CHAPTER 1 INTRODUCTION
1.1. Market Definition
1.2. Executive Summary
1.3. The Scope of the Study
CHAPTER 2 RESEARCH METHODOLOGY
2.1. Secondary Research
2.2. Primary Research
2.3. Analytic Tools and Model
2.4. Economic Indicator
2.4.1 Base Year, Base Currency, Forecasting Period
2.5. Expert Validation
2.6. Study Timeline
CHAPTER 3 MARKET ANALYSIS
3.1. Industry Value Chain Analysis
3.2. Porter's Five Force Analysis
3.2.1. Bargaining Power of Buyers
3.2.2. Bargaining Power of Suppliers
3.2.3. Threats of Substitutes
3.2.4. Threats of New Entrants
3.2.5. Degree of Competition
3.3. PESTLE Analysis
3.3.1. Political
3.3.2. Economical
3.3.3. Social
3.3.4. Technological
3.3.5. Legal
3.3.6. Environmental
3.4. SWOT Analysis
3.4.1. Strengths
3.4.2. Weakness
3.4.3. Opportunities
3.4.4. Threats
3.5. Y-O-Y Analysis
CHAPTER 4 MARKET DYNAMICS
4.1. Market Drivers
4.1.1. Growing physical and network attacks
4.1.2. Rising compliances of security and regulations
4.1.3. Scarcity in comprehensive solutions for energy security
4.1.4. Increasing threats from cyber-attacks and terrorists
4.2. Market Restraints & Challenges
4.2.1. Lack of awareness about security implementation by operators
4.3. Market Opportunities
4.3.1. Increased extraction infrastructure & distribution infrastructure
4.3.2. The emergence of new energy markets in developing nations
4.3.3. Rising pipeline infrastructure
4.3.4. Protection of existing energy resources by developed nations
CHAPTER 5 GLOBAL ENERGY SECURITY MARKET – BY TECHNOLOGY AND SOLUTIONS FOR
OIL AND GAS
5.1. Physical Security
5.1.1. Air and Ground Surveillance
5.1.2. Video Surveillance and CCTV
5.1.3. Over and Under Water Surveillance
5.1.4. Fire Detection and Alarm System
5.1.5. Personnel tracking and RFID
5.1.6. Identity and Access Management
5.1.7. Pipeline Management System
5.1.8. Perimeter Fencing
5.1.9. X- Ray Scanning and Screening
5.1.10. Hazmat/ CBRNE
5.1.11. Secure Communications
5.1.12. Biometrics and Card Readers
5.2. Network Security
5.2.1. DDOS
5.2.2. SCADA
5.2.3. Malware/Antivirus
5.2.4. IDS/IPS
5.2.5. Firewall
5.2.6. UTM
5.2.7. Disaster recovery
5.2.8. Security Information and Event Management (SIEM)
5.2.9. Incident Management
CHAPTER 6 GLOBAL ENERGY SECURITY MARKET – BY TECHNOLOGIES AND SOLUTIONS FOR RENEWABLE ENERGY AND POWER SECURITY
6.1. Network Security
6.1.1. Disaster recovery
6.1.2. Malware/Antivirus
6.1.3. Firewall
6.1.4. UTM
6.1.5. Security Information and Event Management (SIEM)
6.1.6. Incident Management
6.1.7. DDOS
6.1.8. IDS/IPS
6.1.9. SCADA
6.2. Physical Security
6.2.1. Identity and Access Management
6.2.2. Microwave Intrusion Detection
6.2.3. Fire Detection and Alarm System
6.2.4. Secured Communication
6.2.5. Perimeter Fencing and IR Fields
6.2.6. Air and Ground Surveillance
6.2.7. Biometrics and Card Readers
CHAPTER 7 GLOBAL ENERGY SECURITY MARKET – BY TECHNOLOGY AND SOLUTION FOR NUCLEAR ENERGY
7.1. Physical Security
7.1.1. Perimeter Fencing and IR Fields
7.1.2. Microwave Intrusion Detection
7.1.3. Video Surveillance and CCTV
7.1.4. Transportation Security (Nuclear Waste and Energy)
7.1.5. Detectors and Access Control
7.1.5.1. Metal Detector
7.1.5.2. Explosive Detector
7.1.5.3. X-Ray Scanning
7.1.5.4. Biometrics and Card Reader
7.1.6. Secure Communication
7.2. Network Security
7.2.1. Malware/Antivirus
7.2.2. Disaster Recovery
7.2.3. Firewall
7.2.4. UTM
7.2.5. Security Information and Event Management (SIEM)
7.2.6. Incident Management
7.2.7. DDOS
7.2.8. IDS/IPS
7.2.9. SCADA
CHAPTER 8 GLOBAL ENERGY SECURITY MARKET – BY TECHNOLOGY AND SOLUTION FOR
THERMAL AND HYDRO POWER
8.1. Network Security
8.1.1. IDS/IPS
8.1.2. SCADA
8.1.3. UTM
8.1.4. Security Information and Event Management (SIEM)
8.1.5. DDOS
8.1.6. Incident Management
8.1.7. Firewall
8.1.8. Disaster Recovery
8.1.9. Malware/Antivirus
8.2. Physical Security
8.2.1. Video Surveillance and CCTV
8.2.2. Microwave Intrusion Detection System
8.2.3. Perimeter Fencing and IR Fields
8.2.4. Secured Communication
8.2.5. Detectors and Access Controls
8.2.5.1. Metal Detector
8.2.5.2. Explosive Detector
8.2.5.3. X-Ray Scanning
8.2.5.4. Biometrics and Card Reader
CHAPTER 9 GLOBAL ENERGY SECURITY MARKET – BY POWER PLANT TYPE
9.1. Oil & Gas Security
9.2. Nuclear Energy Security
9.3. Renewable Energy Security
9.3.1. Solar
9.3.2. Geothermal
9.3.3. Biomass
9.3.4. Tidal
9.3.5. Wind
9.4. Thermal and Hydro Power Security
CHAPTER 10 GLOBAL ENERGY SECURITY MARKET – BY PROFESSIONAL SERVICES
10.1. Managed Services
10.2. Risk Management Services
10.3. System Design, Integration and Consulting
CHAPTER 11 GLOBAL ENERGY SECURITY MARKET - BY GEOGRAPHY
11.1. Introduction
11.2. North America
11.2.1. U.S.
11.2.2. Canada
11.2.3. Mexico
11.2.4. Costa Rica
11.3. South America
11.3.1. Brazil
11.3.2. Argentina
11.3.3. Chile
11.3.4. Columbia
11.3.5. Others
11.4. Europe
11.4.1. U.K.
11.4.2. Germany
11.4.3. France
11.4.4. Italy
11.4.5. Spain
11.4.6. Russia
11.4.7. Netherlands
11.4.8. Switzerland
11.4.9. Poland
11.4.10. Others
11.5. Asia Pacific
11.5.1. China
11.5.2. Japan
11.5.3. India
11.5.4. South Korea
11.5.5. Australia & New Zealand
11.5.6. Malaysia
11.5.7. Singapore
11.5.8. Others
11.6. Middle East & Africa
11.6.1. UAE
11.6.2. Saudi Arabia
11.6.3. Iran
11.6.4. Iraq
11.6.5. Qatar
11.6.6. South Africa
11.6.7. Algeria
11.6.8. Morocco
11.6.9. Nigeria
11.6.10. Egypt
11.6.11. Others
CHAPTER 12 GLOBAL ENERGY SECURITY MARKET - COMPANY PROFILES
12.1. BAE Systems PLC
12.2. Raytheon Company, Inc.
12.3. Elbit Systems Ltd.
12.4. Cassidian SAS
12.5. Aegis Defense Services Limited
12.6. ABB Ltd
12.7. Telefonaktiebolaget L. M. Ericsson
12.8. Northrop Grumman Corporation
12.9. QinetiQ Group PLC
12.10. Lockheed Martin Corporation
12.11. Intergraph Corporation
12.12. Honeywell International Inc.
12.13. FLIR Systems, Inc.
12.14. Thales S.A.
12.15. Siemens AG
CHAPTER 13 GLOBAL ENERGY SECURITY MARKET - COMPETITIVE LANDSCAPE
13.1. Market Share Analysis
13.2. Strategies adopted by top companies
13.3. Mergers, Acquisitions, Collaborations & Agreements
CHAPTER 14 MARKET INSIGHTS
14.1. Industry Experts Insights
14.2. Analysts Opinions
14.3. Investment Opportunities
CHAPTER 15 APPENDIX
15.1. List of Tables
15.2. List of Figures