weekly barometer
play

Weekly Barometer 25 janvier 2012 2 Investment Case Like many - PowerPoint PPT Presentation

Weekly Barometer 25 janvier 2012 2 Investment Case Like many other industries, security is in the early stages of its digital and tech transformation thanks to innovations in artificial intelligence, robotics and augmented reality


  1. Weekly Barometer 25 janvier 2012

  2. 2 Investment Case ➢ Like many other industries, security is in the early stages of its digital and tech transformation thanks to innovations in artificial intelligence, robotics and augmented reality ➢ This tech upgrade cycle gives confidence that the current capex and government spending momentum will last several years and that private contractors will keep delivering above-consensus revenue and earnings growth ➢ Space exploration could be another major source of upside for private contractors as the US plans missions to the Moon and beyond and as the new NASA Administrator is a proponent of outsourcing some of the NASA’s operations to the private sector ➢ Government-led space exploration will also give a boost to commercial space in the medium term ➢ Civil security will be in the spotlight as the Internet of Things opens the way to new cyber attacks and as smart cities become reality, pointing to strong demand for smart devices, inspection and detection systems and cyber security Security & Space Certificate details ✓ Issuing bank: Natixis, Calculation agent: Natixis SA ✓ ISIN: XS1317057278 ✓ Currency: USD ✓ Fees: 1.65% management fee + 15% performance fee, high water mark ✓ Bloomberg ticker: NXSRGDEF

  3. 3 New Generation Space Technologies Security Biometrics & Devices CyberSecurity Smart Cities & Homes

  4. 4 Security: A Major Tech Upgrade Cycle Is On Its Way ➢ With the rise of Internet of Things, security threats will only keep growing and society will have to adapt ➢ Against this backdrop, companies are investing in new technologies that identify, analyze and process threat-related data Authentication Network security Data encryption Threat prediction Devices installation Data analytics

  5. 5 The Rise Of Smart And Safe Cities (I) ➢ Thanks to the Internet of Things and Artificial Intelligence, smart cities are about to become reality ✓ Traffic and parking space management, safety and law enforcement and smart grids will be in the spotlight

  6. 6 The Rise Of Smart And Safe Cities (II) CYBERSECURITY FACIAL RECOGNITION BODY-WORN CAMERAS SMART HOME CAMERAS SECURITY CAMERAS/ VIDEO ANALYTICS SENSORS AND DRONES

  7. 7 Biometrics To Identify, Target and Protect ➢ Biometrics uses facial image, fingerprint, iris, DNA or voice pattern to identify individuals ✓ Biometrics has many applications : Opening one’s house door Accessing devices Accessing corporate buildings Unlocking car doors

  8. 8 The Internet of Things Opens the Way to New Cyber Attacks ➢ All connected devices and systems will be exposed to security threats ➢ Attacks on the IoT will hit healthcare, financial services, manufacturing … 50% of new business processes and systems will include an IoT component by 2020 (source: Gartner) ATTACKS Controls for smart doors Take control Steal information Disrupt services locks or lighting systems can be vulnerable Pacemakers can be attacked remotely Infotainment systems are exposed to threats

  9. 9 Cyber Security: A Major Action Field For Both States And Corporations ➢ The cyber security market is expected to grow from USD122bn in 2016 to USD202bn by 2021, a 10.6% CAGR (Source: Research and Markets) ➢ How to protect against cyber attacks? Authentication security Data encryption Robust authentication mechanisms Data encryption translates data into such as two-factor authentication, another form, or code, so that only digital certificates and biometrics people with a secret key can access Data analytics Network security Security features such as antivirus and Collecting and monitoring data antimalware as well as firewalls and to build predictive and anomaly detection models intrusion prevention and detection systems

  10. 10 Cybersecurity Spending To Get A Boost From Regulations ➢ All companies involved in the digital transformation will have to reach a standard of protection ➢ Two directives are boosting cybersecurity requirements in the European Union

  11. 11 Space Tech: From Next-Gen Satellites To Space Tourism ➢ Space discovery is no longer a sleepy dream, but a major global challenge for the emancipation of digitalization and interconnection Space-Based Laser – Stratobus – project for 2020: half intercepts missiles or destroys satellites satellite and half drone (Thales) NASA's Mars InSight Lander

  12. 12 Space Exploration Enters Into Its Next Chapter ➢ During the Cold War, the US and the Soviet Union used space exploration to: Demonstrate Develop security technological applications advantage ➢ The return to the Moon and the potential first journey to Mars planned by the US are intended to Ensure the survival of the human species Better understand our planet Get some hints about the origin of life

  13. 13 Space Exploration A Major Source Of Revenue For Private Companies ➢ The NASA budget is expected to balloon over the years to fund these new space missions ➢ Importantly, the NASA is expected to develop public-private partnerships with the likes of: Dragon V2 , a new version of CST-100 Starliner is planning to fly the spacecraft, will take for the first time NASA astronauts astronauts to the space station to the ISS by December 2018 (Northrop Grumman) Cygnus spacecraft is on its way to the International Space Station

  14. 14 Commercial Space To Develop In The Medium Term: Space Tourism First Georges Whitesides, CEO Virgin Galactic Blue Origin (Jeff Bezos) is developing the New Shepard to enable short- duration space tourism Virgin Galactic (Richard Branson) provides suborbital spaceflights to space tourists SpaceX CEO Elon Musk shared a picture of his company’s new space suits

  15. 15 Asteroid Mining Will Fuel Travel Within Space: A Modern Day Gold Rush

  16. 16 Satellites Make The Link Between Space And Earth ➢ Space exploration is a source of innovations in the fields of healthcare , materials , robotics and transportation systems ➢ But also remains important in defense-related fields such as aeronautics and IT & Telecoms (satellites) ➢ Satellites appear as a major actor in the global security value chain, creating the fundamentals for telecommunication technologies Satellites have four major roles

  17. 17 Security And Innovation Share A Common History (I) ➢ Many civilian technologies and innovations find their roots in security Research. The CIA has its own venture capital company that invests in Silicon Valley start-ups (Q-Tel) I nnovation

  18. 18 Security And Innovation Share A Common History (II) The first automatic injection The military played a role device, the ComboPen , was in the development of invented in the 70s for a military vaccines in order to fight use. The civil device to treat epidemics allergic reaction, the Epipen , was approved in 1987 by the FDA Medical Technologies The first blood bank was The Defense Advanced created in 1917 for the US Research Projects Agency Army Medical Corps . Blood ( DARPA ), responsible for could be stored and used in the development of military battlefield surgery. It paved the technologies, has been way for modern blood storage working for years on techniques Exoskeletons

  19. 19 Conclusion: Innovation At The Heart Of Security And Space ➢ Innovation at the service of security and public safety ✓ Real time surveillance & smart cities ✓ Cybersecurity & biometrics ✓ Security of IoT devices ✓ 5G ➢ Technology as a driver of space exploration ✓ Outer Space Discovery ✓ Connectivity ✓ Reconnaissance ✓ Satellites & telecommunications

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend