Achieving On-Device Security with Minimal Impact

Subscribe To Read This Insight

By Michela Menting | 4Q 2021 | IN-6383

 

The Rise of Security Solutions for Constrained Devices

NEWS


Constrained devices, whether through limited computing capabilities or low power consumption, have been the bane of cybersecurity vendors since the advent of the Internet of Things (IoT). The major obstacle of constrained devices is their limited ability to integrate resource-intensive or costly security solutions on-device. The development of lightweight security solutions is niche area but a growing focus within the cybersecurity industry. A number of innovative startups have commercialized on-device solutions that work within the limits of constrained devices without impacting performance. These include Nanolock, Check Point Software Technologies, Karamba Security, Red Balloon Security, RunSafe Security, Sternum, and Verimatrix. Some are industry-specific, while others offer platform and application agnostic solutions targeting a broad range of IoT devices.  

All About the Software...and Services

IMPACT


Hardened devices reduce the attack surface and their exploitability. This lightens the load at the net…

You must be a subscriber to view this ABI Insight.
To find out more about subscribing contact a representative about purchasing options.

Services