<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1448210&amp;fmt=gif">

Secure IoT On-Device Architectures

Price: Starting at USD 3,000
Publish Date: 09 Jun 2021
Code: AN-5244
Research Type: Report
Pages: 30
RELATED SERVICE: OT Cybersecurity
Actionable Benefits

Actionable Benefits

  • Identify optimal security architectures for various IoT devices capabilities (constrained and multi-function).
  • Understand end-market opportunities for on-device security solutions.
  • Determine appropriate business models for on-device security products and services.
Research Highlights

Research Highlights

  • A detailed breakdown of on-device security technologies available for IoT devices on the market today.
  • A comprehensive analysis of the competitive landscape and business models adopted.
  • The dominating Trusted Execution Environment market broken out by end market applications.
Critical Questions Answered

Critical Questions Answered

  • What are the security capabilities available for different target applications and use cases?
  • What does the competitive landscape for secure IoT on-device architectures look like?
  • What is the revenue opportunity for the most mature technologies?
Who Should Read This?

Who Should Read This?

  • IoT device manufacturers, silicon IP and semiconductor providers.
  • Software and application developers.
  • Security service providers (managed & cloud).

Companies Mentioned

BlackBerry
Check Point Software Technologies Ltd.
Qualcomm Inc
Quantum
Red Balloon Security
Red Balloon Security
USA Firmware
Verimatrix

Table of Contents

1. EXECUTIVE SUMMARY

2. ASSESSING THE RISK

2.1. IoT Expansion
2.2. A Growing Threat Landscape
2.3. On-Device Approaches to Security
2.4. Securing DeviceS

3. CONSTRAINED DEVICES

3.1. Check Point Software Technologies
3.2. Karamba Security
3.3. Red Balloon Security
3.4. RunSafe Security
3.5. Sternum
3.6. Verimatrix

4. MID-RANGE AND SMART DEVICES

4.1. Trusted Execution Environments
4.2. Virtualization, Containers, and Hypervisors
4.3. Software Protection Profiles and Standards
4.4. Guidelines and Best Practices
4.5. Prove & Run
4.6. Qualcomm
4.7. SiFive
4.8. Trustonic
4.9. ZAYA

Companies Mentioned

  • BlackBerry
  • Check Point Software Technologies Ltd.
  • Qualcomm Inc
  • Quantum
  • Red Balloon Security
  • Red Balloon Security
  • USA Firmware
  • Verimatrix