表纸
市场调查报告书

产业的网路安全服务的全球市场:至2022年的预测

Global Industrial Cybersecurity Services Market, Forecast to 2022

出版商 Frost & Sullivan 商品编码 739350
出版日期 内容资讯 英文 106 Pages
商品交期: 最快1-2个工作天内
价格
Back to Top
产业的网路安全服务的全球市场:至2022年的预测 Global Industrial Cybersecurity Services Market, Forecast to 2022
出版日期: 2018年10月22日内容资讯: 英文 106 Pages
简介

由于重要基础设施产业 (电力公司,石油与天然气等) 及制造业中产业的IoT (IIoT) 技术的高渗透,面临威胁攻击扩大。能源、公共事业产业上的电脑网路攻击,平均年度为1,320万美元的负担。产业的网路安全市场,近几年急速成长,增加重要性。

本报告提供全球产业的网路安全服务市场相关调查,市场概要,市场影响要素分析,各垂直市场、地区的收益预测,关于竞争情形,及成长机会等考察。

第1章 摘要整理

第2章 市场概要

第3章 市场区隔

第4章 促进因素、阻碍因素

  • 促进因素
  • 促进因素的说明
  • 阻碍因素
  • 阻碍因素的说明

第5章 市场预测

  • 市场工程检测
  • 预测的前提条件
  • 收益预测
  • 收益预测的讨论
  • 收益比预测:各地区
  • 收益预测:各地区
  • 收益预测的讨论:各地区
  • 收益预测:各垂直市场
  • 收益预测的讨论:各垂直市场

第6章 市场占有率、竞争分析

  • 市场占有率分析
  • 竞争环境
  • 竞争分析
  • 主要的竞争企业
  • CTA (行动提醒)

第7章 成长机会、CTA (行动提醒)

  • 成长机会1:收购整合模式
  • 成长机会2:协调 - 竞争企业的合作出现
  • 成长机会3:定额制服务
  • 对服务供应商来说的策略必要事项

第8章 愿景方案

  • 安全即服务的转变
  • 服务部署的安全平台
  • 电脑网路安全即服务的收益化
  • 新的联盟

第9章 资安管理服务市场区隔分析

  • 资安管理服务预测
  • 目前资安管理服务概要
  • 资安管理服务:整合型模式的服务提供
  • 资安管理服务:服务包装定价模式方法
  • 资安管理服务:定价模式的开发
  • 市场工程检测
  • 收益预测
  • 收益预测的讨论
  • 市场占有率分析

第10章 专门服务市场区隔分析

  • 专门服务预测
  • 市场工程检测
  • 收益预测
  • 收益预测的讨论
  • 市场占有率分析
  • CTA (行动提醒)

第11章 结论

第12章 附录

目录
Product Code: K2C6-10

Opportunities Come from Market Partnerships for Integrated IT/OT Solutions

Industrial cybersecurity market has been experiencing rapid growth and gaining widespread significance in recent years. High penetration of Industrial Internet of Things (IIoT) technology in critical infrastructure industries (power utilities, oil & gas etc.) and the manufacturing sector has resulted in increased threat attack surfaces. Cyber attacks in the energy and utilities industries alone cost an average of $13.2million/year. These cyber physical attacks have gained government and end-user scrutiny, resulting in a number of cybersecurity regulations being enforced globally. Rising incidences of cyber attacks, evolving compliance regulations by governments, and increased awareness among mature and less mature market have accelerated the adoption of cybersecurity approaches. However, the high complexity of cybersecurity and unclear return on investment (ROI) benefits are creating ambiguity among end users. Market participants are addressing current industry needs by introducing a number of service packages consisting of an assortment of managed and professional cybersecurity services. With the attacks increasing in target and sophistication, cybersecurity approaches need to evolve over time. End users want scalability and flexibility in cybersecurity amid an ever-changing threat landscape. Service providers have hence started to transition to cybersecurity-as-a-service (CSaaS) models. A service-based approach to cybersecurity has given rise to service models such as software-as-a-service (SaaS) and platform-as-a-service (PaaS). Service providers are also focusing on pay-as-you-go expertise by providing SaaS models on a subscription basis that enables continuous monitoring and assessment of the industrial environment.

The industrial cybersecurity services market is largely fragmented with vendors from both the information technology (IT) and operational technology (OT) sides leveraging their domain expertise to provide lifecycle services for cybersecurity with innovative service platforms and management consoles. North America, Europe and Middle East are mature markets in terms of cybersecurity with a high degree of adoption of Internet of Things (IoT) and increased scrutiny on critical infrastructure protection. Outsourcing of managed security services is a growing trend with service providers presenting subscription-based models to implement scalability and flexibility in cybersecurity and enable alignment of their services as per end-user requirements. Professional services are also seeing high market acceptance with the increasing need of expertise as a service in the cybersecurity field owing to the crippling shortage of in-house talent. Market participants are focusing on offering a comprehensive portfolio, providing end users the ability to select services best suited to their cybersecurity goals. With security gaps existing in the IT and OT divergent scenarios of the industrial control systems (ICS) space, market participants are establishing partnerships with vendors from different backgrounds to provide joint solutions for IT/OT security in the industrial environment.

Table of Contents

1. EXECUTIVE SUMMARY

  • Key Findings
  • Key Findings (continued)
  • Current and Future Areas of Differentiation
  • Current and Future Areas of Differentiation (continued)
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • CEO's Perspective
  • Talk to Experts
  • Services 2.0 Framework

2. MARKET OVERVIEW

  • Market Definitions
  • Key Questions This Study Will Answer
  • Market Segmentation Services Type
  • Market Segmentation Services Type (continued)
  • Market Distribution Channel
  • Market Distribution Channel (continued)

3. MARKET SEGMENTATION

  • Market Segmentation
  • Industrial Cybersecurity Service Providers Market Landscape
  • Major Industrial Cybersecurity Service Providers
  • Market Opportunity Matrix for Industrial Cybersecurity Services

4. DRIVERS AND RESTRAINTS-TOTAL INDUSTRIAL CYBERSECURITY SERVICES MARKET

  • Market Drivers
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Market Restraints
  • Restraints Explained
  • Restraints Explained (continued)

5. MARKET FORECASTS

  • Market Engineering Measurements
  • Forecast Assumptions
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Percent Revenue Forecast by Region
  • Revenue Forecast by Region
  • Revenue Forecast Discussion by Region
  • Revenue Forecast by Vertical Market
  • Revenue Forecast Discussion by Vertical Market

6. MARKET SHARE AND COMPETITIVE ANALYSIS

  • Market Share Analysis
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Competitive Environment
  • Competitive Analysis
  • Top Competitors
  • Top Competitors (continued)
  • Top Competitors (continued)
  • Companies to Action
  • Companies to Action (continued)

7. GROWTH OPPORTUNITIES AND COMPANIES TO ACTION

  • Growth Opportunity 1-Acquisition Integration Model
  • Growth Opportunity 2-Coopetition: Emerging Partnership With Competitors
  • Growth Opportunity 3-Subscription-based Services
  • Strategic Imperatives for Service Providers

8. VISIONING SCENARIOS

  • Transition to Security as a Service
  • Transition to Security as a Service (continued)
  • Cybersecurity Platforms for Service Deployments
  • Monetization of Cybersecurity as a Service
  • Monetization of Cybersecurity as a Service (continued)
  • Monetization of Cybersecurity as a Service (continued)
  • Emerging Partnerships
  • Emerging Partnerships (continued)

9. MANAGED SECURITY SERVICES SEGMENT ANALYSIS

  • Implications of Managed Security Services
  • Overview of Current Managed Security Services
  • Managed Security Services-Integrated Model ServiceDelivery
  • Managed Security Services-Pricing Model Approach for Service Packages
  • Managed Security Services-Pricing Model Development
  • Market Engineering Measurements
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Market Share Analysis
  • Market Share Analysis (continued)

10. PROFESSIONAL SERVICES SEGMENT ANALYSIS

  • Implications of Professional Services
  • Market Engineering Measurements
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Market Share Analysis
  • Market Share Analysis (continued)
  • Companies to Action

11. THE LAST WORD

  • The Last Word-3 Big Predictions
  • Legal Disclaimer

12. APPENDIX

  • Market Engineering Methodology
  • Abbreviations
  • Companies Interviewed
  • List of Exhibits
  • List of Exhibits (continued)
  • List of Exhibits (continued)
Back to Top