+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity in Consumer Goods - Thematic Research

  • PDF Icon

    Report

  • 60 Pages
  • June 2022
  • Region: Global
  • GlobalData
  • ID: 5640098
This report analyzes the role of cybersecurity in the consumer goods sector. It offers an in-depth study of the cybersecurity value chain, before discussing the threat landscape facing consumer goods companies and the technologies they should invest in to prevent and mitigate the damage of cyberattacks. The report also assesses the state of the cybersecurity market by analyzing the jobs, filings, social media activity, M&A deals, and partnerships pertaining to both cybersecurity and the consumer sector.

Cybersecurity is more important than ever for the consumer goods sector as cyberattacks become more frequent. The pandemic caused consumer goods companies to accelerate the digitalization of their business operations, support remote working, and cater for growing ecommerce purchases. All of these changes made consumer goods companies more vulnerable to cyberattacks. Although consumer goods companies are investing more in cybersecurity, cybersecurity’s importance is typically underestimated in these companies’ materiality assessments. Moreover, none of the ten largest consumer goods companies have appointed a Chief Information Security Officer (CISO) to the board. Operational technology (OT) such as assembly line robots represents a particularly severe vulnerability for most consumer goods companies.

Scope

  • The ways in which consumer goods companies adapted to the pandemic have also made them more vulnerable to cyberattacks. As cyberattacks have become more frequent and more damaging over the last two years, consumer goods companies’ investments in cybersecurity have grown.
  • In 2021, the vulnerability of modern operational technology (OT) in particular was made clear by high-profile attacks on SolarWinds and Colonial Pipeline.
  • Securing OT environments will be a particularly important investment for consumer goods companies to make in the near future.

Reasons to Buy

  • Understand the cybersecurity value chain.
  • Identify the key specialist vendors and industry adopters of cybersecurity in the consumer goods sector.
  • Discover the threats facing the consumer goods sector, and how cybersecurity can alleviate them.

Table of Contents

  • Executive Summary
  • Cybersecurity Value Chain
  • Consumer Goods Challenges
  • The Impact of Cybersecurity on Consumer Goods
  • Case Studies
  • Data Analysis
  • Companies
  • Sector Scorecard
  • Glossary
  • Further Reading
  • Our Thematic Research Methodology
  • About the Publisher
  • Contact the Publisher

Companies Mentioned (Partial List)

A selection of companies mentioned in this report includes, but is not limited to:

  • 1Password
  • Accenture
  • Airbus (Stormshield)
  • Akamai
  • Alert Logic
  • Alibaba
  • Alphabet (Google)
  • Alphabet (Siemplify)
  • Amazon
  • AMD
  • Analog Devices
  • AnyVision
  • Appgate
  • Apple
  • Applied Risk
  • Aqua Security
  • Arcon
  • Area 1 Security
  • Armis Security
  • AT&T
  • Atos
  • Attivo Networks
  • Autorabit
  • Auvesy
  • Avatier
  • Aware
  • BAE Systems
  • Baidu
  • Barracuda
  • Barracuda Networks
  • BeyondTrust
  • BioEnable
  • Blackberry
  • BMC Helix
  • Broadcom
  • BT
  • Cadence Design Systems
  • Capgemini
  • Cardonet
  • Cato
  • Check Point Software
  • Checkmarx
  • China Telecom
  • China Unicom
  • CipherCloud
  • Cisco
  • Claroty
  • Clear Secure
  • Clearview
  • Cloudanix
  • Cloudcheckr
  • Cloudera
  • Cloudflare
  • CloudPassage
  • CMITech
  • Coca-Cola
  • Code42
  • Cognitec
  • Cognizant
  • Colgate-Palmolive
  • Contrast Security
  • Copado
  • CrowdStrike
  • CyberArk
  • Cyberbit
  • Cybereason
  • CyCognito
  • Cynet
  • D3 Security
  • Danone
  • Darktrace
  • Dashlane
  • Delinea
  • Dell Technologies
  • Deloitte
  • Deutsche Telekom
  • Dragos
  • Duo Security
  • DXC Technology
  • ekey
  • Epsilon
  • Equifax
  • Ermetic
  • Exabeam
  • Expanse
  • Extreme
  • EY
  • Eyelock
  • F5 Networks
  • Flosum
  • Forcepoint
  • Forescout
  • ForgeRock
  • Fortinet
  • Foxpass
  • Fugue
  • Fujitsu
  • GitLab
  • GlaxoSmithKline
  • HCL Technologies
  • Helpsystems
  • Herjavec Group
  • HID Global
  • Hitachi
  • Horizon Robotics
  • HPE
  • Huawei
  • IBM
  • IBM (Red Hat)
  • Idemia
  • iFlytek
  • Illumio
  • Ilumio
  • Impulse
  • Informatica
  • Infosys
  • Innovatrics
  • Intel
  • Invicti
  • iProov
  • Iris ID
  • IriusRisk
  • Ironscales
  • Ivanti
  • Ivanti (MobileIron)
  • Johnson & Johnson
  • Juniper Networks
  • Kairos
  • Kapersky Labs
  • Kellogg's
  • KnowBe4
  • KPMG
  • Kraft Heinz
  • KT
  • Lacework
  • LastPass
  • Lockheed Martin
  • LogMeIn
  • LogMeOnce
  • Logrhythm
  • Lookout
  • Lumen Technologies
  • ManageEngine
  • Marvell
  • Megvii
  • Mentor Graphics
  • Micro Focus
  • Micron Semiconductor
  • Microsoft
  • Mimecast
  • Mondelez
  • Nagios
  • NCC
  • Nestle
  • Netskope
  • Nokia
  • NordPass
  • Northrop Grumman
  • Nozomi Networks
  • NTT Data
  • NXP Semiconductors
  • NXT-ID
  • Okta
  • Okta
  • Onapsis
  • One Identity
  • OneLogIn
  • OneSpan
  • OneTrust
  • Oracle
  • Orange
  • Orca Security
  • P&G
  • Palantir
  • Palo Alto Networks
  • PDI Software
  • PepsiCo
  • Perimeter 81
  • Philips
  • Ping Identity
  • Portnox
  • Preciate.me
  • Proofpoint
  • PwC
  • Qualys
  • Rapid7
  • Raytheon BBN
  • Raytheon Technologies
  • RedSeal
  • Renesas
  • Resolver
  • Rhebo
  • RSA
  • Ruckus
  • SAIC
  • SailPoint Technologies
  • Samsung Electronics
  • Sangfor Technologies
  • SecureAuth
  • SecureOne
  • Secureworks
  • Securonix
  • SenseTime
  • SentinelOne
  • Singtel (Trustwave)
  • Skybox Security
  • Skyhigh Security
  • Snyk
  • Softbank (Arm)
  • SonicWall
  • Sophos
  • Splunk
  • STMicroelectronics
  • Sumo Logic
  • Swimlane
  • Synopsys
  • Tanium
  • Tata Consultancy Services
  • Tech Mahindra
  • Tech5
  • Telstra
  • Tenable
  • Tessian
  • Thales
  • ThreatConnect
  • Threatmetrix
  • Threatmodeler
  • TitanHQ
  • TrapX
  • Trellix
  • Trellix
  • Trellix (Mandiant)
  • Trend Micro
  • TrueFace.AI
  • Unilever
  • Untangle
  • Veracode
  • Verizon
  • Versa
  • VMware
  • VMware
  • WatchGuard
  • WhiteHat Security
  • Wipro
  • Yubico
  • Zscaler