表紙
市場調查報告書

智慧建築技術市場的資訊科技/營運科技(IT/OT)安全性匯流:到2022年前的預測

Information Technology/Operational Technology (IT/OT) Security Convergence in the Smart Building Technology Market, Forecast to 2022

出版商 Frost & Sullivan 商品編碼 907716
出版日期 內容資訊 英文 117 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
智慧建築技術市場的資訊科技/營運科技(IT/OT)安全性匯流:到2022年前的預測 Information Technology/Operational Technology (IT/OT) Security Convergence in the Smart Building Technology Market, Forecast to 2022
出版日期: 2019年07月30日內容資訊: 英文 117 Pages
簡介

本報告調查了智慧建築中資訊科技/營運科技(IT/OT)的匯流對企業的網路態度影響,並提供關於主要市場趨勢、市場動態及供應商動態的詳細分析。

執行摘要

調查範圍、區分

  • 調查範圍
  • 主要調查項目
  • 市場定義
  • 地區區分

市場概要

  • 物聯網(IoT)普及
  • IoT普及:地區別
  • 智慧建築控制裝置:商業
  • IT/OT匯流
  • IT/OT匯流:矩陣 vs. 風險
  • 知名IT/OT網路攻擊
  • IT/OT匯流:智慧建築的網路風險
  • BAS
  • BAS:安全脆弱性
  • IT/OT安全性:入口點

市場動態

  • IT/OT安全性生態系統:利害相關者類型
  • 流通通路
  • 流通通路:討論
  • 商業模式
  • 法規□規格

市場動向

  • 對成長動向的市場影響
  • 大樓營運數位化
  • IT/OT網路安全支出
  • IT/OT安全執行課題
  • 技術配列

IT/OT安全性市場預測

  • 預測前提條件
  • 市場預測風險
  • 收益預測
  • 收益預測討論
  • 收益比預測:事業規模別
  • 收益比預測討論:事業規模別
  • 收益比預測:地區別
  • 收益預測:地區別
  • 收益預測討論:地區別
  • 收益比預測:垂直產業別
  • 收益預測:垂直產業別
  • 收益預測討論:垂直產業別

IT/OT安全性風險矩陣

  • IT/OT安全性風險矩陣
  • IT/OT安全性風險矩陣:垂直產業別
  • IT/OT安全性風險矩陣討論:垂直產業別
  • IT/OT安全性風險矩陣:國家/地區別
  • IT/OT安全性風險矩陣討論:國家/地區別

競爭分析

  • 競爭環境
  • 主要競爭企業檔案:Aperio Systems (Aperio)
  • 主要競爭企業檔案:Bayshore Networks (Bayshore)
  • 主要競爭企業檔案:Check Point Software Technologies (Check Point)
  • 主要競爭企業檔案:Claroty
  • 主要競爭企業檔案:Cyberbit
  • 主要競爭企業檔案:Forescout Technologies (Forescout)
  • 主要競爭企業檔案:Fortinet
  • 主要競爭企業檔案:Indegy
  • 主要競爭企業檔案:Iotium
  • 主要競爭企業檔案:Radiflow
  • 主要競爭企業檔案:Siemens Smart Infrastructure
  • 主要競爭企業檔案:T-Systems Telekom Security (T-Systems)

CISO的研究

  • 執行各階段
  • 步驟1:資產存貨盤點
  • 步驟2:脆弱性、風險及影響評估
  • 步驟3:利害相關者責任
  • 步驟4:供應商選擇
  • 步驟5:持續監控及改善
  • Frost & Sullivan的Cyber Resilience Model
  • 應避免的常見錯誤

成長機會

  • 成長機會1:深層學習、AI
  • 成長機會2:合作
  • 成長機會3:對垂直產業的關注
  • 成長機會4:抵擋威脅
  • 成功、成長的戰略要務

結論

附錄

關於Frost & Sullivan

目錄
Product Code: ME8F-74

Digitalization and Cyberattacks driving adoption of IT/OT Security in Smart Buildings

Automation, IoT, and digitalization are rapidly changing, and enterprise operations and building operations have not made an exception either. Today, smart devices control building management activities including temperature control, access control, lighting control, communication, and safety systems in many enterprises. At the same time, such converged Information Technology/Operational Technology (IT/OT) environment has made enterprises more vulnerable to cyberattacks. With diverse protocols, hardware, and software systems, the OT devices controlling building operations provide a heterogeneous environment. Coupled with IT devices and a common network connection, the attack surface expands, providing a thriving ground for cyberadversaries to play on.

This study explores the impact of such IT/OT convergence in smart buildings on the cyber posture of an enterprise. The study provides detailed insights on key market trends, risk posture, market dynamics, and vendor dynamics in this market.

Research Scope:

Geographical Analysis:

  • Europe, the Middle East, and Africa
  • Asia-Pacific
  • North America and Latin America

The base year for the study is 2018 and the forecast period is from 2019 to 2022.

Insights included:

  • Market Dynamics
  • Market Trends
  • IT/OT Security Risk Matrix Across Verticals and Regions
  • Competitor Analysis and Key Vendor Profiles
  • Insights for CISOs
  • Growth Opportunities

Research Highlights:

The IT/OT security market for smart buildings is in its early growth stage, contributing to a small percentage of Industrial Cybersecurity Systems (ICS) security vendors. Growing frequency of cyberattacks exploiting gaps in building OT devices is driving remarkable increase in adoption of IT/OT security among enterprises. However, security budget constraint continues to be a significant challenge for growth. Verticals such as healthcare, hospitality, finance, and data centers promise high growth opportunities for vendors in this market owing to the high cost of impact of cyberattacks in these verticals. Technological capabilities, scalability, and interoperability are key factors of differentiation among vendors operating in the IT/OT security market.

Table of Contents

Executive Summary

  • Key Findings
  • Market State-360 Degree Snapshot

Research Scope and Segmentation

  • Research Scope
  • Research Scope (continued)
  • Key Questions this Study will Answer
  • Market Definitions
  • Geographical Segmentation

Market Overview

  • Internet of Things (IoT) Penetration
  • IoT Penetration by Region
  • Smart Building Control Devices-Commercial
  • Smart Building Control Devices-Commercial (continued)
  • IT/OT Convergence
  • IT/OT Convergence-Merits Versus Risks
  • Notable IT/OT Cyberattacks
  • IT/OT Convergence-Cyber Risks in Smart Buildings
  • BAS
  • BAS-Security Vulnerabilities
  • IT/OT Security-Entry Points

Market Dynamics

  • IT/OT Security Ecosystem-Types of Stakeholders
  • Distribution Channels
  • Distribution Channels-Discussion
  • Business Models
  • Regulations and Standards

Market Trends

  • Market Impact of Growth Trends
  • Digitization of Building Operations
  • IT/OT Cybersecurity Spend
  • IT/OT Security Implementation Challenges
  • Technology (Mis)Alignment

Total IT/OT Security Market Forecasts

  • Forecast Assumptions
  • Risks to Frost & Sullivan Market Forecasts
  • Revenue Forecast
  • Revenue Forecast Discussion
  • Percent Revenue Forecast by Business Size
  • Percent Revenue Forecast Discussion by Business Size
  • Percent Revenue Forecast by Region
  • Revenue Forecast by Region
  • Revenue Forecast Discussion by Region
  • Percent Revenue Forecast by Verticals
  • Revenue Forecast by Verticals
  • Revenue Forecast Discussion by Verticals

IT/OT Security Risk Matrix

  • IT/OT Security Risk Matrix
  • IT/OT Security Risk Matrix by Verticals
  • IT/OT Security Risk Matrix Discussion by Verticals
  • IT/OT Security Risk Matrix by Country/Region
  • IT/OT Security Risk Matrix Discussion by Country/Region

Competitive Analysis

  • Competitive Environment
  • Key Competitor Profile-Aperio Systems (Aperio)
  • Key Competitor Profile-Aperio Systems (Aperio) (continued)
  • Key Competitor Profile-Bayshore Networks (Bayshore)
  • Key Competitor Profile-Bayshore Networks (Bayshore) (continued)
  • Key Competitor Profile-Check Point Software Technologies (Check Point)
  • Key Competitor Profile-Check Point Software Technologies (Check Point) (continued)
  • Key Competitor Profile-Claroty
  • Key Competitor Profile-Claroty (continued)
  • Key Competitor Profile-Cyberbit
  • Key Competitor Profile-Cyberbit (continued)
  • Key Competitor Profile-Forescout Technologies (Forescout)
  • Key Competitor Profile-Forescout Technologies (Forescout) (continued)
  • Key Competitor Profile-Fortinet
  • Key Competitor Profile-Fortinet (continued)
  • Key Competitor Profile-Indegy
  • Key Competitor Profile-Indegy (continued)
  • Key Competitor Profile-Iotium
  • Key Competitor Profile-Iotium (continued)
  • Key Competitor Profile-Radiflow
  • Key Competitor Profile-Radiflow (continued)
  • Key Competitor Profile-Siemens Smart Infrastructure
  • Key Competitor Profile-Siemens Smart Infrastructure (continued)
  • Key Competitor Profile-Siemens Smart Infrastructure (continued)
  • Key Competitor Profile-T-Systems Telekom Security (T-Systems)
  • Key Competitor Profile-T-Systems Telekom Security (T-Systems) (continued)

Insights for CISOs

  • Implementation Steps
  • Step 1-Asset Inventory
  • Step 2-Vulnerability, Risk, and Impact Assessment
  • Step 3-Stakeholder Responsibility
  • Step 4-Vendor Selection
  • Step 5-Continued Audit and Improvement
  • Frost & Sullivan Cyber Resilience Model
  • Common Mistakes to Avoid

Growth Opportunities

  • Growth Opportunity 1-Deep Learning and AI
  • Growth Opportunity 2-Partnerships
  • Growth Opportunity 3-Vertical Focus
  • Growth Opportunity 4-Threat Protection
  • Strategic Imperatives for Success and Growth

The Last Word

  • The Last Word
  • Legal Disclaimer

Appendix

  • Partial List of Companies Interviewed
  • Learn More-Next Steps
  • List of Exhibits
  • List of Exhibits (continued)

The Frost & Sullivan Story

  • The Frost & Sullivan Story
  • Value Proposition-Future of Your Company & Career
  • Global Perspective
  • Industry Convergence
  • 360º Research Perspective
  • Implementation Excellence
  • Our Blue Ocean Strategy
Back to Top