M2M Application Security

1Q 2013 | Application Analysis Report | AN-1293 | 16 pages | 5 tables | 3 charts | 2 figures | PDF

Download

Table of Contents

  • 1. POROUS SECURITY EXPOSES VULNERABILITIES
    • 1.1. Limited Standardization in M2M Application Security
    • 1.2. The Weak Link: M2M Applications
    • 1.3. Hacking M2M Modules in Vehicles
    • 1.4. Bypassing Secure Access Controls
    • 1.5. Exploiting Industrial Control Systems
    • 1.6. Pervasive Flaws in eHealth Systems
    • 1.7. Development of M2M Application Security and Key Challenges
  • 2. M2M APPLICATION SECURITY: A NICHE BUT OPPORTUNE MARKET
    • 2.1. The M2M Application Security Market
    • 2.2. Securing the Middleware
    • 2.3. Limited Security Developments in the M2M Application Platforms Market
    • 2.4. Initiatives in M2M Open-source Middleware and Tools Boost Security
    • 2.5. Security for Next-generation Middleware
    • 2.6. Regional Breakdown of M2M Application Security Revenues
  • 3. THIRD-PARTY M2M VENDORS SET TO CONQUER M2M APP SECURITY
    • 3.1. Axeda
    • 3.2. Gemalto
    • 3.3. ILS Technology
    • 3.4. Novatel Wireless
    • 3.5. Sierra Wireless

Tables

  1. M2M Security Revenues by Segment, World Market, Forecast: 2013 to 2018
  2. Middleware Interfaces
  3. M2M Application Security Technology
  4. M2M Application Security Revenue by Platform, World Market, Forecast: 2013 to 2018
  5. M2M Application Security Revenue by Region, World Market, Forecast: 2013 to 2018

Charts

  1. M2M Security Revenues, World Market, Forecast: 2013 to 2018
  2. M2M Application Security Revenue by Platform, World Market, Forecast: 2013 to 2018
  3. M2M Application Security Revenue by Region , World Market, Forecast: 2013 to 2018

Figures

  1. M2M Application Security Requirements
  2. M2M Application and Network Topography


To continue reading:

Log In or Subscribe