株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

産業向けサイバーセキュリティサービスの世界市場:2022年までの予測

Global Industrial Cybersecurity Services Market, Forecast to 2022

発行 Frost & Sullivan 商品コード 739350
出版日 ページ情報 英文 106 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=107.66円で換算しております。
Back to Top
産業向けサイバーセキュリティサービスの世界市場:2022年までの予測 Global Industrial Cybersecurity Services Market, Forecast to 2022
出版日: 2018年10月22日 ページ情報: 英文 106 Pages
概要

重要インフラ産業 (電力ユーティリティ、石油 & ガスなど) および製造業における産業向けIoT (IIoT) 技術の高い浸透によって、脅威の攻撃にさらされる面が拡大しています。エネルギー・ユーティリティ産業におけるサイバー攻撃は、平均で年間1,320万米ドルの負担となっています。産業向けサイバーセキュリティ市場は、近年、急成長しており、重要性を増しています。

当レポートでは、世界の産業向けサイバーセキュリティサービス市場について調査し、市場の概要、市場影響要因の分析、垂直市場・地域別の収益予測、競合状況、および成長機会などについて考察しています。

第1章 エグゼクティブサマリー

第2章 市場概要

第3章 市場区分

第4章 促進要因・抑制要因

  • 促進要因
  • 促進要因の説明
  • 抑制要因
  • 抑制要因の説明

第5章 市場予測

  • 市場エンジニアリング測定
  • 予測の前提条件
  • 収益予測
  • 収益予測の議論
  • 収益比予測:地域別
  • 収益予測:地域別
  • 収益予測の議論:地域別
  • 収益予測:垂直市場別
  • 収益予測の議論:垂直市場別

第6章 市場シェア・競合分析

  • 市場シェア分析
  • 競合環境
  • 競合分析
  • 主な競合企業
  • CTA (行動喚起)

第7章 成長機会・CTA (行動喚起)

  • 成長機会1:買収統合モデル
  • 成長機会2:コーペティション - 競合企業との提携が出現
  • 成長機会3:定額制サービス
  • サービスプロバイダーにとっての戦略インペラティブ

第8章 ビジョニングシナリオ

  • セキュリティ・アズ・ア・サービスへの移行
  • サービス展開のためのセキュリティプラットフォーム
  • サイバーセキュリティ・アズ・ア・サービスの収益化
  • 新たな提携

第9章 マネージドセキュリティサービスセグメントの分析

  • マネージドセキュリティサービスの見通し
  • 現在のマネージドセキュリティサービスの概要
  • マネージドセキュリティサービス:統合型モデルのサービスデリバリー
  • マネージドセキュリティサービス:サービスパッケージ向けプライシングモデルアプローチ
  • マネージドセキュリティサービス:プライシングモデルの開発
  • 市場エンジニアリング測定
  • 収益予測
  • 収益予測の議論
  • 市場シェア分析

第10章 専門サービスセグメントの分析

  • 専門サービスの見通し
  • 市場エンジニアリング測定
  • 収益予測
  • 収益予測の議論
  • 市場シェア分析
  • CTA (行動喚起)

第11章 結論

第12章 付録

目次
Product Code: K2C6-10

Opportunities Come from Market Partnerships for Integrated IT/OT Solutions

Industrial cybersecurity market has been experiencing rapid growth and gaining widespread significance in recent years. High penetration of Industrial Internet of Things (IIoT) technology in critical infrastructure industries (power utilities, oil & gas etc.) and the manufacturing sector has resulted in increased threat attack surfaces. Cyber attacks in the energy and utilities industries alone cost an average of $13.2million/year. These cyber physical attacks have gained government and end-user scrutiny, resulting in a number of cybersecurity regulations being enforced globally. Rising incidences of cyber attacks, evolving compliance regulations by governments, and increased awareness among mature and less mature market have accelerated the adoption of cybersecurity approaches. However, the high complexity of cybersecurity and unclear return on investment (ROI) benefits are creating ambiguity among end users. Market participants are addressing current industry needs by introducing a number of service packages consisting of an assortment of managed and professional cybersecurity services. With the attacks increasing in target and sophistication, cybersecurity approaches need to evolve over time. End users want scalability and flexibility in cybersecurity amid an ever-changing threat landscape. Service providers have hence started to transition to cybersecurity-as-a-service (CSaaS) models. A service-based approach to cybersecurity has given rise to service models such as software-as-a-service (SaaS) and platform-as-a-service (PaaS). Service providers are also focusing on pay-as-you-go expertise by providing SaaS models on a subscription basis that enables continuous monitoring and assessment of the industrial environment.

The industrial cybersecurity services market is largely fragmented with vendors from both the information technology (IT) and operational technology (OT) sides leveraging their domain expertise to provide lifecycle services for cybersecurity with innovative service platforms and management consoles. North America, Europe and Middle East are mature markets in terms of cybersecurity with a high degree of adoption of Internet of Things (IoT) and increased scrutiny on critical infrastructure protection. Outsourcing of managed security services is a growing trend with service providers presenting subscription-based models to implement scalability and flexibility in cybersecurity and enable alignment of their services as per end-user requirements. Professional services are also seeing high market acceptance with the increasing need of expertise as a service in the cybersecurity field owing to the crippling shortage of in-house talent. Market participants are focusing on offering a comprehensive portfolio, providing end users the ability to select services best suited to their cybersecurity goals. With security gaps existing in the IT and OT divergent scenarios of the industrial control systems (ICS) space, market participants are establishing partnerships with vendors from different backgrounds to provide joint solutions for IT/OT security in the industrial environment.

Table of Contents

1. EXECUTIVE SUMMARY

  • Key Findings
  • Key Findings (continued)
  • Current and Future Areas of Differentiation
  • Current and Future Areas of Differentiation (continued)
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • CEO's Perspective
  • Talk to Experts
  • Services 2.0 Framework

2. MARKET OVERVIEW

  • Market Definitions
  • Key Questions This Study Will Answer
  • Market Segmentation Services Type
  • Market Segmentation Services Type (continued)
  • Market Distribution Channel
  • Market Distribution Channel (continued)

3. MARKET SEGMENTATION

  • Market Segmentation
  • Industrial Cybersecurity Service Providers Market Landscape
  • Major Industrial Cybersecurity Service Providers
  • Market Opportunity Matrix for Industrial Cybersecurity Services

4. DRIVERS AND RESTRAINTS-TOTAL INDUSTRIAL CYBERSECURITY SERVICES MARKET

  • Market Drivers
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Market Restraints
  • Restraints Explained
  • Restraints Explained (continued)

5. MARKET FORECASTS

  • Market Engineering Measurements
  • Forecast Assumptions
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Percent Revenue Forecast by Region
  • Revenue Forecast by Region
  • Revenue Forecast Discussion by Region
  • Revenue Forecast by Vertical Market
  • Revenue Forecast Discussion by Vertical Market

6. MARKET SHARE AND COMPETITIVE ANALYSIS

  • Market Share Analysis
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Market Share Analysis (continued)
  • Competitive Environment
  • Competitive Analysis
  • Top Competitors
  • Top Competitors (continued)
  • Top Competitors (continued)
  • Companies to Action
  • Companies to Action (continued)

7. GROWTH OPPORTUNITIES AND COMPANIES TO ACTION

  • Growth Opportunity 1-Acquisition Integration Model
  • Growth Opportunity 2-Coopetition: Emerging Partnership With Competitors
  • Growth Opportunity 3-Subscription-based Services
  • Strategic Imperatives for Service Providers

8. VISIONING SCENARIOS

  • Transition to Security as a Service
  • Transition to Security as a Service (continued)
  • Cybersecurity Platforms for Service Deployments
  • Monetization of Cybersecurity as a Service
  • Monetization of Cybersecurity as a Service (continued)
  • Monetization of Cybersecurity as a Service (continued)
  • Emerging Partnerships
  • Emerging Partnerships (continued)

9. MANAGED SECURITY SERVICES SEGMENT ANALYSIS

  • Implications of Managed Security Services
  • Overview of Current Managed Security Services
  • Managed Security Services-Integrated Model ServiceDelivery
  • Managed Security Services-Pricing Model Approach for Service Packages
  • Managed Security Services-Pricing Model Development
  • Market Engineering Measurements
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Market Share Analysis
  • Market Share Analysis (continued)

10. PROFESSIONAL SERVICES SEGMENT ANALYSIS

  • Implications of Professional Services
  • Market Engineering Measurements
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Market Share Analysis
  • Market Share Analysis (continued)
  • Companies to Action

11. THE LAST WORD

  • The Last Word-3 Big Predictions
  • Legal Disclaimer

12. APPENDIX

  • Market Engineering Methodology
  • Abbreviations
  • Companies Interviewed
  • List of Exhibits
  • List of Exhibits (continued)
  • List of Exhibits (continued)
Back to Top