+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity in Defense - Thematic Research

  • PDF Icon

    Report

  • 69 Pages
  • June 2022
  • Region: Global
  • GlobalData
  • ID: 5189181
The threat of cyber-attacks has never been greater, growing in line with increased connectivity between physical and digital systems. Lower barriers to entry for cyberthreat actors, more aggressive attack methods, a dearth of cybersecurity professionals, and patchwork governance mechanisms have aggravated the risk for all companies. This thematic report takes an in-depth look at look at the growing need for cybersecurity in the defense sector and how the threat landscape is being addressed. Firstly, the value chain section summarizes an in-depth description of each of the segments of cybersecurity and outlines the specialist cybersecurity vendors in the defense sector. The challenges section outlines the key challenges being faced by the defense sector. This is followed by an impact assessment detailing the areas which are accelerating the need for cybersecurity. A case study section is then provided, which highlights some key breaches of cybersecurity within the defense sector. A data analysis section provides market size and growth forecasts, followed by mergers and acquisition activity, a cybersecurity timeline, and insight into company filings, hiring, and social media trends. Next, the report highlights key cybersecurity vendors, with a section specializing in cybersecurity defense vendors. It then goes on to outline countries, alliances, organisations and initiatives in cybersecurity.

'Cybersecurity has become a key issue to consider for all sectors, however, the sensitive nature of defense data and consequential national security concerns elevate the importance of data security for defense manufacturers. Cybersecurity for militaries and states is an issue of national security because a successful attack could mean that threat actors gain the ability to control and use destructive weapons, or that critical national infrastructure is weakened.'

The increasing array of sensors and other data streams that make up the OODA loop means there is an increasing number of connected devices which need to be cyber-secure. The Director of Operational Test and Evaluation in the US Department of Defense confirmed that 'almost every weapon in the warfighter's arsenal is software-defined, and we are more likely to improve system lethality by installing new software than by modifying hardware'. However, each software update can come with its own cybersecurity risk. Data in any format has always been a key discriminator on the battlefield, however, as it is increasingly relied upon in strategy and planning, any data breach would be a significant intelligence coup by an enemy force. The increasing collection and collation of data also mean that companies and militaries are outsourcing some of their data management and storage needs. This will accelerate the need for cybersecurity as bad actors which strategically hunt for potential intelligence, prefer to target smaller suppliers who feed into the largest defense contractors, rather than attempt to attack the larger companies which can have more established cybersecurity.

Scope

This report provides an overview of cybersecurity in defense
This report explains why cybersecurity will continue to grow in importance for the defense industry
This report outlines the variety of key beaches in cybersecurity and how they were rectified in the defense sector
This report provides examples of what companies, countries and organisations are developing watertight cybersecurity strategies.
We highlight defense companies, organisations and countries that are leading in this theme, such as Thales, BAE Systems and Lockheed Martin.

Reasons to Buy

  • To understand cybersecurity and its current and future impact on the industry.
  • To understand how cybersecurity is increasingly difficult and an important challenge that the defense sector is facing.
  • To identify the leading cybersecurity vendors.
  • the publisher's thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.

Table of Contents

Players
  • Technology briefing
  • Trends

Defense trends
  • Technology trends
  • Macroeconomic trends
  • Regulatory trends

Industry analysis
  • Market size and growth forecasts
  • Moving towards the edge
  • Merges and acquisitions
  • Venture funding for cybersecurity companies

Timeline
  • Impact of cybersecurity in defense
  • Value chain

Companies
  • Defense vendors
  • Civilian vendors

Glossary
  • Appendix: Thematic research methodology

Companies Mentioned (Partial List)

A selection of companies mentioned in this report includes, but is not limited to:

  • Microsoft
  • Trend Micro
  • CrowdStrike
  • Trellix
  • IBM
  • Trellix
  • Palo Alto Networks
  • Broadcom
  • Anomali
  • Fortine
  • Sumo Logic
  • IBM (Red Hat)
  • Veracode
  • Micro Focus
  • NTT Security
  • Thales
  • BAE Systems
  • Lockheed Martin
  • Northrop Grumman
  • General Dynamics
  • Booz Allen Hamilton
  • Leidos
  • Telos
  • Palantir Technologies
  • Airbus
  • Sopra Steria
  • 1Password
  • Accenture
  • Airbus (Stormshield)
  • Akamai
  • Alert Logic
  • Alibaba
  • Alphabet (Google)
  • Alphabet (Siemplify)
  • Amazon
  • AMD
  • Analog Devices
  • AnyVision
  • Appgate
  • Apple
  • Aqua Security
  • Arcon
  • AT&T
  • Atos
  • Attivo Networks
  • Aware
  • BAE Systems
  • Baidu
  • Barracuda
  • Barracuda Networks
  • BeyondTrust
  • BioEnable
  • Blackberry
  • BMC Helix
  • Broadcom
  • BT
  • Cadence Design Systems
  • Capgemini
  • Cato
  • Check Point Software
  • Checkmarx
  • China Telecom
  • China Unicom
  • CipherCloud
  • Cisco
  • Clear Secure
  • Clearview
  • Cloudcheckr
  • Cloudera
  • Cloudflare
  • CloudPassage
  • CMITech
  • Code42
  • Cognitec
  • Cognizant
  • Contrast Security
  • CrowdStrike
  • CyberArk
  • Cyberbit
  • Cybereason
  • Cynet
  • D3 Security
  • Darktrace
  • Dashlane
  • Delinea
  • Dell Technologies
  • Deutsche Telekom
  • Duo Security
  • DXC Technology
  • ekey
  • Equifax
  • Ermetic
  • Exabeam
  • Expanse
  • Extreme
  • EY
  • Eyelock
  • F5 Networks
  • Forcepoint
  • Forescout
  • ForgeRock
  • Fortinet
  • Foxpass
  • Fugue
  • Fujitsu
  • GitLab
  • HCL Technologies
  • Helpsystems
  • Herjavec Group
  • HID Global
  • Hitachi
  • Horizon Robotics
  • HPE
  • Huawei
  • IBM
  • IBM (Red Hat)
  • Idemia
  • iFlytek
  • Illumio
  • Ilumio
  • Impulse
  • Informatica
  • Infosys
  • Innovatrics
  • Intel
  • Invicti
  • iProov
  • Iris ID
  • IriusRisk
  • Ironscales
  • Ivanti
  • Ivanti (MobileIron)
  • Juniper Networks
  • Kairos
  • KnowBe4
  • KPMG
  • KT
  • Lacework
  • LastPass
  • Lockheed Martin
  • LogMeIn
  • LogMeOnce
  • Logrhythm
  • Lookout
  • Lumen Technologies
  • ManageEngine
  • Marvell
  • Megvii
  • Mentor Graphics
  • Micro Focus
  • Micron Semiconductor
  • Microsoft
  • Mimecast
  • NCC
  • Netskope
  • Nokia
  • NordPass
  • Northrop Grumman
  • NTT Data
  • NXP Semiconductors
  • NXT-ID
  • Okta
  • Okta
  • Onapsis
  • One Identity
  • OneLogIn
  • OneSpan
  • OneTrust
  • Oracle
  • Orange
  • Orca Security
  • Palantir
  • Palo Alto Networks
  • Perimeter 81
  • Ping Identity
  • Portnox
  • Proofpoint
  • PwC
  • Qualys
  • Rapid7
  • Raytheon BBN
  • Raytheon Technologies
  • RedSeal
  • Renesas
  • Resolver
  • RSA
  • Ruckus
  • SAIC
  • SailPoint Technologies
  • Samsung Electronics
  • SecureAuth
  • SecureOne
  • Secureworks
  • Securonix
  • SenseTime
  • SentinelOne
  • Singtel (Trustwave)
  • Skybox Security
  • Skyhigh Security
  • Snyk
  • Softbank (Arm)
  • SonicWall
  • Sophos
  • Splunk
  • STMicroelectronics
  • Sumo Logic
  • Swimlane
  • Synopsys
  • Tanium
  • Tata Consultancy Services
  • Tech Mahindra
  • Tech5
  • Telstra
  • Tenable
  • Tessian
  • Thales
  • ThreatConnect
  • Threatmetrix
  • Threatmodeler
  • TitanHQ
  • Trellix
  • Trellix
  • Trend Micro
  • TrueFace.AI
  • Untangle
  • Veracode
  • Verizon
  • Versa
  • VMware
  • VMware
  • WatchGuard
  • WhiteHat Security
  • Wipro
  • Yubico
  • Zscaler