Cover Image
市場調查報告書

影響網路安全的未來的技術

Technologies Impacting the Future of Cybersecurity

出版商 Frost & Sullivan 商品編碼 599553
出版日期 內容資訊 英文 45 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
影響網路安全的未來的技術 Technologies Impacting the Future of Cybersecurity
出版日期: 2017年12月27日 內容資訊: 英文 45 Pages
簡介

本報告提供網路安全市場上主要技術開發領域鑑別,技術開發的優點的相關調查,實行網路安全解決方案的優點,網路安全相關與組織所面臨的課題,網路安全市場上主要技術趨勢,對應網路安全市場上現有的課題的技術的可能性,各賦能技術市場區隔的主要打入市場企業等相關彙整。

第1章 摘要整理

第2章 專題概要

  • 網路安全概要
  • 引進促進因素:雲端、行動
  • 引進促進因素:IoT及成本上升
  • 引進促進因素:多設備的利用、系統的停止
  • 引進促進因素:存取控制

第3章 網路安全技術開發的題目、主要的革新領域

  • 網路安全進步的4個主要的題目

第4章 企業趨勢

  • 深度學習型終端安全解決方案
  • 機器學習型的用戶、實體行為分析 (UEBA)
  • 行動為基礎的醫療的威脅保護
  • 風險評估的AI、發現的問題解決
  • 互聯醫療塊環鏈技術平台

第5章 分析師的觀點

第6章 主要的契約

目錄
Product Code: D7D8

The Changing Face of Enterprise Information Security

The growing number of cyber attacks and cyber crimes has resulted in compromise of data important computing and resources, and network outages. With the implementation of information and communication technologies (ICT) in almost every sector, attacks have been increasing at an alarming rate. Penetration of the connected ecosystem is further increasing the loopholes and increasing the attack surfaces for cyber attackers. The need for efficient cyber security solutions is evident in every sector.

This research service identifies the key technology development areas within cyber security space and explores the benefits of such technology development. The report also highlights the key developers in the identified technology segments to give an overview of the technology advancements.

In brief, this research service provides the following:

A brief snapshot of the benefits of implementation of cyber security solutions

Key challenges faced by organizations with respect to cyber security

The key technology trends in cyber security space

Potential of the technologies to address the existing challenges in the cyber security space

Key participants under each of the enabling technology segments along with some use cases across industries

Table of Contents

1.0 EXECUTIVE SUMMARY

  • 1.1 Research Scope
  • 1.2 Research Methodology
  • 1.3 Key Findings

2.0 OVERVIEW OF THE TOPIC

  • 2.1 Overview of Cyber Security
  • 2.2 Factors Driving Adoption: Cloud and Mobility
  • 2.3 Factors Driving Adoption: IoT and Rising Cost
  • 2.4 Factors Hindering Adoption: Multiple Device Usage and System Outages
  • 2.5 Factors Hindering Adoption: Access Control

3.0 THEMES OF CYBER SECURITY TECHNOLOGY DEVELOPMENT AND KEY INNOVATION AREAS

  • 3.1 Four Key Themes for Cyber Security Advancements
    • 3.2.1 Big Data Analytics is Addressing the Scalability Issue with Efficient Data Handling Capability
    • 3.2.2 Companies at the Forefront of Big Data-based Cyber Security
    • 3.2.3 Use Case: Big Data-based Cyber Security in Energy
    • 3.2.4 Use Case: Big Data-based Cyber Security in Retail
    • 3.3.1 Artificial Intelligence Facilitating Automation in Cyber Security
    • 3.3.2 Companies at the Forefront of AI-based Security
    • 3.3.3 Use Case: AI-based Cyber Security for Endpoint Protection
    • 3.3.4 Use Case: AI-based Cyber Security for Enterprises
    • 3.4.1 Biometrics Providing Multimodal Security Defense For Users
    • 3.4.2 Companies at the Forefront of Biometrics Access Control
    • 3.4.3 Use Case: Biometrics Access Control in Automotive
    • 3.4.4 Use Case: Biometrics Access Control in Banking
    • 3.5.1 Distributed Ledger Technology is Expected to Revolutionize Data Authentication
    • 3.5.2 Companies at the Forefront of DLT-based Cyber Security
    • 3.5.3 Use Case: DLT-based Cyber Security and Healthcare IoT
    • 3.5.4 Use Case: DLT-based Cyber Security in Internet of Things

4.0 COMPANIES TO ACTION

  • 4.1 Deep Learning-based Endpoint Security Solution
  • 4.2 Machine Learning-based User and Entity Behaviour Analytics
  • 4.3 Behavior-based Threat Protection for Healthcare
  • 4.4 AI and Heuristic Technique for Risk Assessment
  • 4.5 Blockchain technology platform for Connected Health

5.0 ANALYST VIEWPOINT

  • 5.1 Analyst Viewpoint

6. 6.0 KEY CONTACTS

  • 6.1 Key Contacts
  • 6.1 Key Contacts (continued)
  • Legal Disclaimer
Back to Top