Utility companies will spend $21 billion by 2015 to improve cybersecurity for the world’s electrical smart grid, according to a report by Pike Research. Ubiquitous electricity has served as the foundation for numerous technological innovations in the modern world, but the electrical grid itself is based on decades-old technology and has suffered from low levels of investment for many years. Now, however, governments and industry leaders are coming together with newfound urgency to drive an overhaul of grid infrastructure and according to Pike Research, these efforts will yield cumulative global spending of $200 billion on smart grid technologies during the period from 2008 to 2015.
“Smart meters are currently the highest-profile component of the Smart Grid, but they are really just the tip of the iceberg,” says managing director Clint Wheelock. “Our analysis shows that utilities will find the best return on investment, and therefore will devote the majority of their capital budgets, to grid infrastructure projects including transmission upgrades, substation automation, and distribution automation.”
Pike Research forecasts that these grid automation initiatives will capture 84% of global Smart Grid investment through 2015, compared to just 14% for advanced metering infrastructure (AMI) and 2% for electric vehicle management systems. The cleantech market intelligence firm also anticipates that Smart Grid revenues will peak in 2013 after several years of a strong push by key governments, and will thereafter be a smaller, albeit still very substantial, market.
Pike Research’s report, “Smart Grid Technologies”, analyzes the global market opportunity for Smart Grid technologies and applications. The report examines utility business models, regulatory factors, technology issues, and the dynamics of end-user demand. It includes profiles and analysis of 70 key players in the rapidly evolving Smart Grid industry ecosystem, as well as detailed global market forecasts through 2015, segmented by region and application. An Executive Summary of the report is available to Security Bloggers for free download at www.pikeresearch.com