Market Research Logo

Cybersecurity in Healthcare, 2018-2030

Cybersecurity in Healthcare, 2018-2030

The digital revolution has transformed the way businesses operate across the globe. However, digitally stored information is prone to hacking and manipulation by cyber criminals. The concern is validated by the fact that more than 5.1 million records are compromised due to data breaches every day. In 2016, close to 1,800 incidents of data breaches were reported across all the industries; in total, almost 1.4 billion data records were lost or stolen. The year 2017 also witnessed several cyberattacks; notable examples include WannaCry and NotPetya ransomware attacks, Equifax data breach, MongoDB databases leak, Elasticsearch server hack, Cloudbleed security bug, Zomato hack, HBO hack / Game of Thrones leaks, Uber data breach, and Ethereum hack.

The healthcare industry has been amongst the prime targets for hackers over the last several years. The Ponemon Institute’s Fifth Annual Study reported that cyberattacks in healthcare have increased by a factor of 125% since 2010. In the first half of 2017, the healthcare industry had been compromised a number of times, having experienced a total of 228 data breaches, representing 25% of the total number of breaches worldwide. Across these instances, around 31 million records were compromised, stolen or lost, representing an increase of 423% as compared to the first six months of 2016. In addition, according to a report published in May 2016, it is estimated that, with each electronic health record (EHR) costing around USD 355 in the black market, healthcare data breaches have resulted in losses worth USD 6.2 billion per year to the US healthcare industry. Examples of organizations that have recently been the victims of cyberattacks / security incidents include (in alphabetical order) Abbott / St. Jude Medical, Anthem BlueCross BlueShield, Bayer, Bupa Global Health Insurance, Bronx Lebanon Hospital Center, HealthNow Networks, Johnson & Johnson, Med Center Health, Merck, National Health System (NHS), Pacific Alliance Medical Center, Patient Home Monitoring, and Smiths Medical.

In order to overcome these challenges, various cybersecurity solution providers have started to specifically focus on healthcare. Along with the presence of big companies, the entry of several start-ups is driving the innovation in this domain. Contrary to the expectation, capital spending on cybersecurity in the healthcare industry is far less compared to some other industries. In addition, the scarcity of skilled cybersecurity professionals capable of catering to the complex regulatory demands in the healthcare industry is making it even more difficult for the successful implementation of cybersecurity policies across this field.

SCOPE OF THE REPORT
The ‘Cybersecurity in Healthcare Market, 2018-2030’ report features an extensive study of the current landscape and future outlook of the growing market of cybersecurity within the healthcare industry. The focus of this study is on the cybersecurity products / solutions and services that are currently available for protecting internet connected devices against cybercriminals, and the likely evolution of novel technologies / platforms in the mid to long term. Backed by funding from several venture capital firms and strategic investors, this evolving market has its hopes pinned on the efforts of multiple start-ups. Amongst other elements, the report features:

A detailed assessment of the current market landscape of cybersecurity within the healthcare domain, providing information on cybersecurity core products / solutions, threat intelligence solutions, information on different threat types, security elements and modes of deployment.

Detailed profiles of some of the emerging players in the industry, highlighting the current focus of the companies, capital raised, and details on their specific cybersecurity products / solutions and services. The profiles also have a section on recent developments, highlighting the achievements, partnerships / collaborations, and the likely strategies that may be adopted by these players to fuel growth in the foreseen future.

A comprehensive benchmark analysis, highlighting key focus areas of mid to large sized companies, thereby, providing a means to compare the existing capabilities within respective peer groups and help industry stakeholders identify ways to achieve a competitive edge over contemporary players. In addition, we have provided detailed profiles of some of the established players within each peer group.

An analysis of investments made at various stages of product development; these include seed financing, venture capital financing, debt financing and grants / awards received by the companies that are focused in this area.

An elaborate valuation analysis of companies that are involved in providing cybersecurity products / solutions / services to the healthcare industry; for the purpose of this analysis, we focused on companies that have been established over the last 5-6 years.

An overview of how artificial intelligence (AI), machine learning and deep learning techniques can augment cybersecurity, once integrated. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.

A case study on cybersecurity use cases within the healthcare industry, highlighting some of the notable healthcare data breaches and security incidents that have happened in 2017. In addition, we have briefly outlined some of the recently reported medical device hacks / security vulnerabilities that led to the recalling of these devices.

One of the key objectives of the report was to understand the primary growth drivers and estimate the future size of the market. Based on various parameters, such as number of healthcare data breaches, number of records compromised, expected pricing of the stolen medical records and spending trends on cybersecurity in the healthcare industry, we have provided an informed estimate on the likely evolution of the market in the long term, for the period 2018-2030. To account for the uncertainties associated with the number of data breaches, and to add robustness to our model, we have provided three forecast scenarios, portraying the conservative, base and optimistic tracks of the market’s evolution.

The opinions and insights presented in the report were also influenced by discussions held with senior stakeholders in the industry. These include Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence). All actual figures have been sourced and analyzed from publicly available information forums and primary research discussions. Financial figures mentioned in this report are in USD, unless otherwise specified.

EXAMPLE HIGHLIGHTS
1. Close to 400 stakeholders currently offer a variety of products / solutions / services to healthcare organizations. Of these, over 80% companies provide core products / solutions (such as identity access management and intrusion prevention) to enhance information security. In addition, about 56% of the companies provide threat intelligence solutions to organizations in the healthcare organizations including hospitals, pharmaceutical / biotechnology companies and medical device manufacturers.

2. At present, the market is highly fragmented and is a mix of large enterprises, mid-size companies and start-ups. Majority of the large-sized companies (total 72) have three types of offerings (core products / solutions, threat intelligence solutions and services). In fact, for some of the companies in this category, cybersecurity is one of the many focus areas. Examples include (in alphabetical order, no selection criteria) AECOM, Cisco, Fortinet, IBM, Juniper Networks, Level 3, McAfee, Microsoft, NETSCOUT, Secure Works, SonicWall, Symantec and VMware.

3. Similarly, there are close to 100 mid-sized companies that are providing cybersecurity solutions / services to players in the healthcare domain. Examples include (in alphabetical order, no selection criteria) Absolute Software, Arbor Networks, Auth0, BeyondTrust, Black Duck Software, CipherCloud, Cybereason, Infoblox, Malwarebytes, Netskope, ThreatMetrix, LogRhythm, SentinelOne, Skyhigh Networks and Zerto.

4. In addition, several start-ups (close to 200) are offering innovative solutions / products / services. Venture capitalists have strongly supported innovation in this domain; around USD 2.5 billion has been invested in this industry since 2012 across around 180 instances of funding. Some of the companies that have raised capital multiple times since 2012 include (in alphabetical order, no selection criteria) Auth0, Cybereason, Cylance, Darktrac, Fortscale, ProtectWise, Rubicon Labs, SentinelOne, Skyhigh Networks, SnoopWall, Sqrrl and Synack.

5. Our proprietary valuation analysis reveals that, of the 64 start-ups that were evaluated, 20 companies are estimated to have a valuation between USD 100 million and USD 1,000 million. Examples of such companies include (in alphabetical order, no selection criteria) Anomali, Area 1 Security, Bitglass, Exabeam, Silent Circle, Sqrrl, Synack, Tempered Networks, Threat Stack, UpGuard and ZeroFOX. Specifically, there are two companies that are estimated to have a billion-dollar valuation.

6. Given the increasing number of cyberattacks in the healthcare industry, and the fact that the volume of digital data / records will steadily increase in the future, we estimate the overall cybersecurity market specific to the healthcare industry to grow at an annualized rate of about 14%. Since a significant proportion of electronic / digital data is located in the US, we believe that this region currently accounts for over 60% of the market’s share; this is followed by Europe with over 20% share. Over time, due to the adoption of digital solutions in highly populated countries, such as India and China, the market in Asia-Pacific is expected grow at a relatively higher rate.

7. Intrusion (hacking / ransomware) attacks, accounting for over 50% of the market, are the primary concern in the healthcare industry. In fact, the share of these breaches is estimated to grow to about 70% by 2030.

8. In terms of type of security, products / solutions for application security and network security are the most popular; these occupy about 50% of the current market. Due to the increasing prevalence of cloud based solutions, the market for cloud security is likely to register a relatively higher growth and occupy around 25% of the overall share by 2030.

RESEARCH METHODOLOGY
The data presented in this report has been gathered via secondary and primary research. For all our projects, we conduct interviews with experts in the area (academia, industry, medical practice and other associations) to solicit their opinions on emerging trends in the market. This is primarily useful for us to draw out our own opinion on how the market will evolve across different regions and technology segments. Where possible, the available data has been checked for accuracy from multiple sources of information.

The secondary sources of information include
Annual reports
Investor presentations
SEC filings
Industry databases
News releases from company websites
Government policy documents
Industry analysts’ views

While the focus has been on forecasting the market till 2030, the report also provides our independent view on various non-commercial trends emerging in the industry. This opinion is solely based on our knowledge, research and understanding of the relevant market gathered from various secondary and primary sources of information.

CHAPTER OUTLINES
Chapter 2 is an executive summary of the insights captured in our research. The summary offers a high-level view on the likely evolution of the cybersecurity market within the healthcare industry in the long term.

Chapter 3 is an introductory chapter that presents an overview of the digital revolution, emergence of IoT, cloud computing, and the digitization of business communication across a number of industries, with information on the associated risks and vulnerabilities. It outlines some of the prevalent cyber threats and security vulnerabilities, thereby, highlighting the importance of cybersecurity. It also provides an overview of the key cybersecurity solutions that are being used in the industry. In addition, the chapter provides information on some of the notable cyberattacks and data breaches that have taken place across different industries in the past few years.

Chapter 4 provides information on the digitization of the healthcare industry, and outlines key reasons why organizations in this domain have been a prime target for cyber criminals in the past few years. Further, the chapter stresses on the importance of cybersecurity in the healthcare industry, giving an overview of the HIPAA framework, and highlights several security vulnerabilities that exist within the industry. It also provides details on some of the largest healthcare data breaches in history. In addition, it presents a summary of the best practices that must be considered while implementing security measures within the healthcare industry.

Chapter 5 includes information on around 400 key stakeholders that are exploring the potential applications of their cybersecurity products / solutions and services within the healthcare industry. We have classified the database based on the type of offering, including cybersecurity core products / solutions, threat intelligence solutions and cybersecurity services. In addition, the chapter provides information on companies’ geographical location, size of employee base, type of threats that a company is capable of dealing with, type of security elements, and mode of deployment. Furthermore, we have identified various prevalent and upcoming trends in the industry that are likely to govern the future of cybersecurity within the healthcare industry.

Chapter 6 features detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity core products / solutions for the healthcare industry. Each profile includes an overview of the company, financial information, details on their cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 7 includes detailed profiles of some of the emerging stakeholders that are primarily offering threat intelligence solutions for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 8 provides detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity services (managed / professional) for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 9 presents a benchmark analysis, taking into consideration the established players that are engaged in this domain. It highlights the capabilities of these companies in terms of their expertise across cybersecurity products / solutions and services for the healthcare industry. The analysis allows companies to compare their existing capabilities within and beyond their peer groups, and identify opportunities to become more competitive in the industry. In addition, we have provided detailed profiles of some of the established stakeholders within different peer groups. Each of these profiles feature an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 10 provides information on the funding instances and investments that have been made in this industry. The chapter includes details on various investments (seed financing, venture funding, debt financing and grants) received by companies between 2012 and late 2017, highlighting the growing interest of the venture capital community and other strategic investors.

Chapter 11 features a comprehensive valuation analysis of the companies that are offering cybersecurity products / solutions and services for the healthcare industry. The chapter provides insights based on a multi-variable dependent valuation model. The model is based on the year of establishment of the companies, employed workforce, funding received and depth of product / service portfolio.

Chapter 12 presents a comprehensive market forecast, highlighting the future potential of the market till 2030. The forecast, which provides estimates on the market opportunity across the three major types of offering (cybersecurity core products / solutions, threat intelligence solutions and cybersecurity services), is backed by robust secondary research, as wells as inputs from senior stakeholders in the industry. The analysis also highlights the relative growth opportunity across different geographical regions (North America, Europe, Asia-Pacific and Rest of the World), type of threats (insider theft, intrusion, 3rd party / sub-contractor negligence, employee negligence, physical theft and others), type of cybersecurity services (managed and professional), type of security elements (application security, cloud security, endpoint security and network security), and mode of deployment (cloud and on-premise). To account for the uncertainties associated with the adoption of these technologies, we have provided optimistic and conservative forecast scenarios, in addition to the base forecast scenario.

Chapter 13 presents an overview of AI, machine learning and deep learning techniques, and the likely benefits of integration of these technologies into cybersecurity tools / systems. The chapter highlights how AI / machine learning techniques can bolster cybersecurity capabilities for combating the ever-increasing threat landscape. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.

Chapter 14 presents a case study on cybersecurity use cases within the healthcare industry. The chapter highlights some of the notable healthcare data breaches and security incidents that took place in 2017. In addition, we have briefly discussed some of the recently reported medical device hacks / security vulnerabilities, in order to highlight the potential damages these incidents can cause. We have also summarized some of the initiatives / measures adopted by healthcare / pharmaceutical organizations to tackle cyberattacks.

Chapter 15 summarizes the overall report. In this chapter, we have provided a list of key takeaways from the report, and expressed our independent opinion related to the research and analysis described in the previous chapters.

Chapter 16 is a collection of executive insights from various key stakeholders in this market. The chapter provides brief overview of the companies and interview transcripts of the discussions that were held with stakeholders associated with these companies. The chapter provides details of interviews held with Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence).

Chapter 17 is an appendix, which provides tabulated data and numbers for all the figures provided in the report.

Chapter 18 is an appendix, which provides the list of companies and organizations mentioned in the report.

LIST OF COMPANIES / LIST OF COMPANIES AND ORGANIZATIONS
The following companies / institutes / government bodies and organizations have been mentioned in this report.
1. .406 Ventures
2. 21st Century Oncology
3. 3eTI
4. 3i International
5. 4SEC Group
6. 500 Startups
7. 7Safe
8. 83North (formerly Greylock IL)
9. A10 Networks
10. Abbott
11. ABCD Pediatrics
12. Absolute
13. Acalvio Technologies
14. Accel Partners
15. Accenture
16. Access Venture Partners
17. Accomplice
18. Accuvant
19. ActiveCanopy
20. ACTIVECYBER
21. Adams Street Partners
22. Adara Ventures
23. Adobe
24. ADT Cybersecurity (formerly DATASHIELD)
25. AECOM
26. Aesthetic Dentistry, New York, US
27. Agari
28. AGC Networks
29. Agio
30. AirWatch
31. Airway Oxygen
32. Akamai
33. AlertEnterprise
34. AlienVault
35. AllClear ID
36. Allegis Capital
37. Alphaserve Technologies
38. Alpine Security
39. Alsop Louie Partners
40. Alvarado Hospital Medical Center
41. Amazon
42. AME Cloud Ventures
43. America One Technologies
44. AmericaTech
45. Amerigroup
46. Amplify Partners
47. Anomali
48. Anthem
49. AOL
50. AppDynamics
51. Appthority
52. Arbor Networks
53. ArcSight
54. Area 1 Security
55. Argus Cyber Security
56. Aristos Ventures
57. Arkansas Oral & Facial Surgery Center
58. Armolon
59. Armor
60. Arrow Electronics
61. Arsenal Venture Partners
62. Arthur Ventures
63. Aruba (a Hewlett Packard Enterprise company)
64. Arxan
65. Ascent Venture Partners
66. Ashley Madison
67. Aspect Security
68. Aspect Ventures
69. AT&T
70. Athens Orthopedic Clinic
71. Atlas Venture
72. Atos
73. Atredis Partners
74. Attivo Networks
75. August Capital
76. Augusta University Medical Center
77. Aurionpro
78. Auth0
79. Auxilio
80. Avast Software
81. Avata Intelligence (formerly Armorway)
82. AV-Comparatives
83. Avecto
84. AVG
85. Axiad IDS
86. AXON Connected
87. AxonAI (formerly AXON Ghost Sentinel)
88. Axway
89. BAE Systems
90. Bain Capital Ventures
91. Baltimore Angels
92. Banner Health
93. Barracuda Networks
94. Barrier1 Systems
95. Baseline Ventures
96. Battelle
97. Battery Ventures
98. Bayer
99. Bayshore Networks
100. Beckton Dickinson
101. Benhamou Global Ventures (BGV)
102. Bessemer Venture Partners
103. BeyondTrust
104. BIO-key International
105. Bitfinex
106. Bitglass
107. BitSight
108. Black Duck Software
109. Black Sheep Capital
110. BlackBerry
111. BlackRidge Technology
112. Blackstone Tactical Opportunities Fund
113. BlackstoneOne
114. Bloomberg Beta
115. Blu Venture Investors
116. Blue Coat Systems
117. BlueCat
118. BlueChilli
119. Blueliv
120. Blumberg Capital
121. BlumShapiro
122. BluVector
123. Bomgar
124. Bon Secours Health System
125. Booz Allen Hamilton
126. BostInno
127. Box
128. Bradford Networks
129. Breach Intelligence
130. BRM Capital
131. Broadcom
132. Bromium
133. Bronx-Lebanon Hospital Center
134. BT Group
135. Buckhead Investment Partners
136. Built in LA
137. Bupa Global
138. ByteGrid
139. CA Technologies
140. Cain Capital
141. California Correctional Health Care Services
142. Calyptix Security
143. Capital One Growth Ventures
144. CapitalG (formerly Google Capital)
145. Carbon Black
146. CareMore
147. Catbird
148. Category 5 Consulting
149. CDW
150. CensorNet
151. Center of Innovative Technology
152. Central Ohio Urology Group
153. Centrify
154. Centripetal Networks
155. CenturyLink
156. Charles River Ventures
157. Check Point Software Technologies
158. Chertoff Group
159. Chino Valley Medical Center
160. Cicada Innovations
161. Cimcor
162. CIPHER
163. CipherCloud
164. CipherTrust
165. Cisco
166. Citi Ventures
167. CITIC Telecom CPC
168. Citrix
169. Clear Venture Partners
170. Clearwater Compliance
171. Cleveland Medical Associates
172. Cloud Harmonics
173. Cloudera
174. CloudLink
175. CloudLock
176. CME Ventures
177. CNBC
178. Coalfire
179. Coaxis International
180. Code Dx
181. Cognosante
182. Commonwealth Health Corporation
183. Community Health Plan of Washington
184. Community Mercy Health Partners
185. Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology (MIT CSAIL)
186. Conduent
187. Confer Technologies
188. Conjur
189. ConnectWise
190. Content Security
191. Context Information Security
192. Contextual Security
193. Continental
194. Core Capital Partners
195. Core Security
196. Corero Network Security
197. CORL Technologies
198. Cornell University
199. Correlation Ventures
200. Cowboy Ventures
201. Cray
202. Critical Informatics
203. CRN
204. Croghan Investments
205. Crosscheck Networks
206. Crosslink Capital
207. CrowdStrike
208. Crowe Horwath
209. Crypta Labs
210. Cryptzone
211. CSC Digital Brand Services
212. CSRA
213. Cyber Rescue Alliance
214. Cyber Toa
215. CyberArk
216. Cybereason
217. Cyberinc
218. Cyberlytic
219. Cybersafe Solutions
220. CyberSurance
221. CyberWire
222. CyberX
223. Cybraics
224. Cybric
225. Cygilant (formerly EiQ Networks)
226. Cylance
227. Cylera
228. CynergisTek
229. Cytellix
230. Cyveillance
231. DAG Ventures
232. Dailymotion
233. Darktrace
234. DataArt
235. Dataguise
236. DataMotion
237. Datto
238. DB Networks
239. DearBytes
240. Dell
241. Deloitte
242. Delta ID
243. Delta Risk
244. Delta-v Capital
245. Demisto
246. Department of Health and Human Services (HHS)
247. Department of Homeland Security (DHS)
248. Deutsche Telekom Capital Partners
249. Device Authority
250. DeviceLock
251. DFJ
252. DFLabs
253. Diamond Institute for Infertility and Menopause
254. DigiCert
255. Digital Defense
256. Digital Guardian
257. DLT Solutions
258. DMC Investments
259. DomainTools
260. Dragos
261. Draper Nexus
262. Dropbox
263. Druva
264. Duo Security
265. DXC Technology
266. East Seattle Partners
267. ebay
268. EDB Investments
269. EdgeWave
270. Edgile
271. Eight Roads
272. Eileses Capital
273. Elliott Management
274. Emerald Compliance Solutions (Emerald Cybersecurity)
275. Empire Blue Cross Blue Shield
276. ENCODE
277. Endgame
278. Engineering Capital
279. enSilo
280. Envision Ventures
281. EPIC Ventures
282. Epsilon
283. eSentire
284. ESET
285. e-Share (formerly nCrypted Cloud)
286. ESXi
287. Evergreen Coast Capital
288. Evolution Equity Partners
289. Exabeam
290. Excellus Health Plan
291. Exclusive Ventures
292. EXELERYS
293. Exostar
294. ExtraHop
295. Extreme Networks
296. EY
297. Facebook
298. Fairhaven Capital
299. Family Tree Health Clinic
300. Farsight Security
301. Federal Bureau of Investigation (FBI)Fenwick & West
302. ff Venture Capital
303. Fidelis Cybersecurity
304. Fine Tec
305. Fingerprint Cards
306. FireBlade
307. FireEye
308. Fireglass
309. FireMon
310. First Round Capital
311. FishNet Security
312. Fishtech Labs
313. Flashpoint
314. Flint Capital
315. Forbes
316. Forcepoint
317. ForeScout
318. Foresite
319. ForgeRock
320. Fortinet
321. Fortscale
322. Forum Systems
323. Foundation Capital
324. Founders Circle
325. Foundstone
326. Fox Technologies
327. F-Prime Capital Partners
328. FriendFinder Networks
329. FSE Group
330. Future Com
331. Future Fund
332. G20 Ventures
333. Gemalto
334. Genacast Ventures
335. General Catalyst
336. General Dynamics Information Technology
337. Geodesic Capital
338. GeoLang
339. Georgian Partners
340. GGV Capital
341. Giacom
342. Gigamon
343. GigaTrust
344. Github
345. Glasswall Solutions
346. GlenRock
347. Glilot Capital
348. Globalscape
349. GlobalSign
350. Goldman Sachs
351. Google
352. Granite Hill Capital Partners
353. Great Place to Work
354. GreatHorn
355. Green Visor Capital
356. Greenfield Capital Partners
357. GreyCastle Security
358. Greycroft Partners
359. Greylock Partners
360. Grotech Ventures
361. GuardiCore
362. Guidance Software
363. Gurucul
364. GV (formerly Google Ventures)
365. HackerOne
366. Harrisburg Gastroenterology
367. harvest.ai
368. Hasso Plattner Ventures
369. HCI Group
370. Health Information Trust (HITRUST) Alliance
371. HealthNow Networks
372. Heartland Payment Systems
373. Help AG
374. Heritage Valley Health System
375. Herjavec Group
376. Hewlett Packard Enterprise (HPE)
377. Hexadite
378. HID Global
379. High Country Venture
380. Highland Capital Partners
381. Hollywood Presbyterian Medical Center
382. HonorTech
383. Hoxton Ventures
384. HumanFirewalls
385. Hypori
386. IA Ventures
387. IBM
388. iboss
389. Icon Ventures
390. ICONIQ Capital
391. iCyber-Security
392. ID Agent
393. ID Experts
394. IDG Ventures
395. Ignition Partners
396. IID
397. Illusive Networks
398. ImageWare Systems
399. Immersive
400. Imperva
401. Imprivata
402. Index Ventures
403. Indiana Cancer Agency
404. Industrial Control System-Information Sharing and Analysis Center (ICS-ISAC)
405. Infoblox
406. InfoGuard
407. Informatica
408. Information Management Resources (IMRI)
409. Information Technology Partners
410. Ingram Micro
411. Innovation Endeavors
412. In-Q-Tel (IQT)
413. Insight Venture Partners
414. InstantScale Ventures
415. Institutional Venture Partners (IVP)
416. Insurance Australia Group (IAG)
417. Integrated Technical Solutions (ITS)
418. Intel
419. Internet2
420. Intersec Worldwide
421. Interset
422. intiGrow
423. Intralinks
424. Intrust IT
425. IntSights
426. Invincea
427. Invoke Capital
428. Invotas
429. Ionic Security
430. iSIGHT Partners
431. i-Sprint Innovations
432. iT-CUBE SYSTEMS
433. ITEGRITI
434. Ivanti
435. iWelcome
436. Ixia
437. Jackson Square Ventures
438. Jackson Square Ventures (formerly Sigma West)
439. JMP Securities
440. Johnson & Johnson
441. JohnsTek
442. JPMorgan Chase
443. Jump Capital
444. Juniper Networks
445. K2 Intelligence
446. K9 Ventures
447. Kaiser Permanente Ventures
448. Kaleida Health
449. Kansas Heart Hospital
450. Kaspersky Lab
451. Keck Medicine of USC
452. KHIPU Networks
453. Khosla Ventures
454. King's Daughters' Health (KDH)
455. KKR
456. Kleiner Perkins Caufield & Byers
457. KPMG
458. Kroll
459. Kyrus Tech
460. Lancope
461. Lastline
462. Left Bank Pediatric Clinic
463. LEONI
464. Leslie Ventures
465. Level 3 Communications
466. Level Nine Group
467. Liaison Technologies
468. Liberty Venture Partners
469. Lidera Network
470. Lieberman Software
471. LIFARS
472. LifeLock
473. LightCyber
474. Lightspeed Venture Partners
475. LinkedIn
476. Location Labs
477. Lockheed Martin
478. LogRhythm
479. Logsign
480. London Digital Security Centre
481. Long River Ventures
482. LookingGlass Cyber Solutions
483. Lookout
484. Los Angeles County Department of Mental Health Covertix
485. Lukas Hospital
486. Macnica Ventures
487. MainNerve
488. Malformity Labs
489. Malwarebytes
490. Mandiant
491. Maple Leaf Partners
492. March Capital Partners
493. Marin Healthcare District
494. Matrix Partners
495. Maxfield Capital
496. Mayfield Clinic
497. McAfee
498. MCO Global
499. Med Center Health
500. MedCrypt
501. Medical Oncology Hematology Consultants
502. Medicare
503. Meditology Services
504. MedSec
505. MedStar Health
506. MegaPath
507. Menlo Security
508. Merck
509. Meritech Capital Partners
510. Methodist Hospital, Kentucky, US
511. Metropolitan Urology Group
512. Micro Focus
513. Microsoft
514. Mid-Michigan Physicians Imaging Center
515. Milton Security Group
516. Mimecast
517. Mirin Capital
518. Mirox Cyber Security & Technology
519. MobileIron
520. Mobileye
521. Molina Healthcare
522. Morphick
523. Mosley Ventures
524. Myspace
525. Nasdaq
526. National Health Service (NHS) Niara
527. National Health-Information Sharing and Analysis Center (NH-ISAC)
528. NC4
529. NCC Group
530. NEC Networks & System Integration Corporation (NESIC)
531. Neotec
532. Nervana Systems
533. Netcraft
534. netForensics
535. Netizen
536. NETSCOUT
537. Netskope
538. NetWorks Group
539. Netwrix
540. New Enterprise Associates
541. New Jersey Spine Center
542. New York Life Insurance
543. Newkirk Products
544. NexDefense
545. Nexthink
546. NextView Ventures
547. Nexusguard
548. North Bridge Venture Partners
549. Northern Light Venture Capital
550. Northrop Grumman
551. Norwest Venture Partners
552. Novasano
553. NowSecure
554. NSS Labs
555. NTT DOCOMO Ventures
556. NTT Security
557. NXTP Labs
558. Objective Logistics
559. ObserveIT
560. OC Gasto Care
561. Okta
562. OMC Systems
563. Omidyar Technology Ventures
564. OpenSky
565. OpenStack
566. OPSWAT
567. Optiv
568. Opus Capital
569. Oracle
570. Orchard Holdings Group
571. Osage Partners
572. Osirium
573. Ostendio
574. Pacific Alliance Medical Center
575. Paladion
576. Palo Alto Networks
577. PassiveTotal
578. Patient Home Monitoring (PHM)
579. Peachtree Neurological Clinic
580. Peachtree Orthopaedic Clinic
581. Pelion Venture Partners
582. Pepper Hamilton
583. Petrillo Capital
584. Pew Research Center
585. Phantom
586. PhishLabs
587. PhishMe
588. Pilot Growth Equity
589. Pitango Venture Capital
590. Plastic Surgery Associates, South Dakota
591. Plurilock
592. Polito
593. Ponemon Institute
594. Portage Partners
595. Portland Seed Fund
596. Post-Quantum
597. Praetorian
598. Premera Blue Cross
599. Premier Healthcare
600. Prevalent Networks
601. PriorityOne Group
602. Professional Dermatology Care
603. Proficio
604. Progress Distribution
605. Promenade Software
606. Promisec
607. Proofpoint
608. ProStar Solutions
609. ProtectWise
610. Protegrity
611. Protenus
612. PwC
613. Pwnie Express
614. QinetiQ
615. Qriocity
616. Qualcomm Ventures
617. Qualys
618. Quarles & Brady
619. Rackspace
620. Radiology Regional Center, Pennsylvania
621. Radware
622. Rally Ventures
623. Rapid7
624. Raytheon
625. Recorded Future
626. Red Herring
627. Redpoint Ventures
628. RedSeal
629. RedSocks Security
630. Redspin
631. Rein Capital
632. Rembrandt Venture Partners
633. Reveal Imaging Technologies
634. Ridge Ventures
635. Ridgewall
636. Right Side Capital Management
637. Risk Based Security
638. RiskIQ
639. RiskSense
640. River City Media
641. Riverwood Capital
642. root9B
643. RRE Ventures
644. RSA
645. Rsam
646. Rubicon Labs
647. Safeguard Scientifics
648. SAINT
649. Salesforce Ventures
650. Samsung NEXT Ventures
651. Sandvine
652. SANS Institute
653. Santander Bank
654. SAP National Security Services
655. Sapphire Ventures
656. SAS
657. SC Media
658. SCADAfence
659. Scale Venture Partners
660. SDGblue
661. Seagate Technology
662. Seceon
663. Seclore
664. SecqureOne
665. Secure Sense
666. SecureAuth
667. secureHIM
668. Secureworks
669. Security Innovation
670. Security Iris
671. Security Risk Advisors
672. Securonix
673. Sedara
674. Senrio
675. Sensato
676. SentinelOne
677. sep
678. Sequoia Capital
679. Sequretek
680. Sera-Brynn
681. ServiceNow
682. SEWORKS
683. Shape Security
684. Shasta Ventures
685. Siemens Venture Capital
686. Siemplify
687. Sierra
688. Signal Networks
689. Silent Circle
690. Silicon Valley Bank
691. Silver Lake Waterman
692. SineWave Ventures
693. Singtel Innov8
694. Sirius Computer Solutions
695. Skybox Security
696. Skycure
697. Skyhigh Networks
698. Skyriver IT
699. Slack
700. Smilegate Investment
701. Smiths Medical
702. Snapchat
703. SnoopWall
704. Social Capital
705. SoftBank Ventures
706. Soltra
707. Solutionary
708. SonicWall
709. Sony
710. Sophos
711. Sound Ventures
712. Spark Capital
713. SpearTip
714. SPHERE Technology Solutions
715. Spikes Security
716. Spirion
717. Splunk
718. Spring Lake Equity Partners
719. Sqrrl
720. SquarePeg Capital
721. SS&C Technologies
722. St. Jude Medical
723. St. Mark’s Surgery Center
724. StackPath
725. Starfish Ventures
726. Startmate
727. Stasmayer
728. Stonesoft
729. Strategic Cyber Ventures
730. Sucuri
731. Summit Partners
732. Sun Mountain Capital
733. Sutter Hill Ventures
734. Swarth Group
735. Swimlane
736. Swivel Secure
737. Sword & Shield
738. Symantec
739. Synack
740. SyncDog
741. Synchronoss
742. Synopsys
743. Systematic Group
744. Systems Engineering
745. T.J.Maxx
746. Taia Global
747. Talis Capital
748. Tampa Bay Surgery Center
749. Tangible Security
750. Tanium
751. Taobao
752. TCP Venture Capital
753. Team8
754. TechFlow
755. TechOperators
756. TEDCO
757. Teldat
758. Telstra Ventures
759. TELUS Ventures
760. Tempered Networks
761. Tenable
762. TenEleven Ventures
763. Thales e-Security
764. The Cook County Department of Homeland Security and Emergency Management (DHSEM)
765. The Hague Security Delta (HSD)
766. The Mako Group
767. The Media Trust
768. The Ottawa Hospital
769. The Oxman Group
770. The Perkins Fund
771. The University of Kansas Health System
772. The Westly Group
773. The Women's Healthcare Group, Kansas, US WordPress
774. Third Point Ventures
775. Thomvest Ventures
776. Threat Stack
777. ThreatConnect
778. ThreatMetrix
779. ThreatTrack Security
780. Thycotic
781. Tiger Global Management
782. TitanHQ
783. Titus Regional Medical Center
784. Toba Capital
785. TokenOne
786. Tola Capital
787. TomorrowVentures
788. Top Tier Capital Partners
789. Topsec
790. TopSpin Security
791. Torrance Memorial Medical Center
792. Toshiba
793. TPG Growth
794. TraceSecurity
795. TrapX Security
796. Trend Micro
797. Trident Capital
798. Trinity Ventures
799. Tripwire
800. Trusona
801. Trusted-HIT
802. TrustPoint Solutions
803. Trustwave
804. TSC Advantage
805. T-Systems
806. Tufin
807. TÜV Rheinland
808. Tyfone
809. UAE Banks Federation
810. Ubiquiti Networks
811. UC Davis Health
812. Ukraine Power Grid
813. UniCare
814. Union Bay Partners
815. University of Cambridge
816. Untangle
817. UpGuard
818. UpWest Labs
819. Urgent Care Clinic of Oxford
820. Urology Austin
821. USC Norris Comprehensive Cancer Center
822. UST Global
823. v1.vc
824. Valar Frontier Solutions
825. Valley Anesthesiology and Pain Consultants
826. Valor Capital Group
827. Vantage Cybersecurity Group
828. vArmour
829. Varonis
830. VASCO
831. Vaultive
832. Vector Capital
833. Vectra Networks
834. Vela Trading Technologies
835. Venable
836. Venafi
837. Venrock
838. Ventures Unlimited
839. Vera
840. Veracode
841. Verity Health System
842. Verity Medical Foundation (formerly San Jose Medical Group)
843. Verizon
844. VictorOps
845. VigiTrust
846. Vintage Investment Partners
847. Viola Ventures (formerly Carmel Ventures)
848. Virtu
849. Virtue Security Services
850. VirusTotal
851. VisionQuest Eyecare
852. VisiTrend
853. VMware
854. Vorstack
855. Votiro
856. Wandera
857. Warburg Pincus
858. Washington University School of Medicine
859. West Corporation
860. WhiteHat Security
861. Wilson Consulting Group
862. Windancer Technologies
863. Wing
864. WinMagic
865. Wipro Ventures
866. Wombat Security Technologies
867. WorkplaceDynamics
868. World Economic Forum
869. Wortham Insurance
870. Yahoo
871. Zayo
872. Zelkova Ventures
873. Zenedge
874. ZeroFOX
875. Zerto
876. Ziften
877. Zimperium
878. Zix
879. Zoho
880. ZoneFox
881. Zscaler


1. PREFACE
1.1. Scope of the Report
1.2. Research Methodology
1.3. Chapter Outlines
2. EXECUTIVE SUMMARY
3. INTRODUCTION
3.1. Digitization and Global Transformation
3.1.1. The Internet of Things (IoT)
3.1.2. Cloud Computing
3.1.3. Digitized Business Communication
3.2. Impact of Digitization on Different Industries
3.3. Current Underlying Problems of Digitization
3.4. Risks and Mitigation Strategies of Digitization
3.5. Cybersecurity
3.5.1. The Importance of Cybersecurity
3.5.2. Historical Review of Notable Attacks and Data Breaches
3.5.3. Industries Impacted by Cybersecurity Incidents
3.5.4. Security Vulnerabilities and Threat Landscape
3.5.5. Introduction to Cybersecurity Solutions
4. CYBERSECURITY IN HEALTHCARE
4.1. Chapter Overview
4.2. Digital and Connected Healthcare
4.3. Common Vulnerabilities and Cyber Risks in Healthcare
4.4. HIPAA Framework
4.5. Cybersecurity in Healthcare
4.5.1. The Importance of Cybersecurity in Healthcare
4.5.2. Notable Attacks and Data Breaches in Healthcare
4.5.2.1. Attack on Anthem: The Largest Healthcare Data Breach in History
4.5.2.2. Recent Healthcare Data Breaches
4.5.3. Ransomware: A Key Concern for Healthcare Organizations
4.5.4. Elements of Cybersecurity in Healthcare
4.5.5. Growth Drivers and Road Blocks to Cybersecurity in Healthcare
4.5.6. Best Cybersecurity Practices for Healthcare Industry
5. CURRENT MARKET LANDSCAPE
5.1. Chapter Overview
5.2. Cybersecurity in Healthcare: List of Industry Players
5.2.1. Distribution by Year of Establishment
5.2.2. Distribution by Geographical Location
5.2.3. Distribution by Company Size
5.2.4. Distribution by Type of Offering
5.2.5. Distribution by Type of Core Products / Solutions
5.2.6. Distribution by Type of Threat Intelligence Solutions
5.2.7. Distribution by Type of Security Elements
5.2.8. Distribution by Type of Deployment Mode
5.2.9. Distribution by Type of Threats Mitigated
6. CORE CYBERSECURITY PRODUCTS / SOLUTIONS: COMPANY PROFILES
6.1. Chapter Overview
6.2. Attivo Networks
6.2.1. Company Snapshot
6.2.2. Financial Information
6.2.3. Cybersecurity Product / Service Portfolio
6.2.4. Recent Developments
6.3. CensorNet
6.3.1. Company Snapshot
6.3.2. Financial Information
6.3.3. Cybersecurity Product / Service Portfolio
6.3.4. Recent Developments
6.4. Exabeam
6.4.1. Company Snapshot
6.4.2. Financial Information
6.4.3. Cybersecurity Product / Service Portfolio
6.4.4. Recent Developments
6.5. iCyber-Security
6.5.1. Company Snapshot
6.5.2. Financial Information
6.5.3. Cybersecurity Product / Service Portfolio
6.5.4. Recent Developments
6.6. Threat Stack
6.6.1. Company Snapshot
6.6.2. Financial Information
6.6.3. Cybersecurity Product / Service Portfolio
6.6.4. Recent Developments
6.7. TraceSecurity
6.7.1. Company Snapshot
6.7.2. Financial Information
6.7.3. Cybersecurity Product / Service Portfolio
6.7.4. Recent Developments
6.8. Zenedge
6.8.1. Company Snapshot
6.8.2. Financial Information
6.8.3. Cybersecurity Product / Service Portfolio
6.8.4. Recent Developments
7. THREAT INTELLIGENCE SOLUTIONS: COMPANY PROFILES
7.1. Chapter Overview
7.2. Anomali
7.2.1. Company Snapshot
7.2.2. Financial Information
7.2.3. Cybersecurity Product / Service Portfolio
7.2.4. Recent Developments
7.3. Centripetal Networks
7.3.1. Company Snapshot
7.3.2. Financial Information
7.3.3. Cybersecurity Product / Service Portfolio
7.3.4. Recent Developments
7.4. Flashpoint
7.4.1. Company Snapshot
7.4.2. Financial Information
7.4.3. Cybersecurity Product / Service Portfolio
7.4.4. Recent Developments
7.5. ProtectWise
7.5.1. Company Snapshot
7.5.2. Financial Information
7.5.3. Cybersecurity Product / Service Portfolio
7.5.4. Recent Developments
7.6. Sqrrl
7.6.1. Company Snapshot
7.6.2. Financial Information
7.6.3. Cybersecurity Product / Service Portfolio
7.6.4. Recent Developments
7.7. Shape Security
7.7.1. Company Snapshot
7.7.2. Financial Information
7.7.3. Cybersecurity Product / Service Portfolio
7.7.4. Recent Developments
7.8. Vectra Networks
7.8.1. Company Snapshot
7.8.2. Financial Information
7.8.3. Cybersecurity Product / Service Portfolio
7.8.4. Recent Developments
8. CYBERSECURITY SERVICES: COMPANY PROFILES
8.1. Chapter Overview
8.2. Agio
8.2.1. Company Snapshot
8.2.2. Cybersecurity Service Portfolio
8.2.3. Recent Developments
8.3. CyberSurance
8.3.1. Company Snapshot
8.3.2. Cybersecurity Service Portfolio
8.3.3. Recent Developments
8.4. Delta Risk
8.4.1. Company Snapshot
8.4.2. Cybersecurity Service Portfolio
8.4.3. Recent Developments
8.5. ITEGRITI
8.5.1. Company Snapshot
8.5.2. Cybersecurity Service Portfolio
8.5.3. Recent Developments
8.6. Security Risk Advisors
8.6.1. Company Snapshot
8.6.2. Cybersecurity Service Portfolio
8.6.3. Recent Developments
8.7. Sera-Brynn
8.7.1. Company Snapshot
8.7.2. Cybersecurity Service Portfolio
8.7.3. Recent Developments
8.8. VigiTrust
8.8.1. Company Snapshot
8.8.2. Cybersecurity Service Portfolio
8.8.3. Recent Developments
9. BENCHMARK ANALYSIS
9.1. Chapter Overview
9.2. Benchmark Analysis: Methodology
9.3. Benchmark Analysis: Peer Groups
9.4. Benchmark Analysis: Medium-Sized Companies
9.4.1. Peer Group I
9.4.2. Peer Group II
9.4.3. Peer Group III
9.4.4. Key Industry Players
9.4.4.1. AlienVault
9.4.4.1.1. Company Snapshot
9.4.4.1.2. Financial Information
9.4.4.1.3. Cybersecurity Product / Service Portfolio
9.4.4.1.4. Recent Developments
9.4.4.2. Carbon Black
9.4.4.2.1. Company Snapshot
9.4.4.2.2. Financial Information
9.4.4.2.3. Cybersecurity Product / Service Portfolio
9.4.4.2.4. Recent Developments
9.4.4.3. CrowdStrike
9.4.4.3.1. Company Snapshot
9.4.4.3.2. Financial Information
9.4.4.3.3. Cybersecurity Product / Service Portfolio
9.4.4.3.4. Recent Developments
9.4.4.4. Cylance
9.4.4.4.1. Company Snapshot
9.4.4.4.2. Financial Information
9.4.4.4.3. Cybersecurity Product / Service Portfolio
9.4.4.4.4. Recent Developments
9.4.4.5. Darktrace
9.4.4.5.1. Company Snapshot
9.4.4.5.2. Financial Information
9.4.4.5.3. Cybersecurity Product / Service Portfolio
9.4.4.5.4. Recent Developments
9.4.4.6. Gigamon
9.4.4.6.1. Company Snapshot
9.4.4.6.2. Financial Information
9.4.4.6.3. Cybersecurity Product / Service Portfolio
9.4.4.6.4. Recent Developments
9.4.4.7. LogRhythm
9.4.4.7.1. Company Snapshot
9.4.4.7.2. Financial Information
9.4.4.7.3. Cybersecurity Product / Service Portfolio
9.4.4.7.4. Recent Developments
9.5. Benchmark Analysis: Large-Sized Companies
9.5.1. Peer Group IV
9.5.2. Peer Group V
9.5.3. Key Industry Players
9.5.3.1. Fortinet
9.5.3.1.1. Company Snapshot
9.5.3.1.2. Financial Information
9.5.3.1.3. Cybersecurity Product / Service Portfolio
9.5.3.1.4. Recent Developments
9.5.3.2. FireEye
9.5.3.2.1. Company Snapshot
9.5.3.2.2. Financial Information
9.5.3.2.3. Cybersecurity Product / Service Portfolio
9.5.3.2.4. Recent Developments
9.5.3.3. IBM
9.5.3.3.1. Company Snapshot
9.5.3.3.2. Financial Information
9.5.3.3.3. Cybersecurity Product / Service Portfolio
9.5.3.3.4. Recent Developments
9.5.3.4. McAfee
9.5.3.4.1. Company Snapshot
9.5.3.4.2. Financial Information
9.5.3.4.3. Cybersecurity Product / Service Portfolio
9.5.3.4.4. Recent Developments
9.5.3.5. Palo Alto Networks
9.5.3.5.1. Company Snapshot
9.5.3.5.2. Financial Information
9.5.3.5.3. Cybersecurity Product / Service Portfolio
9.5.3.5.4. Recent Developments
9.5.3.6. Sophos
9.5.3.6.1. Company Snapshot
9.5.3.6.2. Financial Information
9.5.3.6.3. Cybersecurity Product / Service Portfolio
9.5.3.6.4. Recent Developments
9.5.3.7. Trustwave
9.5.3.7.1. Company Snapshot
9.5.3.7.2. Financial Information
9.5.3.7.3. Cybersecurity Product / Service Portfolio
9.5.3.7.4. Recent Developments
10. CAPITAL INVESTMENTS AND FUNDING
10.1. Chapter Overview
10.2. Types of Funding
10.3. Cybersecurity in Healthcare: Funding Instances
10.3.1. Analysis by Year of Funding
10.3.2. Analysis by Amount Invested
10.3.3. Analysis by Type of Funding
10.3.4. Analysis by Amount Invested in Different Types of Offering
10.3.5. Most Active Players by Number of Instances
10.3.6. Most Active Investors by Number of Instances
10.4. Concluding Remarks
11. COMPANY VALUATION ANALYSIS
11.1. Chapter Overview
11.2. Company Valuation: Methodology
11.3. Company Valuation: Categorization by Multiple Parameters
11.3.1. Categorization by Employee Size
11.3.2. Categorization by Portfolio Strength
11.3.3. Categorization by Weighted Average Score
11.4. Company Valuation: Roots Analysis Proprietary Scores
12. MARKET FORECAST
12.1. Chapter Overview
12.2. Forecast Methodology and Key Assumptions
12.3. Overall Cybersecurity Market in Healthcare, 2018-2030
12.4. Cybersecurity Market in Healthcare: Distribution by Type of Offering
12.4.1. Cybersecurity Core Products / Solutions Market, 2018-2030
12.4.2. Threat Intelligence Solutions Market, 2018-2030
12.4.3. Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030
12.5. Cybersecurity Market in Healthcare: Distribution by Threat Type
12.5.1. Insider Theft Market, 2018-2030
12.5.2. Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030
12.5.3. 3rd Party / Subcontractor Negligence Market, 2018-2030
12.5.4. Employee Negligence Market, 2018-2030
12.5.5. Physical Theft Market, 2018-2030
12.5.6. Other Threat Types Market, 2018-2030
12.6. Cybersecurity Market in Healthcare: Distribution by Security Type
12.6.1. Application Security Market, 2018-2030
12.6.2. Cloud Security Market, 2018-2030
12.6.3. Endpoint Security Market, 2018-2030
12.6.4. Network Security Market, 2018-2030
12.6.5. Other Security Types Market, 2018-2030
12.7. Cybersecurity Market in Healthcare: Distribution by Deployment Mode
12.7.1. Cloud Deployment Market, 2018-2030
12.7.2. On-premise Deployment Market, 2018-2030
12.8. Cybersecurity Market in Healthcare: Distribution by Geographies
12.8.1. Cybersecurity Market in Healthcare in the US, 2018-2030
12.8.2. Cybersecurity Market in Healthcare in Europe, 2018-2030
12.8.3. Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030
12.8.4. Cybersecurity Market in Healthcare in Rest of the World, 2018-2030
13. FUTURE TRENDS: ARTIFICIAL INTELLIGNCE AND CYBERSECURITY
13.1. Chapter Overview
13.2. Artificial Intelligence (AI): An Overview
13.2.1. Machine Learning: An Approach to Achieve AI
13.2.2. Deep Learning: A Technique for Implementing Machine Learning
13.3. AI in Cybersecurity
13.3.1. Potential Benefits of AI in Cybersecurity
13.4. AI-based Cybersecurity in Healthcare
13.4.1. AI-based Cybersecurity in Healthcare: List of Industry Players
13.4.1.1. Analysis by Year of Establishment
13.4.1.2. Analysis by Geographical Location
13.4.1.3. Analysis by Company Size
13.4.1.4. Top 15 Industry Players in Terms of Equity Funding
13.4.1.5. Market Competitiveness Analysis
14. CASE STUDY: CYBERSECURITY USE CASES IN HEALTHCARE
14.1. Chapter Overview
14.2. Notable Healthcare Data Breaches in 2017
14.3. The Next Major Security Concern: Medical Device Hacks
14.4. Example Strategies to Tackle Cyber Threats
14.4.1. Anthem
14.4.2. Merck
14.4.3. Aralez Pharmaceuticals
14.4.4. Atrius Health
14.4.5. Cardinal Health
14.4.6. Baptist Healthcare System
14.4.7. Sarasota Memorial Healthcare System
14.4.8. State Health and Human Services (HHS) Agency
15. EXECUTIVE INSIGHTS
15.1. Chapter Overview
15.2. BlackRidge Technology
15.2.1. Company Snapshot
15.2.2. Interview Transcript: Steve Leatherman, IT Consultant
15.3. Critical Informatics
15.3.1. Company Snapshot
15.3.2. Interview Transcript: Garrett Silver, Chief Executive Officer
15.4. Cyberlytic
15.4.1. Company Snapshot
15.4.2. Interview Transcript: Saïd Kenj, Account Executive and Rebecca Bourke, Marketing Manager
15.5. Device Authority
15.5.1. Company Snapshot
15.5.2. Interview Transcript: Robert Dobson, Director and Rosa Lenders, Marketing Executive
15.6. illusive networks
15.6.1. Company Snapshot
15.6.2. Interview Transcript: Matan Kubovsky, Vice President, R&D
15.7. MedCrypt
15.7.1. Company Snapshot
15.7.2. Interview Transcript: Mike Kijewski, Chief Executive Officer
15.8. Risk Based Security
15.8.1. Company Snapshot
15.8.2. Interview Transcript: Jake Kouns, Chief Information Security Officer
15.9. Rubicon Labs
15.9.1. Company Snapshot
15.9.2. Interview Transcript: Rod Schultz, Chief Product Officer and Julia Cline, Senior Director, Product and Marketing
15.10. SCADAfence
15.10.1. Company Snapshot
15.10.2. Interview Transcript: Yoni Shohet, Chief Executive Officer
15.11. secureHIM
15.11.1. Company Snapshot
15.11.2. Interview Transcript: Mike Meikle, Chief Executive Officer
15.12. Sensato
15.12.1. Company Snapshot
15.12.2. Interview Transcript: John Gomez, Chief Executive Officer
16. CONCLUSION
16.1. Although, the Advent of Digitization has Created Several New Business Opportunities, Industries are Now More Vulnerable to Cyberattacks
16.2. Owing to Multiple Contributors, Healthcare is Amongst the Worst Hit Industries by Cyberattacks
16.3. With Growing Complexity and Frequency of Cyberattacks, a Large Number of Industry Players have Widened their Expertise to Protect Healthcare Organizations
16.4. Several Start-ups, Backed by Venture Capital Investors, are Driving Technological Innovation in the Market
16.5. Given the Financial Support and Diverse Product / Solution Portfolio, Several Recently Established Companies are Steadily Approaching Unicorn Status
16.6. Driven by Ever-Increasing Threat Landscape and High Value of Healthcare Records, the Market is Expected to Grow Significantly in the Coming Years
16.7. As Threat Levels Increase, Artificial Intelligence (AI) Holds a Significant Potential in Next Generation Cyber Defenses
16.8. Concluding Remarks
17. APPENDIX 1: TABULATED DATA
18. APPENDIX 2: LIST OF COMPANIES AND ORGANIZATIONS
LIST OF FIGURES
Figure 3.1 Internet of Things: Framework
Figure 3.2 Internet of Things: Schematic Representation
Figure 3.3 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Figure 3.4 Cloud Computing: Development Timeline
Figure 3.5 Cloud Computing: Deployment Models
Figure 3.6 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Figure 3.7 Digitized Business Communication Channels
Figure 3.8 Digitization: Major Drawbacks
Figure 3.9 Top Security Implications of Cyberattacks, 2016
Figure 3.10 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Figure 3.11 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Figure 3.12 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Figure 3.13 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Figure 3.14 Industries Hit by the Highest Number of Cyberattacks in 2014, 2015 and 2016
Figure 3.15 Number of Records Breached: Distribution by Industry, 2015
Figure 4.1 Digital Transformation in Healthcare Industry: Key Elements
Figure 4.2 Global Digital Health Market, 2015-2020 (USD Billion)
Figure 4.3 Healthcare Assets Targeted by Different Cyber Criminals
Figure 4.4 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Figure 4.5 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Figure 4.6 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Figure 4.7 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Figure 4.8 Number of Healthcare Records Breached per Month, 2016
Figure 4.9 Healthcare Data Breaches, 2016
Figure 4.10 Primary Causes of Healthcare Data Breaches, 2016
Figure 4.11 Growth Drivers and Road Blocks to Cybersecurity in Healthcare
Figure 5.1 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Figure 5.2 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Figure 5.3 Cybersecurity in Healthcare: Distribution of Industry Players by Company Size
Figure 5.4 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Figure 5.5 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products / Solutions
Figure 5.6 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Figure 5.7 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Figure 5.8 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Figure 5.9 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Figure 9.1 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Figure 9.2 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Figure 9.3 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Figure 9.4 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Figure 9.5 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.6 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.7 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.8 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Figure 9.9 Benchmark Analysis: Large-Sized Companies, Peer Group V
Figure 9.10 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Figure 9.11 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Figure 9.12 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Figure 9.13 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.14 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.15 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.16 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Figure 9.17 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Figure 9.18 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Figure 9.19 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Figure 9.20 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Figure 9.21 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Figure 10.1 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Figure 10.2 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Figure 10.3 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Figure 10.4 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount and Type of Funding, 2012-2017 (USD Million)
Figure 10.5 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Offering, 2012-2017 (USD Million)
Figure 10.6 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Figure 10.7 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Figure 10.8 Cybersecurity in Healthcare: Funding and Investment Summary
Figure 11.1 Company Valuation Analysis: A/F Ratio, Input Dataset
Figure 11.2 Company Valuation Analysis: A/Y Ratio, Input Dataset
Figure 11.3 Company Valuation Analysis: A/E Ratio, Input Dataset
Figure 11.4 Company Valuation Analysis: Categorization by Employee Base Score
Figure 11.5 Company Valuation Analysis: Categorization by Portfolio Strength
Figure 11.6 Company Valuation Analysis: Categorization by Weighted Average Score
Figure 11.7 Company Valuation Analysis: Likely Unicorns in Cybersecurity in Healthcare Industry
Figure 12.1 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Figure 12.2 Core Cybersecurity Products / Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.3 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.4 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Figure 12.5 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.6 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.7 3rd Party / Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.8 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.9 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.10 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.11 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.12 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.13 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.14 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.15 Other Security Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.16 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.17 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.18 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Figure 12.19 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Figure 12.20 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Figure 12.21 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Figure 13.1 AI: Smaller Subsets and Timeline
Figure 13.2 Machine Learning Algorithm: Workflow
Figure 13.3 Deep Learning: Image Recognition
Figure 13.4 Google Trends: Artificial Intelligence, Machine Learning and Deep Learning
Figure 13.5 Google Trends: Popular Keywords (Deep Learning)
Figure 13.6 Artificial Intelligence v/s Cybersecurity: Google Trends, 2011-2017
Figure 13.7 Artificial Intelligence v/s Cybersecurity: Geographical Distribution of Google Searches, 2011-2017
Figure 13.8 AI / Machine Learning: Shaping the Future of Cybersecurity
Figure 13.9 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry Players by Year of Establishment
Figure 13.10 AI-based Cybersecurity in Healthcare: Regional Landscape of Industry Players
Figure 13.11 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Figure 13.12 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size
Figure 13.13 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding
Figure 13.14 AI-based Cybersecurity in Healthcare: Market Competitiveness
Figure 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Figure 14.2 Notable Healthcare Data Breaches and Security Incidents: Distribution by Geographical Location
Figure 14.3 Notable Healthcare Data Breaches and Security Incidents: Distribution by Cause of Breach
Figure 16.1 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion)
LIST OF TABLES
Table 3.1 Impact of Digitization on Different Industries
Table 3.2 Key Cyberattacks and Security Vulnerabilities
Table 3.3 Key Cybersecurity Solutions
Table 4.1 Potential Applications of IoT Across Healthcare Industry
Table 4.2 Cybersecurity Vulnerabilities in the Healthcare Industry
Table 4.3 Largest Healthcare Data Breaches, 2017
Table 4.4 Largest Healthcare Data Breaches, 2016
Table 4.5 Biggest Ransomware Attacks on Healthcare Industry, 2016
Table 4.6 Cybersecurity Elements in Healthcare
Table 4.7 Best Cybersecurity Practices in Healthcare
Table 5.1 Cybersecurity in Healthcare: List of Industry Players
Table 5.2 Cybersecurity in Healthcare, Industry Players: Information on Type of Offering
Table 5.3 Cybersecurity in Healthcare, Industry Players: Information on Type of Security Elements and Deployment Mode
Table 5.4 Cybersecurity in Healthcare, Industry Players: Information on Type of Threats Mitigated
Table 6.1 Attivo Networks: Key Highlights
Table 6.2 Attivo Networks: Funding Instances
Table 6.3 Attivo Networks: Cybersecurity Product / Service Portfolio
Table 6.4 Attivo Networks: Recent Developments
Table 6.5 CensorNet: Key Highlights
Table 6.6 CensorNet: Funding Instances
Table 6.7 CensorNet: Cybersecurity Product / Service Portfolio
Table 6.8 CensorNet: Recent Developments
Table 6.9 Exabeam: Key Highlights
Table 6.10 Exabeam: Funding Instances
Table 6.11 Exabeam: Cybersecurity Product / Service Portfolio
Table 6.12 Exabeam: Recent Developments
Table 6.13 iCyber-Security: Key Highlights
Table 6.14 iCyber-Security: Funding Instances
Table 6.15 iCyber-Security: Cybersecurity Product / Service Portfolio
Table 6.16 iCyber-Security: Recent Developments
Table 6.17 Threat Stack: Key Highlights
Table 6.18 Threat Stack: Funding Instances
Table 6.19 Threat Stack: Cybersecurity Product / Service Portfolio
Table 6.20 Threat Stack: Recent Developments
Table 6.21 TraceSecurity: Key Highlights
Table 6.22 TraceSecurity: Funding Instances
Table 6.23 TraceSecurity: Cybersecurity Product / Service Portfolio
Table 6.24 TraceSecurity: Recent Developments
Table 6.25 Zenedge: Key Highlights
Table 6.26 Zenedge: Funding Instances
Table 6.27 Zenedge: Cybersecurity Product / Service Portfolio
Table 6.28 Zenedge: Recent Developments
Table 7.1 Anomali: Key Highlights
Table 7.2 Anomali: Funding Instances
Table 7.3 Anomali: Cybersecurity Product / Service Portfolio
Table 7.4 Anomali: Recent Developments
Table 7.5 Centripetal Networks: Key Highlights
Table 7.6 Centripetal Networks: Funding Instances
Table 7.7 Centripetal Networks: Cybersecurity Product / Service Portfolio
Table 7.8 Centripetal Networks: Recent Developments
Table 7.9 Flashpoint: Key Highlights
Table 7.10 Flashpoint: Funding Instances
Table 7.11 Flashpoint: Cybersecurity Product / Service Portfolio
Table 7.12 Flashpoint: Recent Developments
Table 7.13 ProtectWise: Key Highlights
Table 7.14 ProtectWise: Funding Instances
Table 7.15 ProtectWise: Cybersecurity Product / Service Portfolio
Table 7.16 ProtectWise: Recent Developments
Table 7.17 Sqrrl: Key Highlights
Table 7.18 Sqrrl: Funding Instances
Table 7.19 Sqrrl: Cybersecurity Product / Service Portfolio
Table 7.20 Sqrrl: Recent Developments
Table 7.21 Shape Security: Key Highlights
Table 7.22 Shape Security: Funding Instances
Table 7.23 Shape Security: Cybersecurity Product / Service Portfolio
Table 7.24 Shape Security: Recent Developments
Table 7.25 Vectra Networks: Key Highlights
Table 7.26 Vectra Networks: Funding Instances
Table 7.27 Vectra Networks: Cybersecurity Product / Service Portfolio
Table 7.28 Vectra Networks: Recent Developments
Table 8.1 Agio: Key Highlights
Table 8.2 Agio: Cybersecurity Service Portfolio
Table 8.3 Agio: Recent Developments
Table 8.4 CyberSurance: Key Highlights
Table 8.5 CyberSurance: Cybersecurity Service Portfolio
Table 8.6 CyberSurance: Recent Developments
Table 8.7 Delta Risk: Key Highlights
Table 8.8 Delta Risk: Cybersecurity Service Portfolio
Table 8.9 Delta Risk: Recent Developments
Table 8.10 ITEGRITI: Key Highlights
Table 8.11 ITEGRITI: Cybersecurity Service Portfolio
Table 8.12 ITEGRITI: Recent Developments
Table 8.13 Security Risk Advisors: Key Highlights
Table 8.14 Security Risk Advisors: Cybersecurity Service Portfolio
Table 8.15 Security Risk Advisors: Recent Developments
Table 8.16 Sera-Brynn: Key Highlights
Table 8.17 Sera-Brynn: Cybersecurity Service Portfolio
Table 8.18 Sera-Brynn: Recent Developments
Table 8.19 VigiTrust: Key Highlights
Table 8.20 VigiTrust: Cybersecurity Service Portfolio
Table 8.21 VigiTrust: Recent Developments
Table 9.1 Benchmark Analysis: Peer Groups
Table 9.2 AlienVault: Key Highlights
Table 9.3 AlienVault: Funding Instances
Table 9.4 AlienVault: Cybersecurity Product / Service Portfolio
Table 9.5 AlienVault: Recent Developments
Table 9.6 Carbon Black: Key Highlights
Table 9.7 Carbon Black: Recent Acquisitions
Table 9.8 Carbon Black: Funding Instances
Table 9.9 Carbon Black: Cybersecurity Product / Service Portfolio
Table 9.10 Carbon Black: Recent Developments
Table 9.11 CrowdStrike: Key Highlights
Table 9.12 CrowdStrike: Funding Instances
Table 9.13 CrowdStrike: Cybersecurity Product / Service Portfolio
Table 9.14 CrowdStrike: Recent Developments
Table 9.15 Cylance: Key Highlights
Table 9.16 Cylance: Funding Instances
Table 9.17 Cylance: Cybersecurity Product / Service Portfolio
Table 9.18 Cylance: Recent Developments
Table 9.19 Darktrace: Key Highlights
Table 9.20 Darktrace: Funding Instances
Table 9.21 Darktrace: Cybersecurity Product / Service Portfolio
Table 9.22 Darktrace: Recent Developments
Table 9.23 Gigamon: Key Highlights
Table 9.24 Gigamon: Cybersecurity Product / Service Portfolio
Table 9.25 Gigamon: Recent Developments
Table 9.26 LogRhythm: Key Highlights
Table 9.27 LogRhythm: Funding Instances
Table 9.28 LogRhythm: Cybersecurity Product / Service Portfolio
Table 9.29 LogRhythm: Recent Developments
Table 9.30 Fortinet: Key Highlights
Table 9.31 Fortinet: Recent Acquisitions
Table 9.32 Fortinet: Cybersecurity Product / Service Portfolio
Table 9.33 Fortinet: Recent Developments
Table 9.34 FireEye: Key Highlights
Table 9.35 FireEye: Recent Acquisitions
Table 9.36 FireEye: Cybersecurity Product / Service Portfolio
Table 9.37 FireEye: Recent Developments
Table 9.38 IBM: Key Highlights
Table 9.39 IBM: Recent Acquisitions
Table 9.40 IBM: Cybersecurity Product / Service Portfolio
Table 9.41 IBM: Recent Developments
Table 9.42 McAfee: Key Highlights
Table 9.43 McAfee: Recent Acquisitions
Table 9.44 McAfee: Cybersecurity Product / Service Portfolio
Table 9.45 McAfee: Recent Developments
Table 9.46 Palo Alto Networks: Key Highlights
Table 9.47 Palo Alto Networks: Recent Acquisitions
Table 9.48 Palo Alto Networks: Cybersecurity Product / Service Portfolio
Table 9.49 Palo Alto Networks: Recent Developments
Table 9.50 Sophos: Key Highlights
Table 9.51 Sophos: Recent Acquisitions
Table 9.52 Sophos: Cybersecurity Product / Service Portfolio
Table 9.53 Sophos: Recent Developments
Table 9.54 Trustwave: Key Highlights
Table 9.55 Trustwave: Recent Acquisitions
Table 9.56 Trustwave: Cybersecurity Product / Service Portfolio
Table 9.57 Trustwave: Recent Developments
Table 10.1 Cybersecurity in Healthcare: Funding Instances
Table 10.2 Cybersecurity in Healthcare: Summary of Investments
Table 11.1 Company Valuation Analysis: Sample Dataset
Table 11.2 Company Valuation Analysis: Categorization by Employee Base Score
Table 11.3 Company Valuation Analysis: Categorization by Portfolio Strength
Table 11.4 Company Valuation Analysis: Weighted Average Evaluation
Table 11.5 Company Valuation Analysis: Categorization by Weighted Average Score
Table 11.6 Company Valuation Analysis: Estimated Valuation
Table 13.1 Combating Cybersecurity Threats: Traditional Approach v/s AI-based Approach
Table 13.2 AI-based Cybersecurity in Healthcare: List of Industry Players
Table 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Table 14.2 Recent Medical Device Cyber Security Incidents
Table 15.1 BlackRidge Technology: Key Highlights
Table 15.2 Critical Informatics: Key Highlights
Table 15.3 Cyberlytic: Key Highlights
Table 15.4 Device Authority: Key Highlights
Table 15.5 illusive networks: Key Highlights
Table 15.6 MedCrypt: Key Highlights
Table 15.7 Risk Based Security: Key Highlights
Table 15.8 Rubicon Labs: Key Highlights
Table 15.9 SCADAfence: Key Highlights
Table 15.10 secureHIM: Key Highlights
Table 15.11 Sensato: Key Highlights
Table 17.1 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Table 17.2 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Table 17.3 Top Security Implications of Cyberattacks, 2016
Table 17.4 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Table 17.5 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Table 17.6 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Table 17.7 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Table 17.8 Number of Records Breached: Distribution by Industry, 2015
Table 17.9 Global Digital Health Market, 2015-2020 (USD Billion)
Table 17.10 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Table 17.11 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Table 17.12 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Table 17.13 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Table 17.14 Number of Healthcare Records Breached per Month, 2016
Table 17.15 Healthcare Data Breaches, 2016
Table 17.16 Primary Causes of Healthcare Data Breaches, 2016
Table 17.17 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Table 17.18 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Table 17.19 Cybersecurity in Healthcare: Distribution of Industry Players by Company Size
Table 17.20 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Table 17.21 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products / Solutions
Table 17.22 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Table 17.23 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Table 17.24 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Table 17.25 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Table 17.26 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Table 17.27 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Table 17.28 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Table 17.29 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Table 17.30 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.31 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.32 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.33 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Table 17.34 Benchmark Analysis: Large-Sized Companies, Peer Group V
Table 17.35 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Table 17.36 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Table 17.37 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Table 17.38 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.39 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.40 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.41 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Table 17.42 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Table 17.43 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Table 17.44 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Table 17.45 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Table 17.46 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Table 17.47 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Table 17.48 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Table 17.49 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Table 17.50 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested and Type of Funding, 2012-2017 (USD Million)
Table 17.51 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Offering, 2012-2017 (USD Million)
Table 17.52 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Table 17.53 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Table 17.54 Cybersecurity in Healthcare: Funding and Investment Summary
Table 17.55 Company Valuation Analysis: A/F Ratio, Input Dataset
Table 17.56 Company Valuation Analysis: A/Y Ratio, Input Dataset
Table 17.57 Company Valuation Analysis: A/E Ratio, Input Dataset
Table 17.58 Overall Cybersecurity Market in Healthcare, 2018-2030: Conservative Scenario (USD Billion)
Table 17.59 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Table 17.60 Overall Cybersecurity Market in Healthcare, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.61 Core Cybersecurity Products / Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.62 Core Cybersecurity Products / Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.63 Core Cybersecurity Products / Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.64 Threat Intelligence Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.65 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.66 Threat Intelligence Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.67 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Conservative Scenario (USD Billion)
Table 17.68 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Table 17.69 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Optimistic Scenario (USD Billion)
Table 17.70 Insider Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.71 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.72 Insider Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.73 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.74 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Table 17.75 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.76 3rd Party / Subcontractor Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.77 3rd Party / Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.78 3rd Party / Subcontractor Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.79 Employee Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.80 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.81 Employee Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.82 Physical Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.83 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.84 Physical Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.85 Other Threat Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.86 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.87 Other Threat Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.88 Application Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.89 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.90 Application Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.91 Cloud Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.92 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.93 Cloud Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.94 Endpoint Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.95 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.96 Endpoint Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.97 Network Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.98 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.99 Network Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.100 Other Security Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.101 Other Security Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.102 Other Security Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.103 Cloud Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.104 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.105 Cloud Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.106 On-Premise Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.107 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.108 On-Premise Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.109 Cybersecurity Market in Healthcare in the US, 2018-2030: Conservative Scenario (USD Billion)
Table 17.110 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Table 17.111 Cybersecurity Market in Healthcare in the US, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.112 Cybersecurity Market in Healthcare in Europe, 2018-2030: Conservative Scenario (USD Billion)
Table 17.113 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Table 17.114 Cybersecurity Market in Healthcare in Europe, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.115 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Conservative Scenario (USD Billion)
Table 17.116 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Table 17.117 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.118 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Conservative Scenario (USD Billion)
Table 17.119 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Table 17.120 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.121 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry by Year of Establishment
Table 17.122 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by
Location of Headquarters
Table 17.123 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by
Size
Table 17.124 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding
Table 17.125 AI-based Cybersecurity in Healthcare: Market Competitiveness
Table 17.126 Notable Healthcare Data Breaches and Security Incidents: Distribution by
Geographical Location
Table 17.127 Notable Healthcare Data Breaches and Security Incidents: Distribution by Cause
of Breach
Table 17.128 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios,
2018 and 2030 (USD Billion)

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report