+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity in Tourism - Thematic Research

  • PDF Icon

    Report

  • 46 Pages
  • June 2018
  • Region: Global
  • GlobalData
  • ID: 4592857
Cybersecurity in Tourism - Thematic Research

Summary

Technological progress leads to a higher incidence of cyberattacks. The big technology cycles of today - e-commerce, mobile payments, cloud computing, big data, IoT, AI, and social media - all increase cyber risk for users and businesses. Cybersecurity is difficult to insure precisely because the types of cybercrime differ, the motivations for these crimes differ, the assets targeted differ, and the remedies differ. Whereas most types of criminal activity have a single target (such as to steal money) and a single motive (such as to get rich), cybercrime is different. It has many motives, can come in many forms, and can be committed by a host of different types of attackers (known as threat actors).

As travel and tourism providers progress towards predictive and prescriptive models to support real-time decision-making, their rich data becomes a strategic asset. They need to plan now how to mitigate their vulnerabilities and enhance their security against cyber risks. There is a significant market opportunity, and vendors can in turn leverage their ecosystems to offer end-to-end security solutions, exploiting state-of-the-art technology such as AI and forensics.

The increasing number of cyberattacks in recent years in the tourism industry seems to indicate a changing pattern for hackers. Cybercriminals have turned their attention from retailers to the tourism sector, as more and more shops have started implementing secure payment systems. Tourism companies are attractive targets for hackers and cybercriminals because they deal with large and valuable quantities of customer data.

At the same time, the industry has mostly focused on protecting its customers from physical attacks and has not paid enough attention to, and in some cases completely neglected, cybersecurity. The consequences of a data breach can be significant. Firms and customers alike can suffer large money losses, while guests’ personal data can be stolen and used in the cybercriminals’ interest, which can ultimately lead to a loss in confidence in the brand that has been breached. Therefore, it is essential for industry players to protect themselves and their customers against cyberattacks.

The report "Cybersecurity in Tourism - Thematic Research", offers a framework in which to look at Cybersecurity, summarizes the important trends, and identifies the key players.The report also helps in identifying winners and losers based on technology leadership, market position and other factors.

Scope
  • The report focuses on the significance of cybersecurity for the tourism industry.

  • It highlights the importance of protecting the large and valuable quantities of customer data from breach and cyber-attacks.

  • The report identifies the winners in high-growth cyber technology cycles, including network security appliances, cloud security, and artificial intelligence (AI) over the next two years.


Reasons to buy
  • The report classifies the cybersecurity market into 14 critical technologies: unified threat management, AI, network security, security information and event management (SIEM), endpoint security, identity management, data security, application security, mobile security, email security, surveillance and behavioral analytics, cloud security, managed security services and post-breach consultancy services.

  • It discusses the big players in the cybersecurity industry and where do they sit in the value chain.

  • It highlights the main trends in the cybersecurity industry over the next 12 to 24 months.

  • The report provides an industry analysis and also discusses the impact of cybersecurity on tourism.

  • The report offers an analysis of the value chain and the technologies that will drive growth in the cybersecurity industry over the next two years.

  • The report gives a technology briefing to understand the cybersecurity technologies that help deliver the best practice solutions.

Table of Contents

  • PLAYERS

  • TRENDS

  • Changing nature of cyber threats

  • Evolution of cybersecurity technologies

  • Industry growth drivers

  • Corporate governance trends

  • Cybersecurity trends in tourism

  • INDUSTRY ANALYSIS

  • Market size and growth forecasts

  • M&A

  • Timeline

  • IMPACT OF CYBERSECURITY ON TOURISM

  • VALUE CHAIN

  • Network security

  • Unified threat management

  • Artificial intelligence

  • Deception-based cyber defenses (subset of AI)

  • Behavioral analytics (subset of AI)

  • SIEM

  • Endpoint security

  • Mobile security (subset of endpoint security)

  • Identity and access management

  • Data security

  • Application security

  • Email security

  • Cloud security

  • Managed security services

  • Post-breach consultancy services

  • COMPANIES SECTION

  • Public companies

  • Private companies

  • TECHNOLOGY BRIEFING

  • The NIST framework

  • GLOSSARY

  • APPENDIX: THEMATIC RESEARCH METHODOLOGY

Companies Mentioned (Partial List)

A selection of companies mentioned in this report includes, but is not limited to:

  • Ahnlab
  • Airbus
  • Akamai
  • BAE Systems
  • Barracuda Networks
  • Check Point Software Technologies
  • Cheetah Mobile
  • Cisco
  • CyberArk Software
  • F5 Networks
  • FireEye
  • Fortinet
  • F-Secure
  • Gemalto
  • Gigamon
  • IBM
  • Imperva
  • Intel
  • Juniper Networks
  • KEYW
  • LifeLock
  • Micro Focus
  • Microsoft
  • MobileIron
  • NetScout Systems
  • Palo Alto Networks
  • ProofPoint
  • Qualys
  • Rapid7
  • Raytheon
  • SecureWorks
  • Sophos
  • Splunk
  • Symantec
  • Trend Micro
  • Verint Systems
  • Aker Security Solutions
  • AlienVault
  • Avira
  • Bayshore Networks
  • Carbon Black
  • CloudFlare
  • Darktrace
  • Dell
  • Demonsaw
  • E8 Security
  • HackerOne
  • Herjavec Group
  • Hillstone Networks
  • Huawei
  • Illusive Networks
  • Kaspersky Lab
  • Palantir
  • Qihoo 360
  • Tanium
  • Untangle
  • Veracode
  • WatchGuard
  • WhiteHat Security
  • ZeroFOX