SlideShare une entreprise Scribd logo
1  sur  36
Utilities Infrastructure Security Market
Forecast 2014-2024
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

©notice
This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior written agreement of visiongain. You cannot photocopy, fax, download to database or duplicate in any other way any of the material contained in this report. Each purchase and single copy is for personal use only.
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

1. Executive Summary
1.1 Global Market Overview
1.2 Benefits of This Report
1.3 Who is This Report For?
1.4 Methodology
1.5 Primary Research
1.6 Secondary Research
1.7 Market Sizing
1.8 Forecasting
1.9 Visiongain’s Added Value
1.10 Factors Used in Visiongain’s Market Forecasting Methodology

2. Introduction to the Utilities Infrastructure Security Market
2.1 Utilities Infrastructure Security Market Structure Overview
2.2 Physical Security Submarket Definition & Analysis
2.3 Cybersecurity Submarket Definition & Analysis

3. Global Utilities Infrastructure Security Market 2014-2024
3.1 Global Utilities Infrastructure Security Market Forecast 2014-2024
3.2 Global Utilities Infrastructure Security Regional Forecast 2014-2024
3.3 Fastest Growing Utilities Infrastructure Security National Markets 20 14-2024
3.4 Global Utilities Infrastructure Security Drivers & Restraints
3.5 Global Utilities Infrastructure Security Drivers
3.6 Global Utilities Infrastructure Security Restraints
3.7 Key Utilities Infrastructure Areas of Interest
3.7.1 Electricity Infrastructure
3.7.2 Oil and Gas Infrastructure
3.7.3 Water and Sanitation Infrastructure
3.8 Global Utilities Infrastructure Security Threats
3.9 Mechanisms of Cyber Attack Against Utilities Infrastructure
3.10 Cyber Weaponry for use against Utilities Infrastructure
3.11 Methods of Cyber Defence for Utilities Infrastructure
3.12 List of Recent Major Global Cyber Attacks
3.12.1 Estonia
3.12.2 Operation Orchard

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security
3.12.3 Georgia
3.12.4 Conficker
3.12.5 Operation Buckshot Yankee
3.12.6 Aurora
3.12.7 Chinese Diversion of Internet Traffic
3.12.8 Stuxnet
3.12.9 Duqu
3.12.10 RSA
3.12.11 Sony Corporation
3.12.12 Operation Shady RAT
3.12.13 Mitsubishi Heavy Industries
3.12.14 Flame / Operation: Olympic Games
3.12.15 Aramco

3.13. Notable Utilities Infrastructure Security Events

4. Utilities Physical Security Submarket Forecasts 2014-2024
4.1 Utilities Physical Security Submarkets 2014-2024
4.2 Regional Physical Security Submarket Forecast 2014-2024
4.3 Physical Security Submarket Forecast by National Market 2014-2024
4.4 Physical Security Submarket Analysis
4.5 Regional Cybersecurity Submarket Forecast 2014-2024
4.6 Cybersecurity Submarket Forecast by National Market 2014-2024
4.7 Cybersecurity Submarket Analysis

5. Leading 15 National Utilities Infrastructure Security Market Forecasts
2014-2024
5.1 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2014-2024
5.2 Barriers to Entry Analysis 2014
5.3 U.S. Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.3.1 U.S. Utilities Physical Security Submarket Forecasts 2014-2024
5.3.2 U.S. Utilities Infrastructure Security Market Drivers & Restraints
5.3.3 Essential Components of U.S. Cybersecurity
5.3.3.1 CNCI
5.3.3.2 US CYBERCOM
5.3.3.3 ARCYBER

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security
5.3.3.4 AFCYBER (24th Air Force)
5.3.3.5 FLTCYBERCOM
5.3.3.6 MARFORCYBER
5.3.3.7 NSA
5.3.3.8 Perfect Citizen
5.3.3.9 DISA
5.3.3.10 DHS
5.3.3.11 National Protection and Programs Directorate
5.3.3.12 Office of Cyber Security and Communications
5.3.3.13 Einstein II
5.3.3.14 DARPA
5.3.4 The New Front: Why Concern for the Safety and Security of Critical Infrastructure
Will Continue To Drive U.S. Cybersecurity Expenditure Upwards
5.3.5 U.S. Utilities Infrastructure Security Contracts & Programmes

5.4 Chinese Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.4.1 Chinese Utilities Infrastructure Security Market Forecast
5.4.2 Chinese Utilities Infrastructure Security Market Drivers & Restraints
5.4.3 Going Nuclear: Why China Will Spend More than the Global Average on Utilities
Infrastructure Security between 2014 and 2024
5.4.4 How Does China’s Conceptual Understanding of ‘Information’ Shape Cyber
Security?
5.4.5 Chinese Utilities Infrastructure Security Contracts & Programmes
5.5 Russian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.5.1 Russian Utilities Infrastructure Security Submarket Forecast
5.5.2 Russian Utilities Infrastructure Security Market Drivers & Restraints
5.5.3 Russian Cybersecurity Policy: How Stage Two Is Expected to Build on Previous
Developments
5.5.4 Russian Utilities Infrastructure Security Contracts & Programmes
5.6 Canadian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.6.1 Canadian Utilities Infrastructure Security Submarket Forecast
5.6.2 Canadian Utilities Infrastructure Security Market Drivers & Restraints
5.6.3 Canada’s New Cybersecurity Strategy
5.6.4 Why The Canadian Private Sector is Still Being Asked to Pick up the Slack on
National Cyber Security
5.6.5 Canadian Utilities Infrastructure Security Contracts & Programmes
5.7 German Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.7.1 German Utilities Infrastructure Security Submarket Forecast

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security
5.7.2 German Utilities Infrastructure Security Market Drivers & Restraints
5.7.3 Have German Cybersecurity Efforts Acquired New Emphasis?
5.7.4 German Utilities Infrastructure Security Contracts & Programmes

5.8 Japanese Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.8.1 Japanese Utilities Infrastructure Security Submarket Forecast
5.8.2 Japanese Utilities Infrastructure Security Market Drivers & Restraints
5.8.3 How Has Japan Increased its Cybersecurity Capabilities to Counter the Threat of
Outsider Interference?
5.8.4 The Japanese Cyber Security Threat – Fukushima 2.0?
5.8.5 Japanese Utilities Infrastructure Security Contracts & Programmes
5.9 Indian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.9.1 Indian Utilities Infrastructure Security Submarket Forecast
5.9.2 Indian Utilities Infrastructure Security Market Drivers & Restraints
5.9.3 Why India’s 2012 Power Blackout has placed an emphasis on Critical Infrastructure
Protection?
5.9.4 Indian Bilateral Cybersecurity Agreements
5.9.5 Indian Utilities Infrastructure Security Contracts & Programmes
5.10 U.K. Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.10.1 U.K. Utilities Infrastructure Security Submarket Forecast
5.10.2 U.K. Utilities Infrastructure Security Market Drivers & Restraints
5.10.3 U.K. Utilities Infrastructure Security Contracts & Programmes
5.11 French Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.11.1 French Utilities Infrastructure Security Submarket Forecast
5.11.2 French Utilities Infrastructure Security Market Drivers & Restraints
5.11.3 Asymmetric Warfare: How Greenpeace Continues to Inadvertently Enhance the
French Utilities Infrastructure Security Market
5.12 Australian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.12.1 Australian Utilities Infrastructure Security Submarket Forecast
5.12.2 Australian Utilities Infrastructure Security Market Drivers & Restraints
5.12.3 Why Huawei Technologies is unlikely to have access to the Australian
telecommunications market in the near future
5.12.4 Australian Utilities Infrastructure Security Contracts & Programmes
5.13 Republic of Korea Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.13.1 Republic of Korea Utilities Infrastructure Security Submarket Forecast
5.13.2 Republic of Korea Utilities Infrastructure Security Market Drivers & Restraints
5.13.3 How Has South Korea Met the Challenge of the Cyber Threat?
5.13.4 Republic of Korea Utilities Infrastructure Security Contracts & Programmes

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

5.14 Saudi Arabian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.14.1 Saudi Arabian Utilities Infrastructure Security Submarket Forecast
5.14.2 Saudi Arabian Utilities Infrastructure Security Market Drivers & Restraints
5.14.3 Saudi Arabian Utilities Infrastructure Security Contracts & Programmes
5.15 Brazilian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.15.1 Brazilian Utilities Infrastructure Security Submarket Forecast
5.15.2 Brazilian Utilities Infrastructure Security Market Drivers & Restraints
5.16 Israeli Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.16.1 Israeli Utilities Infrastructure Security Submarket Forecast
5.16.2 Israeli Utilities Infrastructure Security Market Drivers & Restraints
5.16.3 Why Israeli Private Sector Spending on Cybersecurity Will Outpace Government
Expenditure
5.16.4 Israeli Utilities Infrastructure Security Contracts & Programmes
5.17 Nigerian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.17.1 Nigerian Utilities Infrastructure Security Submarket Forecast
5.17.2 Nigerian Utilities Infrastructure Security Market Drivers & Restraints
5.17.3 Nigerian Utilities Infrastructure Security Contracts & Programmes
5.18 Rest of the World Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024
5.18.1 Rest of the World Utilities Infrastructure Security Submarket Forecast
5.18.2 Rest of the World Utilities Infrastructure Security Market Drivers & Restraints
5.18.3 Rest of the World Utilities Infrastructure Security Contracts & Programmes

6. SWOT Analysis of the Utilities Infrastructure Security Market 20142024
7. Expert Opinion
7.1 Irina Rogizinskaya, International Sales and Marketing Manager, POLUS-ST LLC.
7.1.1 Company Background & History
7.1.2 Contribution to the Market & RADIOBARRIER
7.1.3 Product Integration and Company Cooperation
7.1.4 Market Strategy
7.2 Kim Legelis, Vice President, Marketing, Industrial Defender, Inc.
7.2.1 Contribution to the Market & Bridging the Gap Between OT and IT
7.2.2 Market Strategy
7.2.3 Product Integration & Maintenance

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security
7.2.4 Product & Service Advantages
7.2.5 Consumer Satisfaction & Demand
7.2.6 The Threat to Utilities Infrastructure
7.2.7 The Value of Industrial Defender’s Products

7.3 Lior Frenkel, CEO and Co-Founder, Waterfall Security Solutions Ltd.
7.3.1 Company Background & Commercial History
7.3.2 Contribution to the Market & Business Expansion
7.3.3 Consumer Demand & Technology Maintenance
7.3.4 Product & Service Advantages
7.3.5 Product Integration & Business Strategy
7.4 Barak Israel, Product Marketing Manager, & Udi Segall, Director of Business Development,
NICE Systems Ltd.
7.4.1 Company Background & Commercial History
7.4.2 Contribution to the Market & Customer Demand
7.4.3 Product Maintenance & Advantages
7.4.4 Product Integration & Market Strategy
7.4.5 Regulatory Compliance & the Threat to Utilities Infrastructure

8. Leading 12 Companies in the Utilities Infrastructure Security Market
8.1 Axis Communications AB Company Overview
8.1.1 Axis Communications AB Utilities Infrastructure Security Market Analysis
8.1.2 Axis Communications AB Primary Market Competitors
8.1.3 Axis Communications AB’ Regional Emphasis / Focus
8.1.4 Axis Communications AB’ M&A Activity
8.2 Bosch Group Company Overview
8.2.1 Bosch Group Utilities Infrastructure Security Market Analysis
8.2.2 Bosch Group’s Primary Market Competitors
8.2.3 Bosch Group’s Regional Emphasis / Focus
8.2.4 Bosch Group’s Recent M&A Activity
8.3 Honeywell International Inc. Company Overview
8.3.1 Honeywell International Inc. Utilities Infrastructure Security Market Analysis
8.3.2 Honeywell International Inc. Primary Market Competitors
8.3.3 Honeywell International Inc. Regional Emphasis / Focus
8.3.4 Honeywell International Inc. Recent M&A Activity
8.4 IndigoVision Group plc Company Overview
8.4.1 IndigoVision Group plc Utilities Infrastructure Security Market Analysis
8.4.2 IndigoVision Group plc’s Primary Market Competitors

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security
8.4.3 IndigoVision Group plc’s Regional Emphasis / Focus
8.4.4 IndigoVision Group plc’s Recent M&A Activity

8.5 Industrial Defender Inc. Company Overview
8.5.1 Industrial Defender Inc. Utilities Infrastructure Security Market Analysis
8.5.2 Industrial Defender Inc.’s Primary Market Competitors
8.5.3 Industrial Defender, Inc.’s Regional Emphasis / Focus
8.5.4 Industrial Defender Inc.’s Recent M&A Activity
8.6 Kratos Defense and Security Solutions Inc. Company Overview
8.6.1 Kratos Defense & Security Solutions Inc. Utilities Infrastructure Security Market
Analysis
8.6.2 Kratos Defense & Security Solutions Inc.’s Primary Market Competitors
8.6.3 Kratos Defense & Security Solutions Inc.’s Regional Emphasis / Focus
8.6.4 Kratos Defense & Security Solutions Inc.’s Recent M&A Activity
8.7 Lockheed Martin Corporation Company Overview
8.7.1 Lockheed Martin Corporation Utilities Infrastructure Security Market Analysis
8.7.2 Lockheed Martin Corporation Primary Market Competitors
8.7.3 Lockheed Martin Corporation’s Regional Emphasis / Focus
8.7.4 Lockheed Martin Corporation Recent M&A Activity
8.8 NICE Systems Ltd. Company Overview
8.8.1 NICE Systems Ltd. Utilities Infrastructure Security Market Analysis
8.8.2 NICE Systems Ltd. Primary Market Competitors
8.8.3 NICE Systems Ltd. Regional Emphasis / Focus
8.8.4 NICE Systems Ltd. Recent M&A Activity
8.9 QinetiQ Group plc Company Overview
8.9.1 QinetiQ Group plc Utilities Infrastructure Security Market Analysis
8.9.2 QinetiQ Group plc Primary Market Competitors
8.9.3 QinetiQ Group plc Regional Emphasis / Focus
8.9.4 QinetiQ Group plc Recent M&A Activity
8.10 Raytheon Company Overview
8.10.1 Raytheon Company Utilities Infrastructure Security Market Analysis
8.10.2 Raytheon Company’s Primary Market Competitors
8.10.3 Raytheon Company’s Regional Emphasis / Focus
8.10.4 Raytheon Company’s Recent M&A Activity
8.11 Schneider Electric SA Company Overview
8.11.1 Schneider Electric SA Utilities Infrastructure Security Market Analysis
8.11.2 Schneider Electric SA’s Primary Market Competitors
8.11.3 Schneider Electric SA Regional Emphasis / Focus

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security
8.11.4 Schneider Electric SA’s Recent M&A Activity

8.12 Waterfall Security Solutions Company Overview
8.12.1 Waterfall Security Solutions Utilities Infrastructure Security Market Analysis
8.12.2 Waterfall Security Solutions’ Primary Market Competitors
8.10.3 Waterfall Security Solutions’ Regional Emphasis/Focus
8.10.4 Waterfall Security Solutions’ Recent M&A Activity
8.13 Other Leading Companies in the Utilities Infrastructure Security Market

9. Conclusions & Recommendations
10. Glossary
List of Tables
Table 3.1 Global Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR%, Cumulative)
Table 3.2 Global Utilities Infrastructure Security Regional Forecasts 2014-2024 ($m, Cumulative)
Table 3.3 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (AGR %)
Table 3.4 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (CAGR %)
Table 3.5 Global Utilities Infrastructure Security Market Drivers & Restraints
Table 3.6 Mechanisms of Cyber Attack Against Utilities Infrastructure
Table 3.7 Cyber Weaponry for use against Utilities Infrastructure
Table 3.8 Methods of Cyber Defence for Utilities Infrastructure
Table 4.1 Global Utilities Physical Security Submarket Forecasts 2014-2024 ($m, Cumulative)
Table 4.2 Regional Physical Security Submarket Forecast 2014-2024 ($m, Cumulative)
Table 4.3 Physical Security Submarket Forecast by National Market 2014-24 ($m)
Table 4.4 Cybersecurity Submarket Forecast by Regional Market 2014-2024 ($m, Cumulative)
Table 4.5 Cybersecurity Forecast by National Market 2014-2024 ($m, AGR %)
Table 5.1 Leading National Utilities Infrastructure Security Market Forecast by Submarket 20142024 ($m)
Table 5.2 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %,
Cumulative)
Table 5.3 U.S. Utilities Infrastructure Security Drivers & Restraints
Table 5.4 Major U.S. Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.5 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR
%, Cumulative)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Table 5.6 Chinese Utilities Infrastructure Security Drivers & Restraints
Table 5.7 Major Chinese Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.8 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR
%, Cumulative)
Table 5.9 Russian Utilities Infrastructure Security Drivers & Restraints
Table 5.10 Major Russian Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.11 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.12 Canadian Utilities Infrastructure Security Drivers & Restraints
Table 5.13 Major Canadian Utilities Infrastructure Contracts & Programmes
(Contractor/Programme, Submarket, Value $m, Date, Details)
Table 5.14 German Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.15 German Utilities Infrastructure Security Drivers & Restraints
Table 5.16 Major German Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.17 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.18 Japanese Utilities Infrastructure Security Drivers & Restraints
Table 5.19 Major Japanese Utilities Infrastructure Contracts & Programmes
(Contractor/Programme, Submarket, Value $m, Date, Details)
Table 5.20 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR
%, Cumulative)
Table 5.21 Indian Utilities Infrastructure Security Drivers & Restraints
Table 5.22 Major Indian Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.23 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR
%, Cumulative)
Table 5.24 U.K. Utilities Infrastructure Security Drivers & Restraints
Table 5.25 Major U.K. Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.26 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR
%, Cumulative)
Table 5.27 French Utilities Infrastructure Security Drivers & Restraints

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Table 5.28 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.29 Australian Utilities Infrastructure Security Drivers & Restraints
Table 5.30 Major Australian Utilities Infrastructure Contracts & Programmes
(Contractor/Programme, Submarket, Value $m, Date, Details)
Table 5.31 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR
%, CAGR %, Cumulative)
Table 5.32 Republic of Korea Utilities Infrastructure Security Drivers & Restraints
Table 5.33 Major RoK Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.34 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.35 Saudi Arabian Utilities Infrastructure Security Drivers & Restraints
Table 5.36 Major Saudi Arabian Utilities Infrastructure Contracts & Programmes
(Contractor/Programme, Submarket, Value $m, Date, Details)
Table 5.37 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.38 Brazilian Utilities Infrastructure Security Drivers & Restraints
Table 5.39 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR
%, Cumulative)
Table 5.40 Israeli Utilities Infrastructure Security Drivers & Restraints
Table 5.41 Major Israeli Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.42 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %,
CAGR %, Cumulative)
Table 5.43 Nigerian Utilities Infrastructure Security Drivers & Restraints
Table 5.44 Major Nigerian Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 5.45 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR
%, CAGR %, Cumulative)
Table 5.46 Rest of the World Utilities Infrastructure Security Drivers & Restraints
Table 5.47 Major RoW Utilities Infrastructure Contracts & Programmes (Contractor/Programme,
Submarket, Value $m, Date, Details)
Table 6.1 SWOT Analysis of the Utilities Infrastructure Security Market 2014-2024
Table 8.1 Leading 12 Companies in the Utilities Infrastructure Security Market 2014 (Company,
Total Revenue, Market Product Specialisation)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Table 8.2 Axis Communications AB Overview 2012 (Total Company Revenue, Strongest Business
Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.3 Recent Axis Communications AB Utilities Infrastructure Security Contracts / Projects /
Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.4 Sample of Axis Communications AB Utilities Infrastructure Security Products / Services
(Company Section, Product, Specification)
Table 8.5 Bosch Group Overview 2012 (Total Company Revenue, Strongest Business Region,
Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.6 Recent Bosch Group Utilities Infrastructure Security Contracts / Projects / Programmes
(Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.7 Sample of Bosch Group Utilities Infrastructure Security Products / Services (Company
Section, Product, Product Description, Specification)
Table 8.8 Honeywell International Inc. Company Overview 2012 (Total Company Revenue,
Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees,
Ticker, IR Contact, Website)
Table 8.9 Recent Honeywell International Inc. Utilities infrastructure security Contracts / Projects /
Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.10 Sample of Honeywell International Inc. Utilities Infrastructure Security Products /
Services (Company Section, Product, Product Description, Specification)
Table 8.11 IndigoVision Group plc Overview 2012 (Total Company Revenue, Strongest Business
Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.12 Recent IndigoVision Group plc Utilities Infrastructure Security Contracts / Projects /
Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.13 Sample of IndigoVision Group plc Utilities Infrastructure Security Products / Services
(Company Section, Product, Specification)
Table 8.14 Industrial Defender Inc. Company Overview 2012 (Total Company Revenue, Strongest
Business Region, Subsidiary, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.15 Recent Industrial Defender Inc. Utilities Infrastructure Security Contracts / Projects /
Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.16 Sample of Industrial Defender Utilities Infrastructure Security Products / Services
(Section, Product, Product Description, Specification)
Table 8.17 Kratos Overview 2012 (Total Company Revenue, Strongest Business Region, HQ,
Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.18 Recent Kratos Utilities Infrastructure Security Contracts / Projects / Programmes (Date,
Subcontractors, Country, Value, Details, Model/Type)
Table 8.19 Sample of Kratos Defense & Security Solutions Inc. Utilities Infrastructure Security
Products / Services (Section, Product, Specification)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Table 8.20 Lockheed Martin Corporation Overview 2012 (Total Company Revenue, Strongest
Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR
Contact, Website)
Table 8.21 Recent Lockheed Martin Corporation Utilities Infrastructure Security Contracts /
Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.22 Sample of Lockheed Martin Corporation Utilities infrastructure security Products /
Services (Company Section, Product, Product Description, Specification)
Table 8.23 NICE Systems Ltd. Overview 2012 (Total Company Revenue, Strongest Business
Region, Subsidiaries, Partner in Market, HQ, Founded, No. of Employees, Ticker, IR Contact,
Website)
Table 8.24 Recent NICE Systems Ltd. Utilities Infrastructure Security Contracts / Projects /
Programmes (Date, Country, Details, Model/Type)
Table 8.25 Sample of NICE Systems Ltd. Utilities infrastructure security Products / Services
(Company Section, Product, Product Description, Specification)
Table 8.26 QinetiQ Group plc Overview 2012 (Total Company Revenue, Strongest Business
Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact,
Website)
Table 8.27 Recent QinetiQ Group plc Utilities infrastructure security Contracts / Projects /
Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.28 Sample of QinetiQ Group plc Utilities Infrastructure Security Products / Services
(Company Section, Product, Product Description, Specification)
Table 8.29 Raytheon Company Overview 2012 (Total Company Revenue, Strongest Business
Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.30 Recent Raytheon Company Utilities infrastructure security Contracts / Projects /
Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.31 Sample of Raytheon Company Utilities Infrastructure Security Products / Services
(Company Section, Product, Specification)
Table 8.32 Schneider Electric SA Company Overview 2012 (Total Company Revenue, Strongest
Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.33 Recent Schneider Electric SA Company Utilities infrastructure security Contracts /
Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Table 8.34 Sample of Schneider Electric SA Company Utilities Infrastructure Security Products /
Services (Company Section, Product, Specification)
Table 8.35 Waterfall Security Solutions Ltd. Overview 2012 (Total Company Revenue, Strongest
Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website)
Table 8.36 Recent Waterfall Security Solutions Ltd. Utilities infrastructure security Contracts /
Projects / Programmes (Date, Subcontractors, Country, Details)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Table 8.37 Sample of Waterfall Security Solutions Ltd. Utilities Infrastructure Security Products /
Services (Company Section, Product, Product Description, Specification)
Table 8.38 Other Leading Companies in the Utilities Infrastructure Security Market (Company,
Primary Market Product / Service)

List of Figures
Figure 2.1 Global Utilities Infrastructure Security Market Structure Overview
Figure 3.1 Global Utilities Infrastructure Security Market Regional Forecast 2014-2024 (AGR%)
Figure 3.2 Utilities Infrastructure Security Market Regional Share Forecast 2014 (%)
Figure 3.3 Utilities Infrastructure Security Market Regional Share Forecast 2019 (%)
Figure 3.4 Utilities Infrastructure Security Market Regional Share Forecast 2024 (%)
Figure 3.5 Top Five Fastest Growing Utilities Infrastructure Security National Markets 2014-2024
(AGR %)
Figure 3.6 Global Utilities Infrastructure Security Threats
Figure 3.7 Operation Shady RAT Targets
Figure 4.1 Global Utilities Physical Security Submarket Forecasts 2014-2024 ($m)
Figure 4.2 Global Utilities Infrastructure Security Submarkets Share Forecast 2014 (%)
Figure 4.3 Global Utilities Infrastructure Security Submarkets Share Forecast 2019 (%)
Figure 4.4 Global Utilities Infrastructure Security Submarkets Share Forecast 2024 (%)
Figure 4.5 Regional Physical Security Submarket Share Forecast 2014, 2019, 2024 (% Share)
Figure 4.6 Regional Physical Security Submarket 2014-2024 ($m, AGR%)
Figure 4.7 Physical Security Submarket Forecast by National Market 2014-2024 ($m, AGR%)
Figure 4.8 Physical Security Submarket National Share Forecast 2014 (%)
Figure 4.9 Physical Security Submarket National Share Forecast 2019 (%)
Figure 4.10 Physical Security Submarket National Share Forecast 2024 (%)
Figure 4.11 Regional Cybersecurity Submarket Share Forecast 2014, 2019, 2024 (% Share)
Figure 4.12 Regional Cybersecurity Submarket Forecast 2014-2024 ($m, AGR%)
Figure 4.13 Cybersecurity Submarket Forecast by National Market 2014-2024 ($m, AGR%)
Figure 4.14 Cybersecurity Submarket National Share Forecast 2014 (%)
Figure 4.15 Cybersecurity Submarket National Share Forecast 2019 (%)
Figure 4.16 Cybersecurity Submarket National Share Forecast 2024 (%)
Figure 5.1 Leading 15 National Utilities Infrastructure Security Markets 2014-2024 ($m)
Figure 5.2 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2014 (%)
Figure 5.3 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2019 (%)
Figure 5.4 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2024 (%)
Figure 5.5 Barriers to Entry vs. Leading 15 National Market Size vs. AGR% 2014 ($m, AGR%)
Figure 5.6 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Figure 5.7 U.S. Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019,
2024 (% Share)
Figure 5.8 U.S. Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (%
Share)
Figure 5.9 U.S. Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 20142024 (CAGR%, CAGR Period)
Figure 5.10 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.11 U.S. Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.12 US Government and Military Cybersecurity Organisational Structure
Figure 5.13 US CYBERCOM Organisational Structure
Figure 5.14 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.15 Chinese Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.16 Chinese Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.17 Chinese Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR% CAGR Period)
Figure 5.18 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.19 Chinese Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.20 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.21 Russian Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.22 Russian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.23 Russian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.24 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.25 Russian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.26 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.27 Canadian Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.28 Canadian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019,
2024 (% Share)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Figure 5.29 Canadian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.30 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.31 Canadian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.32 German Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.33 German Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.34 German Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.35 German Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.35 German Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%)
Figure 5.37 German Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.38 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.39 Japanese Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.40 Japanese Utilities Infrastructure Security Market Regional Breakdown 2014, 2019,
2024 (% Share)
Figure 5.41 Japanese Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.42 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.43 Japanese Utilities Infrastructure Security Market Breakdown by Submarket 2014,
2019, 2024 (% Share)
Figure 5.44 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.45 Indian Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.46 Indian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.47 Indian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.50 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Figure 5.51 U.K. Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019,
2024 (% Share)
Figure 5.52 U.K. Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (%
Share)
Figure 5.53 U.K. Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.54 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.55 U.K. Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.56 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.57 French Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.58 French Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.59 French Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.60 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.61 French Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.62 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.63 Australian Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.64 Australian Utilities Infrastructure Security Market Regional Share Breakdown 2014,
2019, 2024 (% Share)
Figure 5.65 Australian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.66 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.67 Australian Utilities Infrastructure Security Market Breakdown by Submarket 2014,
2019, 2024 (% Share)
Figure 5.68 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m,
AGR %)
Figure 5.69 Republic of Korea Utilities Infrastructure Security Market Global Market Share Forecast
2014, 2019, 2024 (% Share, CAGR Period)
Figure 5.70 Republic of Korea Utilities Infrastructure Security Market Regional Breakdown 2014,
2019, 2024 (% Share)
Figure 5.71 Republic of Korea Utilities Infrastructure Security CAGR Forecasts VS Global CAGR
Forecasts 2014-2024 (CAGR%)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Figure 5.72 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m,
AGR %)
Figure 5.73 Republic of Korea Utilities Infrastructure Security Market Breakdown by Submarket
2014, 2019, 2024 (% Share)
Figure 5.74 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR
%)
Figure 5.75 Saudi Arabian Utilities Infrastructure Security Market Global Market Share Forecast
2014, 2019, 2024 (% Share)
Figure 5.76 Saudi Arabian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019,
2024 (% Share)
Figure 5.77 Saudi Arabian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR
Forecasts 2014-2024 (CAGR%, CAGR Period)
Figure 5.78 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR
%)
Figure 5.79 Saudi Arabian Utilities Infrastructure Security Market Breakdown by Submarket 2014,
2019, 2024 (% Share)
Figure 5.80 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.81 Brazilian Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.82 Brazilian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.83 Brazilian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.84 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.85 Brazilian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.86 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.87 Israeli Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.88 Israeli Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.89 Israeli Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.90 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.91 Israeli Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.92 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Figure 5.93 Nigerian Utilities Infrastructure Security Market Global Market Share Forecast 2014,
2019, 2024 (% Share)
Figure 5.94 Nigerian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024
(% Share)
Figure 5.95 Nigerian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts
2014-2024 (CAGR%, CAGR Period)
Figure 5.96 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %)
Figure 5.97 Nigerian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019,
2024 (% Share)
Figure 5.98 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m,
AGR %)
Figure 5.99 Rest of the World Utilities Infrastructure Security Market Global Market Share Forecast
2014, 2019, 2024 (% Share)
Figure 5.100 Rest of the World Utilities Infrastructure Security Market Regional Breakdown 2014,
2019, 2024 (% Share)
Figure 5.101 Rest of the World Utilities Infrastructure Security CAGR Forecasts VS Global CAGR
Forecasts 2014-2024 (CAGR%, CAGR Period)
Figure 5.102 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m,
AGR %)
Figure 5.103 Rest of the World Utilities Infrastructure Security Market Breakdown by Submarket
2014, 2019, 2024 (% Share)
Figure 8.1 Axis Communications AB Organisational Structure
Figure 8.2 Axis Communications AB Regional Emphasis / Focus
Figure 8.3 Bosch Group Organisational Structure
Figure 8.4 Bosch Group Regional Emphasis / Focus
Figure 8.5 Honeywell International Inc. Organisational Structure
Figure 8.6 Honeywell International Inc. Regional Emphasis / Focus
Figure 8.7 IndigoVision Group plc Organisational Structure
Figure 8.8 IndigoVision Group plc Regional Emphasis /Focus
Figure 8.9 Industrial Defender Inc. Organisational Structure
Figure 8.10 Industrial Defender, Inc. Regional Emphasis / Focus
Figure 8.11 Kratos Defense & Security Solutions Organisational Structure
Figure 8.12 Kratos Regional Emphasis / Focus
Figure 8.13 Lockheed Martin Corporation Organisational Structure
Figure 8.14 Lockheed Martin Corporation’s Regional Emphasis / Focus
Figure 8.15 NICE Systems Ltd. Organisational Structure
Figure 8.16 NICE Systems Ltd. Regional Emphasis /Focus

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Figure 8.17 QinetiQ Group plc Organisational Structure
Figure 8.18 QinetiQ Group plc Regional Emphasis / Focus
Figure 8.19 Raytheon Company Organisational Structure
Figure 8.20 Raytheon Company’s Regional Emphasis / Focus
Figure 8.21 Schneider Electric SA Company Organisational Structure
Figure 8.22 Schneider Electric SA’s Regional Emphasis / Focus
Figure 8.23 Waterfall Security Solutions Ltd. Organisational Structure
Figure 8.24 Waterfall Security Solutions Regional Emphasis / Focus

List of Companies Mentioned In This Report
ABB Ltd.
Actimise
AD Group
ADI-Gardiner Ltd.
ADT Fire & Security
ADT Security
Agent Vi
Akera
Akustica, Inc.
Al Faisaliah Group
AlliedSignal Aerospace Service Corporation
Alstom
Amber Engineering, Inc.
Anglia Water
APC
Applied Visions, Inc.
Arcsight
Areva
Areva T&D
ATG Access
AtlanticTransgasSystem (ATGS)
Aveos Fleet Performance
Axis Communications AB
Axxonsoft
BAE Systems
Battelle Memorial Institute
Beech Aircraft Leasing, Inc.

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

BEI Technologies
Belden®
Bell Canada
Bharat Petroleum Corporation Limited (BCPL)
Boeing Defense, Space & Security
Bosch Engineering GmbH
Bosch Group
Bosch Mahle Turbo Systems GmbH & Co. KG
Bosch Rexroth AG
Bosch Security Systems
Bosch Software Innovations GmbH
Bosch Solar Energy AG
Bosch Thermotechnik GmbH
British Telecom
Broughton High Security
Byres Security
Cassidian Cybersecurity
Causata
China Telecom
Chubb Systems
Cimac
Citect
Clipsal
CNI
ConneXium LLC
CRS
CrySyS Lab
CSC
CyberTech International
Cyveillance, Inc.
Def-Logix
Denim Group
Detection Systems and Radionics, Inc.
Digital Fusion, Inc.
Dominion Technology Resources, Inc.
D-Tec
DVTel

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

El Al Israel Airlines Ltd.
ELAU
Electricité de France (EDF)
Elster
EMC
EMS Aviation, Inc.
EnerNex
ERAPSCO
Erie Water Works
ESB
ESY Export Company, Inc.
ETAS
Exida Canada
Exmesh Security
Extreme CCTV
Exxon-Mobile Corporation
Fandotech LLC
FAST Video Security
Federal Pioneer
Firelight Infrastructure Partners
Firetide
FLIR Systems
Fortent
Foxguard Solutions
Fujitsu Ltd.
G4S Regulated Security Solutions (RSS)
G4S Secure Solutions
Garland Power and Light
Gazprom
General Dynamics
General Electric (GE)
General Electric Company
Genetec
Georgia Tech Applied Research
Geutebruck
Google
Gratte Brothers Security Management

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Great Circle Solar Management
Grimes Aerospace Company
Gutor Electronic LLC
Hannamax Hi-Tech
Hardstaff Traffic Barriers Limited
HAURI, Inc
Haverkamp GmbH
Haverstick Consulting
HC Security Solutions
Helicentre Aviation
Hexagon Systems Engineering Ltd.
HID Global
Hikvision Digital Technology Co. Ltd.
Hirschmann™
Honeywell Integrated Security
Honeywell International, Inc.
Honeywell Process Solutions
Honeywell Video Systems
HRL Laboratories LLC
HRL Research Analytics, Inc.
Huawei Technologies
Hughes Training Italia Srl
Iberdrola
IBM Corporation
IBM Research
ICF International
ICx Technologies
IEX Corporation
IHI Corp.
IndigioVision Group plc
Industrial Defender, Inc.
Infinion Technologies AG
Infinova
InGuardians, Inc.
Integral Systems, Inc.
Intermec
International Electronics Systems, Inc

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Intransa
Invensy’s plc
IOActive, Inc.
IPKeys
IQinVision
Israel National Gas Lines Ltd. (INGL)
ITT Advanced Engineering Sciences Division
Ivensys plc
J & S Franklin
Jacksons Security
JMA Associates
Juno Lightning
Kaspersky Lab
Kawasaki Heavy Industries
Kentz Corporation Ltd
Kestrel Technology LLC
Korea Telecommunication Corporation (KT)
Kratos Defense & Security Solutions
Leidos
Lockheed Martin Aerospace Systems Integration Corporation
Lockheed Martin Australia Pty Limited
Lockheed Martin Canada, Inc.
Lockheed Martin Corporation
Lockheed Martin Desktop Solutions, Inc.
Lockheed Martin Engine Investments, LLC
Lockheed Martin Information Systems & Global Solutions
Lockheed Martin Integrated Technology LLC
Lockheed Martin Operations Support, Inc.
Logica
Lookingglass Cyber Solutions
LXE LLC
M&C Energy Group
Magal Security Systems, Ltd
Mainline Information Systems
ManTech International Corporation
McAfee, Inc.
Melbourne Water

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Merced Systems
Meridian Rapid Defense Group
Merit Network, Inc
Merlin Gerin
Merten
Mitsubishi Heavy Industries
Modicon PLC
Mul-T-Lock Technologies Limited
Naskam Security Services
Nexight Group
NICE Systems Ltd.
NISC
Nishat Power Limited
Northrop Grumman Information Systems
Northumbrian Water Limited (NWL)
Novar ED&S Ltd.
Nu-Lec Industries
New York State Electric & Gas and Rochester Gas and Electric (NYSEG)
Oak Ridge National Laboratory
Omega Securidad
OPSWAT
OptaSense
Optex
PDL Group
Pelco Corporation
Performix
Perimeter Security Suppliers Association
Petroleos Mexicanos (Pemex)
PG&E Metcalf
Phillips Communications and Security, Inc.
Planning Systems, Inc.
POLUS-ST LLC
Power Measurement
Procerus Technologies
PureTech Systems
Q1 Labs, Inc.
Qatar Petroleum

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

QinetiQ Group plc
QTC Holdings, Inc.
Quadrant Security Group
Quality Plus Group
Quantum Secure
RAE Systems, Inc.
RandomStorm
RAPID, LLC
Raytag Ltd.
Raytec
Raytheon BBN Technologies
Raytheon Company
Raytheon Intelligence & Information Systems
Raytheon Secure Information Systems LLC
Raytheon Teligny, Inc.
Raytheon Visual Analytics
RCM Solutions
Redkite Financial Markets
Reliance High-Tech Limited
Robert Bosch GmbH
Royal and Sun Alliance LLC (RSA)
SafeNet Government Solutions
SafeNet, Inc.
SAIC, Inc.
Sandia Corporation
Sandia Group
Sandia National Laboratories
SAP
Saudi Aramco
Schneider Electric SA
Schweitzer Engineering Laboratories
Science Applications International Corp.
Scottish Equity Partners
ScottishPower Ltd.
Secure Site Solutions
Secure Tech
Senstar Corporation

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Sichuan Baxinghe Power Corporation
Siemens AG
SightLogix
Skype
Solana Networks
SolveIT Software
Sony Corporation
Southwest Microwave, Inc.
Sperian Protection Europe SAS
SpotterRF
SPX Service Solutions
Square D
SU53
Summit plc
Swedish Nuclear Fuel & Waste Co. (SKB)
Symantec Corporation
SynApps Solutions
SYS Technologies
TAC
TagMaster
Technica Corporation
Telemecanique
Teligy, Inc.
Telstra
Telvent
Thales Contact Solutions
Thames Water
The Grid Protection Alliance
The New York Times
The Washington Post
TT Government Solutions
TZ Limited
UOP LLC
UOP Russell LLC
URS
UXC Connect
Vattenfall Europe Generation AG&Co. KG

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

VeriSign, Inc.
Viasat
Visual Analytics, Inc.
Waterfall Security Solutions Ltd
Waterfall Security Solutions USA
Westminster Group plc
Will Electronics
Wireless Facilities Incorporated (WFI)
Wirsol Solar UK
WT Parker
Zambian Electricity Supply Company
Zaun Limited
Zener Electricals and Electronic Services
ZF Lenksysteme GmbH
Zicom Group Limited
ZTE Corporation

List of Organisations Mentioned In This Report
Abu Dhabi Critical National Infrastructure Authority (CNIA)
Albuquerque Bernalillo County Water Utility Authority (ABCWUA)
Al-Mau’qi’oon Biddam Brigade
Al-Qaeda
Anonymous
Äspö Hard Rock Laboratory
Australian Customs and Border Protection Service (ACBPS)
Berlin Stock Exchange (BSE)
Canadian Cyber Incident Response Centre (CCIRC)
Canadian Department of Public Safety and Emergency Preparedness
Chinese People’s Liberation Army (PLA)
Chinese Ministry of Environment
City of San Diego Public Utilities Department
Colombia University
Communist Party of China (CIP)
DHS S&T Cyber Security Division (CSD)
European Commission
GCHQ
George Mason University

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Georgia Tech Applied Research
Georgia Tech Research Corp.
German Bundeswehr
German Customs Criminological Office
German Federal Criminal Police Office
German Federal Intelligence Service
German Federal Ministry of the Interior
German Federal Office for Information Security
German Federal Office for the Protection of the Constitution
German Federal Office of Civil Protection and Disaster Assistance
German Federal Police
German Nationaler Cyber-Sicherheitsrat (NCS) (National Cyber Security)
German Nationales Cyber-Abwehrzentrum (NCAZ) (National Cyber Defence Centre)
Greenpeace
Indian Computer Emergency Response Team (CERT-In)
Indian Defence Research and Development Organisation (DRDO)
Indian National Critical Information Infrastructure Protection Centre
Information Security Policy Council
Initiative for Cyber Security Information Sharing Partnership of Japan
International Computer Science Institute
Iraqi Oil Protection Force (OPF)
ISA Security Compliance Institute
Israeli Cyber Directorate
ITT Advanced Engineering Sciences Division
Japan Information – Technology Promotion Agency
Japanese Control System Security Centre (CSSC)
Japanese Defence Ministry
Japanese Internal Affairs and Communications Ministry
Japanese Internal Affairs and Communications Ministry
Japanese Ministry of Trade and Industry (METI)
Korea Communications Commission (KCC)
London Stock Exchange (LSE)
Morgridge Institute for Research
National Rural Telecommunications Cooperative
North Atlantic Treaty Organisation (NATO)
Northshore Utility District
Oak Ridge National Laboratory

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

Pacific NW National Laboratory
Purdue University
Rowland Water District
Russian Federal Security Bureau (FSB)
Rutgers University - New Brunswick Campus
Saudi Royal Commission for Jubail and Yanbu
Soon Chun Hyang University
South Korean Cyber Security Centre
South Korean Financial Supervisory Service
South Korean Ministry of Science and Technology
South Korean National Intelligence Service
Syrian Electronic Army
Tarrant Regional Water District (TRWD)
Tel Aviv Stock Exchange (TASE)
The Critical National Infrastructure Authority (CNIA) of Abu Dhabi
The Department of Homeland Security Science and Technology Directorate (DHS S&T)
The Electric Power Research Institute
The Grid Protection Alliance
The National Rural Electric Cooperative Association
The Trustees of Princeton University
The University of Alabama at Birmingham
The University of North Carolina at Chapel Hill
Trollmuhle
Trustees of Dartmouth College
Trustees of Indiana University
U.K. Environment Agency
U.K. Ministry of Defence (MOD)
U.S National Cyber Response Coordination Group (NCRCG)
U.S. 780th Military Intelligence Brigade
U.S. Air Force
U.S. Air Force Cyber Command
U.S. Air Force Cyber Command (AFCYBER)
U.S. Army
U.S. Army Corps of Engineers (USACE)
U.S. Army Forces Cyber Command
U.S. Army Intelligence and Security Command (INSCOM)
U.S. Army Network Enterprise Technology (NETCOM)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

U.S. Central Command (CENTCOM)
U.S. Coast Guard
U.S. Computer Emergency Readiness Team
U.S. Cyber Command (CYBERCOM)
U.S. Defense Advanced Projects Research Agency (DARPA)
U.S. Defense Information Systems Agency
U.S. Department of Commerce
U.S. Department of Defense (DoD)
U.S. Department of Energy (DoE)
U.S. Department of Energy’s National Nuclear Security Administration
U.S. Department of Homeland Security (DHS)
U.S. Department of Homeland Security Cyber Security Division (CSD)
U.S. Department of Homeland Security Industrial Control Systems Emergency Response Team
(ICS-CERT)
U.S. Department of Homeland Security Science & Technology Directorate (DHS S&T)
U.S. Department of Public Works (DPW)
U.S. Department of Veteran’s Affairs (VA)
U.S. Environmental Protection Agency (EPA)
U.S. Federal Bureau of Investigation (FBI)
U.S. Fleet Cyber Command (FLYTCYBERCOM)
U.S. Marine Corps
U.S. Marine Corps Cryptologic Support Battalion (MCSB)
U.S. Marine Corps Cyberspace Command
U.S. Marine Corps Network Operations Security Center (MCNOSC)
U.S. Metropolitan Water District (MWD)
U.S. National Critical Information Infrastructure Protection Center (NCIIPC)
U.S. National Cyber Security Division (NCSD)
U.S. National Institute of Standards and Technology (NIST)
U.S. National Protection and Programs Directorate (NPPD)
U.S. National Security Agency (NSA)
U.S. Naval Academy
U.S. Naval Network Warfare Command (NNWC)
U.S. Navy
U.S. Navy Cyber Defense Operations Command (NCDOC)
U.S. Navy Information Operation Command (NIOC)
U.S. Navy Naval Postgraduate School
U.S. Nuclear Regulatory Commission (NRC)

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

U.S. Office of Cyber Security and Communications
U.S. Signals Command (SC)
U.S. Strategic Command (STRATCOM)
University of California, San Diego
University of Illinois at Urbana-Champaign
University of Maryland
University of Southern California Information Sciences Institute
Waterford Township Department of Public Works
Wikileaks
Xian Jiaotong University

www.visiongain.com
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

5.7.4 German Utilities Infrastructure Security Contracts & Programmes
Table 5.16 Major German Utilities Infrastructure Contracts & Programmes
(Contractor/Programme, Submarket, Date, Details)
Contractor/Programme

Senstar Corporation

Genetec

Infinion Technologies AG,
German Federal Ministry of
the Interior

Bosch Security Systems

Submarket

Physical Security

Physical Security

Cybersecurity

Physical Security

Date

Details

June 2012

Senstar Corporation announced the sale of
over 200km worth of perimeter intrusion
detection systems (PIDS) to solar power
generation facilities in Germany.

April 2012

Trollmuhle, a water supply association
located in the Rhineland, awarded Genetec
a contract to provide its video surveillance
services at its main pumping station in
Windesheim.

September
2011

The German Federal Ministry of the Interior
announced that it was extending the scope
of its cooperation with Infineon
Technologies AG. This extended
cooperation will evaluate new
technologies to provide security for critical
infrastructures and mobile computing. The
partnership also covers research into data
protection for ID documentation.

April 2009

Vattenfall Europe Generation AG & Co. KG
contracted Bosch Group Security Systems
to provide communications and security
technology for its Hamburg-Moorburg
coal-fired power plant. The contract
included the provision of public address
systems, alarm signalling and evacuation,
fire detection technology, video
surveillance, communication and lowvoltage networks for dual-unit plants.

Source: Visiongain 2014

www.visiongain.com

Page 139
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

5.9.1 Indian Utilities Infrastructure Security Submarket Forecast
Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m,
AGR %)
12

800
700

10

600

Sales US$m

6

400
300

AGR (%)

8

500

4

200
2

100

0

0
2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024
Year
Physical Security

Cybersecurity

AGR%

Source: Visiongain 2014

Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m,
AGR %)
2014

28.
2%

2019

36.
1%
71.
8%

Physical Security

2024

36.
2%

63.
9%

63.
8%

Cybersecurity

Source: Visiongain 2014

www.visiongain.com

Page 150
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

7. Expert Opinion
7.1 Irina Rogizinskaya, International Sales and Marketing Manager,
POLUS-ST LLC.
POLUS-ST LLC. is a well established innovation company based in Russia whose primary product
in the Utility Infrastructure Security Market is RADIOBARRIER, a security system based upon
distributed acoustic sensor technology. Their Head Operation Office is located in Moscow; while
R&D and production facilities are located in Akademgorodok, Novosibirsk. Akademgorodok is one
of the largest science and research areas of Russia with dozens of research institutes and
universities. The company benefits greatly from this special location that provides access to new,
innovative technologies and well educated and skilled personnel for production and R&D. POLUSST has a 10-year-long history of providing high quality innovative perimeter surveillance products
for large government and corporate clients and is ready to serve you and protect your assets,
whatever they may be.

7.1.1 Company Background & History
Visiongain: Please could you briefly describe your position and background within POLUS-ST?

Irina Rogizinskaya: Currently I'm employed as International Sales & Marketing Manager in
POLUS-ST LLC, dealing with the security market and RADIOBARRIER – a Wireless Intrusion
Detection System for various outdoor applications.

Visiongain: Please could you briefly explain the background of POLUS-ST and its commercial
history?

Irina Rogizinskaya: 1996: Mr. Ravil Kalimulin, who later started the company, was then in the
rank of General Major and supervised Communications and Special Equipment Department, being
on active duty in many armed conflicts zones saw a great need for a wireless force protection
alarm system. 1999: After retiring Mr. Kalimulin and his partners started a company with the main
goal of developing and manufacturing wireless alarm systems for various applications. 2000: First
generation of RADIOBARRIER wireless sensor set manufactured. The set consisted of 4 batteryoperated seismic sensors and 1 handheld receiver linked with one-way radio channel.
Communication range of the system was up to 500 m. 2003: The second generation of the
RADIOBARRIER system began to be produced. It was a rapidly deployable sensor suite consisting
of 32 nodes, 1 repeater, handheld receiver and a PC based command and control station.
2005 Third generation of RADIOBARRIER system was developed, taking into consideration the

www.visiongain.com

Page 213
Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing
Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security

Utilities Infrastructure Security Market Forecast 2014-2024:
Top Companies Providing Surveillance, Perimeter Defence,
Operational Technologies & Endpoint Cyber Security

8.1 Axis Communications AB Company Overview
Table 8.2 Axis Communications AB Overview 2012 (Total Company Revenue,
Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact,
Website)
2012
Total company revenue $m

$642m

Strongest Business Region

Americas

Partner in Market

NICE Systems Ltd.

Headquarters

Lund, Sweden

Founded

1984

No. of Employees

1500+

Ticker

OMX: AXIS:SS
Johan Lundin, Investor Relations Manager, Phone: + 46 46 272 2700,
Email: ir@axis.com

IR Contact
Website

www.axis.com

Source: Visiongain 2014

Table 8.3 Recent Axis Communications AB Utilities Infrastructure Security Contracts /
Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type)
Date

Subcontractors

May
2013

Firelight
Infrastructure
Partners, Great
Circle Solar

January WT Parker, Agent
2013
Vi

May
2012

Undisclosed

Country

Value

Details

Canada

Axis Communications AB received a contract from
Canadian solar farm operators Firelight Infrastructure
Partners, and Great Circle Solar Management for the
Undisclosed
deployment of thermal cameras, HD quality PTZ and fixed
network cameras, and the upgrading of analogue cameras
to IP standard.

U.K.

Systems integrator WT Parker chose Agent Vi’s real-time
video analytics software solution, along with Axis
January 2013 Communications AB’ Q1921-E thermal network cameras
for use at four of Wirsol Solar UK’s 5-megawatt solar
farms.

China

Sichuan Baxinghe Power Corporation awarded Axis
Communications AB a contract to install Axis video
Undisclosed
encoders at its 19 cascade power stations, improving them
to IP standard.

Source: Visiongain 2014

www.visiongain.com

Page 233

Contenu connexe

En vedette

Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014
Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014
Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014Visiongain
 
今日からはじめるVim入門
今日からはじめるVim入門今日からはじめるVim入門
今日からはじめるVim入門Yuta Ogura
 
Wealth is your birth right
Wealth is your birth rightWealth is your birth right
Wealth is your birth rightTyus Nedd
 
Tour paris13 : Quand le transmédia grave l’art urbain sur le web
Tour paris13 : Quand le transmédia grave l’art urbain sur le webTour paris13 : Quand le transmédia grave l’art urbain sur le web
Tour paris13 : Quand le transmédia grave l’art urbain sur le webJerome Deiss
 
Rudan 12.03.2013. (autoplay)
Rudan 12.03.2013. (autoplay)Rudan 12.03.2013. (autoplay)
Rudan 12.03.2013. (autoplay)Toni Mofardin
 
Webcafé #4 : Social TV Etat des lieux
Webcafé #4 : Social TV Etat des lieuxWebcafé #4 : Social TV Etat des lieux
Webcafé #4 : Social TV Etat des lieuxJerome Deiss
 
Stratégie de contenu Web : Mettre en avant votre contenu
Stratégie de contenu Web : Mettre en avant votre contenuStratégie de contenu Web : Mettre en avant votre contenu
Stratégie de contenu Web : Mettre en avant votre contenuJerome Deiss
 

En vedette (10)

Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014
Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014
Top 20 Unmanned Aerial Vehicles Systems (UAV/UAS) Companies 2014
 
今日からはじめるVim入門
今日からはじめるVim入門今日からはじめるVim入門
今日からはじめるVim入門
 
Ina2015
Ina2015Ina2015
Ina2015
 
Presentation 17 may morning case study 2 sarahhaye aziz
Presentation 17 may morning case study 2 sarahhaye azizPresentation 17 may morning case study 2 sarahhaye aziz
Presentation 17 may morning case study 2 sarahhaye aziz
 
Wealth is your birth right
Wealth is your birth rightWealth is your birth right
Wealth is your birth right
 
fulles
fullesfulles
fulles
 
Tour paris13 : Quand le transmédia grave l’art urbain sur le web
Tour paris13 : Quand le transmédia grave l’art urbain sur le webTour paris13 : Quand le transmédia grave l’art urbain sur le web
Tour paris13 : Quand le transmédia grave l’art urbain sur le web
 
Rudan 12.03.2013. (autoplay)
Rudan 12.03.2013. (autoplay)Rudan 12.03.2013. (autoplay)
Rudan 12.03.2013. (autoplay)
 
Webcafé #4 : Social TV Etat des lieux
Webcafé #4 : Social TV Etat des lieuxWebcafé #4 : Social TV Etat des lieux
Webcafé #4 : Social TV Etat des lieux
 
Stratégie de contenu Web : Mettre en avant votre contenu
Stratégie de contenu Web : Mettre en avant votre contenuStratégie de contenu Web : Mettre en avant votre contenu
Stratégie de contenu Web : Mettre en avant votre contenu
 

Dernier

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 

Dernier (20)

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 

Utilities infrastructure security market forecast 2014 2024

  • 1. Utilities Infrastructure Security Market Forecast 2014-2024 Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security ©notice This material is copyright by visiongain. It is against the law to reproduce any of this material without the prior written agreement of visiongain. You cannot photocopy, fax, download to database or duplicate in any other way any of the material contained in this report. Each purchase and single copy is for personal use only.
  • 2. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 1. Executive Summary 1.1 Global Market Overview 1.2 Benefits of This Report 1.3 Who is This Report For? 1.4 Methodology 1.5 Primary Research 1.6 Secondary Research 1.7 Market Sizing 1.8 Forecasting 1.9 Visiongain’s Added Value 1.10 Factors Used in Visiongain’s Market Forecasting Methodology 2. Introduction to the Utilities Infrastructure Security Market 2.1 Utilities Infrastructure Security Market Structure Overview 2.2 Physical Security Submarket Definition & Analysis 2.3 Cybersecurity Submarket Definition & Analysis 3. Global Utilities Infrastructure Security Market 2014-2024 3.1 Global Utilities Infrastructure Security Market Forecast 2014-2024 3.2 Global Utilities Infrastructure Security Regional Forecast 2014-2024 3.3 Fastest Growing Utilities Infrastructure Security National Markets 20 14-2024 3.4 Global Utilities Infrastructure Security Drivers & Restraints 3.5 Global Utilities Infrastructure Security Drivers 3.6 Global Utilities Infrastructure Security Restraints 3.7 Key Utilities Infrastructure Areas of Interest 3.7.1 Electricity Infrastructure 3.7.2 Oil and Gas Infrastructure 3.7.3 Water and Sanitation Infrastructure 3.8 Global Utilities Infrastructure Security Threats 3.9 Mechanisms of Cyber Attack Against Utilities Infrastructure 3.10 Cyber Weaponry for use against Utilities Infrastructure 3.11 Methods of Cyber Defence for Utilities Infrastructure 3.12 List of Recent Major Global Cyber Attacks 3.12.1 Estonia 3.12.2 Operation Orchard www.visiongain.com
  • 3. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 3.12.3 Georgia 3.12.4 Conficker 3.12.5 Operation Buckshot Yankee 3.12.6 Aurora 3.12.7 Chinese Diversion of Internet Traffic 3.12.8 Stuxnet 3.12.9 Duqu 3.12.10 RSA 3.12.11 Sony Corporation 3.12.12 Operation Shady RAT 3.12.13 Mitsubishi Heavy Industries 3.12.14 Flame / Operation: Olympic Games 3.12.15 Aramco 3.13. Notable Utilities Infrastructure Security Events 4. Utilities Physical Security Submarket Forecasts 2014-2024 4.1 Utilities Physical Security Submarkets 2014-2024 4.2 Regional Physical Security Submarket Forecast 2014-2024 4.3 Physical Security Submarket Forecast by National Market 2014-2024 4.4 Physical Security Submarket Analysis 4.5 Regional Cybersecurity Submarket Forecast 2014-2024 4.6 Cybersecurity Submarket Forecast by National Market 2014-2024 4.7 Cybersecurity Submarket Analysis 5. Leading 15 National Utilities Infrastructure Security Market Forecasts 2014-2024 5.1 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2014-2024 5.2 Barriers to Entry Analysis 2014 5.3 U.S. Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.3.1 U.S. Utilities Physical Security Submarket Forecasts 2014-2024 5.3.2 U.S. Utilities Infrastructure Security Market Drivers & Restraints 5.3.3 Essential Components of U.S. Cybersecurity 5.3.3.1 CNCI 5.3.3.2 US CYBERCOM 5.3.3.3 ARCYBER www.visiongain.com
  • 4. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 5.3.3.4 AFCYBER (24th Air Force) 5.3.3.5 FLTCYBERCOM 5.3.3.6 MARFORCYBER 5.3.3.7 NSA 5.3.3.8 Perfect Citizen 5.3.3.9 DISA 5.3.3.10 DHS 5.3.3.11 National Protection and Programs Directorate 5.3.3.12 Office of Cyber Security and Communications 5.3.3.13 Einstein II 5.3.3.14 DARPA 5.3.4 The New Front: Why Concern for the Safety and Security of Critical Infrastructure Will Continue To Drive U.S. Cybersecurity Expenditure Upwards 5.3.5 U.S. Utilities Infrastructure Security Contracts & Programmes 5.4 Chinese Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.4.1 Chinese Utilities Infrastructure Security Market Forecast 5.4.2 Chinese Utilities Infrastructure Security Market Drivers & Restraints 5.4.3 Going Nuclear: Why China Will Spend More than the Global Average on Utilities Infrastructure Security between 2014 and 2024 5.4.4 How Does China’s Conceptual Understanding of ‘Information’ Shape Cyber Security? 5.4.5 Chinese Utilities Infrastructure Security Contracts & Programmes 5.5 Russian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.5.1 Russian Utilities Infrastructure Security Submarket Forecast 5.5.2 Russian Utilities Infrastructure Security Market Drivers & Restraints 5.5.3 Russian Cybersecurity Policy: How Stage Two Is Expected to Build on Previous Developments 5.5.4 Russian Utilities Infrastructure Security Contracts & Programmes 5.6 Canadian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.6.1 Canadian Utilities Infrastructure Security Submarket Forecast 5.6.2 Canadian Utilities Infrastructure Security Market Drivers & Restraints 5.6.3 Canada’s New Cybersecurity Strategy 5.6.4 Why The Canadian Private Sector is Still Being Asked to Pick up the Slack on National Cyber Security 5.6.5 Canadian Utilities Infrastructure Security Contracts & Programmes 5.7 German Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.7.1 German Utilities Infrastructure Security Submarket Forecast www.visiongain.com
  • 5. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 5.7.2 German Utilities Infrastructure Security Market Drivers & Restraints 5.7.3 Have German Cybersecurity Efforts Acquired New Emphasis? 5.7.4 German Utilities Infrastructure Security Contracts & Programmes 5.8 Japanese Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.8.1 Japanese Utilities Infrastructure Security Submarket Forecast 5.8.2 Japanese Utilities Infrastructure Security Market Drivers & Restraints 5.8.3 How Has Japan Increased its Cybersecurity Capabilities to Counter the Threat of Outsider Interference? 5.8.4 The Japanese Cyber Security Threat – Fukushima 2.0? 5.8.5 Japanese Utilities Infrastructure Security Contracts & Programmes 5.9 Indian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.9.1 Indian Utilities Infrastructure Security Submarket Forecast 5.9.2 Indian Utilities Infrastructure Security Market Drivers & Restraints 5.9.3 Why India’s 2012 Power Blackout has placed an emphasis on Critical Infrastructure Protection? 5.9.4 Indian Bilateral Cybersecurity Agreements 5.9.5 Indian Utilities Infrastructure Security Contracts & Programmes 5.10 U.K. Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.10.1 U.K. Utilities Infrastructure Security Submarket Forecast 5.10.2 U.K. Utilities Infrastructure Security Market Drivers & Restraints 5.10.3 U.K. Utilities Infrastructure Security Contracts & Programmes 5.11 French Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.11.1 French Utilities Infrastructure Security Submarket Forecast 5.11.2 French Utilities Infrastructure Security Market Drivers & Restraints 5.11.3 Asymmetric Warfare: How Greenpeace Continues to Inadvertently Enhance the French Utilities Infrastructure Security Market 5.12 Australian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.12.1 Australian Utilities Infrastructure Security Submarket Forecast 5.12.2 Australian Utilities Infrastructure Security Market Drivers & Restraints 5.12.3 Why Huawei Technologies is unlikely to have access to the Australian telecommunications market in the near future 5.12.4 Australian Utilities Infrastructure Security Contracts & Programmes 5.13 Republic of Korea Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.13.1 Republic of Korea Utilities Infrastructure Security Submarket Forecast 5.13.2 Republic of Korea Utilities Infrastructure Security Market Drivers & Restraints 5.13.3 How Has South Korea Met the Challenge of the Cyber Threat? 5.13.4 Republic of Korea Utilities Infrastructure Security Contracts & Programmes www.visiongain.com
  • 6. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 5.14 Saudi Arabian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.14.1 Saudi Arabian Utilities Infrastructure Security Submarket Forecast 5.14.2 Saudi Arabian Utilities Infrastructure Security Market Drivers & Restraints 5.14.3 Saudi Arabian Utilities Infrastructure Security Contracts & Programmes 5.15 Brazilian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.15.1 Brazilian Utilities Infrastructure Security Submarket Forecast 5.15.2 Brazilian Utilities Infrastructure Security Market Drivers & Restraints 5.16 Israeli Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.16.1 Israeli Utilities Infrastructure Security Submarket Forecast 5.16.2 Israeli Utilities Infrastructure Security Market Drivers & Restraints 5.16.3 Why Israeli Private Sector Spending on Cybersecurity Will Outpace Government Expenditure 5.16.4 Israeli Utilities Infrastructure Security Contracts & Programmes 5.17 Nigerian Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.17.1 Nigerian Utilities Infrastructure Security Submarket Forecast 5.17.2 Nigerian Utilities Infrastructure Security Market Drivers & Restraints 5.17.3 Nigerian Utilities Infrastructure Security Contracts & Programmes 5.18 Rest of the World Utilities Infrastructure Security Market & Submarket Forecasts 2014-2024 5.18.1 Rest of the World Utilities Infrastructure Security Submarket Forecast 5.18.2 Rest of the World Utilities Infrastructure Security Market Drivers & Restraints 5.18.3 Rest of the World Utilities Infrastructure Security Contracts & Programmes 6. SWOT Analysis of the Utilities Infrastructure Security Market 20142024 7. Expert Opinion 7.1 Irina Rogizinskaya, International Sales and Marketing Manager, POLUS-ST LLC. 7.1.1 Company Background & History 7.1.2 Contribution to the Market & RADIOBARRIER 7.1.3 Product Integration and Company Cooperation 7.1.4 Market Strategy 7.2 Kim Legelis, Vice President, Marketing, Industrial Defender, Inc. 7.2.1 Contribution to the Market & Bridging the Gap Between OT and IT 7.2.2 Market Strategy 7.2.3 Product Integration & Maintenance www.visiongain.com
  • 7. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 7.2.4 Product & Service Advantages 7.2.5 Consumer Satisfaction & Demand 7.2.6 The Threat to Utilities Infrastructure 7.2.7 The Value of Industrial Defender’s Products 7.3 Lior Frenkel, CEO and Co-Founder, Waterfall Security Solutions Ltd. 7.3.1 Company Background & Commercial History 7.3.2 Contribution to the Market & Business Expansion 7.3.3 Consumer Demand & Technology Maintenance 7.3.4 Product & Service Advantages 7.3.5 Product Integration & Business Strategy 7.4 Barak Israel, Product Marketing Manager, & Udi Segall, Director of Business Development, NICE Systems Ltd. 7.4.1 Company Background & Commercial History 7.4.2 Contribution to the Market & Customer Demand 7.4.3 Product Maintenance & Advantages 7.4.4 Product Integration & Market Strategy 7.4.5 Regulatory Compliance & the Threat to Utilities Infrastructure 8. Leading 12 Companies in the Utilities Infrastructure Security Market 8.1 Axis Communications AB Company Overview 8.1.1 Axis Communications AB Utilities Infrastructure Security Market Analysis 8.1.2 Axis Communications AB Primary Market Competitors 8.1.3 Axis Communications AB’ Regional Emphasis / Focus 8.1.4 Axis Communications AB’ M&A Activity 8.2 Bosch Group Company Overview 8.2.1 Bosch Group Utilities Infrastructure Security Market Analysis 8.2.2 Bosch Group’s Primary Market Competitors 8.2.3 Bosch Group’s Regional Emphasis / Focus 8.2.4 Bosch Group’s Recent M&A Activity 8.3 Honeywell International Inc. Company Overview 8.3.1 Honeywell International Inc. Utilities Infrastructure Security Market Analysis 8.3.2 Honeywell International Inc. Primary Market Competitors 8.3.3 Honeywell International Inc. Regional Emphasis / Focus 8.3.4 Honeywell International Inc. Recent M&A Activity 8.4 IndigoVision Group plc Company Overview 8.4.1 IndigoVision Group plc Utilities Infrastructure Security Market Analysis 8.4.2 IndigoVision Group plc’s Primary Market Competitors www.visiongain.com
  • 8. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 8.4.3 IndigoVision Group plc’s Regional Emphasis / Focus 8.4.4 IndigoVision Group plc’s Recent M&A Activity 8.5 Industrial Defender Inc. Company Overview 8.5.1 Industrial Defender Inc. Utilities Infrastructure Security Market Analysis 8.5.2 Industrial Defender Inc.’s Primary Market Competitors 8.5.3 Industrial Defender, Inc.’s Regional Emphasis / Focus 8.5.4 Industrial Defender Inc.’s Recent M&A Activity 8.6 Kratos Defense and Security Solutions Inc. Company Overview 8.6.1 Kratos Defense & Security Solutions Inc. Utilities Infrastructure Security Market Analysis 8.6.2 Kratos Defense & Security Solutions Inc.’s Primary Market Competitors 8.6.3 Kratos Defense & Security Solutions Inc.’s Regional Emphasis / Focus 8.6.4 Kratos Defense & Security Solutions Inc.’s Recent M&A Activity 8.7 Lockheed Martin Corporation Company Overview 8.7.1 Lockheed Martin Corporation Utilities Infrastructure Security Market Analysis 8.7.2 Lockheed Martin Corporation Primary Market Competitors 8.7.3 Lockheed Martin Corporation’s Regional Emphasis / Focus 8.7.4 Lockheed Martin Corporation Recent M&A Activity 8.8 NICE Systems Ltd. Company Overview 8.8.1 NICE Systems Ltd. Utilities Infrastructure Security Market Analysis 8.8.2 NICE Systems Ltd. Primary Market Competitors 8.8.3 NICE Systems Ltd. Regional Emphasis / Focus 8.8.4 NICE Systems Ltd. Recent M&A Activity 8.9 QinetiQ Group plc Company Overview 8.9.1 QinetiQ Group plc Utilities Infrastructure Security Market Analysis 8.9.2 QinetiQ Group plc Primary Market Competitors 8.9.3 QinetiQ Group plc Regional Emphasis / Focus 8.9.4 QinetiQ Group plc Recent M&A Activity 8.10 Raytheon Company Overview 8.10.1 Raytheon Company Utilities Infrastructure Security Market Analysis 8.10.2 Raytheon Company’s Primary Market Competitors 8.10.3 Raytheon Company’s Regional Emphasis / Focus 8.10.4 Raytheon Company’s Recent M&A Activity 8.11 Schneider Electric SA Company Overview 8.11.1 Schneider Electric SA Utilities Infrastructure Security Market Analysis 8.11.2 Schneider Electric SA’s Primary Market Competitors 8.11.3 Schneider Electric SA Regional Emphasis / Focus www.visiongain.com
  • 9. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 8.11.4 Schneider Electric SA’s Recent M&A Activity 8.12 Waterfall Security Solutions Company Overview 8.12.1 Waterfall Security Solutions Utilities Infrastructure Security Market Analysis 8.12.2 Waterfall Security Solutions’ Primary Market Competitors 8.10.3 Waterfall Security Solutions’ Regional Emphasis/Focus 8.10.4 Waterfall Security Solutions’ Recent M&A Activity 8.13 Other Leading Companies in the Utilities Infrastructure Security Market 9. Conclusions & Recommendations 10. Glossary List of Tables Table 3.1 Global Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR%, Cumulative) Table 3.2 Global Utilities Infrastructure Security Regional Forecasts 2014-2024 ($m, Cumulative) Table 3.3 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (AGR %) Table 3.4 Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (CAGR %) Table 3.5 Global Utilities Infrastructure Security Market Drivers & Restraints Table 3.6 Mechanisms of Cyber Attack Against Utilities Infrastructure Table 3.7 Cyber Weaponry for use against Utilities Infrastructure Table 3.8 Methods of Cyber Defence for Utilities Infrastructure Table 4.1 Global Utilities Physical Security Submarket Forecasts 2014-2024 ($m, Cumulative) Table 4.2 Regional Physical Security Submarket Forecast 2014-2024 ($m, Cumulative) Table 4.3 Physical Security Submarket Forecast by National Market 2014-24 ($m) Table 4.4 Cybersecurity Submarket Forecast by Regional Market 2014-2024 ($m, Cumulative) Table 4.5 Cybersecurity Forecast by National Market 2014-2024 ($m, AGR %) Table 5.1 Leading National Utilities Infrastructure Security Market Forecast by Submarket 20142024 ($m) Table 5.2 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.3 U.S. Utilities Infrastructure Security Drivers & Restraints Table 5.4 Major U.S. Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.5 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) www.visiongain.com
  • 10. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Table 5.6 Chinese Utilities Infrastructure Security Drivers & Restraints Table 5.7 Major Chinese Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.8 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.9 Russian Utilities Infrastructure Security Drivers & Restraints Table 5.10 Major Russian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.11 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.12 Canadian Utilities Infrastructure Security Drivers & Restraints Table 5.13 Major Canadian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.14 German Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.15 German Utilities Infrastructure Security Drivers & Restraints Table 5.16 Major German Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.17 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.18 Japanese Utilities Infrastructure Security Drivers & Restraints Table 5.19 Major Japanese Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.20 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.21 Indian Utilities Infrastructure Security Drivers & Restraints Table 5.22 Major Indian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.23 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.24 U.K. Utilities Infrastructure Security Drivers & Restraints Table 5.25 Major U.K. Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.26 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.27 French Utilities Infrastructure Security Drivers & Restraints www.visiongain.com
  • 11. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Table 5.28 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.29 Australian Utilities Infrastructure Security Drivers & Restraints Table 5.30 Major Australian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.31 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.32 Republic of Korea Utilities Infrastructure Security Drivers & Restraints Table 5.33 Major RoK Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.34 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.35 Saudi Arabian Utilities Infrastructure Security Drivers & Restraints Table 5.36 Major Saudi Arabian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.37 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.38 Brazilian Utilities Infrastructure Security Drivers & Restraints Table 5.39 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.40 Israeli Utilities Infrastructure Security Drivers & Restraints Table 5.41 Major Israeli Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.42 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.43 Nigerian Utilities Infrastructure Security Drivers & Restraints Table 5.44 Major Nigerian Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 5.45 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %, CAGR %, Cumulative) Table 5.46 Rest of the World Utilities Infrastructure Security Drivers & Restraints Table 5.47 Major RoW Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Value $m, Date, Details) Table 6.1 SWOT Analysis of the Utilities Infrastructure Security Market 2014-2024 Table 8.1 Leading 12 Companies in the Utilities Infrastructure Security Market 2014 (Company, Total Revenue, Market Product Specialisation) www.visiongain.com
  • 12. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Table 8.2 Axis Communications AB Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.3 Recent Axis Communications AB Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.4 Sample of Axis Communications AB Utilities Infrastructure Security Products / Services (Company Section, Product, Specification) Table 8.5 Bosch Group Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.6 Recent Bosch Group Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.7 Sample of Bosch Group Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification) Table 8.8 Honeywell International Inc. Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.9 Recent Honeywell International Inc. Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.10 Sample of Honeywell International Inc. Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification) Table 8.11 IndigoVision Group plc Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.12 Recent IndigoVision Group plc Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.13 Sample of IndigoVision Group plc Utilities Infrastructure Security Products / Services (Company Section, Product, Specification) Table 8.14 Industrial Defender Inc. Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiary, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.15 Recent Industrial Defender Inc. Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.16 Sample of Industrial Defender Utilities Infrastructure Security Products / Services (Section, Product, Product Description, Specification) Table 8.17 Kratos Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.18 Recent Kratos Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.19 Sample of Kratos Defense & Security Solutions Inc. Utilities Infrastructure Security Products / Services (Section, Product, Specification) www.visiongain.com
  • 13. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Table 8.20 Lockheed Martin Corporation Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.21 Recent Lockheed Martin Corporation Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.22 Sample of Lockheed Martin Corporation Utilities infrastructure security Products / Services (Company Section, Product, Product Description, Specification) Table 8.23 NICE Systems Ltd. Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Partner in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.24 Recent NICE Systems Ltd. Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Country, Details, Model/Type) Table 8.25 Sample of NICE Systems Ltd. Utilities infrastructure security Products / Services (Company Section, Product, Product Description, Specification) Table 8.26 QinetiQ Group plc Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, Subsidiary in Market, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.27 Recent QinetiQ Group plc Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.28 Sample of QinetiQ Group plc Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification) Table 8.29 Raytheon Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.30 Recent Raytheon Company Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.31 Sample of Raytheon Company Utilities Infrastructure Security Products / Services (Company Section, Product, Specification) Table 8.32 Schneider Electric SA Company Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.33 Recent Schneider Electric SA Company Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Table 8.34 Sample of Schneider Electric SA Company Utilities Infrastructure Security Products / Services (Company Section, Product, Specification) Table 8.35 Waterfall Security Solutions Ltd. Overview 2012 (Total Company Revenue, Strongest Business Region, Subsidiaries, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) Table 8.36 Recent Waterfall Security Solutions Ltd. Utilities infrastructure security Contracts / Projects / Programmes (Date, Subcontractors, Country, Details) www.visiongain.com
  • 14. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Table 8.37 Sample of Waterfall Security Solutions Ltd. Utilities Infrastructure Security Products / Services (Company Section, Product, Product Description, Specification) Table 8.38 Other Leading Companies in the Utilities Infrastructure Security Market (Company, Primary Market Product / Service) List of Figures Figure 2.1 Global Utilities Infrastructure Security Market Structure Overview Figure 3.1 Global Utilities Infrastructure Security Market Regional Forecast 2014-2024 (AGR%) Figure 3.2 Utilities Infrastructure Security Market Regional Share Forecast 2014 (%) Figure 3.3 Utilities Infrastructure Security Market Regional Share Forecast 2019 (%) Figure 3.4 Utilities Infrastructure Security Market Regional Share Forecast 2024 (%) Figure 3.5 Top Five Fastest Growing Utilities Infrastructure Security National Markets 2014-2024 (AGR %) Figure 3.6 Global Utilities Infrastructure Security Threats Figure 3.7 Operation Shady RAT Targets Figure 4.1 Global Utilities Physical Security Submarket Forecasts 2014-2024 ($m) Figure 4.2 Global Utilities Infrastructure Security Submarkets Share Forecast 2014 (%) Figure 4.3 Global Utilities Infrastructure Security Submarkets Share Forecast 2019 (%) Figure 4.4 Global Utilities Infrastructure Security Submarkets Share Forecast 2024 (%) Figure 4.5 Regional Physical Security Submarket Share Forecast 2014, 2019, 2024 (% Share) Figure 4.6 Regional Physical Security Submarket 2014-2024 ($m, AGR%) Figure 4.7 Physical Security Submarket Forecast by National Market 2014-2024 ($m, AGR%) Figure 4.8 Physical Security Submarket National Share Forecast 2014 (%) Figure 4.9 Physical Security Submarket National Share Forecast 2019 (%) Figure 4.10 Physical Security Submarket National Share Forecast 2024 (%) Figure 4.11 Regional Cybersecurity Submarket Share Forecast 2014, 2019, 2024 (% Share) Figure 4.12 Regional Cybersecurity Submarket Forecast 2014-2024 ($m, AGR%) Figure 4.13 Cybersecurity Submarket Forecast by National Market 2014-2024 ($m, AGR%) Figure 4.14 Cybersecurity Submarket National Share Forecast 2014 (%) Figure 4.15 Cybersecurity Submarket National Share Forecast 2019 (%) Figure 4.16 Cybersecurity Submarket National Share Forecast 2024 (%) Figure 5.1 Leading 15 National Utilities Infrastructure Security Markets 2014-2024 ($m) Figure 5.2 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2014 (%) Figure 5.3 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2019 (%) Figure 5.4 Leading 15 National Utilities Infrastructure Security Markets Share Forecast 2024 (%) Figure 5.5 Barriers to Entry vs. Leading 15 National Market Size vs. AGR% 2014 ($m, AGR%) Figure 5.6 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) www.visiongain.com
  • 15. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Figure 5.7 U.S. Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.8 U.S. Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.9 U.S. Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 20142024 (CAGR%, CAGR Period) Figure 5.10 US Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.11 U.S. Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.12 US Government and Military Cybersecurity Organisational Structure Figure 5.13 US CYBERCOM Organisational Structure Figure 5.14 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.15 Chinese Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.16 Chinese Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.17 Chinese Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR% CAGR Period) Figure 5.18 Chinese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.19 Chinese Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.20 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.21 Russian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.22 Russian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.23 Russian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.24 Russian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.25 Russian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.26 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.27 Canadian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.28 Canadian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) www.visiongain.com
  • 16. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Figure 5.29 Canadian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.30 Canadian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.31 Canadian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.32 German Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.33 German Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.34 German Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.35 German Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.35 German Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%) Figure 5.37 German Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.38 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.39 Japanese Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.40 Japanese Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.41 Japanese Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.42 Japanese Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.43 Japanese Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.44 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.45 Indian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.46 Indian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.47 Indian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.50 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) www.visiongain.com
  • 17. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Figure 5.51 U.K. Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.52 U.K. Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.53 U.K. Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.54 U.K. Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.55 U.K. Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.56 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.57 French Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.58 French Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.59 French Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.60 French Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.61 French Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.62 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.63 Australian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.64 Australian Utilities Infrastructure Security Market Regional Share Breakdown 2014, 2019, 2024 (% Share) Figure 5.65 Australian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.66 Australian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.67 Australian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.68 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.69 Republic of Korea Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share, CAGR Period) Figure 5.70 Republic of Korea Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.71 Republic of Korea Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%) www.visiongain.com
  • 18. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Figure 5.72 Republic of Korea Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.73 Republic of Korea Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.74 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.75 Saudi Arabian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.76 Saudi Arabian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.77 Saudi Arabian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.78 Saudi Arabian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.79 Saudi Arabian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.80 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.81 Brazilian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.82 Brazilian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.83 Brazilian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.84 Brazilian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.85 Brazilian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.86 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.87 Israeli Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.88 Israeli Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.89 Israeli Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.90 Israeli Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.91 Israeli Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.92 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) www.visiongain.com
  • 19. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Figure 5.93 Nigerian Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.94 Nigerian Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.95 Nigerian Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.96 Nigerian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.97 Nigerian Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 5.98 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.99 Rest of the World Utilities Infrastructure Security Market Global Market Share Forecast 2014, 2019, 2024 (% Share) Figure 5.100 Rest of the World Utilities Infrastructure Security Market Regional Breakdown 2014, 2019, 2024 (% Share) Figure 5.101 Rest of the World Utilities Infrastructure Security CAGR Forecasts VS Global CAGR Forecasts 2014-2024 (CAGR%, CAGR Period) Figure 5.102 Rest of the World Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) Figure 5.103 Rest of the World Utilities Infrastructure Security Market Breakdown by Submarket 2014, 2019, 2024 (% Share) Figure 8.1 Axis Communications AB Organisational Structure Figure 8.2 Axis Communications AB Regional Emphasis / Focus Figure 8.3 Bosch Group Organisational Structure Figure 8.4 Bosch Group Regional Emphasis / Focus Figure 8.5 Honeywell International Inc. Organisational Structure Figure 8.6 Honeywell International Inc. Regional Emphasis / Focus Figure 8.7 IndigoVision Group plc Organisational Structure Figure 8.8 IndigoVision Group plc Regional Emphasis /Focus Figure 8.9 Industrial Defender Inc. Organisational Structure Figure 8.10 Industrial Defender, Inc. Regional Emphasis / Focus Figure 8.11 Kratos Defense & Security Solutions Organisational Structure Figure 8.12 Kratos Regional Emphasis / Focus Figure 8.13 Lockheed Martin Corporation Organisational Structure Figure 8.14 Lockheed Martin Corporation’s Regional Emphasis / Focus Figure 8.15 NICE Systems Ltd. Organisational Structure Figure 8.16 NICE Systems Ltd. Regional Emphasis /Focus www.visiongain.com
  • 20. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Figure 8.17 QinetiQ Group plc Organisational Structure Figure 8.18 QinetiQ Group plc Regional Emphasis / Focus Figure 8.19 Raytheon Company Organisational Structure Figure 8.20 Raytheon Company’s Regional Emphasis / Focus Figure 8.21 Schneider Electric SA Company Organisational Structure Figure 8.22 Schneider Electric SA’s Regional Emphasis / Focus Figure 8.23 Waterfall Security Solutions Ltd. Organisational Structure Figure 8.24 Waterfall Security Solutions Regional Emphasis / Focus List of Companies Mentioned In This Report ABB Ltd. Actimise AD Group ADI-Gardiner Ltd. ADT Fire & Security ADT Security Agent Vi Akera Akustica, Inc. Al Faisaliah Group AlliedSignal Aerospace Service Corporation Alstom Amber Engineering, Inc. Anglia Water APC Applied Visions, Inc. Arcsight Areva Areva T&D ATG Access AtlanticTransgasSystem (ATGS) Aveos Fleet Performance Axis Communications AB Axxonsoft BAE Systems Battelle Memorial Institute Beech Aircraft Leasing, Inc. www.visiongain.com
  • 21. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security BEI Technologies Belden® Bell Canada Bharat Petroleum Corporation Limited (BCPL) Boeing Defense, Space & Security Bosch Engineering GmbH Bosch Group Bosch Mahle Turbo Systems GmbH & Co. KG Bosch Rexroth AG Bosch Security Systems Bosch Software Innovations GmbH Bosch Solar Energy AG Bosch Thermotechnik GmbH British Telecom Broughton High Security Byres Security Cassidian Cybersecurity Causata China Telecom Chubb Systems Cimac Citect Clipsal CNI ConneXium LLC CRS CrySyS Lab CSC CyberTech International Cyveillance, Inc. Def-Logix Denim Group Detection Systems and Radionics, Inc. Digital Fusion, Inc. Dominion Technology Resources, Inc. D-Tec DVTel www.visiongain.com
  • 22. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security El Al Israel Airlines Ltd. ELAU Electricité de France (EDF) Elster EMC EMS Aviation, Inc. EnerNex ERAPSCO Erie Water Works ESB ESY Export Company, Inc. ETAS Exida Canada Exmesh Security Extreme CCTV Exxon-Mobile Corporation Fandotech LLC FAST Video Security Federal Pioneer Firelight Infrastructure Partners Firetide FLIR Systems Fortent Foxguard Solutions Fujitsu Ltd. G4S Regulated Security Solutions (RSS) G4S Secure Solutions Garland Power and Light Gazprom General Dynamics General Electric (GE) General Electric Company Genetec Georgia Tech Applied Research Geutebruck Google Gratte Brothers Security Management www.visiongain.com
  • 23. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Great Circle Solar Management Grimes Aerospace Company Gutor Electronic LLC Hannamax Hi-Tech Hardstaff Traffic Barriers Limited HAURI, Inc Haverkamp GmbH Haverstick Consulting HC Security Solutions Helicentre Aviation Hexagon Systems Engineering Ltd. HID Global Hikvision Digital Technology Co. Ltd. Hirschmann™ Honeywell Integrated Security Honeywell International, Inc. Honeywell Process Solutions Honeywell Video Systems HRL Laboratories LLC HRL Research Analytics, Inc. Huawei Technologies Hughes Training Italia Srl Iberdrola IBM Corporation IBM Research ICF International ICx Technologies IEX Corporation IHI Corp. IndigioVision Group plc Industrial Defender, Inc. Infinion Technologies AG Infinova InGuardians, Inc. Integral Systems, Inc. Intermec International Electronics Systems, Inc www.visiongain.com
  • 24. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Intransa Invensy’s plc IOActive, Inc. IPKeys IQinVision Israel National Gas Lines Ltd. (INGL) ITT Advanced Engineering Sciences Division Ivensys plc J & S Franklin Jacksons Security JMA Associates Juno Lightning Kaspersky Lab Kawasaki Heavy Industries Kentz Corporation Ltd Kestrel Technology LLC Korea Telecommunication Corporation (KT) Kratos Defense & Security Solutions Leidos Lockheed Martin Aerospace Systems Integration Corporation Lockheed Martin Australia Pty Limited Lockheed Martin Canada, Inc. Lockheed Martin Corporation Lockheed Martin Desktop Solutions, Inc. Lockheed Martin Engine Investments, LLC Lockheed Martin Information Systems & Global Solutions Lockheed Martin Integrated Technology LLC Lockheed Martin Operations Support, Inc. Logica Lookingglass Cyber Solutions LXE LLC M&C Energy Group Magal Security Systems, Ltd Mainline Information Systems ManTech International Corporation McAfee, Inc. Melbourne Water www.visiongain.com
  • 25. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Merced Systems Meridian Rapid Defense Group Merit Network, Inc Merlin Gerin Merten Mitsubishi Heavy Industries Modicon PLC Mul-T-Lock Technologies Limited Naskam Security Services Nexight Group NICE Systems Ltd. NISC Nishat Power Limited Northrop Grumman Information Systems Northumbrian Water Limited (NWL) Novar ED&S Ltd. Nu-Lec Industries New York State Electric & Gas and Rochester Gas and Electric (NYSEG) Oak Ridge National Laboratory Omega Securidad OPSWAT OptaSense Optex PDL Group Pelco Corporation Performix Perimeter Security Suppliers Association Petroleos Mexicanos (Pemex) PG&E Metcalf Phillips Communications and Security, Inc. Planning Systems, Inc. POLUS-ST LLC Power Measurement Procerus Technologies PureTech Systems Q1 Labs, Inc. Qatar Petroleum www.visiongain.com
  • 26. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security QinetiQ Group plc QTC Holdings, Inc. Quadrant Security Group Quality Plus Group Quantum Secure RAE Systems, Inc. RandomStorm RAPID, LLC Raytag Ltd. Raytec Raytheon BBN Technologies Raytheon Company Raytheon Intelligence & Information Systems Raytheon Secure Information Systems LLC Raytheon Teligny, Inc. Raytheon Visual Analytics RCM Solutions Redkite Financial Markets Reliance High-Tech Limited Robert Bosch GmbH Royal and Sun Alliance LLC (RSA) SafeNet Government Solutions SafeNet, Inc. SAIC, Inc. Sandia Corporation Sandia Group Sandia National Laboratories SAP Saudi Aramco Schneider Electric SA Schweitzer Engineering Laboratories Science Applications International Corp. Scottish Equity Partners ScottishPower Ltd. Secure Site Solutions Secure Tech Senstar Corporation www.visiongain.com
  • 27. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Sichuan Baxinghe Power Corporation Siemens AG SightLogix Skype Solana Networks SolveIT Software Sony Corporation Southwest Microwave, Inc. Sperian Protection Europe SAS SpotterRF SPX Service Solutions Square D SU53 Summit plc Swedish Nuclear Fuel & Waste Co. (SKB) Symantec Corporation SynApps Solutions SYS Technologies TAC TagMaster Technica Corporation Telemecanique Teligy, Inc. Telstra Telvent Thales Contact Solutions Thames Water The Grid Protection Alliance The New York Times The Washington Post TT Government Solutions TZ Limited UOP LLC UOP Russell LLC URS UXC Connect Vattenfall Europe Generation AG&Co. KG www.visiongain.com
  • 28. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security VeriSign, Inc. Viasat Visual Analytics, Inc. Waterfall Security Solutions Ltd Waterfall Security Solutions USA Westminster Group plc Will Electronics Wireless Facilities Incorporated (WFI) Wirsol Solar UK WT Parker Zambian Electricity Supply Company Zaun Limited Zener Electricals and Electronic Services ZF Lenksysteme GmbH Zicom Group Limited ZTE Corporation List of Organisations Mentioned In This Report Abu Dhabi Critical National Infrastructure Authority (CNIA) Albuquerque Bernalillo County Water Utility Authority (ABCWUA) Al-Mau’qi’oon Biddam Brigade Al-Qaeda Anonymous Äspö Hard Rock Laboratory Australian Customs and Border Protection Service (ACBPS) Berlin Stock Exchange (BSE) Canadian Cyber Incident Response Centre (CCIRC) Canadian Department of Public Safety and Emergency Preparedness Chinese People’s Liberation Army (PLA) Chinese Ministry of Environment City of San Diego Public Utilities Department Colombia University Communist Party of China (CIP) DHS S&T Cyber Security Division (CSD) European Commission GCHQ George Mason University www.visiongain.com
  • 29. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Georgia Tech Applied Research Georgia Tech Research Corp. German Bundeswehr German Customs Criminological Office German Federal Criminal Police Office German Federal Intelligence Service German Federal Ministry of the Interior German Federal Office for Information Security German Federal Office for the Protection of the Constitution German Federal Office of Civil Protection and Disaster Assistance German Federal Police German Nationaler Cyber-Sicherheitsrat (NCS) (National Cyber Security) German Nationales Cyber-Abwehrzentrum (NCAZ) (National Cyber Defence Centre) Greenpeace Indian Computer Emergency Response Team (CERT-In) Indian Defence Research and Development Organisation (DRDO) Indian National Critical Information Infrastructure Protection Centre Information Security Policy Council Initiative for Cyber Security Information Sharing Partnership of Japan International Computer Science Institute Iraqi Oil Protection Force (OPF) ISA Security Compliance Institute Israeli Cyber Directorate ITT Advanced Engineering Sciences Division Japan Information – Technology Promotion Agency Japanese Control System Security Centre (CSSC) Japanese Defence Ministry Japanese Internal Affairs and Communications Ministry Japanese Internal Affairs and Communications Ministry Japanese Ministry of Trade and Industry (METI) Korea Communications Commission (KCC) London Stock Exchange (LSE) Morgridge Institute for Research National Rural Telecommunications Cooperative North Atlantic Treaty Organisation (NATO) Northshore Utility District Oak Ridge National Laboratory www.visiongain.com
  • 30. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security Pacific NW National Laboratory Purdue University Rowland Water District Russian Federal Security Bureau (FSB) Rutgers University - New Brunswick Campus Saudi Royal Commission for Jubail and Yanbu Soon Chun Hyang University South Korean Cyber Security Centre South Korean Financial Supervisory Service South Korean Ministry of Science and Technology South Korean National Intelligence Service Syrian Electronic Army Tarrant Regional Water District (TRWD) Tel Aviv Stock Exchange (TASE) The Critical National Infrastructure Authority (CNIA) of Abu Dhabi The Department of Homeland Security Science and Technology Directorate (DHS S&T) The Electric Power Research Institute The Grid Protection Alliance The National Rural Electric Cooperative Association The Trustees of Princeton University The University of Alabama at Birmingham The University of North Carolina at Chapel Hill Trollmuhle Trustees of Dartmouth College Trustees of Indiana University U.K. Environment Agency U.K. Ministry of Defence (MOD) U.S National Cyber Response Coordination Group (NCRCG) U.S. 780th Military Intelligence Brigade U.S. Air Force U.S. Air Force Cyber Command U.S. Air Force Cyber Command (AFCYBER) U.S. Army U.S. Army Corps of Engineers (USACE) U.S. Army Forces Cyber Command U.S. Army Intelligence and Security Command (INSCOM) U.S. Army Network Enterprise Technology (NETCOM) www.visiongain.com
  • 31. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security U.S. Central Command (CENTCOM) U.S. Coast Guard U.S. Computer Emergency Readiness Team U.S. Cyber Command (CYBERCOM) U.S. Defense Advanced Projects Research Agency (DARPA) U.S. Defense Information Systems Agency U.S. Department of Commerce U.S. Department of Defense (DoD) U.S. Department of Energy (DoE) U.S. Department of Energy’s National Nuclear Security Administration U.S. Department of Homeland Security (DHS) U.S. Department of Homeland Security Cyber Security Division (CSD) U.S. Department of Homeland Security Industrial Control Systems Emergency Response Team (ICS-CERT) U.S. Department of Homeland Security Science & Technology Directorate (DHS S&T) U.S. Department of Public Works (DPW) U.S. Department of Veteran’s Affairs (VA) U.S. Environmental Protection Agency (EPA) U.S. Federal Bureau of Investigation (FBI) U.S. Fleet Cyber Command (FLYTCYBERCOM) U.S. Marine Corps U.S. Marine Corps Cryptologic Support Battalion (MCSB) U.S. Marine Corps Cyberspace Command U.S. Marine Corps Network Operations Security Center (MCNOSC) U.S. Metropolitan Water District (MWD) U.S. National Critical Information Infrastructure Protection Center (NCIIPC) U.S. National Cyber Security Division (NCSD) U.S. National Institute of Standards and Technology (NIST) U.S. National Protection and Programs Directorate (NPPD) U.S. National Security Agency (NSA) U.S. Naval Academy U.S. Naval Network Warfare Command (NNWC) U.S. Navy U.S. Navy Cyber Defense Operations Command (NCDOC) U.S. Navy Information Operation Command (NIOC) U.S. Navy Naval Postgraduate School U.S. Nuclear Regulatory Commission (NRC) www.visiongain.com
  • 32. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security U.S. Office of Cyber Security and Communications U.S. Signals Command (SC) U.S. Strategic Command (STRATCOM) University of California, San Diego University of Illinois at Urbana-Champaign University of Maryland University of Southern California Information Sciences Institute Waterford Township Department of Public Works Wikileaks Xian Jiaotong University www.visiongain.com
  • 33. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 5.7.4 German Utilities Infrastructure Security Contracts & Programmes Table 5.16 Major German Utilities Infrastructure Contracts & Programmes (Contractor/Programme, Submarket, Date, Details) Contractor/Programme Senstar Corporation Genetec Infinion Technologies AG, German Federal Ministry of the Interior Bosch Security Systems Submarket Physical Security Physical Security Cybersecurity Physical Security Date Details June 2012 Senstar Corporation announced the sale of over 200km worth of perimeter intrusion detection systems (PIDS) to solar power generation facilities in Germany. April 2012 Trollmuhle, a water supply association located in the Rhineland, awarded Genetec a contract to provide its video surveillance services at its main pumping station in Windesheim. September 2011 The German Federal Ministry of the Interior announced that it was extending the scope of its cooperation with Infineon Technologies AG. This extended cooperation will evaluate new technologies to provide security for critical infrastructures and mobile computing. The partnership also covers research into data protection for ID documentation. April 2009 Vattenfall Europe Generation AG & Co. KG contracted Bosch Group Security Systems to provide communications and security technology for its Hamburg-Moorburg coal-fired power plant. The contract included the provision of public address systems, alarm signalling and evacuation, fire detection technology, video surveillance, communication and lowvoltage networks for dual-unit plants. Source: Visiongain 2014 www.visiongain.com Page 139
  • 34. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 5.9.1 Indian Utilities Infrastructure Security Submarket Forecast Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) 12 800 700 10 600 Sales US$m 6 400 300 AGR (%) 8 500 4 200 2 100 0 0 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 Year Physical Security Cybersecurity AGR% Source: Visiongain 2014 Figure 5.48 Indian Utilities Infrastructure Security Market Forecast 2014-2024 ($m, AGR %) 2014 28. 2% 2019 36. 1% 71. 8% Physical Security 2024 36. 2% 63. 9% 63. 8% Cybersecurity Source: Visiongain 2014 www.visiongain.com Page 150
  • 35. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 7. Expert Opinion 7.1 Irina Rogizinskaya, International Sales and Marketing Manager, POLUS-ST LLC. POLUS-ST LLC. is a well established innovation company based in Russia whose primary product in the Utility Infrastructure Security Market is RADIOBARRIER, a security system based upon distributed acoustic sensor technology. Their Head Operation Office is located in Moscow; while R&D and production facilities are located in Akademgorodok, Novosibirsk. Akademgorodok is one of the largest science and research areas of Russia with dozens of research institutes and universities. The company benefits greatly from this special location that provides access to new, innovative technologies and well educated and skilled personnel for production and R&D. POLUSST has a 10-year-long history of providing high quality innovative perimeter surveillance products for large government and corporate clients and is ready to serve you and protect your assets, whatever they may be. 7.1.1 Company Background & History Visiongain: Please could you briefly describe your position and background within POLUS-ST? Irina Rogizinskaya: Currently I'm employed as International Sales & Marketing Manager in POLUS-ST LLC, dealing with the security market and RADIOBARRIER – a Wireless Intrusion Detection System for various outdoor applications. Visiongain: Please could you briefly explain the background of POLUS-ST and its commercial history? Irina Rogizinskaya: 1996: Mr. Ravil Kalimulin, who later started the company, was then in the rank of General Major and supervised Communications and Special Equipment Department, being on active duty in many armed conflicts zones saw a great need for a wireless force protection alarm system. 1999: After retiring Mr. Kalimulin and his partners started a company with the main goal of developing and manufacturing wireless alarm systems for various applications. 2000: First generation of RADIOBARRIER wireless sensor set manufactured. The set consisted of 4 batteryoperated seismic sensors and 1 handheld receiver linked with one-way radio channel. Communication range of the system was up to 500 m. 2003: The second generation of the RADIOBARRIER system began to be produced. It was a rapidly deployable sensor suite consisting of 32 nodes, 1 repeater, handheld receiver and a PC based command and control station. 2005 Third generation of RADIOBARRIER system was developed, taking into consideration the www.visiongain.com Page 213
  • 36. Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operating Technologies & Endpoint Cyber Security Utilities Infrastructure Security Market Forecast 2014-2024: Top Companies Providing Surveillance, Perimeter Defence, Operational Technologies & Endpoint Cyber Security 8.1 Axis Communications AB Company Overview Table 8.2 Axis Communications AB Overview 2012 (Total Company Revenue, Strongest Business Region, HQ, Founded, No. of Employees, Ticker, IR Contact, Website) 2012 Total company revenue $m $642m Strongest Business Region Americas Partner in Market NICE Systems Ltd. Headquarters Lund, Sweden Founded 1984 No. of Employees 1500+ Ticker OMX: AXIS:SS Johan Lundin, Investor Relations Manager, Phone: + 46 46 272 2700, Email: ir@axis.com IR Contact Website www.axis.com Source: Visiongain 2014 Table 8.3 Recent Axis Communications AB Utilities Infrastructure Security Contracts / Projects / Programmes (Date, Subcontractors, Country, Value, Details, Model/Type) Date Subcontractors May 2013 Firelight Infrastructure Partners, Great Circle Solar January WT Parker, Agent 2013 Vi May 2012 Undisclosed Country Value Details Canada Axis Communications AB received a contract from Canadian solar farm operators Firelight Infrastructure Partners, and Great Circle Solar Management for the Undisclosed deployment of thermal cameras, HD quality PTZ and fixed network cameras, and the upgrading of analogue cameras to IP standard. U.K. Systems integrator WT Parker chose Agent Vi’s real-time video analytics software solution, along with Axis January 2013 Communications AB’ Q1921-E thermal network cameras for use at four of Wirsol Solar UK’s 5-megawatt solar farms. China Sichuan Baxinghe Power Corporation awarded Axis Communications AB a contract to install Axis video Undisclosed encoders at its 19 cascade power stations, improving them to IP standard. Source: Visiongain 2014 www.visiongain.com Page 233