INDEX

Managed Security Services for the IoT

IoT security maintained its hot topic status and continues to be a strategic focal point for all digital security vendors who are looking towards the hyper connected world and managed platforms and services as the next generation growth opportunity via solutions that can be placed under the broader SaaS (Security as a Service) and IDaaS (Identity as a Service) umbrella terms.

Whether vendor strengths reside within the hardware, software, application, or service side, IoT security strategies are a must. Built from the ground up, third-party aas (as a Service) management solutions are designed to help mitigate the future challenges of securely managing assets in the field throughout their lifetime.

The “aas” security model is now gaining traction and is particularly prominent in IoT use cases as third parties look to become integral and central partners to service providers and/or OEMs that may not possess the necessary security expertise, man power, or budgets to implement from an in-house perspective.  

ABI Research’s Managed Security Services for the IoT report provides holistic coverage of this relativity new area, exploring the current market dynamics, the types of “aaS” (as a Service) solutions available, as well as providing wider analysis and discussion on IoT security and its potential impact on MSSPs (Managed Security Service Providers). 

Table of Contents

  • 1. SETTING THE IOT SECURITY SCENE
    • 1.1. Defining the IoT Landscape
    • 1.2. Understanding the IoT Security Opportunity
    • 1.3. Defining the Security aaS Models
  • 2. DRIVERS, INHIBITORS, AND CONSIDERATIONS
    • 2.1. The Unique Characteristics of the IoT
    • 2.2. Questions That Still Require an Answer
    • 2.3. Quantifying the Risk
    • 2.4. End-to-End IoT Security Does Anyone Really Have It?
    • 2.5. IoT Security Requirements
    • 2.6. No Need to Reinvent the Wheel
    • 2.7. The Security Needs of Today Will Be Different Tomorrow
    • 2.8. Market Adjacencies Bring In a New Security Dynamic
    • 2.9. Security Services As a Differentiator
    • 2.10. Standards, Regulations, and Guidelines
  • 3. FORECASTS
    • 3.1. Connected Devices
    • 3.2. Leveraging Embedded Hardware
    • 3.3. Security Service Revenues
  • 4. IOT MSSPS ECOSYSTEM AND MARKET MAKEUP
    • 4.1. Security Vendors From All Walks of Life Targeting IoT
    • 4.2. aaS Vendors Adjusting Pricing Model Shift
    • 4.3. Those Best Positioned For aaS Opportunity
    • 4.4. Recommendations and Key Takeaways
  • 5. APPENDIX: OTHER DEFINITIONS
    • 5.1. Device Definitions
    • 5.2. Embedded Chipset Definitions

Companies Mentioned