logo
Data diode market to reach USD $919.29 million by 2034

Data diode market to reach USD $919.29 million by 2034

Techday NZ18-06-2025
The data diode market is projected to reach USD $919.29 million by 2034, with a compound annual growth rate (CAGR) of 7.0% from 2025 to 2034, according to research by Polaris Market Research.
Data diodes are specialised hardware devices that enforce a unidirectional flow of data between networks, typically from a secure internal network to a less secure external one. Unlike software-based gateways and firewalls, which can be susceptible to cyber threats, data diodes provide a physical layer of security, making them ideal for environments that require strict separation and regulatory compliance.
Once largely employed within military and critical infrastructure environments, data diodes now see adoption across an increasing range of sectors, including finance, healthcare, manufacturing, and energy, where sensitive and mission-critical information must be robustly safeguarded.
Market developments
The Polaris Market Research report values the data diode market at USD $467.66 million in 2024 and projects growth to USD $919.29 million by 2034. SMEs are expected to experience heightened adoption of data diodes, as they too are now targets of cyberattacks that formerly affected primarily large enterprises. The Asia Pacific region is forecast to see pronounced growth, driven by ongoing industrialisation and escalating cyber risk.
Multiple factors are expected to fuel wider adoption of data diodes. The report notes, "There has been a significant rise in ransomware attacks, cyber espionage, and nation-state threats targeting critical infrastructure. This has prompted organisations to actively seek solutions that offer zero-attack surfaces. Data diodes act as a physical barrier to unauthorised access, which effectively eliminates pathways for cyber intrusions into sensitive networks."
The integration of operational technology (OT) with information technology (IT) through the Industrial Internet of Things (IIoT) also raises the risk of cyber vulnerabilities. According to the research, "Data diodes offer an effective way to transfer sensor data from OT systems to IT platforms without making the system vulnerable to backflow attacks."
Furthermore, governments globally are enforcing tighter cybersecurity regulations, especially in industries such as finance, defence, and energy. The report notes, "Data diodes help entities comply with these regulations by preventing data tempering and ensuring secure audits."
There is also a trend towards greater use in critical infrastructure sectors. The report highlights, "Data diodes are being increasingly deployed in power plants, water treatment facilities, and transportation networks to protect them from cyber threats. These devices ensure continued operations by preventing data leakage or malware infiltration while still enabling outbound communication."
Data diode types and trends
Data diodes come in various forms according to use case and integration requirements, including hardware-based, software-assisted, and virtual data diodes.
Hardware-based data diodes employ physical limitations, such as optical fibres or digital circuits, to guarantee one-way transfer. This makes them resistant to hacking, malware, and configuration errors. Software-assisted diodes reinforce hardware controls with software layers to support a broader array of protocols and data formats. Virtual data diodes, intended for situations where physical separation is impractical, simulate one-way data flow but offer a lower security assurance compared to hardware-based alternatives.
The study identifies several emerging trends in the sector. There is increasing miniaturisation of data diode units, leading to more portable and compact solutions suitable for mobile or small-scale applications. Modern units have become protocol-agnostic, supporting diverse industrial and IT protocols to facilitate broader network deployment. There is also enhanced integration with security operations centres (SOCs); data diodes are now used to securely transmit logs and alerts, shielding source systems from exposure.
Cloud connectivity has become another focal area. With the proliferation of cloud adoption, manufacturers are working to ensure data diodes can provide safe outbound connectivity for the transfer of information to cloud services, permitting companies to make use of cloud analytics without increasing vulnerability to inbound threats.
Regulatory and infrastructure considerations
Regulatory compliance remains a crucial driver for data diode adoption, particularly in scenarios where information integrity and auditability are paramount. The physical enforcement of one-way data communication contributes to meeting stringent sector-specific requirements.
The ongoing digital transformation across industries, with the convergence of OT and IT, increases the need for robust security controls. Data diodes are positioned to become integral in strategies to safeguard industrial operations and infrastructure from ever-evolving cyber threats. As the frequency and sophistication of cyberattacks increase, the demand for high-assurance network protection technologies like data diodes is gaining momentum. These devices offer unparalleled security through the physical enforcement of one-way communication, making them crucial for sectors that need high confidentiality and regulatory compliance. With ongoing advancements in protocol support and integration capabilities, the data diode market is poised to witness sustained growth in the coming years.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Bebop reaches USD $1.2 million ARR in 45 days with SME focus
Bebop reaches USD $1.2 million ARR in 45 days with SME focus

Techday NZ

time19 hours ago

  • Techday NZ

Bebop reaches USD $1.2 million ARR in 45 days with SME focus

Bebop, an AI-driven sales enablement product developed by Black Pearl Group, has recorded USD $1.2 million in annual recurring revenue (ARR) within 45 days of its market launch. The announcement highlights Bebop as being the fastest-growing product in the company's portfolio, reaching its ARR milestone at twice the speed set by Pearl Diver, another product from the same company that attained USD $10 million in ARR over 24 months. Access for SMEs According to Black Pearl Group, many small and medium-sized enterprises (SMEs) have traditionally found themselves excluded from access to high-quality sales intelligence due to the cost and scale of established platforms such as ZoomInfo, Clearbit, and Apollo. Bebop is intended to address this gap. The company reports that Bebop provides rapid access to highly targeted lists of verified decision-makers at millions of US-based companies, supported by personalised strategic dossiers. Nick Lissette, Chief Executive Officer, commented on the product's rapid uptake: "Bebop is like ChatGPT, but specifically built for sales and revenue growth. This is one of the fastest go-to-market trajectories we've seen across the SaaS and AI landscape, and customers have rapidly validated our value proposition. We hit it out of the park with Pearl Diver, so it's extremely exciting to see Bebop overtake its impressive early adoption. Bebop's traction validates our core thesis: that speed, usability, and value drive adoption. And our platform was built to scale these advantages, fast" Positioned on cost The company states that Bebop delivers sales intelligence tools similar in function to existing enterprise solutions but is priced to make such tools accessible to SMEs. This approach, Black Pearl Group claims, meets growing demand for AI-based and cost-effective sales applications tailored to SME needs. Lissette further said, "There's rising demand for AI-native, cost-effective sales tools that solve real SME challenges. With Bebop, we imagined unlocking unlimited revenue opportunities and cutting-edge business intelligence. Early customer feedback highlights Bebop's ability to 'save hours in research,' 'generate customers effortlessly,' and 'bring the power of AI to the everyday business owner'. That's real results; and a real threat to Silicon Valley sales giants." He contrasted Bebop's capability with earlier generations of business-to-business sales software, which he described as depending largely on SQL queries with interfaces optimised to simplify data retrieval. According to Lissette, Bebop's design provides a distinct experience by understanding both the offerings of a business and its relevant target market, ultimately helping to generate actionable insights for revenue generation. Lissette stated, "Bebop has intelligence at its core – genuinely understanding what a business provides and exactly who needs it. Our product delivers a fundamentally different experience that unlocks deep insights that fuel measurable revenue growth." Product development and outlook Bebop was built and brought to market within 90 days, which the company credits to its ongoing investment in its proprietary Pearl Engine software and underlying data infrastructure. The company suggests this effort illustrates its ongoing technology-driven approach to product development. Lissette added, "That conviction has been validated. The results show Bebop is not just viable – it's a force multiplier for BPG's revenue growth. It now stands alongside Pearl Diver as a key driver in our product portfolio, reinforcing our strategy of building scalable, high-impact tools for customer acquisition." He continued, "Bebop's rapid market-fit means our line of sight on USD $20 million ARR is even clearer. And this also will greatly contribute to our medium target of USD $50 million ARR." Karen Cargill, Interim Chief Financial Officer, remarked, "We have deliberately invested since our capital raise into platform development and talent acquisition. The vision and engine is working. Our investment and market timing have aligned. With two products both demonstrating scale and demand, we're well positioned for sustained growth."

Exclusive: AI drives new cyber threats & resilience strategies in APJ
Exclusive: AI drives new cyber threats & resilience strategies in APJ

Techday NZ

time20 hours ago

  • Techday NZ

Exclusive: AI drives new cyber threats & resilience strategies in APJ

There is both opportunity and risk, as artificial intelligence (AI) is adopted at enterprises across the region, according to Ben Young, Field CTO for APJ at Veeam. He also sees businesses are under pressure not only to adopt new technologies but also to shore up their defences as adversarial groups increasingly harness the same innovations for malicious purposes. "Every single vertical can benefit from some form of AI adoption," Young asserts. "But it's a double-edged sword. Just as we're trying to innovate, the threat groups-cyber adversaries-are leveraging AI as well." He points to the growing accessibility of AI-powered toolkits that lower the bar for launching attacks: "There are tools you can buy for a few hundred USD a month as a subscription, and they allow non-experts to write malware or deploy very convincing phishing campaigns. Large language models can push spear phishing click-through rates from industry averages of 12% up to 54%." This sharp escalation in the sophistication and volume of threats comes at a pivotal time when organisations are also accelerating their AI strategies. Veeam, which originally established its brand in backup and disaster recovery, is rapidly expanding its portfolio to address an evolving landscape, protecting hybrid environments, SaaS platforms, and even providing storage for backup workloads. Young notes that the company's partnerships, especially with Microsoft on Azure, have enabled it to offer backup-as-a-service while leveraging global economies of scale-critically, with "no egress and no API transaction fees." However, he's quick to add that adaptability is part of its core: "It's on the roadmap for other clouds to run these things, because not everyone's an Azure shop." The broadening definition of business resilience now brings backup and security disciplines much closer together. 90% of cyber attacks focus on backup repositories, which has resulted in disaster recovery and cybersecurity being intertwined. "Backups are the last resort, and threat actors know it. If they take out your backups, your only options are to pay the ransom and hope for the best," Young explains. Veeam's acquisition of CoveWare, an incident response firm, enables the direct integration of real-world telemetry and threat intelligence into Veeam's product development and customer education initiatives. Changing regulations are also playing a critical part. The recently enacted Japanese cyber defence bill mandates the reporting of ransomware incidents and the development of regular response plans. Young applauds this direction, noting, "It's critical we talk about incidents-otherwise these are not board-level discussions and security teams struggle for budget." He points out that cyber extortion is no longer a niche risk. Financial institutions and public sector organisations, in particular, are contending with increasingly sophisticated AI-enabled attacks while balancing compliance, governance, and privacy regulations across diverse national boundaries. The surge in 'shadow IT'-where departments launch unsanctioned SaaS, AI applications or cloud projects-presents new blind spots. "We're seeing lots of little shadow IT projects, especially as people rush to experiment with AI. When that gets to production, who is looking after that system? It's the same shadow IT problem we've seen for years, now amplified by the ease of consuming AI services," Young says. This requires a step change in visibility. Veeam is responding by mapping and analysing customers' data footprints and building automated support, monitoring, and reporting features through its observability platform. The company's AI-powered 'Veeam Intelligence Engine' is designed to suggest remediations, generate code samples, and flag risks in natural language-"making support and reporting far more accessible," says Young. The complexity of emerging architectures compounds the challenge of AI adoption. "We're really good at protecting databases and webservers because we know what they are and how to back them up. But with the introduction of vector databases, AI agents, and model training checkpoints, we need new strategies," Young explains. The potential cost and risk of a failed AI project, such as losing weeks of model training due to corrupted data, is prompting enterprises to consider backup and recovery for infrastructure previously outside the IT remit. "Agents are going to be central to the future, especially with more reliable, reflective AI systems. The good news is, most of these platforms run on environments-Kubernetes, cloud infrastructure-that we already protect." Young identifies security lapses as a persistent oversight in the current rush to implement AI: "It's the shiny new thing, and the basics can be forgotten. If we can get people thinking about security as part of their DNA while deploying AI, they'll be better off." He cautions that most SaaS providers operate a shared responsibility model: "Microsoft or Salesforce take care of the platform, not your data. If it's deleted from the cloud, it's gone-vendors won't provide a full backup. Your data is your responsibility." Against this backdrop, keeping pace with threats requires organisation-wide preparation. Veeam's customer workshops and regular incident simulations demonstrate a commitment to education as a proactive defence. "Preparation is the key: practice and plan. Use your tools, test your backups, scan for vulnerabilities, and have a response plan. Yara signature rules, for example, can be imported to scan for specific attack strains in backup archives," Young says, emphasising the importance of practical readiness over theoretical robustness. Young notes that Veeam's AI and resilience roadmap is anchored in five pillars: infrastructure resilience, intelligence, security pre- and post-attack, and business value extraction from archived data. The company's long-standing data integration API, for instance, enables the surfacing of unstructured data, ranging from images to documents, for AI applications, analytics, or compliance. "AI applications require fuel, and that fuel is data. Unlocking value from our organisations means thinking beyond expensive, monolithic data lakes, and instead focusing on the ability to extract insight from all data sources, structured or not." "Our role is to assist with growing compliance, governance, and regulatory requirements, but also to bring responsible, opt-in AI features to our customers and to help make data protection, cybersecurity, and digital transformation board-level priorities," Young concludes. "It's critical we talk about incidents-it raises awareness across all organisations. If we don't, it's not going to be a board-level discussion, and teams will struggle to get budget for this stuff."

AI drives 80 percent of phishing with USD $112 million lost in India
AI drives 80 percent of phishing with USD $112 million lost in India

Techday NZ

time2 days ago

  • Techday NZ

AI drives 80 percent of phishing with USD $112 million lost in India

Artificial intelligence has become the predominant tool in cybercrime, according to recent research and data from law enforcement and the cybersecurity sector. AI's growing influence A June 2025 report revealed that AI is now utilised in 80 percent of all phishing campaigns analysed this year. This marks a shift from traditional, manually created scams to attacks fuelled by machine-generated deception. Concurrently, Indian police recorded that criminals stole the equivalent of USD $112 million in a single state between January and May 2025, attributing the sharp rise in financial losses to AI-assisted fraudulent operations. These findings are reflected in the daily experiences of security professionals, who observe an increasing use of automation in social engineering, malware development, and reconnaissance. The pace at which cyber attackers are operating is a significant challenge for current defensive strategies. Methods of attack Large language models are now being deployed to analyse public-facing employee data and construct highly personalised phishing messages. These emails replicate a victim's communication style, job role and business context. Additionally, deepfake technology has enabled attackers to create convincing audio and video content. Notably, an incident in Hong Kong this year saw a finance officer send HK $200 million after participating in a deepfake video call bearing the likeness of their chief executive. Generative AI is also powering the development of malware capable of altering its own code and behaviour within hours. This constant mutation enables it to bypass traditional defences like endpoint detection and sandboxing solutions. Another tactic, platform impersonation, was highlighted by Check Point, which identified fake online ads for a popular AI image generator. These ads redirected users to malicious software disguised as legitimate installers, merging advanced loader techniques with sophisticated social engineering. The overall result is a landscape where AI lowers the barriers to entry for cyber criminals while amplifying the reach and accuracy of their attacks. Regulatory landscape Regulators are under pressure to keep pace with the changing threat environment. The European Union's AI Act, described as the first horizontal regulation of its kind, became effective last year. However, significant obligations affecting general-purpose AI systems will begin from August 2025. Industry groups in Brussels have requested a delay on compliance deadlines due to uncertainty over some of the rules, but firms developing or deploying AI will soon be subject to financial penalties for not adhering to the regulations. Guidance issued under the Act directly links the risks posed by advanced AI models to cybersecurity, including the creation of adaptive malware and the automation of phishing. This has created an expectation that security and responsible AI management are now interrelated priorities for organisations. Company boards are expected to treat the risks associated with generative models with the same seriousness as data protection or financial governance risks. Defensive measures A number of strategies have been recommended in response to the evolving threat environment. Top of the list is the deployment of behaviour-based detection systems that use machine learning in conjunction with threat intelligence, as traditional signature-based tools struggle against ever-changing AI-generated malware. Regular vulnerability assessments and penetration testing, ideally by CREST-accredited experts, are also regarded as essential to expose weaknesses overlooked by both automated and manual processes. Verification protocols for audio and video content are another priority. Using additional communication channels or biometric checks can help prevent fraudulent transactions initiated by synthetic media. Adopting zero-trust architectures, which strictly limit user privileges and segment networks, is advised to contain potential breaches. Teams managing AI-related projects should map inputs and outputs, track possible abuse cases, and retain detailed logs in order to meet audit obligations under the forthcoming EU regulations. Staff training programmes are also shifting focus. Employees are being taught to recognise subtle cues and nuanced context, rather than relying on spotting poor grammar or spelling mistakes as indicators of phishing attempts. Training simulations must evolve alongside the sophistication of modern cyber attacks. The human factor Despite advancements in technology, experts reiterate that people remain a core part of the defence against AI-driven cybercrime. Attackers are leveraging speed and scale, but defenders can rely on creativity, expertise, and interdisciplinary collaboration. "Technology alone will not solve AI‑enabled cybercrime. Attackers rely on speed and scale, but defenders can leverage creativity, domain expertise and cross‑disciplinary thinking. Pair seasoned red‑teamers with automated fuzzers; combine SOC analysts' intuition with real‑time ML insights; empower finance and HR staff to challenge 'urgent' requests no matter how realistic the voice on the call," said Himali Dhande, Cybersecurity Operations Lead at Borderless CS. The path ahead There is a consensus among experts that the landscape has been permanently altered by the widespread adoption of AI. It is increasingly seen as necessary for organisations to shift from responding to known threats to anticipating future methods of attack. Proactive security, embedded into every project and process, is viewed as essential not only for compliance but also for continued protection. Borderless CS stated it, "continues to track AI‐driven attack vectors and integrate them into our penetration‐testing methodology, ensuring our clients stay ahead of a rapidly accelerating adversary. Let's shift from reacting to yesterday's exploits to pre‐empting tomorrow's."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store