1. Market Research
  2. > Computer Security Market Trends
  3. > The Safety-Security Argument—Expanding Needs in a Connected Enterprise

The Safety-Security Argument—Expanding Needs in a Connected Enterprise : The Quest for a Trusted and Secure IoIT Ecosystem will Result in an End-user Push Toward Advanced Solutions

As part of the Internet of Industrial Things (IoIT) research portfolio from the Industrial Automation and Process Control practice, this study provides a strategic outlook of cyber security requirements and best practices in a new era of connected assets and connected enterprises. It includes key challenges in the manufacturing industry due to advanced persistent threats as well as opportunities and strategies for cybersecurity value chain participants and solution providers. The report details the current state of the industry and throws light on the trends that are expected to change, providing various perspectives that help decipher the digital footprints.

Key Questions

- What is the impact of IoT on the industrial cyber security space?
- What are some of the critical challenges facing the industry regarding awareness/adoption?
- What are the key technologies that will influence developments in the industrial cyber security market?
- What are the key implications for factories of the future and critical infrastructure industries?
- What are the required solutions and best practices related to cyber security in the industrial space?

Market Outlook
-While there is significant focus on network security measures, endpoint security solutions are a growing requirement in the industrial space.
-Approximately % of the vulnerabilities in the control systems’ hierarchy levels are concentrated in the operational and enterprise levels.

Table Of Contents

The Safety-Security Argument—Expanding Needs in a Connected Enterprise
Table Of Contents
1 EXECUTIVE SUMMARY

Executive Summary
1 Market Outlook
2 Market Outlook
3 Key Findings and Inferences—Regional Perspective
4 Key Findings and Inferences—Technology Perspective
5 Key Findings and Inferences—Customer Perspective
6 Key Findings and Inferences—Economic Perspective

2 INTERNET OF INDUSTRIAL THINGS—A RESEARCH PERSPECTIVE

Internet of Industrial Things—A Research Perspective
1 Internet of Industrial Things—The 4 Functional Facets
2 Relevant Research

3 RESEARCH SCOPE, OBJECTIVES, SEGMENTATION

Research Scope, Objectives, Segmentation
1 Research Scope and Objective
2 Key Questions this Study will Answer
3 Definitions

4 CURRENT STATE OF THE INDUSTRY

Current State of the Industry
1 APTs and Industrial Security
2 Present State of ICS Security
3 ICS Attack Types
4 Understanding the New Risk Landscape
5 Understanding the New Risk Landscape
6 The State of ICS Security—An Industry Perspective
7 The State of ICS Security—A Regulatory Perspective

5 IOIT AND INDUSTRIAL CYBER SECURITY

IoIT and Industrial Cyber Security
1 Introduction—IoIT and Industrial Cyber Security
2 Key Components of the IoIT and Manufacturing Requirements
3 Key Industrial Network Implications
4 Smart Devices and Cyber Security
5 Endpoint Security Implications
6 IoIT and the Industrial Networks
7 IoIT and the Industrial Networks
8 Understanding the ‘EDGE'—Industrial Networks

6 A STITCH IN TIME SAVES NINE—EVOLVING CYBER SECURITY SOLUTIONS IN THE IOIT ECOSYSTEM

A Stitch in Time Saves Nine—Evolving Cyber Security Solutions in the IoIT Ecosystem
1 Key Technologies in Smart Factories
2 Big Data, Analytics, and Cyber Security
3 Big Data and Analytics Opportunities
4 Big Data and Analytics Solutions
5 Cyber Security and the Cloud
6 Implications of Using the Cloud
7 Cloud-based Cyber Security Opportunities
8 Cloud-based Cyber Security Opportunities

7 INDUSTRY PERSPECTIVES—DECIPHERING DIGITAL FOOTPRINTS

Industry Perspectives—Deciphering Digital Footprints
1 Factories of the Future
2 Security Challenges in the Factory of the Future
3 Case Example—Automotive Industry
4 Critical Infrastructure Industries
5 Security Challenges in Critical Infrastructure Industries
6 Case Example—Power Industry
7 Security Opportunities—Factories of the Future

8 STRATEGIC INSIGHTS—THE T² (TRUST AND TRAP) SECURITY FRAMEWORK

Strategic Insights—The T² (Trust and Trap) Security Framework
1 Develop a New Trust Model
2 Set the Security ‘TRAP'
3 Top Trends in the Industrial Cyber Security Market
4 The ICS Security Ecosystem
5 Tactical Technical Approach to a Strategic Balanced Approach
6 Defense-by-design—In-built Security Solutions
7 Taking a Strategic Partnership Approach
8 In-built Security Solutions—Creation of the Trust Network
9 Opportunity Mapping—Creating a New Trust Model
10 Cyber Security Services
11 Cyber Security Services
12 Security—A Safety Issue
13 Security as a Service (SaaS)
14 Emergence of the Totally Integrated Security Provider
15 Opportunity Mapping—Developing Cyber SaaS
16 The Safety—Security Continuum
17 From SIL to SAL—Developing a Safety-based Security Framework
18 Opportunity Mapping—The Safety-to-security Approach
19 ATPs and ICS Networks
20 Present State of ICS Security
21 Key Solutions Required to Address ATPs
22 Applied Security Intelligence
23 Future Cyber Security Solutions
24 Opportunity Mapping—The New Portfolio of ICS Security Solutions
25 Emergence of the Digital Engineer
26 Emergence of the Digital Engineer
27 Digital Engineers in the ICS Ecosystem
28 Opportunity Mapping—The New Age Workforce

9 CONCLUSION

Conclusion
1 Future Cyber Security Solutions
2 Trust and Trap (T²)—Keeping Security Simple
3 Legal Disclaimer

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Asia-Pacific Distributed Denial of Service (DDoS) Solutions Market

Asia-Pacific Distributed Denial of Service (DDoS) Solutions Market

  • $ 13500
  • Industry report
  • September 2016
  • by Frost & Sullivan

Rise of Volumetric, Sophisticated, and Ransom DDoS Attacks Toward Organizations Driving the Market Growth momentum in the Asia-Pacific Distributed Denial of Services (DDoS) solutions market remained strong ...

Cyber Security: Technologies and Global Markets

Cyber Security: Technologies and Global Markets

  • $ 6650
  • Industry report
  • October 2016
  • by BCC Research

Use this report to: - Analyze regulatory and standardization issues that impact the software-defined radio (SDR) market. - Receive market sizes for cellular SDR base station infrastructure, cellula ...

Analysis of the India Secure Content Management Market

Analysis of the India Secure Content Management Market

  • $ 4950
  • Industry report
  • September 2016
  • by Frost & Sullivan

Targeted and Ransomware Attacks are Driving the SCM Market The Indian SCM market grew strongly at 11.7% year-on-year in 2015 with the web security segment growing at 12.4% and the email security segment ...


ref:plp2015

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.