Expanding IoT Edge Drives New Opportunities for Processor Security Applications
Continued growth in IoT edge deployments is driving increased demand to protect sensitive applications on-device
From machine learning to image recognition, compute-intense processes are increasingly moving to the IoT edge. As a result, global technology intelligence firm ABI Research sees demand to protect those operations driving a solid market for secure processor capabilities on-device. The security hardware market is at an inflection point, where real-time functional safety requirements from the microcontroller space are converging with trusted computing base and secure execution environments capabilities popular in SoC applications.
“A richness in security IP offerings on the market is enabling plenty of use cases for leveraging a trusted hardware foundation in IoT edge, with chipset manufacturers able to offer features such as advanced high assurance boot, hardware firewall domains, run-time attestation, and secure enclaves. Most importantly, these capabilities allow building secure edge devices that can run trusted applications and securely communicate over networks to various front and backend services,” explains Michela Menting, Research Director at ABI Research.
There is a democratization of the building blocks for designing secure edge devices: greater availability, more choice, better pricing, and improved functionality. Many security capabilities used to be offered to distinctive markets almost exclusively (microcontroller vs. CPU). Still, a convergence in the space, driven by the demand for creating trusted applications in a myriad of IoT use cases, is breaking down those barriers. Demand for secure processors spans automotive, industrial, retail, logistics, healthcare, and consumer.
With heavyweights from the processor computing space like Intel, AMD, and TI to smartphone chipmakers including Qualcomm, MediaTek, and Samsung, and microcontroller leaders such as Microchip, NXP, Renesas, and STM, the market for secure processors for the IoT edge is vibrant and highly competitive, all offering innovative and highly performant technology solutions that can meet the modern demands of the IoT edge.
These findings are from ABI Research’s Processor Security for the IoT Edge application analysis report. This report is part of the company’s Trusted Device Solutions and IoT Cybersecurity research services, which include research, data, and ABI Insights. Based on extensive primary interviews, Application Analysis reports present an in-depth analysis of key market trends and factors for a specific application, which could focus on an individual market or geography.
Contact ABI Research
Media Contacts
Americas: +1.516.624.2542
Europe: +44.(0).203.326.0142
Asia: +65 6950.5670
Related Research
Report | 1Q 2023 | AN-5598
Related Service
- Competitive & Market Intelligence
- Executive & C-Suite
- Marketing
- Product Strategy
- Startup Leader & Founder
- Users & Implementers
Job Role
- Telco & Communications
- Hyperscalers
- Industrial & Manufacturing
- Semiconductor
- Supply Chain
- Industry & Trade Organizations
Industry
Services
Spotlights
5G, Cloud & Networks
- 5G Devices, Smartphones & Wearables
- 5G, 6G & Open RAN
- Cellular Standards & Intellectual Property Rights
- Cloud
- Enterprise Connectivity
- Space Technologies & Innovation
- Telco AI
AI & Robotics
Automotive
Bluetooth, Wi-Fi & Short Range Wireless
Cyber & Digital Security
- Citizen Digital Identity
- Digital Payment Technologies
- eSIM & SIM Solutions
- Quantum Safe Technologies
- Trusted Device Solutions