Secure IoT On-Device Architectures  Image

Secure IoT On-Device Architectures

Purchase

Actionable Benefits

  • Identify optimal security architectures for various IoT devices capabilities (constrained and multi-function).
  • Understand end-market opportunities for on-device security solutions.
  • Determine appropriate business models for on-device security products and services.     

Critical Questions Answered

  • What are the security capabilities available for different target applications and use cases?
  • What does the competitive landscape for secure IoT on-device architectures look like?
  • What is the revenue opportunity for the most mature technologies?       

Research Highlights

  • A detailed breakdown of on-device security technologies available for IoT devices on the market today.
  • A comprehensive analysis of the competitive landscape and business models adopted.
  • The dominating Trusted Execution Environment market broken out by end market applications. 

Who Should Read This?

  • IoT device manufacturers, silicon IP and semiconductor providers.
  • Software and application developers.
  • Security service providers (managed & cloud).

Table of Contents

1. EXECUTIVE SUMMARY

2. ASSESSING THE RISK

2.1. IoT Expansion
2.2. A Growing Threat Landscape
2.3. On-Device Approaches to Security
2.4. Securing DeviceS

3. CONSTRAINED DEVICES

3.1. Check Point Software Technologies
3.2. Karamba Security
3.3. Red Balloon Security
3.4. RunSafe Security
3.5. Sternum
3.6. Verimatrix

4. MID-RANGE AND SMART DEVICES

4.1. Trusted Execution Environments
4.2. Virtualization, Containers, and Hypervisors
4.3. Software Protection Profiles and Standards
4.4. Guidelines and Best Practices
4.5. Prove & Run
4.6. Qualcomm
4.7. SiFive
4.8. Trustonic
4.9. ZAYA