Cover Image
市場調查報告書

亞太地區的IIoT的網路安全的舉措:2016年

Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016

出版商 Frost & Sullivan 商品編碼 545455
出版日期 內容資訊 英文 101 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
亞太地區的IIoT的網路安全的舉措:2016年 Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016
出版日期: 2017年07月31日 內容資訊: 英文 101 Pages
簡介

本報告提供在東南亞 (SEA) 、澳洲 & 紐西蘭 (ANZ),為了改善工業場所中的安全,政府、民間組織實行的網路安全舉措相關資訊,網路安全的影響的製造領域、技術的發展,未來的安全重要性等相關分析。

第1章 摘要整理

第2章 市場概要

  • 亞太地區的網路安全
  • 市場概要:調查範圍、調查機關、地區
  • 市場概要:定義
  • 主要的調查項目
  • 市場概要:流通管道
  • 市場概要:流通管道的議論

第3章 外部環境的相關課題:促進要素、抑制因素

  • 市場成長的推動因素
  • 促進要素的說明
  • 市場成長的抑制因素
  • 抑制因素的說明
  • IIoT (工業IoT) 和網路安全

第4章 網路安全市場趨勢、IIoT支出

  • 市場工程檢測
  • IIoT的支出總額:SEA、ANZ
  • IIoT的支出總額:SEA、ANZ收益預測的議論

第5章 各國的網路安全舉措的主要的相關利益者:澳洲

  • 澳洲的網路安全的主要相關利益者
  • 網路安全舉措:澳洲
  • IIoT支出:澳洲

第6章 紐西蘭

  • 紐西蘭的網路安全的主要相關利益者
  • 網路安全舉措:紐西蘭
  • IIoT支出:紐西蘭

第7章 新加坡

第8章 馬來西亞

第9章 泰國、印尼

第10章 越南、菲律賓

第11章 亞太地區的網路安全的主要供應商

第12章 亞太地區的主要終端用戶標的

  • APT攻擊群組的主要終端用戶標的
  • 其他終端用戶的網路安全

第13章 電腦網路攻擊者使用的一般的技術

第14章 網路安全手法的設計、實施的重大的錯誤

  • 設計、實施的重大的錯誤
  • 工業場所的伺服器攻擊的漏洞、影響
  • IIoT的綜合性的網路安全解決方案

第15章 對在工業場所時的堅固的網路安全策略的階段

第16章 成長機會、企業趨勢

  • 產業網路安全生態系統的轉換
  • 成長機會1:數位全球安全
  • 成長機會2:ASEAN經濟共同體
  • 成功、成長的策略性的必需條件

第17章 IIoT生態系統的雲端安全

第18章 結論

第19章 附錄

目錄
Product Code: P958-10

Risks from Cybersecurity are Significantly Higher and Call for Collaboration between Governments and Private Sector

The study provides information on cybersecurity and the initiatives taken by governments and private organizations in Southeast Asia (SEA) and Australia & New Zealand (ANZ) to improve security in an industrial setting. It also considers the developments in the manufacturing space and technologies that will affect cybersecurity, besides focusing on the importance of security in the future.

Key Target Audience

  • Industrial automation and process control systems suppliers such as Honeywell, Rockwell Automation, Yokogawa, Siemens A.G, Schneider Electric
  • Cybersecurity solutions providers such as IBM, Cisco, Belden
  • Organizations offering niche services/solutions pertaining to cybersecurity

Research Scope

The study provides information on the initiatives taken by respective governments across Asia-Pacific to promote cybersecurity in a manufacturing environment that has been undergoing digitization. As there is a growing incidence of malware across critical installations, it is necessary to realize the level of vulnerability as it varies with each industry. This study discusses various end users targeted by malware based on the recent trends and the latest offerings from private participants. It also provides detailed information on critical errors in design and implementation of security and how companies must approach cybersecurity in the current scenario. These also help end users while approaching companies for cybersecurity solutions.

As Industrial Internet of Things (IIoT) is seen as a major contributor to efficiency and optimization, it is likely that related technologies will be adopted by the manufacturing industry. However, the risks associated also grow correspondingly, making it important for all stakeholders to understand the implications of a breach. The study also identifies the spending on key industries that are vital to IIoT deployment as well as those that are targeted by cyber attacks. Cloud security, being a major development in the way data is managed, has also been discussed.

Major drivers and restraints in the cybersecurity industry and the prevailing mindset toward foolproof security have also been discussed. As IIoT is closely tied to developments in security, the spending on IIoT will influence opportunities for cybersecurity in the region. It is also expected that investments in cybersecurity in the coming years will also influence, in part, the rate at which Southeast Asian countries move toward digitization. The study also calls for a collaborative approach between public/government bodies and the providers of cybersecurity solutions in the private sector, besides identifying why such measures are becoming important. The base year considered for the study is 2016.

Key Questions This Study Will Answer

  • 1. Which countries in the SEA and ANZ region are keen on adopting technologies that will be of interest to cybersecurity solutions providers?
  • 2. Who are the major market participants (both public and private) and what are the initiatives taken to ensure cybersecurity?
  • 3. Which end users in SEA and ANZ will be more vulnerable to cyber attacks?
  • 4. What are the major drivers and restraints in the IIoT and automation industry that will impact the adoption of cybersecurity?
  • 5. What are the typical errors committed while implementing a cybersecurity strategy and what should be the steps to ensure a successful implementation?

Table of Contents

1. EXECUTIVE SUMMARY

  • Executive Summary-Key Findings
  • Executive Summary-Market Engineering Measurements
  • Executive Summary-CEO's Perspective

2. MARKET OVERVIEW

  • Cybersecurity in Asia-Pacific
  • Market Overview-Research Scope, Study Period, and Regions
  • Market Overview-Definitions
  • Market Overview-Definitions (continued)
  • Key Questions This Study Will Answer
  • Market Overview-Distribution Channels
  • Market Overview-Distribution Channel Discussion
  • Market Overview-Distribution Channel Discussion (continued)

3. EXTERNAL CHALLENGES-DRIVERS AND RESTRAINTS

  • Market Drivers
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Market Restraints
  • Restraints Explained
  • Restraints Explained (continued)
  • IIoT and Cybersecurity

4. CYBERSECURITY MARKET TRENDS AND IIOT SPENDING

  • Market Engineering Measurements
  • Total Spending on IIoT-SEA and ANZ
  • Total Spending on IIoT-SEA and ANZ Revenue Forecast Discussion

5. MAJOR STAKEHOLDERS OF CYBERSECURITY AND INITIATIVES BY COUNTRY-AUSTRALIA

  • Major Stakeholders of Cybersecurity in Asia-Pacific-Australia
  • Cybersecurity Initiatives-Australia
  • Spending on IIoT-Australia

6. NEW ZEALAND

  • Major Stakeholders of Cybersecurity in Asia-Pacific-New Zealand
  • Cybersecurity Initiatives-New Zealand
  • Spending on IIoT-New Zealand

7. SINGAPORE

  • Major Stakeholders of Cybersecurity in Asia-Pacific- Singapore
  • Cybersecurity Initiatives-Singapore
  • Cybersecurity Initiatives-Singapore (continued)
  • Spending on IIoT-Singapore

8. MALAYSIA

  • Major Stakeholders of Cybersecurity in Asia-Pacific- Malaysia
  • Major Stakeholders of Cybersecurity in Asia-Pacific- Malaysia (continued)
  • Cybersecurity Initiatives-Malaysia
  • Cybersecurity Initiatives-Malaysia (continued)
  • Spending on IIoT-Malaysia

9. THAILAND AND INDONESIA

  • Major Stakeholders of Cybersecurity in Asia-Pacific-Thailand and Indonesia
  • Cybersecurity Initiatives-Thailand
  • Spending on IIoT-Thailand
  • Cybersecurity Initiatives-Indonesia
  • Spending on IIoT-Indonesia

10. VIETNAM AND THE PHILIPPINES

  • Major Stakeholders of Cybersecurity in Asia-Pacific-Vietnam and the Philippines
  • Cybersecurity Initiatives-Vietnam
  • Cybersecurity Initiatives-The Philippines
  • Spending on IIoT-The Philippines

11. MAJOR SUPPLIERS OF CYBERSECURITY SOLUTIONS IN ASIA-PACIFIC

  • Major Suppliers of Industrial Cybersecurity Solutions
  • Major Suppliers of Industrial Cybersecurity Solutions (continued)
  • Major Suppliers of Industrial Cybersecurity Solutions (continued)
  • Major Suppliers of Industrial Cybersecurity Solutions (continued)
  • Major Suppliers of Industrial Cybersecurity Solutions (continued)
  • Major Suppliers of Industrial Cybersecurity Solutions (continued)

12. KEY END-USER TARGETS IN ASIA-PACIFIC

  • Key End-user Targets for Advanced Persistent Threat (APT) Groups
  • Key End-user Targets for Advanced Persistent Threat (APT) Groups (continued)
  • Cybersecurity in Other End Users
  • Cybersecurity in Other End Users (continued)
  • Cybersecurity in Other End Users (continued)

13. COMMON TECHNIQUES DEPLOYED BY CYBER ATTACKERS

  • Common Techniques Deployed by Cyber Attackers
  • Common Techniques Deployed by Cyber Attackers (continued)
  • Common Techniques Deployed by Cyber Attackers (continued)

14. CRITICAL ERRORS IN DESIGN AND IMPLEMENTATION OF CYBERSECURITY MEASURES

  • Critical Errors in Design and Implementation
  • Critical Errors in Design and Implementation (continued)
  • Vulnerabilities and Implications of a Cyber Attack in an Industrial Setting
  • Holistic Cybersecurity Solutions for IIoT

15. STEPS TO A ROBUST CYBERSECURITY STRATEGY IN AN INDUSTRIAL SETTING

  • Steps to Ensure Robust Cybersecurity in an Industrial Setting
  • Steps to Ensure Robust Cybersecurity in an IndustrialSetting (continued)
  • Steps to Ensure Robust Cybersecurity in an IndustrialSetting (continued)

16. GROWTH OPPORTUNITIES AND COMPANIES TO ACTION

  • Transformation in Industrial Cybersecurity Ecosystem
  • Growth Opportunity 1-Security in a Digital World
  • Growth Opportunity 2-ASEAN Economic Community
  • Strategic Imperatives for Success and Growth

17. CLOUD SECURITY IN IIOT ECOSYSTEM

  • Cloud Security in IIoT Ecosystem
  • Cloud Security in IIoT Ecosystem (continued)
  • Cloud Security in IIoT Ecosystem (continued)

18. THE LAST WORD

  • The Last Word-Predictions
  • Legal Disclaimer

19. APPENDIX

  • List of Market Participants
  • Learn More-Next Steps
Back to Top