Australian ICS Security Market Analysis, 2016

Growing Demand for Cyber Security Insurance and IoT Applications will Drive Investments

USD 3,000

* Required Fields

USD 3,000

PAY BY INVOICE

Be the first to review this product

The study analyses the Australian Industrial Control Systems (ICS) security market for 2015.

Research Scope
• Market Trends
• Market Drivers and Restraints
• Solutions and Technologies
• Vertical Analysis
• Vendor Analysis

In the recent years, there have been notable targeted attacks on industrial control systems and systems of critical infrastructure by attacks/malwares with code names such as Stuxnet, Aurora, Flame, and Havex. These were discovered by various security vendors’ threat research and intelligence centres. The drive of Internet of Things (IoT) has driven several industries such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, thereby unknowingly exposing themselves and becoming more vulnerable to the threats.

Australia has come under several ICS attacks in recent times. Several security events recorded in recent years involving systems of national interest, including both critical infrastructure and government systems, indicate that Australia is increasingly the target of cyber attacks. As a result, Australian businesses are making strong investments towards ICS security. The uptake of ICS security has been driven by factors such as increased attacks on critical infrastructure globally, investments in cyber security insurance, and investments in IoT applications. As we move forward, industry-specific regulations and mandates around ICS security will further drive the uptake of ICS security solutions in Australia. However, factors such as air gap strategy, security skills shortage and technology sprawl, lack of mandates, and preference for availability over integrity will be the major barriers to the growth of this market.

The ICS security market is flooded with vendors from various backgrounds. The competitive landscape includes ICT vendors, industrial automation vendors, and security vendors with an industrial security offering. Additionally, the market will witness service providers offering managed security services through partnerships with various security vendors.

The base year of the study is 2015, with forecasts up to 2021.

Strategies, growth analysis, and competitive landscape are discussed for ICT security and industrial security vendors such as ABB, Check Point, Cisco, Fortinet, Honeywell, Kaspersky, McAfee, Palo Alto Networks, Rockwell Automation, Schneider Electric, Siemens, Symantec, Waterfall Security, Wurdltech, and Yokogawa.

Key Questions This Study Will Answer
• How is the existing threat landscape for Industrial Control Systems in Australia?
• Are the existing competitors structured correctly to meet customer needs?
• What are the trends in the Industrial Control Systems security market?
• Who are the major ICS security vendors in Australia?
• Are there unique features in the security technologies used for Industrial Control Systems?
• Is the ICS security solution market growing? How long will it continue to grow, and at what rate?

Table of Contents

1. Executive Summary
Executive Summary
Market Engineering Measurements—ICS Security Market
2. Cyber Threats Targeting Australia
Cyber Threats Targeting Australia
3. Definitions and Methodology
Scope and Coverage
ICS Security Market
By Security Solutions
Host-based/ Embedded Security
Endpoint Security
Network Security
Others
By Vertical
Power Utilities
Water and Wastewater
Mining
Oil and Gas
Transport
Market Definitions
Industrial Control Systems (ICS)
Operational Technology (OT)
Supervisory Control and Data Acquisition (SCADA)
Distributed Control Systems (DCS)
Human Machine Interface (HMI)
Programmable Logic Controllers (PLCs)
Remote Terminal Units (RTUs)
Intelligent Electronic Devices (IEDs)
Industrial Control Systems (ICS) Security
Methodology
4. Why Converge IT and OT?
Why Converge IT and OT?
5. Plant Level Architecture and Threats
Plant Level Architecture and Threats
Industrial Zone
Demilitarised Zone
Enterprise Zone
6. Security Solutions to Protect ICS
Security Solutions to Protect ICS
Network Security—Firewalls and Secure Routers
Meeting Needs in Network Security for Operational Technology
Gateway Antivirus
Intrusion Detection, Prevention, Inspection, and Whitelisting of ICS Protocols
ICS Application Whitelisting and Controls
Network Address Translation (NAT)
Network Segmentation/Zoning
Network Security—Unidirectional Security Gateways (data diodes)
Endpoint Security
Signature-less Exploit Detection
Application Whitelisting (also applicable to embedded devices)
Removable Device Management
Host-based Security
Others (security analytics, vulnerability assessment, threat intelligence, etc.)
7. Digital Technologies—A Boon or a Bane?
Digital Technologies—A Boon or a Bane?
8. ICS—The New Turf for Cyber Criminals
ICS vs IT Systems—Characteristics and Differences
Vulnerabilities in ICS—Some Stats
ICS Attack Vectors
Phishing Emails (Social Engineering)
Watering Hole
Removable Media
Virtual Private Networks (VPN)
Weak Authentication
Wireless Networks and Wi-Fi Hotspots
ICS Infiltration Techniques
Buffer Overflow
Denial of Service (DOS)
SQL Injection
Protocol Vulnerability Exploitation
Privilege Escalation
Cross Site Scripting (known as XSS)
Directory Traversal
Man-In-the-Middle (MITM) Attacks
9. ICS Security Market Drivers
Market Drivers
Increasing Attacks on ICS Drive Demand for ICS Security Solutions
Cyber security insurance is driving investments towards ICS security
Investments shifting away from training and education towards security solutions
Growing investments in IoT applications
10. ICS Security Market Restraints
Market Restraints
Lack of mandates and understanding about ICS security
Technology sprawl and security skills shortage
Air gap misconception
System availability preferred over integrity and confidentiality
11. ICS Security Market—Revenue Forecast and Trends
Market Engineering Measurements
ICS Security Market—Revenue Forecast
Product Segments—An Overview
12. Power and Utilities Sector
Power and Utilities Sector
Power and Utilities Sector—Cyber Security History
13. Oil and Gas Sector
Oil and Gas Sector
Plant Equipment Sabotage
Company Sabotage
Plant Destruction
Oil and Gas Sector—Cyber Security History
14. Mining Sector
Mining Sector
15. Water and Wastewater Sector
Water and Wastewater Sector
16. Transport Sector
Transport Sector
Recorded ICS Attacks/Glitches in Australia
17. Vendor Analysis
Automation and ICT Vendor Partnership
ABB
Check Point
Cisco
Fortinet
Honeywell
Kaspersky
McAfee
Palo Alto Networks
Rockwell Automation
Schneider Electric
Siemens
Symantec
Waterfall Security
Wurldtech
Yokogawa
18. An Opportunity for Managed Security Service Providers
An Opportunity for Managed Security Service Providers
19. Strategies to Protect Industrial Control Systems
Strategies to Protect Industrial Control Systems
20. Why is Australia Falling Behind in Cyber Security?
Why is Australia Falling Behind in Cyber Security?
21. The Last Word
The Last Word
Legal Disclaimer
22. The Frost & Sullivan Story


List of Figures & Charts

1. ICS Security Market: Threats Targeting Different Levels of Purdue Model, Australia, 2015
2. ICS Security Market: ICS vs IT Systems—Characteristics and Differences, Australia, 2015
3. ICS Security Market: Market Drivers, Australia, 2016–2021
4. ICS Security Market: Market Restraints, Australia, 2016–2021
5. ICS Security Market: IT and OT Priorities, Australia, 2015
6. ICS Security Market: Market Engineering Measurements, Australia, 2015
7. ICS Security Market: Adoption of ICS Security in Power and Utilities Sector, Australia, 2015–2021
8. ICS Security Market: Power and Utilities Sector—Cyber Security History, Global, 2005–2012
9. ICS Security Market: Adoption of ICS Security in Oil and Gas Sector, Australia, 2015–2021
10. ICS Security Market: Oil and Gas Sector—Cyber Security History, Global, 2002–2012
11. ICS Security Market: Adoption of ICS Security in Mining Sector, Australia, 2015–2021
12. ICS Security Market: Adoption of ICS Security in Water and Wastewater Sector, Australia, 2015–2021
13. ICS Security Market: Adoption of ICS Security in Transport Sector, Australia, 2015–2021
14. ICS Security Market: Recorded ICS Attacks/Glitches, Australia, 2005–2011
15. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016
16. ICS Security Market: ICS Solution Offering, Global, 2015
17. ICS Security Market: ICS Solution Offering, Global, 2015
18. ICS Security Market: ICS Solution Offering, Global, 2015
19. ICS Security Market: ICS Solution Offering, Global, 2015
20. ICS Security Market: ICS Solution Offering, Global, 2015
21. ICS Security Market: ICS Solution Offering, Global, 2015
22. ICS Security Market: ICS Solution Offering, Global, 2015
23. ICS Security Market: ICS Solution Offering, Global, 2015
24. ICS Security Market: ICS Solution Offering, Global, 2015
25. ICS Security Market: ICS Solution Offering, Global, 2015
26. ICS Security Market: ICS Solution Offering, Global, 2015
27. ICS Security Market: ICS Solution Offering, Global, 2015
28. ICS Security Market: ICS Solution Offering, Global, 2015
29. ICS Security Market: ICS Solution Offering, Global, 2015
30. ICS Security Market: ICS Solution Offering, Global, 2015
31. ICS Security Market: Top Priorities for Businesses, Australia, 2016


1. ICS Security Market: Revenue Forecast: Australia, 2015–2021
2. ICS Security Market: Market Engineering Measurements, Australia, 2015
3. ICS Security Market: Incidents Responded to by ASD, Australia, 2011–2014
4. ICS Security Market: Incidents Responded to by CERT Australia Affecting Systems of National Interest and Critical Infrastructure, Australia, 2014
5. ICS Security Market: Top Attack Vectors, Australia, 2014
6. ICS Security Market: Top Negative Impacts of a Security Breach, Australia, 2015
7. ICS Security Market: Benefits of IT/OT Convergence, Australia, 2015
8. ICS Security Market: Purdue Model for Control Hierarchy, Australia, 2015
9. ICS Security Market: Top IT Priorities, Australia, 2015
10. ICS Security Market: Key Business Requirements for IT, Australia, 2015
11. ICS Security Market: Top IoT Adopters by Industry, Australia, 2015
12. ICS Security Market: Top BYOD Challenge, Australia, 2015
13. ICS Security Market: Top Cloud Challenge, Australia, 2015
14. ICS Security Market: Top Enterprise Mobility Challenge, Australia, 2015
15. ICS Security Market: Top 15 Countries by ICS Availability, Global, 2015
16. ICS Security Market: ICS Vulnerabilities, Global, 2005–2015
17. ICS Security Market: ICS Vulnerabilities by Risk Level, Global, 2015
18. ICS Security Market: ICS Vulnerabilities by Plant Levels, Global, 2015
19. ICS Security Market: ICS Issue—Intentional vs Unintentional, Global, 2015
20. Top Serious Threats to Organisations, Australia, 2015
21. Top Security Expenditure, Australia, 2015
22. Information Security Projected Spend, Global, 2011–2015
23. Top IoT Adoption Sectors, Australia, 2015
24. Top ICS Adoption Sectors, Australia, 2015
25. Top 5 Implications of Security Sprawl, Global, 2015
26. ICS Security Market: Revenue Forecast, Australia, 2014–2021
27. ICS Security Market: Product Segments Overview, Australia, 2015
28. ICS Security Market: Energy Production by Type, Australia, 2015
29. ICS Security Market: Energy Consumption by Vertical, Australia, 2015
30. ICS Security Market: IoT Convergence, Australia, 2015
31. Primary Source of Energy, Australia, 2015
32. ICS Security Market: Exposed ICS Devices and Mining Locations, Australia, 2015
33. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016
34. ICS Security Market: Top Reasons for Outsourcing Services Requirement, Australia, 2015



Keyword1
australian ics security
Keyword2
industrial control systems security
Keyword3
australian ics security

Related Research

Release Date : 08-Nov-17

Region : Asia Pacific

Release Date : 28-Sep-17

Region : Asia Pacific

Release Date : 28-Sep-17

Region : Asia Pacific

Release Date : 12-Sep-17

Region : Asia Pacific

Why Frost & Sullivan

Working with the CEO’s growth team to create a vision based on a transformation growth strategy

Creating content-based digital marketing strategies that leverage our research perspective to differentiate and “tell your story”

Tracking over 1000 emerging technologies and analyzing the impact by industry and application to reveal the companies to watch in each sector

The Frost & Sullivan team is based in our 45 global offices and have developed a powerful global understandings of how industries operate on a global level.