表紙
市場調查報告書

全球安全數位轉型:2019年

Global Security Digital Transformation, 2019

出版商 Frost & Sullivan 商品編碼 907721
出版日期 內容資訊 英文 124 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
全球安全數位轉型:2019年 Global Security Digital Transformation, 2019
出版日期: 2019年08月08日內容資訊: 英文 124 Pages
簡介

本報告研究分析物聯網 (IoT)、雲端運算、大數據、數據分析、機器學習、擴增實境 (AR)、區塊鏈的數位轉型導入等級,以及於安全任務採用數位平台的優點、各地區的安全使用案例和程序等情報。

摘要整理

研究範圍和定義

  • 研究範圍
  • 何為數位平台?
  • 數位平台實例

安全的數位化概要和趨勢

  • 為什麼要數位化?
  • 影響數位化的主要脈絡趨勢
  • 趨勢分析:推動因素和課題
  • 機會分析
  • 安全方面數位技術市場滲透率
  • 數位化浪潮
  • 導入地圖
  • 威脅情勢:第1部分
  • 威脅情勢:第2部分
  • 下一步:安全的數位技術結合

安全的數位技術應用

  • 數位化對安全而言意味著什麼?

重要基礎建設的數位化

  • 重要國家基礎建設 (CNI) 的數位化
  • CNI防護的數位化附加價值
  • 全球熱點和主要部門
  • 案例研討:聯合邊境管理系統 (JBMS)
  • 案例研討:居家辦公室的雲端移行
  • 市場導入等級
  • 影響

公共安全數位化

  • 公共安全數位化
  • 早期採用者及主要公共安全應用
  • 對公共安全情報循環的影響
  • 主要弱點
  • 案例研討:透過AI因應恐怖主義宣傳
  • 案例研討:透過AI規劃安全交通
  • 市場導入等級
  • 影響

商業模式:未來變化

  • 商業模式的演變
  • 商業模式:脈絡演化
  • 對安全的影響:安全即服務
  • 數據收益化方法
  • 網路影響、其他

競爭影響

  • 數位化對競爭的影響:現況
  • 研究方法
  • 主要安全企業的市場呈現
  • 數位成熟度評估
  • 數位領跑者和挑戰者
  • 安全的IT領導者成熟度評估
  • 安全企業 vs. IT企業
  • 安全數位化和其對競爭的影響
  • 網路企業

成長機會

  • 數位轉型:投資機會
  • 成長機會1:安全即服務
  • 成長機會2:機器生物統計學
  • 成功和成長策略要求

結論

附錄:企業簡介

附錄

有關Frost & Sullivan

目錄
Product Code: 9AB1/16

Enabling Security to Better Respond to a Multiple Threats Environment

The Security ecosystem is embracing the digital transformation across multiple applications with an aim to improve operational efficiency and modernize legacy systems. This study covers the digital solutions market penetration in public safety, critical infrastructures and governments.

Frost & Sullivan Security Digital Transformation analysis assesses the various levels of adoption when it comes to the Internet of Things, Cloud Computing, Big Data, Data Analytics, Machine Learning, Augmented Reality and the Blockchain. With an aim to define what a digital solution is per se, this report explores what are the benefits to embrace digital platforms in security missions. In that regard, the includes security uses cases and programs across different regions to highlight various penetration rates and discrepancies amongst security end-users depending on operating segments and relevance to security applications.

If resistance to change and security concerns are the biggest challenges slowing down market adoption of digital solutions, especially in Western regions, these new technologies are still perceived as essential to overcome operational pain points, from crime prevention to better evidence management, persistence surveillance and threat detection, information sharing and greater collaboration between diverse agencies.

The access to a bigger volume of valuable intelligence from embedded sensors, video surveillance, body worn cameras and smart devices, such as tablets, glasses or watches, drives security forces to upgrade obsolete IT infrastructures. Besides, it is critical for the security forces adopt the relevant tools to efficiently handle, securely store and analyse these data to directly improve operation success, critical infrastructure resilience, identify sources of savings and adopt more adequate resources planning and risk management plans.

Nevertheless, not every industry player is in a position to deliver adequately digital solutions to the security ecosystem. This is another consequence of the security digital transformation: industry incumbents are facing market entrance of non-traditional players. Amongst these new entrants, digital champions such as Amazon Web Services, Google, Microsoft, IBM or Dell EMC are slowly paving their way. Additionally, smaller players from start-ups to unicorns are also increasing their market footprint when it comes to predictive analytics or innovative cyber solutions.

This more diverse competitive landscape is also impacting traditional business patterns and solutions provision, with a gradual interest towards “Security on demand” and solutions delivered under the “Software as a Service” format.

Table of Contents

Executive Summary

  • Key Findings
  • Key Findings (continued)
  • Key Findings (continued)

Scope and Definitions

  • Research Scope
  • What is a Digital Platform?
  • Examples of Digital Platforms

Security Digitalisation Overview and Trends

  • Why Digitalising?
  • Key Contextual Trends Impacting Digitalisation
  • Trends Analysis-Booster and Challenges
  • Opportunity Analysis
  • Market Penetration of Digital Technologies in Security
  • The Digitalisation Wave
  • Adoption Map
  • The Threat Landscape-Part 1
  • The Threat Landscape-Part 2
  • The Next Steps-Combining Digital Technologies in Security

Applications of Digital Technologies in Security

  • What Digitalisation Means for Security?

Digitalising Critical Infrastructures

  • Digitalising Critical National Infrastructures
  • Digitalising Critical National Infrastructures (continued)
  • Critical National Infrastructures Digitalisation
  • Digitalisation Added-Value on CNI Protection
  • Global Hot Spots and Top Segments
  • Case Study-Joint Border Management System
  • Case Study-Home Office Cloud Migration
  • Digitalising Critical National Infrastructures-Market Adoption Levels
  • Digitalising Critical National Infrastructures-Impact

Digitalising Public Safety

  • Digitalising Public Safety
  • Digitalising Public Safety (continued)
  • Early Adopters and Key Public Safety Applications
  • Impact on the Public Safety Intelligence Cycle
  • Public Safety Digitalisation-Main Pain Points
  • Case Study-AI to Tackle Terrorism Propaganda
  • Case Study-AI to Plan Safe Traffic Ahead
  • Digitalising Public Safety-Market Adoption Levels
  • Digitalising Public Safety-Impact

Business Models-Changes Ahead

  • Evolution of Business Models
  • Business Models-Contextual Evolution
  • Impact on Security-Security as a Service
  • Data Monetization Avenues
  • Network Effect
  • Network Effect on the Way? Use Case 1
  • Network Effect on the Way?

Competition Impact

  • Digitalisation Impact on Competition-Current Landscape
  • Methodology
  • Leading Security Firms Market Presence
  • Leading Security Firms Market Presence (continued)
  • Digital Maturity Assessment
  • Digital Maturity Assessment (continued)
  • Digital Maturity Assessment (continued)
  • Digital Maturity Assessment (continued)
  • Digital Maturity Assessment (continued)
  • Digital Front Runners and Challengers
  • Assessing IT Leaders Maturity in Security
  • Assessing IT Leaders Maturity in Security (continued)
  • Security Players vs. IT Players
  • Security Digitalisation and Its Impact on Competition
  • Cyber Players

Growth Opportunities Analysis

  • Digital Transformation-Investment Opportunities
  • Growth Opportunity 1-Security as a Service
  • Growth Opportunity 2-Machine Biometrics
  • Strategic Imperatives for Success and Growth

Conclusion

  • Digital Transformation-Impact Analysis
  • Strategic Conclusions
  • Future Outlook-Predictions
  • Legal Disclaimer

Appendix-Companies Profiles

  • Technology Providers Profiles
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Technology Providers Profiles (continued)
  • Managed Services Profiles
  • Managed Services Profiles (continued)
  • Managed Services Profiles (continued)

Appendix

  • List of Acronyms
  • List of Exhibits
  • List of Exhibits (continued)

The Frost & Sullivan Story

  • The Frost & Sullivan Story
  • Value Proposition-Future of Your Company & Career
  • Global Perspective
  • Industry Convergence
  • 360º Research Perspective
  • Implementation Excellence
  • Our Blue Ocean Strategy
Back to Top