Cover Image
Market Research Report

IoT Security Market Report 2017-2022

Published by IoT Analytics GmbH Product code 557955
Published Content info 294 Pages
Delivery time: 1-2 business days
Price
Back to Top
IoT Security Market Report 2017-2022
Published: September 30, 2017 Content info: 294 Pages
Description

294-page industry report detailing the $4.4B IoT Security market including:

  • Market forecast from 2017 to 2022
  • Market by segment across 12 industries
  • Market by solution provider incl. top 10 vendors
  • Market by solution type (software, hardware, services)
  • Market by technology from 21 technology areas
  • Market by region across 7 regions
  • Segmentation into 4 layers : device, communication, cloud, and lifecycle management
  • 15 Detailed company profiles incl. 10 large firms and 5 innovative smaller firms
  • 8 Detailed case studies from real IoT security projects
  • 5 Key implementation considerations for building secure IoT solutions
  • Common best practices and an IoT security checklist
  • 5 Types of IoT attackers and their main motivation factors
  • Main industry partnerships, collaborations, and M&A activity
  • 6 Trends shaping the IoT security market
  • An evolution of cyber security viruses (IT), cyber physical attacks (OT) and IoT attacks
  • 2017 Database classifying 150 IoT security providers
  • And much more...

Description

As the Internet of Things (IoT) begins to transform businesses, economies and society, IoT security is emerging as an integral element that must be considered in the overall IoT infrastructure. New threats emerge as billions of devices are being connected to the internet. The unprecedented scale of recent DDoS attacks (Mirai) and Ransomware attacks (WannaCry) gave us just a glimpse of what is possible when attackers leverage thousands of unsecure IoT devices as malicious endpoints. This report aims to give deep insights into the complex IoT security market, showcase some innovative approaches that tackle the main challenges, and highlight key findings such as:

IN THIS REPORT FIND OUT:

  • How the global IoT security market will develop from 2017 to 2022
  • How the IoT security market breaks down across 12 industries
  • How the regional split of the IoT security market will develop
  • Which firm is leading the IoT security market
  • Which are the top 10 firms in the global IoT security
  • How 10 large firms and 5 innovative smaller firms tackle IoT security
  • Which solution type (software, hardware, services) will dominate the market
  • What are the 4 layers and 21 technology areas of IoT security
  • How 8 companies implemented IoT security in real-world implementations
  • What the 5 key implementation considerations for developing secure IoT solutions are
  • What the 6 main trends shaping the IoT security market are
  • Which 150 companies are tackling the challenges of IoT security

AT A GLANCE

IoT security spending is currently estimated at $703M for 2017 and the fast growing market (CAGR of 44%) is forecast to become almost a $4.4B opportunity by 2022 .

image1

The report breaks down the IoT security market by segment , showing current and expected spending for IoT security solutions in greater detail across 12 specific industries : B2C - Smart Home, B2C - Wearables & other consumer IoT, Connected Car, Connected Health, Energy / Utilities, Gov. / Military / Public Services, Industrial / Manufacturing, Retail, Smart cities, Supply Chain, Transportation (non-car), and Other.

The IoT security market is an aggregation of innovative startups and established firms such as global chip manufacturers, infrastructure providers, as well as cloud and enterprise software companies. Cisco is the current market leader in the fragmented IoT security market with an estimated market share of 7%. The top 10 providers account for over 40% of the IoT security market.

An extensive segmentation breaks down IoT security into 4 layers (device, communication, cloud, and lifecycle management) and 21 technology areas (including Services and Other) as in the exhibit below. Furthermore, the report presents a comprehensive history of cyber security viruses (IT), cyber physical attacks (OT) and IoT attacks from over 60 security breaches and provides a deep-dive into 8 specific IoT security solution implementations currently in the market.

image2

In addition, to better understand the market players the report includes detailed profiles of 10 large IoT security providers and 5 innovative smaller firms as well as a comprehensive database classifying 150 companies in the field. The reportalso describes the top 6 trends and main challenges affecting IoT security .

SELECTED COMPANIES FROM THE REPORT

ARM, Atmel, Airbus Defence, Barracuda, Bastille Networks, Bayshore Networks, Cisco, ClearBlade, Comarch Technologies, Darktrace, Digicert, Device Authority, Dell, Endian, Forescout Technologies, Fortinet, Gemalto, HPE, IBM, Infineon Technologies, Intel, Juniper, Kaspersky Labs, Lightcyber, McAfee, Microsoft, Mocana, NXP, Palo Alto, Risucre, Rohde & Schwarz, SAP, Symantec, Thales e-Security, Utimaco, Venafi, WISeKey, Wurldtech (GE), ZingBox

Table of Contents

Table of Contents

PREFACE: Current state of IoT security attacks

Executive Summary

1 IoT Security Overview

  • 1.1. IoT Introduction
    • 1.1.1 The 4 Major Layers of an IoT Solution
    • 1.2. History of Cyber Security Viruses and Important Cyber Physical Breaches
    • 1.2.1. Evolution of cyber security viruses (IT)
    • 1.2.2. History of cyber physical attacks (OT)
    • 1.2.3. History of IoT security attacks (IoT)
    • 1.3. The History Evolution of Cyber Security Solutions
    • 1.4. Today's IoT Security Threats
    • 1.4.1. General IoT attack surface
    • 1.4.2. Common IoT threats
    • 1.4.3. Types of IoT attackers
    • 1.4.4. IoT attackers' motivation

2 IoT Security Technology

  • 2.1. Secure Device (Hardware)
    • 2.1.1 Physical Security
    • 2.1.2 Data at Rest (Device)
    • 2.1.3 Chip Security
    • 2.1.4 Secure Booting
    • 2.1.5 Device Authentication
    • 2.1.6 Device Identity Management
    • 2.1.7 Further Principles for Device Security
  • 2.2. Secure Communications (Network)
    • 2.2.1 Access Management
    • 2.2.2 Firewall / IPS / IDS
    • 2.2.3 End-2-End Encryption
    • 2.2.4 Further Principles for Secure Communication
  • 2.3. Secure Cloud (Backend)
    • 2.3.1 Data at Rest (Cloud) / DLP
    • 2.3.2 Platform and Application Integrity Verification
    • 2.3.3 Unified threat management
    • 2.3.4 Further Principles for Secure Clouds
  • 2.4. Secure Lifecycle Management
    • 2.4.1 Risk Assessment
    • 2.4.2 Policies & Auditing
    • 2.4.3 Activity Monitoring
    • 2.4.4 Updates & Patches
    • 2.4.5 Vendor Control
    • 2.4.6 User awareness assessment & training
    • 2.4.7 Secure decommissioning
    • 2.4.8 Further Principles for Secure Lifecycle Management
  • 2.5. Constrained devices and the security implications

3 Market Analysis

  • 3.1. Overall Market
  • 3.2. Market Deep-Dives
    • 3.2.1 By Solution Type
    • 3.2.2 By Segment
    • 3.2.3 By Solution Provider
    • 3.2.4 By Technology
    • 3.2.5 By Region

4 Competitive Landscape

  • 4.1. Overview
  • 4.2. 10 Large Vendors
  • 4.3. 5 Innovative Smaller firms
  • 4.4. Mergers and Acquisitions
  • 4.5. Partnerships and Collaborations
  • 4.6. 135 Selected Other Market Participants

5 Implementation Considerations

  • 5.1. Assess IoT security gaps in the organization
  • 5.2. Determine main responsibility for IoT security
  • 5.3. Evaluate relevant standards, initiatives & guidelines
    • 5.3.1. Global Security Initiatives
    • 5.3.2. Industrial Focused Security Initiatives
    • 5.3.3. Governmental Security Initiatives
  • 5.4. Review the IoT environment security requirements
    • 5.4.1. Secure technology stack
    • 5.4.2. Security priorities
    • 5.4.3. Secure data growth
    • 5.4.4. Secure patching
  • 5.5. Learn from existing IoT implementations
    • 5.5.1. Security by design best practices and checklist
    • 5.5.2. 8 Implementation projects

6 Market Trends

  • 6.1. Market trends shaping IoT security (6)

Appendix

About IoT Analytics

Back to Top