Cover Image
市場調查報告書

重要基礎設施安全的全球市場:醫療

Critical Infrastructure Security: Healthcare

出版商 ABI Research 商品編碼 325147
出版日期 內容資訊 英文 20 Pages
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
Back to Top
重要基礎設施安全的全球市場:醫療 Critical Infrastructure Security: Healthcare
出版日期: 2015年02月24日 內容資訊: 英文 20 Pages
簡介

個人的健康資訊保護在北美和被歐洲立法化,另一方面重要基礎設施的醫療在網路安全引進中決定性落後。最近安全隨著屢次大規模的資料侵害報導而浮上檯面。醫院的網路和雲端應用,連接醫療設備的漏洞,仍為更大的問題。

本報告提供醫療界的網路安全的現狀,該領域活動的各種機關的支出,及著眼影響擴大的新的及崛起中的網路安全技術。

第1章 屢次受資料侵害而損壞功能的醫療界

  • 2010年之後,年度上升到數百萬件的病歷資訊侵害事件
  • 個人的健康資訊:重要的商品
  • 醫療界的數位化:電子病歷(EHR)
  • 規定、法規遵守的配合措施
  • 全國規模的指南、資訊共享網
  • 安全引進往往落後的健康資訊技術
  • 潛藏在下一代健康技術的可能性和危險性
  • 雲端運算的弊病
  • 網路安全的風險管理配合措施

第2章 未成熟市場的巨大發展性

  • 方法論
  • 太低的網路安全支出
  • 垂直支出模式
  • 資料、設備、工具的保護
  • 轉向了下一代資訊技術中今後醫療機關的注意事項
  • 加密的必要性:但該選什麼
  • 地區層級的支出

第3章 各專門領域的商機

  • Bluewater International
  • FireHost
  • ID Experts
  • Medical Identity Fraud Alliance
  • NetFortris
  • TrueVault
目錄
Product Code: AN-1411

Healthcare as a critical infrastructure is severely lagging behind in cybersecurity implementation, despite the existence of specific data protection legislation for personal health information in North America and Europe. Security is only recently starting to come to the forefront, with massive data breaches constantly making the news. Of even greater concern are vulnerabilities in hospital networks, cloud applications, and connected medical devices. This report looks at the current state of cybersecurity within the healthcare industry, spending by the various organizations present in this sector, and the new and emerging cybersecurity technologies making waves.

Table of Contents

1. RELENTLESS DATA BREACHES CRIPPLING HEALTHCARE INDUSTRY1.1. Annual Breached Health Records in the Millions since 2010

  • 1.2. Personal Health Information: A Valuable Commodity
  • 1.3. Digitization of the Industry: EHR
  • 1.4. Regulatory and Compliance Efforts
  • 1.5. National Guidance and Information Sharing Networks
  • 1.6. Health IT Slow to Incorporate Security
  • 1.7. Potential and Pitfalls for Next-generation Health Technologies
  • 1.8. Cloud Computing Complications
  • 1.9. Addressing Risk Management through Cybersecurity

2. HUGE POTENTIAL FOR AN IMMATURE MARKET2.1. Methodology

  • 2.2. Cybersecurity Spending Too Low
  • 2.3. Vertical Spending Patterns
  • 2.4. Protection of Data, Devices, and Tools
  • 2.5. Future Considerations for Healthcare Organizations in Next-generation Health IT
  • 2.6. Encryption Required: But Which One?
  • 2.7. Regional-level Spending

3. FRAGMENTED OPPORTUNITIES3.1. Bluewater International

  • 3.2. FireHost
  • 3.3. ID Experts
  • 3.4. Medical Identity Fraud Alliance
  • 3.5. NetFortris
  • 3.6. TrueVault

Tables

  • 1.Healthcare CI Security Spending , World Market, Forecast: 2012 to 2020
  • 2.Healthcare CI Security Spending by Sector, World Market, Forecast: 2012 to 2020
  • 3.Healthcare CI Security Spending by Type, World Market, Forecast: 2012 to 2020
  • 4.Healthcare CI Security Spending by Region, Regional Markets, Forecast: 2012 to 2020
  • 5.Healthcare CI Security Spending by Country, Country Markets, Forecast: 2013 to 2020

Charts

  • 1.Healthcare Critical Infrastructure Security Spending by Vertical, World Market, Forecast: 2012 to 2020
  • 2.Healthcare Critical Infrastructure Security Spending by Type , World Market, Forecast: 2012 to 2020
  • 3.Healthcare Critical Infrastructure Security Spending by Region , World Market, Forecast: 2012 to 2020
Back to Top