表紙:スマートシティ向けサイバーセキュリティ:データセキュリティ・デバイス&エンドポイントセキュリティ・ネットワークセキュリティ&コントロール
市場調査レポート
商品コード
1024074

スマートシティ向けサイバーセキュリティ:データセキュリティ・デバイス&エンドポイントセキュリティ・ネットワークセキュリティ&コントロール

Cybersecurity for Smart Cities: Data Security, Device and Endpoint Security, and Network Security and Controls

出版日: | 発行: Guidehouse Insights (formerly Navigant Research) | ページ情報: 英文 72 Pages; 33 Tables, Charts & Figures | 納期: 即納可能 即納可能とは

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=115.12円
スマートシティ向けサイバーセキュリティ:データセキュリティ・デバイス&エンドポイントセキュリティ・ネットワークセキュリティ&コントロール
出版日: 2021年08月20日
発行: Guidehouse Insights (formerly Navigant Research)
ページ情報: 英文 72 Pages; 33 Tables, Charts & Figures
納期: 即納可能 即納可能とは
  • 全表示
  • 概要
  • 図表
  • 目次
概要

スマートメーター、スマート照明、インテリジェントビル、モビリティなど、スマートシティのアプリケーションや技術は、IoT技術をインフラやサービス、建築環境に組み込むことで、利便性や協調性を提供しています。しかし公共ネットワーク上で相互接続されたデバイスなどを新規あるいは既存のインフラに組み込むことで、脅威の攻撃対象は増加します。これらのシステムはますます複雑化していることから、サイバーセキュリティのベストプラクティス、潜在的なリスクによる影響の分析、インシデント対応能力の確立などが必要とされています。

当レポートでは、スマートシティ向けサイバーセキュリティの市場を調査し、スマートシティの概要、市場推進因子と課題、主要技術とイノベーションの動向、ベストプラクティス、関連法規制・標準規格、主要企業の取り組み、産業・地域別の収益規模の予測、各種提言などをまとめています。

第1章 エグゼクティブサマリー

第2章 市場分析

  • スマートシティの概要
  • サイバーセキュリティの概要・ベストプラクティス
  • 重要インフラ向けサイバーセキュリティ
  • サイバーセキュリティのベストプラクティス
  • スマートシティのサイバーセキュリティポイント
    • データセキュリティ
    • デバイス・エンドポイントセキュリティ
    • ネットワークセキュリティ
  • リスク管理
  • 市場推進因子
  • 市場の障壁

第3章 技術動向

  • スマートシティ保護のためのイノベーション
    • SASE
    • AI・アドバンスドアナリティクス
    • 自動化サイバーセキュリティ
    • デジタルツイン
    • バイオメトリクス
    • ブロックチェーン
    • 量子コンピューティング
  • フレームワーク・標準規格
    • NIST
    • ISA・IEC62443
    • ENISA
    • ISO・IECTS 27570
    • その他

第4章 主要企業

  • Armis
  • Bitdefender
  • Check Point Software Technologies
  • Cisco Systems
  • CrowdStrike
  • Cybereason
  • Darktrace
  • Forescout Technologies
  • Fortinet
  • IBM
  • Kaspersky
  • McAfee
  • Microsoft Corporation
  • Mocana
  • Nokia
  • Palo Alto Networks
  • Tenable
  • Trend Micro

第5章 市場予測

  • 世界市場の展望
  • 北米
  • 欧州
  • アジア太平洋
  • ラテンアメリカ
  • 中東・アフリカ

第6章 総論・提言

  • 都市
  • セキュリティベンダー
  • 政府

第7章 頭字語・略語リスト

第8章 目次

第9章 図表

第10章 調査範囲・情報源・調査手法・注記

図表

LIST OF CHARTS AND FIGURES

  • Smart City Cybersecurity Revenue by Region, World Markets: 2021-2030
  • Smart City Data Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, North America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Europe: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Latin America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Supplier Ecosystem
  • Example of the Cyber Kill Chain Steps
  • ICS Cybersecurity Product Types
  • Network Segmentation and Zero Trust Example
  • Smart City Common Networks and Communications Protocol

LIST OF TABLES

  • Smart City Cybersecurity Revenue by Region, World Markets: 2021-2030
  • Smart City Data Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, World Markets: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, North America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Europe: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Latin America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Data Security Revenue by Industry, North America: 2021-2030
  • Smart City Data Security Revenue by Industry, Europe: 2021-2030
  • Smart City Data Security Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Data Security Revenue by Industry, Latin America: 2021-2030
  • Smart City Data Security Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, North America: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Europe: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Latin America: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Applications and Technologies
目次
Product Code: MO-CSSC-21

Smart city applications and technologies-the world of smart meters, smart lighting, intelligent buildings, mobility, and more-provide convenience and coordination by embedding Internet of Things (IoT) technology into infrastructure, services, and built environments. Building more devices, applications, and technologies that are connected to one another on public networks into new and existing infrastructures increases the attack surface for threat actors. These systems of systems are increasingly complex and require cybersecurity best practices, impact assessments for potential failure or compromise, and the establishment of incident response capabilities.

The stakeholder community for cybersecurity among smart cities is vast, including the entire smart city supplier ecosystem; federal, state, and local governments; leading management consulting firms; industrial engineering and manufacturing firms; enterprise hardware and software security vendors; and niche startups hoping to capture unique segments of the smart cities market. There is an opportunity to bridge the gap between the decentralized nature of city business management and finance and the need for centralized security risk management and controls for technology projects.

This Guidehouse Insights report covers the current state of cybersecurity for smart cities technologies-a patchwork of endpoint and data security, device and endpoint security, and network security solutions. Cybersecurity vendors with various platforms and service models already compete for small city IT budgets at the municipal level. Smart city applications and technologies are relatively limited to pilot projects and staggered rollouts, though deployments are germinating around the globe. Smart city ecosystems are made up of sensors and devices, mobile applications, cloud infrastructures, and network communications. The ubiquity of billions of simple computing devices that transfer and transmit data over networks is driven by an assumption that security is built into smart products and devices.

KEY QUESTIONS ADDRESSED:

  • What are the main drivers of cybersecurity for smart city applications and technologies?
  • Who is responsible for cybersecurity in smart cities?
  • What value-add or revenue-generating features can be built into cybersecurity products and solutions?
  • Who are the main stakeholders for cybersecurity risk management and controls across smart city developments?
  • How do you build a mature and robust cybersecurity program in and across smart cities?

WHO NEEDS THIS REPORT:

  • OEMs
  • Telecommunications providers
  • IoT hardware providers
  • Connected system software vendors
  • Smart city application developers
  • Cybersecurity vendors
  • Municipal governments
  • Federal governments
  • Management consultancies
  • Industry associations for smart cities
  • Industry associations for cybersecurity
  • Industry associations for IoT and connected devices
  • Investor community

Table of Contents

1. Executive Summary

  • 1.1. Smart City Developments
  • 1.2. Current State of Smart City Cybersecurity
  • 1.3. Global Outlook

2. Market Issues

  • 2.1. Smart City Overview
    • 2.1.1. Smart City Supplier Ecosystem
      • 2.1.1.1. Trends in Smart City Industries
  • 2.2. Cybersecurity Overview and Best Practices
    • 2.2.1. Cyber Threat Landscape
    • 2.2.2. Threat Actors
    • 2.2.3. Cyberattack Types
      • 2.2.3.1. Man-in-the-Middle Attacks
      • 2.2.3.2. Malware and Ransomware
        • 2.2.3.2.1. Atlanta Ransomware Attack
      • 2.2.3.3. Distributed Denial-of-Service Attacks
        • 2.2.3.3.1. The Mirai Botnet
  • 2.3. Cybersecurity for Critical Infrastructure
  • 2.4. Cybersecurity Procedural Best Practices
    • 2.4.1. Zero Trust
    • 2.4.2. Segmentation
    • 2.4.3. Whitelisting
  • 2.5. Cybersecurity Staples in Smart Cities
    • 2.5.1. Data Security
    • 2.5.2. Device and Endpoint Security
    • 2.5.3. Network Security
  • 2.6. Risk Management
    • 2.6.1. Controls
    • 2.6.2. Detection
    • 2.6.3. Response
  • 2.7. Market Drivers
    • 2.7.1. Increase in Technologies and Connectivity
    • 2.7.2. Rising Number and Cost of Attacks
    • 2.7.3. Data Integration and Management
    • 2.7.4. Insurance Coverage
  • 2.8. Market Barriers
    • 2.8.1. Cost and ROI
    • 2.8.2. Complexity and Scalability
    • 2.8.3. Legacy Technologies and OT Integration
    • 2.8.4. Lack of Personnel and Awareness

3. Technology Issues

  • 3.1. Innovations for Securing Smart Cities
    • 3.1.1. Secure Access Service Edge
    • 3.1.2. AI and Advanced Analytics
      • 3.1.2.1. Predictive Analytics and Maintenance
    • 3.1.3. Automated Cybersecurity
    • 3.1.4. Digital Twins
    • 3.1.5. Biometrics
    • 3.1.6. Blockchain
    • 3.1.7. Quantum Computing
  • 3.2. Frameworks and Standards
    • 3.2.1. NIST
    • 3.2.2. International Society of Automation and IEC 62443
    • 3.2.3. The European Union Agency for Cybersecurity
    • 3.2.4. ISO and IEC TS 27570
    • 3.2.5. Additional Frameworks and Standards

4. Key Industry Players

  • 4.1. Armis
  • 4.2. Bitdefender
  • 4.3. Check Point Software Technologies
  • 4.4. Cisco Systems
  • 4.5. CrowdStrike
  • 4.6. Cybereason
  • 4.7. Darktrace
  • 4.8. Forescout Technologies
  • 4.9. Fortinet
  • 4.10. IBM
  • 4.11. Kaspersky
  • 4.12. McAfee
  • 4.13. Microsoft Corporation
  • 4.14. Mocana
  • 4.15. Nokia
  • 4.16. Palo Alto Networks
  • 4.17. Tenable
  • 4.18. Trend Micro

5. Market Forecasts

  • 5.1. Global Outlook
  • 5.2. North America
  • 5.3. Europe
  • 5.4. Asia Pacific
  • 5.5. Latin America
  • 5.6. Middle East & Africa

6. Conclusions and Recommendations

  • 6.1. Cities
  • 6.2. Security Vendors
  • 6.3. National Governments

7. Acronym and Abbreviation List

8. Table of Contents

9. Table of Charts and Figures

10. Scope of Study, Sources and Methodology, Notes