Subscribe Digital Security
2Q 2017 | | Updated Semiannually
Embedded security technologies offer robust security features and are driven by vigorous demand in many IoT applications, notably financial, transit, telcos, and identity. Embedded security solutions help manufacturers ensure their products and devices are protected from cyberthreats at a hardware level. ABI Research has broken down the embedded security technologies into five segments: embedded secure element, trusted platform module (TPM), trusted execution environment (TEE), authentication ICs, and embedded SIM. Each segment is further broken down by the number of shipments, end-user devices, regions, average selling prices (ASPs), and revenues.Continue
- Biometric Technologies and Applications
- Secure Smart Card & Embedded Security IC Technologies
- Smart Card Vendor Market Shares
- Smart Card Technologies
- Critical Infrastructure Security
- Payment & Banking Card Secure IC Technologies
- Government & Healthcare ID IC Technologies
- Payment & Banking Card Technologies
- Contactless Ticketing Smart Card Technologies
- Contactless Ticketing Secure IC Technologies
- Government & Healthcare ID Cards
2Q 2017 | IN-4585
Transport authorities continue to evaluate next-generation ticketing technologies as a platform from which they can streamline operations. This evaluation is occurring whether they are already running a well-established ticketing system or implementing a new system to expand and extend network visibility in order to gather valuable user data points and offer new innovative services.
Every client is assigned a key member of our research team, based on their organization’s needs and goals. And, an unlimited number of Analyst Inquiry calls are available to answer your specific questions.
Cybersecurity Gets an Upgrade: Machine Learning, Automation, and the Potential for Artificial Intelligence
June 22, 2017, 11 a.m.
With each passing quarter cyberattacks are becoming increasingly more frequent and potent, causing organizations to adapt out of necessity to these emerging threats. Luckily, artificial intelligence (AI), machine learning (ML), and automation applications are also advancing rapidly and have finally found their way to cybersecurity.
This webinar will explore the benefits offered by these applications, as well as any vital prerequisites, and barriers for adoption. It will also describe the key current technologies (deep learning, user and entity behavior analytics [UEBA], and cognitive computing), provide insights regarding algorithm training approaches, and describe the current and future state of the market.This webinar will seek to answer key questions:
- How is ML applied in cybersecurity?
- How can companies derive value from it?
- What processes should be automated?
- What data sources should be used for algorithm training?
- What constitutes a good UEBA product?
- What does the future of AI hold for cybersecurity?