Security technologies applied in biotechnology

Page 1

SECURITY TECHNOLOGIES IN BIOTECHNOLOGY – MARKET SIZE & OPPORTUNITIES Scope of the Study This report on Security Technologies in Biotechnology gives a market insight into technology types for various biotechnology applications. Technologies include Holograms, Barcodes, RFID, Biometrics, Information Security, and Patents for Food, Biopharmaceuticals, and Biodefense applications. Market projections and estimates are illustrated by region and by type/applications. The report serves as a guide to Security Technology industry for biotechnology applications, covering more than 350 companies that are engaged in security technology/products and services. Major Research Institutes and Universities serving the security technology industry are also covered in the corporate directory section of this report. Information related to recent product releases, product developments, partnerships, collaborations, and mergers and acquisitions is covered in the report. Compilation of Worldwide Patents related to security technology products/services/technology for biotechnological applications is also provided. A global perspective is presented along with regional analysis covering the regions of North America, Europe, AsiaPacific, and Rest of World with 133 exclusive graphically represented exhibits. Security Technologies in Biotechnology report is an ideal research tool providing strategic business intelligence to the corporate sector. This report may help strategists, investors, laboratories, pharmaceutical companies, contract research organizations, biotechnology companies and drug approval authorities in-

Gauging Competitive Intelligence

Identifying Key Growth Areas and Opportunities

Understanding Geographic Relevance to Product

Knowing Regional Market Sizes and Growth Opportunities and Restraints

Keeping Tab on Emerging Technologies

Equity Analysis

Tapping New Markets

Analytics and data presented in this report pertain to several parameters such as – 

Global and Regional Market Sizes, Market Shares, Market Trends

Product (Global and Regional) Market Sizes, Market Shares, Market Trends

Technology Trends

Corporate Intelligence

Key Companies by Sales, Brands, Products

Consumer Behavioral Patterns

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 1


Other Strategic Business Affecting Data

Research Methodology RI Technologies publishes business intelligence reports by going through a cycle of diligent research and analysis activity. Research is done using both online and offline resources. The study outline of this report is sketched on the following lines – global market analysis, regional market analysis, product segmentation, global and regional market analysis by product segment, market trends, M&A, R&D, competitive landscape, technology trends, and other key drivers. Current data helps in analyzing the future of the industry and is also helpful for doing market evaluations, and estimating the market size for the future.

This report is uniquely researched and the methodology includes: 

Need and Scope of Study

Product Definitions

Segmental Analysis

Regional Analysis

Exclusive Data Analytics

Corporate Intelligence

Feedback

Right from concept to final compilation of this report, both primary and secondary research methods are applied. We have provided exclusive feedback forms/pre-release questionnaires for this report to use the information for authentication of our own findings. Secondary research includes government publications, investment research reports, web based surveys, website information of both companies and markets, and other offline resources such as print publications and CDs. Our compilation of easy to navigate PDF reports are essential value addition resources for leading and growing companies.

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 2


CHAPTER II - REPORT SYNOPSIS Security technologies include protection of secret messages and guarding of products and people against counterfeiting and impersonation. Steganography and cryptography are concerned with hiding information, while holography, barcoding and retinal scanning are techniques developed for combating counterfeiting and impersonation.

Protection Protection of secret messages Steganography: The art and science of writing hidden or covered messages is referred as steganography. In steganography the visible apparent message is referred to as the cover text, which may be depicted as a picture, a list, an article etc. The hidden message may be in the form of invisible ink interpolated between the visible lines of the document. Prior to the development of cryptographic techniques, steganography was popular and widely used in ancient times, though the method had certain drawbacks. Herodotus, the Greek Historian of 5th century BC and regarded as Father of History, cited two examples of steganography in his treatise ‘The Histories of Herodotus’. Wax tablets are wooden planks coated with wax and were used for writing with stylus in those times. In fact, Demeratus sent a message about the anticipated attack on Greece by writing on a wooden plank and covering with wax to conceal the message. Histiaeus, a tyrant of Miletus, in 6th century BC, used steganography in a peculiar way. He tattooed a message on the head of a slave, and this message was concealed when the hair grew. The slave was sent to his son-in-law Aristagoras, who shaved the slave’s head to read the message that conveyed the instructions to revolt against Persians. Johannes Trithemius, who was an occult and abbot of Germany, wrote a book known as Steganographia in 1499. This book was earlier considered to be about black magic, but later on found to be about steganography and cryptography. Cryptography: Cryptography is the science of hiding information. Encryption has been in vogue right from ancient times, but was used earlier only by individuals and organizations that had the necessity. Encryption and decryption of secret messages played vital role in World War II, and many of the methods to produce them were kept highly confidential. The application of cryptography for public utility purposes emerged only after US Data Encryption Standard and public key cryptography were introduced. The one-time pad is an encryption algorithm. In this method of encryption, the plain text is combined with a random key or pad of equal length and is used only once. Only the persons who possess the key would be able to differentiate the cipher [hidden] texts from random [normal] texts. Nowadays, in the majority of cryptosystems, private symmetric session keys are made perfectly random. [In symmetric session, same key is used for encryption and decryption]. Therefore, even in weak ones [shorter than 128 bits], the messages are safely concealed.

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 3


Segmentation Exhibit 1. Segmentation of Security Technologies in Biotechnology Market by Technology and Application Technology

Application

Hologram

Food

Barcodes

Biopharmaceuticals

RFID

Biodefense

Biometrics

Other

Patents Other © RIT, 2013

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 4


Global Market Analysis Global Security Technologies in Biotechnology market is projected to reach about US$ XX.XX billion by 2020 from an estimated US$ XX.XX billion in 2012, growing at a very high compounded annual growth rate (CAGR) of XX.XX % during the analysis period 2005-2020. Exhibit 2. Security Technologies in Biotechnology – Global Value Market Estimations and Predictions (2005-2020) in US$ Billion Year

Value

2005

XX.XX

2006

XX.XX

2007

XX.XX

2008

XX.XX

2009

XX.XX

2010

XX.XX

2011

XX.XX

2012

XX.XX

2013

XX.XX

2014

XX.XX

2015

XX.XX

2016

XX.XX

2017

XX.XX

2018

XX.XX

2019

XX.XX

2020

XX.XX

CAGR %

XX.XX

© RIT Figures, 2013

US$ Billion

2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 5


III. MARKET DYNAMICS

Global Market for Security Technologies in Biotechnology Global market for Security Technologies in Biotechnology is projected to reach US$XX.XX billion by 2020 from an estimated US$ XX.XX billion in 2012, registering a CAGR of XX.XX % during the analysis period 20052020. The United States market for Security Technologies in Biotechnology was estimated at US$ XX.XX million in 2012 and is projected to reach about US$ XX.XX billion in 2020. Growing at a CAGR of XX.XX % during the period 2005-2020, the US is further projected to retain the leading position. The US also represents the fastest growing market during the same analysis period. Europe represents the second largest market for Security Technologies in Biotechnology. European market was estimated at US$ XX.XX million in 2012 and is projected to attain the value of US$ XX.XX billion by 2020.

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 Š RI Technologies - www.researchimpact.com Sample Page - 6


Exhibit 3. Security Technologies in Biotechnology - Global Value Market Estimations and Predictions (2005-2020) by Geographic Region for North America, Europe, Asia-Pacific and Rest of World in US$ Million Year/Region

North America

Europe

Asia-Pacific

Rest of World

Total

2005

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2006

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2007

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2008

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2009

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2010

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2011

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2012

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2013

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2014

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2015

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2016

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2017

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2018

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2019

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2020

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

CAGR%

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

© RIT Figures, 2013

US$ Million

2005

2006

2007

2008

North America

2009

2010

2011

Europe

2012

2013

2014

2015

Asia-Pacific

2016

2017

2018

2019

2020

Rest of World

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 7


Exhibit 4. Security Technologies in Biotechnology - Global Value Market Shares (2010, 2015 & 2020) by Geographic Region for North America, Europe, Asia-Pacific and Rest of World Year/Region

North America

Europe

Asia-Pacific

Rest of World

Total

2010

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2015

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2020

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

CAGR%

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

© RIT Figures, 2013

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 8


Global Market for Holograms in Biotechnology Global market for Holograms in Biotechnology is projected to reach US$XX.XX billion by 2020 from an estimated US$ XX.XX billion in 2012, registering a CAGR of XX.XX % during the analysis period 2005-2020. The United States market for Holograms in Biotechnology was estimated at US$ XX.XX million in 2012 and is projected to reach about US$ XX.XX billion in 2020. Growing at a CAGR of XX.XX % during the period 20052020, the US is further projected to retain the leading position. The US also represents the fastest growing market during the same analysis period. Europe represents the second largest market for Holograms in Biotechnology. European market was estimated at US$ XX.XX million in 2012 and is projected to attain the value of US$ XX.XX billion by 2020. Exhibit 5. Holograms - Global Value Market Estimations and Predictions (2005-2020) by Country for North America, Europe, Asia-Pacific and Rest of World in US$ Million Year/Region

North America

Europe

Asia-Pacific

Rest of World

Total

2005

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2006

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2007

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2008

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2009

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2010

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2011

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2012

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2013

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2014

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2015

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2016

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2017

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2018

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2019

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2020

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

CAGR%

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

© RIT Figures, 2013

US$ Million

2005

2006

2007

2008

North America

2009

2010

2011 Europe

2012

2013

2014

2015

Asia-Pacific

2016

2017

2018

2019

2020

Rest of World

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 9


Exhibit 6. Holograms - Global Value Market Shares (2010, 2015 & 2020) by Country for North America, Europe, Asia-Pacific and Rest of World Year/Region

North America

Europe

Asia-Pacific

Rest of World

Total

2010

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2015

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

2020

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

CAGR%

XX.XX

XX.XX

XX.XX

XX.XX

XX.XX

© RIT Figures, 2013

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 10


IV. PRODUCT/TECHNOLOGY RESEARCH Need for Security System Industrial espionage created panic among the companies that promote biotechnology research and development. Certain outcome of commendable research works by brilliant scientists helps to save millions of lives, and eventually brings tremendous monetary benefits to the companies that promote the research works. However, a small information leakage or a single process error may cause catastrophe. This has driven the companies to search for proper security with best access control and monitoring system. Especially, when a company shifts its employees from a multi-tenant building to its own premises, security becomes a top priority.

Aspects of Security System The security system involves the following aspects: 1. Conforming to the universal regulations and ensuring the safety of employees. 2. Protection to people, and not to the products and intellectual property alone. 3. Not corporate security, but company security; voice, physical, product and data security. Many companies adopt different security standards for various purposes. There is a rising importance for security of a company and hence the budgets for the same grew dramatically in the past few years. Security is a concern also for the pharmaceutical companies and for efficient security, sophisticated instruments play a vital role. Security is divided into various fragments such as, physical security, IT, business continuity, crisis management, contingency planning etc., but a comprehensive security needs to be in place for efficient and effective security management. Standard organizations may take up wholesome responsibilities for developing a worldwide security policy, strengthening infrastructure, offering IT security, preventing employee theft, creating security awareness among employees by proper training strategies, risk management, and overall crisis management.

Cost of Security System The expense for the security is dependent on the company’s objective. The overall cost for security has increased over the years, and is expected to further increase on par with the growth of the pharmaceutical companies. Therefore, a standard code of security is suggested to the pharmaceutical industries to save expenditure in this regard. Though several security organizations meet at occasions, common security strategies to be adopted are never discussed, and problems associated with them are not solved. Therefore, a need for such facility is felt to improve the overall efficiency of security systems.

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 Š RI Technologies - www.researchimpact.com Sample Page - 11


Security System for Pharmaceutical Companies Generally, the physical security is quite adequate in all pharmaceutical companies, though the standard and level may vary. Designing proprietary system, services, and technologies helps in the speedy production of new medicines. Scientists opine that integration of novel fluorescence chemistry, molecular biology, nanotechnology, informatics, and automation reduce the time taken for identifying compounds that are incorporated into the novel drugs. This indicates that the security system should be tightened at different levels in order to ensure the integrity of production processes of such novel drugs.

Problem of Counterfeit Medicines Counterfeit medicine poses a big health hazard to the public and is presently a worldwide problem. The counterfeit medicines simulate genuine medicines in the way they are packed either in the form of tablets or capsules. They do not actually contain the proper effective ingredients, and, on the contrary, may contain toxic components. Occasionally such counterfeit medicines contain active ingredients, though they are high quality fakes. But, still, they are unreliable because their basic source is illegal and uncertain, and deserve to be discouraged. Virtually, medicines for any ailment have been forged. Fake medicines are produced illegally for cancer, hypertension, and pain. Forged antibiotics, cholesterol reducing drugs, hormones, steroids, and antihistamines are all available in the market. This situation is especially true for developing countries, where counterfeited medicines are illegally marketed even for life threatening diseases such as AIDS, malaria, and tuberculosis. Regular therapeutic use of such substandard or harmful medicines may lead to drug resistance or even death. Therefore, an urgent necessity is to take stringent security measures to curtail the manufacture of counterfeit medicines.

About RI Technologies RI Technologies is a premier source of market research on the Biotechnology & Healthcare sector. We emphasize on factual insights and forecasts with maximum global coverage. RI Technologies is constantly monitoring the biotechnology & Healthcare industry, tracking market trends, and forecasting industry based on specialized analysis. The life sciences sector is an ever growing marketplace with emerging technologies in areas of discovery, design and development.

Research – As Good as the Methodology is! 

Gauging Competitive Intelligence

Identifying Key Growth Areas and Opportunities

Understanding Geographic Relevance to Product

Knowing Regional Market Sizes and Growth Opportunities and Restraints

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 12


Keeping Tab on Emerging Technologies

Equity Analysis

Tapping New Markets

© COPYRIGHT The copyright and publication rights to all RI Technologies' reports and other products are the property of the company. Plagiarism of any kind accounts to violation of copyright laws. Any type of reproduction of the material without express permission is not allowed. The buyer, under no circumstances, shall license, resell or repackage, or sell data without prior permission of the company.

DISCLAIMER RI Technologies sells content in good faith. The company is not liable to the buyer for any implications arising out of the usage of data for any particular purpose. The company makes no representations or warranties for the accuracy or completeness of the data. While extreme caution and effort is practiced for data compilation and presentation, the company does not accept any responsibility for findings in the study which are a cumulative effort of primary and secondary research resources. The studies do not endorse or promote any product or company. RI Technologies, its affiliates, partners, distributors, and contractors are not liable for inaccuracies or incompleteness of the reports. User discretion is recommended for the usage of the data.

RITMIR040: Security Technologies in Biotechnology – A Market Insight Report, July 2013 © RI Technologies - www.researchimpact.com Sample Page - 13


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.