+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Cybersecurity Needs and Strategies of Retailers on the Road to Smart Retail

  • ID: 5206738
  • Report
  • November 2020
  • Region: Global
  • 16 Pages
  • Market Intelligence & Consulting Institute (MIC)

FEATURED COMPANIES

  • Cisco
  • Google
  • Microsoft
  • VirusTotal
  • Zoo

The retail industry is closely related to people’s daily life. Therefore, smart retail services powered by emerging technologies have been the most directly felt digital services for consumers. Various technologies have been used for smart retail, including IoT (Internet of Things), AI (Artificial Intelligence), edge computing, and fog computing. While these emerging technologies can make digital services and applications smarter, they also spark a variety of cybersecurity concerns, which may cause distrust and disruption in the smart retail services for consumers and significantly impact retail businesses. This report analyzes cybersecurity needs of retailers on the road to smart retail and their strategies in response to cybersecurity issues.

List of Topics

  • Outline cybersecurity needs of retails, touching on key cybersecurity issues and potential needs from four aspects
  • Four key strategies of retailers on their road to become smart retailers
Note: Product cover images may vary from those shown

FEATURED COMPANIES

  • Cisco
  • Google
  • Microsoft
  • VirusTotal
  • Zoo

1. Cybersecurity Issues and Potential Needs of Smart Retail
1.1 Key Cybersecurity Issues
1.2 Potential Cybersecurity Needs
1.2.1 Protect both New and Existing Digital Systems
1.2.2. Defend against Advanced Cybersecurity Threats
1.2.3 Strengthen Digital Content Protection
1.2.4 Improve Staff's Cybersecurity Awareness

2. Retailers Cybersecurity Strategies for Smart Retail
2.1 Strategy #1: Set up Comprehensive Cybersecurity Risk Management Plans for Outsourced Information Services
2.2 Strategy #2: Develop Core Security Technology to Keep Track of Cyber Attack Patterns
2.3 Strategy #3: Set up Security Policies and Multi-level Authorization Processes
2.4 Strategy #4: Establish Security Self-assessment Programs and Hold Regular Drills

3. Analysts Perspective

Appendix
List of Companies

List of Tables
Table 1 Cybersecurity Technology Required for Smart Retail

List of Figures
Figure 1 Cybersecurity Needs of Smart Retail

Note: Product cover images may vary from those shown

Loading
LOADING...

  • Cisco
  • Google
  • Microsoft
  • VirusTotal
  • Zoo
Note: Product cover images may vary from those shown

Primary research with a holistic, cross-domain approach

The exhaustive primary research methods are central to the value that the analyst delivers. A combination of questionnaires and on-site visits to the major manufacturers provides a first view of the latest data and trends. Information is subsequently validated by interviews with the manufacturers' suppliers and customers, covering a holistic industry value chain. This process is backed up by a cross-domain team-based approach, creating an interlaced network across numerous interrelated components and system-level devices to ensure statistical integrity and provide in-depth insight.

Complementing primary research is a running database and secondary research of industry and market information. Dedicated research into the macro-environmental trends shaping the ICT industry also allows the analyst to forecast future development trends and generate foresight perspectives. With more than 20 years of experience and endeavors in research, the methods and methodologies include:

Method

  • Component supplier interviews
  • System supplier interviews
  • User interviews
  • Channel interviews
  • IPO interviews
  • Focus groups
  • Consumer surveys
  • Production databases
  • Financial data
  • Custom databases

Methodology

  • Technology forecasting and assessment
  • Product assessment and selection
  • Product life cycles
  • Added value analysis
  • Market trends
  • Scenario analysis
  • Competitor analysis

Loading
LOADING...

Adroll
adroll