Table of Content


Table of Contents
Executive Summary
Key Findings
Market State—360 Degree Snapshot
Research Scope and Segmentation
Research Scope
Research Scope (continued)
Key Questions this Study will Answer
Market Definitions
Geographical Segmentation
Market Overview
Internet of Things (IoT) Penetration
IoT Penetration by Region
Smart Building Control Devices—Commercial
Smart Building Control Devices—Commercial (continued)
IT/OT Convergence
IT/OT Convergence—Merits Versus Risks
Notable IT/OT Cyberattacks
IT/OT Convergence—Cyber Risks in Smart Buildings
BAS
BAS—Security Vulnerabilities
IT/OT Security—Entry Points
Market Dynamics
IT/OT Security Ecosystem—Types of Stakeholders
Distribution Channels
Distribution Channels—Discussion
Business Models
Regulations and Standards
Market Trends
Market Impact of Growth Trends
Digitization of Building Operations
IT/OT Cybersecurity Spend
IT/OT Security Implementation Challenges
Technology (Mis)Alignment
Total IT/OT Security Market Forecasts
Forecast Assumptions
Risks to Frost & Sullivan Market Forecasts
Revenue Forecast
Revenue Forecast Discussion
Percent Revenue Forecast by Business Size
Percent Revenue Forecast Discussion by Business Size
Percent Revenue Forecast by Region
Revenue Forecast by Region
Revenue Forecast Discussion by Region
Percent Revenue Forecast by Verticals
Revenue Forecast by Verticals
Revenue Forecast Discussion by Verticals
IT/OT Security Risk Matrix
IT/OT Security Risk Matrix
IT/OT Security Risk Matrix by Verticals
IT/OT Security Risk Matrix Discussion by Verticals
IT/OT Security Risk Matrix by Country/Region
IT/OT Security Risk Matrix Discussion by Country/Region
Competitive Analysis
Competitive Environment
Key Competitor Profile—Aperio Systems (Aperio)
Key Competitor Profile—Aperio Systems (Aperio) (continued)
Key Competitor Profile—Bayshore Networks (Bayshore)
Key Competitor Profile—Bayshore Networks (Bayshore) (continued)
Key Competitor Profile—Check Point Software Technologies (Check Point)
Key Competitor Profile—Check Point Software Technologies (Check Point) (continued)
Key Competitor Profile—Claroty
Key Competitor Profile—Claroty (continued)
Key Competitor Profile—Cyberbit
Key Competitor Profile—Cyberbit (continued)
Key Competitor Profile—Forescout Technologies (Forescout)
Key Competitor Profile—Forescout Technologies (Forescout) (continued)
Key Competitor Profile—Fortinet
Key Competitor Profile—Fortinet (continued)
Key Competitor Profile—Indegy
Key Competitor Profile—Indegy (continued)
Key Competitor Profile—Iotium
Key Competitor Profile—Iotium (continued)
Key Competitor Profile—Radiflow
Key Competitor Profile—Radiflow (continued)
Key Competitor Profile—Siemens Smart Infrastructure
Key Competitor Profile—Siemens Smart Infrastructure (continued)
Key Competitor Profile—Siemens Smart Infrastructure (continued)
Key Competitor Profile—T-Systems Telekom Security (T-Systems)
Key Competitor Profile—T-Systems Telekom Security (T-Systems) (continued)
Insights for CISOs
Implementation Steps
Step 1—Asset Inventory
Step 2—Vulnerability, Risk, and Impact Assessment
Step 3—Stakeholder Responsibility
Step 4—Vendor Selection
Step 5—Continued Audit and Improvement
Frost & Sullivan Cyber Resilience Model
Common Mistakes to Avoid
Growth Opportunities
Growth Opportunity 1—Deep Learning and AI
Growth Opportunity 2—Partnerships
Growth Opportunity 3—Vertical Focus
Growth Opportunity 4—Threat Protection
Strategic Imperatives for Success and Growth
The Last Word
The Last Word
Legal Disclaimer
Appendix
Partial List of Companies Interviewed
Learn More—Next Steps
List of Exhibits
List of Exhibits (continued)