Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Frost & Sullivan Webinar: The Evolution of Converged Threats to Drive Investments in Security


Published on

Despite defence budget constraints governments are facing, the security industry still offers growth opportunities, especially for integrators and system suppliers.

Despite defence budget constraints governments are facing, the security industry still offers growth opportunities, especially for integrators and system suppliers.

Published in: Business, Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. The Evolution of Converged Threats to Drive Investments in Security Evolving Threats, Technologies and Opportunities Balaji Srimoolanathan Principal Consultant – Aerospace, Defence & Security 11th April, 2013© 2013 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property ofFrost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
  • 2. Today’s Presenter Balaji Srimoolanathan, Principal Consultant Frost & SullivanSince joining Frost & Sullivan in early 2008, Balaji has provided consulting supportand thought leadership to numerous global companies on a broad range ofstrategies issues across the defence and security sector.His core focus areas include critical infrastructure protection, cyber security andurban security with particular focus on emerging markets, new business modelsand technologies. 2
  • 3. Focus Points Security as a Mega Trend Evolution and Convergence of Threats Situational Awareness Beyond Security The Future of Security Technologies Opportunities for the Industry 3
  • 4. Security is a Major Global Mega Trend Security“In the 21st century threats to our lives, identities and freedoms come from more sources than ever before; from terrorists to hackers and overzealous governments. Individual andcollective focus on security is expected to be one of the top trends shaping our private and public in the future.” 4
  • 5. Frost & Sullivan estimates the global securityGrowth in Spending market size at $140 billion currently and expects it to reach $200 billion by the year 2020 Global Civil Security Spending by Regions, (Excludes Cyber Spend) 2010 - 2020 210 195 15 180 10 8 9 22 25 165 8 19 20 150 9 8 17 6 8 14 15 48 50 135 5 12 47$ Billions 10 11 42 45 120 4 40 105 8 33 34 36 32 90 30 47 48 44 45 46 75 37 38 38.5 40 32 36 60 45 30 53 54.5 55 56 58 60 61 65 66 46 50 15 0 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 Source: Frost & Sullivan. North America Europe APAC (Including India and China) Middle East South America • Civil/ Homeland Security Market Growth to 2020: 5% • Cyber Security Market Growth: 12% • Global GDP Growth 2012: 3.5% • Global Population Growth 2012: 1.2% Source: Frost & Sullivan. 5
  • 6. Top 15 Security Markets by Threat Level vs Ability to SpendF&S Country Threat Strategic Country Region Country Rating Factor Factor Score 1 North America United States of America 71 100 94 2 Europe United Kingdom 90 80 93 3 APAC India 75 80 85 4 CIS Russia 75 80 85 5 Middle East Saudi Arabia 70 80 80 6 Europe France 60 80 77 7 Middle East Israel 70 62 72 8 Europe Turkey 80 43 68 9 Europe Spain 70 50 66 10 Europe Germany 50 70 66 11 APAC China 45 70 63 12 APAC Indonesia 65 50 63 13 Latin America Brazil 43 70 62 14 APAC South Korea 53 60 62 15 APAC Pakistan 90 22 61 6
  • 7. Security Markets are Growing Despite…• Large existing installed base of security technology• Reduction in central and local government budgets in developed economies• Falling physical crime rates• Economic recession impacting private sector• Privacy concerns “Falling US Crime Rates Raises More Questions than Answers” LA Times, US, 07/12“Law and order spending falls by10% in the first two years of thecoalition government” “Is CCTV Creeping too Far?” BBC, UK Daily Mail, UK, 03/13 Source: Frost & Sullivan. 7
  • 8. Driving Global Security Infrastructure DevelopmentUnderdeveloped security apparatus in emerging markets Population Socio economic Unknown & Evolution of growth and concerns over increasingly technology urbanisation income gaps and sophisticated inequality threats Source: Frost & Sullivan. 8
  • 9. The Evolving Threat Landscape Imminent Threats can be classified as crime or criminal behaviour which can usually be handled by visible technology deployment and police presence. Technology is used primarily to enable quicker prosecution Consequential Threats are threats which are triggered by an occurrence or an incident such as the London Riots. These kind of threats can be proactively managed with advanced interpretation of consequences and of response. Unknown Threats are threats that occur without prior warning or indications and cannot be prepared for. Cyber attacks, DDOS, etc can be classified as unknown threats where vulnerabilities are often exposed only after the attack has occurred. Advanced analytics and intelligence are required to detect and prevent such attacks. Source: Frost & Sullivan. 9
  • 10. Converging Threat LandscapeOrganisations of today no longer face one type of threat. Physical and Cyber Threats areconverging and the disparate solutions and tools of today wont serve the purpose forsecuring organisations of the future. Physical Competitive Threats Threats Cyber/Network Economic/ Security Financial Threats Threats Organisation Lack/Loss of Efficiency Revenue Loss of Brand Business Assets and their Losses Losses Reputation Continuity Issues Availability Source: Frost & Sullivan. 10
  • 11. Situational Awareness Beyond Security Security Risk Strategic Effectiveness Protection Security Traditional Return Additional Pillars of Return on Security on Investment Investment Direct calculations Calculations based on Investments, Direct based on Gains, Loss Prevention, Risk Management, Investments and Operational Efficiencies, Cost Savings, Gains from the Revenue Implications etc. Investment Physical Security Physical & IT Security Security and Business Process Integration Integration Applications Integration Source: Frost & Sullivan. 11
  • 12. Future of Security Technology Past Present & Future Reactive Proactive Low Situational Awareness High Situational Awareness Limited Intelligence Accessible and comprehensive Intelligence Closed networks Interoperable Systems/Open Architecture Silos Multi Agency Collaboration Compartmental End to End Solution Integrated Solutions Advanced Next Big Data High PSIM Unmanned Generation & Resolution Biometrics & Cyber C2 Systems Communication Analytics Cameras Technologies Source: Frost & Sullivan. 12
  • 13. Integrated Solutions are Required to Enhance Situational AwarenessUTILITIES: Smart Meters, GPS: At least 75% ofWireless Technology and automobiles installed withSensors enabling Machine to GPS equipment enablingMachine (M2M) intelligent trafficcommunication and management system.monitoring of energy use 4G Mobile technology (LTE, WiMAX) BUILDINGS: WirelessAIRPORTS: Free Wi-Fi enabling integration Building AutomationAccess and Real – Time into any wireless Systems at Homes andVirtual Monitoring with CCTV surveillance with platform Offices Connected tosecure, high-speed, built-in Network Card, DVR iPhone, Laptop, Carwireless data networking and LCD Monitor integrated Systems for Easy Control into the wireless platform and Communication SATELLITE TECHNOLOGY (such as GALILEO) to provide navigation for aviation, ground and maritime operations HOTSPOTS: City-wide Wi-Fi Network (Eg. Sunnyvale, California) with Hotspots in EMERGENCY SERVICES:RAILWAYS: Real-Time Cafes, Hotels and other Wireless surveillanceWireless Video Surveillance important locations connecting fire and policein railways stations for event forces to Central Server fordetection, preparedness, monitoring, control andprevention, protection, command communicationsresponse and recovery. Source: Frost & Sullivan analysis. 13
  • 14. Communication Infrastructure is Critical and is theBackbone for Scalability Access Control, Video Surveillance Intrusion Detection, Biometrics, Perimeter and Occupancy Sensors, Fire Alarm Panels, Detection Devices (Smoke/Heat/Gas/Flame), Fire suppression, Notification and Evacuation Energy Logistics, Distribution Integrated Fire Department, Police Channels (electricity, water, gas), Physical and Medical Services, Centralised Utility Monitor, Heat, Lighting, Security & Safety and Remote Command and Control, Back-Up Power, Leakage Monitor Energy Response Scalable Decision Making Process Management Management Universal Voice/Video/Data, Audio Visual, Communication Structured Cabling, TCP/IP/BAS Logical Protocols, Remote VPN Access, Security & Mobility Traffic Control & Monitoring (rail, Communicati Management underground, buses, personal Computer Logon, Network Access on Building vehicles), 24/7 Supply Management Logon, Firewalls, Managed Management Security Services, Mobile Security, (logistics) Security Infrastructure Building Automation, Building Control, Networked Systems, Crisis Management Solution (power, infrastructure damage...) 14
  • 15. Advanced Communication Technologies Enable BetterTechnology Deployment and Interoperability SATCOM to Increasingly Enable Communication on the Move Wi-Fi enabled surveillance technology will enable deployment in areas where physical communication networks are difficult to deploy 4G LTE is allowing real time, high volume and high quality data transfer from mobile sensors and devices. 15 15
  • 16. Conclusions - Key Growth Geographies, Domains andTechnologies Technologies to Watch-Out Key Growth Geographies Domains to watch-out • Biometrics • India • Energy & Utilities Security • Data and Video Analytics • China • Cyber Security • Unmanned Systems • Saudi Arabia • Urban Security • Cloud Security • Turkey • UAE • Russia 16
  • 17. Next StepsDevelop Your Visionary and Innovative Skills Growth Partnership Service Share your growth thought leadership and ideas or join our GIL Global Community Join our GIL Community Newsletter Keep abreast of innovative growth opportunities 17
  • 18. Your Feedback is Important to Us What would you like to see from Frost & Sullivan?Growth Forecasts?Competitive Structure?Emerging Trends?Strategic Recommendations?Other? Please inform us by “Rating” this presentation. 18
  • 19. Follow Frost & Sullivan on Facebook, LinkedIn,SlideShare, and Twitter 19
  • 20. For Additional Information Joanna Lewandowska Corporate Communications Aerospace, Defence & Security +48 (0) 22 481 62 20 20