Secure IoT On-Device Architectures
Price: Starting at USD 3,000
Publish Date: 10 Jun 2021
Code: AN-5244
Research Type: Report
Pages: 30
RELATED SERVICE:
Actionable Benefits
- Identify optimal security architectures for various IoT devices capabilities (constrained and multi-function).
- Understand end-market opportunities for on-device security solutions.
- Determine appropriate business models for on-device security products and services.
Research Highlights
- A detailed breakdown of on-device security technologies available for IoT devices on the market today.
- A comprehensive analysis of the competitive landscape and business models adopted.
- The dominating Trusted Execution Environment market broken out by end market applications.
Critical Questions Answered
- What are the security capabilities available for different target applications and use cases?
- What does the competitive landscape for secure IoT on-device architectures look like?
- What is the revenue opportunity for the most mature technologies?
Who Should Read This?
- IoT device manufacturers, silicon IP and semiconductor providers.
- Software and application developers.
- Security service providers (managed & cloud).
Companies Mentioned
Table of Contents
1. EXECUTIVE SUMMARY
2. ASSESSING THE RISK
2.1. IoT Expansion
2.2. A Growing Threat Landscape
2.3. On-Device Approaches to Security
2.4. Securing DeviceS
3. CONSTRAINED DEVICES
3.1. Check Point Software Technologies
3.2. Karamba Security
3.3. Red Balloon Security
3.4. RunSafe Security
3.5. Sternum
3.6. Verimatrix
4. MID-RANGE AND SMART DEVICES
4.1. Trusted Execution Environments
4.2. Virtualization, Containers, and Hypervisors
4.3. Software Protection Profiles and Standards
4.4. Guidelines and Best Practices
4.5. Prove & Run
4.6. Qualcomm
4.7. SiFive
4.8. Trustonic
4.9. ZAYA
Companies Mentioned
- Amazon
- Aptiv
- AWS
- BlackBerry
- Check Point Software Technologies Ltd.
- Cisco
- Global Platform
- Linux Foundation
- NIST
- Qualcomm Inc
- Quantum
- Red Balloon Security
- Renesas
- Schneider Electric
- Siemens
- Telit
- Verimatrix
Related Research
Security Services for IoT
Report | 4Q 2020 | AN-5247
Smart IoT Gateways: Analytics, Security and Ecosystem Assessment
Report | 3Q 2020 | AN-5225
Hardware Security Modules in IoT Applications
Report | 4Q 2021 | AN-5370
- Competitive & Market Intelligence
- Executive & C-Suite
- Marketing
- Product Strategy
- Startup Leader & Founder
- Users & Implementers
Job Role
- Telco & Communications
- Hyperscalers
- Industrial & Manufacturing
- Semiconductor
- Supply Chain
- Industry & Trade Organizations
Industry
Services
Spotlights
5G, Cloud & Networks
- 5G Devices, Smartphones & Wearables
- 5G, 6G & Open RAN
- Cellular Standards & Intellectual Property Rights
- Cloud
- Enterprise Connectivity
- Space Technologies & Innovation
- Telco AI
AI & Robotics
Automotive
Bluetooth, Wi-Fi & Short Range Wireless
Cyber & Digital Security
- Citizen Digital Identity
- Digital Payment Technologies
- eSIM & SIM Solutions
- Quantum Safe Technologies
- Trusted Device Solutions