast China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure Northeast China Cyber Deception Consumption Share by Types in 2016
-
Figure Northeast China Cyber Deception Consumption Share by Types in 2021
-
Figure Northeast China Cyber Deception Consumption Share by Types in 2027
-
Table Northeast China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table Northeast China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure Northeast China Cyber Deception Consumption Share by End-Users in 2016
-
Figure Northeast China Cyber Deception Consumption Share by End-Users in 2021
-
Figure Northeast China Cyber Deception Consumption Share by End-Users in 2027
-
Table Southwest China Cyber Deception Consumption by Types from 2016 to 2027
-
Table Southwest China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure Southwest China Cyber Deception Consumption Share by Types in 2016
-
Figure Southwest China Cyber Deception Consumption Share by Types in 2021
-
Figure Southwest China Cyber Deception Consumption Share by Types in 2027
-
Table Southwest China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table Southwest China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure Southwest China Cyber Deception Consumption Share by End-Users in 2016
-
Figure Southwest China Cyber Deception Consumption Share by End-Users in 2021
-
Figure Southwest China Cyber Deception Consumption Share by End-Users in 2027
-
Table Northwest China Cyber Deception Consumption by Types from 2016 to 2027
-
Table Northwest China Cyber Deception Consumption Share by Types from 2016 to 2027
-
Figure Northwest China Cyber Deception Consumption Share by Types in 2016
-
Figure Northwest China Cyber Deception Consumption Share by Types in 2021
-
Figure Northwest China Cyber Deception Consumption Share by Types in 2027
-
Table Northwest China Cyber Deception Consumption by End-Users from 2016 to 2027
-
Table Northwest China Cyber Deception Consumption Share by End-Users from 2016 to 2027
-
Figure Northwest China Cyber Deception Consumption Share by End-Users in 2016
-
Figure Northwest China Cyber Deception Consumption Share by End-Users in 2021
-
Figure Northwest China Cyber Deception Consumption Share by End-Users in 2027
-
Table Company Profile and Development Status of Illusive Networks
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Illusive Networks
-
Figure Sales and Growth Rate Analysis of Illusive Networks
-
Figure Revenue and Market Share Analysis of Illusive Networks
-
Table Product and Service Introduction of Illusive Networks
-
Table Company Profile and Development Status of Rapid7
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Rapid7
-
Figure Sales and Growth Rate Analysis of Rapid7
-
Figure Revenue and Market Share Analysis of Rapid7
-
Table Product and Service Introduction of Rapid7
-
Table Company Profile and Development Status of ForeScout
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of ForeScout
-
Figure Sales and Growth Rate Analysis of ForeScout
-
Figure Revenue and Market Share Analysis of ForeScout
-
Table Product and Service Introduction of ForeScout
-
Table Company Profile and Development Status of GuardiCore
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of GuardiCore
-
Figure Sales and Growth Rate Analysis of GuardiCore
-
Figure Revenue and Market Share Analysis of GuardiCore
-
Table Product and Service Introduction of GuardiCore
-
Table Company Profile and Development Status of Fidelis Cybersecurity
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Fidelis Cybersecurity
-
Figure Sales and Growth Rate Analysis of Fidelis Cybersecurity
-
Figure Revenue and Market Share Analysis of Fidelis Cybersecurity
-
Table Product and Service Introduction of Fidelis Cybersecurity
-
Table Company Profile and Development Status of Cymmetria
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Cymmetria
-
Figure Sales and Growth Rate Analysis of Cymmetria
-
Figure Revenue and Market Share Analysis of Cymmetria
-
Table Product and Service Introduction of Cymmetria
-
Table Company Profile and Development Status of LogRythm
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of LogRythm
-
Figure Sales and Growth Rate Analysis of LogRythm
-
Figure Revenue and Market Share Analysis of LogRythm
-
Table Product and Service Introduction of LogRythm
-
Table Company Profile and Development Status of Attivo Networks
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Attivo Networks
-
Figure Sales and Growth Rate Analysis of Attivo Networks
-
Figure Revenue and Market Share Analysis of Attivo Networks
-
Table Product and Service Introduction of Attivo Networks
-
Table Company Profile and Development Status of Acalvio
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Acalvio
-
Figure Sales and Growth Rate Analysis of Acalvio
-
Figure Revenue and Market Share Analysis of Acalvio
-
Table Product and Service Introduction of Acalvio
-
Table Company Profile and Development Status of SEC Technologies
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of SEC Technologies
-
Figure Sales and Growth Rate Analysis of SEC Technologies
-
Figure Revenue and Market Share Analysis of SEC Technologies
-
Table Product and Service Introduction of SEC Technologies
-
Table Company Profile and Development Status of Allure Security
-
Table Sales, Revenue, Sales Price and Gross Margin Analysis of Allure Security
-
Figure Sales and Growth Rate Analysis of Allure Security
-
Figure Revenue and Market Share Analysis of Allure Security
-
Table Product and Service Introduction of Allure Security
-

Chinese