Cybersecurity in Utilities – Thematic Research
Powered by
All the vital news, analysis, and commentary curated by our industry experts.
Cybersecurity has been a concern for utilities for decades, due to their roles as operators of critical infrastructure and providers of essential services. However, concern over cybersecurity continues to climb up utilities’ agendas, driven by the increasingly interconnected nature of their infrastructure and systems, and the growing number of attacks targeting utilities.
Utilities need to transition to a more connected and smart energy system. They are also adopting IoT technologies that potentially open up utilities’ systems and infrastructure to the outside world. These include smart meters, sensors, and other grid monitoring devices. While this transition is necessary to make utilities more efficient and enable the uptake of new technologies like electric vehicles and solar and wind, it also creates many more targets for malicious actors to target. It also means that utilities will increasingly need to open up some of their core systems that were historically protected by being isolated from the outside world, also creating new potential risks.
Scope
This report analyses cybersecurity in the utilities sector.
-It discusses how the sector is subject to stricter regulation in terms of cyber- and physical security, and is looking to invest in integrated solutions.
-It identifies key winners and losers in high-growth cyber technology cycles such as network security appliances, cloud security, and artificial intelligence over the next two years.
Reasons to Buy
The report highlights some of the big players in the cybersecurity industry and where do they sit in the value chain.
-It highlights the main trends in the cybersecurity industry over the next 12 to 24 months.
-It provides an industry analysis, explaining the degree of cyber risks and motives, and its serious implications on businesses.
-The report discusses the impact of cybersecurity on utilities and the unique challenges it faces.
-It also identifies technologies will drive growth in the cybersecurity industry over the next two years.
-It offers a technology briefing, explaining the importance of a cybersecurity framework to establish standards, guidelines, and practices to protect critical infrastructure.
Airbus
Akamai
BAE Systems
Barracuda Networks
Check Point Software Technologies
Cheetah Mobile
Cisco
CyberArk Software
F5 Networks
FireEye
Fortinet
F-secure
Gemalto
Gigamon
IBM
Imperva
Intel
Juniper Networks
KEYW
LifeLock
Micro Focus
Microsoft
MobileIron
NetScout Systems
Palo Alto Networks
ProofPoint
Qualys
Rapid7
Raytheon
Secureworks
Sophos
Splunk
Symantec
Trend Micro
Verint Systems
Aker Security Solutions
AlienVault
Avira
Bayshore Networks
Carbon Black
CloudFlare
Darktrace
Dell
Demonsaw
E8 Security
HackerOne
Herjavec Group
Hillstone Networks
Huawei
Illusive Networks
Kaspersky Lab
Palantir
Qihoo 360
Tanium
Untangle
Veracode
WatchGuard
WhiteHat Security
ZeroFOX
Table of Contents
Frequently asked questions
Get in touch to find out about multi-purchase discounts
reportstore@globaldata.com
Tel +44 20 7947 2745
Every customer’s requirement is unique. With over 220,000 construction projects tracked, we can create a tailored dataset for you based on the types of projects you are looking for. Please get in touch with your specific requirements and we can send you a quote.