Delivering in a Dynamic World

Citrix Virtualization Journal

Subscribe to Citrix Virtualization Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Citrix Virtualization Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Citrix Virtualization Authors: Liz McMillan, Yeshim Deniz, Pat Romanski, Elizabeth White, Chris Fleck

Related Topics: Citrix Virtualization Journal

News Feed Item

Research and Markets: Analysis of the Global Endpoint Security Market 2014

Research and Markets ( has announced the addition of the " Analysis of the Endpoint Security Market" report to their offering.

The efficacy of traditional antivirus-based endpoint protection is beginning to be challenged. While it is true that the role of traditional protection has changed with today's cyber reality offering effective and efficient protection, following the creation of a signature remains essential. Also, endpoint security is not limited to antivirus. Endpoint security includes host-based software products that protect computing devices from many forms of malware, cyber-attacks, and unwanted applications.

This report provides an analysis of the market for endpoint security including market sizing, market forecasts, market shares, market description and market trends, drivers and restraints, and a "SWOT" analysis of individual market participants.

Market Overview

  • Endpoint security includes host-based software products that secure computing devices such as laptops, desktops, netbooks, tablets, servers, and smartphones from malware, cyber-attacks, unwanted applications, and physical loss or theft.
  • Malware refers to a malicious program used to create havoc and gain personal information from computer systems. Malware software includes malicious programs such as Trojan horses, viruses, worms, and spyware.

Endpoint protection products provide a multitude of security functions including:

  • Antimalware
  • Web and Email Content Filtering
  • Firewall
  • Host IDS/IPS
  • Central Management
  • Call/Message Filtering
  • Remote Wipe/Lock

For the purpose of this study, the endpoint protection market does not include:

  • Mobile Device Management (MDM): The ability to define device use policies and controls for IT management capabilities.
  • A small subset of traditional MDM functions is included in endpoint protection solutions, such as remote wipe and lock.
  • Network-based Protection: This includes Network Access Control (NAC), Next Generation Firewall (NGFW), Intrusion Prevention Systems (IPS), and secure Web gateways.

For more information visit

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.