Asia-Pacific Industrial Control Systems Security Market

Nov 30, 2015, 15:29 ET from ReportBuyer

LONDON, Nov. 30, 2015 /PRNewswire/ -- Increased Threats Towards Critical Infrastructure Driving Demand for Better Security

The study analyzes the Asia-Pacific industrial control systems (ICS) security market. In the 2010s, there were notable targeted attacks such as Stuxnet that attacked centrifuges, followed by a slew of attacks with code names such as Aurora, Flame, and Havex, discovered by various security vendors' threat research and intelligence centers. The drive of Internet of Things (IoT) has driven several industries, such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, unknowingly exposing themselves and becoming more vulnerable to the threats IoT brings. The base year of the study is 2014, with forecasts up to 2019.

Executive Summary
- The Asia-Pacific industrial control systems (ICS) security market generated revenue of about $ million in 2014, with a CAGR of %. It is expected to reach $ billion by 2019.
- Notable targeted attacks were witnessed in the 2010s. The list includes Stuxnet that attacked centrifuges, followed by a slew of attacks with codenames such as Aurora, Flame, and Havex, discovered by various security vendors' threat research and intelligence centers.
- The drive of Internet of Things (IoT) has driven several industries, such as smart manufacturing to adopt and embrace the advantages of connecting to the Internet, unknowingly exposing themselves and becoming more vulnerable to the threats IoT brings.
- Industrial vendors have started to innovate new offerings to help the industry develop better security tools through consultation and system integration services. Similarly, security vendors that have traditionally helped business networks in the ICT space have started to move towards helping these industries receive better protection as they connect to the Internet.
- While Asia-Pacific does not have a standard guideline or mandate for cyber security in critical infrastructure. It has, however, been observed that the energy sector has been adopting best practices such as NERC-CIP from the United States, while the rest of the critical infrastructure industries endorse NIST as the common guideline.
- There is a lack of mandate for critical infrastructure to adopt cyber security, as well as resistance among operational technology professionals that do not see the need for security. These professionals
believe in the "air gap" concept that has isolated their industrial networks from the threats of the Internet that usually target business networks.

Executive Summary—CEO's Perspective
1 A substantial level of awareness exists on the threat landscape that is targeting critical infrastructure in Asia-Pacific, which is mostly automated by industrial control systems and vulnerable to attacks.

2 There is a lack of standardized security guidelines across Asia-Pacific as industries start to take on cyber security treatment that is primarily based on NERT-CIP or NIST standards.

3 There is a lack of understanding of the need for security in operational technology (OT) environment, which is managed by security professionals familiar with IT/business systems.

Download the full report: https://www.reportbuyer.com/product/3421860/

About Reportbuyer
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
http://www.reportbuyer.com

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: query@reportbuyer.com  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer



RELATED LINKS

http://www.reportbuyer.com