Australian ICS Security Market Analysis, 2016

Australian ICS Security Market Analysis, 2016

Growing Demand for Cyber Security Insurance and IoT Applications will Drive Investments

RELEASE DATE
14-Dec-2016
REGION
Asia Pacific
Research Code: P914-01-00-00-00
SKU: IA01335-AP-MR_19319
AvailableYesPDF Download
$3,000.00
In stock
SKU
IA01335-AP-MR_19319
$3,000.00
DownloadLink
ENQUIRE NOW

Description

The study analyses the Australian Industrial Control Systems (ICS) security market for 2015.

Research Scope
• Market Trends
• Market Drivers and Restraints
• Solutions and Technologies
• Vertical Analysis
• Vendor Analysis

In the recent years, there have been notable targeted attacks on industrial control systems and systems of critical infrastructure by attacks/malwares with code names such as Stuxnet, Aurora, Flame, and Havex. These were discovered by various security vendors’ threat research and intelligence centres. The drive of Internet of Things (IoT) has driven several industries such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, thereby unknowingly exposing themselves and becoming more vulnerable to the threats.

Australia has come under several ICS attacks in recent times. Several security events recorded in recent years involving systems of national interest, including both critical infrastructure and government systems, indicate that Australia is increasingly the target of cyber attacks. As a result, Australian businesses are making strong investments towards ICS security. The uptake of ICS security has been driven by factors such as increased attacks on critical infrastructure globally, investments in cyber security insurance, and investments in IoT applications. As we move forward, industry-specific regulations and mandates around ICS security will further drive the uptake of ICS security solutions in Australia. However, factors such as air gap strategy, security skills shortage and technology sprawl, lack of mandates, and preference for availability over integrity will be the major barriers to the growth of this market.

The ICS security market is flooded with vendors from various backgrounds. The competitive landscape includes ICT vendors, industrial automation vendors, and security vendors with an industrial security offering. Additionally, the market will witness service providers offering managed security services through partnerships with various security vendors.

The base year of the study is 2015, with forecasts up to 2021.

Strategies, growth analysis, and competitive landscape are discussed for ICT security and industrial security vendors such as ABB, Check Point, Cisco, Fortinet, Honeywell, Kaspersky, McAfee, Palo Alto Networks, Rockwell Automation, Schneider Electric, Siemens, Symantec, Waterfall Security, Wurdltech, and Yokogawa.

Key Questions This Study Will Answer
• How is the existing threat landscape for Industrial Control Systems in Australia?
• Are the existing competitors structured correctly to meet customer needs?
• What are the trends in the Industrial Control Systems security market?
• Who are the major ICS security vendors in Australia?
• Are there unique features in the security technologies used for Industrial Control Systems?
• Is the ICS security solution market growing? How long will it continue to grow, and at what rate?

Table of Contents

Executive Summary

Market Engineering Measurements—ICS Security Market

Cyber Threats Targeting Australia

Scope and Coverage

Market Definitions

  • ICS Security Market

Methodology

  • Industrial Control Systems (ICS)
  • Operational Technology (OT)
  • Supervisory Control and Data Acquisition (SCADA)
  • Distributed Control Systems (DCS)
  • Human Machine Interface (HMI)
  • Programmable Logic Controllers (PLCs)
  • Remote Terminal Units (RTUs)
  • Intelligent Electronic Devices (IEDs)
  • Industrial Control Systems (ICS) Security

Why Converge IT and OT?

Plant Level Architecture and Threats

Security Solutions to Protect ICS

Digital Technologies—A Boon or a Bane?

ICS vs IT Systems—Characteristics and Differences

Vulnerabilities in ICS—Some Stats

ICS Attack Vectors

ICS Infiltration Techniques

Market Engineering Measurements

ICS Security Market—Revenue Forecast

Product Segments—An Overview

Power and Utilities Sector

Power and Utilities Sector—Cyber Security History

Oil and Gas Sector

Oil and Gas Sector—Cyber Security History

Mining Sector

Water and Wastewater Sector

Transport Sector

Recorded ICS Attacks/Glitches in Australia

Automation and ICT Vendor Partnership

ABB

Check Point

Cisco

Fortinet

Honeywell

Kaspersky

McAfee

Palo Alto Networks

Rockwell Automation

Schneider Electric

Siemens

Symantec

Waterfall Security

Wurldtech

Yokogawa

An Opportunity for Managed Security Service Providers

Strategies to Protect Industrial Control Systems

Why is Australia Falling Behind in Cyber Security?

The Last Word

Legal Disclaimer

List of Figures
  • 1. ICS Security Market: Threats Targeting Different Levels of Purdue Model, Australia, 2015
  • 2. ICS Security Market: ICS vs IT Systems—Characteristics and Differences, Australia, 2015
  • 3. ICS Security Market: Market Drivers, Australia, 2016–2021
  • 4. ICS Security Market: Market Restraints, Australia, 2016–2021
  • 5. ICS Security Market: IT and OT Priorities, Australia, 2015
  • 6. ICS Security Market: Market Engineering Measurements, Australia, 2015
  • 7. ICS Security Market: Adoption of ICS Security in Power and Utilities Sector, Australia, 2015–2021
  • 8. ICS Security Market: Power and Utilities Sector—Cyber Security History, Global, 2005–2012
  • 9. ICS Security Market: Adoption of ICS Security in Oil and Gas Sector, Australia, 2015–2021
  • 10. ICS Security Market: Oil and Gas Sector—Cyber Security History, Global, 2002–2012
  • 11. ICS Security Market: Adoption of ICS Security in Mining Sector, Australia, 2015–2021
  • 12. ICS Security Market: Adoption of ICS Security in Water and Wastewater Sector, Australia, 2015–2021
  • 13. ICS Security Market: Adoption of ICS Security in Transport Sector, Australia, 2015–2021
  • 14. ICS Security Market: Recorded ICS Attacks/Glitches, Australia, 2005–2011
  • 15. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016
  • 16. ICS Security Market: ICS Solution Offering, Global, 2015
  • 17. ICS Security Market: ICS Solution Offering, Global, 2015
  • 18. ICS Security Market: ICS Solution Offering, Global, 2015
  • 19. ICS Security Market: ICS Solution Offering, Global, 2015
  • 20. ICS Security Market: ICS Solution Offering, Global, 2015
  • 21. ICS Security Market: ICS Solution Offering, Global, 2015
  • 22. ICS Security Market: ICS Solution Offering, Global, 2015
  • 23. ICS Security Market: ICS Solution Offering, Global, 2015
  • 24. ICS Security Market: ICS Solution Offering, Global, 2015
  • 25. ICS Security Market: ICS Solution Offering, Global, 2015
  • 26. ICS Security Market: ICS Solution Offering, Global, 2015
  • 27. ICS Security Market: ICS Solution Offering, Global, 2015
  • 28. ICS Security Market: ICS Solution Offering, Global, 2015
  • 29. ICS Security Market: ICS Solution Offering, Global, 2015
  • 30. ICS Security Market: ICS Solution Offering, Global, 2015
  • 31. ICS Security Market: Top Priorities for Businesses, Australia, 2016
List of Charts
  • 1. ICS Security Market: Revenue Forecast: Australia, 2015–2021
  • 2. ICS Security Market: Market Engineering Measurements, Australia, 2015
  • 3. ICS Security Market: Incidents Responded to by ASD, Australia, 2011–2014
  • 4. ICS Security Market: Incidents Responded to by CERT Australia Affecting Systems of National Interest and Critical Infrastructure, Australia, 2014
  • 5. ICS Security Market: Top Attack Vectors, Australia, 2014
  • 6. ICS Security Market: Top Negative Impacts of a Security Breach, Australia, 2015
  • 7. ICS Security Market: Benefits of IT/OT Convergence, Australia, 2015
  • 8. ICS Security Market: Purdue Model for Control Hierarchy, Australia, 2015
  • 9. ICS Security Market: Top IT Priorities, Australia, 2015
  • 10. ICS Security Market: Key Business Requirements for IT, Australia, 2015
  • 11. ICS Security Market: Top IoT Adopters by Industry, Australia, 2015
  • 12. ICS Security Market: Top BYOD Challenge, Australia, 2015
  • 13. ICS Security Market: Top Cloud Challenge, Australia, 2015
  • 14. ICS Security Market: Top Enterprise Mobility Challenge, Australia, 2015
  • 15. ICS Security Market: Top 15 Countries by ICS Availability, Global, 2015
  • 16. ICS Security Market: ICS Vulnerabilities, Global, 2005–2015
  • 17. ICS Security Market: ICS Vulnerabilities by Risk Level, Global, 2015
  • 18. ICS Security Market: ICS Vulnerabilities by Plant Levels, Global, 2015
  • 19. ICS Security Market: ICS Issue—Intentional vs Unintentional, Global, 2015
  • 20. Top Serious Threats to Organisations, Australia, 2015
  • 21. Top Security Expenditure, Australia, 2015
  • 22. Information Security Projected Spend, Global, 2011–2015
  • 23. Top IoT Adoption Sectors, Australia, 2015
  • 24. Top ICS Adoption Sectors, Australia, 2015
  • 25. Top 5 Implications of Security Sprawl, Global, 2015
  • 26. ICS Security Market: Revenue Forecast, Australia, 2014–2021
  • 27. ICS Security Market: Product Segments Overview, Australia, 2015
  • 28. ICS Security Market: Energy Production by Type, Australia, 2015
  • 29. ICS Security Market: Energy Consumption by Vertical, Australia, 2015
  • 30. ICS Security Market: IoT Convergence, Australia, 2015
  • 31. Primary Source of Energy, Australia, 2015
  • 32. ICS Security Market: Exposed ICS Devices and Mining Locations, Australia, 2015
  • 33. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016
  • 34. ICS Security Market: Top Reasons for Outsourcing Services Requirement, Australia, 2015
The study analyses the Australian Industrial Control Systems (ICS) security market for 2015. Research Scope • Market Trends • Market Drivers and Restraints • Solutions and Technologies • Vertical Analysis • Vendor Analysis In the recent years, there have been notable targeted attacks on industrial control systems and systems of critical infrastructure by attacks/malwares with code names such as Stuxnet, Aurora, Flame, and Havex. These were discovered by various security vendors’ threat research and intelligence centres. The drive of Internet of Things (IoT) has driven several industries such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, thereby unknowingly exposing themselves and becoming more vulnerable to the threats. Australia has come under several ICS attacks in recent times. Several security events recorded in recent years involving systems of national interest, including both critical infrastructure and government systems, indicate that Australia is increasingly the target of cyber attacks. As a result, Australian businesses are making strong investments towards ICS security. The uptake of ICS security has been driven by factors such as increased attacks on critical infrastructure globally, investments in cyber security insurance, and investments in IoT applications. As we move forward, industry-specific regulations and mandates around ICS security will further drive the uptake of ICS security solutions in Australia. However, factors such as air gap strategy, security skills shortage and technology sprawl, lack of mandates, and preference for availability over integrity will be the major barriers to the growth of this market. The ICS security market is flooded with vendors from various backgrounds. The competitive landscape includes ICT vendors, industrial automation vendors, and security vendors with an industrial security offering. Additionally, the market will witness service providers
More Information
No Index No
Podcast No
Table of Contents | Executive Summary~ || Executive Summary~ || Market Engineering Measurements—ICS Security Market~ | Cyber Threats Targeting Australia~ || Cyber Threats Targeting Australia~ | Definitions and Methodology~ || Scope and Coverage~ ||| ICS Security Market~ |||| By Security Solutions~ ||||| Host-based/ Embedded Security ~ ||||| Endpoint Security~ ||||| Network Security~ ||||| Others~ |||| By Vertical~ ||||| Power Utilities ~ ||||| Water and Wastewater ~ ||||| Mining~ ||||| Oil and Gas~ ||||| Transport~ || Market Definitions~ ||| Industrial Control Systems (ICS)~ ||| Operational Technology (OT)~ ||| Supervisory Control and Data Acquisition (SCADA)~ ||| Distributed Control Systems (DCS)~ ||| Human Machine Interface (HMI)~ ||| Programmable Logic Controllers (PLCs)~ ||| Remote Terminal Units (RTUs)~ ||| Intelligent Electronic Devices (IEDs)~ ||| Industrial Control Systems (ICS) Security~ || Methodology~ | Why Converge IT and OT?~ || Why Converge IT and OT?~ | Plant Level Architecture and Threats~ || Plant Level Architecture and Threats~ ||| Industrial Zone~ ||| Demilitarised Zone~ ||| Enterprise Zone~ | Security Solutions to Protect ICS~ || Security Solutions to Protect ICS~ ||| Network Security—Firewalls and Secure Routers~ ||| Meeting Needs in Network Security for Operational Technology~ ||| Gateway Antivirus~ ||| Intrusion Detection, Prevention, Inspection, and Whitelisting of ICS Protocols~ ||| ICS Application Whitelisting and Controls~ ||| Network Address Translation (NAT)~ ||| Network Segmentation/Zoning~ ||| Network Security—Unidirectional Security Gateways (data diodes)~ ||| Endpoint Security~ ||| Signature-less Exploit Detection~ ||| Application Whitelisting (also applicable to embedded devices)~ ||| Removable Device Management~ ||| Host-based Security~ ||| Others (security analytics, vulnerability assessment, threat intelligence, etc.)~ | Digital Technologies—A Boon or a Bane?~ || Digital Technologies—A Boon or a Bane?~ | ICS—The New Turf for Cyber Criminals~ || ICS vs IT Systems—Characteristics and Differences~ || Vulnerabilities in ICS—Some Stats~ || ICS Attack Vectors~ ||| Phishing Emails (Social Engineering)~ ||| Watering Hole~ ||| Removable Media~ ||| Virtual Private Networks (VPN)~ ||| Weak Authentication~ ||| Wireless Networks and Wi-Fi Hotspots~ || ICS Infiltration Techniques~ ||| Buffer Overflow~ ||| Denial of Service (DOS)~ ||| SQL Injection~ ||| Protocol Vulnerability Exploitation~ ||| Privilege Escalation~ ||| Cross Site Scripting (known as XSS)~ ||| Directory Traversal~ ||| Man-In-the-Middle (MITM) Attacks~ | ICS Security Market Drivers~ || Market Drivers~ ||| Increasing Attacks on ICS Drive Demand for ICS Security Solutions~ ||| Cyber security insurance is driving investments towards ICS security~ ||| Investments shifting away from training and education towards security solutions ~ ||| Growing investments in IoT applications ~ | ICS Security Market Restraints~ || Market Restraints~ ||| Lack of mandates and understanding about ICS security~ ||| Technology sprawl and security skills shortage ~ ||| Air gap misconception~ ||| System availability preferred over integrity and confidentiality~ | ICS Security Market—Revenue Forecast and Trends~ || Market Engineering Measurements~ || ICS Security Market—Revenue Forecast~ || Product Segments—An Overview~ | Power and Utilities Sector~ || Power and Utilities Sector~ || Power and Utilities Sector—Cyber Security History~ | Oil and Gas Sector~ || Oil and Gas Sector~ ||| Plant Equipment Sabotage~ ||| Company Sabotage~ ||| Plant Destruction~ || Oil and Gas Sector—Cyber Security History~ | Mining Sector~ || Mining Sector~ | Water and Wastewater Sector~ || Water and Wastewater Sector~ | Transport Sector~ || Transport Sector~ || Recorded ICS Attacks/Glitches in Australia~ | Vendor Analysis~ || Automation and ICT Vendor Partnership~ || ABB~ || Check Point~ || Cisco~ || Fortinet~ || Honeywell~ || Kaspersky~ || McAfee~ || Palo Alto Networks~ || Rockwell Automation~ || Schneider Electric~ || Siemens~ || Symantec~ || Waterfall Security~ || Wurldtech~ || Yokogawa~ | An Opportunity for Managed Security Service Providers~ || An Opportunity for Managed Security Service Providers~ | Strategies to Protect Industrial Control Systems~ || Strategies to Protect Industrial Control Systems~ | Why is Australia Falling Behind in Cyber Security?~ || Why is Australia Falling Behind in Cyber Security?~ | The Last Word~ || The Last Word~ || Legal Disclaimer~ | The Frost & Sullivan Story~
List of Charts and Figures 1. ICS Security Market: Threats Targeting Different Levels of Purdue Model, Australia, 2015~ 2. ICS Security Market: ICS vs IT Systems—Characteristics and Differences, Australia, 2015~ 3. ICS Security Market: Market Drivers, Australia, 2016–2021~ 4. ICS Security Market: Market Restraints, Australia, 2016–2021~ 5. ICS Security Market: IT and OT Priorities, Australia, 2015~ 6. ICS Security Market: Market Engineering Measurements, Australia, 2015~ 7. ICS Security Market: Adoption of ICS Security in Power and Utilities Sector, Australia, 2015–2021~ 8. ICS Security Market: Power and Utilities Sector—Cyber Security History, Global, 2005–2012~ 9. ICS Security Market: Adoption of ICS Security in Oil and Gas Sector, Australia, 2015–2021~ 10. ICS Security Market: Oil and Gas Sector—Cyber Security History, Global, 2002–2012~ 11. ICS Security Market: Adoption of ICS Security in Mining Sector, Australia, 2015–2021~ 12. ICS Security Market: Adoption of ICS Security in Water and Wastewater Sector, Australia, 2015–2021~ 13. ICS Security Market: Adoption of ICS Security in Transport Sector, Australia, 2015–2021~ 14. ICS Security Market: Recorded ICS Attacks/Glitches, Australia, 2005–2011~ 15. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016~ 16. ICS Security Market: ICS Solution Offering, Global, 2015~ 17. ICS Security Market: ICS Solution Offering, Global, 2015~ 18. ICS Security Market: ICS Solution Offering, Global, 2015~ 19. ICS Security Market: ICS Solution Offering, Global, 2015~ 20. ICS Security Market: ICS Solution Offering, Global, 2015~ 21. ICS Security Market: ICS Solution Offering, Global, 2015~ 22. ICS Security Market: ICS Solution Offering, Global, 2015~ 23. ICS Security Market: ICS Solution Offering, Global, 2015~ 24. ICS Security Market: ICS Solution Offering, Global, 2015~ 25. ICS Security Market: ICS Solution Offering, Global, 2015~ 26. ICS Security Market: ICS Solution Offering, Global, 2015~ 27. ICS Security Market: ICS Solution Offering, Global, 2015~ 28. ICS Security Market: ICS Solution Offering, Global, 2015~ 29. ICS Security Market: ICS Solution Offering, Global, 2015~ 30. ICS Security Market: ICS Solution Offering, Global, 2015~ 31. ICS Security Market: Top Priorities for Businesses, Australia, 2016~| 1. ICS Security Market: Revenue Forecast: Australia, 2015–2021~ 2. ICS Security Market: Market Engineering Measurements, Australia, 2015~ 3. ICS Security Market: Incidents Responded to by ASD, Australia, 2011–2014~ 4. ICS Security Market: Incidents Responded to by CERT Australia Affecting Systems of National Interest and Critical Infrastructure, Australia, 2014~ 5. ICS Security Market: Top Attack Vectors, Australia, 2014~ 6. ICS Security Market: Top Negative Impacts of a Security Breach, Australia, 2015~ 7. ICS Security Market: Benefits of IT/OT Convergence, Australia, 2015~ 8. ICS Security Market: Purdue Model for Control Hierarchy, Australia, 2015~ 9. ICS Security Market: Top IT Priorities, Australia, 2015~ 10. ICS Security Market: Key Business Requirements for IT, Australia, 2015~ 11. ICS Security Market: Top IoT Adopters by Industry, Australia, 2015~ 12. ICS Security Market: Top BYOD Challenge, Australia, 2015~ 13. ICS Security Market: Top Cloud Challenge, Australia, 2015~ 14. ICS Security Market: Top Enterprise Mobility Challenge, Australia, 2015~ 15. ICS Security Market: Top 15 Countries by ICS Availability, Global, 2015~ 16. ICS Security Market: ICS Vulnerabilities, Global, 2005–2015~ 17. ICS Security Market: ICS Vulnerabilities by Risk Level, Global, 2015~ 18. ICS Security Market: ICS Vulnerabilities by Plant Levels, Global, 2015~ 19. ICS Security Market: ICS Issue—Intentional vs Unintentional, Global, 2015~ 20. Top Serious Threats to Organisations, Australia, 2015~ 21. Top Security Expenditure, Australia, 2015~ 22. Information Security Projected Spend, Global, 2011–2015~ 23. Top IoT Adoption Sectors, Australia, 2015~ 24. Top ICS Adoption Sectors, Australia, 2015~ 25. Top 5 Implications of Security Sprawl, Global, 2015~ 26. ICS Security Market: Revenue Forecast, Australia, 2014–2021~ 27. ICS Security Market: Product Segments Overview, Australia, 2015~ 28. ICS Security Market: Energy Production by Type, Australia, 2015~ 29. ICS Security Market: Energy Consumption by Vertical, Australia, 2015~ 30. ICS Security Market: IoT Convergence, Australia, 2015~ 31. Primary Source of Energy, Australia, 2015~ 32. ICS Security Market: Exposed ICS Devices and Mining Locations, Australia, 2015~ 33. ICS Security Market: Automation and ICT Vendor Partnership, Global, 2014–2016~ 34. ICS Security Market: Top Reasons for Outsourcing Services Requirement, Australia, 2015~
Author Sandeep Karuppuswamy
Industries Industrial Automation
WIP Number P914-01-00-00-00
Keyword 1 Australian ICS Security
Keyword 2 Industrial Control Systems security
Keyword 3 industrial control systems
Is Prebook No