醫療保健中的網絡安全:主題調查
市場調查報告書
商品編碼
1125405

醫療保健中的網絡安全:主題調查

Cybersecurity in Healthcare - Thematic Research

出版日期: | 出版商: GlobalData | 英文 62 Pages | 訂單完成後即時交付

價格

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

醫療保健行業在網絡安全方面是一個特別脆弱的行業,因為它處理高度敏感的數據。此外,業務職能通常是生死攸關的問題。醫療保健和製藥公司的數據洩露成本高於任何其他行業的數據洩露。在 COVID-19 大流行期間,網絡風險也顯著增加,從面對面諮詢轉向虛擬諮詢和數字監控,從辦公室工作轉向遠程工作。

本報告探討醫療保健行業的網絡安全,提供有關關鍵參與者、價值鏈、挑戰和趨勢的深入信息。

內容

內容

  • 執行摘要
  • 網絡安全價值鏈
  • 網絡安全價值鏈中的主要參與者
  • 網絡安全硬件
  • 基於芯片的安全性
  • 網絡安全軟件
  • 身份管理
  • 網絡安全
  • 端點安全
  • 威脅檢測和響應
  • 雲安全
  • 數據安全
  • 電子郵件安全
  • 應用安全
  • 統一威脅管理
  • 漏洞管理
  • 網絡安全服務
  • 託管安全服務
  • 違規後響應服務
  • 風險與合規服務
  • 醫療保健問題
  • GlobalData 醫療保健行業數字化轉型和新興技術調查(2021 年)
  • 網絡安全對醫療保健的影響
  • COVID-19 對網絡安全的影響
  • 網絡衛生對網絡安全的影響
  • 聯網設備對網絡安全的影響
  • 法規對網絡安全的影響
  • 人工智能對網絡安全的影響
  • 案例研究
  • Augmedix 使用 Trustwave MDR 保護醫療保健信息
  • 大科技和數據隱私問題:Google 主導 DeepMind Health
  • 醫療保健公司採用 TRIMEDX 作為網絡安全解決方案
  • 費森尤斯攻擊凸顯了網絡安全的必要性
  • 醫療保健領域的網絡安全
  • 對默克公司的 NotPetya 攻擊:醫療行業最大的網絡攻擊和保險訴訟的先例
  • WannaCry 損害 NHS 服務
  • 數據分析
  • 市場規模和增長預測
  • 併購
  • 招聘趨勢
  • 首席信息安全官 (CISO)
  • 社交媒體趨勢
  • 網絡安全時間表
  • 公司
  • 醫療保健領域的領先網絡安全採用者
  • 領先的網絡安全供應商
  • 醫療保健領域的專業網絡安全供應商
  • 行業記分卡
  • 臨床試驗部門記分卡
  • 利益相關者
  • 主題屏幕
  • 評估屏幕
  • 風險屏幕
  • 詞彙表
  • 參考資料
  • GLOBALDATA報告
  • 按主題研究方法
  • 關於GLOBALDATA
  • 聯繫
Product Code: GDHCHT337

Cyberattacks are especially dangerous to healthcare

Weak cybersecurity measures expose companies to serious risk. Victim companies suffer operationally, as systems are rendered unusable; reputationally, as customers lose trust; and legally, as ever-stricter regulators seek to punish. The healthcare industry is particularly vulnerable because it uses extremely sensitive data. Pharma companies have proprietary scientific data and intellectual property, medical devices companies develop connected devices, and healthcare companies collect and utilize patient data.

Additionally, operational functions are often literally matters of life and death. Breaches in healthcare and pharma cost more than those in almost any other industry.

After COVID, cyber risk is higher than ever

The rush from in-person care to virtual care and digital monitoring, and from office-based work to remote working, amid the COVID-19 pandemic significantly increased cyber risk. The increased use of technology, especially cloud, increased the potential attack surface, and the high speed of transition required meant many information technology security teams had insufficient time to install adequate security defenses. Healthcare companies, especially hospitals and pharma companies, reported increases in cyberattack attempts and government bodies like the Federal Bureau of Investigation issued warnings about the increased threat.

Scope

  • Key players in the cybersecurity in healthcare space: leading cybersecurity vendors, specialist cybersecurity vendors in healthcare, leading cybersecurity adopters in healthcare.
  • Value chain including a definition of cybersecurity and the different relevant technologies and processes.
  • Key challenges the healthcare industry faces and explanations of how cybersecurity can help. Challenges include manufacturing, marketing and sales, R&D, improving surgery safety, medical training for students and doctors, and improving patient safety
  • Detailed analysis of cybersecurity activity in healthcare using various data sets, including deals, hiring, company filings, and social media.
  • Profiles of private and public companies in the space.

Reasons to Buy

  • See who the leading players are in cybersecurity
  • See how the competitive landscape is evolving, with a review of company activity including mergers and acquisitions (M&A), strategic partnerships and funding deals, as well as a jobs analysis.
  • Understand what cybersecurity is and what it can do.

Table of Contents

Table of Contents

  • Executive Summary
  • Cybersecurity Value Chain
  • Key players in the cybersecurity value chain
  • Cybersecurity hardware
  • Chip-based security
  • Cybersecurity software
  • Identity management
  • Network security
  • Endpoint security
  • Threat detection and response
  • Cloud security
  • Data security
  • Email security
  • Application security
  • Unified threat management
  • Vulnerability management
  • Cybersecurity Services
  • Managed security services
  • Post-breach response services
  • Risk and compliance services
  • Healthcare Challenges
  • GlobalData's Digital Transformation and Emerging Technology in the Healthcare Industry Survey, 2021
  • The Impact of Cybersecurity on Healthcare
  • How does COVID-19 impact cybersecurity?
  • How does cyber hygiene impact cybersecurity?
  • How do connected devices impact cybersecurity?
  • How does regulation impact cybersecurity?
  • How does AI impact cybersecurity?
  • Case Studies
  • Augmedix uses Trustwave MDR to protect healthcare information
  • Big Tech and data privacy concerns: Google takes control of DeepMind Health
  • Healthcare companies turn to TRIMEDX for cybersecurity solutions
  • Fresenius attack underlines the need for cybersecurity
  • Cybersecurity in Healthcare
  • The NotPetya attack on Merck & Co: Healthcare's biggest cyberattack and a precedent for insurance cases
  • WannaCry compromises NHS services
  • Data Analysis
  • Market size and growth forecasts
  • Mergers and acquisitions
  • Hiring trends
  • Chief information security officers (CISOs)
  • Social media trends
  • Cybersecurity timeline
  • Companies
  • Leading cybersecurity adopters in healthcare
  • Leading cybersecurity vendors
  • Specialist cybersecurity vendors in healthcare
  • Sector Scorecard
  • Clinical Trials sector scorecard
  • Who's who
  • Thematic screen
  • Valuation screen
  • Risk screen
  • Glossary
  • Further Reading
  • GlobalData reports
  • Our Thematic Research Methodology
  • About GlobalData
  • Contact Us

List of Tables

List of Tables

  • Table 1: Key challenges facing the healthcare sector
  • Table 2: Key M&A transactions associated with the cybersecurity theme since January 2021
  • Table 3: M&A transactions associated with the cybersecurity theme in the healthcare industries since April 2015
  • Table 4: Chief information security officers (CISOs)
  • Table 5: Healthcare companies currently deploying cybersecurity and summarizes their competitive position
  • Table 6: Leading players within the cybersecurity theme and summarizes their competitive position
  • Table 7: Specialist cybersecurity vendors in the healthcare sector and summarizes their competitive position
  • Table 8: Glossary
  • Table 9: GlobalData reports

List of Figures

List of Figures

  • Figure 1: Key players in the cybersecurity value chain
  • Figure 2: The cybersecurity value chain
  • Figure 3: The cybersecurity value chain - hardware
  • Figure 4: The cybersecurity value chain - software
  • Figure 5: The cybersecurity value chain - Network security
  • Figure 6: The cybersecurity value chain - Endpoint security
  • Figure 7: The cybersecurity value chain - Threat detection and response
  • Figure 8: The cybersecurity value chain - Cloud security
  • Figure 9: The cybersecurity value chain - Data security
  • Figure 10: The cybersecurity value chain - Email security
  • Figure 11: The cybersecurity value chain - Application security
  • Figure 12: The cybersecurity value chain - Unified threat management
  • Figure 13: The cybersecurity value chain - Vulnerability management
  • Figure 14: The cybersecurity value chain - Managed security services
  • Figure 15: The cybersecurity value chain - Post-breach response services
  • Figure 16: The cybersecurity value chain - Risk and compliance services
  • Figure 17: Companies are consistently prioritizing cybersecurity
  • Figure 18: Thematic impact assessment for pharma
  • Figure 19: Thematic impact assessment for healthcare
  • Figure 20: Thematic impact assessment for medical devices
  • Figure 21: Cybersecurity spending is forecast to grow in all healthcare sectors
  • Figure 22: Managed security services dominate cybersecurity spending across healthcare
  • Figure 23: Cybersecurity hiring activity is increasing across the healthcare industries
  • Figure 24: COVID-19 sparked hundreds of cyberattacks
  • Figure 25: The cybersecurity story
  • Figure 26: Who does what in the clinical trials space?
  • Figure 27: The thematic screen ranks companies based on overall leadership in the 10 themes that matter most to their industry, generating a leading indicator of future performance
  • Figure 28: Our valuation screen ranks our universe of companies within a sector based on selected valuation metrics
  • Figure 29: Our risk screen ranks companies within a particular sector based on overall investment risk