Lowest Price Guaranteed From USD 3,499
Published
January 2018
Pages
547
View Count
4629
Example Insights
Report Description
I believe cybersecurity services are very important for healthcare organizations. No cybersecurity product / platform tells how to tackle the situation of a data breach or how to respond to cyberattacks. The cybersecurity services market is going to grow as soon as people realize that the actual threat is already out there, and they are not capable to deal with that
-Chief Executive Officer
The digital revolution has transformed the way businesses operate across the globe. However, digitally stored information is prone to hacking and manipulation by cyber criminals. The concern is validated by the fact that more than 5.1 million records are compromised due to data breaches every day. In 2016, close to 1,800 incidents of data breaches were reported across all the industries; in total, almost 1.4 billion data records were lost or stolen. The year 2017 also witnessed several cyberattacks; notable examples include WannaCry and NotPetya ransomware attacks, Equifax data breach, MongoDB databases leak, Elasticsearch server hack, Cloudbleed security bug, Zomato hack, HBO hack / Game of Thrones leaks, Uber data breach, and Ethereum hack.
The healthcare industry has been amongst the prime targets for hackers over the last several years. The Ponemon Institute’s Fifth Annual Study reported that cyberattacks in healthcare have increased by a factor of 125% since 2010. In the first half of 2017, the healthcare industry had been compromised a number of times, having experienced a total of 228 data breaches, representing 25% of the total number of breaches worldwide. Across these instances, around 31 million records were compromised, stolen or lost, representing an increase of 423% as compared to the first six months of 2016. In addition, according to a report published in May 2016, it is estimated that, with each electronic health record (EHR) costing around USD 355 in the black market, healthcare data breaches have resulted in losses worth USD 6.2 billion per year to the US healthcare industry. Examples of organizations that have recently been the victims of cyberattacks / security incidents include (in alphabetical order) Abbott / St. Jude Medical, Anthem BlueCross BlueShield, Bayer, Bupa Global Health Insurance, Bronx Lebanon Hospital Center, HealthNow Networks, Johnson & Johnson, Med Center Health, Merck, National Health System (NHS), Pacific Alliance Medical Center, Patient Home Monitoring, and Smiths Medical.
In order to overcome these challenges, various cybersecurity solution providers have started to specifically focus on healthcare. Along with the presence of big companies, the entry of several start-ups is driving the innovation in this domain. Contrary to the expectation, capital spending on cybersecurity in the healthcare industry is far less compared to some other industries. In addition, the scarcity of skilled cybersecurity professionals capable of catering to the complex regulatory demands in the healthcare industry is making it even more difficult for the successful implementation of cybersecurity policies across this field.
Scope of the Report
The ‘Cybersecurity in Healthcare Market, 2018-2030’ report features an extensive study of the current landscape and future outlook of the growing market of cybersecurity within the healthcare industry. The focus of this study is on the cybersecurity products / solutions and services that are currently available for protecting internet connected devices against cybercriminals, and the likely evolution of novel technologies / platforms in the mid to long term. Backed by funding from several venture capital firms and strategic investors, this evolving market has its hopes pinned on the efforts of multiple start-ups. Amongst other elements, the report features:
One of the key objectives of the report was to understand the primary growth drivers and estimate the future size of the market. Based on various parameters, such as number of healthcare data breaches, number of records compromised, expected pricing of the stolen medical records and spending trends on cybersecurity in the healthcare industry, we have provided an informed estimate on the likely evolution of the market in the long term, for the period 2018-2030. To account for the uncertainties associated with the number of data breaches, and to add robustness to our model, we have provided three forecast scenarios, portraying the conservative, base and optimistic tracks of the market’s evolution.
The opinions and insights presented in the report were also influenced by discussions held with senior stakeholders in the industry. These include Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence). All actual figures have been sourced and analyzed from publicly available information forums and primary research discussions. Financial figures mentioned in this report are in USD, unless otherwise specified.
Contents
Chapter 2 is an executive summary of the insights captured in our research. The summary offers a high-level view on the likely evolution of the cybersecurity market within the healthcare industry in the long term.
Chapter 3 is an introductory chapter that presents an overview of the digital revolution, emergence of IoT, cloud computing, and the digitization of business communication across a number of industries, with information on the associated risks and vulnerabilities. It outlines some of the prevalent cyber threats and security vulnerabilities, thereby, highlighting the importance of cybersecurity. It also provides an overview of the key cybersecurity solutions that are being used in the industry. In addition, the chapter provides information on some of the notable cyberattacks and data breaches that have taken place across different industries in the past few years.
Chapter 4 provides information on the digitization of the healthcare industry, and outlines key reasons why organizations in this domain have been a prime target for cyber criminals in the past few years. Further, the chapter stresses on the importance of cybersecurity in the healthcare industry, giving an overview of the HIPAA framework, and highlights several security vulnerabilities that exist within the industry. It also provides details on some of the largest healthcare data breaches in history. In addition, it presents a summary of the best practices that must be considered while implementing security measures within the healthcare industry.
Chapter 5 includes information on around 400 key stakeholders that are exploring the potential applications of their cybersecurity products / solutions and services within the healthcare industry. We have classified the database based on the type of offering, including cybersecurity core products / solutions, threat intelligence solutions and cybersecurity services. In addition, the chapter provides information on companies’ geographical location, size of employee base, type of threats that a company is capable of dealing with, type of security elements, and mode of deployment. Furthermore, we have identified various prevalent and upcoming trends in the industry that are likely to govern the future of cybersecurity within the healthcare industry.
Chapter 6 features detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity core products / solutions for the healthcare industry. Each profile includes an overview of the company, financial information, details on their cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.
Chapter 7 includes detailed profiles of some of the emerging stakeholders that are primarily offering threat intelligence solutions for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.
Chapter 8 provides detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity services (managed / professional) for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.
Chapter 9 presents a benchmark analysis, taking into consideration the established players that are engaged in this domain. It highlights the capabilities of these companies in terms of their expertise across cybersecurity products / solutions and services for the healthcare industry. The analysis allows companies to compare their existing capabilities within and beyond their peer groups, and identify opportunities to become more competitive in the industry. In addition, we have provided detailed profiles of some of the established stakeholders within different peer groups. Each of these profiles feature an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.
Chapter 10 provides information on the funding instances and investments that have been made in this industry. The chapter includes details on various investments (seed financing, venture funding, debt financing and grants) received by companies between 2012 and late 2017, highlighting the growing interest of the venture capital community and other strategic investors.
Chapter 11 features a comprehensive valuation analysis of the companies that are offering cybersecurity products / solutions and services for the healthcare industry. The chapter provides insights based on a multi-variable dependent valuation model. The model is based on the year of establishment of the companies, employed workforce, funding received and depth of product / service portfolio.
Chapter 12 presents a comprehensive market forecast, highlighting the future potential of the market till 2030. The forecast, which provides estimates on the market opportunity across the three major types of offering (cybersecurity core products / solutions, threat intelligence solutions and cybersecurity services), is backed by robust secondary research, as wells as inputs from senior stakeholders in the industry. The analysis also highlights the relative growth opportunity across different geographical regions (North America, Europe, Asia-Pacific and Rest of the World), type of threats (insider theft, intrusion, 3 rd party / sub-contractor negligence, employee negligence, physical theft and others), type of cybersecurity services (managed and professional), type of security elements (application security, cloud security, endpoint security and network security), and mode of deployment (cloud and on-premise). To account for the uncertainties associated with the adoption of these technologies, we have provided optimistic and conservative forecast scenarios, in addition to the base forecast scenario.
Chapter 13 presents an overview of AI, machine learning and deep learning techniques, and the likely benefits of integration of these technologies into cybersecurity tools / systems. The chapter highlights how AI / machine learning techniques can bolster cybersecurity capabilities for combating the ever-increasing threat landscape. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.
Chapter 14 presents a case study on cybersecurity use cases within the healthcare industry. The chapter highlights some of the notable healthcare data breaches and security incidents that took place in 2017. In addition, we have briefly discussed some of the recently reported medical device hacks / security vulnerabilities, in order to highlight the potential damages these incidents can cause. We have also summarized some of the initiatives / measures adopted by healthcare / pharmaceutical organizations to tackle cyberattacks.
Chapter 15 summarizes the overall report. In this chapter, we have provided a list of key takeaways from the report, and expressed our independent opinion related to the research and analysis described in the previous chapters.
Chapter 16 is a collection of executive insights from various key stakeholders in this market. The chapter provides brief overview of the companies and interview transcripts of the discussions that were held with stakeholders associated with these companies. The chapter provides details of interviews held with Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence).
Chapter 17 is an appendix, which provides tabulated data and numbers for all the figures provided in the report.
Chapter 18 is an appendix, which provides the list of companies and organizations mentioned in the report.
1. PREFACE
1.1. Scope of the Report
1.2. Research Methodology
1.3. Chapter Outlines
2. EXECUTIVE SUMMARY
3. INTRODUCTION
3.1. Digitization and Global Transformation
3.1.1. The Internet of Things (IoT)
3.1.2. Cloud Computing
3.1.3. Digitized Business Communication
3.2. Impact of Digitization on Different Industries
3.3. Current Underlying Problems of Digitization
3.4. Risks and Mitigation Strategies of Digitization
3.5. Cybersecurity
3.5.1. The Importance of Cybersecurity
3.5.2. Historical Review of Notable Attacks and Data Breaches
3.5.3. Industries Impacted by Cybersecurity Incidents
3.5.4. Security Vulnerabilities and Threat Landscape
3.5.5. Introduction to Cybersecurity Solutions
4. CYBERSECURITY IN HEALTHCARE
4.1. Chapter Overview
4.2. Digital and Connected Healthcare
4.3. Common Vulnerabilities and Cyber Risks in Healthcare
4.4. HIPAA Framework
4.5. Cybersecurity in Healthcare
4.5.1. The Importance of Cybersecurity in Healthcare
4.5.2. Notable Attacks and Data Breaches in Healthcare
4.5.2.1. Attack on Anthem: The Largest Healthcare Data Breach in History
4.5.2.2. Recent Healthcare Data Breaches
4.5.3. Ransomware: A Key Concern for Healthcare Organizations
4.5.4. Elements of Cybersecurity in Healthcare
4.5.5. Growth Drivers and Road Blocks to Cybersecurity in Healthcare
4.5.6. Best Cybersecurity Practices for Healthcare Industry
5. CURRENT MARKET LANDSCAPE
5.1. Chapter Overview
5.2. Cybersecurity in Healthcare: List of Industry Players
5.2.1. Distribution by Year of Establishment
5.2.2. Distribution by Geographical Location
5.2.3. Distribution by Company Size
5.2.4. Distribution by Type of Offering
5.2.5. Distribution by Type of Core Products / Solutions
5.2.6. Distribution by Type of Threat Intelligence Solutions
5.2.7. Distribution by Type of Services
5.2.8. Distribution by Type of Security Elements
5.2.9. Distribution by Type of Deployment Mode
5.2.10. Distribution by Type of Threats Mitigated
6. CORE CYBERSECURITY PRODUCTS / SOLUTIONS: COMPANY PROFILES
6.1. Chapter Overview
6.2. Attivo Networks
6.2.1. Company Snapshot
6.2.2. Financial Information
6.2.3. Cybersecurity Product / Service Portfolio
6.2.4. Recent Developments
6.3. CensorNet
6.3.1. Company Snapshot
6.3.2. Financial Information
6.3.3. Cybersecurity Product / Service Portfolio
6.3.4. Recent Developments
6.4. Exabeam
6.4.1. Company Snapshot
6.4.2. Financial Information
6.4.3. Cybersecurity Product / Service Portfolio
6.4.4. Recent Developments
6.5. iCyber-Security
6.5.1. Company Snapshot
6.5.2. Financial Information
6.5.3. Cybersecurity Product / Service Portfolio
6.5.4. Recent Developments
6.6. Threat Stack
6.6.1. Company Snapshot
6.6.2. Financial Information
6.6.3. Cybersecurity Product / Service Portfolio
6.6.4. Recent Developments
6.7. TraceSecurity
6.7.1. Company Snapshot
6.7.2. Financial Information
6.7.3. Cybersecurity Product / Service Portfolio
6.7.4. Recent Developments
6.8. Zenedge
6.8.1. Company Snapshot
6.8.2. Financial Information
6.8.3. Cybersecurity Product / Service Portfolio
6.8.4. Recent Developments
7. THREAT INTELLIGENCE SOLUTIONS: COMPANY PROFILES
7.1. Chapter Overview
7.2. Anomali
7.2.1. Company Snapshot
7.2.2. Financial Information
7.2.3. Cybersecurity Product / Service Portfolio
7.2.4. Recent Developments
7.3. Centripetal Networks
7.3.1. Company Snapshot
7.3.2. Financial Information
7.3.3. Cybersecurity Product / Service Portfolio
7.3.4. Recent Developments
7.4. Flashpoint
7.4.1. Company Snapshot
7.4.2. Financial Information
7.4.3. Cybersecurity Product / Service Portfolio
7.4.4. Recent Developments
7.5. ProtectWise
7.5.1. Company Snapshot
7.5.2. Financial Information
7.5.3. Cybersecurity Product / Service Portfolio
7.5.4. Recent Developments
7.6. Sqrrl
7.6.1. Company Snapshot
7.6.2. Financial Information
7.6.3. Cybersecurity Product / Service Portfolio
7.6.4. Recent Developments
7.7. Shape Security
7.7.1. Company Snapshot
7.7.2. Financial Information
7.7.3. Cybersecurity Product / Service Portfolio
7.7.4. Recent Developments
7.8. Vectra Networks
7.8.1. Company Snapshot
7.8.2. Financial Information
7.8.3. Cybersecurity Product / Service Portfolio
7.8.4. Recent Developments
8. CYBERSECURITY SERVICES: COMPANY PROFILES
8.1. Chapter Overview
8.2. Agio
8.2.1. Company Snapshot
8.2.2. Cybersecurity Service Portfolio
8.2.3. Recent Developments
8.3. CyberSurance
8.3.1. Company Snapshot
8.3.2. Cybersecurity Service Portfolio
8.3.3. Recent Developments
8.4. Delta Risk
8.4.1. Company Snapshot
8.4.2. Cybersecurity Service Portfolio
8.4.3. Recent Developments
8.5. ITEGRITI
8.5.1. Company Snapshot
8.5.2. Cybersecurity Service Portfolio
8.5.3. Recent Developments
8.6. Security Risk Advisors
8.6.1. Company Snapshot
8.6.2. Cybersecurity Service Portfolio
8.6.3. Recent Developments
8.7. Sera-Brynn
8.7.1. Company Snapshot
8.7.2. Cybersecurity Service Portfolio
8.7.3. Recent Developments
8.8. VigiTrust
8.8.1. Company Snapshot
8.8.2. Cybersecurity Service Portfolio
8.8.3. Recent Developments
9. BENCHMARK ANALYSIS
9.1. Chapter Overview
9.2. Benchmark Analysis: Methodology
9.3. Benchmark Analysis: Peer Groups
9.4. Benchmark Analysis: Medium-Sized Companies
9.4.1. Peer Group I
9.4.2. Peer Group II
9.4.3. Peer Group III
9.4.4. Key Industry Players
9.4.4.1. AlienVault
9.4.4.1.1. Company Snapshot
9.4.4.1.2. Financial Information
9.4.4.1.3. Cybersecurity Product / Service Portfolio
9.4.4.1.4. Recent Developments
9.4.4.2. Carbon Black
9.4.4.2.1. Company Snapshot
9.4.4.2.2. Financial Information
9.4.4.2.3. Cybersecurity Product / Service Portfolio
9.4.4.2.4. Recent Developments
9.4.4.3. CrowdStrike
9.4.4.3.1. Company Snapshot
9.4.4.3.2. Financial Information
9.4.4.3.3. Cybersecurity Product / Service Portfolio
9.4.4.3.4. Recent Developments
9.4.4.4. Cylance
9.4.4.4.1. Company Snapshot
9.4.4.4.2. Financial Information
9.4.4.4.3. Cybersecurity Product / Service Portfolio
9.4.4.4.4. Recent Developments
9.4.4.5. Darktrace
9.4.4.5.1. Company Snapshot
9.4.4.5.2. Financial Information
9.4.4.5.3. Cybersecurity Product / Service Portfolio
9.4.4.5.4. Recent Developments
9.4.4.6. Gigamon
9.4.4.6.1. Company Snapshot
9.4.4.6.2. Financial Information
9.4.4.6.3. Cybersecurity Product / Service Portfolio
9.4.4.6.4. Recent Developments
9.4.4.7. LogRhythm
9.4.4.7.1. Company Snapshot
9.4.4.7.2. Financial Information
9.4.4.7.3. Cybersecurity Product / Service Portfolio
9.4.4.7.4. Recent Developments
9.5. Benchmark Analysis: Large-Sized Companies
9.5.1. Peer Group IV
9.5.2. Peer Group V
9.5.3. Key Industry Players
9.5.3.1. Fortinet
9.5.3.1.1. Company Snapshot
9.5.3.1.2. Financial Information
9.5.3.1.3. Cybersecurity Product / Service Portfolio
9.5.3.1.4. Recent Developments
9.5.3.2. FireEye
9.5.3.2.1. Company Snapshot
9.5.3.2.2. Financial Information
9.5.3.2.3. Cybersecurity Product / Service Portfolio
9.5.3.2.4. Recent Developments
9.5.3.3. IBM
9.5.3.3.1. Company Snapshot
9.5.3.3.2. Financial Information
9.5.3.3.3. Cybersecurity Product / Service Portfolio
9.5.3.3.4. Recent Developments
9.5.3.4. McAfee
9.5.3.4.1. Company Snapshot
9.5.3.4.2. Financial Information
9.5.3.4.3. Cybersecurity Product / Service Portfolio
9.5.3.4.4. Recent Developments
9.5.3.5. Palo Alto Networks
9.5.3.5.1. Company Snapshot
9.5.3.5.2. Financial Information
9.5.3.5.3. Cybersecurity Product / Service Portfolio
9.5.3.5.4. Recent Developments
9.5.3.6. Sophos
9.5.3.6.1. Company Snapshot
9.5.3.6.2. Financial Information
9.5.3.6.3. Cybersecurity Product / Service Portfolio
9.5.3.6.4. Recent Developments
9.5.3.7. Trustwave
9.5.3.7.1. Company Snapshot
9.5.3.7.2. Financial Information
9.5.3.7.3. Cybersecurity Product / Service Portfolio
9.5.3.7.4. Recent Developments
10. CAPITAL INVESTMENTS AND FUNDING
10.1. Chapter Overview
10.2. Types of Funding
10.3. Cybersecurity in Healthcare: Funding Instances
10.3.1. Analysis by Year of Funding
10.3.2. Analysis by Amount Invested
10.3.3. Analysis by Type of Funding
10.3.4. Most Active Players by Number of Instances
10.3.5. Most Active Investors by Number of Instances
10.4. Concluding Remarks
11. COMPANY VALUATION ANALYSIS
11.1. Chapter Overview
11.2. Company Valuation: Methodology
11.3. Company Valuation: Categorization by Multiple Parameters
11.3.1. Categorization by Employee Size
11.3.2. Categorization by Portfolio Strength
11.3.3. Categorization by Weighted Average Score
11.4. Company Valuation: Roots Analysis Proprietary Scores
12. MARKET FORECAST
12.1. Chapter Overview
12.2. Forecast Methodology and Key Assumptions
12.3. Overall Cybersecurity Market in Healthcare, 2018-2030
12.4. Cybersecurity Market in Healthcare: Distribution by Type of Offering
12.4.1. Core Cybersecurity Products / Solutions Market, 2018-2030
12.4.2. Threat Intelligence Solutions Market, 2018-2030
12.4.3. Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030
12.5. Cybersecurity Market in Healthcare: Distribution by Threat Type
12.5.1. Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030
12.5.3. Insider Theft Market, 2018-2030
12.5.3. Employee Negligence Market, 2018-2030
12.5.4. 3rd Party / Subcontractor Negligence Market, 2018-2030
12.5.5. Physical Theft Market, 2018-2030
12.5.6. Other Threat Types Market, 2018-2030
12.6. Cybersecurity Market in Healthcare: Distribution by Type of Security Elements
12.6.1. Application Security Market, 2018-2030
12.6.2. Cloud Security Market, 2018-2030
12.6.3. Network Security Market, 2018-2030
12.6.4. Endpoint Security Market, 2018-2030
12.6.5. Other Security Element Types Market, 2018-2030
12.7. Cybersecurity Market in Healthcare: Distribution by Deployment Mode
12.7.1. Cloud Deployment Market, 2018-2030
12.7.2. On-Premise Deployment Market, 2018-2030
12.8. Cybersecurity Market in Healthcare: Distribution by Geographies
12.8.1. Cybersecurity Market in Healthcare in the US, 2018-2030
12.8.2. Cybersecurity Market in Healthcare in Europe, 2018-2030
12.8.3. Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030
12.8.4. Cybersecurity Market in Healthcare in Rest of the World, 2018-2030
13. FUTURE TRENDS: ARTIFICIAL INTELLIGENCE AND CYBERSECURITY
13.1. Chapter Overview
13.2. Artificial Intelligence (AI): An Overview
13.2.1. Machine Learning: An Approach to Achieve AI
13.2.2. Deep Learning: A Technique for Implementing Machine Learning
13.3. AI in Cybersecurity
13.3.1. Potential Benefits of AI in Cybersecurity
13.4. AI-based Cybersecurity in Healthcare
13.4.1. AI-based Cybersecurity in Healthcare: List of Industry Players
13.4.1.1. Analysis by Year of Establishment
13.4.1.2. Analysis by Geographical Location
13.4.1.3. Analysis by Company Size
13.4.1.4. Top 15 Industry Players in Terms of Equity Funding
13.4.1.5. Market Competitiveness Analysis
14. CASE STUDY: CYBERSECURITY USE CASES IN HEALTHCARE
14.1. Chapter Overview
14.2. Notable Healthcare Data Breaches in 2017
14.3. The Next Major Security Concern: Medical Device Hacks
14.4. Example Strategies to Tackle Cyber Threats
14.4.1. Anthem
14.4.2. Merck
14.4.3. Aralez Pharmaceuticals
14.4.4. Atrius Health
14.4.5. Cardinal Health
14.4.6. Baptist Healthcare System
14.4.7. Sarasota Memorial Healthcare System
14.4.8. State Health and Human Services (HHS) Agency
15. EXECUTIVE INSIGHTS
15.1. Chapter Overview
15.2. BlackRidge Technology
15.2.1. Company Snapshot
15.2.2. Interview Transcript: Steve Leatherman, IT Consultant
15.3. Critical Informatics
15.3.1. Company Snapshot
15.3.2. Interview Transcript: Garrett Silver, Chief Executive Officer
15.4. Cyberlytic
15.4.1. Company Snapshot
15.4.2. Interview Transcript: Said Kenj, Account Executive and Rebecca Bourke, Marketing Manager
15.5. Device Authority
15.5.1. Company Snapshot
15.5.2. Interview Transcript: Robert Dobson, Director and Rosa Lenders, Marketing Executive
15.6. illusive networks
15.6.1. Company Snapshot
15.6.2. Interview Transcript: Matan Kubovsky, Vice President, R&D
15.7. MedCrypt
15.7.1. Company Snapshot
15.7.2. Interview Transcript: Mike Kijewski, Chief Executive Officer
15.8. Risk Based Security
15.8.1. Company Snapshot
15.8.2. Interview Transcript: Jake Kouns, Chief Information Security Officer
15.9. Rubicon Labs
15.9.1. Company Snapshot
15.9.2. Interview Transcript: Rod Schultz, Chief Product Officer and Julia Cline, Senior Director, Product and Marketing
15.10. SCADAfence
15.10.1. Company Snapshot
15.10.2. Interview Transcript: Yoni Shohet, Chief Executive Officer
15.11. secureHIM
15.11.1. Company Snapshot
15.11.2. Interview Transcript: Mike Meikle, Chief Executive Officer
15.12. Sensato
15.12.1. Company Snapshot
15.12.2. Interview Transcript: John Gomez, Chief Executive Officer
16. CONCLUSION
16.1. Although the Advent of Digitization has Created Several New Business Opportunities, Industries are Now More Vulnerable to Cyberattacks
16.2. Owing to Multiple Contributors, Healthcare is Amongst the Worst Hit Industries by Cyberattacks
16.3. With Growing Complexity and Frequency of Cyberattacks, a Large Number of Industry Players have Widened their Expertise to Protect Healthcare Organizations
16.4. Several Start-ups, Backed by Venture Capital Investors, are Driving Technological Innovation in the Market
16.5. Given the Financial Support and Diverse Product / Solution Portfolio, Several Recently Established Companies are Steadily Approaching Unicorn Status
16.6. Driven by the Evolving Threat Landscape and High Value of Healthcare Records, the Market is Expected to Grow Significantly in the Coming Years
16.7. As Threat Levels Increase, Artificial Intelligence (AI) Holds a Significant Potential in Next Generation Cyber Defenses
17. APPENDIX 1: TABULATED DATA
18. APPENDIX 2: LIST OF COMPANIES AND ORGANIZATIONS
Figure 3.1 Internet of Things: Framework
Figure 3.2 Internet of Things: Schematic Representation
Figure 3.3 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Figure 3.4 Cloud Computing: Development Timeline
Figure 3.5 Cloud Computing: Deployment Models
Figure 3.6 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Figure 3.7 Digitized Business Communication Channels
Figure 3.8 Digitization: Major Drawbacks
Figure 3.9 Top Security Implications of Cyberattacks, 2016
Figure 3.10 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Figure 3.11 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Figure 3.12 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Figure 3.13 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Figure 3.14 Industries Hit by the Highest Number of Cyberattacks in 2014, 2015 and 2016
Figure 3.15 Number of Records Breached: Distribution by Industry, 2015
Figure 4.1 Digital Transformation in Healthcare Industry: Key Elements
Figure 4.2 Global Digital Health Market, 2015-2020 (USD Billion)
Figure 4.3 Healthcare Assets Targeted by Different Cyber Criminals
Figure 4.4 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Figure 4.5 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Figure 4.6 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Figure 4.7 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Figure 4.8 Number of Healthcare Records Breached per Month, 2016
Figure 4.9 Healthcare Data Breaches, 2016
Figure 4.10 Primary Causes of Healthcare Data Breaches, 2016
Figure 4.11 Growth Drivers and Road Blocks to Cybersecurity in Healthcare
Figure 5.1 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Figure 5.2 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Figure 5.3 Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Figure 5.4 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Figure 5.5 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products / Solutions
Figure 5.6 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Figure 5.7 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Services
Figure 5.8 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Figure 5.9 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Figure 5.10 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Figure 9.1 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Figure 9.2 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Figure 9.3 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Figure 9.4 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Figure 9.5 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.6 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.7 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.8 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Figure 9.9 Benchmark Analysis: Large-Sized Companies, Peer Group V
Figure 9.10 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Figure 9.11 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Figure 9.12 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Figure 9.13 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.14 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.15 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.16 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Figure 9.17 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Figure 9.18 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Figure 9.19 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Figure 9.20 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Figure 9.21 Sophos, Revenues: Distribution by Type of Product, FY 2017 (USD Million)
Figure 9.22 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Figure 10.1 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Figure 10.2 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Figure 10.3 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Figure 10.4 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount and Type of Funding, 2012-2017 (USD Million)
Figure 10.5 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Figure 10.6 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Figure 10.7 Cybersecurity in Healthcare: Funding and Investment Summary
Figure 11.1 Company Valuation Analysis: A/F Ratio, Input Dataset
Figure 11.2 Company Valuation Analysis: A/Y Ratio, Input Dataset
Figure 11.3 Company Valuation Analysis: A/E Ratio, Input Dataset
Figure 11.4 Company Valuation Analysis: Categorization by Employee Base Score
Figure 11.5 Company Valuation Analysis: Categorization by Portfolio Strength
Figure 11.6 Company Valuation Analysis: Categorization by Weighted Average Score
Figure 11.7 Company Valuation Analysis: Likely Unicorns in Cybersecurity in Healthcare Industry
Figure 12.1 Country-wise Average Cost per Record, 2017 (USD)
Figure 12.2 Overall Cybersecurity Market in Healthcare (Actual v/s Untapped Opportunity), 2018 and 2030 (USD Billion)
Figure 12.3 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Figure 12.4 Core Cybersecurity Products / Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.5 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.6 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Figure 12.7 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.8 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.9 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.10 3rd Party / Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.11 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.12 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.13 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.14 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.15 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.16 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.17 Other Security Element Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.18 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.19 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.20 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Figure 12.21 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Figure 12.22 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Figure 12.23 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Figure 13.1 Machine Learning Algorithm: Workflow
Figure 13.2 Deep Learning: Image Recognition
Figure 13.3 Google Trends: Artificial Intelligence, Machine Learning and Deep Learning
Figure 13.4 Google Trends: Popular Keywords (Deep Learning)
Figure 13.5 Artificial Intelligence v/s Cybersecurity: Google Trends, 2011-2017
Figure 13.6 Artificial Intelligence v/s Cybersecurity: Geographical Distribution of Google Searches, 2011-2017
Figure 13.7 AI / Machine Learning: Shaping the Future of Cybersecurity
Figure 13.8 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry Players by Year of Establishment
Figure 13.9 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Figure 13.10 AI-based Cybersecurity in Healthcare: Regional Landscape of Industry Players
Figure 13.11 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Figure 13.12 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding (USD Million)
Figure 13.13 AI-based Cybersecurity in Healthcare: Market Competitiveness
Figure 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Figure 14.2 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Geographical Location
Figure 14.3 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Cause of Breach
Figure 16.1 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion)
Table 3.1 Impact of Digitization on Different Industries
Table 3.2 Key Cyberattacks and Security Vulnerabilities
Table 3.3 Key Cybersecurity Solutions
Table 4.1 Potential Applications of IoT Across Healthcare Industry
Table 4.2 Cybersecurity Vulnerabilities in the Healthcare Industry
Table 4.3 Largest Healthcare Data Breaches, 2017
Table 4.4 Largest Healthcare Data Breaches, 2016
Table 4.5 Biggest Ransomware Attacks on Healthcare Industry, 2016
Table 4.6 Cybersecurity Elements in Healthcare
Table 4.7 Best Cybersecurity Practices in Healthcare
Table 5.1 Cybersecurity in Healthcare: List of Industry Players
Table 5.2 Cybersecurity in Healthcare, Industry Players: Information on Type of Offering
Table 5.3 Cybersecurity in Healthcare, Industry Players: Information on Type of Security Elements and Deployment Mode
Table 5.4 Cybersecurity in Healthcare, Industry Players: Information on Type of Threats Mitigated
Table 6.1 Attivo Networks: Key Highlights
Table 6.2 Attivo Networks: Funding Instances
Table 6.3 Attivo Networks: Cybersecurity Product / Service Portfolio
Table 6.4 Attivo Networks: Recent Developments
Table 6.5 CensorNet: Key Highlights
Table 6.6 CensorNet: Funding Instances
Table 6.7 CensorNet: Cybersecurity Product / Service Portfolio
Table 6.8 CensorNet: Recent Developments
Table 6.9 Exabeam: Key Highlights
Table 6.10 Exabeam: Funding Instances
Table 6.11 Exabeam: Cybersecurity Product / Service Portfolio
Table 6.12 Exabeam: Recent Developments
Table 6.13 iCyber-Security: Key Highlights
Table 6.14 iCyber-Security: Funding Instances
Table 6.15 iCyber-Security: Cybersecurity Product / Service Portfolio
Table 6.16 iCyber-Security: Recent Developments
Table 6.17 Threat Stack: Key Highlights
Table 6.18 Threat Stack: Funding Instances
Table 6.19 Threat Stack: Cybersecurity Product / Service Portfolio
Table 6.20 Threat Stack: Recent Developments
Table 6.21 TraceSecurity: Key Highlights
Table 6.22 TraceSecurity: Funding Instances
Table 6.23 TraceSecurity: Cybersecurity Product / Service Portfolio
Table 6.24 TraceSecurity: Recent Developments
Table 6.25 Zenedge: Key Highlights
Table 6.26 Zenedge: Funding Instances
Table 6.27 Zenedge: Cybersecurity Product / Service Portfolio
Table 6.28 Zenedge: Recent Developments
Table 7.1 Anomali: Key Highlights
Table 7.2 Anomali: Funding Instances
Table 7.3 Anomali: Cybersecurity Product / Service Portfolio
Table 7.4 Anomali: Recent Developments
Table 7.5 Centripetal Networks: Key Highlights
Table 7.6 Centripetal Networks: Funding Instances
Table 7.7 Centripetal Networks: Cybersecurity Product / Service Portfolio
Table 7.8 Centripetal Networks: Recent Developments
Table 7.9 Flashpoint: Key Highlights
Table 7.10 Flashpoint: Funding Instances
Table 7.11 Flashpoint: Cybersecurity Product / Service Portfolio
Table 7.12 Flashpoint: Recent Developments
Table 7.13 ProtectWise: Key Highlights
Table 7.14 ProtectWise: Funding Instances
Table 7.15 ProtectWise: Cybersecurity Product / Service Portfolio
Table 7.16 ProtectWise: Recent Developments
Table 7.17 Sqrrl: Key Highlights
Table 7.18 Sqrrl: Funding Instances
Table 7.19 Sqrrl: Cybersecurity Product / Service Portfolio
Table 7.20 Sqrrl: Recent Developments
Table 7.21 Shape Security: Key Highlights
Table 7.22 Shape Security: Funding Instances
Table 7.23 Shape Security: Cybersecurity Product / Service Portfolio
Table 7.24 Shape Security: Recent Developments
Table 7.25 Vectra Networks: Key Highlights
Table 7.26 Vectra Networks: Funding Instances
Table 7.27 Vectra Networks: Cybersecurity Product / Service Portfolio
Table 7.28 Vectra Networks: Recent Developments
Table 8.1 Agio: Key Highlights
Table 8.2 Agio: Cybersecurity Service Portfolio
Table 8.3 Agio: Recent Developments
Table 8.4 CyberSurance: Key Highlights
Table 8.5 CyberSurance: Cybersecurity Service Portfolio
Table 8.6 CyberSurance: Recent Developments
Table 8.7 Delta Risk: Key Highlights
Table 8.8 Delta Risk: Cybersecurity Service Portfolio
Table 8.9 Delta Risk: Recent Developments
Table 8.10 ITEGRITI: Key Highlights
Table 8.11 ITEGRITI: Cybersecurity Service Portfolio
Table 8.12 ITEGRITI: Recent Developments
Table 8.13 Security Risk Advisors: Key Highlights
Table 8.14 Security Risk Advisors: Cybersecurity Service Portfolio
Table 8.15 Security Risk Advisors: Recent Developments
Table 8.16 Sera-Brynn: Key Highlights
Table 8.17 Sera-Brynn: Cybersecurity Service Portfolio
Table 8.18 Sera-Brynn: Recent Developments
Table 8.19 VigiTrust: Key Highlights
Table 8.20 VigiTrust: Cybersecurity Service Portfolio
Table 8.21 VigiTrust: Recent Developments
Table 9.1 Benchmark Analysis: Peer Groups
Table 9.2 AlienVault: Key Highlights
Table 9.3 AlienVault: Funding Instances
Table 9.4 AlienVault: Cybersecurity Product / Service Portfolio
Table 9.5 AlienVault: Recent Developments
Table 9.6 Carbon Black: Key Highlights
Table 9.7 Carbon Black: Recent Acquisitions
Table 9.8 Carbon Black: Funding Instances
Table 9.9 Carbon Black: Cybersecurity Product / Service Portfolio
Table 9.10 Carbon Black: Recent Developments
Table 9.11 CrowdStrike: Key Highlights
Table 9.12 CrowdStrike: Funding Instances
Table 9.13 CrowdStrike: Cybersecurity Product / Service Portfolio
Table 9.14 CrowdStrike: Recent Developments
Table 9.15 Cylance: Key Highlights
Table 9.16 Cylance: Funding Instances
Table 9.17 Cylance: Cybersecurity Product / Service Portfolio
Table 9.18 Cylance: Recent Developments
Table 9.19 Darktrace: Key Highlights
Table 9.20 Darktrace: Funding Instances
Table 9.21 Darktrace: Cybersecurity Product / Service Portfolio
Table 9.22 Darktrace: Recent Developments
Table 9.23 Gigamon: Key Highlights
Table 9.24 Gigamon: Cybersecurity Product / Service Portfolio
Table 9.25 Gigamon: Recent Developments
Table 9.26 LogRhythm: Key Highlights
Table 9.27 LogRhythm: Funding Instances
Table 9.28 LogRhythm: Cybersecurity Product / Service Portfolio
Table 9.29 LogRhythm: Recent Developments
Table 9.30 Fortinet: Key Highlights
Table 9.31 Fortinet: Recent Acquisitions
Table 9.32 Fortinet: Cybersecurity Product / Service Portfolio
Table 9.33 Fortinet: Recent Developments
Table 9.34 FireEye: Key Highlights
Table 9.35 FireEye: Recent Acquisitions
Table 9.36 FireEye: Cybersecurity Product / Service Portfolio
Table 9.37 FireEye: Recent Developments
Table 9.38 IBM: Key Highlights
Table 9.39 IBM: Recent Acquisitions
Table 9.40 IBM: Cybersecurity Product / Service Portfolio
Table 9.41 IBM: Recent Developments
Table 9.42 McAfee: Key Highlights
Table 9.43 McAfee: Recent Acquisitions
Table 9.44 McAfee: Cybersecurity Product / Service Portfolio
Table 9.45 McAfee: Recent Developments
Table 9.46 Palo Alto Networks: Key Highlights
Table 9.47 Palo Alto Networks: Recent Acquisitions
Table 9.48 Palo Alto Networks: Cybersecurity Product / Service Portfolio
Table 9.49 Palo Alto Networks: Recent Developments
Table 9.50 Sophos: Key Highlights
Table 9.51 Sophos: Recent Acquisitions
Table 9.52 Sophos: Cybersecurity Product / Service Portfolio
Table 9.53 Sophos: Recent Developments
Table 9.54 Trustwave: Key Highlights
Table 9.55 Trustwave: Recent Acquisitions
Table 9.56 Trustwave: Funding Instances
Table 9.57 Trustwave: Cybersecurity Product / Service Portfolio
Table 9.58 Trustwave: Recent Developments
Table 10.1 Cybersecurity in Healthcare: Funding Instances
Table 10.2 Cybersecurity in Healthcare: Summary of Investments
Table 11.1 Company Valuation Analysis: Sample Dataset
Table 11.2 Company Valuation Analysis: Weighted Average Evaluation
Table 11.3 Company Valuation Analysis: Estimated Valuation
Table 13.1 Combating Cybersecurity Threats: Traditional Approach v/s AI-based Approach
Table 13.2 AI-based Cybersecurity in Healthcare: List of Industry Players
Table 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Table 14.2 Recent Medical Device Cybersecurity Incidents
Table 15.1 BlackRidge Technology: Key Highlights
Table 15.2 Critical Informatics: Key Highlights
Table 15.3 Cyberlytic: Key Highlights
Table 15.4 Device Authority: Key Highlights
Table 15.5 illusive networks: Key Highlights
Table 15.6 MedCrypt: Key Highlights
Table 15.7 Risk Based Security: Key Highlights
Table 15.8 Rubicon Labs: Key Highlights
Table 15.9 SCADAfence: Key Highlights
Table 15.10 secureHIM: Key Highlights
Table 15.11 Sensato: Key Highlights
Table 17.1 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Table 17.2 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Table 17.3 Top Security Implications of Cyberattacks, 2016
Table 17.4 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Table 17.5 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Table 17.6 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Table 17.7 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Table 17.8 Number of Records Breached: Distribution by Industry, 2015
Table 17.9 Global Digital Health Market, 2015-2020 (USD Billion)
Table 17.10 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Table 17.11 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Table 17.12 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Table 17.13 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Table 17.14 Number of Healthcare Records Breached per Month, 2016
Table 17.15 Healthcare Data Breaches, 2016
Table 17.16 Primary Causes of Healthcare Data Breaches, 2016
Table 17.17 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Table 17.18 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Table 17.19 Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Table 17.20 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Table 17.21 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products / Solutions
Table 17.22 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Table 17.23 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Services
Table 17.24 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Table 17.25 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Table 17.26 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Table 17.27 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Table 17.28 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Table 17.29 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Table 17.30 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Table 17.31 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.32 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.33 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.34 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Table 17.35 Benchmark Analysis: Large-Sized Companies, Peer Group V
Table 17.36 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Table 17.37 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Table 17.38 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Table 17.39 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.40 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.41 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.42 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Table 17.43 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Table 17.44 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Table 17.45 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Table 17.46 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Table 17.47 Sophos, Revenues: Distribution by Type of Product, FY 2017 (USD Million)
Table 17.48 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Table 17.49 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Table 17.50 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Table 17.51 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Table 17.52 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested and Type of Funding, 2012-2017 (USD Million)
Table 17.53 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Table 17.54 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Table 17.55 Cybersecurity in Healthcare: Funding and Investment Summary
Table 17.56 Company Valuation Analysis: A/F Ratio, Input Dataset
Table 17.57 Company Valuation Analysis: A/Y Ratio, Input Dataset
Table 17.58 Company Valuation Analysis: A/E Ratio, Input Dataset
Table 17.59 Country-wise Average Cost per Record, 2017 (USD)
Table 17.60 Overall Cybersecurity Market in Healthcare (Actual v/s Untapped Opportunity), 2018 and 2030 (USD Billion)
Table 17.61 Overall Cybersecurity Market in Healthcare, 2018-2030: Conservative Scenario (USD Billion)
Table 17.62 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Table 17.63 Overall Cybersecurity Market in Healthcare, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.64 Core Cybersecurity Products / Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.65 Core Cybersecurity Products / Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.66 Core Cybersecurity Products / Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.67 Threat Intelligence Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.68 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.69 Threat Intelligence Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.70 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Table 17.71 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.72 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Table 17.73 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.74 Insider Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.75 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.76 Insider Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.77 Employee Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.78 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.79 Employee Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.80 3rd Party / Subcontractor Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.81 3rd Party / Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.82 3rd Party / Subcontractor Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.83 Physical Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.84 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.85 Physical Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.86 Other Threat Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.87 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.88 Other Threat Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.89 Application Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.90 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.91 Application Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.92 Cloud Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.93 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.94 Cloud Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.95 Network Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.96 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.97 Network Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.98 Endpoint Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.99 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.100 Endpoint Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.101 Other Security Element Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.102 Other Security Element Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.103 Other Security Element Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.104 Cloud Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.105 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.106 Cloud Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.107 On-Premise Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.108 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.109 On-Premise Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.110 Cybersecurity Market in Healthcare in the US, 2018-2030: Conservative Scenario (USD Billion)
Table 17.111 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Table 17.112 Cybersecurity Market in Healthcare in the US, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.113 Cybersecurity Market in Healthcare in Europe, 2018-2030: Conservative Scenario (USD Billion)
Table 17.114 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Table 17.115 Cybersecurity Market in Healthcare in Europe, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.116 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Conservative Scenario (USD Billion)
Table 17.117 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Table 17.118 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.119 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Conservative Scenario (USD Billion)
Table 17.120 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Table 17.121 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.122 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry by Year of Establishment
Table 17.123 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Table 17.124 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Table 17.125 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding (USD Million)
Table 17.126 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Geographical Location
Table 17.127 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Cause of Breach
Table 17.128 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion) Figure 3.1 Internet of Things: Framework
The following companies / institutes / government bodies and organizations have been mentioned in this report.