½ÃÀ庸°í¼­
»óǰÄÚµå
1540947

¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀå º¸°í¼­ : ±¸¼º¿ä¼Ò, ÃÖÁ¾»ç¿ëÀÚ, Áö¿ªº°(2024-2032³â)

Critical Infrastructure Protection Market Report by Component, End User, and Region 2024-2032

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IMARC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 141 Pages | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀå ±Ô¸ð´Â 2023³â 1,426¾ï ´Þ·¯¿¡ ´ÞÇß½À´Ï´Ù. ÇâÈÄ IMARC ±×·ìÀº 2032³â±îÁö ½ÃÀå ±Ô¸ð°¡ 1,885¾ï ´Þ·¯¿¡ ´ÞÇϰí, 2024-2032³â°£ 3.1%ÀÇ ¿¬Æò±Õ ¼ºÀå·ü(CAGR)À» ³ªÅ¸³¾ °ÍÀ¸·Î ¿¹ÃøÇß½À´Ï´Ù.

Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP)´Â ½Ã½ºÅÛ, ÀÚ»ê, ³×Æ®¿öÅ©¸¦ ÀáÀçÀû À§ÇùÀ¸·ÎºÎÅÍ º¸È£Çϱâ À§ÇÑ º¸¾È ¼Ö·ç¼ÇÀ» ¸»ÇÕ´Ï´Ù. ¹æÈ­º®, ID ¹× ¾×¼¼½º °ü¸®, ¸®½ºÅ© ÄÄÇöóÀ̾𽺠°ü¸®, ¾ÈƼ¹ÙÀÌ·¯½º, ħÀÔŽÁö ½Ã½ºÅÛ, ¾Ïȣȭ ½Ã½ºÅÛ µî ´Ù¾çÇÑ ¼Ö·ç¼ÇÀ¸·Î ±¸¼ºµË´Ï´Ù. ÀÌ·¯ÇÑ ½Ã½ºÅÛÀº °ø°ø ¾ÈÀüÀ» À§ÇùÇϰųª ±¹°¡ ¾Èº¸¸¦ °ø°ÝÇϰųª ȯ°æ ÀçÇØ¸¦ À¯¹ßÇÏ´Â »çÀ̹ö °ø°ÝÀ¸·ÎºÎÅÍ Àü·Â¸Á, öµµ, ¿øÀÚ·Â ¹ßÀü¼Ò, ¼ö·Â ¹ßÀü¼Ò °ü·Ã Á¤º¸¸¦ º¸È£Çϸç, CIP ¼Ö·ç¼ÇÀº ¹«¼± ±â¼ú, »ê¾÷ Á¦¾î ½Ã½ºÅÛ(ICS), ¿î¿µ ±â¼ú(OT), °¨½Ã Á¦¾î µ¥ÀÌÅÍ, ¸ð´ÏÅ͸µ ¹× Á¦¾î ½Ã½ºÅÛ(MCS) µî ´Ù¾çÇÑ ºÐ¾ßÀÇ º¸¾È ¼Ö·ç¼ÇÀ¸·Î ±¸¼ºµÇ¾î ÀÖ½À´Ï´Ù. OT), °¨½Ã Á¦¾î ¹× µ¥ÀÌÅÍ ¼öÁý(SCADA) ½Ã½ºÅÛÀ» »ç¿ëÇÏ¿© Ãß°¡ÀûÀÎ º¸¾È Ãë¾àÁ¡À» ³ëÃâ½Ã۰í ÀÖ½À´Ï´Ù.

Àü ¼¼°è ÀÎÇÁ¶ó¸¦ À§ÇùÇÏ´Â º¸¾È Ä§ÇØ ¹× »çÀ̹ö °ø°Ý »ç·Ê°¡ Áõ°¡Çϰí ÀÖ´Â °ÍÀº ½ÃÀå ¼ºÀåÀ» °¡¼ÓÇÏ´Â ÁÖ¿ä ¿äÀÎ Áß ÇϳªÀÔ´Ï´Ù. Á¤ºÎ Á¤º¸ÀÇ º¸¾È°ú ¾ÈÀü¿¡ ´ëÇÑ ¿ì·Á Áõ°¡¿Í ¾÷°è Àü¹ÝÀÇ BYOD(Bring-Your-Own-Devices) Æ®·»µå°¡ È®»êµÇ¸é¼­ CIP ½Ã½ºÅÛ¿¡ ´ëÇÑ ¿ä±¸°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ºü¸£°Ô È®ÀåµÇ´Â ÀÎÅͳݰú »óÈ£ ¿¬°áµÈ ³×Æ®¿öÅ© ¾ÆÅ°ÅØÃ³´Â »çÀ̹ö °ø°£À» º¸È£Çϰí À§Çù¿¡ ´ëÇÑ Ãë¾à¼ºÀ» ÃÖ¼ÒÈ­Çϱâ À§ÇØ ¿¬¹æ Á¤ºÎ¿Í º¸¾È Á¶Á÷¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù. ¶ÇÇÑ »ç¹°ÀÎÅͳÝ(IoT), ºòµ¥ÀÌÅÍ, Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ, ÀΰøÁö´É(AI) ¼Ö·ç¼ÇÀÇ µîÀå°ú °°Àº ´Ù¾çÇÑ ±â¼ú ¹ßÀüµµ ¼ºÀåÀ» °¡¼ÓÇÏ´Â ¿äÀÎÀ¸·Î ÀÛ¿ëÇϰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ¼Ö·ç¼ÇÀº È®À强ÀÌ ¶Ù¾î³ª°í ºñ¿ë È¿À²ÀûÀÎ µ¥ÀÌÅÍ º¸¾È ¼Ö·ç¼ÇÀ» Á¦°øÇϱ⠶§¹®¿¡ CIP ¼Ö·ç¼ÇÀÌ ³Î¸® µµÀԵǰí ÀÖ½À´Ï´Ù. ÀÌ ¿Ü¿¡µµ Á¤º¸ ±â¼ú(IT) ÀÎÇÁ¶ó °³¼±, ¸®½ºÅ© °ü¸® ¼­ºñ½º µµÀÔ Áõ°¡ µîÀÌ ½ÃÀåÀ» ´õ¿í °ßÀÎÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

º» º¸°í¼­¿¡¼­ ´Ù·é ÁÖ¿ä Áú¹®µé

  • 2023³â ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀå ±Ô¸ð´Â?
  • 2024-2032³â ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀåÀÇ ¿¹»ó ¼ºÀå·üÀº?
  • Äڷγª19°¡ ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀå¿¡ ¹ÌÄ¡´Â ¿µÇâÀº?
  • ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀåÀ» À̲ô´Â ÁÖ¿ä ¿äÀÎÀº?
  • ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀåÀÇ ±¸¼º¿ä¼Òº° ½ÃÀå ÇöȲÀº?
  • ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀåÀÇ ÃÖÁ¾ »ç¿ëÀÚº° ºÐ¼®Àº?
  • ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀåÀÇ ÁÖ¿ä Áö¿ªÀº?
  • ¼¼°è Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀåÀÇ ÁÖ¿ä ÁøÃâ ±â¾÷Àº?

¸ñÂ÷

Á¦1Àå ¼­¹®

Á¦2Àå Á¶»ç ¹üÀ§¿Í Á¶»ç ¹æ¹ý

  • Á¶»ç ¸ñÀû
  • ÀÌÇØ°ü°èÀÚ
  • µ¥ÀÌÅÍ ¼Ò½º
    • 1Â÷ Á¤º¸
    • 2Â÷ Á¤º¸
  • ½ÃÀå ÃßÁ¤
    • º¸ÅÒ¾÷ Á¢±Ù
    • Åé´Ù¿î Á¢±Ù
  • Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ¼­·Ð

  • °³¿ä
  • ÁÖ¿ä ¾÷°è µ¿Çâ

Á¦5Àå ¼¼°èÀÇ Áß¿ä ÀÎÇÁ¶ó º¸È£(CIP) ½ÃÀå

  • ½ÃÀå °³¿ä
  • ½ÃÀå ºÐ¼®
  • COVID-19ÀÇ ¿µÇâ
  • ½ÃÀå ¿¹Ãø

Á¦6Àå ½ÃÀå ºÐ¼® : ÄÄÆ÷³ÍÆ®º°

  • ¼Ö·ç¼Ç
    • ½ÃÀå µ¿Çâ
    • ½ÃÀå ºÐ¼® : À¯Çüº°
      • ¹°¸®Àû º¸¾È ¼Ö·ç¼Ç
        • ½ÃÀå µ¿Çâ
        • ½ÃÀå ºÐ¼® : À¯Çüº°
        • ¹°¸®Àû ID ¹× ¾×¼¼½º Á¦¾î ½Ã½ºÅÛ
        • °æ°è ħÀÔ Å½Áö ½Ã½ºÅÛ
        • ºñµð¿À °¨½Ã ½Ã½ºÅÛ
        • ½ºÅ©¸®´× ¹× ½ºÄµ
        • ±âŸ
        • ½ÃÀå ¿¹Ãø
      • »çÀ̹ö º¸¾È ¼Ö·ç¼Ç
        • ½ÃÀå µ¿Çâ
        • ½ÃÀå ºÐ¼® : À¯Çüº°
        • ¾Ïȣȭ
        • ³×Æ®¿öÅ© ¾×¼¼½º Á¦¾î ¹× ¹æÈ­º®
        • À§Çù ÀÎÅÚ¸®Àü½º
        • ±âŸ
        • ½ÃÀå ¿¹Ãø
    • ½ÃÀå ¿¹Ãø
  • ¼­ºñ½º
    • ½ÃÀå µ¿Çâ
    • ½ÃÀå ºÐ¼® : À¯Çüº°
      • ¼³°è ¹× ÅëÇÕ ¼­ºñ½º
      • ÄÁ¼³ÆÃ ¼­ºñ½º
      • ¸®½ºÅ© °ü¸® ¼­ºñ½º
      • À¯Áö°ü¸® ¹× Áö¿ø ¼­ºñ½º
    • ½ÃÀå ¿¹Ãø

Á¦7Àå ½ÃÀå ºÐ¼® : ÃÖÁ¾»ç¿ëÀÚº°

  • ±ÝÀ¶±â°ü
  • Á¤ºÎ
  • ¹æÀ§
  • ¿î¼Û ¹× ¹°·ù
  • ¿¡³ÊÁö ¹× Àü·Â
  • »ó¾÷ ºÎ¹®
  • ±âŸ

Á¦8Àå ½ÃÀå ºÐ¼® : Áö¿ªº°

  • ºÏ¹Ì
    • ¹Ì±¹
    • ij³ª´Ù
  • ¾Æ½Ã¾ÆÅÂÆò¾ç
    • Áß±¹
    • ÀϺ»
    • Àεµ
    • Çѱ¹
    • È£ÁÖ
    • Àεµ³×½Ã¾Æ
    • ±âŸ
  • À¯·´
    • µ¶ÀÏ
    • ÇÁ¶û½º
    • ¿µ±¹
    • ÀÌÅ»¸®¾Æ
    • ½ºÆäÀÎ
    • ·¯½Ã¾Æ
    • ±âŸ
  • ¶óƾ¾Æ¸Þ¸®Ä«
    • ºê¶óÁú
    • ¸ß½ÃÄÚ
    • ±âŸ
  • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
    • ½ÃÀå µ¿Çâ
    • ½ÃÀå ºÐ¼® : ±¹°¡º°
    • ½ÃÀå ¿¹Ãø

Á¦9Àå SWOT ºÐ¼®

  • °³¿ä
  • °­Á¡
  • ¾àÁ¡
  • ±âȸ
  • À§Çù

Á¦10Àå ¹ë·ùüÀÎ ºÐ¼®

Á¦11Àå PorterÀÇ Five Forces ºÐ¼®

  • °³¿ä
  • ¹ÙÀ̾îÀÇ ±³¼··Â
  • °ø±Þ ±â¾÷ÀÇ ±³¼··Â
  • °æÀï Á¤µµ
  • ½Å±Ô ÁøÃâ¾÷üÀÇ À§Çù
  • ´ëüǰÀÇ À§Çù

Á¦12Àå °¡°Ý ºÐ¼®

Á¦13Àå °æÀï ±¸µµ

  • ½ÃÀå ±¸Á¶
  • ÁÖ¿ä ±â¾÷
  • ÁÖ¿ä ±â¾÷ °³¿ä
    • BAE Systems PLC
    • Lockheed Martin Corporation
    • General Dynamics Corporation
    • Northrop Grumman Corporation
    • Honeywell International Inc.
    • Airbus SE
    • Hexagon AB
    • Waterfall Security Solutions
    • General Electric Company
    • McAfee Inc.(TPG Capital and Intel Corporation)
    • Raytheon Company(United Technologies Corporation)
LSH 24.09.03

The global critical infrastructure protection market size reached US$ 142.6 Billion in 2023. Looking forward, IMARC Group expects the market to reach US$ 188.5 Billion by 2032, exhibiting a growth rate (CAGR) of 3.1% during 2024-2032.

Critical infrastructure protection (CIP) refers to a security solution used for safeguarding systems, assets and networks from potential threats. It consists of various solutions, such as firewalls, identity and access management, risk and compliance management, antiviruses, intrusion detection systems and encryption systems. These systems protect information related to power grids, railways, nuclear plants and hydro plants from cyberattacks that can threaten public safety, attack national security or cause environmental disasters. CIP solutions also use wireless technology, industrial control systems (ICS), operation technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems to expose additional security vulnerabilities.

The increasing instances of security breaches and cyber-attacks that pose a threat to infrastructural development across the globe are among the key factors driving the growth of the market. The rising concerns for the security and safety of government information and the increasing trend of Bring-Your-Own-Devices (BYOD) across industries have enhanced the requirement for CIP systems. The rapidly expanding internet and interconnected network architecture have influenced federal and security organizations to safeguard cyberspace and minimize threat vulnerabilities. Additionally, various technological advancements, such as the advent of the Internet of Things (IoT), big data, cloud computing and artificial intelligence (AI) solutions, are acting as other growth-inducing factors. They offer scalable and cost-effective data security solutions, owing to which CIP solutions are widely being deployed. Other factors, including improvements in the information technology (IT) infrastructure, along with the increasing adoption of risk management services, are projected to drive the market further.

Key Market Segmentation:

IMARC Group provides an analysis of the key trends in each sub-segment of the global critical infrastructure protection market report, along with forecasts at the global, regional and country level from 2024-2032. Our report has categorized the market based on component and end user.

Breakup by Component:

Solutions

Physical Security Solutions

Physical Identity and Access Control Systems

Perimeter Intrusion Detection Systems

Video Surveillance Systems

Screening and Scanning

Others

Cyber Security Solutions

Encryption

Network Access Control and Firewall

Threat Intelligence

Others

Services

Designing and Integration Services

Consultation Services

Risk Management Services

Maintenance and Support Services

Breakup by End User:

Financial Institutions

Government

Defense

Transport and Logistics

Energy and Power

Commercial Sector

Others

Breakup by Region:

North America

United States

Canada

Asia Pacific

China

Japan

India

South Korea

Australia

Indonesia

Others

Europe

Germany

France

United Kingdom

Italy

Spain

Russia

Others

Latin America

Brazil

Mexico

Others

Middle East and Africa

Competitive Landscape:

The competitive landscape of the industry has also been examined with some of the key players being BAE Systems PLC, Lockheed Martin Corporation, General Dynamics Corporation, Northrop Grumman Corporation, Honeywell International Inc., Airbus SE, Hexagon AB, Waterfall Security Solutions, General Electric Company, McAfee Inc. (TPG Capital and Intel Corporation) and Raytheon Company (United Technologies Corporation).

Key Questions Answered in This Report

  • 1. What was the size of the global critical infrastructure protection market in 2023?
  • 2. What is the expected growth rate of the global critical infrastructure protection market during 2024-2032?
  • 3. What is the impact of COVID-19 on the global critical infrastructure protection market?
  • 4. What are the key factors driving the global critical infrastructure protection market?
  • 5. What is the breakup of the global critical infrastructure protection market based on the component?
  • 6. What is the breakup of global critical infrastructure protection market based on the end user?
  • 7. What are the key regions in the global critical infrastructure protection market?
  • 8. Who are the key players/companies in the global critical infrastructure protection market?

Table of Contents

1 Preface

2 Scope and Methodology

  • 2.1 Objectives of the Study
  • 2.2 Stakeholders
  • 2.3 Data Sources
    • 2.3.1 Primary Sources
    • 2.3.2 Secondary Sources
  • 2.4 Market Estimation
    • 2.4.1 Bottom-Up Approach
    • 2.4.2 Top-Down Approach
  • 2.5 Forecasting Methodology

3 Executive Summary

4 Introduction

  • 4.1 Overview
  • 4.2 Key Industry Trends

5 Global Critical Infrastructure Protection Market

  • 5.1 Market Overview
  • 5.2 Market Performance
  • 5.3 Impact of COVID-19
  • 5.4 Market Forecast

6 Market Breakup by Component

  • 6.1 Solutions
    • 6.1.1 Market Trends
    • 6.1.2 Market Breakup by Type
      • 6.1.2.1 Physical Security Solutions
        • 6.1.2.1.1 Market Trends
        • 6.1.2.1.2 Market Breakup by Type
        • 6.1.2.1.2.1 Physical Identity and Access Control Systems
        • 6.1.2.1.2.2 Perimeter Intrusion Detection Systems
        • 6.1.2.1.2.3 Video Surveillance Systems
        • 6.1.2.1.2.4 Screening and Scanning
        • 6.1.2.1.2.5 Others
        • 6.1.2.1.3 Market Forecast
      • 6.1.2.2 Cyber Security Solutions
        • 6.1.2.2.1 Market Trends
        • 6.1.2.2.2 Market Breakup by Type
        • 6.1.2.2.2.1 Encryption
        • 6.1.2.2.2.2 Network Access Control and Firewall
        • 6.1.2.2.2.3 Threat Intelligence
        • 6.1.2.2.2.4 Others
        • 6.1.2.2.3 Market Forecast
    • 6.1.3 Market Forecast
  • 6.2 Services
    • 6.2.1 Market Trends
    • 6.2.2 Market Breakup by Type
      • 6.2.2.1 Designing and Integration Services
      • 6.2.2.2 Consultation Services
      • 6.2.2.3 Risk Management Services
      • 6.2.2.4 Maintenance and Support Services
    • 6.2.3 Market Forecast

7 Market Breakup by End User

  • 7.1 Financial Institutions
    • 7.1.1 Market Trends
    • 7.1.2 Market Forecast
  • 7.2 Government
    • 7.2.1 Market Trends
    • 7.2.2 Market Forecast
  • 7.3 Defense
    • 7.3.1 Market Trends
    • 7.3.2 Market Forecast
  • 7.4 Transport and Logistics
    • 7.4.1 Market Trends
    • 7.4.2 Market Forecast
  • 7.5 Energy and Power
    • 7.5.1 Market Trends
    • 7.5.2 Market Forecast
  • 7.6 Commercial Sector
    • 7.6.1 Market Trends
    • 7.6.2 Market Forecast
  • 7.7 Others
    • 7.7.1 Market Trends
    • 7.7.2 Market Forecast

8 Market Breakup by Region

  • 8.1 North America
    • 8.1.1 United States
      • 8.1.1.1 Market Trends
      • 8.1.1.2 Market Forecast
    • 8.1.2 Canada
      • 8.1.2.1 Market Trends
      • 8.1.2.2 Market Forecast
  • 8.2 Asia Pacific
    • 8.2.1 China
      • 8.2.1.1 Market Trends
      • 8.2.1.2 Market Forecast
    • 8.2.2 Japan
      • 8.2.2.1 Market Trends
      • 8.2.2.2 Market Forecast
    • 8.2.3 India
      • 8.2.3.1 Market Trends
      • 8.2.3.2 Market Forecast
    • 8.2.4 South Korea
      • 8.2.4.1 Market Trends
      • 8.2.4.2 Market Forecast
    • 8.2.5 Australia
      • 8.2.5.1 Market Trends
      • 8.2.5.2 Market Forecast
    • 8.2.6 Indonesia
      • 8.2.6.1 Market Trends
      • 8.2.6.2 Market Forecast
    • 8.2.7 Others
      • 8.2.7.1 Market Trends
      • 8.2.7.2 Market Forecast
  • 8.3 Europe
    • 8.3.1 Germany
      • 8.3.1.1 Market Trends
      • 8.3.1.2 Market Forecast
    • 8.3.2 France
      • 8.3.2.1 Market Trends
      • 8.3.2.2 Market Forecast
    • 8.3.3 United Kingdom
      • 8.3.3.1 Market Trends
      • 8.3.3.2 Market Forecast
    • 8.3.4 Italy
      • 8.3.4.1 Market Trends
      • 8.3.4.2 Market Forecast
    • 8.3.5 Spain
      • 8.3.5.1 Market Trends
      • 8.3.5.2 Market Forecast
    • 8.3.6 Russia
      • 8.3.6.1 Market Trends
      • 8.3.6.2 Market Forecast
    • 8.3.7 Others
      • 8.3.7.1 Market Trends
      • 8.3.7.2 Market Forecast
  • 8.4 Latin America
    • 8.4.1 Brazil
      • 8.4.1.1 Market Trends
      • 8.4.1.2 Market Forecast
    • 8.4.2 Mexico
      • 8.4.2.1 Market Trends
      • 8.4.2.2 Market Forecast
    • 8.4.3 Others
      • 8.4.3.1 Market Trends
      • 8.4.3.2 Market Forecast
  • 8.5 Middle East and Africa
    • 8.5.1 Market Trends
    • 8.5.2 Market Breakup by Country
    • 8.5.3 Market Forecast

9 SWOT Analysis

  • 9.1 Overview
  • 9.2 Strengths
  • 9.3 Weaknesses
  • 9.4 Opportunities
  • 9.5 Threats

10 Value Chain Analysis

11 Porters Five Forces Analysis

  • 11.1 Overview
  • 11.2 Bargaining Power of Buyers
  • 11.3 Bargaining Power of Suppliers
  • 11.4 Degree of Competition
  • 11.5 Threat of New Entrants
  • 11.6 Threat of Substitutes

12 Price Analysis

13 Competitive Landscape

  • 13.1 Market Structure
  • 13.2 Key Players
  • 13.3 Profiles of Key Players
    • 13.3.1 BAE Systems PLC
      • 13.3.1.1 Company Overview
      • 13.3.1.2 Product Portfolio
      • 13.3.1.3 Financials
      • 13.3.1.4 SWOT Analysis
    • 13.3.2 Lockheed Martin Corporation
      • 13.3.2.1 Company Overview
      • 13.3.2.2 Product Portfolio
      • 13.3.2.3 Financials
      • 13.3.2.4 SWOT Analysis
    • 13.3.3 General Dynamics Corporation
      • 13.3.3.1 Company Overview
      • 13.3.3.2 Product Portfolio
      • 13.3.3.3 Financials
      • 13.3.3.4 SWOT Analysis
    • 13.3.4 Northrop Grumman Corporation
      • 13.3.4.1 Company Overview
      • 13.3.4.2 Product Portfolio
      • 13.3.4.3 Financials
      • 13.3.4.4 SWOT Analysis
    • 13.3.5 Honeywell International Inc.
      • 13.3.5.1 Company Overview
      • 13.3.5.2 Product Portfolio
      • 13.3.5.3 Financials
      • 13.3.5.4 SWOT Analysis
    • 13.3.6 Airbus SE
      • 13.3.6.1 Company Overview
      • 13.3.6.2 Product Portfolio
      • 13.3.6.3 Financials
      • 13.3.6.4 SWOT Analysis
    • 13.3.7 Hexagon AB
      • 13.3.7.1 Company Overview
      • 13.3.7.2 Product Portfolio
      • 13.3.7.3 Financials
      • 13.3.7.4 SWOT Analysis
    • 13.3.8 Waterfall Security Solutions
      • 13.3.8.1 Company Overview
      • 13.3.8.2 Product Portfolio
      • 13.3.8.3 Financials
    • 13.3.9 General Electric Company
      • 13.3.9.1 Company Overview
      • 13.3.9.2 Product Portfolio
      • 13.3.9.3 Financials
      • 13.3.9.4 SWOT Analysis
    • 13.3.10 McAfee Inc. (TPG Capital and Intel Corporation)
      • 13.3.10.1 Company Overview
      • 13.3.10.2 Product Portfolio
    • 13.3.11 Raytheon Company (United Technologies Corporation)
      • 13.3.11.1 Company Overview
      • 13.3.11.2 Product Portfolio
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦