Secure IoT On-Device Architectures
Price:
Starting at USD 3,000
Publish Date: 09 Jun 2021
Code: AN-5244
Research Type: Report
Pages: 30
RELATED SERVICE:
OT Cybersecurity
Actionable Benefits
- Identify optimal security architectures for various IoT devices capabilities (constrained and multi-function).
- Understand end-market opportunities for on-device security solutions.
- Determine appropriate business models for on-device security products and services.
Research Highlights
- A detailed breakdown of on-device security technologies available for IoT devices on the market today.
- A comprehensive analysis of the competitive landscape and business models adopted.
- The dominating Trusted Execution Environment market broken out by end market applications.
Critical Questions Answered
- What are the security capabilities available for different target applications and use cases?
- What does the competitive landscape for secure IoT on-device architectures look like?
- What is the revenue opportunity for the most mature technologies?
Who Should Read This?
- IoT device manufacturers, silicon IP and semiconductor providers.
- Software and application developers.
- Security service providers (managed & cloud).
Companies Mentioned
Table of Contents
1. EXECUTIVE SUMMARY
2. ASSESSING THE RISK
2.1. IoT Expansion
2.2. A Growing Threat Landscape
2.3. On-Device Approaches to Security
2.4. Securing DeviceS
3. CONSTRAINED DEVICES
3.1. Check Point Software Technologies
3.2. Karamba Security
3.3. Red Balloon Security
3.4. RunSafe Security
3.5. Sternum
3.6. Verimatrix
4. MID-RANGE AND SMART DEVICES
4.1. Trusted Execution Environments
4.2. Virtualization, Containers, and Hypervisors
4.3. Software Protection Profiles and Standards
4.4. Guidelines and Best Practices
4.5. Prove & Run
4.6. Qualcomm
4.7. SiFive
4.8. Trustonic
4.9. ZAYA
Companies Mentioned
- BlackBerry
- Check Point Software Technologies Ltd.
- Qualcomm Inc
- Quantum
- Red Balloon Security
- Red Balloon Security
- USA Firmware
- Verimatrix