Privacy and Security in AR/MR Ecosystems

Price: Starting at USD 3,000
Publish Date: 18 Jun 2020
Code: AN-2794
Research Type: Research Report
Pages: 21
Privacy and Security in AR/MR Ecosystems
RELATED SERVICE: Augmented & Virtual Reality
Actionable Benefits

Actionable Benefits

  • Increase understanding of privacy and security risks in AR/MR ecosystem in order to define more efficient security strategies and policy regulations.
  • Enhance existing and upcoming AR/MR solutions by ensuring privacy and security.
  • Understand which AR applications and devices are more vulnerable to privacy and security attacks.
Critical Questions Answered

Critical Questions Answered

  • Which are the unique privacy and security threats for AR/MR ecosystem and digital environments?
  • How AR/MR providers can leverage the experience from other connected devices and mitigate privacy and security risks?
  • Which are the consequences of an attack that targets an AR/MR application or device and how can be prevented?
  • Which are the best practices to ensure privacy and security in AR/MR solutions?
  • Which are the privacy and security strategies that are adopted by AR players?
Research Highlights

Research Highlights

  • Security and privacy risks related to hardware architecture, applications and platforms, network connectivity, system integration, operating system.
  • Best practices and recommendations that ensure privacy and security in AR/MR enterprise and consumer solutions.
  • Revenue forecast for privacy and security spending in AR/MR ecosystems.
Who Should Read This?

Who Should Read This?

  • Decision makers who need to understand privacy and security risks in AR/MR.
  • Policy makers and regulators.
  • Security solution providers that planning to expand in AR/MR ecosystem.
  • AR/MR OEMs and solution provides.

Table of Contents

1. EXECUTIVE SUMMARY

1.1. Overview
1.2. Key Findings

2. RECOMMENDATIONS

3. LESSONS LEARNED FROM OTHER MARKETS

3.1. Hardware and Software Architecture
3.2. Network Architecture
3.3. Data Collection
3.4. Core Security and Privacy Principles for Sharing Environments

4. AR AND MR ECOSYSTEM

4.1. Hardware Architecture
4.2. Applications and Platforms
4.3. Data Collection
4.4. Device Heterogeneity and System Integration
4.5. Delivering Timely OS and Software Updates
4.6. Network Vulnerabilities

5. MARKET DATA

6. COMPANY PROFILES

6.1. Atheer
6.2. OPS Solutions
6.3. Perfect Corp
6.4. PTC
6.5. Ubimax
6.6. Tobii
6.7. VMware
6.8. IBM
6.9. 42Gears