Industrial Control Systems (ICS) Security Market Size By Security Type (Network Security, Application Security, Endpoint Security, Database Security), By Component (Solution [Firewall, SCADA Encryption, Antivirus/Anti-Malware, Intrusion Detection & Prevention, Identity & Access Management {IAM}, Distributed Denial of Service {DDoS} Solution, Data Loss Prevention {DLP}, Virtualization Security, Security Information and Event Management {SIEM}, Unified Threat Management {UTM}], Service [Managed Service, Integration & Consulting, Audit & Reporting, Risk Management]), By Application (Power and Energy, Critical Manufacturing, Mining, Water Utility, Transportation, Chemical), Industry Analysis Report, Regional Outlook, Growth Potential, Competitive Market Share & Forecast, 2020 – 2026

Published Date: Jun 2020  |  Report ID: GMI2680  |  Authors: Preeti Wadhwani, Sachin Kasnale

Report Format: PDF   |   Pages: 316   |   Base Year: 2019




Summary Table of Contents Industry Coverage Methodology

Report Content

Chapter 1    Methodology & Scope

1.1    Scope & definitions

1.2    Methodology and forecast parameters

1.3    Data Sources

1.3.1    Primary

Chapter 2    Executive Summary

2.1    ICS security industry 3600 synopsis, 2020 – 2026

2.1.1    Business trends

2.1.2    Regional trends

2.1.3    Security type trends

2.1.4    Component trends

2.1.5    Application trends

Chapter 3    ICS Security Industry Insights

3.1    Introduction

3.2    Features/benefits of ICS security solutions

3.3    Industry segmentation

3.4    ICS security industry landscape

3.5    Impact of COVID-19 outbreak

3.5.1    Impact by region

3.5.1.1    North America

3.5.1.2    Europe

3.5.1.3    Asia Pacific

3.5.1.4    LAMEA

3.5.2    Impact on R&D

3.5.3    Impact on growth strategy and business model

3.6    Industry ecosystem analysis

3.7    Top 10 threats and countermeasures for ICS security

3.7.1    Social engineering and phishing

3.7.2    Malware infection through internet and intranet

3.7.3    Human errors and sabotage

3.7.4    Infiltration of malware through removable media and external hardware

3.7.5    Technical malfunctions and unavoidable accidents

3.7.6    Control components connected to the internet

3.7.7    Compromising of cloud and extranet components

3.7.8    Intrusion through remote access

3.7.9    Compromising of smartphones in the production environment

3.7.10    DDoS attacks

3.8    IT/OT

3.8.1    Major cyber-attacks on ICS components

3.8.2    OT/IT Convergence

3.8.3    IT/OT challenges

3.8.4    IT/OT cyber security practices

3.9    Technology & innovation landscape

3.9.1    Security-as-a-Service (SECaaS)

3.9.2    AI and machine learning

3.10   Regulatory landscape

3.10.1    The ISA/IEC 62443 standard

3.10.2    NIST SP 800-53

3.10.3    Critical Infrastructure Protection Mandates (NERC)

3.10.4    The Security of Network and Information Services Directive (NIS Directive) (EU)

3.10.5    IT Security ACT (Germany)

3.10.6    Cybersecurity Law (China)

3.11   Industry impact forces

3.11.1    Growth drivers

3.11.1.1  Increasing incidents of cyber-attacks on critical infrastructure industrial operations

3.11.1.2  Growing adoption of IIoT

3.11.1.3  Advancements in smart technologies for identity management

3.11.1.4  Government initiatives for ICS security

3.11.2    Industry Pitfalls and Challenges

3.11.2.1  Prevalence of legacy security systems

3.11.2.2  Lack of in-house technical expertise

3.11.2.3  Growing inclination towards renewable energy sources

3.12   Porter’s Analysis

3.12.1    Bargaining power of suppliers

3.12.2    Bargaining power of buyers

3.12.3    Threat of new entrants

3.12.4    Threat of substitutes

3.13   PESTEL analysis

3.14   Growth potential analysis

Chapter 4    Competitive Landscape, 2019

4.1    Introduction

4.2    Major market players, 2019

4.2.1    Honeywell International

4.2.2    Kaspersky Lab

4.2.3    Rockwell Automation

4.2.4    Schneider Electric

4.3    Other prominent vendors

4.3.1    Belden, Inc.

4.3.2    Checkpoint Software

4.3.3    Siemens AG

4.3.4    Trend Micro

Chapter 5    ICS Security Market, By Security Type

5.1    ICS security market, key trends, by security type

5.2    Network security

5.2.1    Market estimates and forecast, 2015-2026

5.3    Application security

5.3.1    Market estimates and forecast, 2015-2026

5.4    Endpoint security

5.4.1    Market estimates and forecast, 2015-2026

5.5    Database security

5.5.1    Market estimates and forecast, 2015-2026

Chapter 6    ICS Security Market, By Component

6.1    ICS security market, key trends, by component

6.2    Solution

6.2.1    Market estimates and forecast, 2015-2026

6.2.2    SCADA encryption

6.2.2.1    Market estimates and forecast, 2015-2026

6.2.3    Firewall

6.2.3.1    Market estimates and forecast, 2015-2026

6.2.4    Antivirus/Anti-malware

6.2.4.1    Market estimates and forecast, 2015-2026

6.2.5    Intrusion detection and prevention

6.2.5.1    Market estimates and forecast, 2015-2026

6.2.6    Identity and access management (IAM)

6.2.6.1    Market estimates and forecast, 2015-2026

6.2.7    Distributed Denial of Service (DDoS) solution

6.2.7.1    Market estimates and forecast, 2015-2026

6.2.8    Data loss prevention (DLP)

6.2.8.1    Market estimates and forecast, 2015-2026

6.2.9    Virtualization security

6.2.9.1    Market estimates and forecast, 2015-2026

6.2.10    Security information and event management

6.2.10.1  Market estimates and forecast, 2015-2026

6.2.11    Unified threat management

6.2.11.1  Market estimates and forecast, 2015-2026

6.2.12    Other

6.2.12.1  Market estimates and forecast, 2015-2026

6.3    Service

6.3.1    Market estimates and forecast, 2015-2026

6.3.2    Managed service

6.3.2.1    Market estimates and forecast, 2015-2026

6.3.3    Integration & consulting

6.3.3.1    Market estimates and forecast, 2015-2026

6.3.4    Audit & reporting

6.3.4.1    Market estimates and forecast, 2015-2026

6.3.5    Risk management

6.3.5.1    Market estimates and forecast, 2015-2026

Chapter 7    ICS Security Market, By Application

7.1    ICS security market, key trends, by application

7.2    Power & energy

7.2.1    Market estimates and forecast, 2015-2026

7.3    Critical manufacturing

7.3.1    Market estimates and forecast, 2015-2026

7.4    Mining

7.4.1    Market estimates and forecast, 2015-2026

7.5    Water utility

7.5.1    Market estimates and forecast, 2015-2026

7.6    Transportation

7.6.1    Market estimates and forecast, 2015-2026

7.7    Chemical

7.7.1    Market estimates and forecast, 2015-2026

7.8    Other applications

7.8.1    Market estimates and forecast, 2015-2026

Chapter 8    ICS Security Market, By Region

8.1    ICS security market, key trends by region

8.2    North America

8.2.1    North America ICS security market, by security type

8.2.2    North America ICS security market, by component

8.2.3    North America ICS security market, by solution

8.2.4    North America ICS security market, by service

8.2.5    North America ICS security market, by application

8.2.6    U.S.

8.2.6.1    Key initiatives and news

8.2.6.2    U.S. ICS security market, by security type

8.2.6.3    U.S. ICS security market, by component

8.2.6.4    U.S. ICS security market, by solution

8.2.6.5    U.S. ICS security market, by service

8.2.6.6    U.S. ICS security market, by application

8.2.7    Canada

8.2.7.1    Key initiatives and news

8.2.7.2    Canada ICS security market, by security type

8.2.7.3    Canada ICS security market, by component

8.2.7.4    Canada ICS security market, by solution

8.2.7.5    Canada ICS security market, by service

8.2.7.6    Canada ICS security market, by application

8.3    Europe

8.3.1    Europe ICS security market, by security type

8.3.2    Europe ICS security market, by component

8.3.3    Europe ICS security market, by solution

8.3.4    Europe ICS security market, by service

8.3.5    Europe ICS security market, by application

8.3.6    UK

8.3.6.1    Key initiatives and news

8.3.6.2    UK ICS security market, by security type

8.3.6.3    UK ICS security market, by component

8.3.6.4    UK ICS security market, by solution

8.3.6.5    UK ICS security market, by service

8.3.6.6    UK ICS security market, by application

8.3.7    Germany

8.3.7.1    Key initiatives and news

8.3.7.2    Germany ICS security market, by security type

8.3.7.3    Germany ICS security market, by component

8.3.7.4    Germany ICS security market, by solution

8.3.7.5    Germany ICS security market, by service

8.3.7.6    Germany ICS security market, by application

8.3.8    France

8.3.8.1    Key initiatives and news

8.3.8.2    France ICS security market, by security type

8.3.8.3    France ICS security market, by component

8.3.8.4    France ICS security market, by solution

8.3.8.5    France ICS security market, by service

8.3.8.6    France ICS security market, by application

8.3.9    Italy

8.3.9.1    Key initiatives and news

8.3.9.2    Italy ICS security market, by security type

8.3.9.3    Italy ICS security market, by component

8.3.9.4    Italy ICS security market, by solution

8.3.9.5    Italy ICS security market, by service

8.3.9.6    Italy ICS security market, by application

8.3.10    Spain

8.3.10.1  Key initiatives and news

8.3.10.2  Spain ICS security market, by security type

8.3.10.3  Spain ICS security market, by component

8.3.10.4  Spain ICS security market, by solution

8.3.10.5  Spain ICS security market, by service

8.3.10.6  Spain ICS security market, by application

8.4    Asia Pacific (APAC)

8.4.1    Asia Pacific ICS security market, by security type

8.4.2    Asia Pacific ICS security market, by component

8.4.3    Asia Pacific ICS security market, by solution

8.4.4    Asia Pacific ICS security market, by service

8.4.5    Asia Pacific ICS security market, by application

8.4.6    ANZ

8.4.6.1    Key initiatives and news

8.4.6.2    ANZ ICS security market, by security type

8.4.6.3    ANZ ICS security market, by component

8.4.6.4    ANZ ICS security market, by solution

8.4.6.5    ANZ ICS security market, by service

8.4.6.6    ANZ ICS security market, by application

8.4.7    China

8.4.7.1    Key initiatives and news

8.4.7.2    China ICS security market, by security type

8.4.7.3    China ICS security market, by component

8.4.7.4    China ICS security market, by solution

8.4.7.5    China ICS security market, by service

8.4.7.6    China ICS security market, by application

8.4.8    India

8.4.8.1    Key initiatives and news

8.4.8.2    India ICS security market, by security type

8.4.8.3    India ICS security market, by component

8.4.8.4    India ICS security market, by solution

8.4.8.5    India ICS security market, by service

8.4.8.6    India ICS security market, by application

8.4.9    Japan

8.4.9.1    Key initiatives and news

8.4.9.2    Japan ICS security market, by security type

8.4.9.3    Japan ICS security market, by component

8.4.9.4    Japan ICS security market, by solution

8.4.9.5    Japan ICS security market, by service

8.4.9.6    Japan ICS security market, by application

8.4.10    South Korea

8.4.10.1  Key initiatives and news

8.4.10.2  South Korea ICS security market, by security type

8.4.10.3  South Korea ICS security market, by component

8.4.10.4  South Korea ICS security market, by solution

8.4.10.5  South Korea ICS security market, by service

8.4.10.6  South Korea ICS security market, by application

8.5    LAMEA

8.5.1    LAMEA ICS security market, by security type

8.5.2    LAMEA ICS security market, by component

8.5.3    LAMEA ICS security market, by solution

8.5.4    LAMEA ICS security market, by service

8.5.5    LAMEA ICS security market, by application

8.5.6    Mexico

8.5.6.1    Key initiatives and news

8.5.6.2    Mexico ICS security market, by security type

8.5.6.3    Mexico ICS security market, by component

8.5.6.4    Mexico ICS security market, by solution

8.5.6.5    Mexico ICS security market, by service

8.5.6.6    Mexico ICS security market, by application

8.5.7    Brazil

8.5.7.1    Key initiatives and news

8.5.7.2    Brazil ICS security market, by security type

8.5.7.3    Brazil ICS security market, by component

8.5.7.4    Brazil ICS security market, by solution

8.5.7.5    Brazil ICS security market, by service

8.5.7.6    Brazil ICS security market, by application

8.5.8    South Africa

8.5.8.1    Key initiatives and news

8.5.8.2    South Africa ICS security market, by security type

8.5.8.3    South Africa ICS security market, by component

8.5.8.4    South Africa ICS security market, by solution

8.5.8.5    South Africa ICS security market, by service

8.5.8.6    South Africa ICS security market, by application

8.5.9    GCC

8.5.9.1    Key initiatives and news

8.5.9.2    GCC ICS security market, by security type

8.5.9.3    GCC ICS security market, by component

8.5.9.4    GCC ICS security market, by solution

8.5.9.5    GCC ICS security market, by service

8.5.9.6    GCC ICS security market, by application

8.5.10    Argentina

8.5.10.1  Argentina ICS security market, by security type

8.5.10.2  Argentina ICS security market, by component

8.5.10.3  Argentina ICS security market, by solution

8.5.10.4  Argentina ICS security market, by service

8.5.10.5  Argentina ICS security market, by application

Chapter 9    Company Profiles

9.1    ABB Ltd.

9.1.1    Business Overview

9.1.2    Financial Data (Panasonic Corporation)

9.1.3    Product Landscape

9.1.4    Go-to Market Strategy

9.1.5    SWOT Analysis

9.2    BAE Systems

9.2.1    Business Overview

9.2.2    Financial Data

9.2.3    Product Landscape

9.2.4    Go-to Market Strategy

9.2.5    SWOT Analysis

9.3    Bayshore Networks, Inc.

9.3.1    Business Overview

9.3.2    Financial Data

9.3.3    Product Landscape

9.3.4    Go-to Market Strategy

9.3.5    SWOT Analysis

9.4    Belden, Inc.

9.4.1    Business Overview

9.4.2    Financial Data

9.4.3    Product Landscape

9.4.4    Go to Market Strategy

9.4.5    SWOT Analysis

9.5    Check Point Software Technologies Ltd.

9.5.1    Business Overview

9.5.2    Financial Data

9.5.3    Product Landscape

9.5.4    Go to market strategy

9.5.5    SWOT Analysis

9.6    Cisco Systems, Inc.

9.6.1    Business Overview

9.6.2    Financial Data

9.6.3    Product Landscape

9.6.4    Strategic Outlook

9.6.5    SWOT Analysis

9.7    Cyberbit

9.7.1    Business Overview

9.7.2    Financial Data

9.7.3    Product Landscape

9.7.4    Go to Market Strategy

9.7.5    SWOT Analysis

9.8    Dragos, Inc.

9.8.1    Business Overview

9.8.2    Financial Data

9.8.3    Product Landscape

9.8.4    Go to Market Strategy

9.8.5    SWOT Analysis

9.9    FireEye, Inc.

9.9.1    Business Overview

9.9.2    Financial Data

9.9.3    Product Landscape

9.9.4    Go-to Market Strategy

9.9.5    SWOT Analysis

9.10   Fortinet, Inc.

9.10.1    Business Overview

9.10.2    Financial Data

9.10.3    Product Landscape

9.10.4    Go to Market Strategy

9.10.5    SWOT Analysis

9.11   General Electric Company

9.11.1    Business Overview

9.11.2    Financial Data

9.11.3    Product Landscape

9.11.4    Go to Market Strategy

9.11.5    SWOT Analysis

9.12   Honeywell International, Inc.

9.12.1    Business Overview

9.12.2    Financial Data

9.12.3    Product Landscape

9.12.4    Go to Market Strategy

9.12.5    SWOT Analysis

9.13   IBM Corporation

9.13.1    Business Overview

9.13.2    Financial Data

9.13.3    Product Landscape

9.13.4    Go to Market Strategy

9.13.5    SWOT Analysis

9.14   Kaspersky Labs

9.14.1    Business Overview

9.14.2    Financial Data

9.14.3    Product Landscape

9.14.4    Go to Market Strategy

9.14.5    SWOT Analysis

9.15   McAfee, LLC

9.15.1    Business Overview

9.15.2    Financial Data

9.15.3    Product Landscape

9.15.4    Go to Market Strategy

9.15.5    SWOT Analysis

9.16   Nozomi Networks, Inc.

9.16.1    Business Overview

9.16.2    Financial Data

9.16.3    Product Landscape

9.16.4    Go to Market Strategy

9.16.5    SWOT Analysis

9.17   OT Claroty Ltd.

9.17.1    Business Overview

9.17.2    Financial Data

9.17.3    Product Landscape

9.17.4    Go to Market Strategy

9.17.5    SWOT Analysis

9.18   Rolloos Industries B.V.

9.18.1    Business Overview

9.18.2    Financial Data

9.18.3    Product Landscape

9.18.4    Go to Market Strategy

9.18.5    SWOT Analysis

9.19   Raytheon Company

9.19.1    Business Overview

9.19.2    Financial Data

9.19.3    Product Landscape

9.19.4    Go-to Market Strategy

9.19.5    SWOT Analysis

9.20   Rockwell Automation, Inc.

9.20.1    Business Overview

9.20.2    Financial Data

9.20.3    Product Landscape

9.20.4    Strategic Outlook

9.20.5    SWOT Analysis

9.21   Schneider Electric

9.21.1    Business Overview

9.21.2    Financial Data

9.21.3    Product Landscape

9.21.4    Go-to Market Strategy

9.21.5    SWOT Analysis

9.22   SecurityMatters (Forescout Technologies Inc.)

9.22.1    Business Overview

9.22.2    Financial Data (Forescout Technologies Inc.)

9.22.3    Product Landscape

9.22.4    Strategic Outlook

9.22.5    SWOT Analysis

9.23   Siemens AG

9.23.1    Business Overview

9.23.2    Financial Data

9.23.3    Product Landscape

9.23.4    Go to market strategy

9.23.5    SWOT Analysis

9.24   Accenture plc (Symantec Corporation)

9.24.1    Business Overview

9.24.2    Financial Data (Accenture PLC)

9.24.3    Product Landscape

9.24.4    Go to Market Strategy

9.24.5    SWOT Analysis

9.25   Trend Micro, Inc.

9.25.1    Business Overview

9.25.2    Financial Data

9.25.3    Product Landscape

9.25.4    Go to Market Strategy

9.25.5    SWOT Analysis
 

Data Tables

TABLE 1    Global ICS security market, by security type, 2019

TABLE 2    Siemens AG snapshot, 2019

TABLE 3    ICS security market, 2015 – 2019, (USD Million)

TABLE 4    ICS security market, 2015 – 2019, (USD Million)

TABLE 5    ICS security market, by region, 2015-2019, (USD Million)

TABLE 6    ICS security market, by region, 2020-2026, (USD Million)

TABLE 7    ICS security market, by security type, 2015-2019, (USD Million)

TABLE 8    ICS security market, by security type, 2020-2026, (USD Million)

TABLE 9    ICS security market, by component, 2015-2019, (USD Million)

TABLE 10    ICS security market, by component, 2020-2026, (USD Million)

TABLE 11    ICS security market, by application, 2015-2019, (USD Million)

TABLE 12    ICS security market, by application, 2020-2026, (USD Million)

TABLE 13    Vendor matrix

TABLE 14    Network security market, 2015-2019, (USD Million)

TABLE 15    Network security market, 2020-2026, (USD Million)

TABLE 16    Application security market, 2015-2019, (USD Million)

TABLE 17    Application security market, 2020-2026, (USD Million)

TABLE 18    Endpoint security market, 2015-2019, (USD Million)

TABLE 19    Endpoint security market, 2020-2026, (USD Million)

TABLE 20    Database security market, 2015-2019, (USD Million)

TABLE 21    Database security market, 2020-2026, (USD Million)

TABLE 22    Solution market, 2015-2019, (USD Million)

TABLE 23    Solution market, 2020-2026, (USD Million)

TABLE 24    SCADA market, 2015-2019, (USD Million)

TABLE 25    SCADA market, 2020-2026, (USD Million)

TABLE 26    Firewall market, 2015-2019, (USD Million)

TABLE 27    Firewall market, 2020-2026, (USD Million)

TABLE 28    Antivirus/anti-malware market, 2015-2019, (USD Million)

TABLE 29    Antivirus/anti-malware market, 2020-2026, (USD Million)

TABLE 30    IDPS market, 2015-2019, (USD Million)

TABLE 31    IDPS market, 2020-2026, (USD Million)

TABLE 32    IAM market, 2015-2019, (USD Million)

TABLE 33    IAM market, 2020-2026, (USD Million)

TABLE 34    DDoS market, 2015-2019, (USD Million)

TABLE 35    DDoS market, 2020-2026, (USD Million)

TABLE 36    DLP market, 2015-2019, (USD Million)

TABLE 37    DLP market, 2020-2026, (USD Million)

TABLE 38    Virtualization security market, 2015-2019, (USD Million)

TABLE 39    Virtualization security market, 2020-2026, (USD Million)

TABLE 40    SIEM market, 2015-2019, (USD Million)

TABLE 41    SIEM market, 2020-2026, (USD Million)

TABLE 42    UTM market, 2015-2019, (USD Million)

TABLE 43    UTM market, 2020-2026, (USD Million)

TABLE 44    Others market, 2015-2019, (USD Million)

TABLE 45    Others market, 2020-2026, (USD Million)

TABLE 46    Service market, 2015-2019, (USD Million)

TABLE 47    Service market, 2020-2026, (USD Million)

TABLE 48    Managed service market, 2015-2019, (USD Million)

TABLE 49    Managed service market, 2020-2026, (USD Million)

TABLE 50    Integration & consulting market, 2015-2019, (USD Million)

TABLE 51    Integration & consulting market, 2020-2026, (USD Million)

TABLE 52    Audit & reporting market, 2015-2019, (USD Million)

TABLE 53    Audit & reporting market, 2020-2026, (USD Million)

TABLE 54    Risk management market, 2015-2019, (USD Million)

TABLE 55    Risk management market, 2020-2026, (USD Million)

TABLE 56    Power & energy market, 2015-2019, (USD Million)

TABLE 57    Power & energy market, 2020-2026, (USD Million)

TABLE 58    Critical manufacturing market, 2015-2019, (USD Million)

TABLE 59    Critical manufacturing market, 2020-2026, (USD Million)

TABLE 60    Mining market, 2015-2019, (USD Million)

TABLE 61    Mining market, 2020-2026, (USD Million)

TABLE 62    Water utility market, 2015-2019, (USD Million)

TABLE 63    Water utility market, 2020-2026, (USD Million)

TABLE 64    Transportation market, 2015-2019, (USD Million)

TABLE 65    Transportation market, 2020-2026, (USD Million)

TABLE 66    Chemical market, 2015-2019, (USD Million)

TABLE 67    Chemical market, 2020-2026, (USD Million)

TABLE 68    Others market, 2015-2019, (USD Million)

TABLE 69    Others market, 2020-2026, (USD Million)

TABLE 70    North America market, by security type, 2015-2019, (USD Million)

TABLE 71    North America market, by security type, 2020-2026, (USD Million)

TABLE 72    North America market, by component, 2015-2019, (USD Million)

TABLE 73    North America market, by component, 2020-2026, (USD Million)

TABLE 74    North America market, by solution, 2015-2019, (USD Million)

TABLE 75    North America market, by solution, 2020-2026, (USD Million)

TABLE 76    North America market, by service, 2015-2019, (USD Million)

TABLE 77    North America market, by service, 2020-2026, (USD Million)

TABLE 78    North America market, by application, 2015-2019, (USD Million)

TABLE 79    North America market, by application, 2020-2026, (USD Million)

TABLE 80    U.S. market, by security type, 2015-2019, (USD Million)

TABLE 81    U.S. market, by security type, 2020-2026, (USD Million)

TABLE 82    U.S. market, by component, 2015-2019, (USD Million)

TABLE 83    U.S. market, by component, 2020-2026, (USD Million)

TABLE 84    U.S. market, by solution, 2015-2019, (USD Million)

TABLE 85    U.S. market, by solution, 2020-2026, (USD Million)

TABLE 86    U.S. market, by service, 2015-2019, (USD Million)

TABLE 87    U.S. market, by service, 2020-2026, (USD Million)

TABLE 88    U.S. market, by application, 2015-2019, (USD Million)

TABLE 89    U.S. market, by application, 2020-2026, (USD Million)

TABLE 90    Canada market, by security type, 2015-2019, (USD Million)

TABLE 91    Canada market, by security type, 2020-2026, (USD Million)

TABLE 92    Canada market, by component, 2015-2019, (USD Million)

TABLE 93    Canada market, by component, 2020-2026, (USD Million)

TABLE 94    Canada market, by solution, 2015-2019, (USD Million)

TABLE 95    Canada market, by solution, 2020-2026, (USD Million)

TABLE 96    Canada market, by service, 2015-2019, (USD Million)

TABLE 97    Canada market, by service, 2020-2026, (USD Million)

TABLE 98    Canada market, by application, 2015-2019, (USD Million)

TABLE 99    Canada market, by application, 2020-2026, (USD Million)

TABLE 100   Europe market, by security type, 2015-2019, (USD Million)

TABLE 101   Europe market, by security type, 2020-2026, (USD Million)

TABLE 102   Europe market, by component, 2015-2019, (USD Million)

TABLE 103   Europe market, by component, 2020-2026, (USD Million)

TABLE 104   Europe market, by solution, 2015-2019, (USD Million)

TABLE 105   Europe market, by solution, 2020-2026, (USD Million)

TABLE 106   Europe market, by service, 2015-2019, (USD Million)

TABLE 107   Europe market, by service, 2020-2026, (USD Million)

TABLE 108   Europe market, by application, 2015-2019, (USD Million)

TABLE 109   Europe market, by application, 2020-2026, (USD Million)

TABLE 110   UK market, by security type, 2015-2019, (USD Million)

TABLE 111   UK market, by security type, 2020-2026, (USD Million)

TABLE 112   UK market, by component, 2015-2019, (USD Million)

TABLE 113   UK market, by component, 2020-2026, (USD Million)

TABLE 114   UK market, by solution, 2015-2019, (USD Million)

TABLE 115   UK market, by solution, 2020-2026, (USD Million)

TABLE 116   UK market, by service, 2015-2019, (USD Million)

TABLE 117   UK market, by service, 2020-2026, (USD Million)

TABLE 118   UK market, by application, 2015-2019, (USD Million)

TABLE 119   UK market, by application, 2020-2026, (USD Million)

TABLE 120   Germany market, by security type, 2015-2019, (USD Million)

TABLE 121   Germany market, by security type, 2020-2026, (USD Million)

TABLE 122   Germany market, by component, 2015-2019, (USD Million)

TABLE 123   Germany market, by component, 2020-2026, (USD Million)

TABLE 124   Germany market, by solution, 2015-2019, (USD Million)

TABLE 125   Germany market, by solution, 2020-2026, (USD Million)

TABLE 126   Germany market, by service, 2015-2019, (USD Million)

TABLE 127   Germany market, by service, 2020-2026, (USD Million)

TABLE 128   Germany market, by application, 2015-2019, (USD Million)

TABLE 129   Germany market, by application, 2020-2026, (USD Million)

TABLE 130   France market, by security type, 2015-2019, (USD Million)

TABLE 131   France market, by security type, 2020-2026, (USD Million)

TABLE 132   France market, by component, 2015-2019, (USD Million)

TABLE 133   France market, by component, 2020-2026, (USD Million)

TABLE 134   France market, by solution, 2015-2019, (USD Million)

TABLE 135   France market, by solution, 2020-2026, (USD Million)

TABLE 136   France market, by service, 2015-2019, (USD Million)

TABLE 137   France market, by service, 2020-2026, (USD Million)

TABLE 138   France market, by application, 2015-2019, (USD Million)

TABLE 139   France market, by application, 2020-2026, (USD Million)

TABLE 140   Italy market, by security type, 2015-2019, (USD Million)

TABLE 141   Italy market, by security type, 2020-2026, (USD Million)

TABLE 142   Italy market, by component, 2015-2019, (USD Million)

TABLE 143   Italy market, by component, 2020-2026, (USD Million)

TABLE 144   Italy market, by solution, 2015-2019, (USD Million)

TABLE 145   Italy market, by solution, 2020-2026, (USD Million)

TABLE 146   Italy market, by service, 2015-2019, (USD Million)

TABLE 147   Italy market, by service, 2020-2026, (USD Million)

TABLE 148   Italy market, by application, 2015-2019, (USD Million)

TABLE 149   Italy market, by application, 2020-2026, (USD Million)

TABLE 150   Spain market, by security type, 2015-2019, (USD Million)

TABLE 151   Spain market, by security type, 2020-2026, (USD Million)

TABLE 152   Spain market, by component, 2015-2019, (USD Million)

TABLE 153   Spain market, by component, 2020-2026, (USD Million)

TABLE 154   Spain market, by solution, 2015-2019, (USD Million)

TABLE 155   Spain market, by solution, 2020-2026, (USD Million)

TABLE 156   Spain market, by service, 2015-2019, (USD Million)

TABLE 157   Spain market, by service, 2020-2026, (USD Million)

TABLE 158   Spain market, by application, 2015-2019, (USD Million)

TABLE 159   Spain market, by application, 2020-2026, (USD Million)

TABLE 160   Asia Pacific market, by security type, 2015-2019, (USD Million)

TABLE 161   Asia Pacific market, by security type, 2020-2026, (USD Million)

TABLE 162   Asia Pacific market, by component, 2015-2019, (USD Million)

TABLE 163   Asia Pacific market, by component, 2020-2026, (USD Million)

TABLE 164   Asia Pacific market, by solution, 2015-2019, (USD Million)

TABLE 165   Asia Pacific market, by solution, 2020-2026, (USD Million)

TABLE 166   Asia Pacific market, by service, 2015-2019, (USD Million)

TABLE 167   Asia Pacific market, by service, 2020-2026, (USD Million)

TABLE 168   Asia Pacific market, by application, 2015-2019, (USD Million)

TABLE 169   Asia Pacific market, by application, 2020-2026, (USD Million)

TABLE 170   ANZ market, by security type, 2015-2019, (USD Million)

TABLE 171   ANZ market, by security type, 2020-2026, (USD Million)

TABLE 172   ANZ market, by component, 2015-2019, (USD Million)

TABLE 173   ANZ market, by component, 2020-2026, (USD Million)

TABLE 174   ANZ market, by solution, 2015-2019, (USD Million)

TABLE 175   ANZ market, by solution, 2020-2026, (USD Million)

TABLE 176   ANZ market, by service, 2015-2019, (USD Million)

TABLE 177   ANZ market, by service, 2020-2026, (USD Million)

TABLE 178   ANZ market, by application, 2015-2019, (USD Million)

TABLE 179   ANZ market, by application, 2020-2026, (USD Million)

TABLE 180   China market, by security type, 2015-2019, (USD Million)

TABLE 181   China market, by security type, 2020-2026, (USD Million)

TABLE 182   China market, by component, 2015-2019, (USD Million)

TABLE 183   China market, by component, 2020-2026, (USD Million)

TABLE 184   China market, by solution, 2015-2019, (USD Million)

TABLE 185   China market, by solution, 2020-2026, (USD Million)

TABLE 186   China market, by service, 2015-2019, (USD Million)

TABLE 187   China market, by service, 2020-2026, (USD Million)

TABLE 188   China market, by application, 2015-2019, (USD Million)

TABLE 189   China market, by application, 2020-2026, (USD Million)

TABLE 190   India market, by security type, 2015-2019, (USD Million)

TABLE 191   India market, by security type, 2020-2026, (USD Million)

TABLE 192   India market, by component, 2015-2019, (USD Million)

TABLE 193   India market, by component, 2020-2026, (USD Million)

TABLE 194   India market, by solution, 2015-2019, (USD Million)

TABLE 195   India market, by solution, 2020-2026, (USD Million)

TABLE 196   India market, by service, 2015-2019, (USD Million)

TABLE 197   India market, by service, 2020-2026, (USD Million)

TABLE 198   India market, by application, 2015-2019, (USD Million)

TABLE 199   India market, by application, 2020-2026, (USD Million)

TABLE 200   Japan market, by security type, 2015-2019, (USD Million)

TABLE 201   Japan market, by security type, 2020-2026, (USD Million)

TABLE 202   Japan market, by component, 2015-2019, (USD Million)

TABLE 203   Japan market, by component, 2020-2026, (USD Million)

TABLE 204   Japan market, by solution, 2015-2019, (USD Million)

TABLE 205   Japan market, by solution, 2020-2026, (USD Million)

TABLE 206   Japan market, by service, 2015-2019, (USD Million)

TABLE 207   Japan market, by service, 2020-2026, (USD Million)

TABLE 208   Japan market, by application, 2015-2019, (USD Million)

TABLE 209   Japan market, by application, 2020-2026, (USD Million)

TABLE 210   South Korea market, by security type, 2015-2019, (USD Million)

TABLE 211   South Korea market, by security type, 2020-2026, (USD Million)

TABLE 212   South Korea market, by component, 2015-2019, (USD Million)

TABLE 213   South Korea market, by component, 2020-2026, (USD Million)

TABLE 214   South Korea market, by solution, 2015-2019, (USD Million)

TABLE 215   South Korea market, by solution, 2020-2026, (USD Million)

TABLE 216   South Korea market, by service, 2015-2019, (USD Million)

TABLE 217   South Korea market, by service, 2020-2026, (USD Million)

TABLE 218   South Korea market, by application, 2015-2019, (USD Million)

TABLE 219   South Korea market, by application, 2020-2026, (USD Million)

TABLE 220   LAMEA market, by security type, 2015-2019, (USD Million)

TABLE 221   LAMEA market, by security type, 2020-2026, (USD Million)

TABLE 222   LAMEA market, by component, 2015-2019, (USD Million)

TABLE 223   LAMEA market, by component, 2020-2026, (USD Million)

TABLE 224   LAMEA market, by solution, 2015-2019, (USD Million)

TABLE 225   LAMEA market, by solution, 2020-2026, (USD Million)

TABLE 226   LAMEA market, by service, 2015-2019, (USD Million)

TABLE 227   LAMEA market, by service, 2020-2026, (USD Million)

TABLE 228   LAMEA market, by application, 2015-2019, (USD Million)

TABLE 229   LAMEA market, by application, 2020-2026, (USD Million)

TABLE 230   Mexico market, by security type, 2015-2019, (USD Million)

TABLE 231   Mexico market, by security type, 2020-2026, (USD Million)

TABLE 232   Mexico market, by component, 2015-2019, (USD Million)

TABLE 233   Mexico market, by component, 2020-2026, (USD Million)

TABLE 234   Mexico market, by solution, 2015-2019, (USD Million)

TABLE 235   Mexico market, by solution, 2020-2026, (USD Million)

TABLE 236   Mexico market, by service, 2015-2019, (USD Million)

TABLE 237   Mexico market, by service, 2020-2026, (USD Million)

TABLE 238   Mexico market, by application, 2015-2019, (USD Million)

TABLE 239   Mexico market, by application, 2020-2026, (USD Million)

TABLE 240   Brazil market, by security type, 2015-2019, (USD Million)

TABLE 241   Brazil market, by security type, 2020-2026, (USD Million)

TABLE 242   Brazil market, by component, 2015-2019, (USD Million)

TABLE 243   Brazil market, by component, 2020-2026, (USD Million)

TABLE 244   Brazil market, by solution, 2015-2019, (USD Million)

TABLE 245   Brazil market, by solution, 2020-2026, (USD Million)

TABLE 246   Brazil market, by service, 2015-2019, (USD Million)

TABLE 247   Brazil market, by service, 2020-2026, (USD Million)

TABLE 248   Brazil market, by application, 2015-2019, (USD Million)

TABLE 249   Brazil market, by application, 2020-2026, (USD Million)

TABLE 250   South Africa market, by security type, 2015-2019, (USD Million)

TABLE 251   South Africa market, by security type, 2020-2026, (USD Million)

TABLE 252   South Africa market, by component, 2015-2019, (USD Million)

TABLE 253   South Africa market, by component, 2020-2026, (USD Million)

TABLE 254   South Africa market, by solution, 2015-2019, (USD Million)

TABLE 255   South Africa market, by solution, 2020-2026, (USD Million)

TABLE 256   South Africa market, by service, 2015-2019, (USD Million)

TABLE 257   South Africa market, by service, 2020-2026, (USD Million)

TABLE 258   South Africa market, by application, 2015-2019, (USD Million)

TABLE 259   South Africa market, by application, 2020-2026, (USD Million)

TABLE 260   GCC market, by security type, 2015-2019, (USD Million)

TABLE 261   GCC market, by security type, 2020-2026, (USD Million)

TABLE 262   GCC market, by component, 2015-2019, (USD Million)

TABLE 263   GCC market, by component, 2020-2026, (USD Million)

TABLE 264   GCC market, by solution, 2015-2019, (USD Million)

TABLE 265   GCC market, by solution, 2020-2026, (USD Million)

TABLE 266   GCC market, by service, 2015-2019, (USD Million)

TABLE 267   GCC market, by service, 2020-2026, (USD Million)

TABLE 268   GCC market, by application, 2015-2019, (USD Million)

TABLE 269   GCC market, by application, 2020-2026, (USD Million)

TABLE 270   Argentina market, by security type, 2015-2019, (USD Million)

TABLE 271   Argentina market, by security type, 2020-2026, (USD Million)

TABLE 272   Argentina market, by component, 2015-2019, (USD Million)

TABLE 273   Argentina market, by component, 2020-2026, (USD Million)

TABLE 274   Argentina market, by solution, 2015-2019, (USD Million)

TABLE 275   Argentina market, by solution, 2020-2026, (USD Million)

TABLE 276   Argentina market, by service, 2015-2019, (USD Million)

TABLE 277   Argentina market, by service, 2020-2026, (USD Million)

TABLE 278   Argentina market, by application, 2015-2019, (USD Million)

TABLE 279   Argentina market, by application, 2020-2026, (USD Million)

 

Charts & Figures

FIG. 1    ICS security industry industry 3600 synopsis, 2020 – 2026

FIG. 2    Industry segmentation

FIG. 3    ICS security market, 2015- 2026 (USD Million)

FIG. 4    ICS security industry ecosystem

FIG. 5    Porter’s analysis

FIG. 6    PESTEL analysis

FIG. 7    Growth potential analysis

FIG. 8    Company analysis of market leaders, 2019

FIG. 9    Company analysis of other prominent vendors, 2019

FIG. 10    SWOT Analysis, ABB Ltd.

FIG. 11    SWOT Analysis, Schneider Electric

FIG. 12    SWOT Analysis, Bayshore Networks, Inc.

FIG. 13    SWOT Analysis, Belden, Inc.

FIG. 14    SWOT Analysis, Check Point Security Technologies Ltd.

FIG. 15    SWOT Analysis, Cisco Systems Inc.

FIG. 16    SWOT Analysis, Cyberbit

FIG. 17    SWOT Analysis, Dragos Inc.

FIG. 18    SWOT Analysis, FireEye, Inc.

FIG. 19    SWOT Analysis, Fortinet, Inc.

FIG. 20    SWOT Analysis, General Electric

FIG. 21    SWOT Analysis, Honeywell International, Inc.

FIG. 22    SWOT Analysis, IBM Corporation

FIG. 23    SWOT Analysis, Kaspersky Lab

FIG. 24    SWOT Analysis, McAfee LLC

FIG. 25    SWOT Analysis, Nozomi Networks, Inc.

FIG. 26    SWOT Analysis, OT Claroty Ltd.

FIG. 27    SWOT Analysis, Rolloos Industries

FIG. 28    SWOT Analysis, Raytheon Company

FIG. 29    SWOT Analysis, Rockwell Automation

FIG. 30    SWOT Analysis, Schneider Electric

FIG. 31    SWOT Analysis, SecurityMatters

FIG. 32    SWOT Analysis, Siemens AG

FIG. 33    SWOT Analysis, Symantec Corporation (Accenture PLC)

FIG. 34    SWOT Analysis, Trend Micro
 

Buy NowImmediate delivery available

Need a Discount? Get in touch with us for special pricing

Request Discount

Connect with our sales team

Premium Report Details

  • Published Date: Jun 2020
  • Pages: 316
  • Tables: 279
  • Charts / Figures: 34
  • Companies covered: 25
  • Countries covered: 17

Benefits of Association

Data Coverage & Quality

GMI reports provide the most comprehensive coverage of any focus industry, ensuring a holistic and deep understanding of the market, along with actionable and granular data. We also take pride in our commitment to quality and strive to ensure that our clients get their moneys worth.

Client Trust & Security

GMI maintains strict code of conduct as a business and is committed to ensure that the privacy and trust of our clients are always maintained. As an organization, we also strive to be fully compliant with privacy laws, PCI and information security guidelines.

Customer Service

Our customers rely on us to produce accurate, reliable and timely information. Service orientation is a key mission for us as an organization; our process is guided by the desire to ensure that our clients are provided the best possible solutions in optimal timeframe. GMI stands by its commitment to service, providing timely assistance in both pre-sales and post-sales support for our clients.

GMIPulse, our report store

We have introduced ‘GMIPulse’, which is our report store; designed to offer clients a one-stop platform for all market research and business intelligence requirements. Clients can access reports, presentations, raw data excel sheets as well as detailed company profiles. GMIPulse allows you to track relevant industries and stay informed with latest innovation, competitive and regulatory developments to help design strategic framework.

Chat with us
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More info X