Cover Image
市場調查報告書

普及運算、IoT的網路安全的風險企業投資

Cybersecurity Venture Investment in Pervasive Computing and the IoT

出版商 Lux Research 商品編碼 357147
出版日期 內容資訊 英文 18 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
普及運算、IoT的網路安全的風險企業投資 Cybersecurity Venture Investment in Pervasive Computing and the IoT
出版日期: 2016年04月13日 內容資訊: 英文 18 Pages
簡介

本報告提供網路安全的風險企業投資調查分析,現狀與未來發展預測相關的系統性資訊。

摘要整理

形勢

  • 連接性滲透數位、網實整合的側面,以新的策略保護IoT生態系統

分析

  • 77家網實整合新興企業評估,過去16年的風險企業投資採購8億800萬美元

圖表

目錄

Connected cars, smart homes, future factories, and intelligent cities offer huge new opportunities for malicious actors. As computing pervades every area of personal and industrial space, vulnerabilities arise faster than firms can find and patch them, so venture capitalists are investing in new cyberphysical security entrants with new solutions - reaching $228 million in 2015, up 78% from the prior year. We expect investment to increase significantly, to as much as $400 million in 2016, as the landscape of problems and proposed solutions is still expanding, along with known risks that can't currently be closed. Israel's security innovation cluster has been the source of several leading technologies, and should figure into any firm's IoT security strategy.

EXECUTIVE SUMMARY

LANDSCAPE

Connectivity permeates digital and physical aspects of modern industry, creating weaknesses and attack surfaces for malicious actors. New strategies seek to secure the IoT ecosystem.

ANALYSIS

We assessed 77 cyberphysical security startups, which raised just $808 million in venture capital over the past 16 years. Many funding methods are available, but VCs are waking up.

TABLE OF FIGURES

  • Figure 1: Graphic Wildly, Hilariously Boundless Unpatchable IoT Security Leaves Experts Unimpressed
  • Figure 2: Graphic Cyberphysical Security Requires an Intersection of Attack Surfaces, Exploit Types, and Countermeasures
  • Figure 3: Graphic
  • Figure 4: Graphic Technical and Nontechnical Vulnerabilities in Cyberphysical Systems
  • Figure 5: Graphic Countermeasures Span the Digital and Physical Realms
  • Figure 6: Table Established Players Offering Cyberphysical Security Solutions
  • Figure 7: Graphic Venture Investment in Cyberphysical Security by Year
  • Figure 8: Graphic Number of Companies in Cyberphysical Security by Country of Startup HQ
  • Figure 9: Graphic Network and Device Behavior Analysis, and Access Management are Top Countermeasure Methods
Back to Top