世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

会員登録

マイページ

モノのインターネット(IoT)のセキュリティと詐欺防止における人工知能(AI) 2017-2022年

Artificial Intelligence in IoT Security and Fraud Prevention 2017 - 2022

 

出版社 出版年月電子媒体価格ページ数図表数
Mind Commerce
マインドコマース
2017年4月US$995
シングルユーザライセンス
87 12

サマリー

米国調査会社マインドコマース(Mind Commerce)の調査レポート「モノのインターネット(IoT)のセキュリティと詐欺防止における人工知能(AI) 2017-2022年」は、モノのインターネットにおける人工知能ベースのセキュリティを概観し、技術やビジネスチャンスを査定している。フォグコンピューティングアーキテクチャなどの特定の採用IoTシナリオにおける人工知能についても分析している。2017-2022年の市場を予測している。

目次(抜粋)

  • IoTのセキュリティにおける人工知能の概観
  • IoTのセキュリティソリューション
  • 人工知能ベースのIoTのセキュリティソリューションの予測
  • セキュリティ企業の概要

Overview

Artificial Intelligence (AI) is rapidly becoming integrated into many aspects of communication, applications, content, and commerce. The Internet of Things (IoT) is a particularly important area for AI as a means for safeguarding assets, reducing fraud, and supporting analytics and automated decision making. One of the major concerns is illegal capture and trade of IoT data which includes users’ activities and records such as personal health, financial information, location, and asset information such as personal vehicles.

This report evaluates that technologies, market opportunities, and outlook for AI-based security in IoT. The report includes analysis of AI in specific IoT deployment scenarios such as Fog Computing architectures. The report provides forecasting for 2017 to 2022. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Target Audience:

  • AI companies
  • Security companies
  • Wireless device manufacturers
  • Telephony infrastructure providers
  • Computer and semiconductor companies
  • Embedded hardware, software and OS providers
  • Wireless network operators and service providers


目次

1 Introduction
1.1.1 Scope of Study
1.1.2 Target Audience
1.1.3 Companies in Report
2 Executive Summary
3 Overview
3.1 Cyber Security
3.2 Ramification of Cyber Security Threats
3.3 Internet of Things
3.4 General IoT Security Concerns
3.5 IoT Security Focus Areas
3.6 Distributed IoT: Fog Computing
3.6.1 Edge Computing
3.6.2 Edge Computing vs. Cluster Computing
3.6.3 Mobile Edge Computing
3.6.4 Fog Computing
3.6.5 Cloud Computing vs. Fog Computing
3.7 Specific Security Concerns with Fog Computing
4 Security Solutions in IoT
4.1 Challenges in Developing Security Solutions for IoT
4.1.1 Multivendor Nature of IoT Business
4.1.2 Lack of Standard Security Practices
4.1.3 Existing IoT Devices lack Robust Security
4.1.4 Security Threats are becoming Increasingly Sophisticated
4.1.5 IoT Data is a Bigger Concern than Equipment
4.2 Solution Areas for Securing IoT
4.3 General Steps to Secure IoT
4.3.1 Securing Device
4.3.2 Using Secure Communication Protocols
4.3.3 Securing and Protecting Data
4.4 General IoT Security Measures
4.4.1 Convergence of IT and OT Security Policies
4.4.2 Securing Mobile Devices and Applications
4.4.3 Securing IoT Cloud Infrastructure
4.5 IoT Security Issues that Drive the Need for AI
4.5.1 Fog Computing Security Concerns: An Evolving Issue
4.5.2 Beyond Safeguarding Assets: The Role of AI in Analytics and Decision Making
5 AI-based IoT Security Solution Forecasts
5.1 Global AI based Security Solutions in IoT Forecasts 2017 - 2022
5.2 Regional AI based Security Solutions in IoT Forecasts 2017 - 2022
5.2.1 North America AI based Security Solutions in IoT 2017 - 2022
5.2.2 Europe AI based Security Solutions in IoT 2017 - 2022
5.2.3 APAC AI based Security Solutions in IoT 2017 - 2022
5.2.4 Middle East and Africa AI based Security Solutions in IoT 2017 - 2022
5.2.5 Latin America AI based Security Solutions in IoT 2017 - 2022
6 Security Companies Evaluated
6.1 ARM Holdings
6.2 Attivo Networks
6.3 Bastille
6.4 Black Duck Software
6.5 Check Point Software Technologies
6.6 Cisco Systems
6.7 Cylance
6.8 IBM Corporation
6.9 Infineon Technologies AG
6.10 Intel Security Group (McAfee)
6.11 Inside Secure SA
6.12 Mocana
6.13 Neustar
6.14 Overwatch
6.15 Spirent Security
6.16 Symantec
6.17 Trend Micro
6.18 TrustPoint IT
6.19 Wedge Networks
6.20 Wurldtech Security Technologies
7 Conclusions and Recommendations

Figures

Figure 1: Fog Computing
Figure 2: Fog Computing and Cloud Architecture
Figure 3: Security in Fog Computing

Tables

Table 1: Cyber Crime in Top 15 Countries
Table 2: Cyber Crime by Category
Table 3: IoT Security Challenges and Solution Areas
Table 4: Global AI based Security Market 2017 – 2022
Table 5: North America AI based Security Market 2017 – 2022
Table 6: Europe AI based Security Market 2017 – 2022
Table 7: APAC AI based Security Market 2017 – 2022
Table 8: ME & Africa AI based Security Market 2017 – 2022
Table 9: Latin America AI based Security Market 2017 – 2022

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問い合せは、お電話・メール・WEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問い合せはこちらのフォームから承ります

office@dri.co.jp

 

ページTOPに戻る