+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity in Utilities - Thematic Research

  • PDF Icon

    Report

  • 46 Pages
  • June 2018
  • Region: Global
  • GlobalData
  • ID: 4601744
Cybersecurity in Utilities - Thematic Research

Summary

Cybersecurity has been a concern for utilities for decades, due to their roles as operators of critical infrastructure and providers of essential services. However, concern over cybersecurity continues to climb up utilities’ agendas, driven by the increasingly interconnected nature of their infrastructure and systems, and the growing number of attacks targeting utilities.

Utilities need to transition to a more connected and smart energy system. They are also adopting IoT technologies that potentially open up utilities’ systems and infrastructure to the outside world. These include smart meters, sensors, and other grid monitoring devices. While this transition is necessary to make utilities more efficient and enable the uptake of new technologies like electric vehicles and solar and wind, it also creates many more targets for malicious actors to target. It also means that utilities will increasingly need to open up some of their core systems that were historically protected by being isolated from the outside world, also creating new potential risks.

Scope
  • This report analyses cybersecurity in the utilities sector.

  • It discusses how the sector is subject to stricter regulation in terms of cyber- and physical security, and is looking to invest in integrated solutions.

  • It identifies key winners and losers in high-growth cyber technology cycles such as network security appliances, cloud security, and artificial intelligence over the next two years.


Reasons to buy
  • The report highlights some of the big players in the cybersecurity industry and where do they sit in the value chain.

  • It highlights the main trends in the cybersecurity industry over the next 12 to 24 months.

  • It provides an industry analysis, explaining the degree of cyber risks and motives, and its serious implications on businesses.

  • The report discusses the impact of cybersecurity on utilities and the unique challenges it faces.

  • It also identifies technologies will drive growth in the cybersecurity industry over the next two years.

  • It offers a technology briefing, explaining the importance of a cybersecurity framework to establish standards, guidelines, and practices to protect critical infrastructure.

Table of Contents

  • PLAYERS

  • TRENDS

  • Changing nature of cyber threats

  • Evolution of cybersecurity technologies

  • Industry growth drivers

  • Corporate governance trends

  • Cybersecurity trends in utilities

  • INDUSTRY ANALYSIS

  • IMPACT OF CYBERSECURITY ON UTILITIES

  • Unique challenges facing utilities when implementing cybersecurity

  • Market size and growth forecasts

  • M&A

  • Timeline

  • VALUE CHAIN

  • Network security

  • Unified threat management

  • Artificial Intelligence

  • Deception-based cyber defenses (subset of AI)

  • Behavioral analytics (subset of AI)

  • SIEM

  • Endpoint security

  • Mobile security (subset of endpoint security)

  • Identity and access management

  • Data security

  • Application security

  • Email security

  • Cloud security

  • Managed security services

  • Post-breach consultancy services

  • COMPANIES SECTION

  • Public companies

  • Private companies

  • TECHNOLOGY BRIEFING

  • The NIST framework

  • GLOSSARY

  • APPENDIX: “THEMATIC” RESEARCH METHODOLOGY

Companies Mentioned (Partial List)

A selection of companies mentioned in this report includes, but is not limited to:

  • Ahnlab
  • Airbus
  • Akamai
  • BAE Systems
  • Barracuda Networks
  • Check Point Software Technologies
  • Cheetah Mobile
  • Cisco
  • CyberArk Software
  • F5 Networks
  • FireEye
  • Fortinet
  • F-secure
  • Gemalto
  • Gigamon
  • IBM
  • Imperva
  • Intel
  • Juniper Networks
  • KEYW
  • LifeLock
  • Micro Focus
  • Microsoft
  • MobileIron
  • NetScout Systems
  • Palo Alto Networks
  • ProofPoint
  • Qualys
  • Rapid7
  • Raytheon
  • Secureworks
  • Sophos
  • Splunk
  • Symantec
  • Trend Micro
  • Verint Systems
  • Aker Security Solutions
  • AlienVault
  • Avira
  • Bayshore Networks
  • Carbon Black
  • CloudFlare
  • Darktrace
  • Dell
  • Demonsaw
  • E8 Security
  • HackerOne
  • Herjavec Group
  • Hillstone Networks
  • Huawei
  • Illusive Networks
  • Kaspersky Lab
  • Palantir
  • Qihoo 360
  • Tanium
  • Untangle
  • Veracode
  • WatchGuard
  • WhiteHat Security
  • ZeroFOX