SYS-CON MEDIA Authors: Carmen Gonzalez, Yeshim Deniz, Sean Houghton, Glenn Rossman, Ignacio M. Llorente

News Feed Item

Oil and Gas Security Market - Global Advancements, Forecasts & Analysis to 2018

DUBLIN, April 15, 2014 /PRNewswire/ --

Research and Markets (http://www.researchandmarkets.com/research/cnd7k6/oil_and_gas) has announced the addition of the "Oil and Gas Security Market - Global Advancements, Forecasts & Analysis to 2018" report to their offering. 

     (Logo: http://photos.prnewswire.com/prnh/20130307/600769 )


Securing oil and gas rigs, exploration sites, plants, and storage is one of the critical issues which are being faced by oil and gas operators across the globe. The oil and gas security was the critical issue since long, but more emphasis is being given to it now due to the rise in the terrorist activities and increased cyber attacks on the networks of the oil and gas infrastructures. This problem is faced by both developed nations and the developing countries and the companies involved in oil and gas exploration and processing. 

Oil and gas sector play an important role in the development of any country and securing these infrastructures is of critical importance. Due to online networking, implementation of Industrial Control Systems (ICS), and other technological implementations, oil and gas sectors are now prone to cyber attacks as well. The rise in the terrorist activities all over the globe has also raised concerns about the security. Many countries and international regulatory bodies have designed and planned policies and compliances for the oil and gas sector for securing their infrastructures. The companies have to strictly follow these compliances and policies for fortifying the infrastructures from outside threats. There are many Tier1 companies who are providing dedicated security solutions for physical and network security to the oil and gas industries.

Increased physical and cyber attacks, pressure due to strict governmental policies and compliances, and rise in the exploration for oil and gas from both developed and developing nations have given a boost to the oil and gas security market. This report gives detailed insights into the global oil and gas security market split across various regions, types of oil and gas applications, types of security, and types of professional services. While the applications include exploration and drilling, refining and storage, transportation, and pipeline and distribution; types of security includes physical security and network security; and types of professional services include risk management services, system design, integration, and consulting, managed services, and audit and reporting services. The report also emphasizes on key adoption trends, future opportunities, and business cases in this innovative market. 


Key Topics Covered: 

1 Introduction

2 Executive Summary

3 Market Ecosystem And Dynamics

4 Oil And Gas Security: Market Size And Forecast, By Security Types And Services

5 Oil And Gas Security: Market Size And Forecast, By Technologies In Exploration And Drilling

6 Oil And Gas Security: Market Size And Forecast, By Technologies In Refining And Storage

7 Oil And Gas Security: Market Size And Forecasts Of Technologies In Pipeline, Distribution, And Transport

8 Oil And Gas Security: Market Size And Forecast, By Professional Services

9 Market Size And Segmentation, By Regions

10 Competitive Landscape

11 Company Profiles


Companies Mentioned:

  • Abb
  • Alstom
  • Bae Systems
  • Booz Allen Hamilton, Inc.
  • Cisco
  • Cnl Software
  • Ekin Technology
  • Hcl
  • Hermes Datacomms
  • Honeywell International, Inc.
  • Industrial Defender
  • Lockheed Martin Corporation
  • Microsoft
  • Motorola
  • Moxa
  • Nice
  • Northrop Grumman Corporation
  • Rae Systems
  • Rapiscan Systems
  • Sharevault
  • Siemens
  • Synectics Industrial Systems
  • Utc
  • Waterfall Security Solutions


For more information visit http://www.researchandmarkets.com/research/cnd7k6/oil_and_gas


Media Contact: Laura Wood, +353-1-481-1716, [email protected]


SOURCE Research and Markets

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...