GROWTH OPPORTUNITIES IN AI, DEEP LEARNING, AND EMBEDDED DEVICE SECURITY

GROWTH OPPORTUNITIES IN AI, DEEP LEARNING, AND EMBEDDED DEVICE SECURITY

RELEASE DATE
11-Sep-2020
REGION
Global
Research Code: D983-00-39-00-00
SKU: IT04165-GL-TA_24712

$950.00

Special Price $807.50 save 15 %

In stock
SKU
IT04165-GL-TA_24712

$950.00

$807.50 save 15 %

DownloadLink

Pay by invoice

ENQUIRE NOW

Description

This Cyber Security Technology Opportunity Engine (TOE) provides a snapshot on emerging cyber security solutions powered by innovations based on artificial intelligence, deep learning, and embedded device security that help companies protect from threats, data breaches, phishing attacks, and defend against modern attacks residing within cloud, endpoints, and various network layers.

Cyber Security TOE’s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. The TOE offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more.

Keywords: Machine learning, deep learning, artificial intelligence, IIoT, smart buildings, threat detection, Edge computing, privacy management, firmware security, application security, automated penetration testing, authorization control plane, risk management

Table of Contents

INNOVATIONS IN AI, DEEP LEARNING, AND EMBEDDED DEVICE SECURITY

  • TEMPERED NETWORKS, US
  • WATERFALL SECURITY SOLUTIONS LTD., ISRAEL
  • NELYSIS, ITALY
  • GROWTH OPPORTUNITIES: Deep learning
  • CALYPSO AI, US
  • EXTRAHOP, US
  • TAEKION, US
  • ONETRUST, UK
  • REFIRM LABS, US
  • GROWTH OPPORTUNITIES: Embedded devices
  • DERSECUR, ISRAEL
  • PCYSYS, ISRAEL
  • DARK CUBED, US
  • Cloudentity, US
  • CALYPSO AI, US
  • GROWTH OPPORTUNITIES: ARTIFICIAL INTELLIGENCE
  • QUORUM CYBER, UK
  • BLUEVOYANT, US
  • GROWTH OPPORTUNITIES: MACHINE LEARNING

Key Contacts

  • Key Contacts
  • Key Contacts (Continued)
  • Key Contacts (Continued)
  • Key Contacts (Continued)
This Cyber Security Technology Opportunity Engine (TOE) provides a snapshot on emerging cyber security solutions powered by innovations based on artificial intelligence, deep learning, and embedded device security that help companies protect from threats, data breaches, phishing attacks, and defend against modern attacks residing within cloud, endpoints, and various network layers. Cyber Security TOEs mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. The TOE offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. Keywords: Machine learning, deep learning, artificial intelligence, IIoT, smart buildings, threat detection, Edge computing, privacy management, firmware security, application security, automated penetration testing, authorization control plane, risk management
More Information
No Index No
Podcast No
Industries Information Technology
WIP Number D983-00-39-00-00
Is Prebook No