表紙
市場調查報告書

全球汽車用網路安全市場預測

Global Automotive Cybersecurity Market, Forecast to 2025

出版商 Frost & Sullivan 商品編碼 702317
出版日期 內容資訊 英文 91 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
全球汽車用網路安全市場預測 Global Automotive Cybersecurity Market, Forecast to 2025
出版日期: 2018年09月12日內容資訊: 英文 91 Pages
簡介

本報告提供汽車用網路安全市場相關調查分析,OEM、第一級供應商、安全新興企業的策略,競爭情形,經營模式,未來的重點領域相關的系統性資訊。

第1章 摘要整理

第2章 調查範圍、目的、手法、背景

第3章 汽車用網路安全:概要與市場分析

  • 汽車用網路安全的現在的市場預測
  • 來自「CES 2018」的網路安全
  • 主要的網路安全的特徵:概要
  • 汽車用網路安全生態系統
  • OEM策略主要的重點領域
  • 汽車用生態系統夥伴關係:策略分析
  • 汽車用生態系統夥伴關係:策略與分析
  • 汽車用網路安全的新興企業
  • OEM的IVN用Ethernet引進

第4章 小客車和連網型卡車的網路安全:市場分析,經營模式,商機

  • 聯網汽車:市場需求分析
  • 聯網汽車:網路安全分析
  • 收購分析:投資與未來的機會
  • 汽車用網路安全市場機會
  • 全球連網型卡車:市場需求分析
  • 連網型卡車:網路安全分析
  • 汽車用網路安全:經營模式分析

第5章 汽車用網路安全市場:主要課題與地區的法規

  • 汽車用網路安全:主要課題
  • 汽車用網路安全法規:藍圖
  • 地區的法規及影響:美國
  • 地區的法規及影響:歐洲

第6章 汽車用駭侵事件:概要,事件的影響,OEM安全主張

  • 汽車用電腦網路駭侵事件:亮點
  • 倫理性駭侵:BMW和Keen Lab的夥伴關係
  • RNA詐欺侵入事件和資料安全概要
  • VW群組車輛的詐欺侵入事件和安全性的舉措
  • BMW ConnectedDrive駭侵事件
  • BMW資料安全概要
  • GM安全功能
  • Mercedes-Benz連接性服務:資料保護和IT安全
  • 豐田的資料安全概要

第7章 解決方案供應商的簡介:安全新興企業,第一級供應商,科技企業

  • Arilou
  • NNG
  • Argus
  • Continental AG
  • Harman
  • Trillium Incorporated
  • Karamba
  • GuardKnox
  • SafeRide Technologies Ltd.
  • CYMOTIVE
  • Upstream
  • Bosch
  • 瑞薩電子
  • Irdeto
  • Panasonic

第8章 成長機會分析

  • 汽車用網路安全企業
  • 成長機會:夥伴關係與經營模式
  • 成功、成長的策略性必要事項:汽車用網路安全

第9章 主要結論與未來預測

第10章 附錄

目錄
Product Code: MD4B-18

By 2025, 68.0% of Market Investments Will be Raised from Technology Providers, Semiconductor Companies and Tier-I Suppliers

This study analyses the strategies, competitive landscape, business models, and future focus areas of OEMs, tier-I suppliers, and security start-up companies in the automotive cybersecurity market.

Increasing vehicle connectivity has given rise to the risks of potential cyber-attacks in the industry. This has drastically increased customer awareness and need for robust cybersecurity solutions in connected vehicles. OEMs have started taking the cybersecurity issue seriously and are evaluating ways to ensure the deployment of strategic security measures across the automotive value chain. Partnerships and collaborations are playing a vital role for OEMs, as they lack the necessary capabilities within the organisation. Companies such as Groupe PSA, Jaguar, and BMW are proactively identifying ways to ensure strong security mechanisms in their next-generation connected vehicles through partnerships and ethical hacking programs.

The automotive cybersecurity market is nascent and is currently in its experimental phase. Connected cars are the primary use cases of automotive cybersecurity. Cybersecurity-embedded cars are already in production and about 60% of connected cars are expected to have built-in security solutions by 2025. Though connected cars will be early adopters, Frost & Sullivan expects autonomous vehicles and connected trucks to become critical use cases for automotive cybersecurity in the future. Hence, it is necessary for OEMs to gear up security adoption in connected trucks, as cyber attacks in this segment tend to be massive and extremely harmful for organisations.

With the growing need for security in connected vehicles, industry participants (tier-I suppliers, technology providers, semiconductor companies, and security start-up companies) are expected to increase market investments to $2.7 billion till 2025. Automotive cybersecurity will remain a key concern in the coming years and OEMs have to aggressively engage and partner with ecosystem participants to ensure a holistic cybersecurity approach across the automotive value chain. Tier-I suppliers will continue with the trend of start-up acquisition strategy in order to maintain a competitive advantage in the market. Pure-play security start-up companies will intensify market competition through OEM partnerships and continuous product innovations.

Key Issues Addressed:

  • What are the different business models adopted for vehicle cybersecurity and which one will garner value in the current and future ecosystem?
  • How does the competitive landscape look like? What are the different strategies adopted by OEMs, tier-I suppliers, and security startups?
  • What is the addressable opportunity for automotive cybersecurity from 2017 to 2025?
  • How is the cybersecurity demand in passenger and commercial vehicles?
  • What is the impsact of regional regulations on the market?

Table of Contents

1. EXECUTIVE SUMMARY

  • 2017 Highlights-Predictions Versus Actuals
  • Executive Summary-Key Findings
  • Trend 1-Threat Vectors in Connected Cars Analysis
  • Trend 1-Threat Vectors in Connected Cars Analysis (continued)
  • Trend 2-Automotive Cybersecurity Features Analysis
  • Trend 3-Connected Cars Vs. Connected Trucks Cybersecurity Analysis
  • Trend 4-Mergers and Acquisitions of Key Market Participants
  • Trend 5-Innovation Will be Key for Cybersecurity Start-ups
  • Trend 6-OEMs are Transitioning to Ethernet Networks
  • Executive Summary-Comparison of 2017 and 2025
  • Executive Summary-Comparison of 2017 and 2025 (continued)

2. RESEARCH SCOPE, OBJECTIVES, METHODOLOGY, AND BACKGROUND

  • Research Scope
  • Research Aims and Objectives
  • Key Questions This Study Will Answer
  • Research Background
  • Research Methodology

3. AUTOMOTIVE CYBERSECURITY-OVERVIEW AND MARKET ANALYSIS

  • Automotive Cybersecurity Current Market Outlook
  • Cybersecurity Emerging From the Shadows at CES 2018
  • Key Cybersecurity Features-2017 Overview
  • Automotive Cybersecurity Ecosystem
  • OEM Strategies and Key Focus Areas
  • Automotive Ecosystem Participants-Strategy Analysis
  • Automotive Ecosystem Participants-Strategies and Analysis
  • Automotive Cybersecurity Start-up Companies
  • OEM Ethernet Adoption for IVN

4. PASSENGER CARS AND CONNECTED TRUCKS CYBERSECURITY-MARKET ANALYSIS, BUSINESS MODELS AND REVENUE OPPORTUNITIES

  • Connected Cars-Market Demand Analysis
  • Connected Cars (CC)-Cybersecurity Analysis
  • Acquisition Analysis-Investments and Future Opportunities
  • Automotive Cybersecurity Market Opportunity
  • Global Connected Trucks-Market Demand Analysis
  • Connected Trucks-Cybersecurity Analysis
  • Automotive Cybersecurity-Business Model Analysis

5. AUTOMOTIVE CYBERSECURITY MARKET-KEY CHALLENGES AND REGIONAL REGULATIONS

  • Automotive Cybersecurity-Key Challenges
  • Automotive Cybersecurity Regulations-Roadmap
  • Regional Regulations and Impact-US
  • Regional Regulations and Impact-Europe

6. AUTOMOTIVE HACKING INCIDENTS-OVERVIEW, INCIDENT IMPACT, AND OEM SECURITY INITIATIVES

  • Automotive Cyber Hacking Incidents-Highlights
  • Ethical Hacking-BMW's Partnership With Keen Lab
  • Overview of RNA Hack Incidents and Data Security
  • VW Group Vehicle Hack Incident and Security Initiatives
  • BMW ConnectedDrive Hacking Incident
  • Overview of BMW Data Security
  • GM Security Capability
  • Mercedes-Benz Connectivity Services-Data Protection and IT Security
  • Overview of Toyota Data Security

7. SOLUTION PROVIDER PROFILES-SECURITY START-UPS, TIER-I SUPPLIERS AND TECHNOLOGY COMPANIES

  • Arilou Cyber Security (Part of NNG Group) Solutions
  • NNG's Navigation and Infotainment Solutions with Enhanced Security
  • Arilou Software IDPS Line Fit Solution
  • Argus Cyber Security
  • Continental AG's End-to-End Solution
  • Harman Cybersecurity (TowerSec)
  • Harman Cybersecurity (TowerSec) (continued)
  • Trillium Incorporated
  • Karamba Security
  • GuardKnox
  • SafeRide Technologies Ltd.
  • CYMOTIVE
  • Upstream Security
  • Bosch Cybersecurity
  • Renesas Security Solutions
  • Irdeto (Part of Naspers)
  • Irdeto's Cybersecurity Roadmap
  • Panasonic Cybersecurity

8. GROWTH OPPORTUNITY ANALYSIS

  • Automotive Cybersecurity Companies
  • Growth Opportunity-Partnerships and Business Models
  • Strategic Imperatives for Success and Growth-Automotive Cybersecurity

9. KEY CONCLUSIONS AND FUTURE OUTLOOK

  • Key Conclusions and Future Outlook
  • The Last Word-3 Big Predictions
  • Legal Disclaimer

10. APPENDIX

  • Market Engineering Methodology
  • Table of Acronyms Used
  • List of Exhibits
  • List of Exhibits (continued)
  • List of Exhibits (continued)
Back to Top