More Related Content More from Research Impact (18) Security technologies applied in biotechnology Industry1. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 1
SECURITY TECHNOLOGIES IN BIOTECHNOLOGY – MARKET SIZE &
OPPORTUNITIES
Scope of the Study
This report on Security Technologies in Biotechnology gives a market insight into technology types for
various biotechnology applications. Technologies include Holograms, Barcodes, RFID, Biometrics,
Information Security, and Patents for Food, Biopharmaceuticals, and Biodefense applications. Market
projections and estimates are illustrated by region and by type/applications. The report serves as a guide to
Security Technology industry for biotechnology applications, covering more than 350 companies that are
engaged in security technology/products and services. Major Research Institutes and Universities serving
the security technology industry are also covered in the corporate directory section of this report.
Information related to recent product releases, product developments, partnerships, collaborations, and
mergers and acquisitions is covered in the report. Compilation of Worldwide Patents related to security
technology products/services/technology for biotechnological applications is also provided. A global
perspective is presented along with regional analysis covering the regions of North America, Europe, Asia-
Pacific, and Rest of World with 133 exclusive graphically represented exhibits.
Security Technologies in Biotechnology report is an ideal research tool providing strategic business
intelligence to the corporate sector. This report may help strategists, investors, laboratories,
pharmaceutical companies, contract research organizations, biotechnology companies and drug approval
authorities in--
Gauging Competitive Intelligence
Identifying Key Growth Areas and Opportunities
Understanding Geographic Relevance to Product
Knowing Regional Market Sizes and Growth Opportunities and Restraints
Keeping Tab on Emerging Technologies
Equity Analysis
Tapping New Markets
Analytics and data presented in this report pertain to several parameters such as –
Global and Regional Market Sizes, Market Shares, Market Trends
Product (Global and Regional) Market Sizes, Market Shares, Market Trends
Technology Trends
Corporate Intelligence
Key Companies by Sales, Brands, Products
Consumer Behavioral Patterns
2. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 2
Other Strategic Business Affecting Data
Research Methodology
RI Technologies publishes business intelligence reports by going through a cycle of diligent research and
analysis activity. Research is done using both online and offline resources. The study outline of this report is
sketched on the following lines – global market analysis, regional market analysis, product segmentation,
global and regional market analysis by product segment, market trends, M&A, R&D, competitive landscape,
technology trends, and other key drivers. Current data helps in analyzing the future of the industry and is
also helpful for doing market evaluations, and estimating the market size for the future.
This report is uniquely researched and the methodology includes:
Need and Scope of Study
Product Definitions
Segmental Analysis
Regional Analysis
Exclusive Data Analytics
Corporate Intelligence
Feedback
Right from concept to final compilation of this report, both primary and secondary research methods are
applied. We have provided exclusive feedback forms/pre-release questionnaires for this report to use the
information for authentication of our own findings. Secondary research includes government publications,
investment research reports, web based surveys, website information of both companies and markets, and
other offline resources such as print publications and CDs.
Our compilation of easy to navigate PDF reports are essential value addition resources for leading and
growing companies.
3. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 3
CHAPTER II - REPORT SYNOPSIS
Security technologies include protection of secret messages and guarding of products and people against
counterfeiting and impersonation. Steganography and cryptography are concerned with hiding information,
while holography, barcoding and retinal scanning are techniques developed for combating counterfeiting
and impersonation.
Protection
Protection of secret messages
Steganography: The art and science of writing hidden or covered messages is referred as steganography. In
steganography the visible apparent message is referred to as the cover text, which may be depicted as a
picture, a list, an article etc. The hidden message may be in the form of invisible ink interpolated between
the visible lines of the document. Prior to the development of cryptographic techniques, steganography
was popular and widely used in ancient times, though the method had certain drawbacks.
Herodotus, the Greek Historian of 5th century BC and regarded as Father of History, cited two examples of
steganography in his treatise ‘The Histories of Herodotus’. Wax tablets are wooden planks coated with wax
and were used for writing with stylus in those times. In fact, Demeratus sent a message about the
anticipated attack on Greece by writing on a wooden plank and covering with wax to conceal the message.
Histiaeus, a tyrant of Miletus, in 6th century BC, used steganography in a peculiar way. He tattooed a
message on the head of a slave, and this message was concealed when the hair grew. The slave was sent to
his son-in-law Aristagoras, who shaved the slave’s head to read the message that conveyed the instructions
to revolt against Persians. Johannes Trithemius, who was an occult and abbot of Germany, wrote a book
known as Steganographia in 1499. This book was earlier considered to be about black magic, but later on
found to be about steganography and cryptography.
Cryptography: Cryptography is the science of hiding information. Encryption has been in vogue right from
ancient times, but was used earlier only by individuals and organizations that had the necessity. Encryption
and decryption of secret messages played vital role in World War II, and many of the methods to produce
them were kept highly confidential. The application of cryptography for public utility purposes emerged
only after US Data Encryption Standard and public key cryptography were introduced.
The one-time pad is an encryption algorithm. In this method of encryption, the plain text is combined with
a random key or pad of equal length and is used only once. Only the persons who possess the key would be
able to differentiate the cipher [hidden] texts from random [normal] texts. Nowadays, in the majority of
cryptosystems, private symmetric session keys are made perfectly random. [In symmetric session, same key
is used for encryption and decryption]. Therefore, even in weak ones [shorter than 128 bits], the messages
are safely concealed.
4. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 4
Segmentation
Exhibit 1. Segmentation of Security Technologies in Biotechnology Market by Technology and Application
Technology Application
Hologram Food
Barcodes Biopharmaceuticals
RFID Biodefense
Biometrics Other
Patents
Other
© RIT, 2013
5. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 5
Global Market Analysis
Global Security Technologies in Biotechnology market is projected to reach about US$ XX.XX billion by 2020
from an estimated US$ XX.XX billion in 2012, growing at a very high compounded annual growth rate
(CAGR) of XX.XX % during the analysis period 2005-2020.
Exhibit 2. Security Technologies in Biotechnology – Global Value Market Estimations and Predictions
(2005-2020) in US$ Billion
Year Value
2005 XX.XX
2006 XX.XX
2007 XX.XX
2008 XX.XX
2009 XX.XX
2010 XX.XX
2011 XX.XX
2012 XX.XX
2013 XX.XX
2014 XX.XX
2015 XX.XX
2016 XX.XX
2017 XX.XX
2018 XX.XX
2019 XX.XX
2020 XX.XX
CAGR % XX.XX
© RIT Figures, 2013
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
US$ Billion
6. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 6
III. MARKET DYNAMICS
Global Market for Security Technologies in Biotechnology
Global market for Security Technologies in Biotechnology is projected to reach US$XX.XX billion by 2020
from an estimated US$ XX.XX billion in 2012, registering a CAGR of XX.XX % during the analysis period 2005-
2020.
The United States market for Security Technologies in Biotechnology was estimated at US$ XX.XX million in
2012 and is projected to reach about US$ XX.XX billion in 2020. Growing at a CAGR of XX.XX % during the
period 2005-2020, the US is further projected to retain the leading position. The US also represents the
fastest growing market during the same analysis period.
Europe represents the second largest market for Security Technologies in Biotechnology. European market
was estimated at US$ XX.XX million in 2012 and is projected to attain the value of US$ XX.XX billion by
2020.
7. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 7
Exhibit 3. Security Technologies in Biotechnology - Global Value Market Estimations and Predictions
(2005-2020) by Geographic Region for North America, Europe, Asia-Pacific and Rest of World in US$
Million
Year/Region North America Europe Asia-Pacific Rest of World Total
2005 XX.XX XX.XX XX.XX XX.XX XX.XX
2006 XX.XX XX.XX XX.XX XX.XX XX.XX
2007 XX.XX XX.XX XX.XX XX.XX XX.XX
2008 XX.XX XX.XX XX.XX XX.XX XX.XX
2009 XX.XX XX.XX XX.XX XX.XX XX.XX
2010 XX.XX XX.XX XX.XX XX.XX XX.XX
2011 XX.XX XX.XX XX.XX XX.XX XX.XX
2012 XX.XX XX.XX XX.XX XX.XX XX.XX
2013 XX.XX XX.XX XX.XX XX.XX XX.XX
2014 XX.XX XX.XX XX.XX XX.XX XX.XX
2015 XX.XX XX.XX XX.XX XX.XX XX.XX
2016 XX.XX XX.XX XX.XX XX.XX XX.XX
2017 XX.XX XX.XX XX.XX XX.XX XX.XX
2018 XX.XX XX.XX XX.XX XX.XX XX.XX
2019 XX.XX XX.XX XX.XX XX.XX XX.XX
2020 XX.XX XX.XX XX.XX XX.XX XX.XX
CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX
© RIT Figures, 2013
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
US$ Million
North America Europe Asia-Pacific Rest of World
8. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 8
Exhibit 4. Security Technologies in Biotechnology - Global Value Market Shares (2010, 2015 & 2020) by
Geographic Region for North America, Europe, Asia-Pacific and Rest of World
Year/Region North America Europe Asia-Pacific Rest of World Total
2010 XX.XX XX.XX XX.XX XX.XX XX.XX
2015 XX.XX XX.XX XX.XX XX.XX XX.XX
2020 XX.XX XX.XX XX.XX XX.XX XX.XX
CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX
© RIT Figures, 2013
9. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 9
Global Market for Holograms in Biotechnology
Global market for Holograms in Biotechnology is projected to reach US$XX.XX billion by 2020 from an
estimated US$ XX.XX billion in 2012, registering a CAGR of XX.XX % during the analysis period 2005-2020.
The United States market for Holograms in Biotechnology was estimated at US$ XX.XX million in 2012 and is
projected to reach about US$ XX.XX billion in 2020. Growing at a CAGR of XX.XX % during the period 2005-
2020, the US is further projected to retain the leading position. The US also represents the fastest growing
market during the same analysis period.
Europe represents the second largest market for Holograms in Biotechnology. European market was
estimated at US$ XX.XX million in 2012 and is projected to attain the value of US$ XX.XX billion by 2020.
Exhibit 5. Holograms - Global Value Market Estimations and Predictions (2005-2020) by Country for North
America, Europe, Asia-Pacific and Rest of World in US$ Million
Year/Region North America Europe Asia-Pacific Rest of World Total
2005 XX.XX XX.XX XX.XX XX.XX XX.XX
2006 XX.XX XX.XX XX.XX XX.XX XX.XX
2007 XX.XX XX.XX XX.XX XX.XX XX.XX
2008 XX.XX XX.XX XX.XX XX.XX XX.XX
2009 XX.XX XX.XX XX.XX XX.XX XX.XX
2010 XX.XX XX.XX XX.XX XX.XX XX.XX
2011 XX.XX XX.XX XX.XX XX.XX XX.XX
2012 XX.XX XX.XX XX.XX XX.XX XX.XX
2013 XX.XX XX.XX XX.XX XX.XX XX.XX
2014 XX.XX XX.XX XX.XX XX.XX XX.XX
2015 XX.XX XX.XX XX.XX XX.XX XX.XX
2016 XX.XX XX.XX XX.XX XX.XX XX.XX
2017 XX.XX XX.XX XX.XX XX.XX XX.XX
2018 XX.XX XX.XX XX.XX XX.XX XX.XX
2019 XX.XX XX.XX XX.XX XX.XX XX.XX
2020 XX.XX XX.XX XX.XX XX.XX XX.XX
CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX
© RIT Figures, 2013
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
US$ Million
North America Europe Asia-Pacific Rest of World
10. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 10
Exhibit 6. Holograms - Global Value Market Shares (2010, 2015 & 2020) by Country for North America,
Europe, Asia-Pacific and Rest of World
Year/Region North America Europe Asia-Pacific Rest of World Total
2010 XX.XX XX.XX XX.XX XX.XX XX.XX
2015 XX.XX XX.XX XX.XX XX.XX XX.XX
2020 XX.XX XX.XX XX.XX XX.XX XX.XX
CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX
© RIT Figures, 2013
11. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 11
IV. PRODUCT/TECHNOLOGY RESEARCH
Need for Security System
Industrial espionage created panic among the companies that promote biotechnology research and
development. Certain outcome of commendable research works by brilliant scientists helps to save millions
of lives, and eventually brings tremendous monetary benefits to the companies that promote the research
works. However, a small information leakage or a single process error may cause catastrophe. This has
driven the companies to search for proper security with best access control and monitoring system.
Especially, when a company shifts its employees from a multi-tenant building to its own premises, security
becomes a top priority.
Aspects of Security System
The security system involves the following aspects: 1. Conforming to the universal regulations and ensuring
the safety of employees. 2. Protection to people, and not to the products and intellectual property alone. 3.
Not corporate security, but company security; voice, physical, product and data security.
Many companies adopt different security standards for various purposes. There is a rising importance for
security of a company and hence the budgets for the same grew dramatically in the past few years.
Security is a concern also for the pharmaceutical companies and for efficient security, sophisticated
instruments play a vital role. Security is divided into various fragments such as, physical security, IT,
business continuity, crisis management, contingency planning etc., but a comprehensive security needs to
be in place for efficient and effective security management.
Standard organizations may take up wholesome responsibilities for developing a worldwide security policy,
strengthening infrastructure, offering IT security, preventing employee theft, creating security awareness
among employees by proper training strategies, risk management, and overall crisis management.
Cost of Security System
The expense for the security is dependent on the company’s objective. The overall cost for security has
increased over the years, and is expected to further increase on par with the growth of the pharmaceutical
companies. Therefore, a standard code of security is suggested to the pharmaceutical industries to save
expenditure in this regard.
Though several security organizations meet at occasions, common security strategies to be adopted are
never discussed, and problems associated with them are not solved. Therefore, a need for such facility is
felt to improve the overall efficiency of security systems.
12. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 12
Security System for Pharmaceutical Companies
Generally, the physical security is quite adequate in all pharmaceutical companies, though the standard and
level may vary.
Designing proprietary system, services, and technologies helps in the speedy production of new medicines.
Scientists opine that integration of novel fluorescence chemistry, molecular biology, nanotechnology,
informatics, and automation reduce the time taken for identifying compounds that are incorporated into
the novel drugs. This indicates that the security system should be tightened at different levels in order to
ensure the integrity of production processes of such novel drugs.
Problem of Counterfeit Medicines
Counterfeit medicine poses a big health hazard to the public and is presently a worldwide problem. The
counterfeit medicines simulate genuine medicines in the way they are packed either in the form of tablets
or capsules. They do not actually contain the proper effective ingredients, and, on the contrary, may
contain toxic components. Occasionally such counterfeit medicines contain active ingredients, though they
are high quality fakes. But, still, they are unreliable because their basic source is illegal and uncertain, and
deserve to be discouraged.
Virtually, medicines for any ailment have been forged. Fake medicines are produced illegally for cancer,
hypertension, and pain. Forged antibiotics, cholesterol reducing drugs, hormones, steroids, and
antihistamines are all available in the market. This situation is especially true for developing countries,
where counterfeited medicines are illegally marketed even for life threatening diseases such as AIDS,
malaria, and tuberculosis.
Regular therapeutic use of such substandard or harmful medicines may lead to drug resistance or even
death. Therefore, an urgent necessity is to take stringent security measures to curtail the manufacture of
counterfeit medicines.
About RI Technologies
RI Technologies is a premier source of market research on the Biotechnology & Healthcare sector. We
emphasize on factual insights and forecasts with maximum global coverage. RI Technologies is constantly
monitoring the biotechnology & Healthcare industry, tracking market trends, and forecasting industry
based on specialized analysis. The life sciences sector is an ever growing marketplace with emerging
technologies in areas of discovery, design and development.
Research – As Good as the Methodology is!
Gauging Competitive Intelligence
Identifying Key Growth Areas and Opportunities
Understanding Geographic Relevance to Product
Knowing Regional Market Sizes and Growth Opportunities and Restraints
13. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013
© RI Technologies - www.researchimpact.com Sample Page - 13
Keeping Tab on Emerging Technologies
Equity Analysis
Tapping New Markets
© COPYRIGHT
The copyright and publication rights to all RI Technologies' reports and other products are the property of
the company. Plagiarism of any kind accounts to violation of copyright laws. Any type of reproduction of
the material without express permission is not allowed. The buyer, under no circumstances, shall license,
resell or repackage, or sell data without prior permission of the company.
DISCLAIMER
RI Technologies sells content in good faith. The company is not liable to the buyer for any implications
arising out of the usage of data for any particular purpose. The company makes no representations or
warranties for the accuracy or completeness of the data. While extreme caution and effort is practiced for
data compilation and presentation, the company does not accept any responsibility for findings in the study
which are a cumulative effort of primary and secondary research resources. The studies do not endorse or
promote any product or company. RI Technologies, its affiliates, partners, distributors, and contractors are
not liable for inaccuracies or incompleteness of the reports. User discretion is recommended for the usage
of the data.