1. Market Research
  2. > Computer Security Market Trends
  3. > The Safety-Security Argument—Expanding Needs in a Connected Enterprise

The Safety-Security Argument—Expanding Needs in a Connected Enterprise : The Quest for a Trusted and Secure IoIT Ecosystem will Result in an End-user Push Toward Advanced Solutions

As part of the Internet of Industrial Things (IoIT) research portfolio from the Industrial Automation and Process Control practice, this study provides a strategic outlook of cyber security requirements and best practices in a new era of connected assets and connected enterprises. It includes key challenges in the manufacturing industry due to advanced persistent threats as well as opportunities and strategies for cybersecurity value chain participants and solution providers. The report details the current state of the industry and throws light on the trends that are expected to change, providing various perspectives that help decipher the digital footprints.

Key Questions

- What is the impact of IoT on the industrial cyber security space?
- What are some of the critical challenges facing the industry regarding awareness/adoption?
- What are the key technologies that will influence developments in the industrial cyber security market?
- What are the key implications for factories of the future and critical infrastructure industries?
- What are the required solutions and best practices related to cyber security in the industrial space?

Market Outlook
-While there is significant focus on network security measures, endpoint security solutions are a growing requirement in the industrial space.
-Approximately % of the vulnerabilities in the control systems’ hierarchy levels are concentrated in the operational and enterprise levels.

Table Of Contents

The Safety-Security Argument—Expanding Needs in a Connected Enterprise
Table Of Contents
1 EXECUTIVE SUMMARY

Executive Summary
1 Market Outlook
2 Market Outlook
3 Key Findings and Inferences—Regional Perspective
4 Key Findings and Inferences—Technology Perspective
5 Key Findings and Inferences—Customer Perspective
6 Key Findings and Inferences—Economic Perspective

2 INTERNET OF INDUSTRIAL THINGS—A RESEARCH PERSPECTIVE

Internet of Industrial Things—A Research Perspective
1 Internet of Industrial Things—The 4 Functional Facets
2 Relevant Research

3 RESEARCH SCOPE, OBJECTIVES, SEGMENTATION

Research Scope, Objectives, Segmentation
1 Research Scope and Objective
2 Key Questions this Study will Answer
3 Definitions

4 CURRENT STATE OF THE INDUSTRY

Current State of the Industry
1 APTs and Industrial Security
2 Present State of ICS Security
3 ICS Attack Types
4 Understanding the New Risk Landscape
5 Understanding the New Risk Landscape
6 The State of ICS Security—An Industry Perspective
7 The State of ICS Security—A Regulatory Perspective

5 IOIT AND INDUSTRIAL CYBER SECURITY

IoIT and Industrial Cyber Security
1 Introduction—IoIT and Industrial Cyber Security
2 Key Components of the IoIT and Manufacturing Requirements
3 Key Industrial Network Implications
4 Smart Devices and Cyber Security
5 Endpoint Security Implications
6 IoIT and the Industrial Networks
7 IoIT and the Industrial Networks
8 Understanding the ‘EDGE'—Industrial Networks

6 A STITCH IN TIME SAVES NINE—EVOLVING CYBER SECURITY SOLUTIONS IN THE IOIT ECOSYSTEM

A Stitch in Time Saves Nine—Evolving Cyber Security Solutions in the IoIT Ecosystem
1 Key Technologies in Smart Factories
2 Big Data, Analytics, and Cyber Security
3 Big Data and Analytics Opportunities
4 Big Data and Analytics Solutions
5 Cyber Security and the Cloud
6 Implications of Using the Cloud
7 Cloud-based Cyber Security Opportunities
8 Cloud-based Cyber Security Opportunities

7 INDUSTRY PERSPECTIVES—DECIPHERING DIGITAL FOOTPRINTS

Industry Perspectives—Deciphering Digital Footprints
1 Factories of the Future
2 Security Challenges in the Factory of the Future
3 Case Example—Automotive Industry
4 Critical Infrastructure Industries
5 Security Challenges in Critical Infrastructure Industries
6 Case Example—Power Industry
7 Security Opportunities—Factories of the Future

8 STRATEGIC INSIGHTS—THE T² (TRUST AND TRAP) SECURITY FRAMEWORK

Strategic Insights—The T² (Trust and Trap) Security Framework
1 Develop a New Trust Model
2 Set the Security ‘TRAP'
3 Top Trends in the Industrial Cyber Security Market
4 The ICS Security Ecosystem
5 Tactical Technical Approach to a Strategic Balanced Approach
6 Defense-by-design—In-built Security Solutions
7 Taking a Strategic Partnership Approach
8 In-built Security Solutions—Creation of the Trust Network
9 Opportunity Mapping—Creating a New Trust Model
10 Cyber Security Services
11 Cyber Security Services
12 Security—A Safety Issue
13 Security as a Service (SaaS)
14 Emergence of the Totally Integrated Security Provider
15 Opportunity Mapping—Developing Cyber SaaS
16 The Safety—Security Continuum
17 From SIL to SAL—Developing a Safety-based Security Framework
18 Opportunity Mapping—The Safety-to-security Approach
19 ATPs and ICS Networks
20 Present State of ICS Security
21 Key Solutions Required to Address ATPs
22 Applied Security Intelligence
23 Future Cyber Security Solutions
24 Opportunity Mapping—The New Portfolio of ICS Security Solutions
25 Emergence of the Digital Engineer
26 Emergence of the Digital Engineer
27 Digital Engineers in the ICS Ecosystem
28 Opportunity Mapping—The New Age Workforce

9 CONCLUSION

Conclusion
1 Future Cyber Security Solutions
2 Trust and Trap (T²)—Keeping Security Simple
3 Legal Disclaimer

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Top 10 Security Technologies

Top 10 Security Technologies

  • $ 5650
  • Industry report
  • February 2017
  • by MarketsandMarkets

“Rise in security breaches and incidents among the enterprises is expected to drive the growth of the security technologies market during the forecast period” The report titled The Top 10 security ...

Managed Network Services Market by Service, Organization Size, End-Use Vertical, and Region - Global Forecast to 2021

Managed Network Services Market by Service, Organization Size, End-Use Vertical, and Region - Global Forecast to 2021

  • $ 5650
  • Industry report
  • February 2017
  • by MarketsandMarkets

“Growing demand for managed network services, greater network accessibility, and superior network security, and the need for improving the business process at a minimum cost are driving the managed network ...

Incident Response Services Market by Component, Security Type, Organization Size, Deployment Mode, Vertical, and Region - Global Forecast to 2021

Incident Response Services Market by Component, Security Type, Organization Size, Deployment Mode, Vertical, and Region - Global Forecast to 2021

  • $ 5650
  • Industry report
  • January 2017
  • by MarketsandMarkets

“The rising security breaches targeting enterprises and increasing sophistication of cyber-attacks are driving the incident response services market” The incident response services market size is estimated ...


ref:plp2015

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.