Your SlideShare is downloading. ×
Security technologies  applied in biotechnology Industry
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Security technologies applied in biotechnology Industry

111
views

Published on

This report on Security Technologies in Biotechnology gives a market insight into technology types for various biotechnology applications. Technologies include Holograms, Barcodes, RFID, Biometrics, …

This report on Security Technologies in Biotechnology gives a market insight into technology types for various biotechnology applications. Technologies include Holograms, Barcodes, RFID, Biometrics, Information Security, and Patents for Food, Biopharmaceuticals, and Biodefense applications. Market projections and estimates are illustrated by region and by type/applications. The report serves as a guide to Security Technology industry for biotechnology applications, covering more than 350 companies that are engaged in security technology/products and services. Major Research Institutes and Universities serving the security technology industry are also covered in the corporate directory section of this report. Information related to recent product releases, product developments, partnerships, collaborations, and mergers and acquisitions is covered in the report. Compilation of Worldwide Patents related to security technology products/services/technology for biotechnological applications is also provided. A global perspective is presented along with regional analysis covering the regions of North America, Europe, Asia-Pacific, and Rest of World with 133 exclusive graphically represented exhibits.

Published in: Health & Medicine

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
111
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 1 SECURITY TECHNOLOGIES IN BIOTECHNOLOGY – MARKET SIZE & OPPORTUNITIES Scope of the Study This report on Security Technologies in Biotechnology gives a market insight into technology types for various biotechnology applications. Technologies include Holograms, Barcodes, RFID, Biometrics, Information Security, and Patents for Food, Biopharmaceuticals, and Biodefense applications. Market projections and estimates are illustrated by region and by type/applications. The report serves as a guide to Security Technology industry for biotechnology applications, covering more than 350 companies that are engaged in security technology/products and services. Major Research Institutes and Universities serving the security technology industry are also covered in the corporate directory section of this report. Information related to recent product releases, product developments, partnerships, collaborations, and mergers and acquisitions is covered in the report. Compilation of Worldwide Patents related to security technology products/services/technology for biotechnological applications is also provided. A global perspective is presented along with regional analysis covering the regions of North America, Europe, Asia- Pacific, and Rest of World with 133 exclusive graphically represented exhibits. Security Technologies in Biotechnology report is an ideal research tool providing strategic business intelligence to the corporate sector. This report may help strategists, investors, laboratories, pharmaceutical companies, contract research organizations, biotechnology companies and drug approval authorities in--  Gauging Competitive Intelligence  Identifying Key Growth Areas and Opportunities  Understanding Geographic Relevance to Product  Knowing Regional Market Sizes and Growth Opportunities and Restraints  Keeping Tab on Emerging Technologies  Equity Analysis  Tapping New Markets Analytics and data presented in this report pertain to several parameters such as –  Global and Regional Market Sizes, Market Shares, Market Trends  Product (Global and Regional) Market Sizes, Market Shares, Market Trends  Technology Trends  Corporate Intelligence  Key Companies by Sales, Brands, Products  Consumer Behavioral Patterns
  • 2. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 2  Other Strategic Business Affecting Data Research Methodology RI Technologies publishes business intelligence reports by going through a cycle of diligent research and analysis activity. Research is done using both online and offline resources. The study outline of this report is sketched on the following lines – global market analysis, regional market analysis, product segmentation, global and regional market analysis by product segment, market trends, M&A, R&D, competitive landscape, technology trends, and other key drivers. Current data helps in analyzing the future of the industry and is also helpful for doing market evaluations, and estimating the market size for the future. This report is uniquely researched and the methodology includes:  Need and Scope of Study  Product Definitions  Segmental Analysis  Regional Analysis  Exclusive Data Analytics  Corporate Intelligence  Feedback Right from concept to final compilation of this report, both primary and secondary research methods are applied. We have provided exclusive feedback forms/pre-release questionnaires for this report to use the information for authentication of our own findings. Secondary research includes government publications, investment research reports, web based surveys, website information of both companies and markets, and other offline resources such as print publications and CDs. Our compilation of easy to navigate PDF reports are essential value addition resources for leading and growing companies.
  • 3. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 3 CHAPTER II - REPORT SYNOPSIS Security technologies include protection of secret messages and guarding of products and people against counterfeiting and impersonation. Steganography and cryptography are concerned with hiding information, while holography, barcoding and retinal scanning are techniques developed for combating counterfeiting and impersonation. Protection Protection of secret messages Steganography: The art and science of writing hidden or covered messages is referred as steganography. In steganography the visible apparent message is referred to as the cover text, which may be depicted as a picture, a list, an article etc. The hidden message may be in the form of invisible ink interpolated between the visible lines of the document. Prior to the development of cryptographic techniques, steganography was popular and widely used in ancient times, though the method had certain drawbacks. Herodotus, the Greek Historian of 5th century BC and regarded as Father of History, cited two examples of steganography in his treatise ‘The Histories of Herodotus’. Wax tablets are wooden planks coated with wax and were used for writing with stylus in those times. In fact, Demeratus sent a message about the anticipated attack on Greece by writing on a wooden plank and covering with wax to conceal the message. Histiaeus, a tyrant of Miletus, in 6th century BC, used steganography in a peculiar way. He tattooed a message on the head of a slave, and this message was concealed when the hair grew. The slave was sent to his son-in-law Aristagoras, who shaved the slave’s head to read the message that conveyed the instructions to revolt against Persians. Johannes Trithemius, who was an occult and abbot of Germany, wrote a book known as Steganographia in 1499. This book was earlier considered to be about black magic, but later on found to be about steganography and cryptography. Cryptography: Cryptography is the science of hiding information. Encryption has been in vogue right from ancient times, but was used earlier only by individuals and organizations that had the necessity. Encryption and decryption of secret messages played vital role in World War II, and many of the methods to produce them were kept highly confidential. The application of cryptography for public utility purposes emerged only after US Data Encryption Standard and public key cryptography were introduced. The one-time pad is an encryption algorithm. In this method of encryption, the plain text is combined with a random key or pad of equal length and is used only once. Only the persons who possess the key would be able to differentiate the cipher [hidden] texts from random [normal] texts. Nowadays, in the majority of cryptosystems, private symmetric session keys are made perfectly random. [In symmetric session, same key is used for encryption and decryption]. Therefore, even in weak ones [shorter than 128 bits], the messages are safely concealed.
  • 4. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 4 Segmentation Exhibit 1. Segmentation of Security Technologies in Biotechnology Market by Technology and Application Technology Application Hologram Food Barcodes Biopharmaceuticals RFID Biodefense Biometrics Other Patents Other © RIT, 2013
  • 5. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 5 Global Market Analysis Global Security Technologies in Biotechnology market is projected to reach about US$ XX.XX billion by 2020 from an estimated US$ XX.XX billion in 2012, growing at a very high compounded annual growth rate (CAGR) of XX.XX % during the analysis period 2005-2020. Exhibit 2. Security Technologies in Biotechnology – Global Value Market Estimations and Predictions (2005-2020) in US$ Billion Year Value 2005 XX.XX 2006 XX.XX 2007 XX.XX 2008 XX.XX 2009 XX.XX 2010 XX.XX 2011 XX.XX 2012 XX.XX 2013 XX.XX 2014 XX.XX 2015 XX.XX 2016 XX.XX 2017 XX.XX 2018 XX.XX 2019 XX.XX 2020 XX.XX CAGR % XX.XX © RIT Figures, 2013 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 US$ Billion
  • 6. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 6 III. MARKET DYNAMICS Global Market for Security Technologies in Biotechnology Global market for Security Technologies in Biotechnology is projected to reach US$XX.XX billion by 2020 from an estimated US$ XX.XX billion in 2012, registering a CAGR of XX.XX % during the analysis period 2005- 2020. The United States market for Security Technologies in Biotechnology was estimated at US$ XX.XX million in 2012 and is projected to reach about US$ XX.XX billion in 2020. Growing at a CAGR of XX.XX % during the period 2005-2020, the US is further projected to retain the leading position. The US also represents the fastest growing market during the same analysis period. Europe represents the second largest market for Security Technologies in Biotechnology. European market was estimated at US$ XX.XX million in 2012 and is projected to attain the value of US$ XX.XX billion by 2020.
  • 7. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 7 Exhibit 3. Security Technologies in Biotechnology - Global Value Market Estimations and Predictions (2005-2020) by Geographic Region for North America, Europe, Asia-Pacific and Rest of World in US$ Million Year/Region North America Europe Asia-Pacific Rest of World Total 2005 XX.XX XX.XX XX.XX XX.XX XX.XX 2006 XX.XX XX.XX XX.XX XX.XX XX.XX 2007 XX.XX XX.XX XX.XX XX.XX XX.XX 2008 XX.XX XX.XX XX.XX XX.XX XX.XX 2009 XX.XX XX.XX XX.XX XX.XX XX.XX 2010 XX.XX XX.XX XX.XX XX.XX XX.XX 2011 XX.XX XX.XX XX.XX XX.XX XX.XX 2012 XX.XX XX.XX XX.XX XX.XX XX.XX 2013 XX.XX XX.XX XX.XX XX.XX XX.XX 2014 XX.XX XX.XX XX.XX XX.XX XX.XX 2015 XX.XX XX.XX XX.XX XX.XX XX.XX 2016 XX.XX XX.XX XX.XX XX.XX XX.XX 2017 XX.XX XX.XX XX.XX XX.XX XX.XX 2018 XX.XX XX.XX XX.XX XX.XX XX.XX 2019 XX.XX XX.XX XX.XX XX.XX XX.XX 2020 XX.XX XX.XX XX.XX XX.XX XX.XX CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX © RIT Figures, 2013 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 US$ Million North America Europe Asia-Pacific Rest of World
  • 8. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 8 Exhibit 4. Security Technologies in Biotechnology - Global Value Market Shares (2010, 2015 & 2020) by Geographic Region for North America, Europe, Asia-Pacific and Rest of World Year/Region North America Europe Asia-Pacific Rest of World Total 2010 XX.XX XX.XX XX.XX XX.XX XX.XX 2015 XX.XX XX.XX XX.XX XX.XX XX.XX 2020 XX.XX XX.XX XX.XX XX.XX XX.XX CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX © RIT Figures, 2013
  • 9. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 9 Global Market for Holograms in Biotechnology Global market for Holograms in Biotechnology is projected to reach US$XX.XX billion by 2020 from an estimated US$ XX.XX billion in 2012, registering a CAGR of XX.XX % during the analysis period 2005-2020. The United States market for Holograms in Biotechnology was estimated at US$ XX.XX million in 2012 and is projected to reach about US$ XX.XX billion in 2020. Growing at a CAGR of XX.XX % during the period 2005- 2020, the US is further projected to retain the leading position. The US also represents the fastest growing market during the same analysis period. Europe represents the second largest market for Holograms in Biotechnology. European market was estimated at US$ XX.XX million in 2012 and is projected to attain the value of US$ XX.XX billion by 2020. Exhibit 5. Holograms - Global Value Market Estimations and Predictions (2005-2020) by Country for North America, Europe, Asia-Pacific and Rest of World in US$ Million Year/Region North America Europe Asia-Pacific Rest of World Total 2005 XX.XX XX.XX XX.XX XX.XX XX.XX 2006 XX.XX XX.XX XX.XX XX.XX XX.XX 2007 XX.XX XX.XX XX.XX XX.XX XX.XX 2008 XX.XX XX.XX XX.XX XX.XX XX.XX 2009 XX.XX XX.XX XX.XX XX.XX XX.XX 2010 XX.XX XX.XX XX.XX XX.XX XX.XX 2011 XX.XX XX.XX XX.XX XX.XX XX.XX 2012 XX.XX XX.XX XX.XX XX.XX XX.XX 2013 XX.XX XX.XX XX.XX XX.XX XX.XX 2014 XX.XX XX.XX XX.XX XX.XX XX.XX 2015 XX.XX XX.XX XX.XX XX.XX XX.XX 2016 XX.XX XX.XX XX.XX XX.XX XX.XX 2017 XX.XX XX.XX XX.XX XX.XX XX.XX 2018 XX.XX XX.XX XX.XX XX.XX XX.XX 2019 XX.XX XX.XX XX.XX XX.XX XX.XX 2020 XX.XX XX.XX XX.XX XX.XX XX.XX CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX © RIT Figures, 2013 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 US$ Million North America Europe Asia-Pacific Rest of World
  • 10. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 10 Exhibit 6. Holograms - Global Value Market Shares (2010, 2015 & 2020) by Country for North America, Europe, Asia-Pacific and Rest of World Year/Region North America Europe Asia-Pacific Rest of World Total 2010 XX.XX XX.XX XX.XX XX.XX XX.XX 2015 XX.XX XX.XX XX.XX XX.XX XX.XX 2020 XX.XX XX.XX XX.XX XX.XX XX.XX CAGR% XX.XX XX.XX XX.XX XX.XX XX.XX © RIT Figures, 2013
  • 11. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 11 IV. PRODUCT/TECHNOLOGY RESEARCH Need for Security System Industrial espionage created panic among the companies that promote biotechnology research and development. Certain outcome of commendable research works by brilliant scientists helps to save millions of lives, and eventually brings tremendous monetary benefits to the companies that promote the research works. However, a small information leakage or a single process error may cause catastrophe. This has driven the companies to search for proper security with best access control and monitoring system. Especially, when a company shifts its employees from a multi-tenant building to its own premises, security becomes a top priority. Aspects of Security System The security system involves the following aspects: 1. Conforming to the universal regulations and ensuring the safety of employees. 2. Protection to people, and not to the products and intellectual property alone. 3. Not corporate security, but company security; voice, physical, product and data security. Many companies adopt different security standards for various purposes. There is a rising importance for security of a company and hence the budgets for the same grew dramatically in the past few years. Security is a concern also for the pharmaceutical companies and for efficient security, sophisticated instruments play a vital role. Security is divided into various fragments such as, physical security, IT, business continuity, crisis management, contingency planning etc., but a comprehensive security needs to be in place for efficient and effective security management. Standard organizations may take up wholesome responsibilities for developing a worldwide security policy, strengthening infrastructure, offering IT security, preventing employee theft, creating security awareness among employees by proper training strategies, risk management, and overall crisis management. Cost of Security System The expense for the security is dependent on the company’s objective. The overall cost for security has increased over the years, and is expected to further increase on par with the growth of the pharmaceutical companies. Therefore, a standard code of security is suggested to the pharmaceutical industries to save expenditure in this regard. Though several security organizations meet at occasions, common security strategies to be adopted are never discussed, and problems associated with them are not solved. Therefore, a need for such facility is felt to improve the overall efficiency of security systems.
  • 12. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 12 Security System for Pharmaceutical Companies Generally, the physical security is quite adequate in all pharmaceutical companies, though the standard and level may vary. Designing proprietary system, services, and technologies helps in the speedy production of new medicines. Scientists opine that integration of novel fluorescence chemistry, molecular biology, nanotechnology, informatics, and automation reduce the time taken for identifying compounds that are incorporated into the novel drugs. This indicates that the security system should be tightened at different levels in order to ensure the integrity of production processes of such novel drugs. Problem of Counterfeit Medicines Counterfeit medicine poses a big health hazard to the public and is presently a worldwide problem. The counterfeit medicines simulate genuine medicines in the way they are packed either in the form of tablets or capsules. They do not actually contain the proper effective ingredients, and, on the contrary, may contain toxic components. Occasionally such counterfeit medicines contain active ingredients, though they are high quality fakes. But, still, they are unreliable because their basic source is illegal and uncertain, and deserve to be discouraged. Virtually, medicines for any ailment have been forged. Fake medicines are produced illegally for cancer, hypertension, and pain. Forged antibiotics, cholesterol reducing drugs, hormones, steroids, and antihistamines are all available in the market. This situation is especially true for developing countries, where counterfeited medicines are illegally marketed even for life threatening diseases such as AIDS, malaria, and tuberculosis. Regular therapeutic use of such substandard or harmful medicines may lead to drug resistance or even death. Therefore, an urgent necessity is to take stringent security measures to curtail the manufacture of counterfeit medicines. About RI Technologies RI Technologies is a premier source of market research on the Biotechnology & Healthcare sector. We emphasize on factual insights and forecasts with maximum global coverage. RI Technologies is constantly monitoring the biotechnology & Healthcare industry, tracking market trends, and forecasting industry based on specialized analysis. The life sciences sector is an ever growing marketplace with emerging technologies in areas of discovery, design and development. Research – As Good as the Methodology is!  Gauging Competitive Intelligence  Identifying Key Growth Areas and Opportunities  Understanding Geographic Relevance to Product  Knowing Regional Market Sizes and Growth Opportunities and Restraints
  • 13. RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 13  Keeping Tab on Emerging Technologies  Equity Analysis  Tapping New Markets © COPYRIGHT The copyright and publication rights to all RI Technologies' reports and other products are the property of the company. Plagiarism of any kind accounts to violation of copyright laws. Any type of reproduction of the material without express permission is not allowed. The buyer, under no circumstances, shall license, resell or repackage, or sell data without prior permission of the company. DISCLAIMER RI Technologies sells content in good faith. The company is not liable to the buyer for any implications arising out of the usage of data for any particular purpose. The company makes no representations or warranties for the accuracy or completeness of the data. While extreme caution and effort is practiced for data compilation and presentation, the company does not accept any responsibility for findings in the study which are a cumulative effort of primary and secondary research resources. The studies do not endorse or promote any product or company. RI Technologies, its affiliates, partners, distributors, and contractors are not liable for inaccuracies or incompleteness of the reports. User discretion is recommended for the usage of the data.