HOME Top Market Reports Industrial Control System (ICS) Security Market by Technology (DDOS, IDS/IPS, Firewall, SIEM, SCADA Encryption, UTM, Application, Whitelisting, DLP, Database Activity Monitoring), by Services, and by Verticals - Global Forecast to 2019

Industrial Control System (ICS) Security Market by Technology (DDOS, IDS/IPS, Firewall, SIEM, SCADA Encryption, UTM, Application, Whitelisting, DLP, Database Activity Monitoring), by Services, and by Verticals - Global Forecast to 2019

By: marketsandmarkets.com
Publishing Date: January 2015
Report Code: TC 3075

 

  Speak to Analyst Enquiry Before Buying  
purchase report
download pdf  request for customisation


Over past few years there has been a substantial upsurge in cyber-attacks worldwide. Cyber threats such as Stuxnet, Flame, Dugu and Night Dragon are predominant and have caused serious damages to critical infrastructures mostly, hampering power grids, energy utilities and pipelines. As the usage of complex IT systems, data communication systems and automatic command & control systems is on the rise, these infrastructures have become more vulnerable producing high risk status.

ICS such as SCADA, DCS, and other HMI systems are typically used for controlling and monitoring geographically remote processes and operations in critical infrastructures such as power generation units, power grids, transportation system infrastructures, manufacturing and chemical industry infrastructures, and utilities. These control systems perform behind-the-scene activities such as collecting information from sensors and other operational data at remote stations. Control systems are distributed in nature, and are therefore connected by IT communications networks and can be accessed by internet. These systems become potentially vulnerable to remote attacks. Many network security solutions have evolved over the years and are being deployed for ICS security. Almost every country and the related companies are turning towards robust security solutions.

ICS security market is expected to experience significant growth over the coming years due to increasing number of cyber threats which have devastating impact on mission critical industries. Thus, companies are implementing ICS security controls to deal with variety of security challenges such as cyber attacks, insider criminal activities and global competition.

ICS security report focuses on several intelligent ICS security solutions and services that are implemented across the critical infrastructures. It also provides insights over the high growth potential markets such as Middle East and Asia-Pacific region.

The report broadly comprises of ICS security segments: network security technologies and professional services; by types of technologies: Distributed Denial of Service (DDoS), Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS), firewall, antivirus/malware, virtualization security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), application whitelisting, Unified Threat Management (UTM), update and patch management and database activity monitoring; ICS security by services: risk management, system design, integration and consulting, managed services and audit and reporting services; ICS security by regions: North America (NA), Asia Pacific (APAC), Europe (EU), Middle East and Africa (MEA) and Latin America (LA).

There have been developments in terms of Mergers & Acquisitions (M&A) in ICS security industry. Few M&A in ICS security market are IBM acquiring Trusteer, Cisco acquiring Sourcefire, Lockheed Martin acquiring Industrial Defender, Schneider acquiring Invensys, Intel acquiring McAfee, Cassidian Cybersecurity acquiring Arkoon Network Security, ABB acquiring Power-One, Honeywell acquiring RAR Systems and many more. There are several new product launches by companies in the overall ICS security market, such as Industrial defender offering unique solutions to monitor manage and protect vulnerable automation systems against external threats.

This research report categorizes the global ICS security market to forecast the revenues and analyze the trends in each of the following sub-markets:

ICS security on the basis of Network security solutions and services:

  • Distributed Denial of Service (DDoS)
  • Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
  • Antivirus/malware
  • Firewall
  • Virtualization security
  • Security Information and Event Management (SIEM)
  • Supervisory Control and Data Acquisition (SCADA) encryption
  • Unified Threat Management (UTM)
  • Application Whitelisting
  • Update and patch management
  • Data Loss Prevention (DLP)
  • Database activity monitoring

ICS security on the basis of professional services:

  • Risk management services
  • System design, integration, and consulting
  • Managed services
  • Audit and report

ICS security on the basis of verticals:

  • Power
  • Energy and utilities
  • Transportation systems
  • Chemical and manufacturing
  • Others

ICS security on the basis of region:

  • North America (NA)
  • Europe 
  • Asia Pacific (APAC)
  • Latin America (LA)
  • Middle East and Africa (MEA)

Available Customizations: With the given market data, MarketsandMarkets offers customizations as per the company’s specific needs. The following customization options are available for the report:

Geographic Analysis:

  • Further country breakdown of the North America ICS security market
  • Further country breakdown of the European ICS security market
  • Further country breakdown of the Asia Pacific ICS security market
  • Further country breakdown of the Middle East & Africa ICS security market
  • Further country breakdown of the Latin America ICS security market

Company Profiles:

  • Detailed analysis and profiling of additional market players

 

Table of Contents

1 Introduction (Page No. - 15)
    1.1 Objectives of the Study
    1.2 Market Definition
    1.3 Market Scope
           1.3.1 Markets Covered
           1.3.2 Year Considered
           1.3.3 Currency
           1.3.4 Limitations
    1.4 Stakeholders
2 Research Methodology (Page No. - 20)
    2.1 Market Size Estimation
    2.2 Market Crackdown and Data Triangulation
    2.3 Market Share Estimation
           2.3.1 Key Data Taken From Secondary Sources
           2.3.2 Key Data From Primary Sources
           2.3.3 Key Industry Insights
    2.4 Assumptions

3 Executive Summary (Page No. - 29)

4 Premium Insights (Page No. - 35)
    4.1 Attractive Market Opportunities in the ICS Security Market
    4.2 ICS Security Market, By Sub-Market
    4.3 ICS Security Services Market Across Regions
    4.4 ICS Security Market Potential
    4.5 Life Cycle Analysis, ICS Security By Region, 2014

5 ICS Security Market Overview (Page No. - 39)
    5.1 Introduction
    5.2 Market Segmentation
           5.2.1 ICS Security Market, By Technology
           5.2.2 ICS Security Market, By Service
           5.2.3 ICS Security Market, By Vertical
           5.2.4 ICS Security Market, By Region
    5.3 Market Dynamics
           5.3.1 Drivers
                    5.3.1.1 Increasing Cyber Threats  Such as Stuxnet and Night Dragon Necessitates Its Adoption
                    5.3.1.2 Huge Investments By Countries Globally  Towards Smart Technologies
                    5.3.1.3 Regulatory Compliance Set Up By Government for Operation, Maintenance, and Security of Critical Infrastructure
                    5.3.1.4 Deployment of Cloud, Smart Phones, and Tablets in Scada and ICS
           5.3.2 Restraints
                    5.3.2.1 Lack of New System Opportunities - Presence of  Legacy Control Systems Which areMore Prone  to  Cyber Threats
                    5.3.2.2 Lack of Expertise and ICS Understanding
           5.3.3 Opportunities
                    5.3.3.1 Cloud Computing for Critical Infrastructure Protection
                    5.3.3.2 Global Increase in It Spending
                    5.3.3.3 Increasing Smart Grids Deployments 
           5.3.4 Challenge
                    5.3.4.1 Multisite Facilities Pose A Challenge for Implementing A Comprehensive Security Solution
                    5.3.4.2 Lack of Apprehension About Network Security By Operators

6 Industry Trends (Page No. - 54)
    6.1 Value Chain Analysis
    6.2 Porter’s Five Forces Analysis
           6.2.1 Threat From New Entrants
           6.2.2 Threat From Substitutes
           6.2.3 Bargaining Power of Suppliers
           6.2.4 Bargaining Power of Buyers
           6.2.5 Intensity of Competitive Rivalry

7 ICS Security Market Analysis, By Technology (Page No. - 58)
    7.1 Introduction
    7.2 Distributed Denial of Service (DDOS)
    7.3 Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
    7.4 Antivirus/Malware
    7.5 Firewall
    7.6 Virtualization Security
    7.7 Security Information and Event Management
    7.8 Scada Encryption
    7.9 Unified Threat Management (UTM)
    7.10 Application Whitelisting
    7.11 Update and Patch Management
    7.12 Data Loss Prevention
    7.13 Database Activity Monitoring

8 ICS Security Market Analysis, By Service (Page No. - 80)
    8.1 Introduction
    8.2 Risk Management Services
    8.3 Design, Integration and Consulting
    8.4 Managed Services
    8.5 Audit and Reporting

9 ICS Security Market Analysis, By Vertical (Page No. - 89)
    9.1 Introduction
    9.2 Power
           9.2.1 Power Generation
                    9.2.1.1 Nuclear Power Plants
                    9.2.1.2 Thermal and Hydro Power Plants
                    9.2.1.3 Renewable Energy Power Plants
                               9.2.1.3.1 Solar
                               9.2.1.3.2 Geothermal
                               9.2.1.3.3 Biomass
                               9.2.1.3.4 Tidal
                               9.2.1.3.5 Wind
                    9.2.1.4 Oil and Gas
           9.2.2 Power Grid
    9.3 Energy and Utilities
           9.3.1 Oil and Gas Pipelines
           9.3.2 Electric Power Transmission
           9.3.3 Water Treatment and Distribution
           9.3.4 Waste Water Collection and Treatment
    9.4 Transportation Systems
           9.4.1 Airports
           9.4.2 Seaports
           9.4.3 Railways
           9.4.4 Others
    9.5 Chemical and Manufacturing
           9.5.1 Automated Production Units
           9.5.2 Refining Plants
           9.5.3 Mining Units
    9.6 Others
           9.6.1 Commercial Buildings
           9.6.2 Communication Systems
           9.6.3 Others

10 ICS Security Market: Geographic Analysis (Page No. - 123)
     10.1 Introduction
     10.2 North America (NA)
             10.2.1 By Countries**
                        10.2.1.1 U.S.**
                        10.2.1.2 Canada**
     10.3 Europe
             10.3.1 By Countries**
                        10.3.1.1 U.K.**
                        10.3.1.2 Germany**
     10.4 Asia-Pacific
             10.4.1 By Countries**
                        10.4.1.1 China.**
                        10.4.1.2 Japan**
     10.5 Middle East and Africa
             10.5.1 By Countries**
                        10.5.1.1 U.A.E.**
                        10.5.1.2 Saudi Arabia**
     10.6 Latin America
                        10.6.1.1 Brazil**

** Market Data for Other Countries Can Be Provided Upon Client Request

11 ICS Security Market: Competitive Landscape (Page No. - 137)
     11.1 Overview
     11.2 Product Portfolio Comparision
     11.3 Competitive Situation and Trends
             11.3.1 New Product Launches
             11.3.2 Partnerships and Collaborations
             11.3.3 Mergers and Acquisitions
             11.3.4 VC Funding

** Product Matrix Which Gives A Detailed Comparison of Product Portfolio of Each Company

12 ICS Market: Company Profile (Page No. - 150)
     12.1 Airbus Group 
             12.1.1 Business Overview
             12.1.2 Products and Services
             12.1.3 SWOT Analysis
             12.1.4 Recent Developments
             12.2.5 MnM View
     12.2 Cisco Systems, Inc
             12.2.1 Business Overview
             12.2.2 Products and Services
             12.2.3 SWOT Analysis
             12.2.4 Recent Developments
             12.2.5 MnM View
     12.3 IBM Corporation
             12.3.1 Business Overview
             12.3.2 Products and Services
             12.3.3 SWOT Analysis
             12.3.4 Recent Developments
             12.3.5 MnM View
     12.4 Lockheed Martin Corporation
             12.4.1 Business Overview
             12.4.2 Products and Services
             12.4.3 Recent Developments
             12.4.4 SWOT Analysis
             12.4.5 MnM View
     12.5 Siemens AG
             12.5.1 Business Overview
             12.5.2 Products and Services
             12.5.3 Recent Developments
             12.5.4 SWOT Analysis
             12.5.5 MnM View
     12.6 ABB
             12.6.1 Business Overview
             12.6.2 Products and Services
             12.6.3 Recent Developments
             12.6.4 MnM View
     12.7 Honeywell International, Inc.
             12.7.1 Business Overview
             12.7.2 Products and Services
             12.7.3 Recent Developments
             12.7.4 MnM View
     12.8 Juniper Networks, Inc
             12.8.1 Business Overview
             12.8.2 Products and Services
             12.8.3 Recent Developments
             12.8.4 MnM View
     12.9  To fino Security
             12.9.1 Business Overview
             12.9.2 Products and Services
             12.9.3 Recent Developments
             12.9.4 MnM View
     12.10 Trend Micro
             12.10.1 Business Overview
             12.10.2 Products and Services
             12.10.3 Key Strategies
             12.10.4 Recent Developments
             12.10.5 MnM View

** Detailed Analysis and Profiling of Additional Market Players
*Details on Business Overview, Products & Services, Key Insights, Recent Developments, SWOT Analysis, MnM View Might Not Be Captured in Case of Unlisted Companies.

13 Appendix (Page No. - 189)
     13.1 Discussion Guide
     13.2 Introducing Rt: Real Time Market Intelligence
     13.3 Available Customizations
     13.4 Related Reports


List of Tables (71 Tables)

Table 1 ICS Security Market: Assumptions
Table 2 ICS Security Market Size, By Sub-Segement, 2012-2019 ($Billion)
Table 3 ICS Security Market: Time Impact Analysis of Drivers
Table 4 ICS Security Market: Time Impact Analysis of Opportunities
Table 5 ICS Security Market: Time Impact Analysis of Opportunities
Table 6 ICS Security Market: Time Impact Analysis of Challenges
Table 7 ICS Security Market Size, By Technology, 2012-2019 ($Million)
Table 8 DDOS Market Size, By Region, 2012-2019 ($Million)
Table 9 IDS/IPS Market Size, By Region, 2012-2019 ($Million)
Table 10 Antivirus/Malware Market Size, By Region, 2012-2019 ($Million)
Table 11 Firewall Market Size, By Region, 2012-2019 ($Million)
Table 12 Virtualization Security Market Size, By Region, 2012-2019 ($Million)
Table 13 Security Information and Event Management Market Size, By Region, 2012-2019 ($Million)
Table 14 Scada Encryption Management Market Size, By Region, 2012-2019 ($Million)
Table 15 UTM Market Size, By Region, 2012-2019 ($Million)
Table 16 Application Whitelisting Market Size, By Region, 2012-2019 ($Million)
Table 17 Update and Patch Management Market Size, By Region, 2012-2019 ($Million)
Table 18 Data Loss Prevention Market Size, By Region, 2012-2019 ($Million)
Table 19 Database Activity Monitoring Market Size, By Region, 2012-2019 ($Million)
Table 20 ICS Security  Market Size, By Service, 2012-2019 ($Million)
Table 21 ICS Security Services  Market Size, By Region, 2012-2019 ($Million)
Table 22 Risk Management Services Market Size, By Region, 2012-2019 ($Million)
Table 23 Design, Integration, and Consulting Services Market Size, By Region, 2012-2019 ($Million)
Table 24 Managed Services Market Size, By Region, 2012-2019 ($Million)
Table 25 Audit and Reporting Services Market Size, By Region, 2012-2019 ($Million)
Table 26 ICS Security Market Size, By Vertical, 2012-2019 ($Million)
Table 27 Power Market Size, By Type, 2012-2019 ($Million)
Table 28 Power Generation Market Size, By Unit Type, 2012-2019 ($Million)
Table 29 Nuclear Power Plant Market Size, By Technology, 2012-2019 ($Million)
Table 30 Thermal and Hydro Power Plant Market Size, By Technology, 2012-2019 ($Million)
Table 31 Renewable Energy Power Plant Market Size, By Type, 2012-2019 ($Million)
Table 32 Solar Power Plants Market Size, By Technology, 2012-2019 ($Million)
Table 33 Geothermal Market Size, By Technology, 2012-2019 ($Million)
Table 34 Biomass Market Size, By Technology, 2012-2019 ($Million)
Table 35 Tidal Market Size, By Technology, 2012-2019 ($Million)
Table 36 Wind Market Size, By Technology, 2012-2019 ($Million)
Table 37 Oil and Gas Market Size, By Technology, 2012-2019 ($Million)
Table 38 Power Grid Market Size, By Technology, 2012-2019 ($Million)
Table 39 Energy and Utilities Market Size, By Type, 2012-2019 ($Million)
Table 40 Oil and Gas Pipelines  Market Size, By Technology, 2012-2019 ($Million)
Table 41 Electric Power Transmission Market Size, By Technology, 2012-2019 ($Million)
Table 42 Water Treatment and Distribution Market Size, By Technology, 2012-2019 ($Million)
Table 43 Waste Water Collection and Treatment Market Size, By Technology, 2012-2019 ($Million)
Table 44 Transportation Systems Market Size, By Type, 2012-2019 ($Million)
Table 45 Airports Market Size, By Technology, 2012-2019 ($Million)
Table 46 Seaports Market Size, By Technology, 2012-2019 ($Million)
Table 47 Railways Market Size, By Technology, 2012-2019 ($Million)
Table 48 Others  Market Size, By Technology, 2012-2019 ($Million)
Table 49 Chemical and Manufacturing Market Size, By Type, 2012-2019 ($Million)
Table 50 Automated Production Unit  Market Size, By Technology, 2012-2019 ($Million)
Table 51 Refining Plants  Market Size, By Technology, 2012-2019 ($Million)
Table 52 Mining Units  Market Size, By Technology, 2012-2019 ($Million)
Table 53 Other Verticals Market Size, By Type, 2012-2019 ($Million)
Table 54 Commercial Buildings  Market Size, By Technology, 2012-2019 ($Million)
Table 55 Communication Systems Market Size, By Technology, 2012-2019 ($Million)
Table 56 Others Market Size, By Technology, 2012-2019 ($Million)
Table 57 ICS Security Market Size, By Region, 2012-2019 ($Million)
Table 58 North America: ICS Security Market Size, By Vertical, 2012-2019 ($Million)
Table 59 North America: ICS Security Market Size, By Service, 2012-2019 ($Million)
Table 60 Europe: ICS Security Market Size, By Vertical, 2012-2019 ($Million)
Table 61 Europe: ICS Security Market Size, By Service, 2012-2019 ($Million)
Table 62 APAC: ICS Security Market Size, By Vertical, 2012-2019 ($Million)
Table 63 APAC: ICS Security Market Size, By Service, 2012-2019 ($Million)
Table 64 MEA: ICS Security Market Size, By Vertical, 2012-2019 ($Million)
Table 65 MEA: ICS Security Market Size, By Service, 2012-2019 ($Million)
Table 66 LA: ICS Security Market Size, By Vertical, 2012-2019 ($Million)
Table 67 LA: ICS Security Market Size, By Service, 2012-2019 ($Million)
Table 68 ICS Security Market: New Product Launches, 2012–2014
Table 69 ICS Security Market: Partnerships and Collaborations, 2012–2014
Table 70 ICS Security Market: Mergers and Acquisitions, 2012–2014
Table 71 ICS Security Market: VC Funding, 2012


List of Figures (78 Figures)

Figure 1 ICS Security :Research Methodology
Figure 2 Market Size Estimation Methodology: Bottom-Up Approach
Figure 3 Market Size Estimation Methodology:  Top-Down Approach
Figure 4 Breakdown of Primary Interviews: By Company Type, Designation, & Region
Figure 5 ICS Security Market: Data Triangulation
Figure 6 Firewall is Covering the Maximum Share of ICS Security Technologies Market (2014 vs. 2019)
Figure 7 Managed Services is Leading the Services Market (2014 vs. 2019)
Figure 8 Power Sector is Dominating the ICS Security Market (2014 vs. 2019)
Figure 9 Global ICS Security Services Market Share, By Region, 2014
Figure 10 Sophistication of Threats is Driving the ICS Security in North America
Figure 11 Sophistication of Threats is Driving the ICS Security Market
Figure 12 Services  to  Grow at the Highest Rate Among the ICS Security Segments
Figure 13 North America Holds Maximum Share in the ICS Security Services Market (2014)
Figure 14 Middle East and Africa  to  Grow Quicker Than Other Regional ICS Security Markets
Figure 15 Latin America Market is Entering Growth Phase in 2014-2019 in ICS Security Market
Figure 16 ICS Security Market Segmentation: By Technology
Figure 17 ICS Security Market Segmentation: By Service
Figure 18 ICS Security Segmentation: By Vertical
Figure 19 ICS Security Vertical Segmentation: By Power
Figure 20 ICS Security Vertical Segmentation: By Energy and Utilities
Figure 21 ICS Security Vertical Segmentation: By Transportation System
Figure 22 ICS Security Vertical Segmentation: By Chemical and Manufacturing
Figure 23 ICS Security Vertical Segmentation: By Other Verticals
Figure 24 ICS Security Market Segmentation: By Region
Figure 25 Drivers, Restraints, Opportunities, and Challenges in the ICS Security Market
Figure 26 Value Chain: ICS Security Market
Figure 27 Porter’s Five Forces Analysis (2014): ICS Security
Figure 28 The Technology Market is Dominated By Firewall Solutions for ICS Security
Figure 29 Middle East & Africa Will Be A Lucrative Region for DDOS Market Throughout the Forecasted Period
Figure 30 Middle East & Africa Will Show High Growth Opportunities for IDS/IPS Technology
Figure 31 Asia-Pacific Will Witness More Deployments of Antivirus/Malware Solutions Among All Regions
Figure 32 Strong Focus Towards Network Defense in APAC is Boosting the Firewall Technology Market
Figure 33 Virtualization Security Technology in APAC is Expected  to  Be Doubled By 2019
Figure 34 North America and Asia-Pacific are the Major Revenue Market for SIEM Technologies
Figure 35 North America and Asia-Pacific Leads the SCADA Encryption Technology Market
Figure 36 UTM  to  Witness the Highest Growth in the Middle East & Africa Region
Figure 37 Middle East & Africa Will Be A Lucrative Region for Application Whitelisting Market Throughout the Forecast Period
Figure 38 Update and Patch Management  to  Witness Double-Digit Growth in Middle East & Africa
Figure 39 Asia-Pacific Dominates the ICS Security Market Throughout the Forecast Period
Figure 40 North America and Asia-Pacific are the Lucrative Markets for Database Activity Monitoring Solutions
Figure 41 Managed Services Will Dominate the ICS Security Services Market Throughout the Forecast Period
Figure 42 Government’s Initiatives Towards National Security is Fueling the Growth of Risk Management Services in the MEA Region
Figure 43 Design, Integration and Consulting in APAC is Expected to Cover the Maximum Market Size in 2019
Figure 44 Cost Constraints is Driving the Managed Services Market Across the Globe
Figure 45 MEA is Estimated  to  Be A Beneficial Market for the Audit and Report Services in ICS Security Market
Figure 46 Power Sector Will Dominate the ICS Security Market
Figure 47 ICS Security in Power Generation Covers the Maximum Market Share
Figure 48 Oil & Gas Pipelines Sector Will Show Greater Adoption of ICS Security Solutions
Figure 49 Seaports is Estimated  to  Be the Highest Growing Segment for ICS Security Market
Figure 50 Severe Cyber Attacks are Driving the Market for ICS Security Systems in Chemical and Manufacturing Sector
Figure 51 The Growing Concerns Over Cyber Crimes is Pushing the Market for ICS Security in Commercial Buildings
Figure 52 Geographic Snapshot: MEA is Emerging as A New Hot Spot for ICS Security Providers
Figure 53 Geographic Snapshot (2014-2019): Rapid Growth Markets is Expected From  Emerging Regions Such as MEA and APAC
Figure 54 Rapid Growth Markets is Expected From  Emerging Regions Such as MEA and APAC
Figure 55 NA Market Snapshot: Energy and Utilities Vertical is Expected  to  Contribute the Maximum  to  the Market Size in 2014
Figure 56 MEA Market Snapshot: Presence of Major Energy Industries is A Factor Contributing Towards Growth in This Region
Figure 57 MEA Market Snapshot: Transportation Vertical has Huge Potential  to  Grow During the Forecast Period
Figure 58 Companies Adopted New Product Launches and Enhancements as the Key Growth Strategy Over the Last Three Years
Figure 59 Global ICS Security Market Share, Product Category Mapping
Figure 60 Area-Chart Showing Historical CAGR of Top 5 Players
Figure 61 Market Evaluation Framework
Figure 62 Battle for Market Share: New Product Launch and Product Enhancement Was the Key Strategy
Figure 63 Geographic Revenue Mix of the Top 5 Market Players
Figure 64 Airbus Group : Company Snapshot
Figure 65 SWOT Analysis: Airbus Group
Figure 66 Cisco Systems, Inc: Company Snapshot
Figure 67 SWOT Analysis: Cisco Systems, Inc
Figure 68 IBM Corporation: Company Snapshot
Figure 69 SWOT Analysis: IBM Corporation
Figure 70 Lockheed Martin Corporation: Company Snapshot
Figure 71 SWOT Analysis: Lockheed Martin Corporation
Figure 72 Siemens AG: Company Snapshot
Figure 73 SWOT Analysis: Siemens AG
Figure 74 ABB: Company Snapshot
Figure 75 Honeywell International, Inc.: Company Snapshot
Figure 76 Juniper Networks, Inc: Company Snapshot
Figure 77 Tofino Security: Company Snapshot
Figure 78 Trend Micro: Company Snapshot

Rising investments in developing information, communication and technology (ICT) infrastructure across geographies has demonstrated that these investments not only contribute to the nation’s development but also building future for the next generations. Countries are advancing in building robust and resilient security architecture to protect their network, records and control systems, greater than ever before. Governments are building national policies, regulations and compliances to secure there critical infrastructures. Critical infrastructure is defined as the IT assets, networks and services that if disrupted or destroyed would have a serious impact on the health, security, or economic well-being of citizens and the efficient functioning of a country’s government. One does not have to look far for instances of disruptions that have cost organizations time, resources, and possibly lives.

ICS security is an important aspect of national critical infrastructures (utilities, oil and gas pipelines, nuclear facilities etc.)  as it defines the ability of government or organizations to secure their automation processes and related critical information from sophisticated cyber-attacks and crimes. Industrial control systems such as Supervisory Control and Data Acquisition (SCADA), Distributed Control System (DCS), Programmable Logic Controllers (PLC) are used to manage industrial critical infrastructures remotely from a central control room. These systems are vulnerable and are prone to sever cyber threats. Hence, it is important that system security and risk mitigation be at priority of all ICS users and become proactive against the cyber threats.

The highly sophistication, severity and increasing characteristics of cyber threats are inviting various security solutions providers to customize their offerings according to customer demands. Companies are offering highly sophisticated intrusion detection and prevention systems, encryption systems and leading consulting and professional services.

This report gives detailed insights into the global ICS security market split across various regions, type of technologies, type of verticals and type of professional services. While the ICS security technologies includes Distributed Denial of Service (DDoS), Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS), firewall, antivirus/malware, virtualization security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), application whitelisting, Unified Threat Management (UTM), update and patch management and database activity monitoring ; ICS security on the basis of verticals include power, energy and utilities, transportation systems, chemical and manufacturing and other critical infrastructures; ICS security on the basis of professional services include Risk management services, design, integration and consulting, managed services, policy and procedure consulting and audit and reporting services. The report also emphasizes on key adoption trends, future opportunities and business cases in this innovative market.

MarketsandMarkets expects an increasing adoption of ICS security solutions, as major vendors are aggressively investing and rigorously working towards providing sophisticated automation solutions, as well as network security solutions in an effort to provide efficient ICS security to networks. The overall ICS security market is expected to grow from $7.82 Billion in 2014 to $11.29 Billion by 2019, at an estimated Compound Annual Growth Rate (CAGR) of 7.6% from 2014 to 2019. The key players in this market include ABB, Airbus Defence and Space, Cisco, Honeywell, IBM, Juniper Networks, Lockheed Martin, Tofino Security, and Trend Micro.

ICS Security and Services Market Size and Forecast, 2014-2019 ($Billions)

Industrial Control Systems (ICS) Security Market

E – Estimate, P – Projected
Source: MarketsandMarkets Analysis

Custom Market Research Services

We will customize the research for you, in case the report listed above does not meet with your exact requirements. Our custom research will comprehensively cover the business information you require to help you arrive at strategic and profitable business decisions.

Please visit http://www.marketsandmarkets.com/knowledge-process-outsourcing-services.asp to specify your custom Research Requirement

Connect With Us

Follow us on LinkedIn  Follow us on Facebook   Follow us on Twitter 
Live Chat Support


US : 1-888-600-6441
UK : 44-800-368-9399

Search reports