株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

軍用サイバーセキュリティの世界市場:~2023年

Global Military Cybersecurity Market, Forecast to 2023

発行 Frost & Sullivan 商品コード 914921
出版日 ページ情報 英文 103 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=110.06円で換算しております。
Back to Top
軍用サイバーセキュリティの世界市場:~2023年 Global Military Cybersecurity Market, Forecast to 2023
出版日: 2019年10月08日 ページ情報: 英文 103 Pages
概要

新たなサイバー攻撃の脅威や技術の発展が世界の軍用サイバーセキュリティ市場の成長を推進しており、また競合環境にも変化をもたらしています。

当レポートでは、世界の軍用サイバーセキュリティの市場を調査し、市場の定義と概要、世界のサイバー攻撃・インシデントの動向、市場成長への各種影響因子の分析、関連事業者によるM&Aの動向、主要企業のプロファイル、主要国別の動向・需要分析、市場成長シナリオ、成長機会・成功戦略の分析、将来の展望などをまとめています。

エグゼクティブサマリー

  • 主要調査結果
  • マーケットエンジニアリング測定
  • CEOによる展望

市場概要

世界のサイバー攻撃・インシデント

推進因子と障壁

市場動向

軍用サイバーセキュリティ関連M&A

  • M&A動向:概要
  • 防衛サイバーセキュリティの統合
  • 小規模事業者の買収
  • ポートフォリオ拡張のための提携
  • 商用サイバーセキュリティ技術の活用

市場予測

  • マーケットエンジニアリング測定
  • 予測前提因子
  • 市場・成長シナリオ

競合環境

  • 米国のトップ10契約事業者
  • General Dynamics-CSRA
  • Raytheon
  • SAIC-Engility
  • Lockheed Martin
  • CACI International
  • L3 Harris Technologies
  • Northrop Grumman
  • Booz Allen Hamilton
  • ViaSat
  • Leidos
  • 米国の主なプログラム
  • 軍用サイバーセキュリティ製品・サービス区分

世界の製品&サービス需要・主要国の重要側面

  • 市場推計:主要国別
  • 米国
  • カナダ
  • ロシア
  • 英国
  • フランス
  • ドイツ
  • イタリア
  • トルコ
  • 中国
  • インド
  • オーストラリア
  • 韓国
  • 日本
  • シンガポール
  • サウジアラビア
  • ブラジル
  • イスラエル

ディスラプティブ技術・成熟タイムライン・R&D投資

成長機会

  • 成長機会:R&D投資の拡大
  • 成長機会:レガシーコンポーネント向けソリューション
  • 成長機会:人材育成トレーニング
  • 成長機会:官民提携
  • 成長機会:サイバー電子戦
  • 成功・成長の戦略的必須要件

総論

  • 総論
  • 免責事項

付録

目次
Product Code: ME6E-16

New Cyber Threats and Technologies Drive Growth and Change the Competitive Landscape

Cyber threats continue to evolve, changing their attack patterns and development structures, making it harder to detect and enact proper mitigation procedures in time. Today, weapon systems are more software dependent and networked. Embedded software and IT systems enable operational success; however, they create new and extensive vulnerabilities that must be addressed properly. With the emergence of the Internet of Things (IoT), cloud computing, and higher connectivity, the avenues of attack and the likelihood of a breach are increasing. As a result, cybersecurity is more critical than ever because of the potential consequences of breaches in a distributed environment, and military-dedicated networks require better protection, especially for legacy components.

This study will benefit those who are interested in learning about the global military cyber security market and the potential opportunities in this segment. This study discusses the aspects of new enabling technologies which are being budgeted for and pursued by militaries across the globe. All security industry participants and the rest of the industry verticals will benefit from this study, as this is a visionary study investigating the big picture perspectives of the military cyber security market and how it is looking to evolve and grow during the forecast period. Technology companies who are looking to address potential requirements of the military cyber security market will benefit from this study.

What makes our reports unique?

We provide diverse research services focused on existing and evolving markets across the aerospace, defense, and security markets, covering them at global and regional levels. We provide specialist studies focused on specific products or market segments which provide deep-dive opportunities for strategists and investors who wish to learn about the future state of any ADS market or product in terms of addressable markets, opportunities, and future disruptions.

  • Product scope: cybersecurity trends, scenarios driving growth, key R&D investment into disruptive technologies
  • Geographic scope: global
  • End-user scope: all industries related to military cybersecurity

Digitization is transforming every aspect of the defense industry, from back-end office operations to the training of military personnel. Accordingly, cyber warfare has become the latest weapon of choice, turning cyberspace into the next battlefield for major geopolitical and social issues, and used by nations as a means of covert intelligence gathering and shadow diplomacy. Ongoing geopolitical tensions between the United States, Europe, China, and Russia have moved beyond rhetoric and stymied international relationships through covert cyber offenses that wage an ongoing intelligence war in cyberspace. As an integral part of the process, global defence industries are transforming their operations and capabilities, investing in disruptive new and existing technologies, such as artificial intelligence (AI), cloud computing, blockchain, and quantum computing, which will drive further changes in cybersecurity in the upcoming years.

This research highlights the most important military cybersecurity market trends, evaluates the market and the competition, sums up existing and evolving global threats, covers the main mergers and acquisitions, and explores upcoming disruptive technologies.

Key Issues Addressed:

  • Which disruptive technologies will have an impact on the military cyber security market over the next 10 years and what are their timelines?
  • For each technology what is the time frame for impact in the market?
  • What is the R&D investment into disruptive technologies?
  • What are the military cybersecurity trends that can be observed?
  • What are the key military cybersecurity mergers and acquisitions and the trends driving them?
  • What are the military cybersecurity scenarios driving growth?
  • Which countries are researching and developing these technologies?
  • Which are the top military cybersecurity contractors?

Table of Contents

Executive Summary

  • Key Findings
  • Key Findings (continued)
  • Market Engineering Measurements
  • Market Engineering Measurements (continued)
  • CEO's Perspective

Market Overview

  • Introduction
  • Market Scope
  • Military Cybersecurity Market Segmentation
  • Segmentation Discussion and Definition
  • Segmentation of Military Cybersecurity Products and Services
  • Key Questions this Study will Answer

Global Cyberattacks and Incidents

  • Global Cyber Warfare
  • Major Cyberattack Threats and Incidents

Drivers and Restraints

  • Market Drivers
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Market Restraints
  • Restraints Explained
  • Restraints Explained (continued)

Military Cybersecurity Market Trends

  • Military Cybersecurity Market Trends
  • Military Cybersecurity Market Trends (continued)

Military Cybersecurity Mergers & Acquisitions

  • Overview M&A Trends
  • Consolidation in Defence Cybersecurity
  • Acquisition of Smaller Participants
  • Partnerships to Widen Portfolio
  • Selling of Commercial Cybersecurity Capabilities

Military Cybersecurity Forecasts

  • Military Cybersecurity Market-Market Engineering Measurements
  • Forecast Assumptions
  • The Military Cybersecurity Market and Growth Scenarios 2018-2023
  • Growth Scenarios Explained
  • Growth Scenarios Explained (continued)
  • Growth Scenarios Explained (continued)

The Global Competitive Landscape

  • Top 10 Contractors in the US, 2017
  • General Dynamics-CSRA
  • Raytheon
  • SAIC-Engility
  • Lockheed Martin
  • CACI International
  • L3 Harris Technologies
  • Northrop Grumman
  • Booz Allen Hamilton
  • ViaSat
  • Leidos
  • Notable Cybersecurity Contract Vehicles & Procurement Programs in the US
  • Segmentation of Military Cybersecurity Products and Services

Global Demand for Military Cybersecurity Products and Services and Important Aspects by Main Countries

  • Estimated Military Cybersecurity Market by Major Countries, 2017
  • Main Countries Inspected
  • The United States
  • The United States (continued)
  • Canada
  • Russia
  • United Kingdom
  • France
  • Germany
  • Italy
  • Turkey
  • China
  • India
  • Australia
  • Republic of Korea
  • Japan
  • Singapore
  • Saudi Arabia
  • Brazil
  • Israel

Disruptive Technologies, Maturity Timelines, and R&D Investments

  • Military Cybersecurity Disruptive Technologies and Investments in R&D
  • Military Cybersecurity Disruptive Technologies and Investments in R&D (continued)
  • Disruptive Technologies Maturity Timelines

Growth Opportunities

  • Growth Opportunity 1-Increasing R&D Investments
  • Growth Opportunity 2-Solutions for Legacy Components
  • Growth Opportunity 3-Training of Skilled Personnel
  • Growth Opportunity 4-Public-Private Partnerships
  • Growth Opportunity 5-Cyber Electronic Warfare
  • Strategic Imperatives for Success and Growth

The Last Word

  • The Last Word
  • Legal Disclaimer

Appendix

  • Market Engineering Methodology
  • List of Acronyms
  • List of Acronyms (continued)
  • List of Acronyms (continued)
  • List of Exhibits
  • List of Exhibits (continued)
Back to Top