医疗保健中的网络安全:主题调查
市场调查报告书
商品编码
1125405

医疗保健中的网络安全:主题调查

Cybersecurity in Healthcare - Thematic Research

出版日期: | 出版商: GlobalData | 英文 62 Pages | 订单完成后即时交付

价格

本网页内容可能与最新版本有所差异。详细情况请与我们联繫。

医疗保健行业在网络安全方面是一个特别脆弱的行业,因为它处理高度敏感的数据。此外,业务职能通常是生死攸关的问题。医疗保健和製药公司的数据洩露成本高于任何其他行业的数据洩露。在 COVID-19 大流行期间,网络风险也显着增加,从面对面咨询转向虚拟咨询和数字监控,从办公室工作转向远程工作。

本报告探讨医疗保健行业的网络安全,提供有关关键参与者、价值链、挑战和趋势的深入信息。

内容

内容

  • 执行摘要
  • 网络安全价值链
  • 网络安全价值链中的主要参与者
  • 网络安全硬件
  • 基于芯片的安全性
  • 网络安全软件
  • 身份管理
  • 网络安全
  • 端点安全
  • 威胁检测和响应
  • 云安全
  • 数据安全
  • 电子邮件安全
  • 应用安全
  • 统一威胁管理
  • 漏洞管理
  • 网络安全服务
  • 託管安全服务
  • 违规后响应服务
  • 风险与合规服务
  • 医疗保健问题
  • GlobalData 医疗保健行业数字化转型和新兴技术调查(2021 年)
  • 网络安全对医疗保健的影响
  • COVID-19 对网络安全的影响
  • 网络卫生对网络安全的影响
  • 联网设备对网络安全的影响
  • 法规对网络安全的影响
  • 人工智能对网络安全的影响
  • 案例研究
  • Augmedix 使用 Trustwave MDR 保护医疗保健信息
  • 大科技和数据隐私问题:Google 主导 DeepMind Health
  • 医疗保健公司采用 TRIMEDX 作为网络安全解决方案
  • 费森尤斯攻击凸显了网络安全的必要性
  • 医疗保健领域的网络安全
  • 对默克公司的 NotPetya 攻击:医疗行业最大的网络攻击和保险诉讼的先例
  • WannaCry 损害 NHS 服务
  • 数据分析
  • 市场规模和增长预测
  • 併购
  • 招聘趋势
  • 首席信息安全官 (CISO)
  • 社交媒体趋势
  • 网络安全时间表
  • 公司
  • 医疗保健领域的领先网络安全采用者
  • 领先的网络安全供应商
  • 医疗保健领域的专业网络安全供应商
  • 行业记分卡
  • 临床试验部门记分卡
  • 利益相关者
  • 主题屏幕
  • 评估屏幕
  • 风险屏幕
  • 词彙表
  • 参考资料
  • GLOBALDATA报告
  • 按主题研究方法
  • 关于GLOBALDATA
  • 联繫
Product Code: GDHCHT337

Cyberattacks are especially dangerous to healthcare

Weak cybersecurity measures expose companies to serious risk. Victim companies suffer operationally, as systems are rendered unusable; reputationally, as customers lose trust; and legally, as ever-stricter regulators seek to punish. The healthcare industry is particularly vulnerable because it uses extremely sensitive data. Pharma companies have proprietary scientific data and intellectual property, medical devices companies develop connected devices, and healthcare companies collect and utilize patient data.

Additionally, operational functions are often literally matters of life and death. Breaches in healthcare and pharma cost more than those in almost any other industry.

After COVID, cyber risk is higher than ever

The rush from in-person care to virtual care and digital monitoring, and from office-based work to remote working, amid the COVID-19 pandemic significantly increased cyber risk. The increased use of technology, especially cloud, increased the potential attack surface, and the high speed of transition required meant many information technology security teams had insufficient time to install adequate security defenses. Healthcare companies, especially hospitals and pharma companies, reported increases in cyberattack attempts and government bodies like the Federal Bureau of Investigation issued warnings about the increased threat.

Scope

  • Key players in the cybersecurity in healthcare space: leading cybersecurity vendors, specialist cybersecurity vendors in healthcare, leading cybersecurity adopters in healthcare.
  • Value chain including a definition of cybersecurity and the different relevant technologies and processes.
  • Key challenges the healthcare industry faces and explanations of how cybersecurity can help. Challenges include manufacturing, marketing and sales, R&D, improving surgery safety, medical training for students and doctors, and improving patient safety
  • Detailed analysis of cybersecurity activity in healthcare using various data sets, including deals, hiring, company filings, and social media.
  • Profiles of private and public companies in the space.

Reasons to Buy

  • See who the leading players are in cybersecurity
  • See how the competitive landscape is evolving, with a review of company activity including mergers and acquisitions (M&A), strategic partnerships and funding deals, as well as a jobs analysis.
  • Understand what cybersecurity is and what it can do.

Table of Contents

Table of Contents

  • Executive Summary
  • Cybersecurity Value Chain
  • Key players in the cybersecurity value chain
  • Cybersecurity hardware
  • Chip-based security
  • Cybersecurity software
  • Identity management
  • Network security
  • Endpoint security
  • Threat detection and response
  • Cloud security
  • Data security
  • Email security
  • Application security
  • Unified threat management
  • Vulnerability management
  • Cybersecurity Services
  • Managed security services
  • Post-breach response services
  • Risk and compliance services
  • Healthcare Challenges
  • GlobalData's Digital Transformation and Emerging Technology in the Healthcare Industry Survey, 2021
  • The Impact of Cybersecurity on Healthcare
  • How does COVID-19 impact cybersecurity?
  • How does cyber hygiene impact cybersecurity?
  • How do connected devices impact cybersecurity?
  • How does regulation impact cybersecurity?
  • How does AI impact cybersecurity?
  • Case Studies
  • Augmedix uses Trustwave MDR to protect healthcare information
  • Big Tech and data privacy concerns: Google takes control of DeepMind Health
  • Healthcare companies turn to TRIMEDX for cybersecurity solutions
  • Fresenius attack underlines the need for cybersecurity
  • Cybersecurity in Healthcare
  • The NotPetya attack on Merck & Co: Healthcare's biggest cyberattack and a precedent for insurance cases
  • WannaCry compromises NHS services
  • Data Analysis
  • Market size and growth forecasts
  • Mergers and acquisitions
  • Hiring trends
  • Chief information security officers (CISOs)
  • Social media trends
  • Cybersecurity timeline
  • Companies
  • Leading cybersecurity adopters in healthcare
  • Leading cybersecurity vendors
  • Specialist cybersecurity vendors in healthcare
  • Sector Scorecard
  • Clinical Trials sector scorecard
  • Who's who
  • Thematic screen
  • Valuation screen
  • Risk screen
  • Glossary
  • Further Reading
  • GlobalData reports
  • Our Thematic Research Methodology
  • About GlobalData
  • Contact Us

List of Tables

List of Tables

  • Table 1: Key challenges facing the healthcare sector
  • Table 2: Key M&A transactions associated with the cybersecurity theme since January 2021
  • Table 3: M&A transactions associated with the cybersecurity theme in the healthcare industries since April 2015
  • Table 4: Chief information security officers (CISOs)
  • Table 5: Healthcare companies currently deploying cybersecurity and summarizes their competitive position
  • Table 6: Leading players within the cybersecurity theme and summarizes their competitive position
  • Table 7: Specialist cybersecurity vendors in the healthcare sector and summarizes their competitive position
  • Table 8: Glossary
  • Table 9: GlobalData reports

List of Figures

List of Figures

  • Figure 1: Key players in the cybersecurity value chain
  • Figure 2: The cybersecurity value chain
  • Figure 3: The cybersecurity value chain - hardware
  • Figure 4: The cybersecurity value chain - software
  • Figure 5: The cybersecurity value chain - Network security
  • Figure 6: The cybersecurity value chain - Endpoint security
  • Figure 7: The cybersecurity value chain - Threat detection and response
  • Figure 8: The cybersecurity value chain - Cloud security
  • Figure 9: The cybersecurity value chain - Data security
  • Figure 10: The cybersecurity value chain - Email security
  • Figure 11: The cybersecurity value chain - Application security
  • Figure 12: The cybersecurity value chain - Unified threat management
  • Figure 13: The cybersecurity value chain - Vulnerability management
  • Figure 14: The cybersecurity value chain - Managed security services
  • Figure 15: The cybersecurity value chain - Post-breach response services
  • Figure 16: The cybersecurity value chain - Risk and compliance services
  • Figure 17: Companies are consistently prioritizing cybersecurity
  • Figure 18: Thematic impact assessment for pharma
  • Figure 19: Thematic impact assessment for healthcare
  • Figure 20: Thematic impact assessment for medical devices
  • Figure 21: Cybersecurity spending is forecast to grow in all healthcare sectors
  • Figure 22: Managed security services dominate cybersecurity spending across healthcare
  • Figure 23: Cybersecurity hiring activity is increasing across the healthcare industries
  • Figure 24: COVID-19 sparked hundreds of cyberattacks
  • Figure 25: The cybersecurity story
  • Figure 26: Who does what in the clinical trials space?
  • Figure 27: The thematic screen ranks companies based on overall leadership in the 10 themes that matter most to their industry, generating a leading indicator of future performance
  • Figure 28: Our valuation screen ranks our universe of companies within a sector based on selected valuation metrics
  • Figure 29: Our risk screen ranks companies within a particular sector based on overall investment risk