市場調查報告書
商品編碼
1273623
到2028年的威脅情報市場預測—按服務、解決方案、部署模式、組織規模、應用程序、最終用戶和地區進行的全球分析Threat Intelligence Market Forecasts to 2028 - Global Analysis By Service, Solution, Mode of Deployment, Organization Size, Application, End Userand Geography |
根據Stratistics MRC,2022年全球威脅情報市場規模將達到125.8億美元,預計2028年將達到205.3億美元,預計年復合增長率為8.5%。
威脅情報是關於現有或潛在資產威脅的事實資訊,包括背景、方法、指標、影響和可行的建議。 該知識可用於指導主體就如何處理危害或威脅做出決策。 最好的威脅情報解決方案使用機器學習來自動化數據收集和處理,與當前解決方案集成,從各種來源收集非結構化數據,並分析妥協指標 (IOC) 和威脅活動程序(TTP)。
根據國際律師事務所 Reed Smith 的數據,2020 年 3 月在線欺詐環比增長超過 400%,Google 每天發送 1800 萬封與 COVID-19 相關的惡意軟件和網路釣魚電子郵件。
世界各地的政府和商業公司都在研發方面進行投資,以部署尖端的威脅情報解決方案。 關鍵基礎設施安全和彈性 (CISR) 研發戰略呼籲加強當地社區、公共和商業實體以及外國合作夥伴擁有和運營的關鍵基礎設施的安全。 CISR R&D 鼓勵制定關鍵基礎設施升級行動計劃,以增強區域、區域和國家層面的國家彈性。 研發投資對於保護一個國家的關鍵基礎設施免受網絡攻擊至關重要。 美國、歐洲和澳大利亞政府啟動了公私合作夥伴關係,以改善當前的研究網絡,以保持關鍵基礎設施的彈性和安全。 這些夥伴關係側重於政府、私營組織和關鍵基礎設施所有者和運營商之間的資訊共享。
保護工業基礎設施安全的最大障礙是缺乏安全專業人員。 用於為工業基礎設施提供動力的威脅情報計算機系統必須由合格的網絡安全專業人員保護。 威脅情報的互聯正在加劇人才短缺。 英國和日本等國家很難找到合格的網絡安全專業人員。 儘管數字經濟興起,但與關鍵基礎設施打交道的安全專業人員卻越來越短缺。 因此,威脅情報系統的成功使用需要使用合格且經驗豐富的安全人員。
不斷發展的技術環境正在使世界的許多行業發生革命性變化。 因此,工業系統和數位技術正在融合,形成一個統一的生態系統。 因此,M2M 通信和 IIoT 等技術大有可為。 工業需要安全的控制系統,尤其是在礦山和海上油井等惡劣環境中使用的設備。 在這種環境中使用的設備出現故障可能會造成嚴重後果,包括危及附近居民的生命安全並給企業造成重大經濟損失。
投資威脅情報系統對於各國維持經濟穩定和改善安全態勢至關重要。 高效和安全的操作需要企業範圍的威脅情報系統,這會增加基礎設施成本。 對於某些運營商而言,威脅情報系統可能是一項昂貴的投資。 當前的威脅情報要求需要強大的多因素身份驗證,以確保只有授權人員才能對關鍵資產進行物理和邏輯訪問。 由於威脅情報解決方案的高成本和稀缺資源,運營商選擇多威脅解決方案。
COVID-19 情景引發了人們對威脅情報產品的興趣增加。 在此爆發之前,許多公司認為將存儲在雲中的關鍵數據移動可能存在風險。 然而,自大流行以來,雲解決方案的採用急劇增加,為威脅安全解決方案的需求打開了大門。 由於 COVID-19,電子郵件網絡釣魚犯罪呈上升趨勢。 COVID-19 被用作騙子賺錢的誘餌。 遠程辦公和其他遠程活動的增加增加了我們對電子郵件作為通信方式的依賴,使其成為電子郵件欺詐計劃的理想環境。 隨著雲威脅迅速增加,所有部門都必須重新評估其安全態勢。 為了抵□□禦試圖利用雲中漏洞的威脅,企業正在採用以雲為中心的安全方法。
託管服務預計將實現有利可圖的增長,因為它們為組織的安全提供了強大的情報基礎、可見性、監控和控制。 安全控制由威脅情報託管服務提供,該服務基於從用戶業務環境和威脅態勢動態中獲取的數據。 服務提供商使用分析和算法將數據點輸入自動化系統,以發現值得注意的事件以提醒客戶。 此外,服務提供商正在調整其組織的安全態勢以實現更好的防禦,這有望擴大威脅情報服務的市場。
在預測期內,零售部門預計將以最快的複合年增長率增長。 零售商正盯著通過博客、社交媒體平台和應用程序等各種渠道創建的大量數據。 零售業目前正在經歷一場數字革命,而且不僅僅局限於電商渠道。 有許多連接的小工具在實體店中用作手持設備,在售貨亭中用作銷售點系統,所有這些都旨在收集和訪問消費者信息。 隨著零售業迅速擴大數據量以阻止數據洩露並提供更高級別的安全性,對威脅情報的需求正在增長。
由於網路犯罪、物聯網利用率和雲服務使用率的增加,預計亞太地區在預測期內將佔據最大的市場份額。 隨著網絡攻擊的加劇,對安全解決方案的需求也在增加。 越來越多地使用物聯網和基於雲的服務正在推動該行業的發展。 由於數據盜竊問題日益嚴重,網絡攻擊數量不斷增加,不僅中國、日本和印度的大公司,還有許多中小型企業都在投資安全解決方案。
由於對網路威脅和數據洩露的擔憂日益增加,以及 IT、電信和 BFSI 等大量公司的存在,預計北美在預測期內的複合年增長率最高。 領先的威脅情報解決方案提供商也在為該地區的高效市場擴張做出貢獻。
2021 年 3 月,Anomali 宣布推出雲端原生 XDR 解決方案。 該解決方案為客戶提供了從端點到公共雲端的所有安全遙測的新可見性維度,在整個安全基礎設施中提供精確的檢測和優化的響應能力。
2020 年 1 月,Thales 與 GE Steam Power 簽訂合作協議,為電廠運營提供一套網絡安全解決方案。
According to Stratistics MRC, the Global Threat Intelligence Market is accounted for $12.58 billion in 2022 and is expected to reach $20.53 billion by 2028 growing at a CAGR of 8.5% during the forecast period. Threat intelligence is factual information, including context, methods, indicators, repercussions, and actionable suggestions, regarding an existing or potential threat to assets. This knowledge can be used to guide the subject's decision-making over how to handle the danger or threat. The best threat intelligence solutions use machine learning to automate the gathering and processing of data, integrate with current solutions, gather unstructured data from various sources, and then make connections by supplying context on indicators of compromise (IOCs) as well as threat actors' tactics, techniques, and procedures (TTPs).
According to international legal firm Reed Smith, online frauds increased by more than 400 percent in March 2020 compared to prior months, while Google disclosed it was filtering more than 18 million malware and phishing emails relating to COVID-19 per day.
In order to introduce cutting-edge solutions for threat intelligence, governments and commercial companies worldwide are investing in R&D. The vital Infrastructure Security and Resilience (CISR) R&D strategy calls for enhancing the security of vital infrastructure owned and operated by communities, as well as by public and commercial organisations, as well as by foreign partners. The CISR R&D encourages the deployment of action plans for crucial infrastructure upgrades to increase a nation's resilience at the local, regional, and national levels. Investments in R&D are essential to protecting nations' vital infrastructure from cyber attacks. Governments in the US, Europe, and Australia have started public-private partnerships to improve the current research network for maintaining the resilience and security of critical infrastructure. These partnerships focus on information sharing among governments, private organisations, and owners and operators of critical infrastructure.
The largest barrier to safeguarding industrial infrastructure is a shortage of security experts. Threat intelligence computer systems, which are used to power industrial infrastructure, need to be protected by qualified cybersecurity experts. Threat intelligence's interconnectedness has made the labour shortage worse. Countries like the UK and Japan are having trouble locating qualified cybersecurity specialists. Despite the rise of the digital economy, there is a growing lack of security experts to handle vital infrastructures. As a result, successful use of threat intelligence systems necessitates the use of qualified and experienced security personnel.
The evolving technological environment causes a global revolution in a number of industrial sectors. As a result, industrial systems and digital technologies have combined to form a unified ecosystem. Technologies like M2M communication and IIoT have significant prospects as a result. Industries require secure control systems, especially for equipment used in harsh environments like mines or undersea oil wells. Failure of this equipment working in these circumstances might have severe effects, endangering the lives of several people living nearby and causing significant operational financial losses.
For a nation to preserve its overall economic stability and improve its security posture, investments in threat intelligence systems are crucial. For efficient and safe operations, the use of threat intelligence systems necessitates company-wide coverage, which raises infrastructure expenses. Threat intelligence systems can turn out to be an expensive investment for certain operators. Strong multi-factor authentication is required by the current threat intelligence requirements to guarantee that only authorised personnel have physical and logical access to key assets. Due to the high cost of threat intelligence solutions and the scarcity of resources, operators choose multi-threat solutions.
The COVID-19 scenario has sparked a rise in interest in threat intelligence products. Before this outbreak, many businesses thought it may be dangerous to move critical data housed on the cloud. However, since the pandemic, cloud solution implementation has increased dramatically, opening the door for the demand for threat security solutions. Due to COVID-19, email phishing offences have increased. COVID-19 is being used as a lure by con artists to get money. The increase in teleworking and other distant activities has increased the reliance on email as a means of communication, making it the ideal environment for email fraud schemes. All sectors need to review their security postures as cloud threats amplify quickly. In order to shield themselves from threat actors looking to take advantage of the vulnerabilities in cloud deployments, enterprises are adopting a cloud-centric security approach.
The managed services segment is estimated to have a lucrative growth, due to of a strong intelligence foundation, redemption visibility, monitoring, and control over an organization's security. Security management is offered by threat intelligence managed services based on data obtained from users' business environments and threat landscape dynamics. In order to uncover noteworthy occurrences to further alert the client, it feeds the data points into the systems that are automated using analysis and algorithm. Additionally, the service provider adjusts the organization's security posture for better defence, which is anticipated to expand the market for managed threat intelligence services.
The retail segment is anticipated to witness the fastest CAGR growth during the forecast period. The retail sector is watching massive amounts of data being created through a variety of channels, such as blogs, social media platforms, and applications. The retail business is presently undergoing a digital revolution that is not just limited to the e-commerce channel, since there are many linked gadgets acting as portable devices in physical stores and point-of-sale systems in kiosks, all of which are intended to collect and access consumer information. Demand for threat intelligence is increasing as a result of the retail sectors rapidly expanding data quantities in order to stop data breaches and provide higher levels of security.
Asia Pacific is projected to hold the largest market share during the forecast period owing to escalating cybercrimes, IoT usage, and cloud-based service use in the Asia Pacific. Security solutions are more in demand as cyber attacks escalate. The industry is being driven by the increased use of IoT and cloud-based services. Due to the rising problems of data theft and an increase in cyber attacks, large corporations as well as a number of SMEs in China, Japan, and India have been investing in security solutions.
North America is projected to have the highest CAGR over the forecast period, owing to growing worries about cyber threats, data breaches, and the major presence of numerous IT, telecom, and BFSI enterprises. Leading threat intelligence solution providers are also responsible for the region's efficient market expansion.
Some of the key players profiled in the Threat Intelligence Market include: Fortinet, Inc., Thales, Anomali, Dell Inc., LogRhythm Inc., Broadcom Inc., IBM, Juniper Networks Inc., Cisco, Forcepoint, Infosys and SOCRadar.
In March 2021, Anomali announced the availability of its Cloud-Native XDR solution that provides customers with a new dimension of visibility across all security telemetry from endpoints to the public cloud providing precision detection and optimized a response capability that extends across their entire security infrastructure.
In January 2020, Thales entered into a partnership agreement with GE Steam Power to provide a cybersecurity solutions suite for power plant operations.
Note: Tables for North America, Europe, APAC, South America, and Middle East & Africa Regions are also represented in the same manner as above.