Cover Image
市場調查報告書

網路安全:金融服務、MNO、企業&IoT的風險降低策略 (2018-2022年)

Cybersecurity: Mitigation Strategies for Financial Services, Operators, Enterprise & IOT 2018-2022

出版商 Juniper Research 商品編碼 329757
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
Back to Top
網路安全:金融服務、MNO、企業&IoT的風險降低策略 (2018-2022年) Cybersecurity: Mitigation Strategies for Financial Services, Operators, Enterprise & IOT 2018-2022
出版日期: 2018年03月13日 內容資訊: 英文
簡介

本報告提供金融服務、MNO、企業&IoT的網路安全策略調查,網路安全環境和核心策略,各產品部門的主要策略和案例研究,主要供應商分析,資料洩漏犯罪的數量及網路安全解決方案的支出額的預測等彙整資料。

提供內容

  • 市場趨勢、競爭環境 (PDF)
  • 5年市場預測 (PDF & Excel)

目錄

第1章 要點、策略性建議

第2章 網路安全環境和核心策略

  • 簡介
  • 網路安全策略的建立
  • 網路安全必要條件的變化
    • 行為分析
      • 案例研究:Cerber
    • IoT的影響
    • 數位憑證的弱點

第3章 金融服務網路安全策略

  • 簡介
  • 主要策略
    • API的保護
    • 對SIM交換詐騙的注意
    • 認證機制的檢驗
      • 案例研究:SS7 Exploited
    • 機器人流程自動化的審核

第4章 MNO網路安全策略

  • 簡介
    • 設備的保護
    • 網路的保護
      • 案例研究:Nixer
    • 克服LTE網路的安全風險
    • 5G的策略

第5章 企業、IoT網路安全策略

  • 簡介
    • 威脅的演進
      • 案例研究:Positive Technologies
    • 連網型產業:傳統資產的保護
      • 案例研究:Indegy
    • SIEM的重要性
    • 用戶檢驗
      • 案例研究:CyberArk
    • 風險評估和攻擊方面的最小化

第6章 供應商分析

  • 簡介
  • 供應商評價標準
  • Juniper排行榜
  • 業者簡介
    • Barracuda Networks
    • Carbon Black
    • CipherCloud
    • Darktrace
    • FireEye
    • Forcepoint
    • IBM
    • Indegy
    • Netwrix
    • Qualys
    • Symantec Endpoint Protection Mobile (舊Skycure)
    • Tanium
    • Webroot

第7章 市場預測

  • 資料洩漏
  • 資料洩漏犯罪的預測
  • 網路安全解決方案的支出額
  • 網路安全市場預測

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

Overview

Juniper's Cybersecurity Mitigation Strategies research provides a comprehensive analysis of required cybersecurity strategies for service providers, framed in the context of concepts such as digital transformation, open banking APIs, the IoT (Internet of Things) and all-IP mobile networks.

Readers will understand how to successfully layer their networks to mitigate against inevitable breaches, helping to protect the bottom line.

The analysis covers key industry service provider markets, including:

  • Financial Services
  • Mobile Network Operators
  • Enterprise & IoT

This research suite comprises:

  • Market Trends & Competitive Landscape (PDF)
  • 5 Year Market Sizing & Forecast (PDF & Excel)

Key Features

  • Core Strategic Analysis: Examination of key strategies for high-risk networks, including:
    • Security by Design
    • Lifecycle Management
    • Network Segmentation
    • Digital Certificates
  • Sector Dynamics: Analysis of emerging threats and strategic recommendations for service providers in key markets:
    • Financial Services
    • Mobile Network Operators
    • Enterprise & IoT
  • Juniper Leaderboard: Analysis and assessment for 13 leading cybersecurity solution vendors
  • Benchmark industry forecasts: market segment forecasts for cybersecurity, including:
    • Cybercrime Breach Volume
    • Cybersecurity Spend

Key Questions

  • 1. How will digital transformation, open banking and the Internet of Things impact cybersecurity requirements for service providers?
  • 2. How can the weaknesses in LTE be addressed in preparation for 5G?
  • 3. How can service providers minimise the attack surface and level of risk they are exposed to?
  • 4. How are cybercriminals adapting to new defensive measures, and how can this be mitigated against?
  • 5. What is the anticipated size of the cybersecurity solution market?

Companies Referenced

  • Profiled: Barracuda, Carbon Black, CipherCloud, DarkTrace, FireEye, Forcepoint, IBM, Indegy, Netwrix, Qualys, Symantec Endpoint Protection Mobile (Formerly Skycure), Tanium, Webroot.
  • Case Studied: Crossword, CyberArk, Indegy, Positive Technologies.
  • Mentioned: Accenture, Amazon, Anicut, Apple, Aspediens, Associated Press, AT&T, Avancial, Belden, BH Global, BlackBerry, BT, CIS (Center for Internet Security), Cisco, Citigroup, Citrix, CloudFlare, CloudUP Networks, CMS Distribution, Coca-Cola, Cognizant Technology Solutions, Comodo, Concept Searching, Conosco, Cyberflow Analytics, Deloitte, Deutsche Telekom, Dyn, Endgame, Ericsson, FireEye, Forbes, Fujitsu, Google, HCL, Hewlett-Packard, Infosys, Intel, Intronis, iSight Partners, Juniper Networks, Mandiant, Metro Bank, Microsoft, NATO, Netwatcher, Nevis Networks, NTT, Open Banking Implementation Entity, Optiv, Palo Alto Networks, Peugeot, Proofpoint, Prudential, PwC, Raytheon, RedOwl, Resilient Systems, Samsung, SAP, Securecast, SecureWorks, ServiceNow, SignNow, Skyfence, Splunk, Stuxnet, Tata Communications, Telstra, Tenable Network Security, Three, Toyota, Verizon, Virgin Media, Visa, VMWare, Wipro, ZScaler.

Data & Interactive Forecast

Juniper's Cybersecurity Mitigation Strategies forecast suite includes:

  • Forecast splits for:
    • Cybercrime breach volume
    • Cybersecurity software solution spend
  • Regional splits for 8 key global regions
  • Access to the full set of forecast data of 2 tables and 108 datapoints.

Juniper Research's highly granular interactive Excels enable clients to compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

1. Key Takeaways & Strategic Recommendations

  • 1.1. Key Takeaways
    • Figure 1.1: Global Cybersecurity Forecast Snapshot, 2022
  • 1.2. Strategic Recommendations

2. Cybersecurity Landscape & Core Strategies

  • 2.1. Introduction
  • 2.2. Developing a Cybersecurity Strategy
    • 2.2.1. Security by Design
  • 2.3. Changing Cybersecurity Requirements
    • 2.3.1. Behavioural Analysis
      • Case Study: Cerber - Evading Machine Learning
    • 2.3.2. Impact of the IoT
    • 2.3.3. Weaknesses in Digital Certificates
      • Figure 2.1: Illicit CA Certificate Marketplace
      • i. Implications

3. Cybersecurity Strategies For Financial Services

  • 3.1. Introduction
    • Figure 3.1: Major losses from Banking Malware
    • 3.1.1. Anatomy of an Advanced Persistent Threat Attack: Carbanak
      • Table 3.2: Carbanak Attack Execution Phases
  • 3.2. Key Strategies
    • 3.2.1. Protect APIs
    • 3.2.2. Beware of SIM Swap Fraud
    • 3.2.3. Consider Authentication Mechanisms
      • Case Study: SS7 Exploited
    • 3.2.4. Audit Robotic Process Automation
      • Figure 3.3: Total Robotic Process Automation Software & Services Revenue, Banking & Financial Services ($m), Split by 8 Key Regions 2017-2022

4. Cybersecurity Strategies for Mobile Network Operators

  • 4.1. Introduction
    • 4.1.1. Protect the Device
    • 4.1.2. Protect the Network
      • Case Study: Nixer
    • 4.1.3. Overcome Security Risks Present in LTE Networks
    • 4.1.4. Strategy to 5G
      • Figure 4.1: Stages & Rationale for SDN/NFV migration

5. Cybersecurity Strategies for Enterprise & IoT

  • 5.1. Introduction
    • 5.1.1. Evolution of Threats
      • Case Study: Positive Technologies
    • 5.1.2. Connected Industry: Protect Legacy Assets
      • Case Study: Indegy
    • 5.1.3. The Importance of SIEM
    • 5.1.4. Verify Users
      • Case Study: CyberArk
    • 5.1.5. Assess Risk & Minimise the Attack Surface

6. Cybersecurity Vendor Analysis

  • 6.1. Introduction
  • 6.2. Vendor Assessment Criteria
    • Table 6.1: Vendor Capability Assessment Criteria
  • 6.3. Juniper Leaderboard for Cybersecurity
    • Figure 6.2: Cybersecurity Vendors Leaderboard Positioning
    • Table 6.3: Cybersecurity Vendors Leaderboard Scoring
    • 6.3.1. Vendor Groupings
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 6.3.2. Limitations & Interpretation
  • 6.4. Vendor Profiles
    • 6.4.1. Barracuda Networks
      • i. Corporate Profile
        • Table 6.4: Barracuda Networks Financial Snapshot ($m) FY2014-2017
        • Table 6.5: Barracuda Networks Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.2. Carbon Black
      • i. Corporate Profile
        • Table 6.6: Carbon Black Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.3. CipherCloud
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.4. Darktrace
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.5. FireEye
      • i. Corporate Profile
        • Table 6.7: FireEye Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.6. Forcepoint
      • i. Corporate Profile
        • Table 6.8: Forcepoint Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.7. IBM
      • i. Corporate Profile
        • Table 6.9: IBM Financial Snapshot ($m) FY 2014-2016
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Cybersecurity Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.8. Indegy
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.9. Netwrix
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.10. Qualys
      • i. Corporate Profile
        • Table 6.10: Qualys Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.11. Symantec Endpoint Protection Mobile (Formerly Skycure)
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.12. Tanium
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnershipss
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 6.4.13. Webroot
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Endpoint Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities

7. Cybersecurity Market Forecasts

  • 7.1. Data Breaches
    • Figure 7.1: Criminal Data Breach Forecast Methodology
    • 7.1.1. Forecast Assumptions & Limitations of Analysis
  • 7.2. Cybercrime Breaches Forecasts
    • 7.2.1. Breaches Volume
      • Figure & Table 7.2: Total Number of Criminal Data Breaches per annum, Split by 8 Key Regions 2017-2022
  • 7.3. Cybersecurity Spend Forecast Methodology
    • Figure 7.3: Cybersecurity Solution Spend Methodology
    • 7.3.1. Forecast Assumptions & Limitations of Analysis
  • 7.4. Cybersecurity Market Forecasts
    • Figure & Table 7.4: Total Cybersecurity Spend per annum ($m), Split by Business Size 2017-2022
Back to Top