表紙
市場調查報告書
商品編碼
916755

認知安全:全球新當務之急

Cognitive Security: The New Global Imperative

出版日期: | 出版商: Frost & Sullivan | 英文 40 Pages | 商品交期: 最快1-2個工作天內

價格
  • 全貌
  • 簡介
  • 目錄
簡介

網路攻擊日益複雜,對企業資產帶來了龐大損害。實行數位化創製的企業儘管害怕企業網路遭受毀滅性網路攻擊,仍持續強化安全對策、致力支援和保護組織現代化。

本報告研究網路安全現況及認知安全展望,彙整日益複雜的網路攻擊趨勢、企業面臨的課題、認知安全和AI概要與重要性、導入領域和課題、專利和投資分析、按產業領域的趨勢和課題、矚目企業、企業行動和建議等情報。

第1章 摘要整理

第2章 網路安全現況

  • 當企業面臨嚴重人才短缺之時,網路攻擊越來越複雜並具毀滅性
  • 透過尖端技術的網路犯罪

第3章 簡介:認知安全

  • 認知智能技術:實現自動化威脅檢測、任務響應
  • AI工具支援從大量數據中生成的連網資產
  • AI自動化手動安全任務以利安全分析師處理更複雜的警報
  • 零時差攻擊檢測和無效化:Fuzzing & Crawling技術

第4章 網路安全的AI:課題和導入領域

  • 於網路安全導入AI的企業:網路安全為最優先事項,並追求組織變革以推動AI
  • 作為關鍵決策者的CIO、CISO:專注人才培訓、投資既有基礎建設的更新
  • AI工具:面臨整合既有基礎建設的課題

第5章 專利和投資分析

第6章 網路安全:按產業領域

  • 銀行、保險、金融服務:由於直接金錢利益,為主要犯罪攻擊對像
  • 金融機構:在嚴格的監管規範下,實施更強力的安全管理
  • 醫療保健:IoT主要末端使用者部門,聚焦採用更穩健的安全管理
  • 汽車產業對第三方提供商的依賴:整體安全的主要課題
  • 工業基礎建設:國家參與攻擊的主要對像

第7章 企業行動

  • AI:初創企業實現創新行動的開發和實施
  • Vectra:原生和混合雲端環境之透過AI的威脅檢測和因應
  • CrowdStrike:設計全球第一個雲端原生端點安全平台
  • Dragos:實現小型企業抵抗網路攻擊

第8章 結論和建議

第9章 產業聯絡資訊

目錄
Product Code: D8BD

Leveraging Technology Advancements in Artificial Intelligence to Secure Modern Enterprise Infrastructure

Cyberattacks have been getting more and more sophisticated day by day and are causing substantial damage to enterprise assets. Companies undertaking digitization initiatives are being discouraged by the possibility of exposing their networks to devastating cyberattacks. These companies are looking to ramp up their security controls to support and protect their modernization efforts.

At the same time, the industry is faced with a scarcity of trained security analysts and companies are thus looking to implement solutions that can automate a major part of their workload. Cognitive Security solutions are addressing some of these pressing issues in cybersecurity and are aiding in implementation of proactive security approach, guiding security teams by using a predictive threat response.

In brief, this research service covers the following points:

  • State of Cybersecurity
  • Introduction of Cognitive Intelligence
  • Challenges and Implantation Areas
  • Cybersecurity by Industry Area
  • Companies to Action

Table of Contents

1.0. Executive Summary

  • 1.1. Research Scope
  • 1.2. Research Methodology
  • 1.3. Research Methodology Explained

2.0. State of Cybersecurity

  • 2.1. Cyberattacks are Becoming More Sophisticated and Devastating While Companies are Facing Acute Talent Shortage in Security Teams
  • 2.2. Advanced Technologies Have Been Available to Cybercriminals who Have Been Highly Agile in Adopting Them to Design Cyberattacks

3.0. Introduction To Cognitive Security

  • 3.1. Cognitive Intelligence Technologies Have Enabled Automation of Threat Detection and Response Tasks
  • 3.2. AI Tools Have Helped Security Teams Make Sense of Large Datasets Being Generated from Connected Assets
  • 3.3. AI Has Automated Menial Security Tasks so as to Enable Security Analysts to Manually Deal with More Complex Alerts
  • 3.4. Detecting and Neutralizing Zero Day Attacks Has Been Made Possible Through Fuzzing and Crawling Techniques

4.0. Challenges and Implantation Areas for AI in Cybersecurity

  • 4.1. Companies Adopting AI into Cybersecurity are Prioritizing Network Security and are also Pursuing Organizational Change to Facilitate AI
  • 4.2. CIOs and CISOs are the Key Decision Makers and are Focusing on Training of Staff, and Investing in Upgrading Existing Infrastructure
  • 4.3. AI Tools are Facing Challenges in Integrating with Existing Legacy Infrastructure Within Companies

5.0. Patent and Investment Analysis of Cybersecurity Industry

  • 5.1. Academic Institutes are the Top Patent Holders in the Area of Cognitive Security
  • 5.2. Cybersecurity Market is Showing Early Signs of Maturity as the Total Amount of Growth Stage Funding Has now Exceeded Seed Stage
  • 5.3. United States is the Undoubted Market Leader While Israel is Emerging as a Hub of Innovation in Cybersecurity

6.0. Cybersecurity by Industry Area

  • 6.1. Banking, Insurance, and Financial Services are Prime Targets of Attacks as Criminals Can Gain Clear Monetary Benefits from Them
  • 6.2. Financial Institutions are Under Regulatory Pressure to Implement Stronger Security Controls
  • 6.3. Healthcare is one of the top Adopters of IoT and is thus Focusing on Adopting Stronger Security Controls
  • 6.4. The Dependency of the Automotive Industry on Third Party Provider is a Key Challenge in Implanting Holistic Security for a Car
  • 6.5. Industrial Infrastructure is the Key Target for State-sponsored Attacks, which are Typically More Sophisticated and Devastating

7.0. Companies to Action

  • 7.1. AI Has Enabled Startups to Develop and Implement Truly Innovative Approaches of Battling Security Threats
  • 7.2. Vectra is Using AI to Drive Threat Detection and Response for Native and Hybrid Clouds
  • 7.3. CrowdStrike Has Designed World's First Cloud Native Endpoint Security Platform for Endpoint Security
  • 7.4. Dragos Has Enabled Smaller Companies Fight Against Cyberthreats by Helping Them Collaborate on Cyber Intelligence

8.0. Conclusion and Recommendations

  • 8.1. Conclusions and Recommendations

9.0. Industry Contacts

  • 9.1. Industry Contacts
  • Legal Disclaimer