無料レポート プレゼントキャンペーン 実施中 : メールサービスに新規登録いただいた方にご用意した無料レポートをご提供

株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

世界の自動車向けサイバーセキュリティ市場の予測

Global Automotive Cybersecurity Market, Forecast to 2025

発行 Frost & Sullivan 商品コード 702317
出版日 ページ情報 英文 91 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=114.42円で換算しております。
Back to Top
世界の自動車向けサイバーセキュリティ市場の予測 Global Automotive Cybersecurity Market, Forecast to 2025
出版日: 2018年09月12日 ページ情報: 英文 91 Pages
概要

当レポートでは、自動車向けサイバーセキュリティ市場について調査分析し、OEM・ティア1サプライヤー・セキュリティ新興企業における戦略、競合情勢、ビジネスモデル、将来の重点分野について、体系的な情報を提供しています。

第1章 エグゼクティブサマリー

第2章 調査範囲・目的・手法・背景

第3章 自動車向けサイバーセキュリティ:概要と市場分析

  • 自動車向けサイバーセキュリティにおける現在の市場見通し
  • 「CES 2018」からのサイバーセキュリティ
  • 主なサイバーセキュリティの特徴:概要
  • 自動車向けサイバーセキュリティエコシステム
  • OEM戦略と主な重点分野
  • 自動車向けエコシステムパートナーシップ:戦略分析
  • 自動車向けエコシステムパートナーシップ:戦略と分析
  • 自動車向けサイバーセキュリティにおける新興企業
  • OEMのIVN向けEthernet導入

第4章 乗用車とコネクテッドトラックのサイバーセキュリティ:市場分析、ビジネスモデル、収益機会

  • コネクテッドカー:市場需要分析
  • コネクテッドカー:サイバーセキュリティ分析
  • 買収分析:投資と将来の機会
  • 自動車向けサイバーセキュリティ市場の機会
  • 世界のコネクテッドトラック:市場需要分析
  • コネクテッドトラック:サイバーセキュリティ分析
  • 自動車向けサイバーセキュリティ:ビジネスモデル分析

第5章 自動車向けサイバーセキュリティ市場:主要課題と地域の規制

  • 自動車向けサイバーセキュリティ:主要課題
  • 自動車向けサイバーセキュリティ規制:ロードマップ
  • 地域の規制と影響:米国
  • 地域の規制と影響:欧州

第6章 自動車向けハッキング事件:概要、事件の影響、OEMセキュリティのイニシアティブ

  • 自動車向けサイバーハッキング事件:ハイライト
  • 倫理的ハッキング:BMWとKeen Labとのパートナーシップ
  • RNA不正侵入事件とデータセキュリティの概要
  • VWグループ車両の不正侵入事件とセキュリティのイニシアチブ
  • BMW ConnectedDriveハッキング事件
  • BMWデータセキュリティの概要
  • GMセキュリティ機能
  • Mercedes-Benzコネクティビティサービス:データ保護とITセキュリティ
  • トヨタのデータセキュリティの概要

第7章 ソリューションプロバイダーのプロファイル:セキュリティ新興企業、ティア1サプライヤー、テクノロジー企業

  • Arilou
  • NNG
  • Argus
  • Continental AG
  • Harman
  • Trillium Incorporated
  • Karamba
  • GuardKnox
  • SafeRide Technologies Ltd.
  • CYMOTIVE
  • Upstream
  • Bosch
  • ルネサス エレクトロニクス
  • Irdeto
  • パナソニック

第8章 成長機会分析

  • 自動車向けサイバーセキュリティ企業
  • 成長機会:パートナーシップとビジネスモデル
  • 成功・成長の戦略的必須事項:自動車向けサイバーセキュリティ

第9章 主な結論と将来の見通し

第10章 付録

目次
Product Code: MD4B-18

By 2025, 68.0% of Market Investments Will be Raised from Technology Providers, Semiconductor Companies and Tier-I Suppliers

This study analyses the strategies, competitive landscape, business models, and future focus areas of OEMs, tier-I suppliers, and security start-up companies in the automotive cybersecurity market.

Increasing vehicle connectivity has given rise to the risks of potential cyber-attacks in the industry. This has drastically increased customer awareness and need for robust cybersecurity solutions in connected vehicles. OEMs have started taking the cybersecurity issue seriously and are evaluating ways to ensure the deployment of strategic security measures across the automotive value chain. Partnerships and collaborations are playing a vital role for OEMs, as they lack the necessary capabilities within the organisation. Companies such as Groupe PSA, Jaguar, and BMW are proactively identifying ways to ensure strong security mechanisms in their next-generation connected vehicles through partnerships and ethical hacking programs.

The automotive cybersecurity market is nascent and is currently in its experimental phase. Connected cars are the primary use cases of automotive cybersecurity. Cybersecurity-embedded cars are already in production and about 60% of connected cars are expected to have built-in security solutions by 2025. Though connected cars will be early adopters, Frost & Sullivan expects autonomous vehicles and connected trucks to become critical use cases for automotive cybersecurity in the future. Hence, it is necessary for OEMs to gear up security adoption in connected trucks, as cyber attacks in this segment tend to be massive and extremely harmful for organisations.

With the growing need for security in connected vehicles, industry participants (tier-I suppliers, technology providers, semiconductor companies, and security start-up companies) are expected to increase market investments to $2.7 billion till 2025. Automotive cybersecurity will remain a key concern in the coming years and OEMs have to aggressively engage and partner with ecosystem participants to ensure a holistic cybersecurity approach across the automotive value chain. Tier-I suppliers will continue with the trend of start-up acquisition strategy in order to maintain a competitive advantage in the market. Pure-play security start-up companies will intensify market competition through OEM partnerships and continuous product innovations.

Key Issues Addressed:

  • What are the different business models adopted for vehicle cybersecurity and which one will garner value in the current and future ecosystem?
  • How does the competitive landscape look like? What are the different strategies adopted by OEMs, tier-I suppliers, and security startups?
  • What is the addressable opportunity for automotive cybersecurity from 2017 to 2025?
  • How is the cybersecurity demand in passenger and commercial vehicles?
  • What is the impsact of regional regulations on the market?

Table of Contents

1. EXECUTIVE SUMMARY

  • 2017 Highlights-Predictions Versus Actuals
  • Executive Summary-Key Findings
  • Trend 1-Threat Vectors in Connected Cars Analysis
  • Trend 1-Threat Vectors in Connected Cars Analysis (continued)
  • Trend 2-Automotive Cybersecurity Features Analysis
  • Trend 3-Connected Cars Vs. Connected Trucks Cybersecurity Analysis
  • Trend 4-Mergers and Acquisitions of Key Market Participants
  • Trend 5-Innovation Will be Key for Cybersecurity Start-ups
  • Trend 6-OEMs are Transitioning to Ethernet Networks
  • Executive Summary-Comparison of 2017 and 2025
  • Executive Summary-Comparison of 2017 and 2025 (continued)

2. RESEARCH SCOPE, OBJECTIVES, METHODOLOGY, AND BACKGROUND

  • Research Scope
  • Research Aims and Objectives
  • Key Questions This Study Will Answer
  • Research Background
  • Research Methodology

3. AUTOMOTIVE CYBERSECURITY-OVERVIEW AND MARKET ANALYSIS

  • Automotive Cybersecurity Current Market Outlook
  • Cybersecurity Emerging From the Shadows at CES 2018
  • Key Cybersecurity Features-2017 Overview
  • Automotive Cybersecurity Ecosystem
  • OEM Strategies and Key Focus Areas
  • Automotive Ecosystem Participants-Strategy Analysis
  • Automotive Ecosystem Participants-Strategies and Analysis
  • Automotive Cybersecurity Start-up Companies
  • OEM Ethernet Adoption for IVN

4. PASSENGER CARS AND CONNECTED TRUCKS CYBERSECURITY-MARKET ANALYSIS, BUSINESS MODELS AND REVENUE OPPORTUNITIES

  • Connected Cars-Market Demand Analysis
  • Connected Cars (CC)-Cybersecurity Analysis
  • Acquisition Analysis-Investments and Future Opportunities
  • Automotive Cybersecurity Market Opportunity
  • Global Connected Trucks-Market Demand Analysis
  • Connected Trucks-Cybersecurity Analysis
  • Automotive Cybersecurity-Business Model Analysis

5. AUTOMOTIVE CYBERSECURITY MARKET-KEY CHALLENGES AND REGIONAL REGULATIONS

  • Automotive Cybersecurity-Key Challenges
  • Automotive Cybersecurity Regulations-Roadmap
  • Regional Regulations and Impact-US
  • Regional Regulations and Impact-Europe

6. AUTOMOTIVE HACKING INCIDENTS-OVERVIEW, INCIDENT IMPACT, AND OEM SECURITY INITIATIVES

  • Automotive Cyber Hacking Incidents-Highlights
  • Ethical Hacking-BMW's Partnership With Keen Lab
  • Overview of RNA Hack Incidents and Data Security
  • VW Group Vehicle Hack Incident and Security Initiatives
  • BMW ConnectedDrive Hacking Incident
  • Overview of BMW Data Security
  • GM Security Capability
  • Mercedes-Benz Connectivity Services-Data Protection and IT Security
  • Overview of Toyota Data Security

7. SOLUTION PROVIDER PROFILES-SECURITY START-UPS, TIER-I SUPPLIERS AND TECHNOLOGY COMPANIES

  • Arilou Cyber Security (Part of NNG Group) Solutions
  • NNG's Navigation and Infotainment Solutions with Enhanced Security
  • Arilou Software IDPS Line Fit Solution
  • Argus Cyber Security
  • Continental AG's End-to-End Solution
  • Harman Cybersecurity (TowerSec)
  • Harman Cybersecurity (TowerSec) (continued)
  • Trillium Incorporated
  • Karamba Security
  • GuardKnox
  • SafeRide Technologies Ltd.
  • CYMOTIVE
  • Upstream Security
  • Bosch Cybersecurity
  • Renesas Security Solutions
  • Irdeto (Part of Naspers)
  • Irdeto's Cybersecurity Roadmap
  • Panasonic Cybersecurity

8. GROWTH OPPORTUNITY ANALYSIS

  • Automotive Cybersecurity Companies
  • Growth Opportunity-Partnerships and Business Models
  • Strategic Imperatives for Success and Growth-Automotive Cybersecurity

9. KEY CONCLUSIONS AND FUTURE OUTLOOK

  • Key Conclusions and Future Outlook
  • The Last Word-3 Big Predictions
  • Legal Disclaimer

10. APPENDIX

  • Market Engineering Methodology
  • Table of Acronyms Used
  • List of Exhibits
  • List of Exhibits (continued)
  • List of Exhibits (continued)
Back to Top