株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

自動車向けサイバーセキュリティの世界市場:タイプ・地域・ベンダー別の市場予測・市場シェア・市場動向

Global Market for Cyber Security of Cars - By Type, Geography and Vendors Forecasts, Shares and Trends (2016-2021)

発行 Mordor Intelligence LLP 商品コード 353419
出版日 ページ情報 英文 190 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=115.27円で換算しております。
Back to Top
自動車向けサイバーセキュリティの世界市場:タイプ・地域・ベンダー別の市場予測・市場シェア・市場動向 Global Market for Cyber Security of Cars - By Type, Geography and Vendors Forecasts, Shares and Trends (2016-2021)
出版日: 2016年09月01日 ページ情報: 英文 190 Pages
概要

コネクテッドカーの購入希望者の多くは、そのコストは別として、サイバーセキュリティシステムの脆弱性を最大の懸念事項と考えています。2018年のコネクテッドカー市場の規模は426億米ドルと予測されており、2015年から2020年にかけて、その収益規模は4倍に拡大する見通しです。コネクテッドカー向けサイバーセキュリティの市場もこれに伴って成長し、2020年にかけてのCAGR (複合年間成長率) は約15%となる見通しです。

当レポートでは、世界の自動車向けサイバーセキュリティの市場について調査し、市場背景、市場成長への影響因子の分析、産業構造とバリューチェーン、関連政策、自動車向けサイバーセキュリティの各種技術、技術区分および地域別の市場予測・市場シェア分析、アナリストによる見解、競合環境と主要ベンダーのプロファイル、投資分析などをまとめています。

第1章 イントロダクション

第2章 エグゼクティブサマリー

第3章 市場分析

  • 市場概況
  • 成長成長推進因子
  • 市場成長阻害因子
  • バリューチェーン分析
  • 産業の魅力:ポーターのファイブフォース分析
  • 現在の市場機会
  • 産業関連政策

第4章 技術概要

  • 技術概要
  • 自動車向けサイバーセキュリティ技術の各種タイプ
    • ソフトウェア
    • ハードウェア
  • 今後の新しい技術

第5章 自動車向けサイバーセキュリティ市場:タイプ別

  • ソフトウェア
    • イントロダクション
    • 市場シェア・市場予測
    • アナリストの見解
  • ハードウェア
    • イントロダクション
    • 市場シェア・市場予測
    • アナリストの見解

第6章 自動車向けサイバーセキュリティ市場:地域別

  • 北米
    • 概要
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • アナリストの見解
  • 欧州
    • 概要
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • アナリストの見解
  • アジア太平洋
    • 概要
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • アナリストの見解
  • その他の地域
    • 概要
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • ソフトウェアベースのサイバーセキュリティ技術:市場シェア・市場予測
    • アナリストの見解

第7章 競合情報:主要ベンダーの分析

  • Cisco
  • Verizon
  • Arilou
  • Tesla Motors
  • Telenor
  • HARMAN
  • Argus Cyber Security
  • Infineon Technologies AG
  • Elektrobit
  • Visteon
    • 概要
    • 製品・サービス
    • 財務動向
    • 近年の発展動向

第8章 投資分析

  • 近年の投資動向
  • 投資家の展望

第9章 自動車向けサイバーセキュリティ技術の将来性

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次

The market for connected cars is estimated to be worth USD 42.6 billion by 2018 by GSMA estimates and revenues of the same are expected to increase four-fold between 2015 and 2020. In light of this, the market for cybersecurity for connected cars is set to increase. The global market for cybersecurity for cars was estimated to be worth USD 16.85 Million in 2015 and is expected to grow to USD 1166.14 million by the end of 2020, at a CAGR of 102.62%. In the coming five years, increasing smartphone penetration, growing internet use and adoption of countless wireless connectivity solutions will bring in new opportunities for products and services that will enable the connected car market to come to fruition.

The connected cars are able to digitally connect and interact with their surroundings; not only including connectivity with other cars (vehicle-to-vehicle) but also with infrastructure (vehicle-to-infrastructure) and other devices (vehicle-to-devices). This has brought in new suites of application such as advanced safety features, personalized driving and entertainment experiences and even autonomous driving.

The internet of things (IoT) has pervaded all spheres of life most frequently in use. These include deployment of components that connect homes and units of transportation. Being connected online gives homes and cars the benefit of security from physical intruders, in a number of ways like auto alerting and auto calling authorities. However, this very ecosystem of connectivity deployed leaves both homes and cars open to security risks by another group of burglars a€" cyber criminals.

Although connected cars have not yet become mainstream, with most regions still experimenting with prototypes of various functionalities, an increasing number of connected cars are being purchased. They are purchased for features like enhanced GPS location and maintenance, live recording and reminders, Wi-Fi services, and fuel-efficiency.

Cybersecurity Market- Drivers

  • High level of research in fending off malware
  • Auto-correction of defunct components of the integrated software in connected cars
  • Increased funding for the same
  • Increased interest from all automobile manufacturers
  • Connected car add-on component manufacturers in the security of cars

However, limited ability to keep up with the evolving methods and scenario in cybersecurity and lack of effective integration into connected cars devices are some of the issues that form the bottlenecks in this market.

Some of the key functions that come under cybersecurity are the prevention of assaults on service components of the V2IoT or Vehicle to Internet of Things, jamming of signals (gadgets that do this are shabby and conveniently acquired), and prevention of transmission of counterfeit information to other connected cars, as well as their operators. As the market expands, the ecosystem for connected cars is also expected to come under the purview of cybersecurity as metro cities accommodating connected cars (called smart-cities) will have information disseminating docks which could potentially be affected by malware. Motives for cyber threat for connected cars could include theft of freights, malice and burglary.

The global market for cybersecurity of cars has been segmented by different types of software-based and hardware-based services. The market has also been segmented by regions i.e. North America, Europe, Asia-Pacific and Rest of the World.

Some of the key players mentioned in the report are:

  • Argus Cyber Security
  • Cisco
  • Infineon Technologies AG
  • Telenor
  • Tesla Motors
  • Verizon
  • Visteon

Key Deliverables in the Study:

  • Market analysis for the global market for cybersecurity of cars with region specific assessment and competition analysis on the global and regional scale.
  • Market definition along with the identification of key drivers and restraints.
  • Identification of factors instrumental in changing the market scenario and rising prospective opportunities, along with identification of key companies that can influence this market on a global and regional scale.
  • Extensively researched competitive landscape section with profiles of major companies along with their market share.
  • Identification and analysis of the macro and micro factors that affect the global market for cybersecurity of cars on both global and regional scale.
  • A comprehensive list of key market players along with the analysis of their current strategic interests and key financial information.
  • A wide-ranging knowledge and insights about the major players in this industry and the key strategies adopted by them to sustain and grow in the studied market.
  • Insights on the major countries/regions in which this industry is blooming and to also identify the regions that are still untapped.

Table of Contents

1. Introduction

  • 1.1. Key Study Deliverables
  • 1.2. Study Assumptions
  • 1.3. Market Definition
  • 1.4. Key Findings of the Study

2. Research Approach and Methodology

3. Market Dynamics

  • 3.1. Market Overview
  • 3.2. Factors Driving the Market
    • 3.2.1. Increasing demand for Connected Cars and Consumers Attention to Cyber Security
    • 3.2.2. Regulations and Standards
    • 3.2.3. Increasing Adaption of ADAS and Approaching Era to Autonomous Vehicles
  • 3.3. Factors Restraining the Market
    • 3.3.1. Time Taking Process - To integrate perfeclty and to retrofit into existing cars
    • 3.3.2. Diverse Nature of the Market
  • 3.4. Oppurtunities
    • 3.4.1. Use of Autonomous Cars to drive around people in Olympics 2020 - Tokyo
    • 3.4.2. Increasing Cloud Services and Mobile Applications
  • 3.5. Industry Value Chain Analysis
  • 3.6. Industry Attractiveness - Porter's Five Forces
    • 3.6.1. Bargaining Power of Suppliers
    • 3.6.2. Bargaining Power of Consumers
    • 3.6.3. Threat of New Entrants
    • 3.6.4. Threat of Substitute Products or Services
    • 3.6.5. Competitive Rivalry among Existing Competitors
  • 3.7. Cyber Security Standards and Initiatives
    • 3.7.1. Standards
      • 3.7.1.1. ISO 26262
      • 3.7.1.2. SAE J2980
      • 3.7.1.3. SAE J3061
    • 3.7.2. Initiatives by US
      • 3.7.2.1. SPY Car Act
      • 3.7.2.2. Work done by National Highway Traffic Safety Administration (NHTSA) and Federal Trade Commission (FTC)
      • 3.7.2.3. NIST Cybersecurity Framework
    • 3.7.3. Other Initiatives
      • 3.7.3.1. EVITA Project
      • 3.7.3.2. Trusted Platform Module (TPM)
      • 3.7.3.3. Secure Hardware Extension Specificiation

4. Technology Overview

  • 4.1. Technology Snapshot
  • 4.2. Cyber Security Technologies for Cars
    • 4.2.1. Software Based Technologies
    • 4.2.2. Hardware Based Technologies
    • 4.2.3. Upcoming Technologies
  • 4.3. Automotive Security Evaluations
    • 4.3.1. Theoretical Automotive Security Testing
    • 4.3.2. Practical Automotive Security Testing
      • 4.3.2.1. Functional Testing
      • 4.3.2.2. Vulnerability Scanning
      • 4.3.2.3. Fuzzing
      • 4.3.2.4. Penetration Testing
      • 4.3.2.4.1. Black Box Testing
      • 4.3.2.4.2. White Box Testing
      • 4.3.2.4.3. Grey Box Testing
  • 4.4. Types of Attack Points in Cars
    • 4.4.1. Telematics
    • 4.4.2. Infotainment
    • 4.4.3. OBD
    • 4.4.4. ECU
    • 4.4.5. Communication Systems (Sensors, USB, Bluetooth, Passive Keyless Entry, Remote Key, TPMS)
    • 4.4.6. Applications (Smartphone and Remotelink type)

5. Global Cyber Security for Cars - Segmented by Type of Solution

  • 5.1. Software based
  • 5.2. Hardware based
  • 5.3. Professional Services
  • 5.4. Integration
  • 5.5. Others (physical securing, operational services, managing critical services et al)

6. Global Cyber Security for Cars - Segmented by Type of Security

  • 6.1. Network Security
  • 6.2. Application Security
  • 6.3. Cloud Security
  • 6.4. Others (Data and Wireless)

7. Global Cyber Security for Cars - Segmented by Geography

  • 7.1. United States
  • 7.2. Europe
  • 7.3. Japan
  • 7.4. Rest of the World

8. Competitive Intelligence - Company Profiles

  • 8.1. Security Providers
    • 8.1.1. Argus Cyber Security
    • 8.1.2. TowerSec (Harman International Industries Inc.)
    • 8.1.3. Delphi Automotive Plc
    • 8.1.4. Arilou Technologies
    • 8.1.5. Escrypt Embedded Systems
    • 8.1.6. Visteon
    • 8.1.7. Continental AG
    • 8.1.8. Infineon Technologies AG
    • 8.1.9. Cisco Systems Inc
    • 8.1.10. Intel Corporation
    • 8.1.11. Secunet AG
    • 8.1.12. Trillium Inc
    • 8.1.13. Karamba Security
    • 8.1.14. Lear Corporation
    • 8.1.15. NXP Semiconductors

9. Investment Analysis

  • 9.1. Recent Investments
  • 9.2. Investor Outlook

10. Future of Cyber Security for Cars

Back to Top