Australian ICS Security Market Analysis, 2016
Australian ICS Security Market Analysis, 2016
Growing Demand for Cyber Security Insurance and IoT Applications will Drive Investments
14-Dec-2016
Asia Pacific
Market Research
Description
The study analyses the Australian Industrial Control Systems (ICS) security market for 2015.
Research Scope
• Market Trends
• Market Drivers and Restraints
• Solutions and Technologies
• Vertical Analysis
• Vendor Analysis
In the recent years, there have been notable targeted attacks on industrial control systems and systems of critical infrastructure by attacks/malwares with code names such as Stuxnet, Aurora, Flame, and Havex. These were discovered by various security vendors’ threat research and intelligence centres. The drive of Internet of Things (IoT) has driven several industries such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, thereby unknowingly exposing themselves and becoming more vulnerable to the threats.
Australia has come under several ICS attacks in recent times. Several security events recorded in recent years involving systems of national interest, including both critical infrastructure and government systems, indicate that Australia is increasingly the target of cyber attacks. As a result, Australian businesses are making strong investments towards ICS security. The uptake of ICS security has been driven by factors such as increased attacks on critical infrastructure globally, investments in cyber security insurance, and investments in IoT applications. As we move forward, industry-specific regulations and mandates around ICS security will further drive the uptake of ICS security solutions in Australia. However, factors such as air gap strategy, security skills shortage and technology sprawl, lack of mandates, and preference for availability over integrity will be the major barriers to the growth of this market.
The ICS security market is flooded with vendors from various backgrounds. The competitive landscape includes ICT vendors, industrial automation vendors, and security vendors with an industrial security offering. Additionally, the market will witness service providers offering managed security services through partnerships with various security vendors.
The base year of the study is 2015, with forecasts up to 2021.
Strategies, growth analysis, and competitive landscape are discussed for ICT security and industrial security vendors such as ABB, Check Point, Cisco, Fortinet, Honeywell, Kaspersky, McAfee, Palo Alto Networks, Rockwell Automation, Schneider Electric, Siemens, Symantec, Waterfall Security, Wurdltech, and Yokogawa.
Key Questions This Study Will Answer
• How is the existing threat landscape for Industrial Control Systems in Australia?
• Are the existing competitors structured correctly to meet customer needs?
• What are the trends in the Industrial Control Systems security market?
• Who are the major ICS security vendors in Australia?
• Are there unique features in the security technologies used for Industrial Control Systems?
• Is the ICS security solution market growing? How long will it continue to grow, and at what rate?
Table of Contents
Executive Summary
Market Engineering Measurements—ICS Security Market
Cyber Threats Targeting Australia
Scope and Coverage
Market Definitions
- ICS Security Market
Methodology
- Industrial Control Systems (ICS)
- Operational Technology (OT)
- Supervisory Control and Data Acquisition (SCADA)
- Distributed Control Systems (DCS)
- Human Machine Interface (HMI)
- Programmable Logic Controllers (PLCs)
- Remote Terminal Units (RTUs)
- Intelligent Electronic Devices (IEDs)
- Industrial Control Systems (ICS) Security
Why Converge IT and OT?
Plant Level Architecture and Threats
Security Solutions to Protect ICS
Digital Technologies—A Boon or a Bane?
ICS vs IT Systems—Characteristics and Differences
Vulnerabilities in ICS—Some Stats
ICS Attack Vectors
ICS Infiltration Techniques
Market Drivers
Market Restraints
Market Engineering Measurements
ICS Security Market—Revenue Forecast
Product Segments—An Overview
Power and Utilities Sector
Power and Utilities Sector—Cyber Security History
Oil and Gas Sector
Oil and Gas Sector—Cyber Security History
Mining Sector
Water and Wastewater Sector
Transport Sector
Recorded ICS Attacks/Glitches in Australia
Automation and ICT Vendor Partnership
ABB
Check Point
Cisco
Fortinet
Honeywell
Kaspersky
McAfee
Palo Alto Networks
Rockwell Automation
Schneider Electric
Siemens
Symantec
Waterfall Security
Wurldtech
Yokogawa
An Opportunity for Managed Security Service Providers
Strategies to Protect Industrial Control Systems
Why is Australia Falling Behind in Cyber Security?
The Last Word
Legal Disclaimer
- 1. ICS Security Market: Threats Targeting Different Levels of Purdue Model, Australia, 2015
- 2. ICS Security Market: ICS vs IT Systems—Characteristics and Differences, Australia, 2015
- 3. ICS Security Market: Market Drivers, Australia, 2016–2021
- 4. ICS Security Market: Market Restraints, Australia, 2016–2021
- 5. ICS Security Market: IT and OT Priorities, Australia, 2015
- 6. ICS Security Market: Market Engineering Measurements, Australia, 2015
- 7. ICS Security Market: Adoption of ICS Security in Power and Utilities Sector, Australia, 2015–2021
- 8. ICS Security Market: Power and Utilities Sector—Cyber Security History, Global, 2005–2012
- 9. ICS Security Market: Adoption of ICS Security in Oil and Gas Sector, Australia, 2015–2021
- 10. ICS Security Market: Oil and Gas Sector—Cyber Security History, Global, 2002–2012
- 11. ICS Security Market: Adoption of ICS Security in Mining Sector, Australia, 2015–2021
- 12. ICS Security Market: Adoption of ICS Security in Water and Wastewater Sector, Australia, 2015–2021
- 13. ICS Security Market: Adoption of ICS Security in Transport Sector, Australia, 2015–2021
- 14. ICS Security Market: Recorded ICS Attacks/Glitches, Australia, 2005–2011
- 15. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016
- 16. ICS Security Market: ICS Solution Offering, Global, 2015
- 17. ICS Security Market: ICS Solution Offering, Global, 2015
- 18. ICS Security Market: ICS Solution Offering, Global, 2015
- 19. ICS Security Market: ICS Solution Offering, Global, 2015
- 20. ICS Security Market: ICS Solution Offering, Global, 2015
- 21. ICS Security Market: ICS Solution Offering, Global, 2015
- 22. ICS Security Market: ICS Solution Offering, Global, 2015
- 23. ICS Security Market: ICS Solution Offering, Global, 2015
- 24. ICS Security Market: ICS Solution Offering, Global, 2015
- 25. ICS Security Market: ICS Solution Offering, Global, 2015
- 26. ICS Security Market: ICS Solution Offering, Global, 2015
- 27. ICS Security Market: ICS Solution Offering, Global, 2015
- 28. ICS Security Market: ICS Solution Offering, Global, 2015
- 29. ICS Security Market: ICS Solution Offering, Global, 2015
- 30. ICS Security Market: ICS Solution Offering, Global, 2015
- 31. ICS Security Market: Top Priorities for Businesses, Australia, 2016
- 1. ICS Security Market: Revenue Forecast: Australia, 2015–2021
- 2. ICS Security Market: Market Engineering Measurements, Australia, 2015
- 3. ICS Security Market: Incidents Responded to by ASD, Australia, 2011–2014
- 4. ICS Security Market: Incidents Responded to by CERT Australia Affecting Systems of National Interest and Critical Infrastructure, Australia, 2014
- 5. ICS Security Market: Top Attack Vectors, Australia, 2014
- 6. ICS Security Market: Top Negative Impacts of a Security Breach, Australia, 2015
- 7. ICS Security Market: Benefits of IT/OT Convergence, Australia, 2015
- 8. ICS Security Market: Purdue Model for Control Hierarchy, Australia, 2015
- 9. ICS Security Market: Top IT Priorities, Australia, 2015
- 10. ICS Security Market: Key Business Requirements for IT, Australia, 2015
- 11. ICS Security Market: Top IoT Adopters by Industry, Australia, 2015
- 12. ICS Security Market: Top BYOD Challenge, Australia, 2015
- 13. ICS Security Market: Top Cloud Challenge, Australia, 2015
- 14. ICS Security Market: Top Enterprise Mobility Challenge, Australia, 2015
- 15. ICS Security Market: Top 15 Countries by ICS Availability, Global, 2015
- 16. ICS Security Market: ICS Vulnerabilities, Global, 2005–2015
- 17. ICS Security Market: ICS Vulnerabilities by Risk Level, Global, 2015
- 18. ICS Security Market: ICS Vulnerabilities by Plant Levels, Global, 2015
- 19. ICS Security Market: ICS Issue—Intentional vs Unintentional, Global, 2015
- 20. Top Serious Threats to Organisations, Australia, 2015
- 21. Top Security Expenditure, Australia, 2015
- 22. Information Security Projected Spend, Global, 2011–2015
- 23. Top IoT Adoption Sectors, Australia, 2015
- 24. Top ICS Adoption Sectors, Australia, 2015
- 25. Top 5 Implications of Security Sprawl, Global, 2015
- 26. ICS Security Market: Revenue Forecast, Australia, 2014–2021
- 27. ICS Security Market: Product Segments Overview, Australia, 2015
- 28. ICS Security Market: Energy Production by Type, Australia, 2015
- 29. ICS Security Market: Energy Consumption by Vertical, Australia, 2015
- 30. ICS Security Market: IoT Convergence, Australia, 2015
- 31. Primary Source of Energy, Australia, 2015
- 32. ICS Security Market: Exposed ICS Devices and Mining Locations, Australia, 2015
- 33. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016
- 34. ICS Security Market: Top Reasons for Outsourcing Services Requirement, Australia, 2015
Growth dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Popular Topics
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Table of Contents | | Executive Summary~ || Executive Summary~ || Market Engineering Measurements—ICS Security Market~ | Cyber Threats Targeting Australia~ || Cyber Threats Targeting Australia~ | Definitions and Methodology~ || Scope and Coverage~ ||| ICS Security Market~ |||| By Security Solutions~ ||||| Host-based/ Embedded Security ~ ||||| Endpoint Security~ ||||| Network Security~ ||||| Others~ |||| By Vertical~ ||||| Power Utilities ~ ||||| Water and Wastewater ~ ||||| Mining~ ||||| Oil and Gas~ ||||| Transport~ || Market Definitions~ ||| Industrial Control Systems (ICS)~ ||| Operational Technology (OT)~ ||| Supervisory Control and Data Acquisition (SCADA)~ ||| Distributed Control Systems (DCS)~ ||| Human Machine Interface (HMI)~ ||| Programmable Logic Controllers (PLCs)~ ||| Remote Terminal Units (RTUs)~ ||| Intelligent Electronic Devices (IEDs)~ ||| Industrial Control Systems (ICS) Security~ || Methodology~ | Why Converge IT and OT?~ || Why Converge IT and OT?~ | Plant Level Architecture and Threats~ || Plant Level Architecture and Threats~ ||| Industrial Zone~ ||| Demilitarised Zone~ ||| Enterprise Zone~ | Security Solutions to Protect ICS~ || Security Solutions to Protect ICS~ ||| Network Security—Firewalls and Secure Routers~ ||| Meeting Needs in Network Security for Operational Technology~ ||| Gateway Antivirus~ ||| Intrusion Detection, Prevention, Inspection, and Whitelisting of ICS Protocols~ ||| ICS Application Whitelisting and Controls~ ||| Network Address Translation (NAT)~ ||| Network Segmentation/Zoning~ ||| Network Security—Unidirectional Security Gateways (data diodes)~ ||| Endpoint Security~ ||| Signature-less Exploit Detection~ ||| Application Whitelisting (also applicable to embedded devices)~ ||| Removable Device Management~ ||| Host-based Security~ ||| Others (security analytics, vulnerability assessment, threat intelligence, etc.)~ | Digital Technologies—A Boon or a Bane?~ || Digital Technologies—A Boon or a Bane?~ | ICS—The New Turf for Cyber Criminals~ || ICS vs IT Systems—Characteristics and Differences~ || Vulnerabilities in ICS—Some Stats~ || ICS Attack Vectors~ ||| Phishing Emails (Social Engineering)~ ||| Watering Hole~ ||| Removable Media~ ||| Virtual Private Networks (VPN)~ ||| Weak Authentication~ ||| Wireless Networks and Wi-Fi Hotspots~ || ICS Infiltration Techniques~ ||| Buffer Overflow~ ||| Denial of Service (DOS)~ ||| SQL Injection~ ||| Protocol Vulnerability Exploitation~ ||| Privilege Escalation~ ||| Cross Site Scripting (known as XSS)~ ||| Directory Traversal~ ||| Man-In-the-Middle (MITM) Attacks~ | ICS Security Market Drivers~ || Market Drivers~ ||| Increasing Attacks on ICS Drive Demand for ICS Security Solutions~ ||| Cyber security insurance is driving investments towards ICS security~ ||| Investments shifting away from training and education towards security solutions ~ ||| Growing investments in IoT applications ~ | ICS Security Market Restraints~ || Market Restraints~ ||| Lack of mandates and understanding about ICS security~ ||| Technology sprawl and security skills shortage ~ ||| Air gap misconception~ ||| System availability preferred over integrity and confidentiality~ | ICS Security Market—Revenue Forecast and Trends~ || Market Engineering Measurements~ || ICS Security Market—Revenue Forecast~ || Product Segments—An Overview~ | Power and Utilities Sector~ || Power and Utilities Sector~ || Power and Utilities Sector—Cyber Security History~ | Oil and Gas Sector~ || Oil and Gas Sector~ ||| Plant Equipment Sabotage~ ||| Company Sabotage~ ||| Plant Destruction~ || Oil and Gas Sector—Cyber Security History~ | Mining Sector~ || Mining Sector~ | Water and Wastewater Sector~ || Water and Wastewater Sector~ | Transport Sector~ || Transport Sector~ || Recorded ICS Attacks/Glitches in Australia~ | Vendor Analysis~ || Automation and ICT Vendor Partnership~ || ABB~ || Check Point~ || Cisco~ || Fortinet~ || Honeywell~ || Kaspersky~ || McAfee~ || Palo Alto Networks~ || Rockwell Automation~ || Schneider Electric~ || Siemens~ || Symantec~ || Waterfall Security~ || Wurldtech~ || Yokogawa~ | An Opportunity for Managed Security Service Providers~ || An Opportunity for Managed Security Service Providers~ | Strategies to Protect Industrial Control Systems~ || Strategies to Protect Industrial Control Systems~ | Why is Australia Falling Behind in Cyber Security?~ || Why is Australia Falling Behind in Cyber Security?~ | The Last Word~ || The Last Word~ || Legal Disclaimer~ | The Frost & Sullivan Story~ |
List of Charts and Figures | 1. ICS Security Market: Threats Targeting Different Levels of Purdue Model, Australia, 2015~ 2. ICS Security Market: ICS vs IT Systems—Characteristics and Differences, Australia, 2015~ 3. ICS Security Market: Market Drivers, Australia, 2016–2021~ 4. ICS Security Market: Market Restraints, Australia, 2016–2021~ 5. ICS Security Market: IT and OT Priorities, Australia, 2015~ 6. ICS Security Market: Market Engineering Measurements, Australia, 2015~ 7. ICS Security Market: Adoption of ICS Security in Power and Utilities Sector, Australia, 2015–2021~ 8. ICS Security Market: Power and Utilities Sector—Cyber Security History, Global, 2005–2012~ 9. ICS Security Market: Adoption of ICS Security in Oil and Gas Sector, Australia, 2015–2021~ 10. ICS Security Market: Oil and Gas Sector—Cyber Security History, Global, 2002–2012~ 11. ICS Security Market: Adoption of ICS Security in Mining Sector, Australia, 2015–2021~ 12. ICS Security Market: Adoption of ICS Security in Water and Wastewater Sector, Australia, 2015–2021~ 13. ICS Security Market: Adoption of ICS Security in Transport Sector, Australia, 2015–2021~ 14. ICS Security Market: Recorded ICS Attacks/Glitches, Australia, 2005–2011~ 15. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016~ 16. ICS Security Market: ICS Solution Offering, Global, 2015~ 17. ICS Security Market: ICS Solution Offering, Global, 2015~ 18. ICS Security Market: ICS Solution Offering, Global, 2015~ 19. ICS Security Market: ICS Solution Offering, Global, 2015~ 20. ICS Security Market: ICS Solution Offering, Global, 2015~ 21. ICS Security Market: ICS Solution Offering, Global, 2015~ 22. ICS Security Market: ICS Solution Offering, Global, 2015~ 23. ICS Security Market: ICS Solution Offering, Global, 2015~ 24. ICS Security Market: ICS Solution Offering, Global, 2015~ 25. ICS Security Market: ICS Solution Offering, Global, 2015~ 26. ICS Security Market: ICS Solution Offering, Global, 2015~ 27. ICS Security Market: ICS Solution Offering, Global, 2015~ 28. ICS Security Market: ICS Solution Offering, Global, 2015~ 29. ICS Security Market: ICS Solution Offering, Global, 2015~ 30. ICS Security Market: ICS Solution Offering, Global, 2015~ 31. ICS Security Market: Top Priorities for Businesses, Australia, 2016~| 1. ICS Security Market: Revenue Forecast: Australia, 2015–2021~ 2. ICS Security Market: Market Engineering Measurements, Australia, 2015~ 3. ICS Security Market: Incidents Responded to by ASD, Australia, 2011–2014~ 4. ICS Security Market: Incidents Responded to by CERT Australia Affecting Systems of National Interest and Critical Infrastructure, Australia, 2014~ 5. ICS Security Market: Top Attack Vectors, Australia, 2014~ 6. ICS Security Market: Top Negative Impacts of a Security Breach, Australia, 2015~ 7. ICS Security Market: Benefits of IT/OT Convergence, Australia, 2015~ 8. ICS Security Market: Purdue Model for Control Hierarchy, Australia, 2015~ 9. ICS Security Market: Top IT Priorities, Australia, 2015~ 10. ICS Security Market: Key Business Requirements for IT, Australia, 2015~ 11. ICS Security Market: Top IoT Adopters by Industry, Australia, 2015~ 12. ICS Security Market: Top BYOD Challenge, Australia, 2015~ 13. ICS Security Market: Top Cloud Challenge, Australia, 2015~ 14. ICS Security Market: Top Enterprise Mobility Challenge, Australia, 2015~ 15. ICS Security Market: Top 15 Countries by ICS Availability, Global, 2015~ 16. ICS Security Market: ICS Vulnerabilities, Global, 2005–2015~ 17. ICS Security Market: ICS Vulnerabilities by Risk Level, Global, 2015~ 18. ICS Security Market: ICS Vulnerabilities by Plant Levels, Global, 2015~ 19. ICS Security Market: ICS Issue—Intentional vs Unintentional, Global, 2015~ 20. Top Serious Threats to Organisations, Australia, 2015~ 21. Top Security Expenditure, Australia, 2015~ 22. Information Security Projected Spend, Global, 2011–2015~ 23. Top IoT Adoption Sectors, Australia, 2015~ 24. Top ICS Adoption Sectors, Australia, 2015~ 25. Top 5 Implications of Security Sprawl, Global, 2015~ 26. ICS Security Market: Revenue Forecast, Australia, 2014–2021~ 27. ICS Security Market: Product Segments Overview, Australia, 2015~ 28. ICS Security Market: Energy Production by Type, Australia, 2015~ 29. ICS Security Market: Energy Consumption by Vertical, Australia, 2015~ 30. ICS Security Market: IoT Convergence, Australia, 2015~ 31. Primary Source of Energy, Australia, 2015~ 32. ICS Security Market: Exposed ICS Devices and Mining Locations, Australia, 2015~ 33. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016~ 34. ICS Security Market: Top Reasons for Outsourcing Services Requirement, Australia, 2015~ |
Author | Sandeep Karuppuswamy |
Industries | Industrial Automation |
WIP Number | P914-01-00-00-00 |
Keyword 1 | Australian ICS Security |
Keyword 2 | Industrial Control Systems security |
Keyword 3 | industrial control systems |
Is Prebook | No |