Cybersecurity Market Research Reports

Subscribe to RSS Feed
  1. 13 Dec 2023  |  Global  |  Frost Radar

    Frost Radar : External Risk Mitigation and Management, 2023

    A Benchmarking System to Spark Companies to Action - Innovation that Fuels New Deal Flow and Growth Pipelines

    Enterprise digitalization efforts have altered the modern threat landscape. IT is more complex, and third-party integration is more essential, complicating security and increasing attack surfaces. Traditional perimeter-based security measures no longer protect a cloud-extended workspace: threat actors now target digital assets beyond an organizatio...

  2. 27 Dec 2017  |  Global  |  Technology Research

    Technologies Impacting the Future of Cybersecurity

    The Changing Face of Enterprise Information Security

    The growing number of cyber attacks and cyber crimes has resulted in compromise of data important computing and resources, and network outages. With the implementation of information and communication technologies (ICT) in almost every sector, attacks have been increasing at an alarming rate. Penetration of the connected ecosystem is further increa...

  3. 22 Dec 2017  |  North America  |  Strategic Forecasting

    In the Cybersecurity Battleground, Location Matters (But Not Exclusively)

    Cybersecurity technologies strategically reside in three primary locations: --In devices – endpoints --Surrounding networks of endpoints and systems – perimeters --Between devices and users, and their destinations – gateways (or proxies) How the collection of locations improves cybersecurity efficacy (i.e., “better together”) is ultima...

  4. 09 Nov 2017  |  North America  |  Market Research

    Analysis of the US Government Cybersecurity Market, FY 2018

    Rapid Cybersecurity Technology Procurement Seeks to Keep Pace with Continually Changing Threats

    The government cybersecurity market is at a pivotal point where it must look towards more innovative technologies and capabilities in order to protect its vast data reserves, including citizen information, government plans and strategies, and intelligence and assessments vital to national security. Robust cybersecurity capabilities are no longer a ...

  5. 25 Oct 2017  |  North America  |  Market Research

    ICS Cybersecurity Market Watch—Key Market Needs and Solution Providers in the ICS Landscape, 2017

    Increasing Cybersecurity Threats Attract New Vendors and Drive Growth

    The increased proliferation of hyper connectivity exposes industrial control system (ICS) endpoints to new cybersecurity threats. According to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS attacks have increased substantially in the United States between 2010 and 2016 (ICS-CERT Year in Review 2016 report). While both ...

  6. 31 Jul 2017  |  Asia Pacific  |  Market Research

    Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016

    Risks from Cybersecurity are Significantly Higher and Call for Collaboration between Governments and Private Sector

    The study provides information on cybersecurity and the initiatives taken by governments and private organizations in Southeast Asia (SEA) and Australia & New Zealand (ANZ) to improve security in an industrial setting. It also considers the developments in the manufacturing space and technologies that will affect cybersecurity, besides focusing on ...

  7. 24 Jul 2017  |  Global  |  Technology Research

    Securing the Power Grid - Innovations in Energy Cybersecurity

    A Deep Dive Into The Cyber Security Technologies Being Developed For A Secure Power Grid

    With the addition of smart meters and AMI, the need to provide cybersecurity to the energy and power infrastructure has also increased significantly. The Energy infrastructure is slowly turning from a mere physical infrastructure to a cyber-physical one with the addition of smart devices those are connected by communication networks. These nodes pr...

  8. 10 Mar 2017  |  North America  |  Strategic Forecasting

    Detection-less Cybersecurity: Adding Certainty to Uncertain Cybersecurity

    Accepting the limitations of detection-based cybersecurity does not need to be status quo. There are alternative detection-less approaches that purge malicious code from the inbound web and email channels. One of the detection-less approaches is remote browser isolation (RBI), which we analyzed a few months ago. Another, which we introduce in this ...