Technologies Impacting the Future of Cybersecurity
Technologies Impacting the Future of Cybersecurity
The Changing Face of Enterprise Information Security
27-Dec-2017
Global
Description
The growing number of cyber attacks and cyber crimes has resulted in compromise of data important computing and resources, and network outages. With the implementation of information and communication technologies (ICT) in almost every sector, attacks have been increasing at an alarming rate. Penetration of the connected ecosystem is further increasing the loopholes and increasing the attack surfaces for cyber attackers. The need for efficient cyber security solutions is evident in every sector.
This research service identifies the key technology development areas within cyber security space and explores the benefits of such technology development. The report also highlights the key developers in the identified technology segments to give an overview of the technology advancements.
In brief, this research service provides the following:
A brief snapshot of the benefits of implementation of cyber security solutions
Key challenges faced by organizations with respect to cyber security
The key technology trends in cyber security space
Potential of the technologies to address the existing challenges in the cyber security space
Key participants under each of the enabling technology segments along with some use cases across industries
Table of Contents
1.1 Research Scope
1.2 Research Methodology
1.3 Key Findings
2.1 Overview of Cyber Security
2.2 Factors Driving Adoption: Cloud and Mobility
2.3 Factors Driving Adoption: IoT and Rising Cost
2.4 Factors Hindering Adoption: Multiple Device Usage and System Outages
2.5 Factors Hindering Adoption: Access Control
3.1 Four Key Themes for Cyber Security Advancements
3.2.1 Big Data Analytics is Addressing the Scalability Issue with Efficient Data Handling Capability
3.2.2 Companies at the Forefront of Big Data-based Cyber Security
3.2.3 Use Case: Big Data-based Cyber Security in Energy
3.2.4 Use Case: Big Data-based Cyber Security in Retail
3.3.1 Artificial Intelligence Facilitating Automation in Cyber Security
3.3.2 Companies at the Forefront of AI-based Security
3.3.3 Use Case: AI-based Cyber Security for Endpoint Protection
3.3.4 Use Case: AI-based Cyber Security for Enterprises
3.4.1 Biometrics Providing Multimodal Security Defense For Users
3.4.2 Companies at the Forefront of Biometrics Access Control
3.4.3 Use Case: Biometrics Access Control in Automotive
3.4.4 Use Case: Biometrics Access Control in Banking
3.5.1 Distributed Ledger Technology is Expected to Revolutionize Data Authentication
3.5.2 Companies at the Forefront of DLT-based Cyber Security
3.5.3 Use Case: DLT-based Cyber Security and Healthcare IoT
3.5.4 Use Case: DLT-based Cyber Security in Internet of Things
4.1 Deep Learning-based Endpoint Security Solution
4.2 Machine Learning-based User and Entity Behaviour Analytics
4.3 Behavior-based Threat Protection for Healthcare
4.4 AI and Heuristic Technique for Risk Assessment
4.5 Blockchain technology platform for Connected Health
5.1 Analyst Viewpoint
6.1 Key Contacts
6.1 Key Contacts (continued)
Legal Disclaimer
Related Research
Popular Topics
No Index | No |
---|---|
Podcast | No |
Author | Swapnadeep Nayak |
Industries | Information Technology |
WIP Number | D7D8-01-00-00-00 |
Is Prebook | No |
Ti Codes | D900,D901,D903,D905,D906,D907,D908,D90A,D90B,D90C,D90D,D90E,D910,D911,D912,D913,D915,D916,D91A,D91B,D91C,D920,D922,D923,D930,D931,D932,D934,D935,D941,D943,D944,D947-TI,D95B,D95D |