Asia-Pacific Industrial Control Systems Security Market
Increased Threats Towards Critical Infrastructure Driving Demand for Better Security
23-Nov-2015
Asia Pacific
Market Research
$13,500.00
Special Price $10,125.00 save 25 %
The study analyzes the Asia-Pacific industrial control systems (ICS) security market. In the 2010s, there were notable targeted attacks such as Stuxnet that attacked centrifuges, followed by a slew of attacks with code names such as Aurora, Flame, and Havex, discovered by various security vendors’ threat research and intelligence centers. The drive of Internet of Things (IoT) has driven several industries, such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, unknowingly exposing themselves and becoming more vulnerable to the threats IoT brings. The base year of the study is 2014, with forecasts up to 2019.
![](https://store.frost.com/infographics/P8A5-01-00-00-00.jpg)
Market Engineering Measurements
CEO’s Perspective
Research Methodology
Geographical Coverage
Segmentation: Percent Revenue Breakdown by Region
Customer Segmentation
Qualified Vendor List
The Drive Towards Internet Connectivity for ICS Networks
The Need of fast, Seamless Intelligence of Operations and Processes
Mobility and Reduced Operating Costs and Higher Safety
The Impact of Smart Cities’ Digital Transformation
ICS Vulnerability Landscape—Asia-Pacific
Threat Landscape—Nuclear Plants
Threat Landscape—Non-nuclear Energy Plants
Types of Non-nuclear Energy Plants in Asia-Pacific
Trends in ICS Security Adoption
Attack Vectors Towards Industrial Control Systems
ICS Threat Landscape
Key Market Drivers Explained
Key Market Restraints Explained
Trends in Adoption of ICS Security Solutions
Trends in ICS Security Guidelines/Standards Adoption
ABB
AhnLab
BAE Systems Applied Intelligence
Check Point Software Technologies
Cisco Systems
Fortinet
Others
Darktrace
Hitachi Solutions
JT Engineering
Mitsubishi Hitachi Power Systems
Toshiba
Others
Revenue Forecast
ANZ ICS Security Market Discussion
Revenue Forecast
ASEAN ICS Security Market Discussion
Key Plans and Initiatives by Governments Across Countries in ASEAN
Revenue Forecast
Greater China ICS Security Market Discussion
Revenue Forecast
Indian ICS Security Market Discussion
Revenue Forecast
Japanese ICS Security Market Discussion
Revenue Forecast
South Korean ICS Security Market Discussion
Market Engineering Methodology
About Frost & Sullivan and NSHC
![](img/list_icon.png)
- 1. Total ICS Security Market: Market Engineering Measurements, Asia-Pacific, 2014
- 2. Nuclear Energy Plants in Asia-Pacific
- 3. Non-nuclear* Energy Plants in Asia-Pacific
- 4. Major ICS Cyber Attacks, Asia-Pacific, 2000–2012
- 5. Total ICS Security Market: Key Market Drivers, Asia-Pacific, 2015–2019
- 6. Damage from Trojan/Malware
- 7. Total ICS Security Market: Key Market Restraints, Asia-Pacific, 2015–2019
![](img/chart_icon.png)
- 1. Total ICS Security Market: Research Methodology, Asia-Pacific
- 2. Total ICS Security Market: Percent Revenue Breakdown by Region, Asia-Pacific, 2014
- 3. Total ICS Security Market: Customer Segmentation, Asia-Pacific
- 4. Total ICS Security Market: Qualified Vendor List, Asia-Pacific, 2014
- 5. Number of ICS Components Connected to Internet, Asia-Pacific, 2014
- 6. Vulnerable ICS Systems, Asia-Pacific, 2014
- 7. Percent of ICS Systems Connected Online, Asia-Pacific, 2014
- 8. Percent of Nuclear Plants by Region, Asia-Pacific, 2014
- 9. Percent of Non-Nuclear* Energy Plants, Asia-Pacific, 2014
- 10. Percent of Non-nuclear Energy Plants, Asia-Pacific, 2014
- 11. ICS Threat Landscape
- 12. Total ICS Security Market: Revenue Forecast, Asia-Pacific, 2014–2019
- 13. ICS Security Market: Revenue Forecast, ANZ, 2014–2019
- 14. ICS Security Market: Revenue Forecast, ASEAN, 2014–2019
- 15. ICS Security Market: Revenue Forecast, Greater China, 2014–2019
- 16. ICS Security Market: Revenue Forecast, India, 2014–2019
- 17. ICS Security Market: Revenue Forecast, Japan, 2014–2019
- 18. ICS Security Market: Revenue Forecast, South Korea, 2014–2019
Purchase includes:
- Report download
- Growth Dialog™ with our experts
Growth Dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Table of Contents | | Executive Summary~ || Market Engineering Measurements~ || CEO’s Perspective~ | Market Overview~ || Research Methodology~ || Geographical Coverage~ || Segmentation: Percent Revenue Breakdown by Region~ || Customer Segmentation~ || Qualified Vendor List~ | Trends in ICS Adoption of Internet Connectivity~ || The Drive Towards Internet Connectivity for ICS Networks~ || The Need of fast, Seamless Intelligence of Operations and Processes~ || Mobility and Reduced Operating Costs and Higher Safety~ || The Impact of Smart Cities’ Digital Transformation ~ | Market Definition: Taxonomy of ICS Security Solutions~ | Composition of Industrial Control Systems ~ | Threats Analysis~ || ICS Vulnerability Landscape—Asia-Pacific~ ||| Assessment of ICS Components Exposure~ ||| Vulnerability of ICS Systems~ ||| Percent of ICS Systems Connected Online~ || Threat Landscape—Nuclear Plants~ || Threat Landscape—Non-nuclear Energy Plants~ || Types of Non-nuclear Energy Plants in Asia-Pacific~ || Trends in ICS Security Adoption~ || Attack Vectors Towards Industrial Control Systems~ ||| Watering Hole Attack~ ||| Phishing (Social Engineering) based Attack Through Email~ ||| Infiltration by Removable Media (such as USB Drives)~ ||| Compromising Virtual Private Networks (VPN)~ ||| Brute Force Attack onto Weak Authentication~ ||| Infiltration through Wireless Networks and Rouge WiFi Hotspots~ ||| Protocol Vulnerability Exploitation~ ||| Man-In-The-Middle (MITM) Attacks~ ||| Cross Site Scripting (known as XSS)~ ||| Others~ || ICS Threat Landscape~ | Drivers and Restraints~ || Key Market Drivers Explained~ ||| Awareness on cyber-attacks on ICS systems in major Asia-Pacific countries and the building of national Security Operations Centers (SOC) will increase visibility towards cyber threats~ ||| Organizations using ICS start adopting cyber security standards during the overhaul, improvement, or new implementation of industrial networks~ ||| Security compliance measures mandated by local governments will induce organizations handling ICS to adopt security~ ||| As industrial organizations adopt Internet of Things for the creation of smarter outcomes, it influences the need of ICS security during the design phase~ || Key Market Restraints Explained~ ||| The prioritization of availability over integrity and confidentiality results in lower focus for cyber security and more for productivity~ ||| The misconception of “air-gap” to protect industrial networks led to the belief that there is no need to invest in cyber security solutions~ ||| Uncertainty over offerings by vendors, and also a lack of understanding that is required for cyber security in OT causes doubts in choosing the right solutions for their organizations~ ||| Safety and uninterrupted operations trump cyber security for industrial networks, where security solutions could possibly interfere and disrupt their plant operations~ | Revenue Forecast~ || Trends in Adoption of ICS Security Solutions~ ||| Network Security—Firewalls and Secure Routers~ ||| Meeting Needs in Network Security for Operational Technology~ ||| ICS Application Whitelisting and Controls~ ||| Network Security—Unidirectional Security Gateways (data diodes)~ || Trends in ICS Security Guidelines/Standards Adoption~ | ICS Security Vendors Analysis: Definition of Categories~ || ABB~ || AhnLab~ || BAE Systems Applied Intelligence~ || Check Point Software Technologies~ || Cisco Systems~ || Fortinet~ || Others~ | Other Notable ICS Security Vendors~ || Darktrace~ || Hitachi Solutions~ || JT Engineering~ || Mitsubishi Hitachi Power Systems~ || Toshiba~ || Others~ | ANZ Breakdown~ || Revenue Forecast~ || ANZ ICS Security Market Discussion~ | ASEAN Breakdown~ || Revenue Forecast~ || ASEAN ICS Security Market Discussion~ || Key Plans and Initiatives by Governments Across Countries in ASEAN~ | Greater China Breakdown~ || Revenue Forecast~ || Greater China ICS Security Market Discussion~ | India Breakdown~ || Revenue Forecast~ || Indian ICS Security Market Discussion~ | Japan Breakdown~ || Revenue Forecast~ || Japanese ICS Security Market Discussion~ | South Korea Breakdown~ || Revenue Forecast~ || South Korean ICS Security Market Discussion~ | The Last Word: Three Big Predictions~ | Legal Disclaimer~ | Appendix~ || Market Engineering Methodology~ || About Frost & Sullivan and NSHC~ |
List of Charts and Figures | 1. Total ICS Security Market: Market Engineering Measurements, Asia-Pacific, 2014~ 2. Nuclear Energy Plants in Asia-Pacific~ 3. Non-nuclear* Energy Plants in Asia-Pacific~ 4. Major ICS Cyber Attacks, Asia-Pacific, 2000–2012~ 5. Total ICS Security Market: Key Market Drivers, Asia-Pacific, 2015–2019~ 6. Damage from Trojan/Malware~ 7. Total ICS Security Market: Key Market Restraints, Asia-Pacific, 2015–2019~| 1. Total ICS Security Market: Research Methodology, Asia-Pacific~ 2. Total ICS Security Market: Percent Revenue Breakdown by Region, Asia-Pacific, 2014~ 3. Total ICS Security Market: Customer Segmentation, Asia-Pacific~ 4. Total ICS Security Market: Qualified Vendor List, Asia-Pacific, 2014 ~ 5. Number of ICS Components Connected to Internet, Asia-Pacific, 2014~ 6. Vulnerable ICS Systems, Asia-Pacific, 2014~ 7. Percent of ICS Systems Connected Online, Asia-Pacific, 2014~ 8. Percent of Nuclear Plants by Region, Asia-Pacific, 2014~ 9. Percent of Non-Nuclear* Energy Plants, Asia-Pacific, 2014~ 10. Percent of Non-nuclear Energy Plants, Asia-Pacific, 2014~ 11. ICS Threat Landscape~ 12. Total ICS Security Market: Revenue Forecast, Asia-Pacific, 2014–2019~ 13. ICS Security Market: Revenue Forecast, ANZ, 2014–2019~ 14. ICS Security Market: Revenue Forecast, ASEAN, 2014–2019~ 15. ICS Security Market: Revenue Forecast, Greater China, 2014–2019~ 16. ICS Security Market: Revenue Forecast, India, 2014–2019~ 17. ICS Security Market: Revenue Forecast, Japan, 2014–2019~ 18. ICS Security Market: Revenue Forecast, South Korea, 2014–2019~ |
Author | Charles Lim |
Industries | Information Technology |
WIP Number | P8A5-01-00-00-00 |
Is Prebook | No |