¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.
Áß¿ä ÀÎÇÁ¶ó(CI) º¸¾È¿¡ ´ëÇÑ ÁöÃâ µ¿ÇâÀ» Á¶»çÇßÀ¸¸ç, CI µðÁöÅÐ º¸¾È¿¡ ´ëÇÑ ÁöÃâ¾×ÀÇ ÃßÀÌ¡¤¿¹Ãø, »ê¾÷¡¤»ç¾÷ÀÚ ±¸ºÐ¡¤Áö¿ª µî °¢Á¾ ±¸ºÐº° »ó¼¼ ºÐ¼® µîÀ» Á¤¸®ÇÏ¿© ÀüÇØµå¸³´Ï´Ù.
½ÃÇà °¡´ÉÇÑ ÀÌÁ¡
- Áß¿ä ÀÎÇÁ¶ó(CI)¿¡¼ µðÁöÅÐ º¸¾È ÁöÃâÀÇ ºÐ¾ß¸¦ ½Äº°ÇÒ ¼ö ÀÖ½À´Ï´Ù.
- ´Ù¾çÇÑ Áß¿ä ºÎ¹®ÀÇ º¸¾È ¿¹»êÀ» Æò°¡ÇÒ ¼ö ÀÖ½À´Ï´Ù.
- CI ±¸ºÐ¡¤»ç¾÷ÀÚ ±¸ºÐº° ÁöÃâ µ¿Çâ¿¡ ±â¹ÝÇÏ¿© º¸¾È ÆÇ¸Å Àü·«À» ÃÖÀûÈÇÒ ¼ö ÀÖ½À´Ï´Ù.
Áß¿äÇÑ Áú¹®¿¡ ´ëÇÑ ´äº¯ :
- ´Ù¾çÇÑ CI ºÎ¹®ÀÌ µðÁöÅÐ º¸¾È¿¡ ÁöÃâÇÏ´Â ±Ý¾×Àº ¾î´À Á¤µµÀΰ¡?
- ÁöÃâ µ¿Çâ : ¾î´À »ç¾÷ÀÚ°¡ ¾î´À Á¦Ç°¿¡ ¾î´À Áö¿ª ¹× ±¹°¡¿¡¼ ÁöÃâÇϴ°¡?
- µðÁöÅÐ º¸¾È¿¡ ´ëÇÑ ÁöÃâ ÆÐÅÏÀº ¿¹Ãø ±â°£ Áß ¾î¶»°Ô º¯ÈÇϴ°¡? ¶ÇÇÑ º¸¾È ¼ö¿ä¿¡ °üÇØ¼´Â ¾î¶²°¡?
Á¶»ç ÇÏÀ̶óÀÌÆ® :
- CI º¸¾È ÁöÃâÀÇ »óÀ§ µ¿ÇâÀÇ °³¿ä
- ¿î¿µ ±â¼ú(OT) ¹× IoT º¸¾ÈÀÇ °í¼öÁØ ³»¿ª
- ¿¹Ãø ¹æ¹ýÀÇ »ó¼¼
¸ñÂ÷
ÁÖ¿ä Á¶»ç °á°ú
½ÅÂø Á¤º¸
Á¶»ç ¹æ¹ý
¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó º¸¾È ÁöÃâÀÇ ¿¹Ãø : ºÎ¹®º°
Áß¿ä ÀÎÇÁ¶ó º¸¾È ÁöÃâÀÇ °í¾× ÁöÃâÀÚ
¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó º¸¾È ÁöÃâÀÇ ¿¹Ãø : À¯Çüº°
¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó º¸¾È ÁöÃâÀÇ ¿¹Ãø : Áö¿ªº°
¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó OT IoT º¸¾È¿¡ ´ëÇÑ ÁöÃâÀÇ ¿¹Ãø : ºÎ¹®º°
¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó OT IoT º¸¾È¿¡ ´ëÇÑ ÁöÃâÀÇ ¿¹Ãø : ÇÏÀ§ ºÎ¹®º°
Áß¿ä »ê¾÷ ÀÎÇÁ¶óÀÇ º¸¾È ÁöÃâ
KSA 24.11.19
Actionable Benefits:
- Identify areas of digital security spending in Critical Infrastructure (CI).
- Assess security budgets in various critical sectors.
- Optimize security sales strategies based on spending trends by CI and by operator.
Critical Questions Answered:
- How much will different CI sectors spend on digital security?
- What are the spending trends: which operators will be spending, what products will they be focusing on, and in which regions and countries?
- How are digital security spending patterns changing across the forecast period and with regard to security demand?
Research Highlights:
- An overview of the top trends in CI security spending.
- High-level breakouts in Operational Technology (OT) & Internet of Things (IoT) security.
- A detailed description of the forecasting methodology.
Who Should Read This?
- Digital security vendors to understand target markets in CI.
- CI operators to optimize security budgets.
- Decision makers within governments and regulatory bodies in order to ensure proper spending and budget allocation for CI protection.
TABLE OF CONTENTS
Key Findings
Whats New
Methodology
Critical Infrastructure Security Spending Global Forecast by Sector
Critical Infrastructure Security Spending High Spenders
Critical Infrastructure Security Spending Global Forecast by Type
Critical Infrastructure Security Spending Global Forecast by Region
Critical Infrastructure Spending in OT IoT Security Global Forecast by Sector
Critical Infrastructure Spending in OT IoT Security Global Forecast by Sub-Sector
Industrial Critical Infrastructure Security Spending