Secure General-Purpose IoT MCUs Competitive Assessment

Price: Starting at USD 4,500
Publish Date: 21 Oct 2019
Code: CA-1244
Research Type: Competitive Ranking
Pages: 26
Secure General-Purpose IoT MCUs Competitive Assessment
RELATED SERVICE AND SPOTLIGHTS: Trusted Device Solutions Secure Embedded Hardware
Actionable Benefits

Actionable Benefits

  • Understand the competitive landscape for secure GP MCUs including key hardware capabilities and software development platforms for IoT deployers to adopt the most fitting solution to their projects.
  • Identify competitive advantage and differentiation of prominent platforms to align product development and marketing strategies.
  • Identify MCU partners for secure development of associated onboarding and provisioning services and for lifecycle management.
Critical Questions Answered

Critical Questions Answered

  • Who are the vendors offering secure GP MCUs?
  • What are the features of this new class of offerings?
  • How do the vendors and their solutions fare against each other?
Research Highlights

Research Highlights

  • In-depth analysis of the technology features of secure MCU including core hardware.
  • Overview of software development platforms for developing secure IoT devices using the MCU features.
  • Insight into onboarding, provisioning and lifecycle management capabilities of secure MCUs.
Who Should Read This?

Who Should Read This?

  • Semiconductor companies, notably product development staff to improve MCU offerings.
  • IoT platform developers to understand which MCUs have IDEs and related tools for secure software development.
  • Cloud and Managed IoT service providers to target secure connectivity and cloud support for IoT devices leveraging secure MCUs.

Companies Mentioned

Cypress Corporation
Microchip Technology Inc
Nuvoton
Renesas
STMicroelectronics
USA Firmware

Table of Contents

1. EXECUTIVE SUMMARY

1.1. Vendor Matrix
1.2. ABI Research Categorizes the Platforms into Three Categories: Leaders, Followers, and Laggards
1.3. Innovation Rankings
1.4. Implementation Rankings

2. INDIVIDUAL COMPANY ASSESSMENTS

2.1. Leaders
2.2. Followers
2.3. Laggards

Related Research Spotlight

Secure Embedded Hardware

This Spotlight Includes:

Digital Authentication and Embedded Security
Digital Authentication and Embedded Security
Processor Security for the IoT Edge
Processor Security for the IoT Edge
Digital Authentication and Embedded Security Market Data
Digital Authentication and Embedded Security Market Data
Secure General-Purpose IoT MCUs Competitive Assessment
Secure General-Purpose IoT MCUs Competitive Assessment
  • All recently published research
  • Access to any updates to the research published within six months of purchase
  • Direct insight from our analysts through 60 minutes of Analyst Inquiry
View Spotlight