Processor Security for the IoT Edge

Price: Starting at USD 3,000
Publish Date: 14 Feb 2023
Code: AN-5598
Research Type: Research Report
Pages: 32
Processor Security for the IoT Edge
Actionable Benefits

Actionable Benefits

  • Identify optimal Internet of Things (IoT) applications for secure processors.
  • Develop security features for IoT edge devices.
  • Leverage security Intellectual Property (IP) to deliver trusted applications on devices and in the cloud.
Critical Questions Answered

Critical Questions Answered

  • What are the security demands and challenges for high-end IoT edge devices?
  • How is security in processor technology converging along the various form factors (Microprocessor Units (MPU) and Microcontroller Units (MCUs)) and what are their differentiators?
  • Who are the primary ecosystem players in secure processor technology for IoT edge devices?
Research Highlights

Research Highlights

  • Security technology developments for security IP, MPUs, and their enablement of secure applications and cloud services.
  • Vendor ecosystem overview of primary players in the secure processor market for IoT edge.
  • Global Total Addressable Market (TAM) forecast for Trusted Execution Environment (TEE) Systems-on-Chip (SoCs) for mobile and IoT devices.
Who Should Read This?

Who Should Read This?

  • Product developers and engineers at silicon IP and semiconductor vendors and chipset manufacturers.
  • Security decision makers at IoT OEMs.
  • Application developers and connectivity providers.

Table of Contents

Executive Summary

Security for IoT Edge Devices

Processor Choice and Convergence 
Security Technologies
Security IP and Architecture Design
MPUs and Above
Software, OS, and Services

Market Dynamics

Use Cases
End Markets
Forecasts
 

Related Research Spotlight

Secure Embedded Hardware

This Spotlight Includes:

Digital Authentication and Embedded Security
Digital Authentication and Embedded Security
Processor Security for the IoT Edge
Processor Security for the IoT Edge
Digital Authentication and Embedded Security Market Data
Digital Authentication and Embedded Security Market Data
Secure General-Purpose IoT MCUs Competitive Assessment
Secure General-Purpose IoT MCUs Competitive Assessment
  • All recently published research
  • Access to any updates to the research published within six months of purchase
  • Direct insight from our analysts through 60 minutes of Analyst Inquiry
View Spotlight