NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

表紙
市場調查報告書

智慧城市的網絡安全:數據安全設備和端點安全網絡安全與控制

Cybersecurity for Smart Cities: Data Security, Device and Endpoint Security, and Network Security and Controls

出版商 Guidehouse Insights (formerly Navigant Research) 商品編碼 1024074
出版日期 內容資訊 英文 72 Pages; 33 Tables, Charts & Figures
訂單完成後即時交付
價格
智慧城市的網絡安全:數據安全設備和端點安全網絡安全與控制 Cybersecurity for Smart Cities: Data Security, Device and Endpoint Security, and Network Security and Controls
出版日期: 2021年08月20日內容資訊: 英文 72 Pages; 33 Tables, Charts & Figures
簡介

智能城市應用和技術,例如智能電錶、智能照明、智能建築和移動性,通過將物聯網技術融入基礎設施、服務和建築環境,提供便利和協作。但是,通過將在公共網絡上互連的設備整合到新的或現有的基礎設施中,威脅攻擊的目標將會增加。隨著這些系統變得越來越複雜,需要網絡安全最佳實踐、潛在風險影響分析和事件響應能力。

本報告調查了智慧城市的網絡安全市場,概述了智慧城市、市場驅動因素和挑戰、關鍵技術和創新的趨勢、最佳實踐、相關法律法規、標準和主要公司的舉措, 總結了按行業/地區劃分的利潤規模預測、各種建議等。

第 1 章執行摘要

第二章市場分析

  • 智慧城市概覽
  • 網絡安全概述/最佳實踐
  • 關鍵基礎設施的網絡安全
  • 網絡安全最佳實踐
  • 智慧城市網絡安全要點
    • 數據安全
    • 設備端點安全
    • 網絡安全
  • 風險管理
  • 市場驅動因素
  • 市場壁壘

第三章技術趨勢

  • 智慧城市保護創新
    • SASE
    • 人工智能/高級分析
    • 自動化網絡安全
    • 數字孿生
    • 生物識別
    • 區塊鏈
    • 量子計算
  • 框架/標準
    • NIST
    • ISA/IEC62443
    • ENISA
    • ISO □ IECTS 27570
    • 其他

第 4 章主要公司

  • Armis
  • Bitdefender
  • Check Point Software Technologies
  • Cisco Systems
  • CrowdStrike
  • Cybereason
  • Darktrace
  • Forescout Technologies
  • Fortinet
  • IBM
  • Kaspersky
  • McAfee
  • Microsoft Corporation
  • Mocana
  • Nokia
  • Palo Alto Networks
  • Tenable
  • Trend Micro

第 5 章市場預測

  • 世界市場展望
  • 北美
  • 歐洲
  • 亞太地區
  • 拉丁美洲
  • 中東/非洲

第 6 章一般評論/建議

  • 城市
  • 安全供應商
  • 政府

第 7 章首字母縮略詞列表

第8章目錄

第9章圖表

第十章調查範圍/來源/調查方法/注意事項

目錄
Product Code: MO-CSSC-21

Smart city applications and technologies-the world of smart meters, smart lighting, intelligent buildings, mobility, and more-provide convenience and coordination by embedding Internet of Things (IoT) technology into infrastructure, services, and built environments. Building more devices, applications, and technologies that are connected to one another on public networks into new and existing infrastructures increases the attack surface for threat actors. These systems of systems are increasingly complex and require cybersecurity best practices, impact assessments for potential failure or compromise, and the establishment of incident response capabilities.

The stakeholder community for cybersecurity among smart cities is vast, including the entire smart city supplier ecosystem; federal, state, and local governments; leading management consulting firms; industrial engineering and manufacturing firms; enterprise hardware and software security vendors; and niche startups hoping to capture unique segments of the smart cities market. There is an opportunity to bridge the gap between the decentralized nature of city business management and finance and the need for centralized security risk management and controls for technology projects.

This Guidehouse Insights report covers the current state of cybersecurity for smart cities technologies-a patchwork of endpoint and data security, device and endpoint security, and network security solutions. Cybersecurity vendors with various platforms and service models already compete for small city IT budgets at the municipal level. Smart city applications and technologies are relatively limited to pilot projects and staggered rollouts, though deployments are germinating around the globe. Smart city ecosystems are made up of sensors and devices, mobile applications, cloud infrastructures, and network communications. The ubiquity of billions of simple computing devices that transfer and transmit data over networks is driven by an assumption that security is built into smart products and devices.

KEY QUESTIONS ADDRESSED:

  • What are the main drivers of cybersecurity for smart city applications and technologies?
  • Who is responsible for cybersecurity in smart cities?
  • What value-add or revenue-generating features can be built into cybersecurity products and solutions?
  • Who are the main stakeholders for cybersecurity risk management and controls across smart city developments?
  • How do you build a mature and robust cybersecurity program in and across smart cities?

WHO NEEDS THIS REPORT:

  • OEMs
  • Telecommunications providers
  • IoT hardware providers
  • Connected system software vendors
  • Smart city application developers
  • Cybersecurity vendors
  • Municipal governments
  • Federal governments
  • Management consultancies
  • Industry associations for smart cities
  • Industry associations for cybersecurity
  • Industry associations for IoT and connected devices
  • Investor community

Table of Contents

1. Executive Summary

  • 1.1. Smart City Developments
  • 1.2. Current State of Smart City Cybersecurity
  • 1.3. Global Outlook

2. Market Issues

  • 2.1. Smart City Overview
    • 2.1.1. Smart City Supplier Ecosystem
      • 2.1.1.1. Trends in Smart City Industries
  • 2.2. Cybersecurity Overview and Best Practices
    • 2.2.1. Cyber Threat Landscape
    • 2.2.2. Threat Actors
    • 2.2.3. Cyberattack Types
      • 2.2.3.1. Man-in-the-Middle Attacks
      • 2.2.3.2. Malware and Ransomware
        • 2.2.3.2.1. Atlanta Ransomware Attack
      • 2.2.3.3. Distributed Denial-of-Service Attacks
        • 2.2.3.3.1. The Mirai Botnet
  • 2.3. Cybersecurity for Critical Infrastructure
  • 2.4. Cybersecurity Procedural Best Practices
    • 2.4.1. Zero Trust
    • 2.4.2. Segmentation
    • 2.4.3. Whitelisting
  • 2.5. Cybersecurity Staples in Smart Cities
    • 2.5.1. Data Security
    • 2.5.2. Device and Endpoint Security
    • 2.5.3. Network Security
  • 2.6. Risk Management
    • 2.6.1. Controls
    • 2.6.2. Detection
    • 2.6.3. Response
  • 2.7. Market Drivers
    • 2.7.1. Increase in Technologies and Connectivity
    • 2.7.2. Rising Number and Cost of Attacks
    • 2.7.3. Data Integration and Management
    • 2.7.4. Insurance Coverage
  • 2.8. Market Barriers
    • 2.8.1. Cost and ROI
    • 2.8.2. Complexity and Scalability
    • 2.8.3. Legacy Technologies and OT Integration
    • 2.8.4. Lack of Personnel and Awareness

3. Technology Issues

  • 3.1. Innovations for Securing Smart Cities
    • 3.1.1. Secure Access Service Edge
    • 3.1.2. AI and Advanced Analytics
      • 3.1.2.1. Predictive Analytics and Maintenance
    • 3.1.3. Automated Cybersecurity
    • 3.1.4. Digital Twins
    • 3.1.5. Biometrics
    • 3.1.6. Blockchain
    • 3.1.7. Quantum Computing
  • 3.2. Frameworks and Standards
    • 3.2.1. NIST
    • 3.2.2. International Society of Automation and IEC 62443
    • 3.2.3. The European Union Agency for Cybersecurity
    • 3.2.4. ISO and IEC TS 27570
    • 3.2.5. Additional Frameworks and Standards

4. Key Industry Players

  • 4.1. Armis
  • 4.2. Bitdefender
  • 4.3. Check Point Software Technologies
  • 4.4. Cisco Systems
  • 4.5. CrowdStrike
  • 4.6. Cybereason
  • 4.7. Darktrace
  • 4.8. Forescout Technologies
  • 4.9. Fortinet
  • 4.10. IBM
  • 4.11. Kaspersky
  • 4.12. McAfee
  • 4.13. Microsoft Corporation
  • 4.14. Mocana
  • 4.15. Nokia
  • 4.16. Palo Alto Networks
  • 4.17. Tenable
  • 4.18. Trend Micro

5. Market Forecasts

  • 5.1. Global Outlook
  • 5.2. North America
  • 5.3. Europe
  • 5.4. Asia Pacific
  • 5.5. Latin America
  • 5.6. Middle East & Africa

6. Conclusions and Recommendations

  • 6.1. Cities
  • 6.2. Security Vendors
  • 6.3. National Governments

7. Acronym and Abbreviation List

8. Table of Contents

9. Table of Charts and Figures

10. Scope of Study, Sources and Methodology, Notes

LIST OF CHARTS AND FIGURES

  • Smart City Cybersecurity Revenue by Region, World Markets: 2021-2030
  • Smart City Data Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, North America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Europe: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Latin America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Supplier Ecosystem
  • Example of the Cyber Kill Chain Steps
  • ICS Cybersecurity Product Types
  • Network Segmentation and Zero Trust Example
  • Smart City Common Networks and Communications Protocol

LIST OF TABLES

  • Smart City Cybersecurity Revenue by Region, World Markets: 2021-2030
  • Smart City Data Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, World Markets: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, World Markets: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, North America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Europe: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Latin America: 2021-2030
  • Smart City Cybersecurity Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Data Security Revenue by Industry, North America: 2021-2030
  • Smart City Data Security Revenue by Industry, Europe: 2021-2030
  • Smart City Data Security Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Data Security Revenue by Industry, Latin America: 2021-2030
  • Smart City Data Security Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, North America: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Europe: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Asia Pacific: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Latin America: 2021-2030
  • Smart City Networking and Device Security Revenue by Industry, Middle East & Africa: 2021-2030
  • Smart City Applications and Technologies