Cover Image
市場調查報告書

汽車用網路安全的全球市場:類型·地區·各供應商的市場預測·市場佔有率·市場趨勢 (2015-2020年)

Global Market for Cyber Security of Cars - By Type, Geography and Vendors Forecasts, Shares and Trends (2016-2021)

出版商 Mordor Intelligence LLP 商品編碼 353419
出版日期 內容資訊 英文 190 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
汽車用網路安全的全球市場:類型·地區·各供應商的市場預測·市場佔有率·市場趨勢 (2015-2020年) Global Market for Cyber Security of Cars - By Type, Geography and Vendors Forecasts, Shares and Trends (2016-2021)
出版日期: 2016年09月01日 內容資訊: 英文 190 Pages
簡介

許多考慮購買聯網汽車的消費者,除了成本之外擔心都是安全系統的漏洞等問題。2018年的聯網汽車市場規模預測為426億美元,2015年到2020年其收益規模預測將擴大到四倍。聯網汽車網路安全市場也隨之而成長,預測到2020年前之年複合成長率 (CAGR) 將為約15%。

本報告提供全球汽車用網路安全的市場相關調查,提供您市場背景,影響市場成長因素分析,產業結構與價值鏈,相關政策,汽車用網路安全的各種技術,技術區分及地區別的市場預測·市場佔有率分析,分析師的見解,競爭環境與主要供應商簡介,投資分析等彙整資料。

第1章 簡介

第2章 摘要整理

第3章 市場分析

  • 市場概況
  • 成長成長推進因素
  • 市場成長的阻礙要素
  • 價值鏈分析
  • 產業的魅力:波特的五力分析
  • 現在的市場機會
  • 產業相關政策

第4章 技術概要

  • 技術概要
  • 汽車用網路安全技術的各種類型
    • 軟體
    • 硬體設備
  • 今後新的技術

第5章 汽車用網路安全市場:各類型

  • 軟體
    • 簡介
    • 市場佔有率·市場預測
    • 分析師的見解
  • 硬體設備
    • 簡介
    • 市場佔有率·市場預測
    • 分析師的見解

第6章 汽車用網路安全市場:各地區

  • 北美
    • 概要
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 分析師的見解
  • 歐洲
    • 概要
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 分析師的見解
  • 亞太地區
    • 概要
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 分析師的見解
  • 其他地區
    • 概要
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 軟體為基礎的網路安全技術:市場佔有率·市場預測
    • 分析師的見解

第7章 競爭資訊:主要供應商分析

  • Cisco
  • Verizon
  • Arilou
  • Tesla Motors
  • Telenor
  • HARMAN
  • Argus Cyber Security
  • Infineon Technologies AG
  • Elektrobit
  • Visteon
    • 概要
    • 產品與服務
    • 財務趨勢
    • 近幾年的發展趨勢

第8章 投資分析

  • 近幾年的投資趨勢
  • 投資者的展望

第9章 汽車用網路安全技術的未來性

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

The market for connected cars is estimated to be worth USD 42.6 billion by 2018 by GSMA estimates and revenues of the same are expected to increase four-fold between 2015 and 2020. In light of this, the market for cybersecurity for connected cars is set to increase. The global market for cybersecurity for cars was estimated to be worth USD 16.85 Million in 2015 and is expected to grow to USD 1166.14 million by the end of 2020, at a CAGR of 102.62%. In the coming five years, increasing smartphone penetration, growing internet use and adoption of countless wireless connectivity solutions will bring in new opportunities for products and services that will enable the connected car market to come to fruition.

The connected cars are able to digitally connect and interact with their surroundings; not only including connectivity with other cars (vehicle-to-vehicle) but also with infrastructure (vehicle-to-infrastructure) and other devices (vehicle-to-devices). This has brought in new suites of application such as advanced safety features, personalized driving and entertainment experiences and even autonomous driving.

The internet of things (IoT) has pervaded all spheres of life most frequently in use. These include deployment of components that connect homes and units of transportation. Being connected online gives homes and cars the benefit of security from physical intruders, in a number of ways like auto alerting and auto calling authorities. However, this very ecosystem of connectivity deployed leaves both homes and cars open to security risks by another group of burglars a€" cyber criminals.

Although connected cars have not yet become mainstream, with most regions still experimenting with prototypes of various functionalities, an increasing number of connected cars are being purchased. They are purchased for features like enhanced GPS location and maintenance, live recording and reminders, Wi-Fi services, and fuel-efficiency.

Cybersecurity Market- Drivers

  • High level of research in fending off malware
  • Auto-correction of defunct components of the integrated software in connected cars
  • Increased funding for the same
  • Increased interest from all automobile manufacturers
  • Connected car add-on component manufacturers in the security of cars

However, limited ability to keep up with the evolving methods and scenario in cybersecurity and lack of effective integration into connected cars devices are some of the issues that form the bottlenecks in this market.

Some of the key functions that come under cybersecurity are the prevention of assaults on service components of the V2IoT or Vehicle to Internet of Things, jamming of signals (gadgets that do this are shabby and conveniently acquired), and prevention of transmission of counterfeit information to other connected cars, as well as their operators. As the market expands, the ecosystem for connected cars is also expected to come under the purview of cybersecurity as metro cities accommodating connected cars (called smart-cities) will have information disseminating docks which could potentially be affected by malware. Motives for cyber threat for connected cars could include theft of freights, malice and burglary.

The global market for cybersecurity of cars has been segmented by different types of software-based and hardware-based services. The market has also been segmented by regions i.e. North America, Europe, Asia-Pacific and Rest of the World.

Some of the key players mentioned in the report are:

  • Argus Cyber Security
  • Cisco
  • Infineon Technologies AG
  • Telenor
  • Tesla Motors
  • Verizon
  • Visteon

Key Deliverables in the Study:

  • Market analysis for the global market for cybersecurity of cars with region specific assessment and competition analysis on the global and regional scale.
  • Market definition along with the identification of key drivers and restraints.
  • Identification of factors instrumental in changing the market scenario and rising prospective opportunities, along with identification of key companies that can influence this market on a global and regional scale.
  • Extensively researched competitive landscape section with profiles of major companies along with their market share.
  • Identification and analysis of the macro and micro factors that affect the global market for cybersecurity of cars on both global and regional scale.
  • A comprehensive list of key market players along with the analysis of their current strategic interests and key financial information.
  • A wide-ranging knowledge and insights about the major players in this industry and the key strategies adopted by them to sustain and grow in the studied market.
  • Insights on the major countries/regions in which this industry is blooming and to also identify the regions that are still untapped.

Table of Contents

1. Introduction

  • 1.1. Key Study Deliverables
  • 1.2. Study Assumptions
  • 1.3. Market Definition
  • 1.4. Key Findings of the Study

2. Research Approach and Methodology

3. Market Dynamics

  • 3.1. Market Overview
  • 3.2. Factors Driving the Market
    • 3.2.1. Increasing demand for Connected Cars and Consumers Attention to Cyber Security
    • 3.2.2. Regulations and Standards
    • 3.2.3. Increasing Adaption of ADAS and Approaching Era to Autonomous Vehicles
  • 3.3. Factors Restraining the Market
    • 3.3.1. Time Taking Process - To integrate perfeclty and to retrofit into existing cars
    • 3.3.2. Diverse Nature of the Market
  • 3.4. Oppurtunities
    • 3.4.1. Use of Autonomous Cars to drive around people in Olympics 2020 - Tokyo
    • 3.4.2. Increasing Cloud Services and Mobile Applications
  • 3.5. Industry Value Chain Analysis
  • 3.6. Industry Attractiveness - Porter's Five Forces
    • 3.6.1. Bargaining Power of Suppliers
    • 3.6.2. Bargaining Power of Consumers
    • 3.6.3. Threat of New Entrants
    • 3.6.4. Threat of Substitute Products or Services
    • 3.6.5. Competitive Rivalry among Existing Competitors
  • 3.7. Cyber Security Standards and Initiatives
    • 3.7.1. Standards
      • 3.7.1.1. ISO 26262
      • 3.7.1.2. SAE J2980
      • 3.7.1.3. SAE J3061
    • 3.7.2. Initiatives by US
      • 3.7.2.1. SPY Car Act
      • 3.7.2.2. Work done by National Highway Traffic Safety Administration (NHTSA) and Federal Trade Commission (FTC)
      • 3.7.2.3. NIST Cybersecurity Framework
    • 3.7.3. Other Initiatives
      • 3.7.3.1. EVITA Project
      • 3.7.3.2. Trusted Platform Module (TPM)
      • 3.7.3.3. Secure Hardware Extension Specificiation

4. Technology Overview

  • 4.1. Technology Snapshot
  • 4.2. Cyber Security Technologies for Cars
    • 4.2.1. Software Based Technologies
    • 4.2.2. Hardware Based Technologies
    • 4.2.3. Upcoming Technologies
  • 4.3. Automotive Security Evaluations
    • 4.3.1. Theoretical Automotive Security Testing
    • 4.3.2. Practical Automotive Security Testing
      • 4.3.2.1. Functional Testing
      • 4.3.2.2. Vulnerability Scanning
      • 4.3.2.3. Fuzzing
      • 4.3.2.4. Penetration Testing
      • 4.3.2.4.1. Black Box Testing
      • 4.3.2.4.2. White Box Testing
      • 4.3.2.4.3. Grey Box Testing
  • 4.4. Types of Attack Points in Cars
    • 4.4.1. Telematics
    • 4.4.2. Infotainment
    • 4.4.3. OBD
    • 4.4.4. ECU
    • 4.4.5. Communication Systems (Sensors, USB, Bluetooth, Passive Keyless Entry, Remote Key, TPMS)
    • 4.4.6. Applications (Smartphone and Remotelink type)

5. Global Cyber Security for Cars - Segmented by Type of Solution

  • 5.1. Software based
  • 5.2. Hardware based
  • 5.3. Professional Services
  • 5.4. Integration
  • 5.5. Others (physical securing, operational services, managing critical services et al)

6. Global Cyber Security for Cars - Segmented by Type of Security

  • 6.1. Network Security
  • 6.2. Application Security
  • 6.3. Cloud Security
  • 6.4. Others (Data and Wireless)

7. Global Cyber Security for Cars - Segmented by Geography

  • 7.1. United States
  • 7.2. Europe
  • 7.3. Japan
  • 7.4. Rest of the World

8. Competitive Intelligence - Company Profiles

  • 8.1. Security Providers
    • 8.1.1. Argus Cyber Security
    • 8.1.2. TowerSec (Harman International Industries Inc.)
    • 8.1.3. Delphi Automotive Plc
    • 8.1.4. Arilou Technologies
    • 8.1.5. Escrypt Embedded Systems
    • 8.1.6. Visteon
    • 8.1.7. Continental AG
    • 8.1.8. Infineon Technologies AG
    • 8.1.9. Cisco Systems Inc
    • 8.1.10. Intel Corporation
    • 8.1.11. Secunet AG
    • 8.1.12. Trillium Inc
    • 8.1.13. Karamba Security
    • 8.1.14. Lear Corporation
    • 8.1.15. NXP Semiconductors

9. Investment Analysis

  • 9.1. Recent Investments
  • 9.2. Investor Outlook

10. Future of Cyber Security for Cars

Back to Top