封面
市场调查报告书
商品编码
1910596

工业控制系统安全:市场占有率分析、产业趋势与统计、成长预测(2026-2031)

Industrial Control Systems Security - Market Share Analysis, Industry Trends & Statistics, Growth Forecasts (2026 - 2031)

出版日期: | 出版商: Mordor Intelligence | 英文 120 Pages | 商品交期: 2-3个工作天内

价格

本网页内容可能与最新版本有所差异。详细情况请与我们联繫。

简介目录

预计到 2026 年,工业控制系统安全市场规模将达到 205.5 亿美元,高于 2025 年的 192.4 亿美元。

预计到 2031 年将达到 285.7 亿美元,2026 年至 2031 年的复合年增长率为 6.83%。

工业控制系统安全市场-IMG1

经营团队主管对操作技术(OT) 网路弹性、IT-OT 网路整合以及日益猖獗的勒索软体活动的高度重视,推动了持续的需求成长。北美凭藉 NERC CIP-013 等法规以及 CIRCIA 下的快速事件报告要求,保持主导地位。随着公共产业和离散製造企业对 SCADA 资产进行现代化改造并大规模连接工业物联网 (IIoT) 设备,亚太地区预计将实现最快速的成长。儘管解决方案仍然是收入的基础,但託管保全服务的两位数成长表明,在 OT 技能严重短缺的情况下,企业正在转向全天候外包监控。网路分段和深层封包检测主导目前的应用,而託管历史资料库和远端维护入口网站的普及则推动了对云端/远端存取保护的需求。

全球工业控制系统 (ICS) 安全市场趋势与洞察

加速工业物联网主导的营运技术连接将变革製造业安全

预计到2025年,全球将有750亿台连网设备投入使用,其中三分之一将安装在工厂内,这将使传统生产线面临前所未有的网路风险。欧洲和日本的离散元件製造商正在整合视觉系统、机器人和预测性维护感测器,这需要东西向流量检测和零信任分段。这种日益增长的资料流给传统的边界防御带来了压力,迫使在乙太网路/IP、PROFINET和Modbus网路中部署通讯协定感知型侦测工具。供应商正在透过轻量级代理程式来应对资源受限的控制器,以及能够在不中断生产週期的情况下分析专有工业框架的深度套件检测(DPI)感测器。随着IT和OT团队共同管理资产,对能够绘製普渡安全等级0-3并自动部署策略的统一仪錶板的需求日益增长。预算负责人正越来越多地将安全支出与整体设备效率(OEE)指标挂钩,从而强调透过预防停机时间来实现投资回报率(ROI)的重要性。

监理合规推动关键基础设施安全投资

北美NERC CIP-013指令和欧盟NIS2指令对供应链风险管理和72小时内事件报告等环节都提出了具有约束力的义务。公共产业、交通网和化工厂正在加速采购,以避免可能超过年收入2%的罚款。这些法规将网路安全讨论从技术团队提升到经营团队层,缩短了提供符合审核要求的报告和证据收集功能的供应商的销售週期。整合商透过整合资产发现、配置监控和安全檔案传输功能,简化了跨司法管辖区的合规流程,从而同时满足两项标准。此外,保险公司要求ICS(工业控制系统)分段证明作为保单续保和保费降低的先决条件,这进一步推动了ICS安全市场的发展。

旧有系统整合难题阻碍了安全实施

现代防火墙和异常检测引擎必须适应已有20年历史的可程式逻辑控制器 (PLC),这些控制器缺乏加密韧体和基于角色的存取控制。维修通常需要轮流停机,这会危及生产目标和合约规定的服务等级协定 (SLA)。 46% 的资产所有者需要长达六个月的时间来修復关键漏洞,延长了漏洞暴露的时间。成本效益的考虑导致全面的微隔离计划被推迟,一些运营商转而采用部分实施方案,例如只读被动监控,虽然这种方案可以提供可见性,但却使写入访问途径暴露在外。

细分市场分析

到2025年,解决方案领域将占据工业控制系统安全市场129.6亿美元的份额,占总收入的67.35%。防火墙、通讯协定感知型入侵防御系统(IPS)、身分网关和漏洞扫描器构成了第一波应用的基础。随着供应商不断整合人工智慧分析功能、缩短特征码更新周期并即时检测零日漏洞,相关支出正在稳步增长。目前,工业控制系统安全市场正在涌现融合平台,这些平台能够采集跨层级日誌并加速根本原因关联分析。

预计到2025年,服务板块的估值将达到62.8亿美元,并在2031年之前保持10.86%的最高复合年增长率。託管式侦测和回应服务将远端第一线故障排查与现场事件回应人员结合,使工厂能够维持运作并满足72小时报告义务。整合和实施合作伙伴负责连接不同的供应商系统,将资产清单对应到ISA/IEC 62443区域,然后配置多层控制。咨询团队使用攻击链模拟进行成熟度评估,并制定与资本支出更新周期一致的分阶段蓝图。支援和维护协议确保韧体更新和定期规则集调整,从而将高度监管的能源营业单位的平均修补时间缩短30%以上。

到2025年,网路安全将占收入的36.55%,营运商将优先部署实体和虚拟分段设备,以过滤通讯协定命令并将流量镜像到被动收集器。零信任架构隔离人机介面 (HMI)、历史资料库和工程工作站,防止IT子网路横向移动。威胁情报源注入工业级入侵指标 (IOC),以帮助安全营运中心 (SOC) 团队阻止恶意的OT特定命令序列。

在所有类别中,云端/远端存取安全预计将以 12.01% 的复合年增长率 (CAGR) 实现最高成长,这主要得益于工厂中数位双胞胎技术和厂商辅助维护入口网站的普及。多因素身份验证网关、即时会话仲介和持续态势评估将被部署,以应对来自暴露于互联网的端点的日益增长的风险。端点安全工具将透过无代理监控来强化 PLC、RTU 和感测器,从而追踪韧体状态和记忆体完整性。应用层防御将使用动态程式码分析来检测 MES 和批次执行软体中的不安全调用,而资料库防火墙将防止时间序列运行资料的洩漏。

区域分析

预计到2025年,北美将占全球收入的32.60%。大规模资料外洩事件导致联邦政府加强审查,资产所有者纷纷采纳美国网路安全和基础设施安全局(CISA)的「加强防护」建议,并要求在规定时间内提交漏洞报告。对配备人员的泵站和风电场的安全远端存取的投资正在加速。加拿大国家网路威胁评估警告称,敌对国家可能干扰能源出口,各省监管机构正在推动遵守北美电力可靠性委员会(NERC)的网路安全改进计划(CIP)框架。

亚太地区将在2026年至2031年间达到最高的复合年增长率,达到8.15%。中国正在数千个新建变电站中扩大网路安全防护力度,将国产防火墙品牌与全球分析引擎结合。日本正在升级其机器人密集型汽车生产线,将深层封包检测设备与支援OT的SIEM整合系统整合。韩国正利用其5G骨干网,强制要求对毫秒延迟的控制指令进行加密和ID迭加。印度正在水力发电发电工程中更换串口转乙太网路转换器,并插入检测分接器,将资讯传输至国家级安全营运中心(SOC)。随着本地人才储备的成熟,东协地区的中小型企业正越来越多地依赖供应商提供的SOC。

随着NIS2将业务拓展至中型关键营业单位领域,欧洲仍是其核心市场。德国联邦资讯安全办公室(BSI)正在推动跨行业漏洞咨询共用,法国国家资讯安全局(ANSSI)则在製定分段检查清单。英国公共产业正在试行基于人工智慧的预测性异常检测引擎,以满足英国天然气和电力市场监管局(Ofgem)的弹性目标。西班牙和义大利可再生能源的成长推动了对认证仲介的需求,以便在现场维护期间管理逆变器原始设备製造商(OEM)。拉丁美洲以及中东和非洲地区正在稳步采取防御措施,例如巴西公共产业正在实施PLC韧体的供应链认证,而沿岸地区的管道运营商则部署了欺骗网路以阻止侦察活动。

其他福利:

  • Excel格式的市场预测(ME)表
  • 3个月的分析师支持

目录

第一章 引言

  • 研究假设和市场定义
  • 调查范围

第二章调查方法

第三章执行摘要

第四章 市场情势

  • 市场概览
  • 市场驱动因素
    • 加速离散製造业中工业物联网主导的营运技术连结(欧盟和日本)
    • 关键基础设施营运商必须遵守NERC CIP-013和欧盟NIS2标准
    • 亚洲电力和供水事业老旧SCADA/DCS资产现代化改造
    • 美国和中东地区石油和天然气管道遭受勒索软体攻击激增
    • 分散式可再生能源的成长需要远端存取保护
    • 引入基于云端的历史资料库和远端维护平台
  • 市场限制
    • 传统PLC维修成本高且停机时间长
    • 东协中型製造业缺乏具备OT技能的网路安全人才
    • 专有的行业通讯协定限制了互通性。
    • 重复的IT/OT工具堆迭导致采购延误(「安全疲劳」)
  • 价值/供应链分析
  • 监理与技术展望
  • 波特五力分析
    • 供应商的议价能力
    • 买方的议价能力
    • 新进入者的威胁
    • 替代品的威胁
    • 竞争对手之间的竞争
  • 投资分析

第五章 市场规模与成长预测

  • 按组件
    • 解决方案
      • 防火墙和入侵防御系统
      • 身分和存取管理
      • 防毒和反恶意软体
      • 安全和漏洞管理
      • 预防资料外泄和恢復
      • 其他解决方案
    • 服务
      • 咨询与评估
      • 整合与部署
      • 支援与维护
      • 资安管理服务
  • 按安全类型
    • 网路安全
    • 端点安全
    • 应用程式安全
    • 资料库安全
    • 云端/远端存取安全
  • 按控制系统类型
    • 监控与数据采集(SCADA)
    • 分散式控制系统(DCS)
    • 可程式逻辑控制器(PLC)
    • 其他控制系统
  • 按最终用户行业划分
    • 化工/石油化工
    • 电力/公共产业
    • 石油和天然气
    • 食品/饮料
    • 製药
    • 供水/污水处理
    • 采矿和金属
    • 运输/物流
    • 其他行业
  • 按地区
    • 北美洲
      • 美国
      • 加拿大
      • 墨西哥
    • 欧洲
      • 英国
      • 德国
      • 法国
      • 义大利
      • 其他欧洲
    • 亚太地区
      • 中国
      • 日本
      • 印度
      • 韩国
      • 亚太其他地区
    • 中东
      • 以色列
      • 沙乌地阿拉伯
      • 阿拉伯聯合大公国
      • 土耳其
      • 其他中东地区
    • 非洲
      • 南非
      • 埃及
      • 其他非洲地区
    • 南美洲
      • 巴西
      • 阿根廷
      • 南美洲其他地区

第六章 竞争情势

  • 市场集中度
  • 策略趋势
  • 市占率分析
  • 公司简介
    • Honeywell International Inc.
    • Cisco Systems Inc.
    • IBM Corporation
    • Fortinet Inc.
    • ABB Ltd.
    • Rockwell Automation Inc.
    • Dragos Inc.
    • Nozomi Networks Inc.
    • Palo Alto Networks Inc.
    • Check Point Software Technologies Ltd.
    • Darktrace Holdings Limited
    • Broadcom Inc.(Symantec)
    • Trellix
    • Schneider Electric SE
    • Siemens AG
    • Kaspersky Lab
    • GE Vernova(GE Digital)
    • Claroty Ltd.
    • Trend Micro Inc.
    • AhnLab Inc.

第七章 市场机会与未来展望

简介目录
Product Code: 66569

Industrial Control Systems Security Market size in 2026 is estimated at USD 20.55 billion, growing from 2025 value of USD 19.24 billion with 2031 projections showing USD 28.57 billion, growing at 6.83% CAGR over 2026-2031.

Industrial Control Systems Security - Market - IMG1

Board-level prioritization of operational technology cyber-resilience, convergence of IT-OT networks, and escalating ransomware activity underpin sustained demand. North America retains leadership thanks to regulations such as NERC CIP-013 and the rapid incident-reporting mandate in CIRCIA. Asia-Pacific delivers the steepest growth as utilities and discrete manufacturers modernize SCADA assets and connect IIoT devices at scale. Solutions remain the revenue backbone, yet double-digit expansion of managed security services shows enterprises shifting toward 24/7 outsourced monitoring amid an acute OT-skilled labor shortage. Network segmentation and deep-packet inspection dominate current deployments, while cloud/remote-access protection gains momentum with the rise of hosted historians and remote maintenance portals.

Global Industrial Control Systems Security Market Trends and Insights

Accelerating IIoT-driven OT Connectivity Transforms Manufacturing Security

One-third of the 75 billion connected devices expected in 2025 will sit inside factories, exposing legacy production lines to unprecedented cyber risk. European and Japanese discrete manufacturers are integrating vision systems, robotics, and predictive-maintenance sensors that require east-west traffic inspection and zero-trust segmentation. This intensified data flow strains traditional perimeter defenses and forces deployment of protocol-aware detection tools inside Ethernet/IP, PROFINET, and Modbus networks. Vendors respond with lightweight agents for resource-constrained controllers and DPI sensors that parse proprietary industrial frames without disrupting cycle times. As IT and OT teams co-manage assets, demand rises for unified dashboards that map Purdue levels 0-3 and automate policy rollouts. Budget holders increasingly tie security spend to overall equipment effectiveness metrics, reinforcing ROI narratives around avoided downtime.

Regulatory Compliance Drives Critical-Infrastructure Security Investment

NERC CIP-013 in North America and the EU's NIS2 Directive impose binding obligations ranging from supply-chain risk management to 72-hour incident reporting. Utilities, transport networks, and chemical plants accelerate procurements to avoid fines that can exceed 2% of annual turnover. The regulations also elevate cyber discussions from engineering teams to executive committees, compressing sales cycles for vendors offering audit-ready reporting and evidence collection. Integrators bundle asset-discovery, configuration-monitoring, and secure-file-transfer capabilities to meet both standards concurrently, simplifying multi-jurisdiction compliance. Momentum in the ICS security market is further boosted by insurers demanding proof of ICS segmentation before renewing coverage or lowering premiums.

Legacy System Integration Challenges Hinder Security Implementation

Modern firewalls and anomaly-detection engines must adapt to 20-year-old PLCs that lack encrypted firmware or role-based access controls. Retrofitting often requires staged shutdowns that jeopardize output quotas and contractual service-level agreements. Forty-six percent of asset owners need up to six months to patch a critical vulnerability, prolonging exposure windows. Cost-benefit debates delay full micro-segmentation projects, pushing some operators toward partial implementations like read-only passive monitoring, which offers visibility yet leaves write-access pathways unguarded.

Other drivers and restraints analyzed in the detailed report include:

  1. Aging Infrastructure Modernization Creates Security Imperatives
  2. Ransomware Targeting Critical Infrastructure Drives Security Urgency
  3. Cybersecurity Talent Gap Constrains Security Implementation

For complete list of drivers and restraints, kindly check the Table Of Contents.

Segment Analysis

In 2025, the industrial control systems security market size attributed USD 12.96 billion to solutions, equal to a 67.35% revenue share. Firewalls, protocol-aware IPS, identity gateways, and vulnerability scanners formed the backbone of first-wave deployments. Spending grows steadily as vendors embed artificial-intelligence analytics that cut signature-update cycles and flag zero-day behaviors in real time. The industrial control systems security market now witnesses converged platforms that ingest logs across Purdue levels, enriching context for quicker root-cause correlation.

The services segment, valued at USD 6.28 billion in 2025, records the fastest 10.86% CAGR through 2031. Managed detection and response offerings combine remote tier-1 triage and on-site incident-handlers, allowing plants to maintain uptime while meeting 72-hour reporting mandates. Integration and deployment partners bridge heterogeneous vendor stacks, mapping asset inventories against ISA/IEC 62443 zones before configuring layered controls. Consulting teams benchmark maturity via kill-chain simulations, then craft phased roadmaps tied to capex refresh cycles. Support and maintenance contracts secure firmware updates and periodic rule-set tuning, reducing mean time to patch by more than 30% in highly regulated energy utilities.

Network security anchors 36.55% of 2025 revenues as operators prioritize physical and virtual segmentation appliances that filter protocol commands and mirror traffic to passive collectors. Zero-trust architectures isolate HMIs, historians, and engineering workstations, preventing lateral movement from IT subnets. Threat-intelligence feeds inject industrial IOCs, helping SOC teams block malicious OT-specific command sequences.

Cloud/remote-access security posts a 12.01% forecast CAGR, the highest among categories, as plants adopt digital twins and vendor-assisted maintenance portals. Multi-factor identity gateways, just-in-time session brokers, and continuous posture assessment counter the heightened risk from internet-exposed endpoints. Endpoint security tools harden PLCs, RTUs, and sensors with agentless monitoring that tracks firmware states and memory integrity. Application-layer defenses use dynamic code analysis to spot unsafe calls within MES and batch-execution software, while database firewalls safeguard time-series operational data against exfiltration.

The Industrial Control Systems ICS Security Market Report is Segmented by Component (Solutions, Services), Security Type (Network Security, Endpoint Security, Application Security, and More), Control System Type (SCADA, Distributed Control System (DCS), and More), End-User Industry (Automotive, Chemical & Petrochemical, Power and Utilities, and More), and Geography. The Market Forecasts are Provided in Terms of Value (USD).

Geography Analysis

North America generated 32.60% of 2025 global revenue. Federal scrutiny intensified after headline breaches, prompting asset owners to adopt CISA's Shields-Up advisories and submit vulnerability reports within stipulated windows. Investments accelerate around secure remote access for sparsely staffed pumping stations and wind farms. Canada's National Cyber Threat Assessment warns that hostile states could disrupt energy exports, pushing provincial regulators to align with NERC CIP frameworks.

Asia-Pacific records the highest 8.15% CAGR from 2026 to 2031. China scales cyber-hygiene across thousands of new substations, blending domestic firewall brands with global analytics engines. Japan upgrades robot-dense automotive lines, coupling deep-packet inspection appliances with OT-aware SIEM integrations. South Korea leverages its 5G backbone, necessitating encryption and identity overlays for millisecond-latency control commands. India replaces serial-to-Ethernet converters in hydro projects, inserting inspection taps that feed national-level SOCs. ASEAN SMEs rely on vendor-hosted SOCs as local talent pipelines mature.

Europe remains a pivotal market as NIS2 expands enforcement to medium-sized critical entities. Germany's BSI drives cross-sector vulnerability advisory sharing, while France's ANSSI prescribes segmentation checklists. United Kingdom utilities pilot AI-based predictive anomaly engines to meet Ofgem resilience targets. Renewable-energy growth in Spain and Italy sparks demand for authentication brokers that manage inverter OEMs during field maintenance. Latin America and Middle East & Africa steadily adopt defenses; Brazilian utilities implement supply-chain attestation for PLC firmware, and Gulf pipeline operators deploy deception grids to deter reconnaissance.

  1. Honeywell International Inc.
  2. Cisco Systems Inc.
  3. IBM Corporation
  4. Fortinet Inc.
  5. ABB Ltd.
  6. Rockwell Automation Inc.
  7. Dragos Inc.
  8. Nozomi Networks Inc.
  9. Palo Alto Networks Inc.
  10. Check Point Software Technologies Ltd.
  11. Darktrace Holdings Limited
  12. Broadcom Inc. (Symantec)
  13. Trellix
  14. Schneider Electric SE
  15. Siemens AG
  16. Kaspersky Lab
  17. GE Vernova (GE Digital)
  18. Claroty Ltd.
  19. Trend Micro Inc.
  20. AhnLab Inc.

Additional Benefits:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 Study Assumptions and Market Definition
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET LANDSCAPE

  • 4.1 Market Overview
  • 4.2 Market Drivers
    • 4.2.1 Accelerating IIoT-driven OT Connectivity in Discrete Manufacturing (EU and Japan)
    • 4.2.2 Mandatory NERC CIP-013 and EU NIS2 Compliance for Critical Infrastructure Operators
    • 4.2.3 Modernization of Ageing SCADA/DCS Assets in Asian Power and Water Utilities
    • 4.2.4 Surge in Ransomware Attacks on Oil and Gas Pipelines (US and Middle East)
    • 4.2.5 Growth of Distributed Renewables Requiring Remote-Access Protection
    • 4.2.6 Adoption of Cloud-hosted Historians and Remote Maintenance Platforms
  • 4.3 Market Restraints
    • 4.3.1 High Retrofit Costs and Downtime for Legacy PLCs
    • 4.3.2 OT-Skilled Cyber-Talent Shortage in Mid-size ASEAN Manufacturers
    • 4.3.3 Limited Interoperability of Proprietary Industrial Protocols
    • 4.3.4 Procurement Delays from IT/OT Tool-Stack Overlap ("Security Fatigue")
  • 4.4 Value / Supply-Chain Analysis
  • 4.5 Regulatory and Technological Outlook
  • 4.6 Porter's Five Forces Analysis
    • 4.6.1 Bargaining Power of Suppliers
    • 4.6.2 Bargaining Power of Buyers
    • 4.6.3 Threat of New Entrants
    • 4.6.4 Threat of Substitutes
    • 4.6.5 Intensity of Competitive Rivalry
  • 4.7 Investment Analysis

5 MARKET SIZE AND GROWTH FORECASTS (VALUE)

  • 5.1 By Component
    • 5.1.1 Solutions
      • 5.1.1.1 Firewall and IPS
      • 5.1.1.2 Identity and Access Management
      • 5.1.1.3 Antivirus and Antimalware
      • 5.1.1.4 Security and Vulnerability Management
      • 5.1.1.5 Data Loss Prevention and Recovery
      • 5.1.1.6 Other Solutions
    • 5.1.2 Services
      • 5.1.2.1 Consulting and Assessment
      • 5.1.2.2 Integration and Deployment
      • 5.1.2.3 Support and Maintenance
      • 5.1.2.4 Managed Security Services
  • 5.2 By Security Type
    • 5.2.1 Network Security
    • 5.2.2 Endpoint Security
    • 5.2.3 Application Security
    • 5.2.4 Database Security
    • 5.2.5 Cloud/Remote Access Security
  • 5.3 By Control System Type
    • 5.3.1 Supervisory Control and Data Acquisition (SCADA)
    • 5.3.2 Distributed Control System (DCS)
    • 5.3.3 Programmable Logic Controller (PLC)
    • 5.3.4 Other Control Systems
  • 5.4 By End-user Industry
    • 5.4.1 Automotive
    • 5.4.2 Chemical and Petrochemical
    • 5.4.3 Power and Utilities
    • 5.4.4 Oil and Gas
    • 5.4.5 Food and Beverage
    • 5.4.6 Pharmaceuticals
    • 5.4.7 Water and Wastewater
    • 5.4.8 Mining and Metals
    • 5.4.9 Transportation and Logistics
    • 5.4.10 Other Industries
  • 5.5 By Geography
    • 5.5.1 North America
      • 5.5.1.1 United States
      • 5.5.1.2 Canada
      • 5.5.1.3 Mexico
    • 5.5.2 Europe
      • 5.5.2.1 United Kingdom
      • 5.5.2.2 Germany
      • 5.5.2.3 France
      • 5.5.2.4 Italy
      • 5.5.2.5 Rest of Europe
    • 5.5.3 Asia-Pacific
      • 5.5.3.1 China
      • 5.5.3.2 Japan
      • 5.5.3.3 India
      • 5.5.3.4 South Korea
      • 5.5.3.5 Rest of Asia-Pacific
    • 5.5.4 Middle East
      • 5.5.4.1 Israel
      • 5.5.4.2 Saudi Arabia
      • 5.5.4.3 United Arab Emirates
      • 5.5.4.4 Turkey
      • 5.5.4.5 Rest of Middle East
    • 5.5.5 Africa
      • 5.5.5.1 South Africa
      • 5.5.5.2 Egypt
      • 5.5.5.3 Rest of Africa
    • 5.5.6 South America
      • 5.5.6.1 Brazil
      • 5.5.6.2 Argentina
      • 5.5.6.3 Rest of South America

6 COMPETITIVE LANDSCAPE

  • 6.1 Market Concentration
  • 6.2 Strategic Moves
  • 6.3 Market Share Analysis
  • 6.4 Company Profiles (includes Global-level Overview, Market-level overview, Core Segments, Financials, Strategic Information, Market Rank/Share, Products and Services, Recent Developments)
    • 6.4.1 Honeywell International Inc.
    • 6.4.2 Cisco Systems Inc.
    • 6.4.3 IBM Corporation
    • 6.4.4 Fortinet Inc.
    • 6.4.5 ABB Ltd.
    • 6.4.6 Rockwell Automation Inc.
    • 6.4.7 Dragos Inc.
    • 6.4.8 Nozomi Networks Inc.
    • 6.4.9 Palo Alto Networks Inc.
    • 6.4.10 Check Point Software Technologies Ltd.
    • 6.4.11 Darktrace Holdings Limited
    • 6.4.12 Broadcom Inc. (Symantec)
    • 6.4.13 Trellix
    • 6.4.14 Schneider Electric SE
    • 6.4.15 Siemens AG
    • 6.4.16 Kaspersky Lab
    • 6.4.17 GE Vernova (GE Digital)
    • 6.4.18 Claroty Ltd.
    • 6.4.19 Trend Micro Inc.
    • 6.4.20 AhnLab Inc.

7 MARKET OPPORTUNITIES AND FUTURE OUTLOOK

  • 7.1 White-space and Unmet-Need Assessment