The endogenous demand of digital transformation and policy compliance are the main driving forces to promote the development of industrial Internet security industry. With the in-depth promotion of the national industrial Internet strategy, we will continue to strengthen industrial policies and financial support to naturally promote the growth of domestic demand in the industrial Internet security industry. At the same time, the policy side, such as network security level protection 2.0, expands the scope of network security protection and puts forward higher security expansion requirements for industrial control system, which is suitable for the proprietary technology and application scenario characteristics of industrial control. In the face of safety compliance requirements, industrial enterprises must continue to strengthen their own safety protection system to stimulate endogenous demand and further expand.
The demand for industrial Internet security promotes the continuous and in-depth integration of information technology (it) security and operation technology (OT) security. China's industrial Internet security technology system can be divided into two categories: external security (IT Security) and embedded security (OT security). With the acceleration of the industrial Internet, the security problems from industrial control systems, industrial intelligent devices, industrial platforms and data can not be ignored, and the market demand for products and services with embedded information security functions has surged. Traditional products and services focusing on it security can no longer fully meet the actual market demand, and should be fully combined with ot security for in-depth development. Therefore, the future development of industrial Internet security industry should take into account the market demand for it security and ot security, and improve the comprehensive protection level of industrial enterprises. In terms of special performance requirements, ensuring the continuity and reliability of production is the primary task of industrial Internet. IT security solutions with high network delay or cost will not be applied to ot network. It is necessary to study technical solutions to balance security risks and business impact according to the characteristics of OT network..
Industrial Internet security solutions combining multiple fields and new technologies are emerging, and security products and services are diversified. With the rapid application of new generation information technologies such as big data, cloud computing, artificial intelligence (AI), 5g and edge computing in the field of industrial Internet, the integration of it and OT has accelerated. The industrial Internet security environment integrated with new technologies will become more complex and diverse, with diversified security risks, and it is more difficult to find security risks. The changes of technology and situation have put forward new requirements for security concepts and technologies, which will promote the application breakthrough of new technologies such as security situation awareness, security visualization, Threat Intelligence and big data processing in the field of industrial Internet security; The emergence of customized security products will be accelerated, and security services will shift from on-site services and remote services to remote, cloud, automation and platform development. On the whole, industrial Internet security solutions that focus on the five security fields of equipment, control, network, application and data and combine multiple fields and new technologies will continue to appear, providing a reference model for industrial enterprises to deploy security protection measures.
Regulatory policy overweight and big data accelerated application drive the development of data security, which is expected to become the most explosive direction of network security in 2022. The short-term 10 billion market is dominated by technical service revenue, and the long-term SaaS operation revenue is expected to reach 100 billion. Recently, laws and regulations such as the data security law, the key information infrastructure security protection regulations and the personal information protection law have been intensively issued and implemented. Only from the perspective of privacy computing, an integral part of data security, Gartner predicts that more than 80% of Companies in the world will face at least one data protection regulation focusing on privacy in 2023, In 2024, the expenditure of privacy driven data protection and compliance technology will exceed US $15 billion worldwide. With the implementation of the data security law and the rapid development of the data trading market, KPMG expects that China's data security technical services are expected to reach 10 billion in 2023. With the cloud of IT architecture, it will leverage 100 billion of data security SaaS operating revenue in the long term.
Related companies: Westone Information Industry Inc(002268) , Qi An Xin Technology Group Inc(688561) , Dbappsecurity Co.Ltd(688023) , Sangfor Technologies Inc(300454) , Topsec Technologies Group Inc(002212) , Venustech Group Inc(002439) , Jiangsu Yunyong Electronics And Technology Co.Ltd(688060) .
Risk warning: industry competition intensifies the risk; The policy strength is less than the expected risk; Macroeconomic risks; There may be an error between the calculation and the actual situation