表紙
市場調查報告書

工業IoT (IIoT) 安全的亞太地區市場:2018年

Asia-Pacific Industrial Internet of Things Security, 2018

出版商 Frost & Sullivan 商品編碼 820547
出版日期 內容資訊 英文 63 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
工業IoT (IIoT) 安全的亞太地區市場:2018年 Asia-Pacific Industrial Internet of Things Security, 2018
出版日期: 2019年03月29日內容資訊: 英文 63 Pages
簡介

本報告提供亞太地區的工業IoT (IIoT) 安全市場相關調查,I市場主要趨勢,案例研究,成長機會,及主要供應商等相關分析。

第1章 摘要整理

第2章 產業整體IIoT應用部署、新的安全課題

  • 案例研究:Pavlodar Oil Refinery
  • 案例研究:Murrumbidgee
  • 案例研究:Enel

第3章 成長機會、CTA

  • 成長機會1:全面性安全解決方案的需求
  • 成長機會2:IT及OT團隊之間安全策略相關合作的增加
  • 成長機會3:產業用的安裝的高風險
  • 成長機會4:為了保證高度安全的「安全設計」的引進
  • 4個主要的成長機會
  • 成功、成長的策略必要事項

第4章 供應商的簡介

  • 主要供應商的簡介
  • 供應商的競爭概要
  • Claroty
  • Fortinet
  • Kaspersky Lab
  • Nozomi Networks
  • Palo Alto Networks
  • Tenable
  • Waterfall Security Solutions

第5章 結論

第6章 FROST & SULLIVAN

目錄
Product Code: PA66-74

The Need for Cybersecurity Among Industrial Firms is Growing

In an industrial set-up, various equipment's and components such as controllers, servers, remote terminals, monitoring equipment, and sensors are connected to the internet. Further, computer systems, applications, moving assets to the cloud or even remote facilities being connected to the Wide Area Network (WAN) require internet usage. All these are being done to gather real time insights for enhanced decision making.

However, this is increasing the attack surface. Adding several IoT devices to the network is only creating challenges for managing security as they may transmit sensitive data. Further, with the IT-OT convergence, the attack surface is expanding and subject to higher risks. IT personnel are still focusing on the security of IT network with little insight on securing the OT infrastructure. They are still focused on legacy applications that are difficult to upgrade. They also have limited opportunities for patch management due to the growing number of vulnerabilities. Further, IoT devices are under attack for various reasons such a poor installation of different codes and devices and lack of security experts in IoT security.

To meet the growing challenges of attacks, various vendors are providing security solutions across the IIoT architecture and not just for IT/OT networks, to ensure security against every potential threat.

Traditionally, most IoT devices were made by engineers who had limited knowledge of cyber security, and the devices often had no built-in security. However, with the growing cyber-attacks on industrial firms, cyber security firms are focusing on ‘Security by Design' by incorporating features such as password protection, multi-factor authentication, and other stronger security capabilities.

While every industrial firm has it's own unique environment, protecting the organization from IoT related cyber threats is gaining even more significance than ever. These IoT devices and applications can leak out sensitive information that can have a major impact on the organization. As with unprotected IoT applications, the embedded programs can be analysed and stolen, an organization should only think of protecting them and ensure cyber security for their environment.

As more and more industrial firms adopt IIoT, smart technology and automation, their chances of witnessing a security incident rises. Today, as these industrial firms look at optimizing business operations, reduce operating costs, increase control over distributed operations and face an increasing compliance requirement with regulations, they cannot stay away from adopting IIoT.

IIoT and Industry 4.0 are driving organizations looking to improve existing processes and augment operational systems, to facilitate more connections between the physical process world and the Internet. This connectivity exposes the previously isolated operational environments to cyber threats.

Table of Contents

1. EXECUTIVE SUMMARY

  • Executive Summary
  • Executive Summary (continued)
  • Understanding Cybersecurity Implications in an IIoT and ICS Environment
  • Recent Major Attacks
  • Actions that Increase Risk
  • Increasing Demand for Cybersecurity Solutions
  • Higher Demand for Security Solutions
  • New Threats to Legacy Systems
  • The Fading of the Air Gap Principle
  • The Fading of the Air Gap Principle (continued)
  • Stringent Government Regulations
  • Key Trends that Affect the Uptake of IIoT Security Solutions
  • Security Solutions that Cover the Entire IIoT Architecture
  • The Focus on 'Security by Design'
  • The Emergence of Vendors with Advanced IIoT Security Solutions
  • The Lag in the Adoption of IIoT Security
  • Lack of Awareness Among OT Professionals

2. DEPLOYING IIOT APPLICATIONS ACROSS INDUSTRIES AND THE EMERGING SECURITY ISSUES

  • Deploying IIoT Applications Across Industries and the Emerging Security Issues
  • Case Study-Pavlodar Oil Refinery
  • Case Study-Murrumbidgee
  • Case Study-Enel

3. GROWTH OPPORTUNITIES AND CALL TO ACTION

  • Growth Opportunity 1-The Demand for Comprehensive Security Solutions from Industrial Firms
  • Growth Opportunity 2-Increasing Collaboration on Security Strategies Between IT and OT Teams
  • Growth Opportunity 3-Higher Risk in an Industrial Set-up
  • Growth Opportunity 4-Adopting 'Security by Design' to Ensure Higher Security
  • 4 Major Growth Opportunities
  • Strategic Imperatives for Success and Growth

4. VENDOR PROFILES

  • Key Vendor Profiles
  • Vendor Competitive Overview
  • Claroty
  • Claroty's Support for Multiple Teams and Use Cases
  • Fortinet
  • Fortinet ICS/SCADA Solution Components
  • Kaspersky Lab
  • Kaspersky Lab (continued)
  • Portfolio of Products and Services Under KICS
  • Nozomi Networks
  • Nozomi Networks Solution Architecture
  • Palo Alto Networks
  • Palo Alto Networks' Security Operating Platform Approach for IoT
  • Tenable
  • Tenable (continued)
  • Waterfall Security Solutions
  • Waterfall Security Solutions-Unidirectional CloudConnect

5. LAST WORD

  • A Final Word
  • Legal Disclaimer

6. THE FROST & SULLIVAN STORY

  • The Frost & Sullivan Story
  • Value Proposition-Future of Your Company & Career
  • Global Perspective
  • Industry Convergence
  • 360° Research Perspective
  • Implementation Excellence
  • Our Blue Ocean Strategy
Back to Top