Published 4Q Bob Lockhart Senior Analyst. Bob Gohn Research Director
|
|
- Barnard Short
- 8 years ago
- Views:
Transcription
1 EXECUTIVE SUMMARY: Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management NOTE: This document is a free excerpt of a larger report. If you are interested in purchasing the full report, please contact Pike Research at sales@pikeresearch.com. Published 4Q 2011 Bob Lockhart Senior Analyst Bob Gohn Research Director
2 Section 1 EXECUTIVE SUMMARY 1.1 Introduction How much can an industry change in one year? In the case of smart grid cyber security, the answer is quite a lot. This report began as an update to Pike Research s 2010 report, Smart Grid Cyber Security, but ended up as a complete rewrite. That much change has occurred. One year ago, Stuxnet had only recently been discovered. A year s worth of analysis still has not unlocked all its secrets, but it has had a profound influence on the smart grid cyber security market. Utilities have as many predicted a year ago realized that their grids are no longer isolated or protected from attackers. Adding more intelligence to grid assets will increase the attack surface and utilities are now aware of this. The hype around smart grid cyber security, especially smart meter security, has died down from a year ago. Pike Research believes that this is because many of the projects and products announced in the past are now being implemented. New products and new deals generate press, but the actual deployments tend to be ignored. Our research indicates that a lot of people are working really hard to deploy products. Some things have not changed. The cultural chasm between IT and operations technology (OT) remains at many utilities, although Pike Research is hearing more optimistic stories about reconciliation, or at least peaceful coexistence, between IT and OT. As a whole, both groups appear to have realized that they have cyber security problems, and that neither can live without the other. Cyber security remains a check-in-the-box exercise for many, with spending limited to whatever is needed to survive compliance audits. As some technologies near a decade of thought and deployment, such as smart metering, the approach to cyber security has become more thoughtful. However, newer technologies, such as control system automation, still focus more on just getting it to work, with cyber security as an afterthought; or a never-thought. 1.2 Market Landscape Market drivers have appeared or gained importance during the past year. European smart metering deployments that were in early stages a year ago are into the deployment phase, even if targeted completion dates stretch beyond The North American Electric Reliability Corporation (NERC) has begun issuing fines for non-compliance with its critical infrastructure protection (CIP) reliability standards. Utilities believe that they will see greater benefits from distribution automation (DA) than from advanced metering infrastructure (AMI) and Pike Research forecasts greater spending in that area. The market for home energy management (HEM) and home area networks (HANs) appears to be in disarray as this report is published. Microsoft, Google, and Cisco have all made well publicized exits from the HEM market, leaving some to doubt its viability. Pike Research does not doubt that market s viability, despite the fact that many problems have not yet been conclusively resolved. HAN standards that were thought to be settled a year ago are now in doubt. The continuing recession inhibits consumers from purchasing newer 1
3 HAN-enabled appliances in numbers that would support a HEM market. This report forecasts that 63% of smart grid cyber security investment for 2011 through 2018 will be primarily in control system segments including: transmission upgrades, substation automation, and DA. By comparison, many cyber security vendors still focus on IT security functions, such as AMI security. 1.3 What Has Changed in a Year Cyber security vendors report that now they are spending a lot more time speaking with utility operations groups, no longer meeting only with security managers or CIOs. Vendors tell us that utility operations teams have increased their cyber security savvy over the past months and are now open to discussions about protection products, sometimes demanding those discussions. Utilities are asking better questions about cyber security, although some education is still needed when a security vendor first calls on a utility. Nearly all security and technology vendors have told us that they will add more security to their products when the utilities start asking for it, which appears to have begun during the past 12 months. Hackers appear to have moved on to other industries: not nearly as many stories are heard about smart meter vulnerabilities. Pike Research does not view this as a positive development. One speaker at a recent conference said, Do not fear hackers. Fear engineers who hack. That is how nation-states attack, and the relative quiet in the press may be the calm before the storm. Stuxnet was in the wild and doing its thing for over a year before anyone noticed. We have also detected some signals that early adopters of technologies especially AMI may now be concerned that they did not include sufficient cyber security in their deployments. We believe this is because the state of cyber security capabilities has advanced, as has the awareness of cyber security issues. Opportunity may arise for cyber security retrofits into large AMIs, although we have not seen any yet. Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even with strong countermeasures in place, they are not consistently deployed. More sophisticated attackers look at smart grids from a systemic perspective, while often the defenses have been installed in piecemeal fashion, without an architecture in place. This hands an enormous advantage to the attackers. 2
4 1.4 Key Technologies for Smart Grid Cyber Security This report assesses the threats and vulnerabilities that confront smart grid technologies, arriving at a list of most likely cyber security investments. This list is not in priority order, but roughly in the sequence of activities from the beginning to the end of a cyber security program: Identify and access management Multi-factor authentication Defense-in-depth security Role-based access control (RBAC) Perimeter security devices, such as firewalls and intrusion detection or prevention Redundant or backup communications routing, using different physical layers Application whitelisting Restricted use of removable media Embedded device security Antivirus software One-way data communication technologies Ruggedized devices Security overlays on legacy systems, sometimes called bump-in-the-wire Device-to-device authentication Network and device resiliency Change management Software patch management, especially for control networks Security event logging and correlation Situational awareness Compliance assurance Security incident response Cyber forensics Business continuity planning (BCP) 3
5 1.5 Market Forecast Pike Research forecasts that cumulative smart grid cyber security revenues from 2011 to 2018 will reach $14 billion. Chart 1.1 shows the annual revenue forecast, segmented by geographic region. The forecasts yield an 8-year compound annual growth rate (CAGR) of 9.6%. Further charts within the report show the same total revenue distributed by the five smart grid segments: transmission updates, substation automation, DA, electric vehicle (EV) infrastructures, and smart metering. The report also includes charts of revenue by each of these segments for each region, and an allocation of smart grid cyber security revenue by IT versus industrial control system (ICS) functions. Chart 1.1 Smart Grid Cyber Security Revenue by Region, World Markets: $2,500 $2,000 ($ Millions) $1,500 $1,000 Middle East & Africa China Western Europe North America Asia Pacific except China Eastern Europe Latin America $500 $ (Source: Pike Research) The forecast shows a plateau beginning in 2015, with a slight decrease toward the end of the forecast period. The plateau is a result of increasing infrastructure expenses especially in large developing economies offset by the commoditization of cyber security products that today are considered new technologies. The unavoidable observation from Chart 1.1 is that China will drive a large proportion of smart grid security spending. Within the report, it becomes apparent that a significant portion of the spending in China will be related to transmission grids. While it is our responsibility to forecast a global market, we are unsure whether or not the Chinese market will be addressable by foreign companies. Regardless, with that much revenue at stake, we cannot think of a good reason to avoid the market. Finally, as it is possible to compare like-for-like numbers with this report s predecessor from one year ago, those numbers have increased this time around. This is partially due to more granular forecasts but even without that detail, most of the increase has come on the industrial control side, driven by the combination of Stuxnet and better cyber security awareness among operations teams. 4
6 Section 8 TABLE OF CONTENTS Section Executive Summary Introduction Market Landscape What Has Changed in a Year Key Technologies for Smart Grid Cyber Security Market Forecast... 4 Section Market Issues Introduction Smart Grid Market Segments Smart Grid Security Overview Transmission Upgrades Description Market Drivers Overview of Security Issues Substation Automation Description Market Drivers Overview of Security Issues Distribution Automation Description Market Drivers Overview of Security Issues Advanced Metering Infrastructure Description Market Drivers Overview of Security Issues Electric Vehicle Management Systems Description Market Drivers Overview of Security Issues Approach to Assessing Smart Grid Cyber Security Risks Important Government and Regulatory Standards IT Security: ISO27002: ISO 27002:2005 Control Categories ICS Security: NIST Smart Grid Security: NERC CIP Standards Defense-in-Depth: U.S. CSSP Recommended Practices Data Privacy: NISTIR 7628 Volume Lemnos German Smart Metering Protection Profile Section Technology Issues Introduction SCADA and Industrial Control Risks Introduction
7 3.2.2 Control Centers Human-Machine Interfaces Telecommunications Device Controllers Other Transmission, Distribution, and Substation Risks Introduction Communications and Operations Risk Access Control Asset Risks Physical and Environment Advanced Metering Infrastructure Risks Privacy and Data Protection Risks Communications and Operations Risks Access Control Risks Asset Risks Physical and Environment Risks Electric Vehicle Charging Systems Risks Privacy and Data Protection Communications and Operations Access Control Asset Risks Physical and Environment Human Resources Risks Security Awareness Program Social Engineering Attacks Employee Separations Third-Party/Subcontractor Risks Governance and Regulatory Compliance Issues Security Organizational Issues for Smart Meters Security Assessment and Policies Change Management Third-Party Service Provider Risks AMI Governance and Regulatory Compliance Issues EV Governance and Regulatory Compliance Issues Intellectual Property Risks Security Incident Response Readiness Issues Reputation Risk Investigations and Cyber Forensics Third-Party Managed Services Business Continuity Smart Grid Security Recap of Key Opportunities Top Threats that Are Insufficiently Mitigated Section Key Industry Players Introduction AlertEnterprise AlienVault Atos S.A Byres Security Inc. (Tofino) Cisco CoreTrace Computer Sciences Corporation
8 4.9 Digital Bond Inc Echelon Corporation Elster Group Energy Sector Security Consortium Inc EnerNex GE Energy Green Hills Software IBM Industrial Defender Inc InfoLawGroup LLP Infrax Systems Innominate Security Technologies AG Itron Inc Landis+Gyr McAfee Inc Mocana Corporation N-Dimension Solutions NitroSecurity Inc OSIsoft Revere Security RSA, the Security Division of EMC Corporation SAIC Schweitzer Engineering Labs Inc Sensus Sophos Ltd Sourcefire Inc Symantec Corporation Trilliant Incorporated Ventyx Verizon Waterfall Security Solutions Ltd Wurldtech Security Technologies Inc Section Market Forecasts Introduction Most Promising Smart Grid Risks to Address Market Forecast Methodology Total Smart Grid Security Market by Region Annual Revenue by Region Cumulative Revenue by Region Year-on-Year Market Change, Percentage Total Smart Grid Security Market by Segment Annual Revenue by Region Cumulative Revenue by Region Year-on-Year Market Change, Percentage Total Smart Grid Security Market by ICS or IT Annual Revenue by ICS or IT Cumulative Revenue by Segment Year-on-Year Market Change, Percentage Market Forecasts: North America North America Forecast by Segment The United States versus Canada Market Forecasts: Latin America
9 5.8 Market Forecasts: Western Europe Market Forecasts: Eastern Europe Market Forecasts: China Market Forecasts: Asia Pacific except China Market Forecasts: the Middle East & Africa Summary of Professional Services Opportunities Section Company Directory Section Acronym and Abbreviation List Section Table of Contents Section Table of Charts and Figures Section Scope of Study Sources and Methodology Notes
10 Section 9 TABLE OF CHARTS AND FIGURES Chart 1.1 Smart Grid Cyber Security Revenue by Region, World Markets: Chart 5.1 Smart Grid Cyber Security Revenue by Region, World Markets: Chart 5.2 Cumulative Smart Grid Cyber Security Revenue by Region, World Markets: Chart 5.3 Smart Grid Cyber Security Revenue Change by Region, World Markets: Chart 5.4 Smart Grid Cyber Security Revenue by Segment, World Markets: Chart 5.5 Cumulative Smart Grid Cyber Security Revenue by Segment, World Markets: Chart 5.6 Smart Grid Cyber Security Revenue Growth by Segment, World Markets: Chart 5.7 Smart Grid Cyber Security Revenue by IT and ICS, World Markets: Chart 5.8 Cumulative Smart Grid Cyber Security Revenue by IT or ICS, World Markets: Chart 5.9 Smart Grid Cyber Security Revenue Growth by IT or ICS, World Markets: Chart 5.10 Smart Grid Cyber Security Revenue by Segment, North America: Chart 5.11 Smart Grid Cyber Security Revenue, United States and Canada: Chart 5.12 Smart Grid Cyber Security Revenue by Segment, Latin America: Chart 5.13 Smart Grid Cyber Security Revenue by Segment, Western Europe: Chart 5.14 Smart Grid Cyber Security Revenue by Segment, Eastern Europe: Chart 5.15 Smart Grid Cyber Security Revenue by Segment, China: Chart 5.16 Smart Grid Cyber Security Revenue by Segment, Asia Pacific except China: Chart 5.17 Smart Grid Cyber Security Revenue by Segment, the Middle East & Africa: Figure 3.1 SCADA System General Layout Table 2.1 Comparison of IT and ICS Security Requirements Table 5.1 Allocation of Revenue to ICS or IT by Segment
11 Section 10 SCOPE OF STUDY This report surveys cyber security issues for smart grids to determine which security issues present the most viable opportunities for smart grid cyber security vendors. Pike Research interviewed a wide variety of stakeholders, including utilities, security vendors, systems integrators, component manufacturers, and well-known subject matter experts. We diligently compared the current state of the smart grid industry to appropriate baselines for the topic, including: ISO 27002:2005, NIST , U.S. DHS CSSP Defensein-Depth, NISTIR 7628 Volume 2 for Data Privacy, and NERC CIP standards. While it is true that these are all U.S. standards, it remains challenging to find standards from anywhere else in the world. However, as noted in the report, the German government has produced a Protection Profile for smart metering data, with hopes that it will be adopted throughout Europe. Regardless, the number and variety of research inputs, combined with these security standards, yields a sturdier set of conclusions and filters out any personal agendas that may have been inserted into the research inputs. Pike Research segments the smart grid into five application areas: transmission upgrades, substation automation, distribution automation, smart metering, and EV management. Typically, the first three have large ICS components, while the final two have large IT components. That is reflected in our comments throughout the report and in the assumptions used in generating our forecasts. This report draws heavily on other Pike Research reports and forecasts concerning smart grid technology, AMI, DA, substation automation, and EV markets. Smart grid cyber security exists only because those other markets generate products and services that must be secured. Cyber security is an extremely broad market with hundreds of established providers and countless startups. To examine every possible security provider in the smart meter market would have produced a report of incredible length. Therefore, Pike Research surveyed a representative population of stakeholders to obtain as complete as possible a picture of smart meter security, while limiting the report to a usable size. To do this, we selected only a few stakeholders from each area of the control network environment. Secondary research, mainly Internet searching and conference attendance, is used mainly as triangulation to validate conclusions from primary research, although it does, from time to time, yield valuable insights. Note that the inclusion of any company in this report does not constitute an endorsement by Pike Research. Likewise, the omission of any company from this report should not imply that Pike Research perceives any weakness in that company s products or services. We simply had to select a representative population and work with the data from those interviews and other research. 95
12 SOURCES AND METHODOLOGY Pike Research s industry analysts utilize a variety of research sources in preparing Research Reports. The key component of Pike Research s analysis is primary research gained from phone and in-person interviews with industry leaders including executives, engineers, and marketing professionals. Analysts are diligent in ensuring that they speak with representatives from every part of the value chain, including but not limited to technology companies, utilities and other service providers, industry associations, government agencies, and the investment community. Additional analysis includes secondary research conducted by Pike Research s analysts and the firm s staff of research assistants. Where applicable, all secondary research sources are appropriately cited within this report. These primary and secondary research sources, combined with the analyst s industry expertise, are synthesized into the qualitative and quantitative analysis presented in Pike Research s reports. Great care is taken in making sure that all analysis is well-supported by facts, but where the facts are unknown and assumptions must be made, analysts document their assumptions and are prepared to explain their methodology, both within the body of a report and in direct conversations with clients. Pike Research is an independent market research firm whose goal is to present an objective, unbiased view of market opportunities within its coverage areas. The firm is not beholden to any special interests and is thus able to offer clear, actionable advice to help clients succeed in the industry, unfettered by technology hype, political agendas, or emotional factors that are inherent in cleantech markets. NOTES CAGR refers to compound average annual growth rate, using the formula: CAGR = (End Year Value Start Year Value) (1/steps) 1. CAGRs presented in the tables are for the entire timeframe in the title. Where data for fewer years are given, the CAGR is for the range presented. Where relevant, CAGRs for shorter timeframes may be given as well. Figures are based on the best estimates available at the time of calculation. Annual revenues, shipments, and sales are based on end-of-year figures unless otherwise noted. All values are expressed in year 2011 U.S. dollars unless otherwise noted. Percentages may not add up to 100 due to rounding. 96
13 Published 4Q Pike Research LLC 1320 Pearl Street, Suite 300 Boulder, CO USA Tel: This publication is provided by Pike Research LLC ( Pike ). This publication may be used only as expressly permitted by license from Pike and may not otherwise be reproduced, recorded, photocopied, distributed, displayed, modified, extracted, accessed or used without the express written permission of Pike. Notwithstanding the foregoing, Pike makes no claim to any Government data and other data obtained from public sources found in this publication (whether or not the owners of such data are noted in this publication). If you do not have a license from Pike covering this publication, please refrain from accessing or using this publication. Please contact Pike to obtain a license to this publication. 97
How To Protect A Smart Grid From Cyber Security Threats
Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management
More informationRESEARCH REPORT. Executive Summary: Meter Data Management
RESEARCH REPORT Executive Summary: Meter Data Management MDM as a Managed Service, Utility In-house MDM, Smart Grid Data Analytics, Big Data, Smart Metering System of Record, Grid Operations, Financial
More informationExecutive Summary: Electric Utility Billing and Customer Information Systems
RESEARCH REPORT Executive Summary: Electric Utility Billing and Customer Information Systems Billing and CIS Software and Services for Regulated and Deregulated Utilities: Global Market Analysis and Forecasts
More informationExecutive Summary: Distributed Solar Energy Generation
RESEARCH REPORT Executive Summary: Distributed Solar Energy Generation Market Drivers and Barriers, Technology Trends, and Global Market Forecasts NOTE: This document is a free excerpt of a larger report.
More informationExecutive Summary: Smart Building Managed Services
RESEARCH REPORT Executive Summary: Smart Building Managed Services Software as a Service plus Energy Management/NOC Services and On-Site Installation & Maintenance Services for Commercial Buildings: Global
More informationHow To Improve Smart Grid Cyber Security
Seven Key Smart Grid Security Trends to Watch in 2012 and Beyond Published 4Q 2011 Bob Lockhart Senior Analyst Bob Gohn Research Director Section 1 EXECUTIVE SUMMARY 1.1 Seven Trends to Watch in Utility
More informationRESEARCH REPORT. Executive Summary: Energy Storage Tracker 3Q14
RESEARCH REPORT Executive Summary: Energy Storage Tracker 3Q14 Global Energy Storage Installations: Market Share Data, Industry Trends, Market Analysis, and Project Tracking by World Region, Technology,
More informationExecutive Summary: Electric Vehicle Market Forecasts
RESEARCH REPORT Executive Summary: Electric Vehicle Market Forecasts Global Forecasts for Light Duty Hybrid, Plug-in Hybrid, and Battery Electric Vehicles: 2013-2020 NOTE: This document is a free excerpt
More informationExecutive Summary: Navigant Research Leaderboard Report: Smart City Suppliers
RESEARCH REPORT Executive Summary: Navigant Research Leaderboard Report: Assessment of Strategy and Execution for 16 NOTE: This document is a free excerpt of a larger report. If you are interested in purchasing
More informationExecutive Summary: Navigant Research Leaderboard Report: Smart City Suppliers
RESEARCH REPORT RESEARCH REPORT Executive Summary: Navigant Research Leaderboard Report: Assessment of Strategy and Execution for 15 NOTE: This document is a free excerpt of a larger report. If you are
More informationRisk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
More informationEXECUTIVE SUMMARY: Utility Geographic Information Systems GIS Tools and Workflow Applications for AEC and Operations: Market Analysis and Forecasts
EXECUTIVE SUMMARY: Utility Geographic GIS Tools and Workflow Applications for AEC and Operations: Market Analysis and Forecasts NOTE: This document is a free excerpt of a larger report. If you are interested
More informationNext-Generation Building Energy Management Systems
WHITE PAPER Next-Generation Building Energy Management Systems New Opportunities and Experiences Enabled by Intelligent Equipment Published 2Q 2015 Sponsored By Daikin Applied and Intel Casey Talon Senior
More informationRESEARCH REPORT. Executive Summary: Smart Gas Meters
RESEARCH REPORT Executive Summary: Smart Gas Meters Advanced Metering Infrastructure and Automatic Meter Reading Deployments for Gas Utilities: Global Market Analysis and Forecasts NOTE: This document
More informationPublished 4Q 2011. Thomas J. Machinchick Industry Analyst. Clint Wheelock President
EXECUTIVE SUMMARY: Energy Management Systems Market Forces, Competitive Landscape, and Market Forecasts for Industrial Energy Management Software and Services in the United States NOTE: This document is
More informationPublished 2Q 2012. Eric Woods Research Director. Clint Wheelock President
EXECUTIVE SUMMARY: Green Data Centers IT Equipment, Power and Cooling Infrastructure, and Monitoring and Management Tools: Global Industry Drivers, Market Analysis, and Forecasts NOTE: This document is
More informationPublished 4Q10. Marianne Hedin, Ph.D. Industry Analyst. Clint Wheelock President. Carbon Management Software and Services
Carbon Management Software and Services EXECUTIVE SUMMARY: Smart Grid Data Analytics Business Intelligence, Situational Awareness, and Predictive Analytics for Utility Customer Information and Grid Operations:
More informationMaterials Footprint Reduction of Televisions and Computer Monitors: 2004-2010
Materials Footprint Reduction of Televisions and Computer Monitors: 2004-2010 July 2011 Bob Boggio Industry Analyst Clint Wheelock President Section 1 EXECUTIVE SUMMARY 1.1 Trends in the TV and Monitor
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Wireless Network Security Market by Solutions (Firewall, IPS/IDS, Encryption, I&AM, UTM), Services (Security Operations, Consulting, Managed Security Services) - Worldwide Market Forecasts and Analysis
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationCyber Security in Smart Grid - Market Size, Key Issues, Regulations and Outlook to 2020
Brochure More information from http://www.researchandmarkets.com/reports/2258972/ Cyber Security in Smart Grid - Market Size, Key Issues, Regulations and Outlook to 2020 Description: Cyber Security in
More informationfuture data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
More informationCyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationWorldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationAfrica Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
More informationFrost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informationCyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationAnalysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable
Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable April 2015 1 List of Exhibits Chart Slide Number Executive Summary
More information1. Economic factors: Positive global market for IDS/IPS security solutions and services.
Brochure More information from http://www.researchandmarkets.com/reports/2831830/ Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based, Network Based, Wireless, On-premise
More informationBrochure More information from http://www.researchandmarkets.com/reports/3412874/
Brochure More information from http://www.researchandmarkets.com/reports/3412874/ Data Loss Prevention Market by Solution Type (Network DLP, Storage DLP, Endpoint DLP), by Deployment Type (On-Premise,
More informationBrochure More information from http://www.researchandmarkets.com/reports/3301109/
Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),
More informationICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection
Critical Infrastructure Protection Technical White Paper ICS CYBER SECURITY Protecting Industrial Control Systems: An Integrated Approach The purpose of this white paper is to present a novel cyber security
More informationGlobal Smart Grid Data Analytics Market 2015-2019
Global Smart Grid Data Analytics Market 2015-2019 Global Smart Grid Data Analytics Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports
More informationPublished 2Q 2012. Lisa Jerram Senior Analyst. John Gartner Research Director
EXECUTIVE SUMMARY: Total Cost of Ownership of Alternative Fuel Vehicles for Fleet Operators TCO Comparison of Alternative Fuel Light-Duty and Medium-Duty Vehicles in Fleet Operations NOTE: This document
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Industrial Control System (ICS) Security Market by Technology (DDOS, IDS/IPS, Firewall, SIEM, SCADA Encryption, UTM, Application, Whitelisting, DLP, Database Activity Monitoring), by Services, and by Verticals
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationN-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
More informationRisk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin
Risk & Innovation in Cybersecurity Investments Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report Part 1. Introduction
More informationCyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.
Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationIndustrial Control System (ICS) Security Market by Technology, by Services, and by Verticals - Global Forecast to 2019
Brochure More information from http://www.researchandmarkets.com/reports/2693630/ Industrial Control System (ICS) Security Market by Technology, by Services, and by Verticals - Global Forecast to 2019
More informationSession 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
More informationThe Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
More informationTRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationBy John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
More informationHealthcare CLOUD-BASED TECHNOLOGY MARKET IN HEALTHCARE APPLICATIONS
Healthcare CLOUD-BASED TECHNOLOGY MARKET IN HEALTHCARE APPLICATIONS The cloud market that reached about 130 billion at the end of 2013, is promising significant platform for data storage and application
More informationDATA CENTER NETWORKING MARKET
DATA CENTER NETWORKING MARKET Ethernet Switches; SAN; Routers; ADC; Network Security Equipment; WAN Optimization Appliances Global Advancements, Worldwide Forecasts and Analysis (2013-2018) MarketsandMarkets
More informationRESEARCH REPORT. BRUCE DALEY Principal Analyst. CLINT WHEELOCK Managing Director
RESEARCH REPORT NOTE: This document is a free excerpt of a larger research report. If you are interested in purchasing the full report, please contact Tractica at sales@tractica.com. EXECUTIVE SUMMARY
More informationGlobal Smart Energy Meter Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/2617707/ Global Smart Energy Meter Market 2015-2019 Description: About Smart Energy Meters Smart energy meters are the next-generation
More informationGE Measurement & Control. Cyber Security for Industrial Controls
GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account
More informationThe Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
More informationEFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013
EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:
More informationCyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
More informationBest Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
More informationSIEM and Log Management Global Market Analysis
Brochure More information from http://www.researchandmarkets.com/reports/3162736/ SIEM and Log Management Global Market Analysis Description: Security information event management (SIEM) and log management
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationBrochure More information from http://www.researchandmarkets.com/reports/3493712/
Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint
More informationHow To Integrate Security Into Your Application Development
Six Best Practices of IT Security 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 2 Table of Contents 1. Make a Self-Assessment...3 2. Believe the Application Security Hype...3 3. Ask Tough
More information"Increasing demand for intelligent cities and IoT devices is expected to drive the Internet of Things (IoT) in smart cities market"
Brochure More information from http://www.researchandmarkets.com/reports/3618647/ Internet of Things (IoT) in Smart Cities Market by Solutions (Remote Monitoring, Data Management) Platform (Application
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationInformation Bulletin
Public Policy Division Impact of NIST Guidelines for Cybersecurity Prepared by UTC Staff 1. Introduction... 3 2. Cybersecurity Landscape... 3 3. One Likely Scenario... 5 4. Draft NISTIR 7628, Guidelines
More informationHow Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
More informationIndustrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
More informationSmart Meters Executive Paper
Smart Meters Executive Paper Smart infrastructure overview The ever growing global demand for energy, combined with increasing scarcity of resources and the threat of climate change, have prompted governments
More informationSource Code Protection: Evaluating Source Code Security
Source Code Protection: Evaluating Source Code Security Stephanie Woiciechowski, GSEC Principal Software Engineer Product Security Office EMC Corporation 1 Goals Understand application of basic security
More informationMaturation of a Cyber Security Incident Prevention and Compliance Program
Maturation of a Cyber Security Incident Prevention and Compliance Program Utilities & Energy Compliance & Ethics Conference February 25, 2013 Houston, Texas Anna Wang Principal Consultant Imminent Cyber
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationUpdate On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
More informationIntroduction (Contd )
Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationPublished 1Q 2010. Marianne Hedin, Ph.D. Industry Analyst. Clint Wheelock Managing Director
EXECUTIVE SUMMARY: Carbon Management Business Drivers, Policy Issues, Enterprise Adoption Patterns, Competitive Landscape, and Market Forecasts Published 1Q 2010 NOTE: This document is a free excerpt of
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationBest Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
More informationWhat Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com ICSs What are they
More informationCOMPANY PROFILE- INDUSTRIAL DEFENDER
COMPANY PROFILE- INDUSTRIAL DEFENDER MarketsandMarkets sales@marketsandmarkets.com www.marketsandmarkets.com MarketsandMarkets is a global market research and consulting company based in the U.S. We publish
More informationVulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
More informationGE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
More informationThe higher education user type market is expected to be the highest revenue generating component.
Telecom and IT 2014 CLOUD COMPUTING IN EDUCATION MARKET By Service Model (SaaS, PaaS, IaaS), by Deployment Model (Private Cloud, Public Cloud, Hybrid Cloud, and Community Cloud), By User Type (K-12, Higher
More informationGE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
More informationGlobal Endpoint Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that
More informationBrochure More information from http://www.researchandmarkets.com/reports/3384906/
Brochure More information from http://www.researchandmarkets.com/reports/3384906/ Cloud Storage Market by Solutions (Primary Storage Solution, Backup Storage Solution, Cloud Storage Gateway Solution, and
More informationPublished 4Q 2011. Dexter Gauntlett Industry Analyst. Peter Asmus Senior Analyst
EXECUTIVE SUMMARY: Distributed Solar Energy Generation Demand Drivers and Barriers, Technology Issues, Competitive Landscape, and Global Market Forecasts NOTE: This document is a free excerpt of a larger
More informationModule 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
More informationUtility Modernization Cyber Security City of Glendale, California
Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased
More informationWHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
More informationFive keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
More informationSCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
More information