Académique Documents
Professionnel Documents
Culture Documents
Current Trends
One of the major trends that has influenced and is still predicted to influence the cyber security market
in North America is bring your own device (BYOD). BYOD is a phenomenon followed by many
organizations where employees use their personal device such as smartphones, tablets or personal
laptops to connect to a network. This upward trend is evident in numerous companies. Organizations
implement Network Access Control (NAC) solutions in order to apply BYOD policies, which prevent
infected devices from harming systems and networks. Numerous organizations around the world allow
personal devices to connect with the company’s network, among which small and medium group
enterprises lead the trend. However, the inability to secure these personal devices may result in an easy
access point for hackers and internet criminals to gain access to an organization’s systems.
© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 14
BYOD nevertheless has its own advantages, such as increased productivity, cost saving on hardware,
growing collaboration and higher employee satisfaction. Of course, the security concerns associated
with it cannot be ignored.
Below is an illustration of how a Bring Your Own Device can open new avenues for carrying out security
breaches in an organization. Let us consider a scenario wherein an employee installs an application onto
his BYOD device for personal use. This installed application may be a malware implanted by hackers
onto the internet to gain access to confidential corporate data on the BYOD system. With the help of
this application, a hacker can steal the desired data or even take control of the device without the
knowledge of the employee.
Although many organizations are adopting BYOD, a number of them lack the required resources for
implementing BYOD security policies. There are three different measures for preventing cyberattacks in
a BYOD environment: mobile device management, mobile application management and mobile security
management.
© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 15
Analysis of Computing Environment
The initial analysis of computing environments such as grid, cloud and utility services helps cyber
security service providers to know the exact requirements of the end user (client organization).
Examining, refining and modeling are the major steps involved in defining a problem. Exact definition of
a problem helps in gaining a proper understanding of the problem, which in turn helps security service
providers to deliver products or services that can efficiently address the issue.
Security Requirement
Clear analysis of the problem helps in understanding the specific requirements of the end user in terms
of hardware, software or services. Companies such as Cisco and Symantec provide cyber security
hardware and software. Cyber security services include security consulting services, managed security
services, risk and threat assessments, etc. Companies such as IBM and Internet Security Consulting
Services offer these services. End users adopt managed security services and outsource cyber security
requirements in order to concentrate on their core business functions.
Implementation of Design
The stage is comprised of implementation of hardware as well as software and services according to the
results of the analysis. Cyber security hardware and software requirements are implemented on the
premises of the end user. According to services offered by different companies and consulting firms, end
users implement the same design integration. Further, all the implemented hardware devices and
software are tested and integrated according to the requirement of the problem.
Market Drivers
This section describes the factors driving and restraining the cyber security market in North America.
© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 16
endpoint systems. Vendors in the market have come up with various cloud-based security solutions to
strengthen various security check points such as network security, endpoint security, application
security, and cloud accessor management for end user enterprises. Recently, in April 2018, Tripwire Inc.,
a key security and compliance solutions provider in the U.S., expanded its cloud security capability by
leveraging security solutions through Cloud Management Assessor (CMA). The solution is expected to
analyze the publicly available data of a given enterprise by file integrity monitoring (FIM) capabilities.
© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 17
Market Restraints
Use of Pirated Products
The use of pirated products is a major hindrance to the adoption of internet security solutions in the
countries like the U.S. and Mexico. The large segment of individual users assumes full protection out of
pirated or free versions of security solutions, which in turn hampers the market growth for North
American cyber security market. However, these solutions are not capable of protecting the user’s
system. The limitations arising from this factor could decrease in the future, mainly due to the falling
prices of security solutions and the rising consumer awareness of internet security solutions.
Market Opportunities
Rising Uptake in IoT Applications in Smart City Projects
In smart cities, every connected device follows a common platform for data connectivity, and it can
serve as an easy way for attackers to infect a major part of the system through a few connected devices.
For example, in 2012, the FBI reported a hack of smart device functionality, which could have cost its
electricity department around $400 million per year if it had not been detected. For all these kinds of
reasons, city officials in the North American region are spending huge amounts of money to safeguard
their city environment through strategic partnerships with solution providers. Recently, in April 2018,
Nokia announced a joint program with the Canadian government to implement a secure mobile virtual
network operator for public safety agencies, protecting its telecom networks from cyberattacks. The
total funding for this program is expected to exceed $1.5 billion, according to sources. Furthermore,
growth in the adoption of bring your own devices (BYOD) among enterprises attracts more vulnerability
to the office systems though their employees’ unprotected devices. To protect company data, whether
it is on mobile devices or office systems, vendors have already started providing specific security
solutions for mobile devices in BYOD environments.
© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 18