SlideShare uma empresa Scribd logo
1 de 39
Baixar para ler offline
Market Prospects for the Security Industry
Market Prospects
for the Security Industry
Contents
Summary
Information and physical security is becoming an increasingly
important issue; IoT and AI are key technologies going forward
Definition and Overview
I. Expanding Security Market
II. Related Industries
Market Trends
I. Information Security: Global
II. Information Security: Japan
III. Physical Security: Global
IV. Physical Security: Japan
Main Services and Players
Industry Viewpoint
I. Information Security
II. Physical Security
III. Key Fields in Physical Security
2
Summary
Demand for both information and physical security is growing steadily
Crime prevention, anti-terrorism, disaster prevention, along with other industrial and
individual applications are the fields where information and physical security services
are required
IoT is one of the foci for information and physical security
AI will play a more critical role in providing quick responses through automatic, real-
time analysis under various circumstances
3
The Importance of Information and Physical Security Increasing;
IoT and AI to Be Key Technologies in Devising Solutions
Summary
4
Information Security Physical Security
1st Stage
• Protection for a limited range of
hardware (e.g. PCs)
• Human monitoring of analogue
devices
• Centred on psychological
precautions and post-incident
measures
2nd Stage
• Protection for massive corporate and
personal data available on networks
• Digitalisation and networking of
security devices
3rd Stage
• Subjects that require protection to
expand and include home electronics,
automobiles, and industrial
equipment, etc.
• To be utilised in a variety of fields,
including marketing and process
improvement
Now
・Development of cloud
computing and networking
・Prevalence of smartphones
and tablets
・Development of IoT
・Increase in terrorist threat
・Advancement of cyberattacks
AI used for data processing, crime prevention, and quick response
External Environment
Summary
5
Key Figures
 5-year growth rate of the
global information security
market (2010–15)
70 53 billion%
 Number of IoT devices in
the world by 2020
42 Global security device
market size by 2020
+
80 %
 Share of network-enabled
surveillance cameras by
2018
USD
≥ billion
1. Definition and Overview
6
I. Expanding Security Market
 The security service scope is classified into Target (what needs to be protected) and Source (what causes the security
issue), with the scope of Source being expanded over the years.
 Target: Information (in cyberattacks), Physical Objects (buildings, people, printouts, etc.)
 Source: (1) External Attacks, (2) Internal Misconduct and Accidents, (3) Disaster, (4) Terrorism
7
Security Service Scope Extended to Internal Misconduct and Public Safety
b. Physical Objects
(buildings, people, etc.)
a. Information
(1) Crime prevention (external attacks)
(2) Crime prevention (internal misconduct and
accidents)
(3) Disaster prevention and reduction
(4) Public safety (terrorism, etc.)
Target Source
 Information security requires measures against external cyberattacks and internal leaks.
 The necessity of security services for disaster prevention and public safety is increasing amidst current social conditions,
despite the difficulty in specifying the subjects and areas that require protection.
8
Subjects That Require Protection Difficult to Specify In Security Services for Internal Crime
Prevention and Public Safety
External Internal Public
(1) Crime prevention
(external attacks)
(2)Crimeprevention
(internalmisconduct, accidents)
(3) Disaster prevention
and reduction
(4)Publicsafety
a.
Information
• Unauthorised access to
and acquisition of
information, targeting
a specific company
• Internal information leak:
- Intentional
- Accidental
• Data loss during disasters
• Business continuity
• Cyberattacks against state
agencies:
- Infrastructure
- Defence
• Illegal activities via the internet
b.
Physical
Objects
• Trespassing, damage,
theft of property
• Accident
• Disaster, accident
(infrastructure, etc.)
• Terrorist attacks
• Indiscriminate attacks in public
space
• Safety check (guarding)
• Immigration and customs
control
Categories of Security
I. Expanding Security Market
 Quick detection and response are required for coping with unknown attacks and internal leaks or data misplacement
9
Main Protection Methods: Access Control and Detection of Attacks or Dangerous Activities
External Internal Public
(1) Crime prevention
(external attacks)
(2)Crimeprevention
(internalmisconduct, accidents)
(3) Disaster prevention
and reduction
(4)Publicsafety
a.
Information
• Anti-cyberattack:
- Networks
- Web applications
- Devices
• Limited access
• Log management and monitoring
(detection of dangerous activity)
• Data backup and
distribution
• Emergency communications
line
• Monitoring of internet BBSs
and other sources
b.
Physical
Objects
• Entry control
• Monitoring and
detecting attacks
• Human guards
• Entry control
• Monitoring and detecting
dangerous activities
• Detection of damage and
irregularities
• Monitoring disasters and
accidents
• Disaster prevention systems
(fire extinguishing, etc.)
• Monitoring and detecting
dangerous activities
• Safety check (guarding)
• Immigration control (entry/exit
records, detection of
dangerous objects, people, or
infectious diseases)
Security Methods
I. Expanding Security Market
II. Related Industries
 Security tools and services encompass a wide range of technologies, such as cloud computing, camera surveillance,
sensor detection, as well as image and data analysis
Cloud-Based Computing and Data Analysis Required for Protection of Data and Physical Objects
External Internal Public
(1) Crime prevention
(external attacks)
(2)Crimeprevention
(internalmisconduct, accidents)
(3) Disaster prevention
and reduction
(4)Publicsafety
a.
Information
b.
Physical
Objects
Security Software
Log Management
Cloud-Based Services
Surveillance Cameras and Various Sensors
Image and Data Analysis
Key Access and Authorisation Systems
Disaster Prevention Devices
Server-Based Services
Broadcast Satellites
Data Analysis
Guard Services
10
2. Market Trends
11
I. Information Security: Global
 Global information security market
grew 70% over 2010–15.
 The service field recorded the
highest growth, with the consulting
and outsourcing segments more
than doubling over the same period.
 The market size is estimated to grow
to USD 170 billion by 2020.
Source: by UZABASE based on various materials
12
Market Expanded by 70% over the Past 5 Years, Driven by Outsourcing Services
0
200
400
600
800
1,000
2010 2011 2012 2013 2014 2015
USD100million
Information Security Market (Global)
toC
toB サービス
toB ネットワーク機器
toB インフラ
(端末・メール・Web)
toB アクセス管理
toC
toB Services
toB Network
Devices
toB Infrastructure
(devices, e-mail, Web)
toB Access Control
I. Information Security: Global
 The global IoT security market grew by
94% over 2015–18.
 The growth is attributed to a
considerable increase in the number of
devices, including household appliances,
automobiles, and industrial machinery,
as well as the amount of data.
Source: Gartner
13
IoT Security Market Doubled in Size over 3 Years
0
1
2
3
4
5
6
2014 2015 2016 2017 2018
USD100million
IoT Security Market
II. Information Security: Japan
 Japan’s information security market
size was JPY 980 billion in 2016.
 The sales of security tools, as well
as operation/management,
education, and insurance services
witnesses strong growth.
 At the current rate, the market is
expected to exceed JPY 1 trillion
in 2017.
Source: Japan Network Security Association
14
Market Size Expected to Reach JPY 1 Trillion in 2017
0
4,000
8,000
12,000
JPY100million
Information Security Market (Japan)
情報セキュリ
ティツール
情報セキュリ
ティサービス
Information
security tools
Information
security
services
0%
25%
50%
75%
100%
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
Main Causes of Data Leaks
不正アクセス・
ウィルス盗難
紛失・置忘れ
誤操作
管理・設定ミス
内部不正行為
等その他
II. Information Security: Japan
 Despite fluctuations, data leaks are
primarily attributable to information
misplacement, wrong operation, and
inappropriate data management and
settings.
 Therefore, countermeasures against
internal data leaks are required.
15
Internal Corporate Issues the Main Cause of Data Leaks
Source: Japan Network Security Association
Unauthorised
access, viruses
Theft
Data loss,
misplacement
Wrong operation
Management/
settings problem
Employee
misconduct
Others
II. Information Security: Japan
 The leak of paper documents forms
the majority of cases of information
leaks.
 Therefore, proper management of
printed media is also required for
information security.
Source: Japan Network Security Association
Note: Based on the number of cases
16
Paper Documents Often the Source of Information Leaks;
Proper Management of Physical Media Necessary
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
Media and Channels of Information Leaks
紙媒体
PC本体
USB等記録媒体
インターネット
電子メール
携帯電話
その他
Paper
PC unit
Storage (USB)
Internet
E-mail
Mobile phone
Others
III. Physical Security: Global
 Security cameras occupy over 50% of the
security device market.
 The market is seeing the emergence of
new devices, such as guard robots and
drones, which are not included in the
statistics.
Source: Memoori Business Intelligence
17
Surveillance Cameras Constitute the Largest Physical Security Device Market
Breakdown of Global Security Devices by Type
Video Survellance
54%
Access Control
23%
Intruder Alarms
23%
2015
USD
27.2 billion
III. Physical Security: Global
 Similar to the information security market, the
physical security market is also expanding, with
the market size of security devices expected to
grow by 160% over the period of 2015–20.
 The total market size, including the service
segment, is estimated to exceed USD 10 billion
by 2020.
 Demand for physical security devices is
expanding from crime prevention, under which
the necessity of counter-terrorism measures is
growing, to disaster prevention, safety check,
and marketing, amongst others.
Source: Memoori Business Intelligence
18
Security Device Market Expanding, Expected to Grow 160% by 2020
27
42
0
10
20
30
40
50
2012 2013 2014 2015 2020FUSDbillion
Security Device Shipment Value (Global)
III. Physical Security: Global
 Due to an increasing number of recent
terrorist acts, security services for
public safety are gaining attention.
 In addition to devising
countermeasures against disasters and
infrastructure damage, physical security
services and devices are also used for
public safety monitoring, given the
difficulty in tracking dangerous objects,
people, and activities in public space by
human. Source: MarketsandMarkets
Note: Includes information security and disaster prevention
19
The Public Safety Market Also Attracting Attention
248
457
0
50
100
150
200
250
300
350
400
450
500
2016 2021
USDbillion
0
200
400
600
2010 2014 2018F
JPY100million
Surveillance Camera Market (Japan)
IPカメラ
アナログカメラ
IV. Physical Security: Japan
 In Japan, there is an ongoing shift from
analogue cameras that use coaxial
cables for connection towards wired
and wireless IP network cameras that
store data digitally.
 Analogue cameras used to cover 60%
of the market in 2010, but IP cameras
overtook the former and became the
mainstream device thereafter.
Source: Fuji Keizai
20
Surveillance Cameras Switching from Analogue Cameras to IP Cameras
IP Cameras
Analogue
Cameras
3. Main Services and Players
21
Industry Viewpoint
22
IoT and AI Bringing Great Changes to the Security Industry
IoT widens the scope of objects in need of security services.
→ How to protect the massive number of smartphones and wearable devices?
It is difficult to rely on human power to predict all attack patterns beforehand.
→ Focus on automatic real-time data analysis using AI
I. Information Security
23
End-Point
Security
Log Management,
Monitoring
Server-Based Services
Cloud-Based Security
General
[Global] IBM, HP, EMC, Cisco
McAfee
Symantec
Trend Micro
LogRhythm
HP (ArcSight)
Attachmate
Amazon (AWS)
Microsoft (Azure)
Google (GCP)
Security Cloud and IoT
[Japan] Hitachi, Fujitsu, NEC
Specialised
AI
Electronic
Authentication
Comodo
Entrust
Diversified Service Providers Actively Investing into IoT and AI
Diversified service providers are actively investing into IoT and AI, leading the market.
Cloud and server-based services also became part of security solutions.
Top players in the end-point security market are strengthening their cloud segment.
Diffusion of IoT Expands the Quantity and Type of Devices and Data;
Physical Security Solutions to Be Used in Information Security Services
I. Information Security
24
 The number of connected devices in the world is
increasing and expected to reach 53 billion by 2020.
 Individual information (location, biometric data,
eating habits, lifestyle, social networks, etc.) and
corporate data are all available on networks.
⇒ Rising quantity and quality of information driving
continuous growth in the market
⇒ Physical security solutions can be used in
information security services (e.g. using biometric
authentication to access sensitive data on
smartphones)
530
0
200
400
600
100millionunits
Number of IoT Devices (Global)
Source: IHS Technology
(White Paper on Information and Communication by the
Japanese Ministry of Internal Affairs and Communication)
25
The Medical and Automobile Fields Contain Life-Critical Information
 The industrial and consumer fields are home to a
large number of IoT devices, causing critical
corporate and personal data to be exposed to risks.
 Data hacking in the automobile and medical fields,
where high growth is expected, might be life-
endangering.
Number of IoT devices (2014)
CAGRofDeviceNumber
(2014–20)
80
40
40
20
Industrial
Consumer
Telecom
Automobiles
Healthcare
Computers
(100 million)
(%)
Number of Devices and Potential
for Growth by Field/Application
Source: IHS Technology
(White Paper on Information and Communication by the
Japanese Ministry of Internal Affairs and Communication)
I. Information Security
Mobile
Devices
Wearable
Devices
IoT Home
Appliances
Security Devices
Industrial
Devices
Medical Devices Automobiles
Location,
social network, etc.
Biometric data,
activities and habits
Security information,
corporate data, etc.
Safety-critical data
(concerning lives)
26
IoT Devices and Data Types
I. Information Security
27
 With cyberattacks becoming more sophisticated, projecting all possible scenarios is becoming a difficult task.
 Teaching AI to recognise attack patterns via Machine Learning will
(1) enable it to handle unknown threats (prediction, intrusion prevention);
(2) increase its analysis speed, and enable it to identify the attack types and sources more quickly.
 By doing so, global players that provide a comprehensive set of IoT-related services will gain the upper hand.
Compare to normal state
and detect discrepancy
Detect unknown threats
through pattern recognition
I. Information Security
AI to Be Utilised in Fighting Against Cyberattacks
Moves Towards Restructuring Seen Amongst Top Players
28
Recent M&As and Restructuring
2015 Oct Trend Micro acquired Tipping Point, the network security branch of HP.
EMC went under Dell’s umbrella (acquisition completed in September 2016).
2016 Jun Cisco acquired CloudLock, a cloud security service provider.
Sep Intel span out McAfee into a separate company.
Intel ventured into cloud-based/IoT fields; it acquired Nervana, a company involved in Deep Learning, in
August 2016, and Movidius, which engages in Computer Vision, in September 2016.
Oracle acquired Palerra, a US-based cloud security provider.
Symantec acquired Blue Coat, a web security service provider.
 Restructuring and reorganisations are seen amongst top players; for example, Intel span out McAfee and EMC
went under Dell’s umbrella.
 Specialised players strengthening their network security solutions, while diversified players shift towards cloud
services.
I. Information Security
29
Texas Instruments
Murata Mfg
TDK
Nidec
AXIS (Canon)
Hikvision
Dahua
Sony
OmniVision
Samsung
Nippon Ceramic
Hamamatsu
Phototonics
Omron
Keyence
Sofradir
Infra TEC
Infrared Temperature Ultrasonic Waves
CMOS Image Sensors
Excelitas Technologies
Honeywell International
Raytheon
Aerospace Defence
Laser
IBM
Google
NEC
Hitachi
Cameras
Fujitsu
NEC
Hitachi
Biometrics
Sensors
Control and
Computation
Devices
Data
Processing
Guard
Services
G4S
Securitas
United Technologies
Secom
ALSOK
AIIoT
Image Recognition
Data Integration and Processing
Diversified Service Providers Making Active Investment in IoT and AI
 Sensors, devices, and data processing software are key success factors.
 Devices are increasingly connected through networks; differentiation in data processing is an emerging trend.
Milestone Systems
MOBOTIX
II. Physical Security
30
 AXIS (under the umbrella of Canon), Panasonic, and other Japanese manufacturers hold top positions in the
market, but manufacturers from Mainland China, Taiwan, and South Korea are also prominent with their price
advantages.
 OEM manufacturers have a large presence; guard service providers and system developers are also able to
operate in this market.
The Surveillance Camera Competitive Landscape Comprises Chinese Manufacturers with Price
Advantages and OEMs
ACTi
Arecont Vision
Honeywell
AXIS (Canon)
Dahua Hikvision
Bosch Panasonic
Pelco
Samsumg
VIVOTEK
Top Players
Other Leading Players
OEM
Manufacturers
IDIS
DynaColor
AVTECH
Hitron Systems
ITX Security
Hi Sharp
Hunt Electronic
Topica
II. Physical Security
Application of IoT and AI Underway
31
 The integration of various security devices and services through networking boosts accuracy and
efficiency.
 The digitisation and networking of surveillance cameras increase the need for bulk data processing.
 Analysis of behavioural patterns can be carried out through image recognition and automatic detection of
irregularities.
AI
Remote
Monitoring
Irregularity
Detected
Analysis
!
II. Physical Security
32
Biometric Authentication Applications Expanding;
Fingerprint and Vein Patterns the Main Methods Used in Japan
Source: Texas Instruments,
“Processing Solutions for Biometric Systems”
 Biometric authentication is used in entry control systems, as well as
various information security solutions (e.g. a login method for various devices);
the spread of mobile devices and IoT is also driving growth in this field.
 Biometric authentication includes fingerprint, iris scan, face recognition, or
voiceprint.
 Fingerprint, iris scan, and face recognition are used worldwide.
 In Japan, vein pattern recognition is the mainstream, with fingerprint
also accounting for a major share, while other methods are rarely adopted.
 In addition to accuracy and costs, convenience and psychological
acceptance are major challenges for the market.
(*) Multi-Factor Authentication
The security level can be increased when combining authentication methods
with two or more factors as follows as they complement each other:
(1) Knowledge factor (e.g. password)
(2) Possession factor (e.g. mobile device, one-time password)
(3) Biometric data
指紋
31%
虹彩
16%
顔
15%
声
13%
静脈
10%
署名
4%
その他
11%
Face
Fingerprint
Iris
Voice
Veins
Signature
Others
III. Focus in Physical Security: Biometric Authentication
Breakdown of
Global Biometric Authentication Market
33
Face Recognition Has Low Accuracy; No Ideal Method Exists to Satisfy All Requirements
Signature
Iris
Veins
Fingerprint
Face
Voice
Convenience
Accuracy
HighLow
LowHigh
Ideal
Source: NEC, National Institute of Advanced Industrial Science and Technology
Accuracy and Convenience Accuracy and Public Acceptance
 The convenience and public acceptance for fingerprint and vein pattern recognition need to be improved.
 The accuracy of face recognition remains low.
Face
Voice
Acceptance
Low
reluctance
Ideal
High
reluctance
AccuracyLowHigh
Iris
Veins
Fingerprin
t
Signature
III. Focus in Physical Security: Biometric Authentication
Increasing Efficiency Through Automatic Image Analysis
34
 Automatic image analysis allows for the detection of
dangerous and irregular behaviour.
• Raises efficiency and prevents oversight
• Enables preemptive measures and quicker responses
 Image analysis can be used for a variety of scenarios and
targets.
• Person identity matching (suspicious persons, lost children, etc.)
• Human movement detection (walking, crouching down, looking
around, etc.)
• Characteristics detection (sex, age, clothing, etc.)
• Time-series comparison (object appearance detection)
Irregular Behaviour Detection
(Pattern Recognition)
Suspicious Object Detection
(Object Appearance)
III. Focus in Physical Security: Image Analysis
Application In Fields Other than Security
35
 The purposes of implementing surveillance cameras are changing to include customer behaviour
analysis and marketing.
• Customer traffic
• Area density
• Customer paths
• Products picked up
• Customer dwell time
Picked up
Considering
With kids
Customer Paths,
Store Density Customer Behaviour
III. Focus in Physical Security: Image Analysis
Focus on Counter-Terrorism Measures
36
 Due to the growing threat of terrorism, the issue of public safety is becoming more and more important.
It is necessary to increase the accuracy of immigration control procedures and build a crime prevention
system that is able to cover a large number of people in public space.
 Meanwhile, it is also desirable to avoid lowering efficiency or disturbing the people’s everyday lives. A
system that takes in account both privacy and convenience is needed.
 With the forthcoming 2020 Olympics and Paralympics, Japan needs to devise measures to ensure public
safety, indicating large demand for security services.
Public safety includes:
• Immigration Control
• Safety Control for Public and Commercial Facilities
• Infrastructure Maintenance and Monitoring
• Public Information Security
• Disaster Prevention
Infrastructure/DisasterImmigration Control Public Space
III. Focus in Physical Security: Public Safety
Copyright © UZABASE, Inc. All Rights Reserved
About Us
Tokyo
Uzabase, Inc.
Ebisu First Square. 10F 1-18-14 Ebisu, Shibuya-ku, Tokyo 150-0013, Japan
+81-3-4574-6552
+81-3-4574-6553
customer@uzabase.com
Singapore
20 Collyer Quay, #23-01,
Singapore 049319
+65-6653-8314
customer@uzabase.com
Hong Kong
30/F Entertainment Building, 30 Queen's
Road Central, Central, Hong Kong
+852-5808-3148 +852-3103-1011
customer@uzabase.com
Sri Lanka
48/4/1, Parkway building, Park Street,
Colombo 2. Sri Lanka.
+94-114-232-622
customer@uzabase.com
Shanghai
606​, No.1440 Yan’An Rd.(M),
Shanghai, China
+86-21-​6103-1677
customer@uzabase.com
©2017 UZABASE, Inc.

Mais conteúdo relacionado

Mais procurados

Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Mohan C. de SILVA
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Complianceijtsrd
 
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare EnvironmentA Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environmentfaisalcp
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 

Mais procurados (19)

Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
188
188188
188
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare EnvironmentA Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 

Semelhante a SPEEDA INSIGHTS_Market Prospects for the Security Industry

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Io t security market
Io t security marketIo t security market
Io t security marketdanishsmith01
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 

Semelhante a SPEEDA INSIGHTS_Market Prospects for the Security Industry (20)

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Io t security market
Io t security marketIo t security market
Io t security market
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 

Mais de Kyna Tsai

ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...
ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...
ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...Kyna Tsai
 
ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...
ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...
ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...Kyna Tsai
 
SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...
SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...
SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...Kyna Tsai
 
ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...
ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...
ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...Kyna Tsai
 
SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...
SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...
SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...Kyna Tsai
 
ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...
ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...
ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...Kyna Tsai
 
SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?
SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?
SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?Kyna Tsai
 
ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...
ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...
ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...Kyna Tsai
 
SPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and Upwards
SPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and UpwardsSPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and Upwards
SPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and UpwardsKyna Tsai
 
SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...
SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...
SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...Kyna Tsai
 
SPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trends
SPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trendsSPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trends
SPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trendsKyna Tsai
 
SPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related Industries
SPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related IndustriesSPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related Industries
SPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related IndustriesKyna Tsai
 
SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...
SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...
SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...Kyna Tsai
 
Country Report China: Navigating Through Transition
Country Report China: Navigating Through TransitionCountry Report China: Navigating Through Transition
Country Report China: Navigating Through TransitionKyna Tsai
 
Speeda insights_Understanding japan’s automobile related industries through t...
Speeda insights_Understanding japan’s automobile related industries through t...Speeda insights_Understanding japan’s automobile related industries through t...
Speeda insights_Understanding japan’s automobile related industries through t...Kyna Tsai
 
Country Report 2017 Sri Lanka: The Dollar Hungry Nation
Country Report 2017 Sri Lanka: The Dollar Hungry NationCountry Report 2017 Sri Lanka: The Dollar Hungry Nation
Country Report 2017 Sri Lanka: The Dollar Hungry NationKyna Tsai
 
Three Pillars to Sustainable Growth and Development in India - Pillar III
Three Pillars to Sustainable Growth and Development in India - Pillar IIIThree Pillars to Sustainable Growth and Development in India - Pillar III
Three Pillars to Sustainable Growth and Development in India - Pillar IIIKyna Tsai
 
Three Pillars to Sustainable Growth and Development in India - Pillar II
Three Pillars to Sustainable Growth and Development in India - Pillar IIThree Pillars to Sustainable Growth and Development in India - Pillar II
Three Pillars to Sustainable Growth and Development in India - Pillar IIKyna Tsai
 
Three Pillars to Sustainable Growth and Development in India - Pillar I
Three Pillars to Sustainable Growth and Development in India - Pillar IThree Pillars to Sustainable Growth and Development in India - Pillar I
Three Pillars to Sustainable Growth and Development in India - Pillar IKyna Tsai
 
Preschool education in China
Preschool education in ChinaPreschool education in China
Preschool education in ChinaKyna Tsai
 

Mais de Kyna Tsai (20)

ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...
ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...
ASEAN Macroeconomic Trends_Indonesia’s Economic Growth for 3Q Remained Buoyan...
 
ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...
ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...
ASEAN Macroeconomic Trends_Malaysia Announces Budget Draft, Looks to Provide ...
 
SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...
SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...
SPEEDA INSIGHTS_Jakarta MRT and LRT Development A Ground Breaking Start to Ea...
 
ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...
ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...
ASEAN Macroeconomic Trends_Indonesia Continues to Lower Interest Rates; Vietn...
 
SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...
SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...
SPEEDA INSIGHTS_Indonesian and Malaysian Palm Oil Industry at Critical Crossr...
 
ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...
ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...
ASEAN Macroeconomic Trends_Malaysia and the Philippines Undergoing Rapid Grow...
 
SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?
SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?
SPEEDA INSIGHTS_Malaysia Plans Cashless Society for 2020 - Is it Out of Reach?
 
ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...
ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...
ASEAN Macroeconomic Trends_ASEAN Economy Expected to Exhibit Steady Growth in...
 
SPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and Upwards
SPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and UpwardsSPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and Upwards
SPEEDA INSIGHTS_Next Stop for Bitcoin Price Onwards and Upwards
 
SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...
SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...
SPEEDA INSIGHTS_Will foreign funds take away from private investment as the p...
 
SPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trends
SPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trendsSPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trends
SPEEDA INSIGHTS_A brief glance at japan’s VR/AR industry through market trends
 
SPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related Industries
SPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related IndustriesSPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related Industries
SPEEDA INSIGHTS_A Brief Glance at Japan's Blast Furnace Steel-Related Industries
 
SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...
SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...
SPEEDA INSIGHTS_A Brief Glance at Japan's Mobile Communications Related Indus...
 
Country Report China: Navigating Through Transition
Country Report China: Navigating Through TransitionCountry Report China: Navigating Through Transition
Country Report China: Navigating Through Transition
 
Speeda insights_Understanding japan’s automobile related industries through t...
Speeda insights_Understanding japan’s automobile related industries through t...Speeda insights_Understanding japan’s automobile related industries through t...
Speeda insights_Understanding japan’s automobile related industries through t...
 
Country Report 2017 Sri Lanka: The Dollar Hungry Nation
Country Report 2017 Sri Lanka: The Dollar Hungry NationCountry Report 2017 Sri Lanka: The Dollar Hungry Nation
Country Report 2017 Sri Lanka: The Dollar Hungry Nation
 
Three Pillars to Sustainable Growth and Development in India - Pillar III
Three Pillars to Sustainable Growth and Development in India - Pillar IIIThree Pillars to Sustainable Growth and Development in India - Pillar III
Three Pillars to Sustainable Growth and Development in India - Pillar III
 
Three Pillars to Sustainable Growth and Development in India - Pillar II
Three Pillars to Sustainable Growth and Development in India - Pillar IIThree Pillars to Sustainable Growth and Development in India - Pillar II
Three Pillars to Sustainable Growth and Development in India - Pillar II
 
Three Pillars to Sustainable Growth and Development in India - Pillar I
Three Pillars to Sustainable Growth and Development in India - Pillar IThree Pillars to Sustainable Growth and Development in India - Pillar I
Three Pillars to Sustainable Growth and Development in India - Pillar I
 
Preschool education in China
Preschool education in ChinaPreschool education in China
Preschool education in China
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

SPEEDA INSIGHTS_Market Prospects for the Security Industry

  • 1. Market Prospects for the Security Industry
  • 2. Market Prospects for the Security Industry
  • 3. Contents Summary Information and physical security is becoming an increasingly important issue; IoT and AI are key technologies going forward Definition and Overview I. Expanding Security Market II. Related Industries Market Trends I. Information Security: Global II. Information Security: Japan III. Physical Security: Global IV. Physical Security: Japan Main Services and Players Industry Viewpoint I. Information Security II. Physical Security III. Key Fields in Physical Security 2
  • 4. Summary Demand for both information and physical security is growing steadily Crime prevention, anti-terrorism, disaster prevention, along with other industrial and individual applications are the fields where information and physical security services are required IoT is one of the foci for information and physical security AI will play a more critical role in providing quick responses through automatic, real- time analysis under various circumstances 3 The Importance of Information and Physical Security Increasing; IoT and AI to Be Key Technologies in Devising Solutions
  • 5. Summary 4 Information Security Physical Security 1st Stage • Protection for a limited range of hardware (e.g. PCs) • Human monitoring of analogue devices • Centred on psychological precautions and post-incident measures 2nd Stage • Protection for massive corporate and personal data available on networks • Digitalisation and networking of security devices 3rd Stage • Subjects that require protection to expand and include home electronics, automobiles, and industrial equipment, etc. • To be utilised in a variety of fields, including marketing and process improvement Now ・Development of cloud computing and networking ・Prevalence of smartphones and tablets ・Development of IoT ・Increase in terrorist threat ・Advancement of cyberattacks AI used for data processing, crime prevention, and quick response External Environment
  • 6. Summary 5 Key Figures  5-year growth rate of the global information security market (2010–15) 70 53 billion%  Number of IoT devices in the world by 2020 42 Global security device market size by 2020 + 80 %  Share of network-enabled surveillance cameras by 2018 USD ≥ billion
  • 7. 1. Definition and Overview 6
  • 8. I. Expanding Security Market  The security service scope is classified into Target (what needs to be protected) and Source (what causes the security issue), with the scope of Source being expanded over the years.  Target: Information (in cyberattacks), Physical Objects (buildings, people, printouts, etc.)  Source: (1) External Attacks, (2) Internal Misconduct and Accidents, (3) Disaster, (4) Terrorism 7 Security Service Scope Extended to Internal Misconduct and Public Safety b. Physical Objects (buildings, people, etc.) a. Information (1) Crime prevention (external attacks) (2) Crime prevention (internal misconduct and accidents) (3) Disaster prevention and reduction (4) Public safety (terrorism, etc.) Target Source
  • 9.  Information security requires measures against external cyberattacks and internal leaks.  The necessity of security services for disaster prevention and public safety is increasing amidst current social conditions, despite the difficulty in specifying the subjects and areas that require protection. 8 Subjects That Require Protection Difficult to Specify In Security Services for Internal Crime Prevention and Public Safety External Internal Public (1) Crime prevention (external attacks) (2)Crimeprevention (internalmisconduct, accidents) (3) Disaster prevention and reduction (4)Publicsafety a. Information • Unauthorised access to and acquisition of information, targeting a specific company • Internal information leak: - Intentional - Accidental • Data loss during disasters • Business continuity • Cyberattacks against state agencies: - Infrastructure - Defence • Illegal activities via the internet b. Physical Objects • Trespassing, damage, theft of property • Accident • Disaster, accident (infrastructure, etc.) • Terrorist attacks • Indiscriminate attacks in public space • Safety check (guarding) • Immigration and customs control Categories of Security I. Expanding Security Market
  • 10.  Quick detection and response are required for coping with unknown attacks and internal leaks or data misplacement 9 Main Protection Methods: Access Control and Detection of Attacks or Dangerous Activities External Internal Public (1) Crime prevention (external attacks) (2)Crimeprevention (internalmisconduct, accidents) (3) Disaster prevention and reduction (4)Publicsafety a. Information • Anti-cyberattack: - Networks - Web applications - Devices • Limited access • Log management and monitoring (detection of dangerous activity) • Data backup and distribution • Emergency communications line • Monitoring of internet BBSs and other sources b. Physical Objects • Entry control • Monitoring and detecting attacks • Human guards • Entry control • Monitoring and detecting dangerous activities • Detection of damage and irregularities • Monitoring disasters and accidents • Disaster prevention systems (fire extinguishing, etc.) • Monitoring and detecting dangerous activities • Safety check (guarding) • Immigration control (entry/exit records, detection of dangerous objects, people, or infectious diseases) Security Methods I. Expanding Security Market
  • 11. II. Related Industries  Security tools and services encompass a wide range of technologies, such as cloud computing, camera surveillance, sensor detection, as well as image and data analysis Cloud-Based Computing and Data Analysis Required for Protection of Data and Physical Objects External Internal Public (1) Crime prevention (external attacks) (2)Crimeprevention (internalmisconduct, accidents) (3) Disaster prevention and reduction (4)Publicsafety a. Information b. Physical Objects Security Software Log Management Cloud-Based Services Surveillance Cameras and Various Sensors Image and Data Analysis Key Access and Authorisation Systems Disaster Prevention Devices Server-Based Services Broadcast Satellites Data Analysis Guard Services 10
  • 13. I. Information Security: Global  Global information security market grew 70% over 2010–15.  The service field recorded the highest growth, with the consulting and outsourcing segments more than doubling over the same period.  The market size is estimated to grow to USD 170 billion by 2020. Source: by UZABASE based on various materials 12 Market Expanded by 70% over the Past 5 Years, Driven by Outsourcing Services 0 200 400 600 800 1,000 2010 2011 2012 2013 2014 2015 USD100million Information Security Market (Global) toC toB サービス toB ネットワーク機器 toB インフラ (端末・メール・Web) toB アクセス管理 toC toB Services toB Network Devices toB Infrastructure (devices, e-mail, Web) toB Access Control
  • 14. I. Information Security: Global  The global IoT security market grew by 94% over 2015–18.  The growth is attributed to a considerable increase in the number of devices, including household appliances, automobiles, and industrial machinery, as well as the amount of data. Source: Gartner 13 IoT Security Market Doubled in Size over 3 Years 0 1 2 3 4 5 6 2014 2015 2016 2017 2018 USD100million IoT Security Market
  • 15. II. Information Security: Japan  Japan’s information security market size was JPY 980 billion in 2016.  The sales of security tools, as well as operation/management, education, and insurance services witnesses strong growth.  At the current rate, the market is expected to exceed JPY 1 trillion in 2017. Source: Japan Network Security Association 14 Market Size Expected to Reach JPY 1 Trillion in 2017 0 4,000 8,000 12,000 JPY100million Information Security Market (Japan) 情報セキュリ ティツール 情報セキュリ ティサービス Information security tools Information security services
  • 16. 0% 25% 50% 75% 100% 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 Main Causes of Data Leaks 不正アクセス・ ウィルス盗難 紛失・置忘れ 誤操作 管理・設定ミス 内部不正行為 等その他 II. Information Security: Japan  Despite fluctuations, data leaks are primarily attributable to information misplacement, wrong operation, and inappropriate data management and settings.  Therefore, countermeasures against internal data leaks are required. 15 Internal Corporate Issues the Main Cause of Data Leaks Source: Japan Network Security Association Unauthorised access, viruses Theft Data loss, misplacement Wrong operation Management/ settings problem Employee misconduct Others
  • 17. II. Information Security: Japan  The leak of paper documents forms the majority of cases of information leaks.  Therefore, proper management of printed media is also required for information security. Source: Japan Network Security Association Note: Based on the number of cases 16 Paper Documents Often the Source of Information Leaks; Proper Management of Physical Media Necessary 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 Media and Channels of Information Leaks 紙媒体 PC本体 USB等記録媒体 インターネット 電子メール 携帯電話 その他 Paper PC unit Storage (USB) Internet E-mail Mobile phone Others
  • 18. III. Physical Security: Global  Security cameras occupy over 50% of the security device market.  The market is seeing the emergence of new devices, such as guard robots and drones, which are not included in the statistics. Source: Memoori Business Intelligence 17 Surveillance Cameras Constitute the Largest Physical Security Device Market Breakdown of Global Security Devices by Type Video Survellance 54% Access Control 23% Intruder Alarms 23% 2015 USD 27.2 billion
  • 19. III. Physical Security: Global  Similar to the information security market, the physical security market is also expanding, with the market size of security devices expected to grow by 160% over the period of 2015–20.  The total market size, including the service segment, is estimated to exceed USD 10 billion by 2020.  Demand for physical security devices is expanding from crime prevention, under which the necessity of counter-terrorism measures is growing, to disaster prevention, safety check, and marketing, amongst others. Source: Memoori Business Intelligence 18 Security Device Market Expanding, Expected to Grow 160% by 2020 27 42 0 10 20 30 40 50 2012 2013 2014 2015 2020FUSDbillion Security Device Shipment Value (Global)
  • 20. III. Physical Security: Global  Due to an increasing number of recent terrorist acts, security services for public safety are gaining attention.  In addition to devising countermeasures against disasters and infrastructure damage, physical security services and devices are also used for public safety monitoring, given the difficulty in tracking dangerous objects, people, and activities in public space by human. Source: MarketsandMarkets Note: Includes information security and disaster prevention 19 The Public Safety Market Also Attracting Attention 248 457 0 50 100 150 200 250 300 350 400 450 500 2016 2021 USDbillion
  • 21. 0 200 400 600 2010 2014 2018F JPY100million Surveillance Camera Market (Japan) IPカメラ アナログカメラ IV. Physical Security: Japan  In Japan, there is an ongoing shift from analogue cameras that use coaxial cables for connection towards wired and wireless IP network cameras that store data digitally.  Analogue cameras used to cover 60% of the market in 2010, but IP cameras overtook the former and became the mainstream device thereafter. Source: Fuji Keizai 20 Surveillance Cameras Switching from Analogue Cameras to IP Cameras IP Cameras Analogue Cameras
  • 22. 3. Main Services and Players 21
  • 23. Industry Viewpoint 22 IoT and AI Bringing Great Changes to the Security Industry IoT widens the scope of objects in need of security services. → How to protect the massive number of smartphones and wearable devices? It is difficult to rely on human power to predict all attack patterns beforehand. → Focus on automatic real-time data analysis using AI
  • 24. I. Information Security 23 End-Point Security Log Management, Monitoring Server-Based Services Cloud-Based Security General [Global] IBM, HP, EMC, Cisco McAfee Symantec Trend Micro LogRhythm HP (ArcSight) Attachmate Amazon (AWS) Microsoft (Azure) Google (GCP) Security Cloud and IoT [Japan] Hitachi, Fujitsu, NEC Specialised AI Electronic Authentication Comodo Entrust Diversified Service Providers Actively Investing into IoT and AI Diversified service providers are actively investing into IoT and AI, leading the market. Cloud and server-based services also became part of security solutions. Top players in the end-point security market are strengthening their cloud segment.
  • 25. Diffusion of IoT Expands the Quantity and Type of Devices and Data; Physical Security Solutions to Be Used in Information Security Services I. Information Security 24  The number of connected devices in the world is increasing and expected to reach 53 billion by 2020.  Individual information (location, biometric data, eating habits, lifestyle, social networks, etc.) and corporate data are all available on networks. ⇒ Rising quantity and quality of information driving continuous growth in the market ⇒ Physical security solutions can be used in information security services (e.g. using biometric authentication to access sensitive data on smartphones) 530 0 200 400 600 100millionunits Number of IoT Devices (Global) Source: IHS Technology (White Paper on Information and Communication by the Japanese Ministry of Internal Affairs and Communication)
  • 26. 25 The Medical and Automobile Fields Contain Life-Critical Information  The industrial and consumer fields are home to a large number of IoT devices, causing critical corporate and personal data to be exposed to risks.  Data hacking in the automobile and medical fields, where high growth is expected, might be life- endangering. Number of IoT devices (2014) CAGRofDeviceNumber (2014–20) 80 40 40 20 Industrial Consumer Telecom Automobiles Healthcare Computers (100 million) (%) Number of Devices and Potential for Growth by Field/Application Source: IHS Technology (White Paper on Information and Communication by the Japanese Ministry of Internal Affairs and Communication) I. Information Security
  • 27. Mobile Devices Wearable Devices IoT Home Appliances Security Devices Industrial Devices Medical Devices Automobiles Location, social network, etc. Biometric data, activities and habits Security information, corporate data, etc. Safety-critical data (concerning lives) 26 IoT Devices and Data Types I. Information Security
  • 28. 27  With cyberattacks becoming more sophisticated, projecting all possible scenarios is becoming a difficult task.  Teaching AI to recognise attack patterns via Machine Learning will (1) enable it to handle unknown threats (prediction, intrusion prevention); (2) increase its analysis speed, and enable it to identify the attack types and sources more quickly.  By doing so, global players that provide a comprehensive set of IoT-related services will gain the upper hand. Compare to normal state and detect discrepancy Detect unknown threats through pattern recognition I. Information Security AI to Be Utilised in Fighting Against Cyberattacks
  • 29. Moves Towards Restructuring Seen Amongst Top Players 28 Recent M&As and Restructuring 2015 Oct Trend Micro acquired Tipping Point, the network security branch of HP. EMC went under Dell’s umbrella (acquisition completed in September 2016). 2016 Jun Cisco acquired CloudLock, a cloud security service provider. Sep Intel span out McAfee into a separate company. Intel ventured into cloud-based/IoT fields; it acquired Nervana, a company involved in Deep Learning, in August 2016, and Movidius, which engages in Computer Vision, in September 2016. Oracle acquired Palerra, a US-based cloud security provider. Symantec acquired Blue Coat, a web security service provider.  Restructuring and reorganisations are seen amongst top players; for example, Intel span out McAfee and EMC went under Dell’s umbrella.  Specialised players strengthening their network security solutions, while diversified players shift towards cloud services. I. Information Security
  • 30. 29 Texas Instruments Murata Mfg TDK Nidec AXIS (Canon) Hikvision Dahua Sony OmniVision Samsung Nippon Ceramic Hamamatsu Phototonics Omron Keyence Sofradir Infra TEC Infrared Temperature Ultrasonic Waves CMOS Image Sensors Excelitas Technologies Honeywell International Raytheon Aerospace Defence Laser IBM Google NEC Hitachi Cameras Fujitsu NEC Hitachi Biometrics Sensors Control and Computation Devices Data Processing Guard Services G4S Securitas United Technologies Secom ALSOK AIIoT Image Recognition Data Integration and Processing Diversified Service Providers Making Active Investment in IoT and AI  Sensors, devices, and data processing software are key success factors.  Devices are increasingly connected through networks; differentiation in data processing is an emerging trend. Milestone Systems MOBOTIX II. Physical Security
  • 31. 30  AXIS (under the umbrella of Canon), Panasonic, and other Japanese manufacturers hold top positions in the market, but manufacturers from Mainland China, Taiwan, and South Korea are also prominent with their price advantages.  OEM manufacturers have a large presence; guard service providers and system developers are also able to operate in this market. The Surveillance Camera Competitive Landscape Comprises Chinese Manufacturers with Price Advantages and OEMs ACTi Arecont Vision Honeywell AXIS (Canon) Dahua Hikvision Bosch Panasonic Pelco Samsumg VIVOTEK Top Players Other Leading Players OEM Manufacturers IDIS DynaColor AVTECH Hitron Systems ITX Security Hi Sharp Hunt Electronic Topica II. Physical Security
  • 32. Application of IoT and AI Underway 31  The integration of various security devices and services through networking boosts accuracy and efficiency.  The digitisation and networking of surveillance cameras increase the need for bulk data processing.  Analysis of behavioural patterns can be carried out through image recognition and automatic detection of irregularities. AI Remote Monitoring Irregularity Detected Analysis ! II. Physical Security
  • 33. 32 Biometric Authentication Applications Expanding; Fingerprint and Vein Patterns the Main Methods Used in Japan Source: Texas Instruments, “Processing Solutions for Biometric Systems”  Biometric authentication is used in entry control systems, as well as various information security solutions (e.g. a login method for various devices); the spread of mobile devices and IoT is also driving growth in this field.  Biometric authentication includes fingerprint, iris scan, face recognition, or voiceprint.  Fingerprint, iris scan, and face recognition are used worldwide.  In Japan, vein pattern recognition is the mainstream, with fingerprint also accounting for a major share, while other methods are rarely adopted.  In addition to accuracy and costs, convenience and psychological acceptance are major challenges for the market. (*) Multi-Factor Authentication The security level can be increased when combining authentication methods with two or more factors as follows as they complement each other: (1) Knowledge factor (e.g. password) (2) Possession factor (e.g. mobile device, one-time password) (3) Biometric data 指紋 31% 虹彩 16% 顔 15% 声 13% 静脈 10% 署名 4% その他 11% Face Fingerprint Iris Voice Veins Signature Others III. Focus in Physical Security: Biometric Authentication Breakdown of Global Biometric Authentication Market
  • 34. 33 Face Recognition Has Low Accuracy; No Ideal Method Exists to Satisfy All Requirements Signature Iris Veins Fingerprint Face Voice Convenience Accuracy HighLow LowHigh Ideal Source: NEC, National Institute of Advanced Industrial Science and Technology Accuracy and Convenience Accuracy and Public Acceptance  The convenience and public acceptance for fingerprint and vein pattern recognition need to be improved.  The accuracy of face recognition remains low. Face Voice Acceptance Low reluctance Ideal High reluctance AccuracyLowHigh Iris Veins Fingerprin t Signature III. Focus in Physical Security: Biometric Authentication
  • 35. Increasing Efficiency Through Automatic Image Analysis 34  Automatic image analysis allows for the detection of dangerous and irregular behaviour. • Raises efficiency and prevents oversight • Enables preemptive measures and quicker responses  Image analysis can be used for a variety of scenarios and targets. • Person identity matching (suspicious persons, lost children, etc.) • Human movement detection (walking, crouching down, looking around, etc.) • Characteristics detection (sex, age, clothing, etc.) • Time-series comparison (object appearance detection) Irregular Behaviour Detection (Pattern Recognition) Suspicious Object Detection (Object Appearance) III. Focus in Physical Security: Image Analysis
  • 36. Application In Fields Other than Security 35  The purposes of implementing surveillance cameras are changing to include customer behaviour analysis and marketing. • Customer traffic • Area density • Customer paths • Products picked up • Customer dwell time Picked up Considering With kids Customer Paths, Store Density Customer Behaviour III. Focus in Physical Security: Image Analysis
  • 37. Focus on Counter-Terrorism Measures 36  Due to the growing threat of terrorism, the issue of public safety is becoming more and more important. It is necessary to increase the accuracy of immigration control procedures and build a crime prevention system that is able to cover a large number of people in public space.  Meanwhile, it is also desirable to avoid lowering efficiency or disturbing the people’s everyday lives. A system that takes in account both privacy and convenience is needed.  With the forthcoming 2020 Olympics and Paralympics, Japan needs to devise measures to ensure public safety, indicating large demand for security services. Public safety includes: • Immigration Control • Safety Control for Public and Commercial Facilities • Infrastructure Maintenance and Monitoring • Public Information Security • Disaster Prevention Infrastructure/DisasterImmigration Control Public Space III. Focus in Physical Security: Public Safety
  • 38. Copyright © UZABASE, Inc. All Rights Reserved
  • 39. About Us Tokyo Uzabase, Inc. Ebisu First Square. 10F 1-18-14 Ebisu, Shibuya-ku, Tokyo 150-0013, Japan +81-3-4574-6552 +81-3-4574-6553 customer@uzabase.com Singapore 20 Collyer Quay, #23-01, Singapore 049319 +65-6653-8314 customer@uzabase.com Hong Kong 30/F Entertainment Building, 30 Queen's Road Central, Central, Hong Kong +852-5808-3148 +852-3103-1011 customer@uzabase.com Sri Lanka 48/4/1, Parkway building, Park Street, Colombo 2. Sri Lanka. +94-114-232-622 customer@uzabase.com Shanghai 606​, No.1440 Yan’An Rd.(M), Shanghai, China +86-21-​6103-1677 customer@uzabase.com ©2017 UZABASE, Inc.