+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Cybersecurity in Oil & Gas - Thematic Research

  • ID: 4592860
  • Report
  • June 2018
  • Region: Global
  • 46 pages
  • GlobalData
1h Free Analyst Time

Speak directly to the analyst to clarify any post sales queries you may have.

1 of 3

FEATURED COMPANIES

  • Ahnlab
  • Carbon Black
  • F5 Networks
  • Huawei
  • Micro Focus
  • Rapid7
  • MORE
Cybersecurity in Oil & Gas - Thematic Research

Summary

Cybersecurity is difficult to insure precisely because the types of cybercrime differ, the motivations for these crimes differ, the assets targeted differ, and the remedies differ. Whereas most types of criminal activity have a single target (e.g. to steal money) and a single motive (e.g. to get rich), cybercrime is different. It has many motives, can come in many forms, and can be committed by a host of different types of attackers (known as threat actors).

The Oil and Gas (O&G) industry plays an important role as an industry due to its significant effect on global economies, meaning the cybersecurity threats facing the sector are of extreme importance. As with many other industries, there is a wide array of security threats that can result in damaging effects on operations and revenues. However, the O&G sector is also the target of terrorism, with threats and attacks leading to plant sabotage and shutdown.

By 2021, the global cybersecurity market is expected to be worth $143bn, up from $114bn in 2017. However, the key issue is that Oil and Gas (O&G) companies need “better” rather than “more” security.

The report "Cybersecurity in Oil & Gas - Thematic Research", looks at the 14 most important cybersecurity technologies and conclude that the key ones in terms of driving the cybersecurity industry’s revenues over the next two years are network security appliances, cloud security, and artificial intelligence (AI).

Scope
  • The report focuses on understanding the significance of cybersecurity for the oil and gas (O&G) industry.
  • The report looks at the 14 most important cybersecurity technologies and concludes that the key ones in terms of driving the cybersecurity industry’s revenues over the next two years are network security appliances, cloud security, and artificial intelligence (AI).
  • The research also identifies the winners in these high-growth cyber technology cycles over the next two years.
Reasons to buy
  • The report classifies the cybersecurity market into 14 critical technologies: unified threat management, AI, network security, security information and event management (SIEM), endpoint security, identity management, data security, application security, mobile security, email security, surveillance and behavioral analytics, cloud security, managed security services and post-breach consultancy services.
  • It discusses the big players in the cybersecurity industry and where do they sit in the value chain.
  • The report highlights the main trends in the cybersecurity industry over the next 12 to 24 months.
  • It provides an industry analysis - cyber risks, the investment landscape, today's cybersecurity paradigm, regulation, mergers and acquisitions, and key milestones showing how the cybersecurity theme has developed over the last 40 years.
  • The report also analyses the value chain and offers a technology briefing to highlight the best practice solutions followed.
Note: Product cover images may vary from those shown
2 of 3

FEATURED COMPANIES

  • Ahnlab
  • Carbon Black
  • F5 Networks
  • Huawei
  • Micro Focus
  • Rapid7
  • MORE
  • PLAYERS
  • TRENDS
  • Changing nature of cyber threats
  • Evolution of cybersecurity technologies
  • Industry growth drivers
  • Corporate governance trends
  • Cybersecurity trends in oil & gas
  • INDUSTRY ANALYSIS
  • Market size and growth forecasts
  • M&A
  • Timeline
  • VALUE CHAIN
  • Network security
  • Unified threat management
  • Artificial Intelligence
  • Deception-based cyber defenses (subset of AI)
  • Behavioral analytics (subset of AI)
  • SIEM
  • Endpoint security
  • Mobile security (subset of endpoint security)
  • Identity and access management
  • Data security
  • Application security
  • Email security
  • Cloud security
  • Managed security services
  • Post-breach consultancy services
  • COMPANIES SECTION
  • Public companies
  • Private companies
  • TECHNOLOGY BRIEFING
  • The NIST framework
  • GLOSSARY
  • APPENDIX: THEMATIC RESEARCH METHODOLOGY
Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
  • Ahnlab
  • Airbus
  • Akamai
  • BAE Systems
  • Barracuda Networks
  • Check Point Software Technologies
  • Cheetah Mobile
  • Cisco
  • CyberArk Software
  • F5 Networks
  • FireEye
  • Fortinet
  • F-secure
  • Gemalto
  • Gigamon
  • IBM
  • Imperva
  • Intel
  • Juniper Networks
  • KEYW
  • LifeLock
  • Micro Focus
  • Microsoft
  • MobileIron
  • NetScout Systems
  • Palo Alto Networks
  • ProofPoint
  • Qualys
  • Rapid7
  • Raytheon
  • Secureworks
  • Sophos
  • Splunk
  • Symantec
  • Trend Micro
  • Verint Systems
  • Aker Security Solutions
  • AlienVault
  • Avira
  • Bayshore Networks
  • Carbon Black
  • CloudFlare
  • Darktrace
  • Dell
  • Demonsaw
  • E8 Security
  • HackerOne
  • Herjavec Group
  • Hillstone Networks
  • Huawei
  • Illusive Networks
  • Kaspersky Lab
  • Palantir
  • Qihoo 360
  • Tanium
  • Untangle
  • Veracode
  • WatchGuard
  • WhiteHat Security
  • ZeroFOX
Note: Product cover images may vary from those shown
Adroll
adroll