Cybersecurity

Subscribe to RSS Feed
  1. 22 Dec 2017  |  North America  |  Strategic Forecasting

    In the Cybersecurity Battleground, Location Matters (But Not Exclusively)

    Cybersecurity technologies strategically reside in three primary locations: --In devices – endpoints --Surrounding networks of endpoints and systems – perimeters --Between devices and users, and their destinations – gateways (or proxies) How the collection of locations improves cybersecurity efficacy (i.e., “better together”) is ultima...

    $3,000.00
  2. 09 Nov 2017  |  North America  |  Market Research

    Analysis of the US Government Cybersecurity Market, FY 2018

    Rapid Cybersecurity Technology Procurement Seeks to Keep Pace with Continually Changing Threats

    The government cybersecurity market is at a pivotal point where it must look towards more innovative technologies and capabilities in order to protect its vast data reserves, including citizen information, government plans and strategies, and intelligence and assessments vital to national security. Robust cybersecurity capabilities are no longer a ...

    $1,500.00
  3. 25 Oct 2017  |  North America  |  Market Research

    ICS Cybersecurity Market Watch—Key Market Needs and Solution Providers in the ICS Landscape, 2017

    Increasing Cybersecurity Threats Attract New Vendors and Drive Growth

    The increased proliferation of hyper connectivity exposes industrial control system (ICS) endpoints to new cybersecurity threats. According to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS attacks have increased substantially in the United States between 2010 and 2016 (ICS-CERT Year in Review 2016 report). While both ...

    $1,500.00
  4. 10 Mar 2017  |  North America  |  Strategic Forecasting

    Detection-less Cybersecurity: Adding Certainty to Uncertain Cybersecurity

    Accepting the limitations of detection-based cybersecurity does not need to be status quo. There are alternative detection-less approaches that purge malicious code from the inbound web and email channels. One of the detection-less approaches is remote browser isolation (RBI), which we analyzed a few months ago. Another, which we introduce in this ...

    $3,000.00
  5. 29 Jul 2016  |  North America  |  Strategic Forecasting

    Deception as a Security Discipline: Going on the Offensive in the Cybersecurity Battlefield

    Might there be a means to consistently produce high-fidelity alerts that are unmistakably associated with attackers and malicious insiders, which include a comprehensive catalog of the attacker’s system moments, and are triggered in real-time? That, in a nutshell, is the objective of deception, and the focus of this week’s insight. Also include...

    $3,000.00
  6. 25 Jul 2016  |  North America  |  Market Research

    US Hospital Cybersecurity Market—2015–2021

    Healthcare Gears Up to Combat the Growing Risk of Cyber Attacks

    The report describes and defines the market for various types of solutions (products and services) deployed by US hospitals to protect the security of enterprise information technology (IT) systems and the privacy and security of patient information; covers key factors driving the need to deploy these solutions in response to dynamic industry shift...

    $4,950.00
  7. 08 Jun 2016  |  North America  |  Market Research

    Changing Dynamics in Healthcare Cybersecurity

    Imperative for Protecting Patient Information Driving Need for New Solutions

    Cyberattacks related to criminal fraud and abuse as well as data breaches have increased significantly within the healthcare industry from the past few years due to the rapid expansion of electronic health records and electronic medical records. Healthcare organizations are now implementing security services aimed at finding the right balance betwe...

    $1,500.00
  8. 15 Feb 2016  |  North America  |  Market Research

    Automotive Cybersecurity Market—Key Trends, Solutions, OEM Activities, and Vendor Profiles

    Connected Car Imperatives Highlight Need for Holistic Security Approach, Starting with Vehicle Design

    Government and consumers are concerned about cyber security in cars, as researchers were able to hack into various OEM models in 2015. This research service identifies key areas that offer scope for technology innovation and discusses cybersecurity initiatives for the automotive industry. In 2015, cybersecurity, secure data transfers, and data priv...

    $4,950.00