表紙
市場調査レポート

ユーティリティーインフラセキュリティー市場の予測

Utilities Infrastructure Security Market Forecast 2014-2024

発行 Visiongain Ltd 商品コード 297011
出版日 ページ情報 英文 304 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1GBP=136.81円で換算しております。

ご注意:
Single UserとDepartmentalライセンスは、DRM (デジタル著作権管理システム) 付PDFになります。
制限内容は、上記ライセンスの[?]アイコンをクリックしてご確認ください。

Back to Top
ユーティリティーインフラセキュリティー市場の予測 Utilities Infrastructure Security Market Forecast 2014-2024
出版日: 2014年03月04日 ページ情報: 英文 304 Pages
概要

ユーティリティーインフラのセキュリティーは、特に21世紀に入ってからの事件以来、政府および運用当局にとっては常に重要視されてきました。しかし、サイバーセキュリティーという問題の出現に伴い、この分野における構想および計画にはその対策が組み込まれるようになり、今やかつてないほどインフラの保護が強調されるようになってきています。これまでは自然災害以外には大きな損害はないものと考えられてきたものが、現在の脅威の環境においては、最も物理的に強固であるはずの原子力施設から、地域の排水施設に至るまで、すべての基本的なコンポーネントが、コンピューターネットワーク経由の匿名の攻撃の危険に晒されています。

当レポートでは、ユーティリティーインフラセキュリティー市場を取り上げ、市場動向、市場発展促進・阻害要因を調査分析し、全市場、物理セキュリティー下位市場、サイバーセキュリティー下位市場、ならびに主要15カ国における2014年から2024年までの市場予測を提示するとともに、主要企業のプロファイルをまとめるなど、概略下記の構成でお届けいたします。

第1章 エグゼクティブサマリー

  • 世界市場の概要
  • 当レポートの利点
  • 当レポートの対象読者
  • 調査手法
  • 1次調査
  • 2次調査
  • 市場規模測定
  • 予測
  • Visiongainの付加価値
  • Visiongainの市場予測手法に使われた要素

第2章 ユーティリティーインフラセキュリティー市場のイントロダクション

  • 市場構造の概要
  • 物理的セキュリティー下位市場の定義・分析
  • サイバーセキュリティー下位市場の定義・分析

第3章 世界のユーティリティーインフラセキュリティー市場

  • 市場予測
  • 地域別予測
  • 急成長諸国のユーティリティーインフラセキュリティー市場
  • 世界市場の発展促進・阻害要因
  • 世界市場の発展促進要因
  • 世界市場の発展阻害要因
  • 注目される主要なユーティリティーインフラ分野
    • 電気インフラ
    • 石油・ガスインフラ
    • 水・衛生インフラ
  • 世界のユーティリティーインフラセキュリティー脅威
  • ユーティリティーインフラに対するサイバー攻撃のメカニズム
  • ユーティリティーインフラに対して使われるサイバー武器
  • ユーティリティーインフラのサイバー防衛手法
  • 最近の主要な世界的サイバー攻撃のリスト
  • 特筆すべきユーティリティーインフラのセキュリティーイベント

第4章 ユーティリティー物理セキュリティー下位市場の予測

  • ユーティリティー物理セキュリティー下位市場
  • 地域別物理セキュリティー下位市場の予測
  • 各国物理セキュリティー下位市場の予測
  • 物理セキュリティー下位市場の分析
  • 地域別サイバーセキュリティー下位市場の予測
  • 各国サイバーセキュリティー下位市場の予測
  • サイバーセキュリティー下位市場の分析

第5章 主要15カ国ユーティリティーインフラセキュリティー市場の予測

  • 主要15カ国ユーティリティーインフラセキュリティー市場シェア予測
  • 参入障壁分析、2014年
  • 米国のユーティリティーインフラセキュリティー市場・下位市場の予測
  • 中国のユーティリティーインフラセキュリティー市場・下位市場の予測
  • ロシアのユーティリティーインフラセキュリティー市場・下位市場の予測
  • カナダのユーティリティーインフラセキュリティー市場・下位市場の予測
  • ドイツのユーティリティーインフラセキュリティー市場・下位市場の予測
  • 日本のユーティリティーインフラセキュリティー市場・下位市場の予測
  • インドのユーティリティーインフラセキュリティー市場・下位市場の予測
  • 英国のユーティリティーインフラセキュリティー市場・下位市場の予測
  • フランスのユーティリティーインフラセキュリティー市場・下位市場の予測
  • オーストラリアのユーティリティーインフラセキュリティー市場・下位市場の予測
  • 韓国のユーティリティーインフラセキュリティー市場・下位市場の予測
  • サウジアラビアのユーティリティーインフラセキュリティー市場・下位市場の予測
  • ブラジルのユーティリティーインフラセキュリティー市場・下位市場の予測
  • イスラエルのユーティリティーインフラセキュリティー市場・下位市場の予測
  • ナイジェリアのユーティリティーインフラセキュリティー市場・下位市場の予測
  • 世界のその他地域におけるユーティリティーインフラセキュリティー市場・下位市場の予測

第6章 ユーティリティーインフラセキュリティー市場のSWOT分析

第7章 専門家の見解

  • POLUS-ST LLC.、国際販売マーケティングマネージャー、Irina Rogizinskaya氏
  • Industrial Defender, Inc.、マーケティング担当バイスプレジデント、Kim Legelis氏
  • Waterfall Security Solutions Ltd.、CEO兼共同創立者、Lior Frenkel氏
  • NICE Systems Ltd.、製品マーケティングマネージャー、Barak Israel氏、事業開発担当ディレクター、Udi Segall氏

第8章 ユーティリティーインフラセキュリティー市場における主要企業12社(企業概要、ユーティリティーインフラセキュリティー市場分析、主要な競合他社、重点地域、M&A活動)

  • Axis Communications AB
  • Bosch Group
  • Honeywell International Inc.
  • IndigoVision Group plc
  • Industrial Defender Inc.
  • Kratos Defense and Security Solutions Inc.
  • Lockheed Martin Corporation
  • NICE Systems Ltd.
  • QinetiQ Group plc
  • Raytheon
  • Schneider Electric SA
  • Waterfall Security Solutions
  • その他の主要な企業

第9章 結論・提言

第10章 用語集

図表

目次

The security of utilities infrastructure has always been important for governments and operating authorities alike, particularly after the events of the early 21st century. Yet now more than ever, there is renewed emphasis for protection as a result of the way in which cyber security issues have come to dominate new security thinking and planning in this sector. Certainly, whereas before most utilities considered themselves unlikely to suffer major damage from anything except nature, in the present threat environment every essential service component, from the most physically secure nuclear facility, to local water distribution sites, is within reach of anonymous attack via computer networks. Fresh awareness of this vulnerability is currently enabling security growth in areas which previously had little motivation for additional security expenditure. Meanwhile in other regions, great opportunities will continue to present themselves for providers of physical security, who will benefit from the large scale infrastructure investment plans of major economies the world over. Accordingly, the utilities infrastructure security market is one which is considered to be entering a period of relative prosperity, with a global value of $8.4bn expected in 2014.

Why you should buy Utilities Infrastructure Security Market Forecast 2014-2024 Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security

What is the future of the Utilities Infrastructure Security market? Visiongain's comprehensive analysis contains highly quantitative content delivering solid conclusions benefiting your analysis and illustrates new opportunities and potential revenue streams helping you to remain competitive. This definitive report will benefit your decision making and help to direct your future business strategy.

We guarantee that you will receive key information which will benefit you in the following way

  • View global utilities infrastructure security market forecasts and analysis from 2014-2024 to keep your knowledge ahead of your competition and ensure you exploit key business opportunities
    • The report provides detailed sales projections of the market, the competitors, and the commercial drivers and restraints allowing you to more effectively compete in the market. In addition to market forecasts from 2014-2024, our new study shows current market data, market shares, original critical analysis, and revealing insight into commercial developments
  • Why struggle to find key market data? Why miss crucial information? Our comprehensive report provides instant market insight
    • Our 304 page report provides 250 tables, charts, and graphs, and 97 contracts. Let our analysts present you with a thorough assessment of the current and future Utilities Infrastructure Security market prospects.
    • This analysis will achieve quicker, easier understanding. Also you will gain from our analyst's industry expertise allowing you to demonstrate your authority on the utilities infrastructure security sector.
  • Visiongain is one of the few business intelligence companies that provides full transcripts of primary research company interviews. Be part of this knowledge. Learn what industry thought leaders are thinking. Leaders hold critical information
    • By reading the full transcripts of exclusive expert opinion interviews contained in the report you will keep up to speed with what is really happening in the industry. Don't' fall behind. You will gain a thorough knowledge on the Utilities Infrastructure Security sector finding strategic advantages for your work and will learn how your organisation can benefit - allowing you to assess prospects for investments and sales
    • Irina Rogizinskaya, International Sales and Marketing Manager, POLUS-ST LLC
    • Kim Legelis, Vice President, Marketing, Industrial Defender, Inc.
    • Lior Frenkel, CEO and Co-Founder, Waterfall Security Solutions Ltd.
    • Barak Israel, Product Marketing Manager, & Udi Segall, Director of Business Development, NICE Systems Ltd.
  • Discover sales predictions for the key end use submarkets from 2014-2024
    • What are the dynamics of the utilities infrastructure security industry's progress? How will these markets expand? Which submarkets will generate the most revenue? Use our forecasts and expert insight to grow your business and give you more industry influence. Find where you can gain and how your organisation can succeed. Avoid falling behind. Stay informed about the potential for each of these Utilities Infrastructure Security submarkets with individual forecasts and analysis from 2014-2024.within each leading national market.
    • Physical Security submarket forecast 2014-2024
    • Cybersecurity submarket forecast 2014-2024
  • Understand the prospects for the leading national utilities infrastructure security markets - where will the highest revenues and opportunities occur?
    • Learn about the market potential for utilities infrastructure security companies in the developed and developing countries from 2013.onwards. You will see where and how opportunities exist with revealing individual market forecasts and analysis from 2014-2024 for 15 leading national markets, each of which is broken down into two submarkets.
    • US forecast 2014-2024
    • China forecast 2014-2024
    • Russia forecast 2014-2024
    • Canada forecast 2014-2024
    • Germany forecast 2014-2024
    • Japan forecast 2014-2024
    • India forecast 2014-2024
    • UK forecast 2014-2024
    • France forecast 2014-2024
    • Australia forecast 2014-2024
    • Republic of Korea forecast 2014-2024
    • Saudi Arabia forecast 2014-2024
    • Brazil forecast 2014-2024
    • Israel forecast 2014-2024
    • Nigeria forecast 2014-2024
    • Rest of the World forecast 2014-2024
  • Find out about the market dynamics & opportunities in 15 leading countries
    • Understand industry activity with detailed data revealing where companies are earning their revenues and with what products and with which technology.
    • You will be able to examine 16 detailed tables of 97 significant regional contracts, projects & programmes
  • Explore the factors affecting product developers, and everyone within the value chain. Learn about the forces influencing market dynamics.
    • Explore the political, economic, social, and technological (PEST / SWOT) issues assessing product advances. Discover what the present and future outlook for business will be. Learn about the following business critical issues -
    • Research and development (R&D) strategy
    • Technological issues and constraints.
    • Supply and demand dynamics
    • Competition from new product types
    • Increasing specialisation by leading players
    • Increasing industry consolidation.
    • Advances in product quality
    • Analysis of barriers to entry
    • Demographic changes
  • Identify who the leading companies are in the utilities infrastructure security industry
    • Our report reveals the technologies and companies which hold the greatest potential. In particular, exploring and analyzing the activities of these companies: See where the expected gains will be. Prospects for advances in the Utilities Infrastructure Security industry are strong, and from 2014 it holds many opportunities for revenue growth. View visiongain's assessment of the prospects for established competitors, rising companies, and new market entrants. Our work explains that potential, helping you stay ahead. Gain a thorough understanding of the competitive landscape with profiles of 12 leading Utilities Infrastructure Security companies examining their positioning, capabilities, product portfolios, R&D activity, services, focus, strategies, M&A activity, and future outlook.
    • Axis Communications AB
    • Bosch Group
    • Honeywell International, Inc.
    • IndigoVision Group plc
    • Industrial Defender, Inc.
    • Kratos Defense & Security Solutions, Inc.
    • Lockheed Martin Corporation
    • NICE Systems Ltd.
    • QinetiQ Group plc
    • Raytheon Company
    • Schneider Electric SA
    • Waterfall Security Solutions Ltd.

Discover Information found nowhere else in this independent assessment of the utilities infrastructure security market

The Utilities Infrastructure Security Market Forecast 2014-2024 Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security report provides impartial utilities infrastructure security sector analysis. With the independent business intelligence found only in our work, you will discover where the prospects are for profit. In particular, our new research provides you with key strategic advantages: Our informed forecasts, independent and objective analysis, exclusive interviews and revealing company profiles will provide you with that necessary edge, allowing you to gain ground over your competitors.

With this report you are less likely to fall behind in knowledge or miss crucial business opportunities. You will save time and receive recognition for your market insight. See how you this report could benefit and enhance your research, analysis, company presentations and ultimately your individual business decisions and your company's prospects.

What makes this report unique?

Visiongain consulted widely with leading industry experts and full transcripts from these exclusive interviews with POLUS-ST LLC, Industrial Defender, Inc., Waterfall Security Solutions Ltd. and with NICE Systems Ltd. are included in the report. Visiongain's research methodology involves an exclusive blend of primary and secondary sources providing informed analysis. This methodology allows insight into the key drivers and restraints behind market dynamics and competitive developments. The report therefore presents an ideal balance of qualitative analysis combined with extensive quantitative data including global, submarket and regional markets forecasts from 2014-2024

Why choose visiongain business intelligence?

Visiongain's; increasingly diverse sector coverage strengthens our research portfolio. The growing cross-sector convergence of key verticals and the interplay of game changing technologies across hitherto unrelated industries are creating new synergies, resulting in new business opportunities for you to leverage.

As such, visiongain's team of London based in-house analysts offer a wealth of knowledge and experience to inform your strategic business decisions. Let visiongain guide you.

How the Utilities Infrastructure Security Market Forecast 2014-2024 Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security report will benefit you

Visiongain's report is for anyone requiring analysis of the Utilities Infrastructure Security market. You will discover market forecasts, technological trends, predictions and expert opinion providing you with independent analysis derived from our extensive primary and secondary research. Only by purchasing this report will you receive this critical business intelligence revealing where revenue growth is likely and where the lucrative potential market prospects are. Don't miss this key opportunity to gain a competitive advantage.

Avoid falling behind your competitors, overlooking critical business opportunities or losing industry influence. In our new report you will discover forecasts from 2014-2024 at the global, submarket, and national level. The report also assesses technologies, competitive forces and expected product pipeline developments. Read on to discover the prospects for the utilities infrastructure security sector and find out what its future market prospects are.

Table of Contents

1. Executive Summary

  • 1.1 Global Market Overview
  • 1.2 Benefits of This Report
  • 1.3 Who is This Report For?
  • 1.4 Methodology
  • 1.5 Primary Research
  • 1.6 Secondary Research
  • 1.7 Market Sizing
  • 1.8 Forecasting
  • 1.9 Visiongain's Added Value
  • 1.10 Factors Used in Visiongain's Market Forecasting Methodology

2. Introduction to the Utilities Infrastructure Security Market

  • 2.1 Utilities Infrastructure Security Market Structure Overview
  • 2.2 Physical Security Submarket Definition & Analysis
  • 2.3 Cybersecurity Submarket Definition & Analysis

3. Global Utilities Infrastructure Security Market 2014-2024

  • 3.1 Global Utilities Infrastructure Security Market Forecast 2014-2024
  • 3.2 Global Utilities Infrastructure Security Regional Forecast 2014-2024
  • 3.3 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024
  • 3.4 Global Utilities Infrastructure Security Drivers & Restraints
  • 3.5 Global Utilities Infrastructure Security Drivers
  • 3.6 Global Utilities Infrastructure Security Restraints
  • 3.7 Key Utilities Infrastructure Areas of Interest
    • 3.7.1 Electricity Infrastructure
    • 3.7.2 Oil and Gas Infrastructure
    • 3.7.3 Water and Sanitation Infrastructure
  • 3.8 Global Utilities Infrastructure Security Threats
  • 3.9 Mechanisms of Cyber Attack Against Utilities Infrastructure
  • 3.10 Cyber Weaponry for use against Utilities Infrastructure
  • 3.11 Methods of Cyber Defence for Utilities Infrastructure
  • 3.12 List of Recent Major Global Cyber Attacks
    • 3.12.1 Estonia
    • 3.12.2 Operation Orchard
    • 3.12.3 Georgia
    • 3.12.4 Conficker
    • 3.12.5 Operation Buckshot Yankee
    • 3.12.6 Aurora
    • 3.12.7 Chinese Diversion of Internet Traffic
    • 3.12.8 Stuxnet
    • 3.12.9 Duqu
    • 3.12.10 RSA
    • 3.12.11 Sony Corporation
    • 3.12.12 Operation Shady RAT
    • 3.12.13 Mitsubishi Heavy Industries
    • 3.12.14 Flame / Operation: Olympic Games
    • 3.12.15 Aramco
  • 3.13. Notable Utilities Infrastructure Security Events

4. Utilities Physical Security Submarket Forecasts 2014-2024

  • 4.1 Utilities Physical Security Submarkets 2014-2024
  • 4.2 Regional Physical Security Submarket Forecast 2014-2024
  • 4.3 Physical Security Submarket Forecast by National Market 2014-2024
  • 4.4 Physical Security Submarket Analysis
  • 4.5 Regional Cybersecurity Submarket Forecast 2014-2024
  • 4.6 Cybersecurity Submarket Forecast by National Market 2014-2024
  • 4.7 Cybersecurity Submarket Analysis

5. Leading 15 National Utilities Infrastructure Security Market Forecasts 2014-2024

  • 5.1 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2014-2024
  • 5.2 Barriers to Entry Analysis 2014
  • 5.3 U.S. Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.3.1 U.S. Utilities Physical Security Submarket Forecasts 2014-2024
    • 5.3.2 U.S. Utilities Infrastructure Security Market Drivers & Restraints
    • 5.3.3 Essential Components of U.S. Cybersecurity
      • 5.3.3.1 CNCI
      • 5.3.3.2 US CYBERCOM
      • 5.3.3.3 ARCYBER
      • 5.3.3.4 AFCYBER (24th Air Force)
      • 5.3.3.5 FLTCYBERCOM
      • 5.3.3.6 MARFORCYBER
      • 5.3.3.7 NSA
      • 5.3.3.8 Perfect Citizen
      • 5.3.3.9 DISA
      • 5.3.3.10 DHS
      • 5.3.3.11 National Protection and Programs Directorate
      • 5.3.3.12 Office of Cyber Security and Communications
      • 5.3.3.13 Einstein II
      • 5.3.3.14 DARPA
    • 5.3.4 The New Front: Why Concern for the Safety and Security of Critical Infrastructure Will Continue To Drive U.S. Cybersecurity Expenditure Upwards
    • 5.3.5 U.S. Utilities Infrastructure Security Contracts & Programmes
  • 5.4 Chinese Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.4.1 Chinese Utilities Infrastructure Security Market Forecast
    • 5.4.2 Chinese Utilities Infrastructure Security Market Drivers & Restraints
    • 5.4.3 Going Nuclear: Why China Will Spend More than the Global Average on Utilities Infrastructure Security between 2014 and 2024
    • 5.4.4 How Does China's Conceptual Understanding of 'Information' Shape Cyber Security?
    • 5.4.5 Chinese Utilities Infrastructure Security Contracts & Programmes
  • 5.5 Russian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.5.1 Russian Utilities Infrastructure Security Submarket Forecast
    • 5.5.2 Russian Utilities Infrastructure Security Market Drivers & Restraints
    • 5.5.3 Russian Cybersecurity Policy: How Stage Two Is Expected to Build on Previous Developments
    • 5.5.4 Russian Utilities Infrastructure Security Contracts & Programmes
  • 5.6 Canadian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.6.1 Canadian Utilities Infrastructure Security Submarket Forecast
    • 5.6.2 Canadian Utilities Infrastructure Security Market Drivers & Restraints
    • 5.6.3 Canada's New Cybersecurity Strategy
    • 5.6.4 Why The Canadian Private Sector is Still Being Asked to Pick up the Slack on National Cyber Security
    • 5.6.5 Canadian Utilities Infrastructure Security Contracts & Programmes
  • 5.7 German Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.7.1 German Utilities Infrastructure Security Submarket Forecast
    • 5.7.2 German Utilities Infrastructure Security Market Drivers & Restraints
    • 5.7.3 Have German Cybersecurity Efforts Acquired New Emphasis?
    • 5.7.4 German Utilities Infrastructure Security Contracts & Programmes
  • 5.8 Japanese Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.8.1 Japanese Utilities Infrastructure Security Submarket Forecast
    • 5.8.2 Japanese Utilities Infrastructure Security Market Drivers & Restraints
    • 5.8.3 How Has Japan Increased its Cybersecurity Capabilities to Counter the Threat of Outsider Interference?
    • 5.8.4 The Japanese Cyber Security Threat - Fukushima 2.0?
    • 5.8.5 Japanese Utilities Infrastructure Security Contracts & Programmes
  • 5.9 Indian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.9.1 Indian Utilities Infrastructure Security Submarket Forecast
    • 5.9.2 Indian Utilities Infrastructure Security Market Drivers & Restraints
    • 5.9.3 Why India's 2012 Power Blackout has placed an emphasis on Critical Infrastructure Protection?
    • 5.9.4 Indian Bilateral Cybersecurity Agreements
    • 5.9.5 Indian Utilities Infrastructure Security Contracts & Programmes
  • 5.10 U.K. Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.10.1 U.K. Utilities Infrastructure Security Submarket Forecast
    • 5.10.2 U.K. Utilities Infrastructure Security Market Drivers & Restraints
    • 5.10.3 U.K. Utilities Infrastructure Security Contracts & Programmes
  • 5.11 French Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.11.1 French Utilities Infrastructure Security Submarket Forecast
    • 5.11.2 French Utilities Infrastructure Security Market Drivers & Restraints
    • 5.11.3 Asymmetric Warfare: How Greenpeace Continues to Inadvertently Enhance the French Utilities Infrastructure Security Market
  • 5.12 Australian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.12.1 Australian Utilities Infrastructure Security Submarket Forecast
    • 5.12.2 Australian Utilities Infrastructure Security Market Drivers & Restraints
    • 5.12.3 Why Huawei Technologies is unlikely to have access to the Australian telecommunications market in the near future
    • 5.12.4 Australian Utilities Infrastructure Security Contracts & Programmes
  • 5.13 Republic of Korea Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.13.1 Republic of Korea Utilities Infrastructure Security Submarket Forecast
    • 5.13.2 Republic of Korea Utilities Infrastructure Security Market Drivers & Restraints
    • 5.13.3 How Has South Korea Met the Challenge of the Cyber Threat?
    • 5.13.4 Republic of Korea Utilities Infrastructure Security Contracts & Programmes
  • 5.14 Saudi Arabian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.14.1 Saudi Arabian Utilities Infrastructure Security Submarket Forecast
    • 5.14.2 Saudi Arabian Utilities Infrastructure Security Market Drivers & Restraints
    • 5.14.3 Saudi Arabian Utilities Infrastructure Security Contracts & Programmes
  • 5.15 Brazilian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.15.1 Brazilian Utilities Infrastructure Security Submarket Forecast
    • 5.15.2 Brazilian Utilities Infrastructure Security Market Drivers & Restraints
  • 5.16 Israeli Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.16.1 Israeli Utilities Infrastructure Security Submarket Forecast
    • 5.16.2 Israeli Utilities Infrastructure Security Market Drivers & Restraints
    • 5.16.3 Why Israeli Private Sector Spending on Cybersecurity Will Outpace Government Expenditure
    • 5.16.4 Israeli Utilities Infrastructure Security Contracts & Programmes
  • 5.17 Nigerian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.17.1 Nigerian Utilities Infrastructure Security Submarket Forecast
    • 5.17.2 Nigerian Utilities Infrastructure Security Market Drivers & Restraints
    • 5.17.3 Nigerian Utilities Infrastructure Security Contracts & Programmes
  • 5.18 Rest of the World Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
    • 5.18.1 Rest of the World Utilities Infrastructure Security Submarket Forecast
    • 5.18.2 Rest of the World Utilities Infrastructure Security Market Drivers & Restraints
    • 5.18.3 Rest of the World Utilities Infrastructure Security Contracts & Programmes

6. SWOT Analysis of the Utilities Infrastructure Security Market 2014-2024

7. Expert Opinion

  • 7.1 Irina Rogizinskaya, International Sales and Marketing Manager, POLUS-ST LLC.
    • 7.1.1 Company Background & History
    • 7.1.2 Contribution to the Market & RADIOBARRIER
    • 7.1.3 Product Integration and Company Cooperation
    • 7.1.4 Market Strategy
  • 7.2 Kim Legelis, Vice President, Marketing, Industrial Defender, Inc.
    • 7.2.1 Contribution to the Market & Bridging the Gap Between OT and IT
    • 7.2.2 Market Strategy
    • 7.2.3 Product Integration & Maintenance
    • 7.2.4 Product & Service Advantages
    • 7.2.5 Consumer Satisfaction & Demand
    • 7.2.6 The Threat to Utilities Infrastructure
    • 7.2.7 The Value of Industrial Defender's Products
  • 7.3 Lior Frenkel, CEO and Co-Founder, Waterfall Security Solutions Ltd.
    • 7.3.1 Company Background & Commercial History
    • 7.3.2 Contribution to the Market & Business Expansion
    • 7.3.3 Consumer Demand & Technology Maintenance
    • 7.3.4 Product & Service Advantages
    • 7.3.5 Product Integration & Business Strategy
  • 7.4 Barak Israel, Product Marketing Manager, & Udi Segall, Director of Business Development, NICE Systems Ltd.
    • 7.4.1 Company Background & Commercial History
    • 7.4.2 Contribution to the Market & Customer Demand
    • 7.4.3 Product Maintenance & Advantages
    • 7.4.4 Product Integration & Market Strategy
    • 7.4.5 Regulatory Compliance & the Threat to Utilities Infrastructure

8. Leading 12 Companies in the Utilities Infrastructure Security Market

  • 8.1 Axis Communications AB Company Overview
    • 8.1.1 Axis Communications AB Utilities Infrastructure Security Market Analysis
    • 8.1.2 Axis Communications AB Primary Market Competitors
    • 8.1.3 Axis Communications AB' Regional Emphasis / Focus
    • 8.1.4 Axis Communications AB' M&A Activity
  • 8.2 Bosch Group Company Overview
    • 8.2.1 Bosch Group Utilities Infrastructure Security Market Analysis
    • 8.2.2 Bosch Group's Primary Market Competitors
    • 8.2.3 Bosch Group's Regional Emphasis / Focus
    • 8.2.4 Bosch Group's Recent M&A Activity
  • 8.3 Honeywell International Inc. Company Overview
    • 8.3.1 Honeywell International Inc. Utilities Infrastructure Security Market Analysis
    • 8.3.2 Honeywell International Inc. Primary Market Competitors
    • 8.3.3 Honeywell International Inc. Regional Emphasis / Focus
    • 8.3.4 Honeywell International Inc. Recent M&A Activity
  • 8.4 IndigoVision Group plc Company Overview
    • 8.4.1 IndigoVision Group plc Utilities Infrastructure Security Market Analysis
    • 8.4.2 IndigoVision Group plc's Primary Market Competitors
    • 8.4.3 IndigoVision Group plc's Regional Emphasis / Focus
    • 8.4.4 IndigoVision Group plc's Recent M&A Activity
  • 8.5 Industrial Defender Inc. Company Overview
    • 8.5.1 Industrial Defender Inc. Utilities Infrastructure Security Market Analysis
    • 8.5.2 Industrial Defender Inc.'s Primary Market Competitors
    • 8.5.3 Industrial Defender, Inc.'s Regional Emphasis / Focus
    • 8.5.4 Industrial Defender Inc.'s Recent M&A Activity
  • 8.6 Kratos Defense and Security Solutions Inc. Company Overview
    • 8.6.1 Kratos Defense & Security Solutions Inc. Utilities Infrastructure Security Market Analysis
    • 8.6.2 Kratos Defense & Security Solutions Inc.'s Primary Market Competitors
    • 8.6.3 Kratos Defense & Security Solutions Inc.'s Regional Emphasis / Focus
    • 8.6.4 Kratos Defense & Security Solutions Inc.'s Recent M&A Activity
  • 8.7 Lockheed Martin Corporation Company Overview
    • 8.7.1 Lockheed Martin Corporation Utilities Infrastructure Security Market Analysis
    • 8.7.2 Lockheed Martin Corporation Primary Market Competitors
    • 8.7.3 Lockheed Martin Corporation's Regional Emphasis / Focus
    • 8.7.4 Lockheed Martin Corporation Recent M&A Activity
  • 8.8 NICE Systems Ltd. Company Overview
    • 8.8.1 NICE Systems Ltd. Utilities Infrastructure Security Market Analysis
    • 8.8.2 NICE Systems Ltd. Primary Market Competitors
    • 8.8.3 NICE Systems Ltd. Regional Emphasis / Focus
    • 8.8.4 NICE Systems Ltd. Recent M&A Activity
  • 8.9 QinetiQ Group plc Company Overview
    • 8.9.1 QinetiQ Group plc Utilities Infrastructure Security Market Analysis
    • 8.9.2 QinetiQ Group plc Primary Market Competitors
    • 8.9.3 QinetiQ Group plc Regional Emphasis / Focus
    • 8.9.4 QinetiQ Group plc Recent M&A Activity
  • 8.10 Raytheon Company Overview
    • 8.10.1 Raytheon Company Utilities Infrastructure Security Market Analysis
    • 8.10.2 Raytheon Company's Primary Market Competitors
    • 8.10.3 Raytheon Company's Regional Emphasis / Focus
    • 8.10.4 Raytheon Company's Recent M&A Activity
  • 8.11 Schneider Electric SA Company Overview
    • 8.11.1 Schneider Electric SA Utilities Infrastructure Security Market Analysis
    • 8.11.2 Schneider Electric SA's Primary Market Competitors
    • 8.11.3 Schneider Electric SA Regional Emphasis / Focus
    • 8.11.4 Schneider Electric SA's Recent M&A Activity
  • 8.12 Waterfall Security Solutions Company Overview
    • 8.12.1 Waterfall Security Solutions Utilities Infrastructure Security Market Analysis
    • 8.12.2 Waterfall Security Solutions' Primary Market Competitors
    • 8.10.3 Waterfall Security Solutions' Regional Emphasis/Focus
    • 8.10.4 Waterfall Security Solutions' Recent M&A Activity
  • 8.13 Other Leading Companies in the Utilities Infrastructure Security Market

9. Conclusions & Recommendations

10. Glossary

List of Tables

  • Table 3.1 Global Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative)
  • Table 3.2 Global Utilities Infrastructure Security Regional Forecasts 2014-2024 ($m, Cumulative)
  • Table 3.3 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (AGR %)
  • Table 3.4 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (CAGR %)
  • Table 3.5 Global Utilities Infrastructure Security Market Drivers & Restraints
  • Table 3.6 Mechanisms of Cyber Attack Against Utilities Infrastructure
  • Table 3.7 Cyber Weaponry for use against Utilities Infrastructure
  • Table 3.8 Methods of Cyber Defence for Utilities Infrastructure
  • Table 4.1 Global Utilities Physical Security Submarket Forecasts 2014-2024 ($m, Cumulative)
  • Table 4.2 Regional Physical Security Submarket Forecast 2014-2024 ($m, Cumulative)
  • Table 4.3 Physical Security Submarket Forecast by National Market 2014-24 ($m)
  • Table 4.4 Cybersecurity Submarket Forecast by Regional Market 2014-2024 ($m, Cumulative)
  • Table 4.5 Cybersecurity Forecast by National Market 2014-2024 ($m, AGR %)
  • Table 5.1 Leading National Utilities Infrastructure Security Market Forecast by Submarket 2014-2024 ($m)
  • Table 5.2 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.3 U.S. Utilities Infrastructure Security Drivers & Restraints
  • Table 5.4 Major U.S. Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.5 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.6 Chinese Utilities Infrastructure Security Drivers & Restraints
  • Table 5.7 Major Chinese Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.8 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.9 Russian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.10 Major Russian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.11 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.12 Canadian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.13 Major Canadian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.14 German Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.15 German Utilities Infrastructure Security Drivers & Restraints
  • Table 5.16 Major German Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.17 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.18 Japanese Utilities Infrastructure Security Drivers & Restraints
  • Table 5.19 Major Japanese Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.20 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.21 Indian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.22 Major Indian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.23 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.24 U.K. Utilities Infrastructure Security Drivers & Restraints
  • Table 5.25 Major U.K. Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.26 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.27 French Utilities Infrastructure Security Drivers & Restraints
  • Table 5.28 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.29 Australian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.30 Major Australian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.31 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.32 Republic of Korea Utilities Infrastructure Security Drivers & Restraints
  • Table 5.33 Major RoK Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.34 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.35 Saudi Arabian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.36 Major Saudi Arabian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.37 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.38 Brazilian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.39 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.40 Israeli Utilities Infrastructure Security Drivers & Restraints
  • Table 5.41 Major Israeli Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.42 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.43 Nigerian Utilities Infrastructure Security Drivers & Restraints
  • Table 5.44 Major Nigerian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 5.45 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative)
  • Table 5.46 Rest of the World Utilities Infrastructure Security Drivers & Restraints
  • Table 5.47 Major RoW Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details)
  • Table 6.1 SWOT Analysis of the Utilities Infrastructure Security Market 2014-2024
  • Table 8.1 Leading 12 Companies in the Utilities Infrastructure Security Market 2014 (Company, Total Revenue, Market Product Specialisation)
  • Table 8.2 Axis Communications AB Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.3 Recent Axis Communications AB Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.4 Sample of Axis Communications AB Utilities Infrastructure Security Products / Services (Company Section, Product, Specification)
  • Table 8.5 Bosch Group Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.6 Recent Bosch Group Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.7 Sample of Bosch Group Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification)
  • Table 8.8 Honeywell International Inc. Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.9 Recent Honeywell International Inc. Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.10 Sample of Honeywell International Inc. Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification)
  • Table 8.11 IndigoVision Group plc Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.12 Recent IndigoVision Group plc Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.13 Sample of IndigoVision Group plc Utilities Infrastructure Security Products / Services (Company Section, Product, Specification)
  • Table 8.14 Industrial Defender Inc. Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiary, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.15 Recent Industrial Defender Inc. Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.16 Sample of Industrial Defender Utilities Infrastructure Security Products / Services (Section, Product, Product Description, Specification)
  • Table 8.17 Kratos Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.18 Recent Kratos Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.19 Sample of Kratos Defense & Security Solutions Inc. Utilities Infrastructure Security Products / Services (Section, Product, Specification)
  • Table 8.20 Lockheed Martin Corporation Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.21 Recent Lockheed Martin Corporation Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.22 Sample of Lockheed Martin Corporation Utilities infrastructure security Products / Services (Company Section, Product, Product Description, Specification)
  • Table 8.23 NICE Systems Ltd. Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Partner in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.24 Recent NICE Systems Ltd. Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Country, Details, Model/Type)
  • Table 8.25 Sample of NICE Systems Ltd. Utilities infrastructure security Products / Services (Company Section, Product, Product Description, Specification)
  • Table 8.26 QinetiQ Group plc Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.27 Recent QinetiQ Group plc Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.28 Sample of QinetiQ Group plc Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification)
  • Table 8.29 Raytheon Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.30 Recent Raytheon Company Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.31 Sample of Raytheon Company Utilities Infrastructure Security Products / Services (Company Section, Product, Specification)
  • Table 8.32 Schneider Electric SA Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.33 Recent Schneider Electric SA Company Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
  • Table 8.34 Sample of Schneider Electric SA Company Utilities Infrastructure Security Products / Services (Company Section, Product, Specification)
  • Table 8.35 Waterfall Security Solutions Ltd. Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
  • Table 8.36 Recent Waterfall Security Solutions Ltd. Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Details)
  • Table 8.37 Sample of Waterfall Security Solutions Ltd. Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification)
  • Table 8.38 Other Leading Companies in the Utilities Infrastructure Security Market (Company, Primary Market Product / Service)

List of Figures

  • Figure 2.1 Global Utilities Infrastructure Security Market Structure Overview
  • Figure 3.1 Global Utilities Infrastructure Security Market Regional Forecast 2014-2024 (AGR%)
  • Figure 3.2 Utilities Infrastructure Security Market Regional Share Forecast 2014 (%)
  • Figure 3.3 Utilities Infrastructure Security Market Regional Share Forecast 2019 (%)
  • Figure 3.4 Utilities Infrastructure Security Market Regional Share Forecast 2024 (%)
  • Figure 3.5 Top Five Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (AGR %)
  • Figure 3.6 Global Utilities Infrastructure Security Threats
  • Figure 3.7 Operation Shady RAT Targets
  • Figure 4.1 Global Utilities Physical Security Submarket Forecasts 2014-2024 ($m)
  • Figure 4.2 Global Utilities Infrastructure Security Submarkets Share Forecast 2014 (%)
  • Figure 4.3 Global Utilities Infrastructure Security Submarkets Share Forecast 2019 (%)
  • Figure 4.4 Global Utilities Infrastructure Security Submarkets Share Forecast 2024 (%)
  • Figure 4.5 Regional Physical Security Submarket Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 4.6 Regional Physical Security Submarket 2014-2024 ($m, AGR%)
  • Figure 4.7 Physical Security Submarket Forecast by National Market 2014-2024 ($m, AGR%)
  • Figure 4.8 Physical Security Submarket National Share Forecast 2014 (%)
  • Figure 4.9 Physical Security Submarket National Share Forecast 2019 (%)
  • Figure 4.10 Physical Security Submarket National Share Forecast 2024 (%)
  • Figure 4.11 Regional Cybersecurity Submarket Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 4.12 Regional Cybersecurity Submarket Forecast 2014-2024 ($m, AGR%)
  • Figure 4.13 Cybersecurity Submarket Forecast by National Market 2014-2024 ($m, AGR%)
  • Figure 4.14 Cybersecurity Submarket National Share Forecast 2014 (%)
  • Figure 4.15 Cybersecurity Submarket National Share Forecast 2019 (%)
  • Figure 4.16 Cybersecurity Submarket National Share Forecast 2024 (%)
  • Figure 5.1 Leading 15 National Utilities Infrastructure Security Markets 2014-2024 ($m)
  • Figure 5.2 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2014 (%)
  • Figure 5.3 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2019 (%)
  • Figure 5.4 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2024 (%)
  • Figure 5.5 Barriers to Entry vs. Leading 15 National Market Size vs. AGR% 2014 ($m, AGR%)
  • Figure 5.6 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.7 U.S. Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.8 U.S. Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.9 U.S. Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.10 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.11 U.S. Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.12 US Government and Military Cybersecurity Organisational Structure
  • Figure 5.13 US CYBERCOM Organisational Structure
  • Figure 5.14 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.15 Chinese Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.16 Chinese Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.17 Chinese Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR% CAGR Period)
  • Figure 5.18 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.19 Chinese Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.20 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.21 Russian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.22 Russian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.23 Russian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.24 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.25 Russian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.26 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.27 Canadian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.28 Canadian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.29 Canadian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.30 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.31 Canadian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.32 German Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.33 German Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.34 German Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.35 German Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.35 German Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%)
  • Figure 5.37 German Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.38 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.39 Japanese Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.40 Japanese Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.41 Japanese Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.42 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.43 Japanese Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.44 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.45 Indian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.46 Indian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.47 Indian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.50 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.51 U.K. Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.52 U.K. Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.53 U.K. Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.54 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.55 U.K. Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.56 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.57 French Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.58 French Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.59 French Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.60 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.61 French Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.62 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.63 Australian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.64 Australian Utilities Infrastructure Security Market Regional Share Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.65 Australian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.66 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.67 Australian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.68 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.69 Republic of Korea Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share, CAGR Period)
  • Figure 5.70 Republic of Korea Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.71 Republic of Korea Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%)
  • Figure 5.72 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.73 Republic of Korea Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.74 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.75 Saudi Arabian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.76 Saudi Arabian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.77 Saudi Arabian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.78 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.79 Saudi Arabian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.80 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.81 Brazilian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.82 Brazilian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.83 Brazilian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.84 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.85 Brazilian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.86 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.87 Israeli Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.88 Israeli Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.89 Israeli Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.90 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.91 Israeli Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.92 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.93 Nigerian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.94 Nigerian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.95 Nigerian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.96 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.97 Nigerian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 5.98 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.99 Rest of the World Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share)
  • Figure 5.100 Rest of the World Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share)
  • Figure 5.101 Rest of the World Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period)
  • Figure 5.102 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
  • Figure 5.103 Rest of the World Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share)
  • Figure 8.1 Axis Communications AB Organisational Structure
  • Figure 8.2 Axis Communications AB Regional Emphasis / Focus
  • Figure 8.3 Bosch Group Organisational Structure
  • Figure 8.4 Bosch Group Regional Emphasis / Focus
  • Figure 8.5 Honeywell International Inc. Organisational Structure
  • Figure 8.6 Honeywell International Inc. Regional Emphasis / Focus
  • Figure 8.7 IndigoVision Group plc Organisational Structure
  • Figure 8.8 IndigoVision Group plc Regional Emphasis /Focus
  • Figure 8.9 Industrial Defender Inc. Organisational Structure
  • Figure 8.10 Industrial Defender, Inc. Regional Emphasis / Focus
  • Figure 8.11 Kratos Defense & Security Solutions Organisational Structure
  • Figure 8.12 Kratos Regional Emphasis / Focus
  • Figure 8.13 Lockheed Martin Corporation Organisational Structure
  • Figure 8.14 Lockheed Martin Corporation's Regional Emphasis / Focus
  • Figure 8.15 NICE Systems Ltd. Organisational Structure
  • Figure 8.16 NICE Systems Ltd. Regional Emphasis /Focus
  • Figure 8.17 QinetiQ Group plc Organisational Structure
  • Figure 8.18 QinetiQ Group plc Regional Emphasis / Focus
  • Figure 8.19 Raytheon Company Organisational Structure
  • Figure 8.20 Raytheon Company's Regional Emphasis / Focus
  • Figure 8.21 Schneider Electric SA Company Organisational Structure
  • Figure 8.22 Schneider Electric SA's Regional Emphasis / Focus
  • Figure 8.23 Waterfall Security Solutions Ltd. Organisational Structure
  • Figure 8.24 Waterfall Security Solutions Regional Emphasis / Focus

Companies Listed

  • ABB Ltd.
  • Actimise
  • AD Group
  • ADI-Gardiner Ltd.
  • ADT Fire & Security
  • ADT Security
  • Agent Vi
  • Akera
  • Akustica, Inc.
  • Al Faisaliah Group
  • AlliedSignal Aerospace Service Corporation
  • Alstom
  • Amber Engineering, Inc.
  • Anglia Water
  • APC
  • Applied Visions, Inc.
  • Arcsight
  • Areva
  • Areva T&D
  • ATG Access
  • AtlanticTransgasSystem (ATGS)
  • Aveos Fleet Performance
  • Axis Communications AB
  • Axxonsoft
  • BAE Systems
  • Battelle Memorial Institute
  • Beech Aircraft Leasing, Inc.
  • BEI Technologies
  • Belden®
  • Bell Canada
  • Bharat Petroleum Corporation Limited (BCPL)
  • Boeing Defense, Space & Security
  • Bosch Engineering GmbH
  • Bosch Group
  • Bosch Mahle Turbo Systems GmbH & Co. KG
  • Bosch Rexroth AG
  • Bosch Security Systems
  • Bosch Software Innovations GmbH
  • Bosch Solar Energy AG
  • Bosch Thermotechnik GmbH
  • British Telecom
  • Broughton High Security
  • Byres Security
  • Cassidian Cybersecurity
  • Causata
  • China Telecom
  • Chubb Systems
  • Cimac
  • Citect
  • Clipsal
  • CNI
  • ConneXium LLC
  • CRS
  • CrySyS Lab
  • CSC
  • CyberTech International
  • Cyveillance, Inc.
  • Def-Logix
  • Denim Group
  • Detection Systems and Radionics, Inc.
  • Digital Fusion, Inc.
  • Dominion Technology Resources, Inc.
  • D-Tec
  • DVTel
  • El Al Israel Airlines Ltd.
  • ELAU
  • Electricité de France (EDF)
  • Elster
  • EMC
  • EMS Aviation, Inc.
  • EnerNex
  • ERAPSCO
  • Erie Water Works
  • ESB
  • ESY Export Company, Inc.
  • ETAS
  • Exida Canada
  • Exmesh Security
  • Extreme CCTV
  • Exxon-Mobile Corporation
  • Fandotech LLC
  • FAST Video Security
  • Federal Pioneer
  • Firelight Infrastructure Partners
  • Firetide
  • FLIR Systems
  • Fortent
  • Foxguard Solutions
  • Fujitsu Ltd.
  • G4S Regulated Security Solutions (RSS)
  • G4S Secure Solutions
  • Garland Power and Light
  • Gazprom
  • General Dynamics
  • General Electric (GE)
  • General Electric Company
  • Genetec
  • Georgia Tech Applied Research
  • Geutebruck
  • Google
  • Gratte Brothers Security Management
  • Great Circle Solar Management
  • Grimes Aerospace Company
  • Gutor Electronic LLC
  • Hannamax Hi-Tech
  • Hardstaff Traffic Barriers Limited
  • HAURI, Inc
  • Haverkamp GmbH
  • Haverstick Consulting
  • HC Security Solutions
  • Helicentre Aviation
  • Hexagon Systems Engineering Ltd.
  • HID Global
  • Hikvision Digital Technology Co. Ltd.
  • Hirschmann™
  • Honeywell Integrated Security
  • Honeywell International, Inc.
  • Honeywell Process Solutions
  • Honeywell Video Systems
  • HRL Laboratories LLC
  • HRL Research Analytics, Inc.
  • Huawei Technologies
  • Hughes Training Italia Srl
  • Iberdrola
  • IBM Corporation
  • IBM Research
  • ICF International
  • ICx Technologies
  • IEX Corporation
  • IHI Corp.
  • IndigioVision Group plc
  • Industrial Defender, Inc.
  • Infinion Technologies AG
  • Infinova
  • InGuardians, Inc.
  • Integral Systems, Inc.
  • Intermec
  • International Electronics Systems, Inc
  • Intransa
  • Invensy's plc
  • IOActive, Inc.
  • IPKeys
  • IQinVision
  • Israel National Gas Lines Ltd. (INGL)
  • ITT Advanced Engineering Sciences Division
  • Ivensys plc
  • J & S Franklin
  • Jacksons Security
  • JMA Associates
  • Juno Lightning
  • Kaspersky Lab
  • Kawasaki Heavy Industries
  • Kentz Corporation Ltd
  • Kestrel Technology LLC
  • Korea Telecommunication Corporation (KT)
  • Kratos Defense & Security Solutions
  • Leidos
  • Lockheed Martin Aerospace Systems Integration Corporation
  • Lockheed Martin Australia Pty Limited
  • Lockheed Martin Canada, Inc.
  • Lockheed Martin Corporation
  • Lockheed Martin Desktop Solutions, Inc.
  • Lockheed Martin Engine Investments, LLC
  • Lockheed Martin Information Systems & Global Solutions
  • Lockheed Martin Integrated Technology LLC
  • Lockheed Martin Operations Support, Inc.
  • Logica
  • Lookingglass Cyber Solutions
  • LXE LLC
  • M&C Energy Group
  • Magal Security Systems, Ltd
  • Mainline Information Systems
  • ManTech International Corporation
  • McAfee, Inc.
  • Melbourne Water
  • Merced Systems
  • Meridian Rapid Defense Group
  • Merit Network, Inc
  • Merlin Gerin
  • Merten
  • Mitsubishi Heavy Industries
  • Modicon PLC
  • Mul-T-Lock Technologies Limited
  • Naskam Security Services
  • Nexight Group
  • NICE Systems Ltd.
  • NISC
  • Nishat Power Limited
  • Northrop Grumman Information Systems
  • Northumbrian Water Limited (NWL)
  • Novar ED&S Ltd.
  • Nu-Lec Industries
  • New York State Electric & Gas and Rochester Gas and Electric (NYSEG)
  • Oak Ridge National Laboratory
  • Omega Securidad
  • OPSWAT
  • OptaSense
  • Optex
  • PDL Group
  • Pelco Corporation
  • Performix
  • Perimeter Security Suppliers Association
  • Petroleos Mexicanos (Pemex)
  • PG&E Metcalf
  • Phillips Communications and Security, Inc.
  • Planning Systems, Inc.
  • POLUS-ST LLC
  • Power Measurement
  • Procerus Technologies
  • PureTech Systems
  • Q1 Labs, Inc.
  • Qatar Petroleum
  • QinetiQ Group plc
  • QTC Holdings, Inc.
  • Quadrant Security Group
  • Quality Plus Group
  • Quantum Secure
  • RAE Systems, Inc.
  • RandomStorm
  • RAPID, LLC
  • Raytag Ltd.
  • Raytec
  • Raytheon BBN Technologies
  • Raytheon Company
  • Raytheon Intelligence & Information Systems
  • Raytheon Secure Information Systems LLC
  • Raytheon Teligny, Inc.
  • Raytheon Visual Analytics
  • RCM Solutions
  • Redkite Financial Markets
  • Reliance High-Tech Limited
  • Robert Bosch GmbH
  • Royal and Sun Alliance LLC (RSA)
  • SafeNet Government Solutions
  • SafeNet, Inc.
  • SAIC, Inc.
  • Sandia Corporation
  • Sandia Group
  • Sandia National Laboratories
  • SAP
  • Saudi Aramco
  • Schneider Electric SA
  • Schweitzer Engineering Laboratories
  • Science Applications International Corp.
  • Scottish Equity Partners
  • ScottishPower Ltd.
  • Secure Site Solutions
  • Secure Tech
  • Senstar Corporation
  • Sichuan Baxinghe Power Corporation
  • Siemens AG
  • SightLogix
  • Skype
  • Solana Networks
  • SolveIT Software
  • Sony Corporation
  • Southwest Microwave, Inc.
  • Sperian Protection Europe SAS
  • SpotterRF
  • SPX Service Solutions
  • Square D
  • SU53
  • Summit plc
  • Swedish Nuclear Fuel & Waste Co. (SKB)
  • Symantec Corporation
  • SynApps Solutions
  • SYS Technologies
  • TAC
  • TagMaster
  • Technica Corporation
  • Telemecanique
  • Teligy, Inc.
  • Telstra
  • Telvent
  • Thales Contact Solutions
  • Thames Water
  • The Grid Protection Alliance
  • The New York Times
  • The Washington Post
  • TT Government Solutions
  • TZ Limited
  • UOP LLC
  • UOP Russell LLC
  • URS
  • UXC Connect
  • Vattenfall Europe Generation AG&Co. KG
  • VeriSign, Inc.
  • Viasat
  • Visual Analytics, Inc.
  • Waterfall Security Solutions Ltd
  • Waterfall Security Solutions USA
  • Westminster Group plc
  • Will Electronics
  • Wireless Facilities Incorporated (WFI)
  • Wirsol Solar UK
  • WT Parker
  • Zambian Electricity Supply Company
  • Zaun Limited
  • Zener Electricals and Electronic Services
  • ZF Lenksysteme GmbH
  • Zicom Group Limited
  • ZTE Corporation

List of Organisations Mentioned In This Report

  • Abu Dhabi Critical National Infrastructure Authority (CNIA)
  • Albuquerque Bernalillo County Water Utility Authority (ABCWUA)
  • Al-Mau'qi'oon Biddam Brigade
  • Al-Qaeda
  • Anonymous
  • Äspö Hard Rock Laboratory
  • Australian Customs and Border Protection Service (ACBPS)
  • Berlin Stock Exchange (BSE)
  • Canadian Cyber Incident Response Centre (CCIRC)
  • Canadian Department of Public Safety and Emergency Preparedness
  • Chinese People's Liberation Army (PLA)
  • Chinese Ministry of Environment
  • City of San Diego Public Utilities Department
  • Colombia University
  • Communist Party of China (CIP)
  • DHS S&T Cyber Security Division (CSD)
  • European Commission
  • GCHQ
  • George Mason University
  • Georgia Tech Applied Research
  • Georgia Tech Research Corp.
  • German Bundeswehr
  • German Customs Criminological Office
  • German Federal Criminal Police Office
  • German Federal Intelligence Service
  • German Federal Ministry of the Interior
  • German Federal Office for Information Security
  • German Federal Office for the Protection of the Constitution
  • German Federal Office of Civil Protection and Disaster Assistance
  • German Federal Police
  • German Nationaler Cyber-Sicherheitsrat (NCS) (National Cyber Security)
  • German Nationales Cyber-Abwehrzentrum (NCAZ) (National Cyber Defence Centre)
  • Greenpeace
  • Indian Computer Emergency Response Team (CERT-In)
  • Indian Defence Research and Development Organisation (DRDO)
  • Indian National Critical Information Infrastructure Protection Centre
  • Information Security Policy Council
  • Initiative for Cyber Security Information Sharing Partnership of Japan
  • International Computer Science Institute
  • Iraqi Oil Protection Force (OPF)
  • ISA Security Compliance Institute
  • Israeli Cyber Directorate
  • ITT Advanced Engineering Sciences Division
  • Japan Information - Technology Promotion Agency
  • Japanese Control System Security Centre (CSSC)
  • Japanese Defence Ministry
  • Japanese Internal Affairs and Communications Ministry
  • Japanese Internal Affairs and Communications Ministry
  • Japanese Ministry of Trade and Industry (METI)
  • Korea Communications Commission (KCC)
  • London Stock Exchange (LSE)
  • Morgridge Institute for Research
  • National Rural Telecommunications Cooperative
  • North Atlantic Treaty Organisation (NATO)
  • Northshore Utility District
  • Oak Ridge National Laboratory
  • Pacific NW National Laboratory
  • Purdue University
  • Rowland Water District
  • Russian Federal Security Bureau (FSB)
  • Rutgers University - New Brunswick Campus
  • Saudi Royal Commission for Jubail and Yanbu
  • Soon Chun Hyang University
  • South Korean Cyber Security Centre
  • South Korean Financial Supervisory Service
  • South Korean Ministry of Science and Technology
  • South Korean National Intelligence Service
  • Syrian Electronic Army
  • Tarrant Regional Water District (TRWD)
  • Tel Aviv Stock Exchange (TASE)
  • The Critical National Infrastructure Authority (CNIA) of Abu Dhabi
  • The Department of Homeland Security Science and Technology Directorate (DHS S&T)
  • The Electric Power Research Institute
  • The Grid Protection Alliance
  • The National Rural Electric Cooperative Association
  • The Trustees of Princeton University
  • The University of Alabama at Birmingham
  • The University of North Carolina at Chapel Hill
  • Trollmuhle
  • Trustees of Dartmouth College
  • Trustees of Indiana University
  • U.K. Environment Agency
  • U.K. Ministry of Defence (MOD)
  • U.S National Cyber Response Coordination Group (NCRCG)
  • U.S. 780th Military Intelligence Brigade
  • U.S. Air Force
  • U.S. Air Force Cyber Command
  • U.S. Air Force Cyber Command (AFCYBER)
  • U.S. Army
  • U.S. Army Corps of Engineers (USACE)
  • U.S. Army Forces Cyber Command
  • U.S. Army Intelligence and Security Command (INSCOM)
  • U.S. Army Network Enterprise Technology (NETCOM)
  • U.S. Central Command (CENTCOM)
  • U.S. Coast Guard
  • U.S. Computer Emergency Readiness Team
  • U.S. Cyber Command (CYBERCOM)
  • U.S. Defense Advanced Projects Research Agency (DARPA)
  • U.S. Defense Information Systems Agency
  • U.S. Department of Commerce
  • U.S. Department of Defense (DoD)
  • U.S. Department of Energy (DoE)
  • U.S. Department of Energy's National Nuclear Security Administration
  • U.S. Department of Homeland Security (DHS)
  • U.S. Department of Homeland Security Cyber Security Division (CSD)
  • U.S. Department of Homeland Security Industrial Control Systems Emergency Response Team (ICS-CERT)
  • U.S. Department of Homeland Security Science & Technology Directorate (DHS S&T)
  • U.S. Department of Public Works (DPW)
  • U.S. Department of Veteran's Affairs (VA)
  • U.S. Environmental Protection Agency (EPA)
  • U.S. Federal Bureau of Investigation (FBI)
  • U.S. Fleet Cyber Command (FLYTCYBERCOM)
  • U.S. Marine Corps
  • U.S. Marine Corps Cryptologic Support Battalion (MCSB)
  • U.S. Marine Corps Cyberspace Command
  • U.S. Marine Corps Network Operations Security Center (MCNOSC)
  • U.S. Metropolitan Water District (MWD)
  • U.S. National Critical Information Infrastructure Protection Center (NCIIPC)
  • U.S. National Cyber Security Division (NCSD)
  • U.S. National Institute of Standards and Technology (NIST)
  • U.S. National Protection and Programs Directorate (NPPD)
  • U.S. National Security Agency (NSA)
  • U.S. Naval Academy
  • U.S. Naval Network Warfare Command (NNWC)
  • U.S. Navy
  • U.S. Navy Cyber Defense Operations Command (NCDOC)
  • U.S. Navy Information Operation Command (NIOC)
  • U.S. Navy Naval Postgraduate School
  • U.S. Nuclear Regulatory Commission (NRC)
  • U.S. Office of Cyber Security and Communications
  • U.S. Signals Command (SC)
  • U.S. Strategic Command (STRATCOM)
  • University of California, San Diego
  • University of Illinois at Urbana-Champaign
  • University of Maryland
  • University of Southern California Information Sciences Institute
  • Waterford Township Department of Public Works
  • Wikileaks
  • Xian Jiaotong University
Back to Top